Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
xLauncher.exe

Overview

General Information

Sample name:xLauncher.exe
Analysis ID:1561476
MD5:ceaca4a19229c3283007e714466f51f8
SHA1:e70dfeeea1cdfeae4da1e97d602867436062550d
SHA256:e6e0f35cd360401b1973626cb35b635e86bd272b115852f07e434ac3fea0977a
Tags:exeuser-4k95m
Infos:

Detection

LummaC Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Injects a PE file into a foreign processes
Machine Learning detection for sample
Sample uses string decryption to hide its real strings
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • xLauncher.exe (PID: 5824 cmdline: "C:\Users\user\Desktop\xLauncher.exe" MD5: CEACA4A19229C3283007E714466F51F8)
    • conhost.exe (PID: 3140 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • xLauncher.exe (PID: 5660 cmdline: "C:\Users\user\Desktop\xLauncher.exe" MD5: CEACA4A19229C3283007E714466F51F8)
  • cleanup
{"C2 url": ["fumblingactor.cyou"]}
SourceRuleDescriptionAuthorStrings
00000003.00000002.2092143624.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
    00000000.00000002.2049629011.0000000002A82000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
      decrypted.memstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
        SourceRuleDescriptionAuthorStrings
        3.2.xLauncher.exe.400000.0.unpackJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
          3.2.xLauncher.exe.400000.0.raw.unpackJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
            No Sigma rule has matched
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-11-23T14:27:47.794213+010020283713Unknown Traffic192.168.2.549704172.67.155.47443TCP
            2024-11-23T14:27:49.770829+010020283713Unknown Traffic192.168.2.549705172.67.155.47443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-11-23T14:27:48.490580+010020546531A Network Trojan was detected192.168.2.549704172.67.155.47443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-11-23T14:27:48.490580+010020498361A Network Trojan was detected192.168.2.549704172.67.155.47443TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 00000000.00000002.2049629011.0000000002A82000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: LummaC {"C2 url": ["fumblingactor.cyou"]}
            Source: xLauncher.exeReversingLabs: Detection: 47%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.1% probability
            Source: xLauncher.exeJoe Sandbox ML: detected
            Source: 00000003.00000002.2092143624.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: fumblingactor.cyou
            Source: 00000003.00000002.2092143624.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
            Source: 00000003.00000002.2092143624.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
            Source: 00000003.00000002.2092143624.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
            Source: 00000003.00000002.2092143624.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
            Source: 00000003.00000002.2092143624.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: Workgroup: -
            Source: xLauncher.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 172.67.155.47:443 -> 192.168.2.5:49704 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.155.47:443 -> 192.168.2.5:49705 version: TLS 1.2
            Source: xLauncher.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_ISOLATION, GUARD_CF, TERMINAL_SERVER_AWARE
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 0_2_005EC72A FindFirstFileExW,0_2_005EC72A
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 0_2_005EC7DB FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_005EC7DB
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_005EC72A FindFirstFileExW,3_2_005EC72A
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_005EC7DB FindFirstFileExW,FindNextFileW,FindClose,FindClose,3_2_005EC7DB
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then mov ebx, ecx3_2_00439390
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+000001E8h]3_2_0040CC6D
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then movzx esi, byte ptr [esp+edx-50CB154Bh]3_2_00409E30
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 4C697C35h3_2_00440F30
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then mov word ptr [eax], cx3_2_00419040
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+6FE6A972h]3_2_004098F0
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then mov word ptr [ebp+00h], ax3_2_004098F0
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]3_2_0042B8F0
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then movzx ecx, byte ptr [esp+esi-499E0CD7h]3_2_004400A0
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then movzx edx, byte ptr [esp+edi-499E0CD7h]3_2_004400A0
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then mov ecx, eax3_2_004400A0
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 4C697C35h3_2_004410B0
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then movzx eax, byte ptr [esi+ecx+1079369Fh]3_2_0041C15D
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then mov byte ptr [edx], cl3_2_0042E97E
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then mov dword ptr [esi], ebx3_2_0042F112
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then cmp dword ptr [edx+ecx*8], 4F699CD4h3_2_00441920
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then mov ecx, eax3_2_004259E0
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then mov ecx, eax3_2_004259E0
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then mov ecx, eax3_2_004259E0
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then mov edi, ecx3_2_0041C1F8
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then movzx edx, byte ptr [ebx+ecx-3E194A8Ah]3_2_0041C1F8
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then mov ecx, eax3_2_00428240
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then mov edi, dword ptr [ebp-2Ch]3_2_0042A210
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then cmp dword ptr [ebp+ebx*8+00h], 40915FE0h3_2_00441220
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then mov eax, dword ptr [00448860h]3_2_0042EAD3
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then mov eax, ebp3_2_00405A80
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then mov eax, ebp3_2_00405A80
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then movzx ebx, bx3_2_00425B05
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then mov ecx, eax3_2_0042830C
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then push 00000000h3_2_0040B320
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then mov ecx, eax3_2_00425B30
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then mov ecx, eax3_2_00425B30
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then mov ecx, eax3_2_00425B30
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then cmp word ptr [ebp+edi+02h], 0000h3_2_00423BE0
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then movzx ecx, byte ptr [esp+esi-499E0CD7h]3_2_0043FBA0
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then movzx edx, byte ptr [esp+edi-499E0CD7h]3_2_0043FBA0
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then mov ecx, eax3_2_0043FBA0
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then movzx eax, byte ptr [esp+ecx-0Ah]3_2_0041E3A6
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then mov word ptr [esi], cx3_2_0041E3A6
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then inc eax3_2_004203B0
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then mov byte ptr [ebx], al3_2_004203B0
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then movzx ecx, byte ptr [esi+eax+6B288C58h]3_2_004203B0
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then mov ecx, edx3_2_0042E452
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then mov ecx, eax3_2_00440430
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then movzx edi, byte ptr [esi+eax-5A036C71h]3_2_0042F4CC
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then mov byte ptr [edx], cl3_2_0042F4CC
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then mov eax, ebx3_2_00409480
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+3B55F564h]3_2_00440CB0
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then lea esi, dword ptr [eax+00000270h]3_2_00408D40
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then mov word ptr [esi], cx3_2_00429D4A
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+2BD892BAh]3_2_00427D60
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then movsx ecx, byte ptr [eax+edx]3_2_0040AD70
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then movzx ebx, byte ptr [esp+ecx-00000081h]3_2_0040AD70
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then mov ecx, ebx3_2_00419DCA
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then cmp dword ptr [ecx+ebx*8], 9C142CDAh3_2_00440E60
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+000001BCh]3_2_0040D674
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then cmp dword ptr [edx+ecx*8], 484CE391h3_2_00441620
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then movzx ebx, byte ptr [edx]3_2_00436630
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then movzx edi, byte ptr [ecx+esi+25h]3_2_00403E80
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then movzx ebx, byte ptr [ecx+edi-000000D1h]3_2_00419E93
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then mov ecx, dword ptr [edx+eax]3_2_00428E9A
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 4C697C35h3_2_0040EEB8
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then movzx edx, byte ptr [esi]3_2_00425740
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then mov ecx, eax3_2_00425740
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then mov ecx, eax3_2_00425740
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then mov ecx, eax3_2_00425740
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then mov edi, dword ptr [esp+2Ch]3_2_00425740
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then movzx edi, byte ptr [ecx+esi]3_2_00402760
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then cmp byte ptr [esi+ebx], 00000000h3_2_0042BF00
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then mov word ptr [esi], cx3_2_00429FD0
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then movzx ecx, byte ptr [esp+esi-499E0CD7h]3_2_0043FFE0
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then movzx edx, byte ptr [esp+edi-499E0CD7h]3_2_0043FFE0
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 4x nop then mov ecx, eax3_2_0043FFE0

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.5:49704 -> 172.67.155.47:443
            Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:49704 -> 172.67.155.47:443
            Source: Malware configuration extractorURLs: fumblingactor.cyou
            Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49705 -> 172.67.155.47:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49704 -> 172.67.155.47:443
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: frogs-severz.sbs
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficDNS traffic detected: DNS query: fumblingactor.cyou
            Source: global trafficDNS traffic detected: DNS query: frogs-severz.sbs
            Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: frogs-severz.sbs
            Source: xLauncher.exe, 00000003.00000003.2090719242.0000000002DD6000.00000004.00000020.00020000.00000000.sdmp, xLauncher.exe, 00000003.00000003.2090462860.0000000002D8E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microx
            Source: xLauncher.exe, 00000003.00000002.2092497554.0000000002DE4000.00000004.00000020.00020000.00000000.sdmp, xLauncher.exe, 00000003.00000003.2090462860.0000000002DE4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://frogs-severz.sbs/
            Source: xLauncher.exe, 00000003.00000003.2090439029.0000000002DE9000.00000004.00000020.00020000.00000000.sdmp, xLauncher.exe, 00000003.00000002.2092497554.0000000002DE4000.00000004.00000020.00020000.00000000.sdmp, xLauncher.exe, 00000003.00000003.2090462860.0000000002DE4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://frogs-severz.sbs/api
            Source: xLauncher.exe, 00000003.00000003.2090784874.0000000002D80000.00000004.00000020.00020000.00000000.sdmp, xLauncher.exe, 00000003.00000002.2092435196.0000000002D80000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://frogs-severz.sbs/api6C
            Source: xLauncher.exe, 00000003.00000002.2092497554.0000000002DE4000.00000004.00000020.00020000.00000000.sdmp, xLauncher.exe, 00000003.00000003.2090462860.0000000002DE4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://frogs-severz.sbs/apil
            Source: xLauncher.exe, 00000003.00000003.2090462860.0000000002D53000.00000004.00000020.00020000.00000000.sdmp, xLauncher.exe, 00000003.00000003.2090784874.0000000002D64000.00000004.00000020.00020000.00000000.sdmp, xLauncher.exe, 00000003.00000002.2092397115.0000000002D65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://frogs-severz.sbs:443/api
            Source: xLauncher.exe, 00000003.00000003.2090462860.0000000002D53000.00000004.00000020.00020000.00000000.sdmp, xLauncher.exe, 00000003.00000003.2090784874.0000000002D64000.00000004.00000020.00020000.00000000.sdmp, xLauncher.exe, 00000003.00000002.2092397115.0000000002D65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://frogs-severz.sbs:443/apibcryptPrimitives.dll
            Source: xLauncher.exe, 00000003.00000003.2090462860.0000000002D53000.00000004.00000020.00020000.00000000.sdmp, xLauncher.exe, 00000003.00000003.2090784874.0000000002D64000.00000004.00000020.00020000.00000000.sdmp, xLauncher.exe, 00000003.00000002.2092397115.0000000002D65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fumblingactor.cyou:443/apiS
            Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
            Source: unknownHTTPS traffic detected: 172.67.155.47:443 -> 192.168.2.5:49704 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.155.47:443 -> 192.168.2.5:49705 version: TLS 1.2
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_00434730 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,3_2_00434730
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_00434730 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,3_2_00434730
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 0_2_005DF4D00_2_005DF4D0
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 0_2_005E34D00_2_005E34D0
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 0_2_005DF9800_2_005DF980
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 0_2_005E15A00_2_005E15A0
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 0_2_005DCE700_2_005DCE70
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 0_2_005D86C00_2_005D86C0
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 0_2_005F1FD20_2_005F1FD2
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 0_2_005DD7F00_2_005DD7F0
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_00408A403_2_00408A40
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_004393903_2_00439390
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_0040CC6D3_2_0040CC6D
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_004190403_2_00419040
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_004048603_2_00404860
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_004388603_2_00438860
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_004390103_2_00439010
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_0041E8DE3_2_0041E8DE
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_0040D8EB3_2_0040D8EB
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_004098F03_2_004098F0
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_004400A03_2_004400A0
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_0040517E3_2_0040517E
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_0042F1123_2_0042F112
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_004419203_2_00441920
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_004259E03_2_004259E0
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_0041C1F83_2_0041C1F8
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_0042E1803_2_0042E180
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_004282403_2_00428240
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_0042A2103_2_0042A210
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_0042CACE3_2_0042CACE
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_00405A803_2_00405A80
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_00402AA03_2_00402AA0
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_004212B03_2_004212B0
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_0042EB6D3_2_0042EB6D
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_0042830C3_2_0042830C
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_0040B3203_2_0040B320
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_00425B303_2_00425B30
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_004273C03_2_004273C0
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_00439BC03_2_00439BC0
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_0041A3D73_2_0041A3D7
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_004233803_2_00423380
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_0043FBA03_2_0043FBA0
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_0041ABA43_2_0041ABA4
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_004203B03_2_004203B0
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_00441C403_2_00441C40
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_004214503_2_00421450
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_0042EC593_2_0042EC59
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_00406C203_2_00406C20
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_0042D4243_2_0042D424
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_004404303_2_00440430
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_004034C03_2_004034C0
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_0043C4F03_2_0043C4F0
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_004094803_2_00409480
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_0043CC903_2_0043CC90
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_0042EC983_2_0042EC98
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_00428CA83_2_00428CA8
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_0042ECA83_2_0042ECA8
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_00408D403_2_00408D40
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_00429D4A3_2_00429D4A
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_00427D603_2_00427D60
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_0043BD603_2_0043BD60
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_0040AD703_2_0040AD70
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_0041D5003_2_0041D500
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_0042CD163_2_0042CD16
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_0042C5F03_2_0042C5F0
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_004085803_2_00408580
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_00423E403_2_00423E40
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_004066703_2_00406670
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_004386003_2_00438600
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_0041FE103_2_0041FE10
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_004416203_2_00441620
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_00403E803_2_00403E80
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_00419E933_2_00419E93
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_0042CE913_2_0042CE91
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_004257403_2_00425740
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_0042AF603_2_0042AF60
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_0041F7703_2_0041F770
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_004077303_2_00407730
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_0042C7C03_2_0042C7C0
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_00429FD03_2_00429FD0
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_0043FFE03_2_0043FFE0
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_00405FA03_2_00405FA0
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_005DF4D03_2_005DF4D0
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_005E34D03_2_005E34D0
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_005DF9803_2_005DF980
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_005E15A03_2_005E15A0
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_005DCE703_2_005DCE70
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_005D86C03_2_005D86C0
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_005F1FD23_2_005F1FD2
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_005DD7F03_2_005DD7F0
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: String function: 00408390 appears 41 times
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: String function: 005E55C0 appears 66 times
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: String function: 005E8178 appears 36 times
            Source: xLauncher.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: xLauncher.exeStatic PE information: Section: .coS ZLIB complexity 1.0003360896915585
            Source: classification engineClassification label: mal100.troj.evad.winEXE@4/0@2/1
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_00439390 CoCreateInstance,SysAllocString,CoSetProxyBlanket,SysAllocString,SysAllocString,VariantInit,VariantClear,SysFreeString,SysFreeString,SysFreeString,SysFreeString,GetVolumeInformationW,3_2_00439390
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3140:120:WilError_03
            Source: xLauncher.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\xLauncher.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: xLauncher.exeReversingLabs: Detection: 47%
            Source: C:\Users\user\Desktop\xLauncher.exeFile read: C:\Users\user\Desktop\xLauncher.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\xLauncher.exe "C:\Users\user\Desktop\xLauncher.exe"
            Source: C:\Users\user\Desktop\xLauncher.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\xLauncher.exeProcess created: C:\Users\user\Desktop\xLauncher.exe "C:\Users\user\Desktop\xLauncher.exe"
            Source: C:\Users\user\Desktop\xLauncher.exeProcess created: C:\Users\user\Desktop\xLauncher.exe "C:\Users\user\Desktop\xLauncher.exe"Jump to behavior
            Source: C:\Users\user\Desktop\xLauncher.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\xLauncher.exeSection loaded: aclayers.dllJump to behavior
            Source: C:\Users\user\Desktop\xLauncher.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\Desktop\xLauncher.exeSection loaded: sfc.dllJump to behavior
            Source: C:\Users\user\Desktop\xLauncher.exeSection loaded: sfc_os.dllJump to behavior
            Source: C:\Users\user\Desktop\xLauncher.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\xLauncher.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\xLauncher.exeSection loaded: aclayers.dllJump to behavior
            Source: C:\Users\user\Desktop\xLauncher.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\Desktop\xLauncher.exeSection loaded: sfc.dllJump to behavior
            Source: C:\Users\user\Desktop\xLauncher.exeSection loaded: sfc_os.dllJump to behavior
            Source: C:\Users\user\Desktop\xLauncher.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\xLauncher.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\xLauncher.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\xLauncher.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\xLauncher.exeSection loaded: webio.dllJump to behavior
            Source: C:\Users\user\Desktop\xLauncher.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\xLauncher.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\xLauncher.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\xLauncher.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\xLauncher.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\xLauncher.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\xLauncher.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\xLauncher.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\xLauncher.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Users\user\Desktop\xLauncher.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Users\user\Desktop\xLauncher.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\xLauncher.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\Desktop\xLauncher.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Users\user\Desktop\xLauncher.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\xLauncher.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\xLauncher.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\xLauncher.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\xLauncher.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\xLauncher.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\xLauncher.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\xLauncher.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\xLauncher.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Users\user\Desktop\xLauncher.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\Desktop\xLauncher.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\xLauncher.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\xLauncher.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\xLauncher.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: xLauncher.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_ISOLATION, GUARD_CF, TERMINAL_SERVER_AWARE
            Source: xLauncher.exeStatic PE information: section name: .00cfg
            Source: xLauncher.exeStatic PE information: section name: .coS
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 0_2_005E4BC5 push ecx; ret 0_2_005E4BD8
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_005E4BC5 push ecx; ret 3_2_005E4BD8
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 0_2_005E4CA2 GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_005E4CA2
            Source: C:\Users\user\Desktop\xLauncher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\xLauncher.exeAPI coverage: 7.5 %
            Source: C:\Users\user\Desktop\xLauncher.exe TID: 2448Thread sleep time: -60000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\xLauncher.exe TID: 2448Thread sleep time: -30000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\xLauncher.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 0_2_005EC72A FindFirstFileExW,0_2_005EC72A
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 0_2_005EC7DB FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_005EC7DB
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_005EC72A FindFirstFileExW,3_2_005EC72A
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_005EC7DB FindFirstFileExW,FindNextFileW,FindClose,FindClose,3_2_005EC7DB
            Source: xLauncher.exe, 00000003.00000002.2092435196.0000000002D8E000.00000004.00000020.00020000.00000000.sdmp, xLauncher.exe, 00000003.00000003.2090877079.0000000002D8E000.00000004.00000020.00020000.00000000.sdmp, xLauncher.exe, 00000003.00000003.2090462860.0000000002D8E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW@!
            Source: xLauncher.exe, 00000003.00000003.2090462860.0000000002D53000.00000004.00000020.00020000.00000000.sdmp, xLauncher.exe, 00000003.00000002.2092435196.0000000002D8E000.00000004.00000020.00020000.00000000.sdmp, xLauncher.exe, 00000003.00000003.2090877079.0000000002D8E000.00000004.00000020.00020000.00000000.sdmp, xLauncher.exe, 00000003.00000002.2092397115.0000000002D53000.00000004.00000020.00020000.00000000.sdmp, xLauncher.exe, 00000003.00000003.2090462860.0000000002D8E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_0043E410 LdrInitializeThunk,3_2_0043E410
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 0_2_005E5444 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_005E5444
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 0_2_005DCD10 mov eax, dword ptr fs:[00000030h]0_2_005DCD10
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 0_2_005FB18D mov edi, dword ptr fs:[00000030h]0_2_005FB18D
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 0_2_005DBD50 mov edi, dword ptr fs:[00000030h]0_2_005DBD50
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_005DBD50 mov edi, dword ptr fs:[00000030h]3_2_005DBD50
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_005DCD10 mov eax, dword ptr fs:[00000030h]3_2_005DCD10
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 0_2_005E9F90 GetProcessHeap,0_2_005E9F90
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 0_2_005E5444 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_005E5444
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 0_2_005E5438 SetUnhandledExceptionFilter,0_2_005E5438
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 0_2_005E7DCA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_005E7DCA
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 0_2_005E4AD9 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_005E4AD9
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_005E5444 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_005E5444
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_005E5438 SetUnhandledExceptionFilter,3_2_005E5438
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_005E7DCA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_005E7DCA
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 3_2_005E4AD9 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_005E4AD9

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 0_2_005FB18D GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessW,VirtualAlloc,VirtualAlloc,GetThreadContext,Wow64GetThreadContext,ReadProcessMemory,ReadProcessMemory,VirtualAllocEx,VirtualAllocEx,GetProcAddress,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,Wow64SetThreadContext,ResumeThread,ResumeThread,0_2_005FB18D
            Source: C:\Users\user\Desktop\xLauncher.exeMemory written: C:\Users\user\Desktop\xLauncher.exe base: 400000 value starts with: 4D5AJump to behavior
            Source: C:\Users\user\Desktop\xLauncher.exeProcess created: C:\Users\user\Desktop\xLauncher.exe "C:\Users\user\Desktop\xLauncher.exe"Jump to behavior
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 0_2_005E5200 cpuid 0_2_005E5200
            Source: C:\Users\user\Desktop\xLauncher.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\xLauncher.exeCode function: 0_2_005E58C5 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_005E58C5
            Source: C:\Users\user\Desktop\xLauncher.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
            Source: Yara matchFile source: 3.2.xLauncher.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.xLauncher.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000003.00000002.2092143624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2049629011.0000000002A82000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
            Source: Yara matchFile source: 3.2.xLauncher.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.xLauncher.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000003.00000002.2092143624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2049629011.0000000002A82000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
            Windows Management Instrumentation
            1
            DLL Side-Loading
            211
            Process Injection
            1
            Virtualization/Sandbox Evasion
            OS Credential Dumping1
            System Time Discovery
            Remote Services1
            Archive Collected Data
            11
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
            DLL Side-Loading
            211
            Process Injection
            LSASS Memory21
            Security Software Discovery
            Remote Desktop Protocol2
            Clipboard Data
            2
            Non-Application Layer Protocol
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
            Deobfuscate/Decode Files or Information
            Security Account Manager1
            Virtualization/Sandbox Evasion
            SMB/Windows Admin SharesData from Network Shared Drive113
            Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook3
            Obfuscated Files or Information
            NTDS1
            File and Directory Discovery
            Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            Software Packing
            LSA Secrets33
            System Information Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            DLL Side-Loading
            Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            xLauncher.exe47%ReversingLabsWin32.Trojan.Lumma
            xLauncher.exe100%Joe Sandbox ML
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            https://frogs-severz.sbs/0%Avira URL Cloudsafe
            http://crl.microx0%Avira URL Cloudsafe
            https://frogs-severz.sbs/api6C0%Avira URL Cloudsafe
            fumblingactor.cyou0%Avira URL Cloudsafe
            https://frogs-severz.sbs:443/apibcryptPrimitives.dll0%Avira URL Cloudsafe
            https://frogs-severz.sbs:443/api0%Avira URL Cloudsafe
            https://frogs-severz.sbs/apil0%Avira URL Cloudsafe
            https://frogs-severz.sbs/api0%Avira URL Cloudsafe
            https://fumblingactor.cyou:443/apiS0%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            frogs-severz.sbs
            172.67.155.47
            truefalse
              high
              fumblingactor.cyou
              unknown
              unknowntrue
                unknown
                NameMaliciousAntivirus DetectionReputation
                fumblingactor.cyoutrue
                • Avira URL Cloud: safe
                unknown
                https://frogs-severz.sbs/apitrue
                • Avira URL Cloud: safe
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                https://frogs-severz.sbs/apilxLauncher.exe, 00000003.00000002.2092497554.0000000002DE4000.00000004.00000020.00020000.00000000.sdmp, xLauncher.exe, 00000003.00000003.2090462860.0000000002DE4000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://frogs-severz.sbs:443/apibcryptPrimitives.dllxLauncher.exe, 00000003.00000003.2090462860.0000000002D53000.00000004.00000020.00020000.00000000.sdmp, xLauncher.exe, 00000003.00000003.2090784874.0000000002D64000.00000004.00000020.00020000.00000000.sdmp, xLauncher.exe, 00000003.00000002.2092397115.0000000002D65000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://frogs-severz.sbs/xLauncher.exe, 00000003.00000002.2092497554.0000000002DE4000.00000004.00000020.00020000.00000000.sdmp, xLauncher.exe, 00000003.00000003.2090462860.0000000002DE4000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://frogs-severz.sbs/api6CxLauncher.exe, 00000003.00000003.2090784874.0000000002D80000.00000004.00000020.00020000.00000000.sdmp, xLauncher.exe, 00000003.00000002.2092435196.0000000002D80000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://crl.microxxLauncher.exe, 00000003.00000003.2090719242.0000000002DD6000.00000004.00000020.00020000.00000000.sdmp, xLauncher.exe, 00000003.00000003.2090462860.0000000002D8E000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://fumblingactor.cyou:443/apiSxLauncher.exe, 00000003.00000003.2090462860.0000000002D53000.00000004.00000020.00020000.00000000.sdmp, xLauncher.exe, 00000003.00000003.2090784874.0000000002D64000.00000004.00000020.00020000.00000000.sdmp, xLauncher.exe, 00000003.00000002.2092397115.0000000002D65000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://frogs-severz.sbs:443/apixLauncher.exe, 00000003.00000003.2090462860.0000000002D53000.00000004.00000020.00020000.00000000.sdmp, xLauncher.exe, 00000003.00000003.2090784874.0000000002D64000.00000004.00000020.00020000.00000000.sdmp, xLauncher.exe, 00000003.00000002.2092397115.0000000002D65000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                172.67.155.47
                frogs-severz.sbsUnited States
                13335CLOUDFLARENETUSfalse
                Joe Sandbox version:41.0.0 Charoite
                Analysis ID:1561476
                Start date and time:2024-11-23 14:26:53 +01:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 2m 42s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:4
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:xLauncher.exe
                Detection:MAL
                Classification:mal100.troj.evad.winEXE@4/0@2/1
                EGA Information:
                • Successful, ratio: 100%
                HCA Information:
                • Successful, ratio: 76%
                • Number of executed functions: 26
                • Number of non-executed functions: 106
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Stop behavior analysis, all processes terminated
                • Exclude process from analysis (whitelisted): dllhost.exe
                • Not all processes where analyzed, report is missing behavior information
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.
                • VT rate limit hit for: xLauncher.exe
                TimeTypeDescription
                08:27:45API Interceptor3x Sleep call for process: xLauncher.exe modified
                No context
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                frogs-severz.sbsinjector V2.5.exeGet hashmaliciousLummaC StealerBrowse
                • 104.21.88.250
                SystemCoreHelper.dllGet hashmaliciousLummaC StealerBrowse
                • 104.21.88.250
                b.exeGet hashmaliciousLummaC StealerBrowse
                • 104.21.88.250
                file.exeGet hashmaliciousLummaC StealerBrowse
                • 193.143.1.19
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                CLOUDFLARENETUSLoader.exeGet hashmaliciousLummaC StealerBrowse
                • 172.67.198.61
                Aura.exeGet hashmaliciousUnknownBrowse
                • 104.21.33.116
                injector V2.5.exeGet hashmaliciousLummaC StealerBrowse
                • 104.21.88.250
                injector V2.4.exeGet hashmaliciousLummaC StealerBrowse
                • 104.21.44.93
                injector V2.4.exeGet hashmaliciousLummaC StealerBrowse
                • 104.21.33.116
                loader.exeGet hashmaliciousLummaC StealerBrowse
                • 172.67.162.84
                file.exeGet hashmaliciousLummaC StealerBrowse
                • 104.21.33.116
                file.exeGet hashmaliciousAmadey, Clipboard Hijacker, Credential Flusher, Cryptbot, LummaC Stealer, StealcBrowse
                • 104.21.33.116
                psol.txt.ps1Get hashmaliciousLummaCBrowse
                • 172.66.0.235
                SystemCoreHelper.dllGet hashmaliciousLummaC StealerBrowse
                • 104.21.88.250
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                a0e9f5d64349fb13191bc781f81f42e1Loader.exeGet hashmaliciousLummaC StealerBrowse
                • 172.67.155.47
                Aura.exeGet hashmaliciousUnknownBrowse
                • 172.67.155.47
                injector V2.5.exeGet hashmaliciousLummaC StealerBrowse
                • 172.67.155.47
                injector V2.4.exeGet hashmaliciousLummaC StealerBrowse
                • 172.67.155.47
                injector V2.4.exeGet hashmaliciousLummaC StealerBrowse
                • 172.67.155.47
                loader.exeGet hashmaliciousLummaC StealerBrowse
                • 172.67.155.47
                file.exeGet hashmaliciousLummaC StealerBrowse
                • 172.67.155.47
                file.exeGet hashmaliciousAmadey, Clipboard Hijacker, Credential Flusher, Cryptbot, LummaC Stealer, StealcBrowse
                • 172.67.155.47
                psol.txt.ps1Get hashmaliciousLummaCBrowse
                • 172.67.155.47
                SystemCoreHelper.dllGet hashmaliciousLummaC StealerBrowse
                • 172.67.155.47
                No context
                No created / dropped files found
                File type:PE32 executable (console) Intel 80386, for MS Windows
                Entropy (8bit):7.726569185399569
                TrID:
                • Win32 Executable (generic) a (10002005/4) 99.96%
                • Generic Win/DOS Executable (2004/3) 0.02%
                • DOS Executable Generic (2002/1) 0.02%
                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                File name:xLauncher.exe
                File size:493'568 bytes
                MD5:ceaca4a19229c3283007e714466f51f8
                SHA1:e70dfeeea1cdfeae4da1e97d602867436062550d
                SHA256:e6e0f35cd360401b1973626cb35b635e86bd272b115852f07e434ac3fea0977a
                SHA512:950f5c81675af1deb78c7bdff6228d99036e14872e352176094967e721413ee50fcde9e4acd0843890b3152602830ba7f1bd5ebe81587c1391e8dfde0581f279
                SSDEEP:12288:yJB+nneDgkXFEIORLj5ZNS6HvkGRFKU84BmnYkVs:WAoR25Rv5Z4ivkwM0mYkVs
                TLSH:1EA4F19E77A3E0B3D162183541E89BB5466E7E700F20A4EF57601FB52F36AC28532E53
                File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L...t.@g............................pX............@.......................................@.................................T...<..
                Icon Hash:00928e8e8686b000
                Entrypoint:0x415870
                Entrypoint Section:.text
                Digitally signed:false
                Imagebase:0x400000
                Subsystem:windows cui
                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_ISOLATION, GUARD_CF, TERMINAL_SERVER_AWARE
                Time Stamp:0x6740AA74 [Fri Nov 22 15:59:48 2024 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:6
                OS Version Minor:0
                File Version Major:6
                File Version Minor:0
                Subsystem Version Major:6
                Subsystem Version Minor:0
                Import Hash:887797384d81c493a9d8ee55dad3b2e1
                Instruction
                call 00007FE1E8C13ADAh
                jmp 00007FE1E8C1393Dh
                mov ecx, dword ptr [0042B5F0h]
                push esi
                push edi
                mov edi, BB40E64Eh
                mov esi, FFFF0000h
                cmp ecx, edi
                je 00007FE1E8C13AD6h
                test esi, ecx
                jne 00007FE1E8C13AF8h
                call 00007FE1E8C13B01h
                mov ecx, eax
                cmp ecx, edi
                jne 00007FE1E8C13AD9h
                mov ecx, BB40E64Fh
                jmp 00007FE1E8C13AE0h
                test esi, ecx
                jne 00007FE1E8C13ADCh
                or eax, 00004711h
                shl eax, 10h
                or ecx, eax
                mov dword ptr [0042B5F0h], ecx
                not ecx
                pop edi
                mov dword ptr [0042B5ECh], ecx
                pop esi
                ret
                push ebp
                mov ebp, esp
                sub esp, 14h
                and dword ptr [ebp-0Ch], 00000000h
                lea eax, dword ptr [ebp-0Ch]
                and dword ptr [ebp-08h], 00000000h
                push eax
                call dword ptr [0042946Ch]
                mov eax, dword ptr [ebp-08h]
                xor eax, dword ptr [ebp-0Ch]
                mov dword ptr [ebp-04h], eax
                call dword ptr [00429430h]
                xor dword ptr [ebp-04h], eax
                call dword ptr [0042942Ch]
                xor dword ptr [ebp-04h], eax
                lea eax, dword ptr [ebp-14h]
                push eax
                call dword ptr [004294A8h]
                mov eax, dword ptr [ebp-10h]
                lea ecx, dword ptr [ebp-04h]
                xor eax, dword ptr [ebp-14h]
                xor eax, dword ptr [ebp-04h]
                xor eax, ecx
                leave
                ret
                mov eax, 00004000h
                ret
                push 0042C970h
                call dword ptr [00429488h]
                ret
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                mov al, 01h
                ret
                push 00030000h
                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IMPORT0x292540x3c.rdata
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x2f0000x1400.reloc
                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x237c00xc0.rdata
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x293c80x138.rdata
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x10000x2169a0x2180002aff72e65eaf052f891170e28598361False0.550606343283582data6.737058354414408IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                .rdata0x230000x72640x740091e5fdecc510d2c4e72b1b50db3c2501False0.40641837284482757data4.769873714467996IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .data0x2b0000x20680x1000f9b2b4b1f63578440eedd0ace5ac94f1False0.484375OpenPGP Secret Key5.090094544660231IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .00cfg0x2e0000x80x200160c8b290b62e5e566d05ce3bec76423False0.03125data0.06116285224115448IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .reloc0x2f0000x14000x140029fb367912ce622b91120c5cffd84495False0.81953125data6.557860970753822IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                .coS0x310000x4d0000x4d000c440ae33a4d5782675832d0fc99971beFalse1.0003360896915585data7.999414762496168IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                DLLImport
                KERNEL32.dllCloseHandle, CompareStringW, CreateFileA, CreateFileW, CreateThread, DecodePointer, DeleteCriticalSection, EncodePointer, EnterCriticalSection, ExitProcess, ExitThread, FindClose, FindFirstFileExW, FindNextFileW, FlushFileBuffers, FreeEnvironmentStringsW, FreeLibrary, FreeLibraryAndExitThread, GetACP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetConsoleMode, GetConsoleOutputCP, GetCurrentProcess, GetCurrentProcessId, GetCurrentThreadId, GetEnvironmentStringsW, GetExitCodeThread, GetFileSize, GetFileType, GetLastError, GetModuleFileNameW, GetModuleHandleExW, GetModuleHandleW, GetOEMCP, GetProcAddress, GetProcessHeap, GetStartupInfoW, GetStdHandle, GetStringTypeW, GetSystemTimeAsFileTime, HeapAlloc, HeapFree, HeapReAlloc, HeapSize, InitializeCriticalSectionAndSpinCount, InitializeCriticalSectionEx, InitializeSListHead, IsDebuggerPresent, IsProcessorFeaturePresent, IsValidCodePage, LCMapStringW, LeaveCriticalSection, LoadLibraryExW, MultiByteToWideChar, QueryPerformanceCounter, RaiseException, ReadFile, RtlUnwind, SetEnvironmentVariableW, SetFilePointerEx, SetLastError, SetStdHandle, SetUnhandledExceptionFilter, TerminateProcess, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, UnhandledExceptionFilter, WaitForSingleObjectEx, WideCharToMultiByte, WriteConsoleW, WriteFile
                GDI32.dllCreateEllipticRgn
                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                2024-11-23T14:27:47.794213+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549704172.67.155.47443TCP
                2024-11-23T14:27:48.490580+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.549704172.67.155.47443TCP
                2024-11-23T14:27:48.490580+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.549704172.67.155.47443TCP
                2024-11-23T14:27:49.770829+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549705172.67.155.47443TCP
                TimestampSource PortDest PortSource IPDest IP
                Nov 23, 2024 14:27:46.470099926 CET49704443192.168.2.5172.67.155.47
                Nov 23, 2024 14:27:46.470143080 CET44349704172.67.155.47192.168.2.5
                Nov 23, 2024 14:27:46.470285892 CET49704443192.168.2.5172.67.155.47
                Nov 23, 2024 14:27:46.471414089 CET49704443192.168.2.5172.67.155.47
                Nov 23, 2024 14:27:46.471436024 CET44349704172.67.155.47192.168.2.5
                Nov 23, 2024 14:27:47.794097900 CET44349704172.67.155.47192.168.2.5
                Nov 23, 2024 14:27:47.794213057 CET49704443192.168.2.5172.67.155.47
                Nov 23, 2024 14:27:47.797456026 CET49704443192.168.2.5172.67.155.47
                Nov 23, 2024 14:27:47.797468901 CET44349704172.67.155.47192.168.2.5
                Nov 23, 2024 14:27:47.797707081 CET44349704172.67.155.47192.168.2.5
                Nov 23, 2024 14:27:47.838097095 CET49704443192.168.2.5172.67.155.47
                Nov 23, 2024 14:27:47.838855028 CET49704443192.168.2.5172.67.155.47
                Nov 23, 2024 14:27:47.838874102 CET49704443192.168.2.5172.67.155.47
                Nov 23, 2024 14:27:47.838989973 CET44349704172.67.155.47192.168.2.5
                Nov 23, 2024 14:27:48.490570068 CET44349704172.67.155.47192.168.2.5
                Nov 23, 2024 14:27:48.490655899 CET44349704172.67.155.47192.168.2.5
                Nov 23, 2024 14:27:48.490704060 CET49704443192.168.2.5172.67.155.47
                Nov 23, 2024 14:27:48.492496014 CET49704443192.168.2.5172.67.155.47
                Nov 23, 2024 14:27:48.492513895 CET44349704172.67.155.47192.168.2.5
                Nov 23, 2024 14:27:48.492542982 CET49704443192.168.2.5172.67.155.47
                Nov 23, 2024 14:27:48.492552042 CET44349704172.67.155.47192.168.2.5
                Nov 23, 2024 14:27:48.548835039 CET49705443192.168.2.5172.67.155.47
                Nov 23, 2024 14:27:48.548882008 CET44349705172.67.155.47192.168.2.5
                Nov 23, 2024 14:27:48.548943996 CET49705443192.168.2.5172.67.155.47
                Nov 23, 2024 14:27:48.549309015 CET49705443192.168.2.5172.67.155.47
                Nov 23, 2024 14:27:48.549328089 CET44349705172.67.155.47192.168.2.5
                Nov 23, 2024 14:27:49.770704031 CET44349705172.67.155.47192.168.2.5
                Nov 23, 2024 14:27:49.770828962 CET49705443192.168.2.5172.67.155.47
                Nov 23, 2024 14:27:49.772712946 CET49705443192.168.2.5172.67.155.47
                Nov 23, 2024 14:27:49.772769928 CET44349705172.67.155.47192.168.2.5
                Nov 23, 2024 14:27:49.772845030 CET49705443192.168.2.5172.67.155.47
                TimestampSource PortDest PortSource IPDest IP
                Nov 23, 2024 14:27:45.786545038 CET6208153192.168.2.51.1.1.1
                Nov 23, 2024 14:27:46.106456041 CET53620811.1.1.1192.168.2.5
                Nov 23, 2024 14:27:46.118634939 CET5432553192.168.2.51.1.1.1
                Nov 23, 2024 14:27:46.462272882 CET53543251.1.1.1192.168.2.5
                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                Nov 23, 2024 14:27:45.786545038 CET192.168.2.51.1.1.10xa9ebStandard query (0)fumblingactor.cyouA (IP address)IN (0x0001)false
                Nov 23, 2024 14:27:46.118634939 CET192.168.2.51.1.1.10x9ed9Standard query (0)frogs-severz.sbsA (IP address)IN (0x0001)false
                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                Nov 23, 2024 14:27:46.106456041 CET1.1.1.1192.168.2.50xa9ebName error (3)fumblingactor.cyounonenoneA (IP address)IN (0x0001)false
                Nov 23, 2024 14:27:46.462272882 CET1.1.1.1192.168.2.50x9ed9No error (0)frogs-severz.sbs172.67.155.47A (IP address)IN (0x0001)false
                Nov 23, 2024 14:27:46.462272882 CET1.1.1.1192.168.2.50x9ed9No error (0)frogs-severz.sbs104.21.88.250A (IP address)IN (0x0001)false
                • frogs-severz.sbs
                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                0192.168.2.549704172.67.155.474435660C:\Users\user\Desktop\xLauncher.exe
                TimestampBytes transferredDirectionData
                2024-11-23 13:27:47 UTC263OUTPOST /api HTTP/1.1
                Connection: Keep-Alive
                Content-Type: application/x-www-form-urlencoded
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                Content-Length: 8
                Host: frogs-severz.sbs
                2024-11-23 13:27:47 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                Data Ascii: act=life
                2024-11-23 13:27:48 UTC1005INHTTP/1.1 200 OK
                Date: Sat, 23 Nov 2024 13:27:48 GMT
                Content-Type: text/html; charset=UTF-8
                Transfer-Encoding: chunked
                Connection: close
                Set-Cookie: PHPSESSID=h67dedtnu89gq9g3fjmim45ec3; expires=Wed, 19-Mar-2025 07:14:27 GMT; Max-Age=9999999; path=/
                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                Cache-Control: no-store, no-cache, must-revalidate
                Pragma: no-cache
                cf-cache-status: DYNAMIC
                vary: accept-encoding
                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2F9aQO1yqpagW0UDVj0z%2BMEyWk7SA3756LKEp6OPotfwtEI8o88RxQ4Q9Pf7d7X0hmkKCalgVNgKZlSAar1ir4M5kvQMOW8uKkwAuftlWQXfR4D49I3PMUgMRSpD4TJSzV5jK"}],"group":"cf-nel","max_age":604800}
                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                Server: cloudflare
                CF-RAY: 8e717fad7e9042e0-EWR
                alt-svc: h3=":443"; ma=86400
                server-timing: cfL4;desc="?proto=TCP&rtt=1902&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2839&recv_bytes=907&delivery_rate=1517671&cwnd=252&unsent_bytes=0&cid=7b9443a56da03884&ts=709&x=0"
                2024-11-23 13:27:48 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                Data Ascii: 2ok
                2024-11-23 13:27:48 UTC5INData Raw: 30 0d 0a 0d 0a
                Data Ascii: 0


                Click to jump to process

                Click to jump to process

                Click to jump to process

                Target ID:0
                Start time:08:27:43
                Start date:23/11/2024
                Path:C:\Users\user\Desktop\xLauncher.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\Desktop\xLauncher.exe"
                Imagebase:0x5d0000
                File size:493'568 bytes
                MD5 hash:CEACA4A19229C3283007E714466F51F8
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_LummaCStealer_4, Description: Yara detected LummaC Stealer, Source: 00000000.00000002.2049629011.0000000002A82000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                Reputation:low
                Has exited:true

                Target ID:1
                Start time:08:27:44
                Start date:23/11/2024
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff6d64d0000
                File size:862'208 bytes
                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:3
                Start time:08:27:44
                Start date:23/11/2024
                Path:C:\Users\user\Desktop\xLauncher.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\Desktop\xLauncher.exe"
                Imagebase:0x5d0000
                File size:493'568 bytes
                MD5 hash:CEACA4A19229C3283007E714466F51F8
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_LummaCStealer_4, Description: Yara detected LummaC Stealer, Source: 00000003.00000002.2092143624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                Reputation:low
                Has exited:true

                Reset < >

                  Execution Graph

                  Execution Coverage:4.1%
                  Dynamic/Decrypted Code Coverage:100%
                  Signature Coverage:7.5%
                  Total number of Nodes:1900
                  Total number of Limit Nodes:22
                  execution_graph 10356 5dbe70 10357 5dbe9b 10356->10357 10358 5e6ed5 21 API calls 10357->10358 10359 5dbeaf 10358->10359 11281 5ea5f0 11282 5ea5fc __FrameHandler3::FrameUnwindToState 11281->11282 11293 5e8161 EnterCriticalSection 11282->11293 11284 5ea603 11294 5ed839 11284->11294 11287 5ea621 11313 5ea647 11287->11313 11292 5ea732 2 API calls 11292->11287 11293->11284 11295 5ed845 __FrameHandler3::FrameUnwindToState 11294->11295 11296 5ed84e 11295->11296 11297 5ed86f 11295->11297 11298 5eb757 __dosmaperr 14 API calls 11296->11298 11316 5e8161 EnterCriticalSection 11297->11316 11300 5ed853 11298->11300 11302 5e7d69 __strnicoll 48 API calls 11300->11302 11301 5ed87b 11306 5ed8a7 11301->11306 11317 5ed789 11301->11317 11304 5ea612 11302->11304 11304->11287 11307 5ea67c GetStartupInfoW 11304->11307 11324 5ed8ce 11306->11324 11308 5ea699 11307->11308 11310 5ea61c 11307->11310 11309 5ed839 49 API calls 11308->11309 11308->11310 11311 5ea6c1 11309->11311 11310->11292 11311->11310 11312 5ea6f1 GetFileType 11311->11312 11312->11311 11328 5e8178 LeaveCriticalSection 11313->11328 11315 5ea632 11316->11301 11318 5eb807 _unexpected 14 API calls 11317->11318 11321 5ed79b 11318->11321 11319 5ed7a8 11320 5eb0cb __freea 14 API calls 11319->11320 11323 5ed7fd 11320->11323 11321->11319 11322 5e9c11 6 API calls 11321->11322 11322->11321 11323->11301 11327 5e8178 LeaveCriticalSection 11324->11327 11326 5ed8d5 11326->11304 11327->11326 11328->11315 11338 5e6bf0 11339 5eb4a7 ___scrt_uninitialize_crt 77 API calls 11338->11339 11340 5e6bf8 11339->11340 11348 5eb864 11340->11348 11342 5e6bfd 11358 5eb90f 11342->11358 11345 5e6c27 11346 5eb0cb __freea 14 API calls 11345->11346 11347 5e6c32 11346->11347 11349 5eb870 __FrameHandler3::FrameUnwindToState 11348->11349 11362 5e8161 EnterCriticalSection 11349->11362 11351 5eb8e7 11369 5eb906 11351->11369 11353 5eb87b 11353->11351 11354 5eb8bb DeleteCriticalSection 11353->11354 11363 5eed63 11353->11363 11357 5eb0cb __freea 14 API calls 11354->11357 11357->11353 11359 5e6c0c DeleteCriticalSection 11358->11359 11360 5eb926 11358->11360 11359->11342 11359->11345 11360->11359 11361 5eb0cb __freea 14 API calls 11360->11361 11361->11359 11362->11353 11364 5eed76 __strnicoll 11363->11364 11372 5eee21 11364->11372 11366 5eed82 11367 5e7fd7 __strnicoll 48 API calls 11366->11367 11368 5eed8e 11367->11368 11368->11353 11444 5e8178 LeaveCriticalSection 11369->11444 11371 5eb8f3 11371->11342 11373 5eee2d __FrameHandler3::FrameUnwindToState 11372->11373 11374 5eee37 11373->11374 11376 5eee5a 11373->11376 11375 5e7f12 __strnicoll 29 API calls 11374->11375 11382 5eee52 11375->11382 11376->11382 11383 5e6aef EnterCriticalSection 11376->11383 11378 5eee78 11384 5eed93 11378->11384 11380 5eee85 11398 5eeeb0 11380->11398 11382->11366 11383->11378 11385 5eedc3 11384->11385 11386 5eeda0 11384->11386 11388 5eedbb 11385->11388 11389 5eb515 ___scrt_uninitialize_crt 73 API calls 11385->11389 11387 5e7f12 __strnicoll 29 API calls 11386->11387 11387->11388 11388->11380 11390 5eeddb 11389->11390 11391 5eb90f 14 API calls 11390->11391 11392 5eede3 11391->11392 11393 5ed936 ___scrt_uninitialize_crt 48 API calls 11392->11393 11394 5eedef 11393->11394 11401 5f001b 11394->11401 11397 5eb0cb __freea 14 API calls 11397->11388 11443 5e6b03 LeaveCriticalSection 11398->11443 11400 5eeeb6 11400->11382 11402 5f0044 11401->11402 11407 5eedf6 11401->11407 11403 5f0093 11402->11403 11405 5f006b 11402->11405 11404 5e7f12 __strnicoll 29 API calls 11403->11404 11404->11407 11408 5f00be 11405->11408 11407->11388 11407->11397 11409 5f00ca __FrameHandler3::FrameUnwindToState 11408->11409 11416 5ed8d7 EnterCriticalSection 11409->11416 11411 5f00d8 11413 5f0109 11411->11413 11417 5eff7b 11411->11417 11430 5f0143 11413->11430 11416->11411 11418 5ed68e ___scrt_uninitialize_crt 48 API calls 11417->11418 11420 5eff8b 11418->11420 11419 5eff91 11433 5ed6f8 11419->11433 11420->11419 11422 5ed68e ___scrt_uninitialize_crt 48 API calls 11420->11422 11429 5effc3 11420->11429 11424 5effba 11422->11424 11423 5ed68e ___scrt_uninitialize_crt 48 API calls 11425 5effcf CloseHandle 11423->11425 11427 5ed68e ___scrt_uninitialize_crt 48 API calls 11424->11427 11425->11419 11428 5effdb GetLastError 11425->11428 11426 5effe9 ___scrt_uninitialize_crt 11426->11413 11427->11429 11428->11419 11429->11419 11429->11423 11442 5ed8fa LeaveCriticalSection 11430->11442 11432 5f012c 11432->11407 11434 5ed76e 11433->11434 11435 5ed707 11433->11435 11436 5eb757 __dosmaperr 14 API calls 11434->11436 11435->11434 11441 5ed731 11435->11441 11437 5ed773 11436->11437 11438 5eb76a __dosmaperr 14 API calls 11437->11438 11439 5ed75e 11438->11439 11439->11426 11440 5ed758 SetStdHandle 11440->11439 11441->11439 11441->11440 11442->11432 11443->11400 11444->11371 8844 5e56e2 8845 5e56ee __FrameHandler3::FrameUnwindToState 8844->8845 8870 5e508f 8845->8870 8847 5e56f5 8848 5e584e 8847->8848 8856 5e571f ___scrt_is_nonwritable_in_current_image _unexpected ___scrt_release_startup_lock 8847->8856 8911 5e5444 IsProcessorFeaturePresent 8848->8911 8850 5e5855 8851 5e585b 8850->8851 8915 5e6ed5 8850->8915 8918 5e6eeb 8851->8918 8855 5e573e 8856->8855 8859 5e57bf 8856->8859 8894 5e6f1f 8856->8894 8881 5e7a56 8859->8881 8860 5e57c5 8885 5dcd90 8860->8885 8865 5e57ea 8866 5e57f3 8865->8866 8902 5e6f01 8865->8902 8905 5e50c8 8866->8905 8871 5e5098 8870->8871 8921 5e5200 IsProcessorFeaturePresent 8871->8921 8875 5e50a9 8876 5e50ad 8875->8876 8931 5e6a60 8875->8931 8876->8847 8879 5e50c4 8879->8847 8882 5e7a5f 8881->8882 8883 5e7a64 8881->8883 9003 5e7b7f 8882->9003 8883->8860 9751 5dce30 8885->9751 8892 5e4241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 8893 5dce24 8892->8893 8900 5e53ec GetModuleHandleW 8893->8900 8895 5e6f35 __FrameHandler3::FrameUnwindToState _unexpected 8894->8895 8895->8859 8896 5ea00a _unexpected 48 API calls 8895->8896 8899 5e847c 8896->8899 8897 5e835d CallUnexpected 48 API calls 8898 5e84a6 8897->8898 8899->8897 8901 5e53f8 8900->8901 8901->8850 8901->8865 10138 5e7020 8902->10138 8906 5e50d4 8905->8906 8907 5e50ea 8906->8907 10211 5e6a72 8906->10211 8907->8855 8909 5e50e2 8910 5e60ca ___scrt_uninitialize_crt 7 API calls 8909->8910 8910->8907 8912 5e545a _unexpected std::bad_exception::bad_exception 8911->8912 8913 5e5505 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 8912->8913 8914 5e5550 _unexpected 8913->8914 8914->8850 8916 5e7020 _unexpected 21 API calls 8915->8916 8917 5e6ee6 8916->8917 8917->8851 8919 5e7020 _unexpected 21 API calls 8918->8919 8920 5e5863 8919->8920 8922 5e50a4 8921->8922 8923 5e60ab 8922->8923 8940 5e9706 8923->8940 8927 5e60c7 8927->8875 8928 5e60bc 8928->8927 8954 5e9742 8928->8954 8930 5e60b4 8930->8875 8994 5eb105 8931->8994 8934 5e60ca 8935 5e60dd 8934->8935 8936 5e60d3 8934->8936 8935->8876 8937 5e8811 ___vcrt_uninitialize_ptd 6 API calls 8936->8937 8938 5e60d8 8937->8938 8939 5e9742 ___vcrt_uninitialize_locks DeleteCriticalSection 8938->8939 8939->8935 8941 5e970f 8940->8941 8943 5e9738 8941->8943 8944 5e60b0 8941->8944 8958 5edc17 8941->8958 8945 5e9742 ___vcrt_uninitialize_locks DeleteCriticalSection 8943->8945 8944->8930 8946 5e87de 8944->8946 8945->8944 8975 5edb28 8946->8975 8951 5e880e 8951->8928 8953 5e87f3 8953->8928 8955 5e976c 8954->8955 8956 5e974d 8954->8956 8955->8930 8957 5e9757 DeleteCriticalSection 8956->8957 8957->8955 8957->8957 8963 5edca9 8958->8963 8961 5edc4f InitializeCriticalSectionAndSpinCount 8962 5edc3a 8961->8962 8962->8941 8964 5edcca 8963->8964 8965 5edc31 8963->8965 8964->8965 8966 5edd32 GetProcAddress 8964->8966 8968 5edd23 8964->8968 8970 5edc5e LoadLibraryExW 8964->8970 8965->8961 8965->8962 8966->8965 8968->8966 8969 5edd2b FreeLibrary 8968->8969 8969->8966 8971 5edca5 8970->8971 8972 5edc75 GetLastError 8970->8972 8971->8964 8972->8971 8973 5edc80 ___vcrt_FlsFree 8972->8973 8973->8971 8974 5edc96 LoadLibraryExW 8973->8974 8974->8964 8976 5edca9 ___vcrt_FlsFree 5 API calls 8975->8976 8977 5edb42 8976->8977 8978 5edb5b TlsAlloc 8977->8978 8979 5e87e8 8977->8979 8979->8953 8980 5edbd9 8979->8980 8981 5edca9 ___vcrt_FlsFree 5 API calls 8980->8981 8982 5edbf3 8981->8982 8983 5edc0e TlsSetValue 8982->8983 8984 5e8801 8982->8984 8983->8984 8984->8951 8985 5e8811 8984->8985 8986 5e881b 8985->8986 8987 5e8821 8985->8987 8989 5edb63 8986->8989 8987->8953 8990 5edca9 ___vcrt_FlsFree 5 API calls 8989->8990 8991 5edb7d 8990->8991 8992 5edb89 8991->8992 8993 5edb95 TlsFree 8991->8993 8992->8987 8993->8992 8995 5eb115 8994->8995 8996 5e50b6 8994->8996 8995->8996 8998 5ea732 8995->8998 8996->8879 8996->8934 8999 5ea739 8998->8999 9000 5ea77c GetStdHandle 8999->9000 9001 5ea7de 8999->9001 9002 5ea78f GetFileType 8999->9002 9000->8999 9001->8995 9002->8999 9004 5e7b9e 9003->9004 9005 5e7b88 9003->9005 9004->8883 9005->9004 9009 5e7ac0 9005->9009 9007 5e7b95 9007->9004 9026 5e7c8d 9007->9026 9010 5e7acc 9009->9010 9011 5e7ac9 9009->9011 9035 5ea880 9010->9035 9011->9007 9016 5e7add 9018 5eb0cb __freea 14 API calls 9016->9018 9017 5e7ae9 9062 5e7bab 9017->9062 9020 5e7ae3 9018->9020 9020->9007 9022 5eb0cb __freea 14 API calls 9023 5e7b0d 9022->9023 9024 5eb0cb __freea 14 API calls 9023->9024 9025 5e7b13 9024->9025 9025->9007 9027 5e7cfe 9026->9027 9030 5e7c9c 9026->9030 9027->9004 9028 5ed131 WideCharToMultiByte ___scrt_uninitialize_crt 9028->9030 9029 5eb807 _unexpected 14 API calls 9029->9030 9030->9027 9030->9028 9030->9029 9032 5e7d02 9030->9032 9034 5eb0cb __freea 14 API calls 9030->9034 9470 5ed304 9030->9470 9031 5eb0cb __freea 14 API calls 9031->9027 9032->9031 9034->9030 9036 5ea889 9035->9036 9037 5e7ad2 9035->9037 9084 5ea0c5 9036->9084 9041 5ed22d GetEnvironmentStringsW 9037->9041 9042 5e7ad7 9041->9042 9043 5ed245 9041->9043 9042->9016 9042->9017 9044 5ed131 ___scrt_uninitialize_crt WideCharToMultiByte 9043->9044 9045 5ed262 9044->9045 9046 5ed26c FreeEnvironmentStringsW 9045->9046 9047 5ed277 9045->9047 9046->9042 9048 5ebc45 __strnicoll 15 API calls 9047->9048 9049 5ed27e 9048->9049 9050 5ed286 9049->9050 9051 5ed297 9049->9051 9052 5eb0cb __freea 14 API calls 9050->9052 9053 5ed131 ___scrt_uninitialize_crt WideCharToMultiByte 9051->9053 9054 5ed28b FreeEnvironmentStringsW 9052->9054 9055 5ed2a7 9053->9055 9054->9042 9056 5ed2ae 9055->9056 9057 5ed2b6 9055->9057 9058 5eb0cb __freea 14 API calls 9056->9058 9059 5eb0cb __freea 14 API calls 9057->9059 9060 5ed2b4 FreeEnvironmentStringsW 9058->9060 9059->9060 9060->9042 9063 5e7bc0 9062->9063 9064 5eb807 _unexpected 14 API calls 9063->9064 9065 5e7be7 9064->9065 9066 5e7bef 9065->9066 9075 5e7bf9 9065->9075 9067 5eb0cb __freea 14 API calls 9066->9067 9083 5e7af0 9067->9083 9068 5e7c56 9069 5eb0cb __freea 14 API calls 9068->9069 9069->9083 9070 5eb807 _unexpected 14 API calls 9070->9075 9071 5e7c65 9460 5e7b50 9071->9460 9075->9068 9075->9070 9075->9071 9077 5e7c80 9075->9077 9079 5eb0cb __freea 14 API calls 9075->9079 9451 5e96ac 9075->9451 9076 5eb0cb __freea 14 API calls 9078 5e7c72 9076->9078 9466 5e7d96 IsProcessorFeaturePresent 9077->9466 9081 5eb0cb __freea 14 API calls 9078->9081 9079->9075 9081->9083 9082 5e7c8c 9083->9022 9085 5ea0d6 9084->9085 9086 5ea0d0 9084->9086 9087 5e9bcf _unexpected 6 API calls 9085->9087 9106 5ea0dc 9085->9106 9088 5e9b90 _unexpected 6 API calls 9086->9088 9089 5ea0f0 9087->9089 9088->9085 9090 5eb807 _unexpected 14 API calls 9089->9090 9089->9106 9092 5ea100 9090->9092 9094 5ea11d 9092->9094 9095 5ea108 9092->9095 9097 5e9bcf _unexpected 6 API calls 9094->9097 9096 5e9bcf _unexpected 6 API calls 9095->9096 9098 5ea114 9096->9098 9099 5ea129 9097->9099 9103 5eb0cb __freea 14 API calls 9098->9103 9100 5ea13c 9099->9100 9101 5ea12d 9099->9101 9102 5ea31c _unexpected 14 API calls 9100->9102 9104 5e9bcf _unexpected 6 API calls 9101->9104 9105 5ea147 9102->9105 9103->9106 9104->9098 9107 5eb0cb __freea 14 API calls 9105->9107 9108 5ea0e1 9106->9108 9131 5e835d 9106->9131 9107->9108 9109 5eacc3 9108->9109 9110 5eaced 9109->9110 9275 5eab4f 9110->9275 9113 5ead06 9113->9037 9116 5ead1f 9118 5eb0cb __freea 14 API calls 9116->9118 9117 5ead2d 9289 5ea94a 9117->9289 9118->9113 9121 5ead65 9122 5eb757 __dosmaperr 14 API calls 9121->9122 9124 5ead6a 9122->9124 9123 5eadac 9126 5eadf5 9123->9126 9300 5eb07e 9123->9300 9127 5eb0cb __freea 14 API calls 9124->9127 9125 5ead80 9125->9123 9128 5eb0cb __freea 14 API calls 9125->9128 9130 5eb0cb __freea 14 API calls 9126->9130 9127->9113 9128->9123 9130->9113 9140 5eb1bc 9131->9140 9134 5e8377 IsProcessorFeaturePresent 9138 5e8362 9134->9138 9135 5e6eeb _unexpected 21 API calls 9135->9138 9138->9131 9138->9134 9138->9135 9139 5e8839 9138->9139 9143 5eb1e3 9138->9143 9170 5e7dca 9138->9170 9176 5e883a 9138->9176 9190 5eb43f 9140->9190 9144 5eb1ef __FrameHandler3::FrameUnwindToState 9143->9144 9145 5ea15b __dosmaperr 14 API calls 9144->9145 9146 5eb23f 9144->9146 9147 5eb251 _unexpected 9144->9147 9152 5eb220 _unexpected 9144->9152 9145->9152 9148 5eb757 __dosmaperr 14 API calls 9146->9148 9149 5eb287 _unexpected 9147->9149 9204 5e8161 EnterCriticalSection 9147->9204 9150 5eb244 9148->9150 9156 5eb3c1 9149->9156 9158 5eb2c4 9149->9158 9167 5eb2f2 9149->9167 9201 5e7d69 9150->9201 9152->9146 9152->9147 9154 5eb229 9152->9154 9154->9138 9162 5eb3cc 9156->9162 9236 5e8178 LeaveCriticalSection 9156->9236 9158->9167 9205 5ea00a GetLastError 9158->9205 9160 5e6eeb _unexpected 21 API calls 9163 5eb3d4 9160->9163 9162->9160 9164 5ea00a _unexpected 48 API calls 9168 5eb347 9164->9168 9166 5ea00a _unexpected 48 API calls 9166->9167 9232 5eb36d 9167->9232 9168->9154 9169 5ea00a _unexpected 48 API calls 9168->9169 9169->9154 9171 5e7de6 _unexpected std::bad_exception::bad_exception 9170->9171 9172 5e7e12 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 9171->9172 9173 5e7ee3 _unexpected 9172->9173 9259 5e4241 9173->9259 9175 5e7f01 9175->9138 9177 5e8846 GetLastError 9176->9177 9178 5e8843 9176->9178 9267 5edb9e 9177->9267 9178->9138 9181 5e887a 9182 5e88c0 SetLastError 9181->9182 9182->9138 9183 5edbd9 ___vcrt_FlsSetValue 6 API calls 9184 5e8874 _unexpected 9183->9184 9184->9181 9185 5e889c 9184->9185 9186 5edbd9 ___vcrt_FlsSetValue 6 API calls 9184->9186 9187 5edbd9 ___vcrt_FlsSetValue 6 API calls 9185->9187 9188 5e88b0 9185->9188 9186->9185 9187->9188 9272 5e83ac 9188->9272 9191 5eb44b __FrameHandler3::FrameUnwindToState 9190->9191 9196 5e8161 EnterCriticalSection 9191->9196 9193 5eb459 9197 5eb49b 9193->9197 9196->9193 9200 5e8178 LeaveCriticalSection 9197->9200 9199 5eb1e1 9199->9138 9200->9199 9237 5e809f 9201->9237 9204->9149 9206 5ea026 9205->9206 9207 5ea020 9205->9207 9209 5e9bcf _unexpected 6 API calls 9206->9209 9231 5ea02a SetLastError 9206->9231 9208 5e9b90 _unexpected 6 API calls 9207->9208 9208->9206 9210 5ea042 9209->9210 9212 5eb807 _unexpected 14 API calls 9210->9212 9210->9231 9213 5ea057 9212->9213 9216 5ea05f 9213->9216 9217 5ea070 9213->9217 9214 5ea0bf 9218 5e835d CallUnexpected 46 API calls 9214->9218 9215 5ea0ba 9215->9166 9219 5e9bcf _unexpected 6 API calls 9216->9219 9220 5e9bcf _unexpected 6 API calls 9217->9220 9221 5ea0c4 9218->9221 9222 5ea06d 9219->9222 9223 5ea07c 9220->9223 9227 5eb0cb __freea 14 API calls 9222->9227 9224 5ea097 9223->9224 9225 5ea080 9223->9225 9228 5ea31c _unexpected 14 API calls 9224->9228 9226 5e9bcf _unexpected 6 API calls 9225->9226 9226->9222 9227->9231 9229 5ea0a2 9228->9229 9230 5eb0cb __freea 14 API calls 9229->9230 9230->9231 9231->9214 9231->9215 9233 5eb339 9232->9233 9234 5eb371 9232->9234 9233->9154 9233->9164 9233->9168 9258 5e8178 LeaveCriticalSection 9234->9258 9236->9162 9238 5e80b1 __strnicoll 9237->9238 9243 5e7f12 9238->9243 9244 5e7f22 9243->9244 9246 5e7f29 9243->9246 9245 5e8030 __strnicoll 16 API calls 9244->9245 9245->9246 9247 5e8076 __strnicoll GetLastError SetLastError 9246->9247 9250 5e7f37 9246->9250 9248 5e7f5e 9247->9248 9249 5e7d96 __strnicoll 11 API calls 9248->9249 9248->9250 9251 5e7f8e 9249->9251 9252 5e7fd7 9250->9252 9253 5e7fe3 9252->9253 9254 5e7ffa 9253->9254 9255 5e8013 __strnicoll 48 API calls 9253->9255 9256 5e7d75 9254->9256 9257 5e8013 __strnicoll 48 API calls 9254->9257 9255->9254 9256->9154 9257->9256 9258->9233 9260 5e424a IsProcessorFeaturePresent 9259->9260 9261 5e4249 9259->9261 9263 5e49f4 9260->9263 9261->9175 9266 5e4ad9 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 9263->9266 9265 5e4ad7 9265->9175 9266->9265 9268 5edca9 ___vcrt_FlsFree 5 API calls 9267->9268 9269 5edbb8 9268->9269 9270 5edbd0 TlsGetValue 9269->9270 9271 5e885b 9269->9271 9270->9271 9271->9181 9271->9182 9271->9183 9273 5eb0cb __freea 14 API calls 9272->9273 9274 5e83c4 9273->9274 9274->9181 9308 5ea8c8 9275->9308 9278 5eab82 9280 5eab99 9278->9280 9281 5eab87 GetACP 9278->9281 9279 5eab70 GetOEMCP 9279->9280 9280->9113 9282 5ebc45 9280->9282 9281->9280 9283 5ebc83 9282->9283 9287 5ebc53 _unexpected 9282->9287 9284 5eb757 __dosmaperr 14 API calls 9283->9284 9286 5ead17 9284->9286 9285 5ebc6e RtlAllocateHeap 9285->9286 9285->9287 9286->9116 9286->9117 9287->9283 9287->9285 9288 5e7207 _unexpected 2 API calls 9287->9288 9288->9287 9290 5eab4f 50 API calls 9289->9290 9292 5ea96a 9290->9292 9291 5eaa6f 9293 5e4241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9291->9293 9292->9291 9294 5ea9a7 IsValidCodePage 9292->9294 9298 5ea9c2 std::bad_exception::bad_exception 9292->9298 9295 5eab4d 9293->9295 9294->9291 9296 5ea9b9 9294->9296 9295->9121 9295->9125 9297 5ea9e2 GetCPInfo 9296->9297 9296->9298 9297->9291 9297->9298 9348 5eaed9 9298->9348 9301 5eb08a __FrameHandler3::FrameUnwindToState 9300->9301 9425 5e8161 EnterCriticalSection 9301->9425 9303 5eb094 9426 5eae18 9303->9426 9309 5ea8e6 9308->9309 9315 5ea8df 9308->9315 9310 5ea00a _unexpected 48 API calls 9309->9310 9309->9315 9311 5ea907 9310->9311 9316 5ed95d 9311->9316 9315->9278 9315->9279 9317 5ea91d 9316->9317 9318 5ed970 9316->9318 9320 5ed98a 9317->9320 9318->9317 9324 5ec179 9318->9324 9321 5ed99d 9320->9321 9322 5ed9b2 9320->9322 9321->9322 9345 5ea863 9321->9345 9322->9315 9325 5ec185 __FrameHandler3::FrameUnwindToState 9324->9325 9326 5ea00a _unexpected 48 API calls 9325->9326 9327 5ec18e 9326->9327 9334 5ec1d4 9327->9334 9337 5e8161 EnterCriticalSection 9327->9337 9329 5ec1ac 9338 5ec1fa 9329->9338 9334->9317 9335 5e835d CallUnexpected 48 API calls 9336 5ec1f9 9335->9336 9337->9329 9339 5ec208 __strnicoll 9338->9339 9341 5ec1bd 9338->9341 9340 5ebfae __strnicoll 14 API calls 9339->9340 9339->9341 9340->9341 9342 5ec1d9 9341->9342 9343 5e8178 _unexpected LeaveCriticalSection 9342->9343 9344 5ec1d0 9343->9344 9344->9334 9344->9335 9346 5ea00a _unexpected 48 API calls 9345->9346 9347 5ea868 9346->9347 9347->9322 9349 5eaf01 GetCPInfo 9348->9349 9350 5eafca 9348->9350 9349->9350 9355 5eaf19 9349->9355 9352 5e4241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9350->9352 9354 5eb07c 9352->9354 9354->9291 9359 5ebced 9355->9359 9358 5eded4 52 API calls 9358->9350 9360 5ea8c8 __strnicoll 48 API calls 9359->9360 9361 5ebd0d 9360->9361 9379 5ebdee 9361->9379 9363 5ebdc9 9366 5e4241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9363->9366 9364 5ebdc1 9382 5ebccd 9364->9382 9365 5ebd3a 9365->9363 9365->9364 9368 5ebc45 __strnicoll 15 API calls 9365->9368 9370 5ebd5f __alloca_probe_16 std::bad_exception::bad_exception 9365->9370 9369 5eaf81 9366->9369 9368->9370 9374 5eded4 9369->9374 9370->9364 9371 5ebdee __strnicoll MultiByteToWideChar 9370->9371 9372 5ebda8 9371->9372 9372->9364 9373 5ebdaf GetStringTypeW 9372->9373 9373->9364 9375 5ea8c8 __strnicoll 48 API calls 9374->9375 9376 5edee7 9375->9376 9388 5edf1d 9376->9388 9386 5ebe18 9379->9386 9383 5ebcd9 9382->9383 9385 5ebcea 9382->9385 9384 5eb0cb __freea 14 API calls 9383->9384 9383->9385 9384->9385 9385->9363 9387 5ebe0a MultiByteToWideChar 9386->9387 9387->9365 9389 5edf38 __strnicoll 9388->9389 9390 5ebdee __strnicoll MultiByteToWideChar 9389->9390 9393 5edf7c 9390->9393 9391 5ee0f7 9392 5e4241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9391->9392 9394 5eafa2 9392->9394 9393->9391 9395 5ebc45 __strnicoll 15 API calls 9393->9395 9397 5edfa2 __alloca_probe_16 9393->9397 9408 5ee04a 9393->9408 9394->9358 9395->9397 9396 5ebccd __freea 14 API calls 9396->9391 9398 5ebdee __strnicoll MultiByteToWideChar 9397->9398 9397->9408 9399 5edfeb 9398->9399 9399->9408 9416 5e9c5c 9399->9416 9402 5ee059 9404 5ee0e2 9402->9404 9406 5ebc45 __strnicoll 15 API calls 9402->9406 9409 5ee06b __alloca_probe_16 9402->9409 9403 5ee021 9405 5e9c5c 6 API calls 9403->9405 9403->9408 9407 5ebccd __freea 14 API calls 9404->9407 9405->9408 9406->9409 9407->9408 9408->9396 9409->9404 9410 5e9c5c 6 API calls 9409->9410 9411 5ee0ae 9410->9411 9411->9404 9422 5ed131 9411->9422 9413 5ee0c8 9413->9404 9414 5ee0d1 9413->9414 9415 5ebccd __freea 14 API calls 9414->9415 9415->9408 9417 5e9f57 LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary GetProcAddress 9416->9417 9418 5e9c67 9417->9418 9419 5e9cb9 __strnicoll 5 API calls 9418->9419 9421 5e9c6d 9418->9421 9420 5e9cad LCMapStringW 9419->9420 9420->9421 9421->9402 9421->9403 9421->9408 9424 5ed144 ___scrt_uninitialize_crt 9422->9424 9423 5ed182 WideCharToMultiByte 9423->9413 9424->9423 9425->9303 9436 5ea7e2 9426->9436 9428 5eae3a 9429 5ea7e2 48 API calls 9428->9429 9430 5eae59 9429->9430 9431 5eae80 9430->9431 9432 5eb0cb __freea 14 API calls 9430->9432 9433 5eb0bf 9431->9433 9432->9431 9450 5e8178 LeaveCriticalSection 9433->9450 9435 5eb0ad 9435->9126 9437 5ea7f3 9436->9437 9441 5ea7ef CatchIt 9436->9441 9438 5ea7fa 9437->9438 9442 5ea80d std::bad_exception::bad_exception 9437->9442 9439 5eb757 __dosmaperr 14 API calls 9438->9439 9440 5ea7ff 9439->9440 9443 5e7d69 __strnicoll 48 API calls 9440->9443 9441->9428 9442->9441 9444 5ea83b 9442->9444 9445 5ea844 9442->9445 9443->9441 9446 5eb757 __dosmaperr 14 API calls 9444->9446 9445->9441 9448 5eb757 __dosmaperr 14 API calls 9445->9448 9447 5ea840 9446->9447 9449 5e7d69 __strnicoll 48 API calls 9447->9449 9448->9447 9449->9441 9450->9435 9452 5e96ba 9451->9452 9453 5e96c8 9451->9453 9452->9453 9458 5e96e0 9452->9458 9454 5eb757 __dosmaperr 14 API calls 9453->9454 9455 5e96d0 9454->9455 9457 5e7d69 __strnicoll 48 API calls 9455->9457 9456 5e96da 9456->9075 9457->9456 9458->9456 9459 5eb757 __dosmaperr 14 API calls 9458->9459 9459->9455 9461 5e7b7a 9460->9461 9462 5e7b5d 9460->9462 9461->9076 9463 5e7b74 9462->9463 9464 5eb0cb __freea 14 API calls 9462->9464 9465 5eb0cb __freea 14 API calls 9463->9465 9464->9462 9465->9461 9467 5e7da2 9466->9467 9468 5e7dca _unexpected 8 API calls 9467->9468 9469 5e7db7 GetCurrentProcess TerminateProcess 9468->9469 9469->9082 9471 5ed30f 9470->9471 9472 5ed320 9471->9472 9475 5ed333 ___from_strstr_to_strchr 9471->9475 9473 5eb757 __dosmaperr 14 API calls 9472->9473 9482 5ed325 9473->9482 9474 5ed54a 9477 5eb757 __dosmaperr 14 API calls 9474->9477 9475->9474 9476 5ed353 9475->9476 9533 5ed56f 9476->9533 9478 5ed54f 9477->9478 9480 5eb0cb __freea 14 API calls 9478->9480 9480->9482 9482->9030 9483 5ed397 9519 5ed383 9483->9519 9537 5ed589 9483->9537 9484 5ed399 9488 5eb807 _unexpected 14 API calls 9484->9488 9484->9519 9486 5ed375 9491 5ed37e 9486->9491 9492 5ed392 9486->9492 9490 5ed3a7 9488->9490 9489 5eb0cb __freea 14 API calls 9489->9482 9494 5eb0cb __freea 14 API calls 9490->9494 9495 5eb757 __dosmaperr 14 API calls 9491->9495 9496 5ed56f 48 API calls 9492->9496 9493 5ed40c 9497 5eb0cb __freea 14 API calls 9493->9497 9498 5ed3b2 9494->9498 9495->9519 9496->9483 9506 5ed414 9497->9506 9498->9483 9501 5eb807 _unexpected 14 API calls 9498->9501 9498->9519 9499 5ed457 9500 5ed0c4 51 API calls 9499->9500 9499->9519 9502 5ed485 9500->9502 9503 5ed3ce 9501->9503 9505 5eb0cb __freea 14 API calls 9502->9505 9508 5eb0cb __freea 14 API calls 9503->9508 9504 5ed53f 9509 5eb0cb __freea 14 API calls 9504->9509 9510 5ed441 9505->9510 9506->9510 9541 5ed0c4 9506->9541 9508->9483 9509->9482 9510->9504 9513 5eb807 _unexpected 14 API calls 9510->9513 9510->9519 9511 5ed438 9512 5eb0cb __freea 14 API calls 9511->9512 9512->9510 9514 5ed4d0 9513->9514 9515 5ed4d8 9514->9515 9516 5ed4e0 9514->9516 9517 5eb0cb __freea 14 API calls 9515->9517 9518 5e96ac ___std_exception_copy 48 API calls 9516->9518 9517->9519 9520 5ed4ec 9518->9520 9519->9489 9521 5ed564 9520->9521 9522 5ed4f3 9520->9522 9523 5e7d96 __strnicoll 11 API calls 9521->9523 9550 5ef9bc 9522->9550 9525 5ed56e 9523->9525 9527 5ed51a 9529 5eb757 __dosmaperr 14 API calls 9527->9529 9528 5ed539 9530 5eb0cb __freea 14 API calls 9528->9530 9531 5ed51f 9529->9531 9530->9504 9532 5eb0cb __freea 14 API calls 9531->9532 9532->9519 9534 5ed57c 9533->9534 9536 5ed35e 9533->9536 9565 5ed5de 9534->9565 9536->9483 9536->9484 9536->9486 9538 5ed59f 9537->9538 9540 5ed3fc 9537->9540 9538->9540 9580 5ef8cb 9538->9580 9540->9493 9540->9499 9542 5ed0ec 9541->9542 9543 5ed0d1 9541->9543 9547 5ed0fb 9542->9547 9680 5ef6f8 9542->9680 9543->9542 9544 5ed0dd 9543->9544 9545 5eb757 __dosmaperr 14 API calls 9544->9545 9549 5ed0e2 std::bad_exception::bad_exception 9545->9549 9687 5ef72b 9547->9687 9549->9511 9699 5ec274 9550->9699 9555 5efa2f 9557 5efa3b 9555->9557 9559 5eb0cb __freea 14 API calls 9555->9559 9556 5ec274 48 API calls 9558 5efa0c 9556->9558 9560 5ed514 9557->9560 9561 5eb0cb __freea 14 API calls 9557->9561 9562 5ec30c 17 API calls 9558->9562 9559->9557 9560->9527 9560->9528 9561->9560 9563 5efa19 9562->9563 9563->9555 9564 5efa23 SetEnvironmentVariableW 9563->9564 9564->9555 9566 5ed5f1 9565->9566 9574 5ed5ec 9565->9574 9566->9566 9567 5eb807 _unexpected 14 API calls 9566->9567 9577 5ed60e 9567->9577 9568 5ed67c 9569 5e835d CallUnexpected 48 API calls 9568->9569 9571 5ed681 9569->9571 9570 5ed66b 9572 5eb0cb __freea 14 API calls 9570->9572 9573 5e7d96 __strnicoll 11 API calls 9571->9573 9572->9574 9575 5ed68d 9573->9575 9574->9536 9576 5eb807 _unexpected 14 API calls 9576->9577 9577->9568 9577->9570 9577->9571 9577->9576 9578 5eb0cb __freea 14 API calls 9577->9578 9579 5e96ac ___std_exception_copy 48 API calls 9577->9579 9578->9577 9579->9577 9581 5ef8df 9580->9581 9582 5ef8d9 9580->9582 9598 5ef8f4 9581->9598 9585 5f0199 9582->9585 9586 5f01e1 9582->9586 9588 5f019f 9585->9588 9590 5f01bc 9585->9590 9618 5f01f7 9586->9618 9589 5eb757 __dosmaperr 14 API calls 9588->9589 9591 5f01a4 9589->9591 9592 5eb757 __dosmaperr 14 API calls 9590->9592 9597 5f01da 9590->9597 9593 5e7d69 __strnicoll 48 API calls 9591->9593 9594 5f01cb 9592->9594 9596 5f01af 9593->9596 9595 5e7d69 __strnicoll 48 API calls 9594->9595 9595->9596 9596->9538 9597->9538 9599 5ea8c8 __strnicoll 48 API calls 9598->9599 9600 5ef90a 9599->9600 9601 5ef926 9600->9601 9602 5ef93d 9600->9602 9615 5ef8ef 9600->9615 9603 5eb757 __dosmaperr 14 API calls 9601->9603 9604 5ef958 9602->9604 9605 5ef946 9602->9605 9606 5ef92b 9603->9606 9609 5ef978 9604->9609 9610 5ef965 9604->9610 9608 5eb757 __dosmaperr 14 API calls 9605->9608 9607 5e7d69 __strnicoll 48 API calls 9606->9607 9607->9615 9611 5ef94b 9608->9611 9636 5f02c2 9609->9636 9612 5f01f7 __strnicoll 48 API calls 9610->9612 9614 5e7d69 __strnicoll 48 API calls 9611->9614 9612->9615 9614->9615 9615->9538 9617 5eb757 __dosmaperr 14 API calls 9617->9615 9619 5f0207 9618->9619 9620 5f0221 9618->9620 9621 5eb757 __dosmaperr 14 API calls 9619->9621 9622 5f0229 9620->9622 9623 5f0240 9620->9623 9624 5f020c 9621->9624 9625 5eb757 __dosmaperr 14 API calls 9622->9625 9626 5f024c 9623->9626 9627 5f0263 9623->9627 9628 5e7d69 __strnicoll 48 API calls 9624->9628 9629 5f022e 9625->9629 9630 5eb757 __dosmaperr 14 API calls 9626->9630 9631 5ea8c8 __strnicoll 48 API calls 9627->9631 9634 5f0217 9627->9634 9628->9634 9632 5e7d69 __strnicoll 48 API calls 9629->9632 9633 5f0251 9630->9633 9631->9634 9632->9634 9635 5e7d69 __strnicoll 48 API calls 9633->9635 9634->9596 9635->9634 9637 5ea8c8 __strnicoll 48 API calls 9636->9637 9638 5f02d5 9637->9638 9641 5f0308 9638->9641 9646 5f033c __strnicoll 9641->9646 9642 5e4241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9643 5ef98e 9642->9643 9643->9615 9643->9617 9644 5f05a0 9645 5f03bc 9647 5ebdee __strnicoll MultiByteToWideChar 9645->9647 9653 5f03c0 9645->9653 9646->9644 9646->9645 9648 5f03a9 GetCPInfo 9646->9648 9646->9653 9650 5f0442 9647->9650 9648->9645 9648->9653 9649 5f0594 9651 5ebccd __freea 14 API calls 9649->9651 9650->9649 9652 5ebc45 __strnicoll 15 API calls 9650->9652 9650->9653 9654 5f0469 __alloca_probe_16 9650->9654 9651->9653 9652->9654 9653->9642 9653->9644 9654->9649 9655 5ebdee __strnicoll MultiByteToWideChar 9654->9655 9656 5f04b5 9655->9656 9656->9649 9657 5ebdee __strnicoll MultiByteToWideChar 9656->9657 9658 5f04d1 9657->9658 9658->9649 9659 5f04df 9658->9659 9660 5f0542 9659->9660 9661 5ebc45 __strnicoll 15 API calls 9659->9661 9665 5f04f8 __alloca_probe_16 9659->9665 9662 5ebccd __freea 14 API calls 9660->9662 9661->9665 9663 5f0548 9662->9663 9664 5ebccd __freea 14 API calls 9663->9664 9664->9653 9665->9660 9666 5ebdee __strnicoll MultiByteToWideChar 9665->9666 9667 5f053b 9666->9667 9667->9660 9668 5f0564 9667->9668 9674 5e9ab5 9668->9674 9671 5ebccd __freea 14 API calls 9672 5f0584 9671->9672 9673 5ebccd __freea 14 API calls 9672->9673 9673->9653 9675 5e9f3d __strnicoll 5 API calls 9674->9675 9676 5e9ac0 9675->9676 9677 5e9cb9 __strnicoll 5 API calls 9676->9677 9678 5e9ac6 9676->9678 9679 5e9b06 CompareStringW 9677->9679 9678->9671 9679->9678 9681 5ef718 HeapSize 9680->9681 9682 5ef703 9680->9682 9681->9547 9683 5eb757 __dosmaperr 14 API calls 9682->9683 9684 5ef708 9683->9684 9685 5e7d69 __strnicoll 48 API calls 9684->9685 9686 5ef713 9685->9686 9686->9547 9688 5ef738 9687->9688 9689 5ef743 9687->9689 9690 5ebc45 __strnicoll 15 API calls 9688->9690 9691 5ef74b 9689->9691 9697 5ef754 _unexpected 9689->9697 9696 5ef740 9690->9696 9694 5eb0cb __freea 14 API calls 9691->9694 9692 5ef77e HeapReAlloc 9692->9696 9692->9697 9693 5ef759 9695 5eb757 __dosmaperr 14 API calls 9693->9695 9694->9696 9695->9696 9696->9549 9697->9692 9697->9693 9698 5e7207 _unexpected 2 API calls 9697->9698 9698->9697 9700 5ea8c8 __strnicoll 48 API calls 9699->9700 9701 5ec286 9700->9701 9702 5ec298 9701->9702 9707 5e9a96 9701->9707 9704 5ec30c 9702->9704 9713 5ec4e2 9704->9713 9710 5e9f23 9707->9710 9711 5e9e9e _unexpected 5 API calls 9710->9711 9712 5e9a9e 9711->9712 9712->9702 9714 5ec50a 9713->9714 9715 5ec4f0 9713->9715 9717 5ec530 9714->9717 9718 5ec511 9714->9718 9731 5ec2f2 9715->9731 9720 5ebdee __strnicoll MultiByteToWideChar 9717->9720 9719 5ec324 9718->9719 9735 5ec2b3 9718->9735 9719->9555 9719->9556 9722 5ec53f 9720->9722 9723 5ec546 GetLastError 9722->9723 9725 5ec2b3 15 API calls 9722->9725 9728 5ec56c 9722->9728 9740 5eb77d 9723->9740 9725->9728 9726 5ebdee __strnicoll MultiByteToWideChar 9729 5ec583 9726->9729 9728->9719 9728->9726 9729->9719 9729->9723 9730 5eb757 __dosmaperr 14 API calls 9730->9719 9732 5ec2fd 9731->9732 9733 5ec305 9731->9733 9734 5eb0cb __freea 14 API calls 9732->9734 9733->9719 9734->9733 9736 5ec2f2 14 API calls 9735->9736 9737 5ec2c1 9736->9737 9745 5ec255 9737->9745 9748 5eb76a 9740->9748 9742 5eb788 __dosmaperr 9743 5eb757 __dosmaperr 14 API calls 9742->9743 9744 5eb79b 9743->9744 9744->9730 9746 5ebc45 __strnicoll 15 API calls 9745->9746 9747 5ec262 9746->9747 9747->9719 9749 5ea15b __dosmaperr 14 API calls 9748->9749 9750 5eb76f 9749->9750 9750->9742 9752 5dce50 std::_Throw_Cpp_error 9751->9752 9770 5e3b60 9752->9770 9755 5dce70 9761 5dce93 9755->9761 9756 5dd449 9757 5e4241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9756->9757 9758 5dcdd5 CreateEllipticRgn 9757->9758 9764 5dd4a0 9758->9764 9759 5dcf87 GetCurrentThreadId 9759->9761 9760 5e441d std::_Throw_Cpp_error 52 API calls 9760->9759 9761->9756 9761->9759 9761->9760 9763 5e441d 52 API calls std::_Throw_Cpp_error 9761->9763 10127 5e4952 WaitForSingleObjectEx 9761->10127 9763->9761 9765 5dd4c0 9764->9765 9767 5dd528 9765->9767 10132 5e846b 9765->10132 9768 5e4241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9767->9768 9769 5dce14 9768->9769 9769->8892 9771 5e3b8b std::_Throw_Cpp_error 9770->9771 9784 5e3cc0 9771->9784 9773 5e3b9a 9793 5e6ce6 9773->9793 9775 5e3bea 9776 5e3c84 9775->9776 9778 5e3c9a 9775->9778 9808 5e3de0 9775->9808 9812 5e441d 9776->9812 9818 5e3e30 9778->9818 9782 5e4241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9783 5dcdc7 9782->9783 9783->9755 9824 5e41c6 9784->9824 9786 5e3cef std::_Throw_Cpp_error 9838 5e3f00 9786->9838 9791 5e4241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9792 5e3d32 9791->9792 9792->9773 9794 5e6d07 9793->9794 9795 5e6cf3 9793->9795 9862 5e6d77 9794->9862 9796 5eb757 __dosmaperr 14 API calls 9795->9796 9798 5e6cf8 9796->9798 9800 5e7d69 __strnicoll 48 API calls 9798->9800 9802 5e6d03 9800->9802 9801 5e6d1c CreateThread 9803 5e6d3b GetLastError 9801->9803 9806 5e6d47 9801->9806 9879 5e6e00 9801->9879 9802->9775 9805 5eb77d __dosmaperr 14 API calls 9803->9805 9805->9806 9871 5e6dc7 9806->9871 9809 5e3e0c 9808->9809 9810 5e4241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9809->9810 9811 5e3e19 9810->9811 9811->9775 9813 5e4433 std::_Throw_Cpp_error 9812->9813 10019 5e467d 9813->10019 9822 5e3e58 std::_Throw_Cpp_error 9818->9822 9819 5e3ee3 9820 5e4241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9819->9820 9821 5e3ca2 9820->9821 9821->9782 9822->9819 10123 5e40f0 9822->10123 9826 5e41cb 9824->9826 9827 5e41e5 9826->9827 9828 5e7207 _unexpected 2 API calls 9826->9828 9829 5e41e7 std::_Throw_Cpp_error 9826->9829 9847 5e83c7 9826->9847 9827->9786 9828->9826 9830 5e49c1 std::_Throw_Cpp_error 9829->9830 9854 5e59fc 9829->9854 9831 5e59fc std::_Throw_Cpp_error RaiseException 9830->9831 9833 5e49de IsProcessorFeaturePresent 9831->9833 9835 5e49f4 9833->9835 9857 5e4ad9 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 9835->9857 9837 5e4ad7 9837->9786 9858 5e3fb0 9838->9858 9841 5e4241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9842 5e3d0e 9841->9842 9843 5e3f60 9842->9843 9844 5e3f95 9843->9844 9845 5e4241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9844->9845 9846 5e3d22 9845->9846 9846->9791 9852 5ebc45 _unexpected 9847->9852 9848 5ebc83 9849 5eb757 __dosmaperr 14 API calls 9848->9849 9851 5ebc81 9849->9851 9850 5ebc6e RtlAllocateHeap 9850->9851 9850->9852 9851->9826 9852->9848 9852->9850 9853 5e7207 _unexpected 2 API calls 9852->9853 9853->9852 9855 5e5a43 RaiseException 9854->9855 9856 5e5a16 9854->9856 9855->9830 9856->9855 9857->9837 9859 5e3fe2 std::_Throw_Cpp_error 9858->9859 9860 5e4241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9859->9860 9861 5e3f36 9860->9861 9861->9841 9863 5eb807 _unexpected 14 API calls 9862->9863 9864 5e6d88 9863->9864 9865 5eb0cb __freea 14 API calls 9864->9865 9866 5e6d95 9865->9866 9867 5e6d9c GetModuleHandleExW 9866->9867 9868 5e6db9 9866->9868 9867->9868 9869 5e6dc7 16 API calls 9868->9869 9870 5e6d13 9869->9870 9870->9801 9870->9806 9872 5e6dd3 9871->9872 9878 5e6d52 9871->9878 9873 5e6dd9 CloseHandle 9872->9873 9874 5e6de2 9872->9874 9873->9874 9875 5e6de8 FreeLibrary 9874->9875 9876 5e6df1 9874->9876 9875->9876 9877 5eb0cb __freea 14 API calls 9876->9877 9877->9878 9878->9775 9880 5e6e0c __FrameHandler3::FrameUnwindToState 9879->9880 9881 5e6e13 GetLastError ExitThread 9880->9881 9882 5e6e20 9880->9882 9883 5ea00a _unexpected 48 API calls 9882->9883 9884 5e6e25 9883->9884 9895 5eb976 9884->9895 9887 5e6e3c 9899 5e3d40 9887->9899 9896 5e6e30 9895->9896 9897 5eb986 _unexpected 9895->9897 9896->9887 9910 5e9cea 9896->9910 9897->9896 9916 5e9d93 9897->9916 9900 5e3f60 5 API calls 9899->9900 9901 5e3d6d std::_Throw_Cpp_error 9900->9901 9919 5e40a0 9901->9919 9906 5e3e30 5 API calls 9907 5e3da6 9906->9907 9908 5e4241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9907->9908 9909 5e3db5 9908->9909 9913 5e6d69 9909->9913 9911 5e9e9e _unexpected 5 API calls 9910->9911 9912 5e9d06 9911->9912 9912->9887 10007 5e6e7e 9913->10007 9917 5e9e9e _unexpected 5 API calls 9916->9917 9918 5e9daf 9917->9918 9918->9896 9927 5dcd10 GetPEB 9919->9927 9922 5e48cb GetCurrentThreadId 9999 5e4c86 9922->9999 9924 5e48e4 __Mtx_unlock __Cnd_broadcast 10002 5e4c92 9924->10002 9934 5e84a7 9927->9934 9932 5e4241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9933 5dcd82 9932->9933 9933->9922 9935 5e84ba __strnicoll 9934->9935 9949 5e8537 9935->9949 9938 5e7fd7 __strnicoll 48 API calls 9939 5dcd62 9938->9939 9940 5dc860 9939->9940 9943 5dc890 9940->9943 9942 5dcced 9944 5e4241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9942->9944 9943->9942 9973 5dbeb0 CreateFileA 9943->9973 9983 5d86c0 9943->9983 9990 5d1000 9943->9990 9996 5d8ea0 9943->9996 9946 5dccf9 9944->9946 9946->9932 9950 5e8567 9949->9950 9951 5e8576 9950->9951 9953 5e8594 9950->9953 9970 5e856b 9950->9970 9952 5e7f12 __strnicoll 29 API calls 9951->9952 9952->9970 9954 5e85a1 9953->9954 9956 5e84de ___scrt_uninitialize_crt 48 API calls 9953->9956 9957 5e85bb 9954->9957 9958 5e85d9 9954->9958 9955 5e4241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9961 5e84cc 9955->9961 9956->9954 9962 5eda19 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 9957->9962 9959 5e85ed 9958->9959 9960 5e8769 9958->9960 9964 5e8687 9959->9964 9968 5e8631 9959->9968 9959->9970 9963 5ed131 ___scrt_uninitialize_crt WideCharToMultiByte 9960->9963 9960->9970 9961->9938 9962->9970 9963->9970 9965 5ed131 ___scrt_uninitialize_crt WideCharToMultiByte 9964->9965 9966 5e869a 9965->9966 9969 5e86b3 GetLastError 9966->9969 9966->9970 9967 5ed131 ___scrt_uninitialize_crt WideCharToMultiByte 9967->9970 9968->9967 9969->9970 9972 5e86c2 9969->9972 9970->9955 9971 5ed131 ___scrt_uninitialize_crt WideCharToMultiByte 9971->9972 9972->9970 9972->9971 9976 5dbf29 9973->9976 9974 5dc021 GetFileSize 9974->9976 9975 5dc083 ReadFile 9975->9976 9976->9974 9976->9975 9977 5dc12c CloseHandle 9976->9977 9978 5dc059 CloseHandle 9976->9978 9979 5dc14b 9976->9979 9981 5dc10d CloseHandle 9976->9981 9977->9976 9978->9976 9980 5e4241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9979->9980 9982 5dc160 9980->9982 9981->9976 9982->9943 9987 5d8783 std::_Throw_Cpp_error 9983->9987 9984 5d8dd8 9985 5e4241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9984->9985 9986 5d8de8 9985->9986 9986->9943 9987->9984 9988 5de9b0 5 API calls std::_Throw_Cpp_error 9987->9988 9989 5dea10 51 API calls std::_Throw_Cpp_error 9987->9989 9988->9987 9989->9987 9991 5d1041 9990->9991 9992 5d7eb0 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 9991->9992 9993 5d1451 9992->9993 9994 5e4241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 9993->9994 9995 5d7e16 9994->9995 9995->9943 9997 5dd560 std::_Throw_Cpp_error 48 API calls 9996->9997 9998 5d8eb6 9997->9998 9998->9943 10005 5e51de EnterCriticalSection 9999->10005 10001 5e4c90 10001->9924 10006 5e51ec LeaveCriticalSection 10002->10006 10004 5e3d9e 10004->9906 10005->10001 10006->10004 10008 5ea15b __dosmaperr 14 API calls 10007->10008 10009 5e6e89 10008->10009 10010 5e6ecb ExitThread 10009->10010 10011 5e6ea2 10009->10011 10016 5e9d25 10009->10016 10013 5e6eb5 10011->10013 10014 5e6eae CloseHandle 10011->10014 10013->10010 10015 5e6ec1 FreeLibraryAndExitThread 10013->10015 10014->10013 10015->10010 10017 5e9e9e _unexpected 5 API calls 10016->10017 10018 5e9d3e 10017->10018 10018->10011 10020 5e4689 __EH_prolog3_GS 10019->10020 10021 5d86c0 std::_Throw_Cpp_error 51 API calls 10020->10021 10022 5e469d 10021->10022 10029 5e45a6 10022->10029 10047 5e42e6 10029->10047 10031 5e45d7 10051 5e4533 10031->10051 10034 5dd560 std::_Throw_Cpp_error 48 API calls 10035 5e45f9 10034->10035 10036 5e4241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 10035->10036 10037 5e4618 10036->10037 10038 5dd560 10037->10038 10042 5dd584 std::_Throw_Cpp_error 10038->10042 10039 5dd6bf std::_Throw_Cpp_error 10040 5e4241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 10039->10040 10041 5dd6f5 10040->10041 10044 5e4bd9 10041->10044 10042->10039 10120 5dd780 10042->10120 10045 5e4241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 10044->10045 10046 5e4be3 10045->10046 10046->10046 10048 5e42fe 10047->10048 10050 5e4305 CatchIt 10048->10050 10063 5df980 10048->10063 10050->10031 10052 5e453f __EH_prolog3_GS 10051->10052 10054 5e455e std::_Throw_Cpp_error 10052->10054 10090 5e434e 10052->10090 10055 5e434e std::_Throw_Cpp_error 51 API calls 10054->10055 10056 5e4583 10055->10056 10057 5dd560 std::_Throw_Cpp_error 48 API calls 10056->10057 10058 5e458b std::_Throw_Cpp_error 10057->10058 10059 5dd560 std::_Throw_Cpp_error 48 API calls 10058->10059 10060 5e459e 10059->10060 10061 5e4bd9 std::_Throw_Cpp_error 5 API calls 10060->10061 10062 5e45a5 std::domain_error::domain_error 10061->10062 10062->10034 10065 5df9a4 10063->10065 10066 5dfeac 10065->10066 10070 5dff00 10065->10070 10078 5e0ff0 10065->10078 10067 5e4241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 10066->10067 10068 5dfebc 10067->10068 10068->10050 10075 5dffa3 10070->10075 10071 5e0ff0 21 API calls std::_Throw_Cpp_error 10071->10075 10072 5e0642 10073 5e4241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 10072->10073 10074 5e0fc0 10073->10074 10074->10065 10075->10071 10075->10072 10081 5e1010 10075->10081 10085 5e7d79 10075->10085 10079 5e41c6 std::_Throw_Cpp_error 21 API calls 10078->10079 10080 5e1007 10079->10080 10080->10065 10082 5e101e std::_Throw_Cpp_error 10081->10082 10083 5e59fc std::_Throw_Cpp_error RaiseException 10082->10083 10084 5e1036 10083->10084 10086 5e809f __strnicoll 48 API calls 10085->10086 10087 5e7d88 10086->10087 10088 5e7d96 __strnicoll 11 API calls 10087->10088 10089 5e7d95 10088->10089 10091 5e438f 10090->10091 10093 5e4365 CatchIt 10090->10093 10094 5e476d 10091->10094 10093->10054 10095 5e4828 10094->10095 10096 5e4792 10094->10096 10117 5df170 10095->10117 10105 5df4d0 10096->10105 10101 5df980 std::_Throw_Cpp_error 51 API calls 10102 5e47ae CatchIt 10101->10102 10103 5e47fa CatchIt 10102->10103 10111 5dd7f0 10102->10111 10103->10093 10107 5df718 10105->10107 10106 5df2e0 std::_Throw_Cpp_error 5 API calls 10106->10107 10107->10106 10108 5df94d 10107->10108 10109 5e4241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 10108->10109 10110 5df960 10109->10110 10110->10101 10112 5dd8d2 10111->10112 10113 5de5ad std::_Throw_Cpp_error 10112->10113 10116 5de600 std::_Throw_Cpp_error 48 API calls 10112->10116 10114 5e4241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 10113->10114 10115 5de5d5 10114->10115 10115->10103 10116->10112 10118 5e4846 std::_Xinvalid_argument 50 API calls 10117->10118 10119 5df182 10118->10119 10121 5dd7f0 std::_Throw_Cpp_error 48 API calls 10120->10121 10122 5dd7ab 10121->10122 10122->10042 10124 5e4114 10123->10124 10125 5e4241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 10124->10125 10126 5e4196 10125->10126 10126->9822 10128 5e499a 10127->10128 10129 5e4968 GetExitCodeThread 10127->10129 10128->9761 10129->10128 10130 5e4979 CloseHandle 10129->10130 10130->9761 10133 5e8477 __FrameHandler3::FrameUnwindToState 10132->10133 10134 5ea00a _unexpected 48 API calls 10133->10134 10137 5e847c 10134->10137 10135 5e835d CallUnexpected 48 API calls 10136 5e84a6 10135->10136 10137->10135 10139 5e705f 10138->10139 10140 5e704d 10138->10140 10156 5e71ba 10139->10156 10142 5e53ec _unexpected GetModuleHandleW 10140->10142 10144 5e7052 10142->10144 10144->10139 10150 5e6f54 GetModuleHandleExW 10144->10150 10145 5e6f0c 10145->8866 10151 5e6fb4 10150->10151 10152 5e6f93 GetProcAddress 10150->10152 10154 5e6fba FreeLibrary 10151->10154 10155 5e6fc3 10151->10155 10152->10151 10153 5e6fa7 10152->10153 10153->10151 10154->10155 10155->10139 10157 5e71c6 __FrameHandler3::FrameUnwindToState 10156->10157 10171 5e8161 EnterCriticalSection 10157->10171 10159 5e71d0 10172 5e70b7 10159->10172 10161 5e71dd 10176 5e71fb 10161->10176 10164 5e6fef 10201 5e6fd6 10164->10201 10166 5e6ff9 10167 5e700d 10166->10167 10168 5e6ffd GetCurrentProcess TerminateProcess 10166->10168 10169 5e6f54 _unexpected 3 API calls 10167->10169 10168->10167 10170 5e7015 ExitProcess 10169->10170 10171->10159 10174 5e70c3 __FrameHandler3::FrameUnwindToState _unexpected 10172->10174 10175 5e7127 _unexpected 10174->10175 10179 5e776b 10174->10179 10175->10161 10200 5e8178 LeaveCriticalSection 10176->10200 10178 5e7096 10178->10145 10178->10164 10180 5e7777 __EH_prolog3 10179->10180 10183 5e79f6 10180->10183 10182 5e779e _unexpected 10182->10175 10184 5e7a02 __FrameHandler3::FrameUnwindToState 10183->10184 10191 5e8161 EnterCriticalSection 10184->10191 10186 5e7a10 10192 5e78c1 10186->10192 10191->10186 10193 5e78e0 10192->10193 10194 5e78d8 10192->10194 10193->10194 10195 5eb0cb __freea 14 API calls 10193->10195 10196 5e7a45 10194->10196 10195->10194 10199 5e8178 LeaveCriticalSection 10196->10199 10198 5e7a2e 10198->10182 10199->10198 10200->10178 10204 5eb94f 10201->10204 10203 5e6fdb _unexpected 10203->10166 10205 5eb95e _unexpected 10204->10205 10206 5eb96b 10205->10206 10208 5e9d53 10205->10208 10206->10203 10209 5e9e9e _unexpected 5 API calls 10208->10209 10210 5e9d6f 10209->10210 10210->10206 10212 5e6a7d 10211->10212 10215 5e6a8f ___scrt_uninitialize_crt 10211->10215 10213 5e6a8b 10212->10213 10216 5eb4a7 10212->10216 10213->8909 10215->8909 10219 5eb5d2 10216->10219 10222 5eb6ab 10219->10222 10223 5eb6b7 __FrameHandler3::FrameUnwindToState 10222->10223 10230 5e8161 EnterCriticalSection 10223->10230 10225 5eb72d 10239 5eb74b 10225->10239 10227 5eb6c1 ___scrt_uninitialize_crt 10227->10225 10231 5eb61f 10227->10231 10230->10227 10232 5eb62b __FrameHandler3::FrameUnwindToState 10231->10232 10242 5e6aef EnterCriticalSection 10232->10242 10234 5eb635 ___scrt_uninitialize_crt 10235 5eb66e 10234->10235 10243 5eb4b0 10234->10243 10256 5eb69f 10235->10256 10355 5e8178 LeaveCriticalSection 10239->10355 10241 5eb4ae 10241->10213 10242->10234 10244 5eb4c5 __strnicoll 10243->10244 10245 5eb4cc 10244->10245 10246 5eb4d7 10244->10246 10247 5eb5d2 ___scrt_uninitialize_crt 77 API calls 10245->10247 10259 5eb515 10246->10259 10249 5eb4d2 10247->10249 10251 5e7fd7 __strnicoll 48 API calls 10249->10251 10252 5eb50f 10251->10252 10252->10235 10254 5eb4f8 10272 5ee11f 10254->10272 10354 5e6b03 LeaveCriticalSection 10256->10354 10258 5eb68d 10258->10227 10260 5eb52e 10259->10260 10261 5eb4e1 10259->10261 10260->10261 10262 5ed936 ___scrt_uninitialize_crt 48 API calls 10260->10262 10261->10249 10265 5ed936 10261->10265 10263 5eb54a 10262->10263 10283 5ee45a 10263->10283 10266 5ed957 10265->10266 10267 5ed942 10265->10267 10266->10254 10268 5eb757 __dosmaperr 14 API calls 10267->10268 10269 5ed947 10268->10269 10270 5e7d69 __strnicoll 48 API calls 10269->10270 10271 5ed952 10270->10271 10271->10254 10273 5ee13d 10272->10273 10274 5ee130 10272->10274 10276 5ee186 10273->10276 10278 5ee164 10273->10278 10275 5eb757 __dosmaperr 14 API calls 10274->10275 10282 5ee135 10275->10282 10277 5eb757 __dosmaperr 14 API calls 10276->10277 10279 5ee18b 10277->10279 10324 5ee19c 10278->10324 10281 5e7d69 __strnicoll 48 API calls 10279->10281 10281->10282 10282->10249 10285 5ee466 __FrameHandler3::FrameUnwindToState 10283->10285 10284 5ee46e 10284->10261 10285->10284 10286 5ee4a7 10285->10286 10288 5ee4ed 10285->10288 10287 5e7f12 __strnicoll 29 API calls 10286->10287 10287->10284 10294 5ed8d7 EnterCriticalSection 10288->10294 10290 5ee4f3 10292 5ee511 10290->10292 10295 5ee23e 10290->10295 10321 5ee563 10292->10321 10294->10290 10296 5ee266 10295->10296 10319 5ee289 ___scrt_uninitialize_crt 10295->10319 10297 5ee26a 10296->10297 10299 5ee2c5 10296->10299 10298 5e7f12 __strnicoll 29 API calls 10297->10298 10298->10319 10300 5ee2e3 10299->10300 10301 5efa51 ___scrt_uninitialize_crt 50 API calls 10299->10301 10302 5ee56b ___scrt_uninitialize_crt 49 API calls 10300->10302 10301->10300 10303 5ee2f5 10302->10303 10304 5ee2fb 10303->10304 10305 5ee342 10303->10305 10308 5ee32a 10304->10308 10309 5ee303 10304->10309 10306 5ee3ab WriteFile 10305->10306 10307 5ee356 10305->10307 10310 5ee3cd GetLastError 10306->10310 10306->10319 10312 5ee35e 10307->10312 10313 5ee397 10307->10313 10311 5ee5e8 ___scrt_uninitialize_crt 54 API calls 10308->10311 10314 5ee9af ___scrt_uninitialize_crt 6 API calls 10309->10314 10309->10319 10310->10319 10311->10319 10316 5ee383 10312->10316 10317 5ee363 10312->10317 10315 5eea17 ___scrt_uninitialize_crt 7 API calls 10313->10315 10314->10319 10315->10319 10318 5eebdb ___scrt_uninitialize_crt 8 API calls 10316->10318 10317->10319 10320 5eeaf2 ___scrt_uninitialize_crt 7 API calls 10317->10320 10318->10319 10319->10292 10320->10319 10322 5ed8fa ___scrt_uninitialize_crt LeaveCriticalSection 10321->10322 10323 5ee569 10322->10323 10323->10284 10325 5ee1a8 __FrameHandler3::FrameUnwindToState 10324->10325 10337 5ed8d7 EnterCriticalSection 10325->10337 10327 5ee1b7 10336 5ee1fc 10327->10336 10338 5ed68e 10327->10338 10329 5eb757 __dosmaperr 14 API calls 10331 5ee203 10329->10331 10330 5ee1e3 FlushFileBuffers 10330->10331 10332 5ee1ef GetLastError 10330->10332 10351 5ee232 10331->10351 10334 5eb76a __dosmaperr 14 API calls 10332->10334 10334->10336 10336->10329 10337->10327 10339 5ed69b 10338->10339 10341 5ed6b0 10338->10341 10340 5eb76a __dosmaperr 14 API calls 10339->10340 10343 5ed6a0 10340->10343 10342 5eb76a __dosmaperr 14 API calls 10341->10342 10346 5ed6d5 10341->10346 10344 5ed6e0 10342->10344 10345 5eb757 __dosmaperr 14 API calls 10343->10345 10347 5eb757 __dosmaperr 14 API calls 10344->10347 10348 5ed6a8 10345->10348 10346->10330 10349 5ed6e8 10347->10349 10348->10330 10350 5e7d69 __strnicoll 48 API calls 10349->10350 10350->10348 10352 5ed8fa ___scrt_uninitialize_crt LeaveCriticalSection 10351->10352 10353 5ee21b 10352->10353 10353->10282 10354->10258 10355->10241 10739 5e5610 10740 5e5618 10739->10740 10758 5e82ea 10740->10758 10742 5e5623 10765 5e50f0 10742->10765 10744 5e5444 4 API calls 10746 5e56ba 10744->10746 10745 5e5638 __RTC_Initialize 10756 5e5695 10745->10756 10771 5e4f6a 10745->10771 10748 5e5651 10774 5e73a5 10748->10774 10752 5e5667 10807 5e5933 10752->10807 10754 5e568a 10813 5e72a4 10754->10813 10756->10744 10757 5e56b2 10756->10757 10759 5e831c 10758->10759 10760 5e82f9 10758->10760 10759->10742 10760->10759 10761 5eb757 __dosmaperr 14 API calls 10760->10761 10762 5e830c 10761->10762 10763 5e7d69 __strnicoll 48 API calls 10762->10763 10764 5e8317 10763->10764 10764->10742 10766 5e50fc 10765->10766 10767 5e5100 10765->10767 10766->10745 10768 5e5444 4 API calls 10767->10768 10770 5e510d ___scrt_release_startup_lock 10767->10770 10769 5e5176 10768->10769 10770->10745 10820 5e4f7f 10771->10820 10775 5e73ff 10774->10775 10776 5e7437 10775->10776 10777 5e7421 10775->10777 10798 5e565c 10775->10798 10778 5ea880 58 API calls 10776->10778 10779 5eb757 __dosmaperr 14 API calls 10777->10779 10780 5e743d 10778->10780 10782 5e7426 10779->10782 10855 5eca78 GetModuleFileNameW 10780->10855 10784 5e7d69 __strnicoll 48 API calls 10782->10784 10784->10798 10789 5e7499 10791 5eb757 __dosmaperr 14 API calls 10789->10791 10790 5e74a5 10792 5e753c 48 API calls 10790->10792 10793 5e749e 10791->10793 10794 5e74bb 10792->10794 10796 5eb0cb __freea 14 API calls 10793->10796 10794->10793 10795 5e74df 10794->10795 10877 5ec24a 10795->10877 10796->10798 10798->10756 10806 5e5918 InitializeSListHead 10798->10806 10800 5e74f6 10802 5eb0cb __freea 14 API calls 10800->10802 10801 5e7500 10804 5eb0cb __freea 14 API calls 10801->10804 10803 5e74fe 10802->10803 10805 5eb0cb __freea 14 API calls 10803->10805 10804->10803 10805->10798 10806->10752 11104 5e76b0 10807->11104 10809 5e5944 10810 5e594b 10809->10810 10811 5e5444 4 API calls 10809->10811 10810->10754 10812 5e5953 10811->10812 10814 5ea00a _unexpected 48 API calls 10813->10814 10816 5e72af 10814->10816 10815 5e72e7 10815->10756 10816->10815 10817 5eb757 __dosmaperr 14 API calls 10816->10817 10818 5e72dc 10817->10818 10819 5e7d69 __strnicoll 48 API calls 10818->10819 10819->10815 10821 5e4f8e 10820->10821 10822 5e4f95 10820->10822 10826 5e77a9 10821->10826 10829 5e7738 10822->10829 10825 5e4f75 10825->10748 10827 5e7738 51 API calls 10826->10827 10828 5e77bb 10827->10828 10828->10825 10832 5e799b 10829->10832 10833 5e79a7 __FrameHandler3::FrameUnwindToState 10832->10833 10840 5e8161 EnterCriticalSection 10833->10840 10835 5e79b5 10841 5e77bf 10835->10841 10837 5e79c2 10851 5e79ea 10837->10851 10840->10835 10842 5e77da 10841->10842 10843 5e784d _unexpected 10841->10843 10842->10843 10844 5e782d 10842->10844 10845 5ed0c4 51 API calls 10842->10845 10843->10837 10844->10843 10846 5ed0c4 51 API calls 10844->10846 10847 5e7823 10845->10847 10848 5e7843 10846->10848 10849 5eb0cb __freea 14 API calls 10847->10849 10850 5eb0cb __freea 14 API calls 10848->10850 10849->10844 10850->10843 10854 5e8178 LeaveCriticalSection 10851->10854 10853 5e7769 10853->10825 10854->10853 10856 5ecab8 10855->10856 10857 5ecaa7 GetLastError 10855->10857 10859 5ec274 48 API calls 10856->10859 10858 5eb77d __dosmaperr 14 API calls 10857->10858 10861 5ecab3 10858->10861 10860 5ecae9 10859->10860 10903 5ecb54 10860->10903 10863 5e4241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 10861->10863 10864 5e7450 10863->10864 10865 5e753c 10864->10865 10867 5e7562 10865->10867 10869 5e75c0 10867->10869 10931 5ecc16 10867->10931 10868 5e7483 10871 5e73b0 10868->10871 10869->10868 10870 5ecc16 48 API calls 10869->10870 10870->10869 10872 5e73f3 10871->10872 10873 5e73c1 10871->10873 10872->10789 10872->10790 10873->10872 10874 5eb807 _unexpected 14 API calls 10873->10874 10875 5e73ea 10874->10875 10876 5eb0cb __freea 14 API calls 10875->10876 10876->10872 10878 5ec365 10877->10878 10879 5ec375 10878->10879 10889 5ec38b _strpbrk 10878->10889 10880 5eb757 __dosmaperr 14 API calls 10879->10880 10881 5ec37a 10880->10881 10882 5e7d69 __strnicoll 48 API calls 10881->10882 10895 5e74ee 10882->10895 10883 5ec3f6 10883->10883 10884 5e73b0 14 API calls 10883->10884 10885 5ec439 10884->10885 10888 5ec442 10885->10888 10896 5ec458 10885->10896 10892 5eb0cb __freea 14 API calls 10888->10892 10889->10883 10890 5ec40a 10889->10890 10937 5ec72a 10889->10937 10989 5ec7db 10889->10989 11025 5ec67e 10890->11025 10891 5ec4b8 10894 5eb0cb __freea 14 API calls 10891->10894 10892->10890 10897 5ec4c5 10894->10897 10895->10800 10895->10801 10896->10891 10896->10896 10900 5ec4d5 10896->10900 11031 5ef42e 10896->11031 10898 5ec67e 14 API calls 10897->10898 10898->10895 10901 5e7d96 __strnicoll 11 API calls 10900->10901 10902 5ec4e1 10901->10902 10904 5ecb70 10903->10904 10919 5ecb61 10903->10919 10905 5ecb9d 10904->10905 10906 5ecb78 10904->10906 10907 5ed131 ___scrt_uninitialize_crt WideCharToMultiByte 10905->10907 10906->10919 10924 5ecb19 10906->10924 10909 5ecbad 10907->10909 10910 5ecbca 10909->10910 10911 5ecbb4 GetLastError 10909->10911 10912 5ecbdb 10910->10912 10914 5ecb19 14 API calls 10910->10914 10913 5eb77d __dosmaperr 14 API calls 10911->10913 10912->10919 10928 5ec594 10912->10928 10916 5ecbc0 10913->10916 10914->10912 10917 5eb757 __dosmaperr 14 API calls 10916->10917 10917->10919 10919->10861 10920 5ecbf5 GetLastError 10921 5eb77d __dosmaperr 14 API calls 10920->10921 10922 5ecc01 10921->10922 10923 5eb757 __dosmaperr 14 API calls 10922->10923 10923->10919 10925 5ecb24 10924->10925 10926 5eb757 __dosmaperr 14 API calls 10925->10926 10927 5ecb2d 10926->10927 10927->10919 10929 5ed131 ___scrt_uninitialize_crt WideCharToMultiByte 10928->10929 10930 5ec5b1 10929->10930 10930->10919 10930->10920 10934 5ecc2e 10931->10934 10935 5ea8c8 __strnicoll 48 API calls 10934->10935 10936 5ecc29 10935->10936 10936->10867 10938 5ec736 10937->10938 10938->10938 10939 5ec74f 10938->10939 10940 5eb807 _unexpected 14 API calls 10938->10940 10939->10889 10941 5ec764 10940->10941 10942 5ec777 10941->10942 10943 5ef42e 48 API calls 10941->10943 10944 5ef42e 48 API calls 10942->10944 10946 5ec7ce 10942->10946 10943->10942 10945 5ec790 10944->10945 10945->10946 10947 5ec797 10945->10947 10948 5e7d96 __strnicoll 11 API calls 10946->10948 11040 5ec6a3 10947->11040 10955 5ec7da 10948->10955 10951 5ec7b0 10954 5eb0cb __freea 14 API calls 10951->10954 10952 5ec822 10956 5ec84e 10952->10956 10957 5ec83b 10952->10957 10953 5eb0cb __freea 14 API calls 10953->10951 10954->10939 10955->10952 11051 5ef530 10955->11051 10959 5ec274 48 API calls 10956->10959 10958 5ec72a 56 API calls 10957->10958 10988 5ec846 10958->10988 10961 5ec8a2 10959->10961 10963 5ec30c 17 API calls 10961->10963 10962 5e4241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 10964 5eca5e 10962->10964 10965 5ec8b0 FindFirstFileExW 10963->10965 10964->10889 10966 5ec8d8 10965->10966 10979 5ec906 10965->10979 10967 5ec72a 56 API calls 10966->10967 10969 5ec8e6 10967->10969 10968 5ec274 48 API calls 10968->10979 10970 5eb0cb __freea 14 API calls 10969->10970 10969->10988 10970->10988 10972 5ec72a 56 API calls 10972->10979 10973 5ec9b7 FindNextFileW 10974 5ec9cd 10973->10974 10973->10979 10977 5ec9fd FindClose 10974->10977 11077 5eef40 10974->11077 10975 5eca1c 10978 5eca30 FindClose 10975->10978 10982 5eb0cb __freea 14 API calls 10975->10982 10976 5eb0cb __freea 14 API calls 10976->10979 10981 5eca0c 10977->10981 10977->10988 10983 5eca3f 10978->10983 10978->10988 10979->10968 10979->10972 10979->10973 10979->10975 10979->10976 11054 5ec5b8 10979->11054 10986 5eb0cb __freea 14 API calls 10981->10986 10987 5eca2f 10982->10987 10984 5eb0cb __freea 14 API calls 10983->10984 10984->10988 10986->10988 10987->10978 10988->10962 10990 5ec822 10989->10990 10994 5ec805 10989->10994 10991 5ec84e 10990->10991 10992 5ec83b 10990->10992 10995 5ec274 48 API calls 10991->10995 10993 5ec72a 60 API calls 10992->10993 11024 5ec846 10993->11024 10994->10990 10996 5ef530 48 API calls 10994->10996 10997 5ec8a2 10995->10997 10996->10994 10999 5ec30c 17 API calls 10997->10999 10998 5e4241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 11000 5eca5e 10998->11000 11001 5ec8b0 FindFirstFileExW 10999->11001 11000->10889 11002 5ec8d8 11001->11002 11015 5ec906 11001->11015 11003 5ec72a 60 API calls 11002->11003 11005 5ec8e6 11003->11005 11004 5ec274 48 API calls 11004->11015 11006 5eb0cb __freea 14 API calls 11005->11006 11005->11024 11006->11024 11007 5ec5b8 18 API calls 11007->11015 11008 5ec72a 60 API calls 11008->11015 11009 5ec9b7 FindNextFileW 11010 5ec9cd 11009->11010 11009->11015 11013 5ec9fd FindClose 11010->11013 11016 5eef40 48 API calls 11010->11016 11011 5eca1c 11014 5eca30 FindClose 11011->11014 11018 5eb0cb __freea 14 API calls 11011->11018 11012 5eb0cb __freea 14 API calls 11012->11015 11017 5eca0c 11013->11017 11013->11024 11019 5eca3f 11014->11019 11014->11024 11015->11004 11015->11007 11015->11008 11015->11009 11015->11011 11015->11012 11021 5ec9fa 11016->11021 11022 5eb0cb __freea 14 API calls 11017->11022 11023 5eca2f 11018->11023 11020 5eb0cb __freea 14 API calls 11019->11020 11020->11024 11021->11013 11022->11024 11023->11014 11024->10998 11029 5ec688 11025->11029 11026 5ec698 11028 5eb0cb __freea 14 API calls 11026->11028 11027 5eb0cb __freea 14 API calls 11027->11029 11030 5ec69f 11028->11030 11029->11026 11029->11027 11030->10895 11035 5ef439 11031->11035 11032 5ef453 11033 5ef467 11032->11033 11034 5eb757 __dosmaperr 14 API calls 11032->11034 11033->10896 11036 5ef45d 11034->11036 11035->11032 11035->11033 11038 5ef48c 11035->11038 11037 5e7d69 __strnicoll 48 API calls 11036->11037 11037->11033 11038->11033 11039 5eb757 __dosmaperr 14 API calls 11038->11039 11039->11036 11041 5ec6b5 11040->11041 11042 5ec6b1 11040->11042 11043 5ec6ba 11041->11043 11044 5ec6e0 11041->11044 11042->10951 11042->10953 11045 5eb807 _unexpected 14 API calls 11043->11045 11044->11042 11046 5ed0c4 51 API calls 11044->11046 11047 5ec6c3 11045->11047 11048 5ec700 11046->11048 11049 5eb0cb __freea 14 API calls 11047->11049 11050 5eb0cb __freea 14 API calls 11048->11050 11049->11042 11050->11042 11085 5ef547 11051->11085 11053 5ef542 11053->10955 11055 5ec5c6 11054->11055 11056 5ec5e2 11054->11056 11057 5ec2f2 14 API calls 11055->11057 11058 5ec5e9 11056->11058 11059 5ec605 11056->11059 11064 5ec5d0 11057->11064 11058->11064 11099 5ec329 11058->11099 11060 5ed131 ___scrt_uninitialize_crt WideCharToMultiByte 11059->11060 11061 5ec615 11060->11061 11063 5ec61c GetLastError 11061->11063 11066 5ec632 11061->11066 11065 5eb77d __dosmaperr 14 API calls 11063->11065 11064->10979 11068 5ec628 11065->11068 11067 5ec643 11066->11067 11069 5ec329 15 API calls 11066->11069 11067->11064 11070 5ec594 WideCharToMultiByte 11067->11070 11071 5eb757 __dosmaperr 14 API calls 11068->11071 11069->11067 11072 5ec659 11070->11072 11071->11064 11072->11064 11073 5ec65d GetLastError 11072->11073 11074 5eb77d __dosmaperr 14 API calls 11073->11074 11075 5ec669 11074->11075 11076 5eb757 __dosmaperr 14 API calls 11075->11076 11076->11064 11078 5eef7a 11077->11078 11079 5eb757 __dosmaperr 14 API calls 11078->11079 11084 5eef8e 11078->11084 11080 5eef83 11079->11080 11082 5e7d69 __strnicoll 48 API calls 11080->11082 11081 5e4241 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 11083 5ec9fa 11081->11083 11082->11084 11083->10977 11084->11081 11086 5ef569 11085->11086 11087 5ef555 11085->11087 11089 5ef583 11086->11089 11090 5ef571 11086->11090 11088 5eb757 __dosmaperr 14 API calls 11087->11088 11091 5ef55a 11088->11091 11093 5ea8c8 __strnicoll 48 API calls 11089->11093 11097 5ef581 11089->11097 11092 5eb757 __dosmaperr 14 API calls 11090->11092 11094 5e7d69 __strnicoll 48 API calls 11091->11094 11095 5ef576 11092->11095 11093->11097 11098 5ef565 11094->11098 11096 5e7d69 __strnicoll 48 API calls 11095->11096 11096->11097 11097->11053 11098->11053 11100 5ec2f2 14 API calls 11099->11100 11101 5ec337 11100->11101 11102 5ec255 15 API calls 11101->11102 11103 5ec345 11102->11103 11103->11064 11105 5e76ce 11104->11105 11109 5e76ee 11104->11109 11106 5eb757 __dosmaperr 14 API calls 11105->11106 11107 5e76e4 11106->11107 11108 5e7d69 __strnicoll 48 API calls 11107->11108 11108->11109 11109->10809 11119 5e7310 11122 5e7337 11119->11122 11123 5e7343 __FrameHandler3::FrameUnwindToState 11122->11123 11130 5e8161 EnterCriticalSection 11123->11130 11125 5e734d 11126 5e737b 11125->11126 11129 5ec1fa __strnicoll 14 API calls 11125->11129 11131 5e7399 11126->11131 11129->11125 11130->11125 11134 5e8178 LeaveCriticalSection 11131->11134 11133 5e7335 11134->11133 8608 5fb18d 8613 5fb1c3 8608->8613 8609 5fb310 GetPEB 8610 5fb322 CreateProcessW VirtualAlloc Wow64GetThreadContext ReadProcessMemory VirtualAllocEx 8609->8610 8611 5fb3c9 WriteProcessMemory 8610->8611 8610->8613 8612 5fb40e 8611->8612 8614 5fb413 WriteProcessMemory 8612->8614 8615 5fb450 WriteProcessMemory Wow64SetThreadContext ResumeThread 8612->8615 8613->8609 8613->8610 8614->8612 11558 5ea2b0 11559 5ea2bb 11558->11559 11563 5ea2cb 11558->11563 11564 5ea3b5 11559->11564 11562 5eb0cb __freea 14 API calls 11562->11563 11565 5ea3ca 11564->11565 11566 5ea3d0 11564->11566 11567 5eb0cb __freea 14 API calls 11565->11567 11568 5eb0cb __freea 14 API calls 11566->11568 11567->11566 11569 5ea3dc 11568->11569 11570 5eb0cb __freea 14 API calls 11569->11570 11571 5ea3e7 11570->11571 11572 5eb0cb __freea 14 API calls 11571->11572 11573 5ea3f2 11572->11573 11574 5eb0cb __freea 14 API calls 11573->11574 11575 5ea3fd 11574->11575 11576 5eb0cb __freea 14 API calls 11575->11576 11577 5ea408 11576->11577 11578 5eb0cb __freea 14 API calls 11577->11578 11579 5ea413 11578->11579 11580 5eb0cb __freea 14 API calls 11579->11580 11581 5ea41e 11580->11581 11582 5eb0cb __freea 14 API calls 11581->11582 11583 5ea429 11582->11583 11584 5eb0cb __freea 14 API calls 11583->11584 11585 5ea437 11584->11585 11590 5ea52e 11585->11590 11591 5ea53a __FrameHandler3::FrameUnwindToState 11590->11591 11606 5e8161 EnterCriticalSection 11591->11606 11593 5ea56e 11607 5ea58d 11593->11607 11595 5ea544 11595->11593 11597 5eb0cb __freea 14 API calls 11595->11597 11597->11593 11598 5ea599 11599 5ea5a5 __FrameHandler3::FrameUnwindToState 11598->11599 11611 5e8161 EnterCriticalSection 11599->11611 11601 5ea5af 11602 5ea2d1 _unexpected 14 API calls 11601->11602 11603 5ea5c2 11602->11603 11612 5ea5e2 11603->11612 11606->11595 11610 5e8178 LeaveCriticalSection 11607->11610 11609 5ea45d 11609->11598 11610->11609 11611->11601 11615 5e8178 LeaveCriticalSection 11612->11615 11614 5ea2c3 11614->11562 11615->11614 8616 5e83ac 8619 5eb0cb 8616->8619 8620 5eb0d6 RtlFreeHeap 8619->8620 8624 5e83c4 8619->8624 8621 5eb0eb GetLastError 8620->8621 8620->8624 8622 5eb0f8 __dosmaperr 8621->8622 8625 5eb757 8622->8625 8628 5ea15b GetLastError 8625->8628 8627 5eb75c 8627->8624 8629 5ea177 8628->8629 8630 5ea171 8628->8630 8648 5ea17b SetLastError 8629->8648 8656 5e9bcf 8629->8656 8651 5e9b90 8630->8651 8637 5ea1b0 8639 5e9bcf _unexpected 6 API calls 8637->8639 8638 5ea1c1 8640 5e9bcf _unexpected 6 API calls 8638->8640 8641 5ea1be 8639->8641 8642 5ea1cd 8640->8642 8645 5eb0cb __freea 12 API calls 8641->8645 8643 5ea1e8 8642->8643 8644 5ea1d1 8642->8644 8668 5ea31c 8643->8668 8647 5e9bcf _unexpected 6 API calls 8644->8647 8645->8648 8647->8641 8648->8627 8650 5eb0cb __freea 12 API calls 8650->8648 8673 5e9e9e 8651->8673 8654 5e9bc7 TlsGetValue 8655 5e9bb5 8655->8629 8657 5e9e9e _unexpected 5 API calls 8656->8657 8658 5e9beb 8657->8658 8659 5e9c09 TlsSetValue 8658->8659 8660 5e9bf4 8658->8660 8660->8648 8661 5eb807 8660->8661 8667 5eb814 _unexpected 8661->8667 8662 5eb854 8664 5eb757 __dosmaperr 13 API calls 8662->8664 8663 5eb83f RtlAllocateHeap 8665 5ea1a8 8663->8665 8663->8667 8664->8665 8665->8637 8665->8638 8667->8662 8667->8663 8688 5e7207 8667->8688 8702 5ea482 8668->8702 8674 5e9ece 8673->8674 8678 5e9bac 8673->8678 8674->8678 8680 5e9dd3 8674->8680 8677 5e9ee8 GetProcAddress 8677->8678 8679 5e9ef8 _unexpected 8677->8679 8678->8654 8678->8655 8679->8678 8682 5e9de4 ___vcrt_FlsFree 8680->8682 8681 5e9e7a 8681->8677 8681->8678 8682->8681 8683 5e9e02 LoadLibraryExW 8682->8683 8687 5e9e50 LoadLibraryExW 8682->8687 8684 5e9e1d GetLastError 8683->8684 8685 5e9e81 8683->8685 8684->8682 8685->8681 8686 5e9e93 FreeLibrary 8685->8686 8686->8681 8687->8682 8687->8685 8691 5e7242 8688->8691 8692 5e724e __FrameHandler3::FrameUnwindToState 8691->8692 8697 5e8161 EnterCriticalSection 8692->8697 8694 5e7259 _unexpected 8698 5e7290 8694->8698 8697->8694 8701 5e8178 LeaveCriticalSection 8698->8701 8700 5e7212 8700->8667 8701->8700 8703 5ea48e __FrameHandler3::FrameUnwindToState 8702->8703 8716 5e8161 EnterCriticalSection 8703->8716 8705 5ea498 8717 5ea4c8 8705->8717 8708 5ea4d4 8709 5ea4e0 __FrameHandler3::FrameUnwindToState 8708->8709 8721 5e8161 EnterCriticalSection 8709->8721 8711 5ea4ea 8722 5ea2d1 8711->8722 8713 5ea502 8726 5ea522 8713->8726 8716->8705 8720 5e8178 LeaveCriticalSection 8717->8720 8719 5ea38a 8719->8708 8720->8719 8721->8711 8723 5ea307 __strnicoll 8722->8723 8724 5ea2e0 __strnicoll 8722->8724 8723->8713 8724->8723 8729 5ebfae 8724->8729 8843 5e8178 LeaveCriticalSection 8726->8843 8728 5ea1f3 8728->8650 8730 5ec02e 8729->8730 8734 5ebfc4 8729->8734 8731 5ec07c 8730->8731 8733 5eb0cb __freea 14 API calls 8730->8733 8797 5ec148 8731->8797 8735 5ec050 8733->8735 8734->8730 8736 5ebff7 8734->8736 8741 5eb0cb __freea 14 API calls 8734->8741 8737 5eb0cb __freea 14 API calls 8735->8737 8738 5ec019 8736->8738 8745 5eb0cb __freea 14 API calls 8736->8745 8739 5ec063 8737->8739 8740 5eb0cb __freea 14 API calls 8738->8740 8744 5eb0cb __freea 14 API calls 8739->8744 8746 5ec023 8740->8746 8743 5ebfec 8741->8743 8742 5ec08a 8747 5ec0ea 8742->8747 8756 5eb0cb 14 API calls __freea 8742->8756 8757 5eb9d5 8743->8757 8749 5ec071 8744->8749 8750 5ec00e 8745->8750 8751 5eb0cb __freea 14 API calls 8746->8751 8752 5eb0cb __freea 14 API calls 8747->8752 8754 5eb0cb __freea 14 API calls 8749->8754 8785 5ebad3 8750->8785 8751->8730 8753 5ec0f0 8752->8753 8753->8723 8754->8731 8756->8742 8758 5eb9e6 8757->8758 8784 5ebacf 8757->8784 8759 5eb9f7 8758->8759 8760 5eb0cb __freea 14 API calls 8758->8760 8761 5eba09 8759->8761 8762 5eb0cb __freea 14 API calls 8759->8762 8760->8759 8763 5eba1b 8761->8763 8764 5eb0cb __freea 14 API calls 8761->8764 8762->8761 8765 5eba2d 8763->8765 8767 5eb0cb __freea 14 API calls 8763->8767 8764->8763 8766 5eba3f 8765->8766 8768 5eb0cb __freea 14 API calls 8765->8768 8769 5eba51 8766->8769 8770 5eb0cb __freea 14 API calls 8766->8770 8767->8765 8768->8766 8771 5eba63 8769->8771 8772 5eb0cb __freea 14 API calls 8769->8772 8770->8769 8773 5eb0cb __freea 14 API calls 8771->8773 8777 5eba75 8771->8777 8772->8771 8773->8777 8774 5eb0cb __freea 14 API calls 8776 5eba87 8774->8776 8775 5eba99 8779 5ebaab 8775->8779 8780 5eb0cb __freea 14 API calls 8775->8780 8776->8775 8778 5eb0cb __freea 14 API calls 8776->8778 8777->8774 8777->8776 8778->8775 8781 5ebabd 8779->8781 8782 5eb0cb __freea 14 API calls 8779->8782 8780->8779 8783 5eb0cb __freea 14 API calls 8781->8783 8781->8784 8782->8781 8783->8784 8784->8736 8786 5ebae0 8785->8786 8796 5ebb38 8785->8796 8787 5eb0cb __freea 14 API calls 8786->8787 8789 5ebaf0 8786->8789 8787->8789 8788 5ebb02 8791 5ebb14 8788->8791 8792 5eb0cb __freea 14 API calls 8788->8792 8789->8788 8790 5eb0cb __freea 14 API calls 8789->8790 8790->8788 8793 5ebb26 8791->8793 8794 5eb0cb __freea 14 API calls 8791->8794 8792->8791 8795 5eb0cb __freea 14 API calls 8793->8795 8793->8796 8794->8793 8795->8796 8796->8738 8798 5ec174 8797->8798 8799 5ec155 8797->8799 8798->8742 8799->8798 8803 5ebb3c 8799->8803 8802 5eb0cb __freea 14 API calls 8802->8798 8804 5ebc1a 8803->8804 8805 5ebb4d 8803->8805 8804->8802 8839 5ebc20 8805->8839 8808 5ebc20 __strnicoll 14 API calls 8809 5ebb60 8808->8809 8810 5ebc20 __strnicoll 14 API calls 8809->8810 8811 5ebb6b 8810->8811 8812 5ebc20 __strnicoll 14 API calls 8811->8812 8813 5ebb76 8812->8813 8814 5ebc20 __strnicoll 14 API calls 8813->8814 8815 5ebb84 8814->8815 8816 5eb0cb __freea 14 API calls 8815->8816 8817 5ebb8f 8816->8817 8818 5eb0cb __freea 14 API calls 8817->8818 8819 5ebb9a 8818->8819 8820 5eb0cb __freea 14 API calls 8819->8820 8821 5ebba5 8820->8821 8822 5ebc20 __strnicoll 14 API calls 8821->8822 8823 5ebbb3 8822->8823 8824 5ebc20 __strnicoll 14 API calls 8823->8824 8825 5ebbc1 8824->8825 8826 5ebc20 __strnicoll 14 API calls 8825->8826 8827 5ebbd2 8826->8827 8828 5ebc20 __strnicoll 14 API calls 8827->8828 8829 5ebbe0 8828->8829 8830 5ebc20 __strnicoll 14 API calls 8829->8830 8831 5ebbee 8830->8831 8832 5eb0cb __freea 14 API calls 8831->8832 8833 5ebbf9 8832->8833 8834 5eb0cb __freea 14 API calls 8833->8834 8835 5ebc04 8834->8835 8836 5eb0cb __freea 14 API calls 8835->8836 8837 5ebc0f 8836->8837 8838 5eb0cb __freea 14 API calls 8837->8838 8838->8804 8842 5ebc32 8839->8842 8840 5ebb55 8840->8808 8841 5eb0cb __freea 14 API calls 8841->8842 8842->8840 8842->8841 8843->8728 11650 5eaca2 11653 5e8178 LeaveCriticalSection 11650->11653 11652 5eaca9 11653->11652

                  Control-flow Graph

                  APIs
                  • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,005FB0FF,005FB0EF), ref: 005FB323
                  • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 005FB336
                  • Wow64GetThreadContext.KERNEL32(00000094,00000000), ref: 005FB354
                  • ReadProcessMemory.KERNELBASE(0000008C,?,005FB143,00000004,00000000), ref: 005FB378
                  • VirtualAllocEx.KERNELBASE(0000008C,?,?,00003000,00000040), ref: 005FB3A3
                  • WriteProcessMemory.KERNELBASE(0000008C,00000000,?,?,00000000,?), ref: 005FB3FB
                  • WriteProcessMemory.KERNELBASE(0000008C,00400000,?,?,00000000,?,00000028), ref: 005FB446
                  • WriteProcessMemory.KERNELBASE(0000008C,?,?,00000004,00000000), ref: 005FB484
                  • Wow64SetThreadContext.KERNEL32(00000094,026E0000), ref: 005FB4C0
                  • ResumeThread.KERNELBASE(00000094), ref: 005FB4CF
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2049480653.00000000005FB000.00000040.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                  • Associated: 00000000.00000002.2049420233.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049437730.00000000005D1000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049464797.00000000005F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049494614.00000000005FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049510062.00000000005FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049522611.0000000000601000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5d0000_xLauncher.jbxd
                  Similarity
                  • API ID: Process$Memory$ThreadWrite$AllocContextVirtualWow64$CreateReadResume
                  • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe$CreateProcessW$GetP$GetThreadContext$Load$ReadProcessMemory$ResumeThread$SetThreadContext$TerminateProcess$VirtualAlloc$VirtualAllocEx$WriteProcessMemory$aryA$ress
                  • API String ID: 2687962208-3857624555
                  • Opcode ID: 4d4c1a7e65f8d0d38951af6025ef960edc15c7aa7ffa2998c2434409f37e51df
                  • Instruction ID: 9f5dc0c075964b9ddd367795fada2ef7c22129296bbb31f9c83e155664a58fba
                  • Opcode Fuzzy Hash: 4d4c1a7e65f8d0d38951af6025ef960edc15c7aa7ffa2998c2434409f37e51df
                  • Instruction Fuzzy Hash: 0BB1067664024AEFDB60CF68CC80BEA77A5FF88714F158524EA08AB341C774FA41CB94
                  Memory Dump Source
                  • Source File: 00000000.00000002.2049437730.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                  • Associated: 00000000.00000002.2049420233.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049464797.00000000005F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049480653.00000000005FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049494614.00000000005FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049510062.00000000005FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049522611.0000000000601000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5d0000_xLauncher.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: efd4e2fb6295a3a0d0d41d980f6ebd4a0c8ff70dda52f7e3e401d8d6beec9c5a
                  • Instruction ID: ed5207c11397f82f8f9bed5d70dd52f6f75462a698b2f417a43e34a18a1ac9ff
                  • Opcode Fuzzy Hash: efd4e2fb6295a3a0d0d41d980f6ebd4a0c8ff70dda52f7e3e401d8d6beec9c5a
                  • Instruction Fuzzy Hash: 520119749042098FCB14DF69C885AD9FBF0FB58710F0084A9A88897340EB78AA84CF85

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 26 5e9dd3-5e9ddf 27 5e9e71-5e9e74 26->27 28 5e9e7a 27->28 29 5e9de4-5e9df5 27->29 30 5e9e7c-5e9e80 28->30 31 5e9df7-5e9dfa 29->31 32 5e9e02-5e9e1b LoadLibraryExW 29->32 33 5e9e9a-5e9e9c 31->33 34 5e9e00 31->34 35 5e9e1d-5e9e26 GetLastError 32->35 36 5e9e81-5e9e91 32->36 33->30 40 5e9e6e 34->40 37 5e9e5f-5e9e6c 35->37 38 5e9e28-5e9e3a call 5ebc93 35->38 36->33 39 5e9e93-5e9e94 FreeLibrary 36->39 37->40 38->37 43 5e9e3c-5e9e4e call 5ebc93 38->43 39->33 40->27 43->37 46 5e9e50-5e9e5d LoadLibraryExW 43->46 46->36 46->37
                  APIs
                  • FreeLibrary.KERNEL32(00000000,?,00000000,00000800,00000000,?,?,3937B924,?,005E9EE2,?,?,00000000), ref: 005E9E94
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2049437730.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                  • Associated: 00000000.00000002.2049420233.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049464797.00000000005F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049480653.00000000005FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049494614.00000000005FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049510062.00000000005FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049522611.0000000000601000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5d0000_xLauncher.jbxd
                  Similarity
                  • API ID: FreeLibrary
                  • String ID: api-ms-$ext-ms-
                  • API String ID: 3664257935-537541572
                  • Opcode ID: 2756dce777b8b029ffdfa24e6bc82efec147e9ade835c4abf201e4abaf49e0f4
                  • Instruction ID: cd89f6ae2a5de22670eba049624d3ba9fca4518b41e8b759029c13a93f82d93c
                  • Opcode Fuzzy Hash: 2756dce777b8b029ffdfa24e6bc82efec147e9ade835c4abf201e4abaf49e0f4
                  • Instruction Fuzzy Hash: 3A212B31A00292ABDB25CB26DC44B6A3F5CBFA1760F250120EE85E7291D734ED05D6E0

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 47 5dbeb0-5dbf22 CreateFileA 48 5dbf29-5dbf37 47->48 49 5dbf3d-5dbf4a 48->49 50 5dbff2-5dc00c 48->50 53 5dc021-5dc054 GetFileSize 49->53 54 5dbf50-5dbf5d 49->54 52 5dc16a 50->52 52->48 53->52 56 5dc078-5dc0ce call 5e4233 ReadFile 54->56 57 5dbf63-5dbf70 54->57 56->52 60 5dbf76-5dbf83 57->60 61 5dc011-5dc01c 57->61 64 5dc12c-5dc146 CloseHandle 60->64 65 5dbf89-5dbf96 60->65 61->52 64->52 67 5dbf9c-5dbfa9 65->67 68 5dc0f6-5dc108 call 5e423c 65->68 72 5dbfaf-5dbfbc 67->72 73 5dc0d3-5dc0f1 67->73 68->52 75 5dc059-5dc073 CloseHandle 72->75 76 5dbfc2-5dbfcf 72->76 73->52 75->52 78 5dc14b-5dc169 call 5e4241 76->78 79 5dbfd5-5dbfe2 76->79 82 5dc10d-5dc127 CloseHandle 79->82 83 5dbfe8-5dbfed 79->83 82->52 83->52
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2049437730.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                  • Associated: 00000000.00000002.2049420233.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049464797.00000000005F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049480653.00000000005FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049494614.00000000005FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049510062.00000000005FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049522611.0000000000601000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5d0000_xLauncher.jbxd
                  Similarity
                  • API ID: CreateFile
                  • String ID:
                  • API String ID: 823142352-0
                  • Opcode ID: 4a279122699fd7aee5755513712cd3812636a18abbc2d4f6cfd86047d2d9bb45
                  • Instruction ID: e2d00a8969be4baac6d00a70d635760ab5ba8fc068baee88c36584f52d2f2aef
                  • Opcode Fuzzy Hash: 4a279122699fd7aee5755513712cd3812636a18abbc2d4f6cfd86047d2d9bb45
                  • Instruction Fuzzy Hash: FC7112B490420ADFDB14DFACD5586AEBFF0BB48700F20891BE846AB350D7389945DF92

                  Control-flow Graph

                  APIs
                  • CreateThread.KERNELBASE(?,?,Function_00016E00,00000000,?,?), ref: 005E6D2F
                  • GetLastError.KERNEL32(?,00000000,00000000,?,005E3BEA), ref: 005E6D3B
                  • __dosmaperr.LIBCMT ref: 005E6D42
                  Memory Dump Source
                  • Source File: 00000000.00000002.2049437730.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                  • Associated: 00000000.00000002.2049420233.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049464797.00000000005F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049480653.00000000005FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049494614.00000000005FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049510062.00000000005FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049522611.0000000000601000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5d0000_xLauncher.jbxd
                  Similarity
                  • API ID: CreateErrorLastThread__dosmaperr
                  • String ID:
                  • API String ID: 2744730728-0
                  • Opcode ID: 84bb18ac9a17e571a0ba047e4dd73657477ae74c5cda2eeeb8ef93c51a14c596
                  • Instruction ID: f83dc27f109a574048e15b5957c2d6471d3037ea911160ed07048ba1acb8982b
                  • Opcode Fuzzy Hash: 84bb18ac9a17e571a0ba047e4dd73657477ae74c5cda2eeeb8ef93c51a14c596
                  • Instruction Fuzzy Hash: E601807260029AABDF199FA2DD09AAF3F65FFA03E5F100058F84196190DB70DE10DB90

                  Control-flow Graph

                  APIs
                  • GetCurrentProcess.KERNEL32(00000002,?,005E70B1,005E83A0,005E83A0,?,00000002,3937B924,005E83A0,00000002), ref: 005E7000
                  • TerminateProcess.KERNEL32(00000000,?,005E70B1,005E83A0,005E83A0,?,00000002,3937B924,005E83A0,00000002), ref: 005E7007
                  • ExitProcess.KERNEL32 ref: 005E7019
                  Memory Dump Source
                  • Source File: 00000000.00000002.2049437730.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                  • Associated: 00000000.00000002.2049420233.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049464797.00000000005F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049480653.00000000005FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049494614.00000000005FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049510062.00000000005FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049522611.0000000000601000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5d0000_xLauncher.jbxd
                  Similarity
                  • API ID: Process$CurrentExitTerminate
                  • String ID:
                  • API String ID: 1703294689-0
                  • Opcode ID: 3766d271bb0fa81e9c1eb043d2e62de1318a682fadba86b4ca68d5d160b06be2
                  • Instruction ID: b92e9d649ed419c4c361272a9e9bad969df11212524d592735577ad31cd9b9ed
                  • Opcode Fuzzy Hash: 3766d271bb0fa81e9c1eb043d2e62de1318a682fadba86b4ca68d5d160b06be2
                  • Instruction Fuzzy Hash: 39D09E31004549BFCF153F61EC4DA9D3F2ABF64391B044410B95986175DB39DD5AEB90

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 113 5e41c6-5e41c9 114 5e41d8-5e41db call 5e83c7 113->114 116 5e41e0-5e41e3 114->116 117 5e41cb-5e41d6 call 5e7207 116->117 118 5e41e5-5e41e6 116->118 117->114 121 5e41e7-5e41eb 117->121 122 5e49c2-5e49f2 call 5e1040 call 5e59fc IsProcessorFeaturePresent 121->122 123 5e41f1-5e49c1 call 5e482e call 5e59fc 121->123 134 5e49f9-5e4ad8 call 5e4ad9 122->134 135 5e49f4-5e49f7 122->135 123->122 135->134
                  APIs
                  • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 005E49EA
                  • ___raise_securityfailure.LIBCMT ref: 005E4AD2
                    • Part of subcall function 005E59FC: RaiseException.KERNEL32(E06D7363,00000001,00000003,005E49DE,3937B924,?,?,?,005E49DE,?,005F9B2C), ref: 005E5A5C
                  Memory Dump Source
                  • Source File: 00000000.00000002.2049437730.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                  • Associated: 00000000.00000002.2049420233.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049464797.00000000005F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049480653.00000000005FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049494614.00000000005FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049510062.00000000005FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049522611.0000000000601000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5d0000_xLauncher.jbxd
                  Similarity
                  • API ID: ExceptionFeaturePresentProcessorRaise___raise_securityfailure
                  • String ID:
                  • API String ID: 3749517692-0
                  • Opcode ID: d2f5f77e59fd9d025d58292719f2c07fea41ef8758a57ad8ab2305067c9619cf
                  • Instruction ID: aad4764500013aed4520ac4df7b23f21f8499d368b06208121f20097c292b134
                  • Opcode Fuzzy Hash: d2f5f77e59fd9d025d58292719f2c07fea41ef8758a57ad8ab2305067c9619cf
                  • Instruction Fuzzy Hash: 8A3170B450030D9FDB08EF26FE4A6757FA8BB68314F10413AE908CA2A1E778A54CDF44

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 138 5ea732-5ea737 139 5ea739-5ea751 138->139 140 5ea75f-5ea768 139->140 141 5ea753-5ea757 139->141 143 5ea77a 140->143 144 5ea76a-5ea76d 140->144 141->140 142 5ea759-5ea75d 141->142 145 5ea7d4-5ea7d8 142->145 148 5ea77c-5ea789 GetStdHandle 143->148 146 5ea76f-5ea774 144->146 147 5ea776-5ea778 144->147 145->139 151 5ea7de-5ea7e1 145->151 146->148 147->148 149 5ea78b-5ea78d 148->149 150 5ea7b6-5ea7c8 148->150 149->150 152 5ea78f-5ea798 GetFileType 149->152 150->145 153 5ea7ca-5ea7cd 150->153 152->150 154 5ea79a-5ea7a3 152->154 153->145 155 5ea7ab-5ea7ae 154->155 156 5ea7a5-5ea7a9 154->156 155->145 157 5ea7b0-5ea7b4 155->157 156->145 157->145
                  APIs
                  • GetStdHandle.KERNEL32(000000F6,?,?,?,?,?,?,?,00000000,005EA621,005FA088,0000000C), ref: 005EA77E
                  • GetFileType.KERNELBASE(00000000,?,?,?,?,?,?,?,00000000,005EA621,005FA088,0000000C), ref: 005EA790
                  Memory Dump Source
                  • Source File: 00000000.00000002.2049437730.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                  • Associated: 00000000.00000002.2049420233.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049464797.00000000005F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049480653.00000000005FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049494614.00000000005FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049510062.00000000005FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049522611.0000000000601000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5d0000_xLauncher.jbxd
                  Similarity
                  • API ID: FileHandleType
                  • String ID:
                  • API String ID: 3000768030-0
                  • Opcode ID: c872b383b35801cf58896a55631327086aef98a41321b3879f8ce6be423fc373
                  • Instruction ID: 4fc7347a58030d6089091db77a96513d8e2a61a4577e4e5ea284c3a1a302f865
                  • Opcode Fuzzy Hash: c872b383b35801cf58896a55631327086aef98a41321b3879f8ce6be423fc373
                  • Instruction Fuzzy Hash: 651163B15047D14ACB38CA3F8C886226EA5FB56331B240759E5E6C65F2D634E88AE643

                  Control-flow Graph

                  APIs
                  • GetLastError.KERNEL32(005F9D20,0000000C), ref: 005E6E13
                  • ExitThread.KERNEL32 ref: 005E6E1A
                  Memory Dump Source
                  • Source File: 00000000.00000002.2049437730.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                  • Associated: 00000000.00000002.2049420233.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049464797.00000000005F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049480653.00000000005FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049494614.00000000005FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049510062.00000000005FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049522611.0000000000601000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5d0000_xLauncher.jbxd
                  Similarity
                  • API ID: ErrorExitLastThread
                  • String ID:
                  • API String ID: 1611280651-0
                  • Opcode ID: 4fd95ff846a690b326ff33ce4d5b066a2d8d480387f8fe50cac405b1b850226f
                  • Instruction ID: 9006bbd901a3aa0e24fd641f36d53f15fae80a4cd5fc3ade8e430d3fd82eb58d
                  • Opcode Fuzzy Hash: 4fd95ff846a690b326ff33ce4d5b066a2d8d480387f8fe50cac405b1b850226f
                  • Instruction Fuzzy Hash: 40F0C271A00646AFDB09AFB1C84EB3E3F75FF90740F204549F045972A2DB345901DB91

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 178 5eb0cb-5eb0d4 179 5eb0d6-5eb0e9 RtlFreeHeap 178->179 180 5eb103-5eb104 178->180 179->180 181 5eb0eb-5eb102 GetLastError call 5eb7a0 call 5eb757 179->181 181->180
                  APIs
                  • RtlFreeHeap.NTDLL(00000000,00000000,?,005EBC39,?,00000000,?,?,005EBB55,?,00000007,?,?,005EC16E,?,?), ref: 005EB0E1
                  • GetLastError.KERNEL32(?,?,005EBC39,?,00000000,?,?,005EBB55,?,00000007,?,?,005EC16E,?,?), ref: 005EB0EC
                  Memory Dump Source
                  • Source File: 00000000.00000002.2049437730.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                  • Associated: 00000000.00000002.2049420233.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049464797.00000000005F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049480653.00000000005FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049494614.00000000005FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049510062.00000000005FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049522611.0000000000601000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5d0000_xLauncher.jbxd
                  Similarity
                  • API ID: ErrorFreeHeapLast
                  • String ID:
                  • API String ID: 485612231-0
                  • Opcode ID: 6663d5ce6ce8b48559052c0172da74957e96b17b8bbf7dfeaa1256816860bb24
                  • Instruction ID: 67d98d01d91de41e3f5188f0bec914d9dd2a674577c5edced60370b2bdaa715d
                  • Opcode Fuzzy Hash: 6663d5ce6ce8b48559052c0172da74957e96b17b8bbf7dfeaa1256816860bb24
                  • Instruction Fuzzy Hash: 09E0867150064867DB192FA5FD0DB6A3E5CFBD4352F000020F648C6461D7348940D784

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 263 5ea00a-5ea01e GetLastError 264 5ea03a-5ea044 call 5e9bcf 263->264 265 5ea020-5ea028 call 5e9b90 263->265 272 5ea04a-5ea052 call 5eb807 264->272 273 5ea046-5ea048 264->273 270 5ea02a-5ea033 265->270 271 5ea035 265->271 274 5ea0af-5ea0b8 SetLastError 270->274 271->264 276 5ea057-5ea05d 272->276 273->274 277 5ea0bf-5ea0c4 call 5e835d 274->277 278 5ea0ba-5ea0be 274->278 279 5ea05f-5ea06e call 5e9bcf 276->279 280 5ea070-5ea07e call 5e9bcf 276->280 287 5ea08f-5ea095 call 5eb0cb 279->287 288 5ea097-5ea0ac call 5ea31c call 5eb0cb 280->288 289 5ea080-5ea08e call 5e9bcf 280->289 297 5ea0ae 287->297 288->297 289->287 297->274
                  APIs
                  • GetLastError.KERNEL32(?,?,005E6E25,005F9D20,0000000C), ref: 005EA00E
                  • SetLastError.KERNEL32(00000000), ref: 005EA0B0
                  Memory Dump Source
                  • Source File: 00000000.00000002.2049437730.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                  • Associated: 00000000.00000002.2049420233.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049464797.00000000005F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049480653.00000000005FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049494614.00000000005FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049510062.00000000005FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049522611.0000000000601000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5d0000_xLauncher.jbxd
                  Similarity
                  • API ID: ErrorLast
                  • String ID:
                  • API String ID: 1452528299-0
                  • Opcode ID: 10901f6edcb0e29c954f5bd7b8522cab9f81f618c0080a852728882254d7cf05
                  • Instruction ID: b9bcf9f89c8161414fe788551789030b0b2d45567bff1a5f94d685b5897fb62b
                  • Opcode Fuzzy Hash: 10901f6edcb0e29c954f5bd7b8522cab9f81f618c0080a852728882254d7cf05
                  • Instruction Fuzzy Hash: FF11C631604297AEA6293F77AC8EE373E8CBB907A57100524F594C20A6FF54AC099192

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 299 5e3b60-5e3be5 call 5de940 call 5e3cc0 call 5e3dc0 call 5e6ce6 307 5e3bea-5e3bf7 299->307 308 5e3bfe-5e3c0c 307->308 309 5e3c55-5e3c6b 308->309 310 5e3c12-5e3c1f 308->310 311 5e3cb5 309->311 313 5e3c84-5e3c95 call 5e441d 310->313 314 5e3c25-5e3c32 310->314 311->308 317 5e3c9a-5e3cb2 call 5e3e30 call 5e4241 313->317 314->317 318 5e3c38-5e3c45 314->318 321 5e3c4b-5e3c50 318->321 322 5e3c70-5e3c7f call 5e3de0 318->322 321->311 322->311
                  Memory Dump Source
                  • Source File: 00000000.00000002.2049437730.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                  • Associated: 00000000.00000002.2049420233.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049464797.00000000005F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049480653.00000000005FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049494614.00000000005FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049510062.00000000005FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049522611.0000000000601000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5d0000_xLauncher.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 9ce3bb8a087aab0f64e4e7c138e1fe40c901460bb408a629839ec54d796d4549
                  • Instruction ID: cc33719a336e068259c0bb05eb118a93b2237a8295c9f1921936965d05369add
                  • Opcode Fuzzy Hash: 9ce3bb8a087aab0f64e4e7c138e1fe40c901460bb408a629839ec54d796d4549
                  • Instruction Fuzzy Hash: F731ECB4D042499BCB08DFAAC5986ADBFF0FF48300F10886AE49AAB350D7359E04DF55

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 329 5e9e9e-5e9ec8 330 5e9ece-5e9ed0 329->330 331 5e9eca-5e9ecc 329->331 333 5e9ed6-5e9edd call 5e9dd3 330->333 334 5e9ed2-5e9ed4 330->334 332 5e9f1f-5e9f22 331->332 336 5e9ee2-5e9ee6 333->336 334->332 337 5e9ee8-5e9ef6 GetProcAddress 336->337 338 5e9f05-5e9f1c 336->338 337->338 340 5e9ef8-5e9f03 call 5e6ad0 337->340 339 5e9f1e 338->339 339->332 340->339
                  Memory Dump Source
                  • Source File: 00000000.00000002.2049437730.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                  • Associated: 00000000.00000002.2049420233.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049464797.00000000005F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049480653.00000000005FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049494614.00000000005FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049510062.00000000005FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049522611.0000000000601000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5d0000_xLauncher.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 5bb5083cbde93d6b3e95136ff1d198cd42e7bc34705a1656c515e59c10644626
                  • Instruction ID: 96c65578c9e8b6b0523f1019b3ce529d177ccb8d5f254c514643743284eb24fd
                  • Opcode Fuzzy Hash: 5bb5083cbde93d6b3e95136ff1d198cd42e7bc34705a1656c515e59c10644626
                  • Instruction Fuzzy Hash: 03012D336042559F9F0ACF6BEC44A2A7B69FBD03607284124F654CB155FB34D808D7D0

                  Control-flow Graph

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2049437730.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                  • Associated: 00000000.00000002.2049420233.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049464797.00000000005F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049480653.00000000005FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049494614.00000000005FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049510062.00000000005FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049522611.0000000000601000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5d0000_xLauncher.jbxd
                  Similarity
                  • API ID: CreateElliptic
                  • String ID:
                  • API String ID: 1611293138-0
                  • Opcode ID: 865fc532ebadc7229e688af879b10611ee0cef5640e36600e9868c2005876260
                  • Instruction ID: 06627d44c3de78883601b37416ef892aaf991b89e61cbc56278eda4a98f9df7e
                  • Opcode Fuzzy Hash: 865fc532ebadc7229e688af879b10611ee0cef5640e36600e9868c2005876260
                  • Instruction Fuzzy Hash: 3611D6B4D002099BDB04EFA9C4597AEBBF5FF88304F40881AD855A7350EB786608CB91

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 352 5eb807-5eb812 353 5eb814-5eb81e 352->353 354 5eb820-5eb826 352->354 353->354 355 5eb854-5eb85f call 5eb757 353->355 356 5eb83f-5eb850 RtlAllocateHeap 354->356 357 5eb828-5eb829 354->357 362 5eb861-5eb863 355->362 358 5eb82b-5eb832 call 5e8327 356->358 359 5eb852 356->359 357->356 358->355 365 5eb834-5eb83d call 5e7207 358->365 359->362 365->355 365->356
                  APIs
                  • RtlAllocateHeap.NTDLL(00000008,?,?,?,005EA057,00000001,00000364,?,00000006,000000FF,?,005E6E25,005F9D20,0000000C), ref: 005EB848
                  Memory Dump Source
                  • Source File: 00000000.00000002.2049437730.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                  • Associated: 00000000.00000002.2049420233.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049464797.00000000005F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049480653.00000000005FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049494614.00000000005FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049510062.00000000005FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049522611.0000000000601000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5d0000_xLauncher.jbxd
                  Similarity
                  • API ID: AllocateHeap
                  • String ID:
                  • API String ID: 1279760036-0
                  • Opcode ID: 2a5f8c53f8e3162f3800fffac81b699d0e8556e9480603454df52ad02310d717
                  • Instruction ID: 3fbb87e7fb3b8812a595b786098dea4f67b4cd24bea89182978d33b1f6c6e46c
                  • Opcode Fuzzy Hash: 2a5f8c53f8e3162f3800fffac81b699d0e8556e9480603454df52ad02310d717
                  • Instruction Fuzzy Hash: 39F0B43150A5E566BF292B238C09B6B3F4CBB80762B185121F8D8D6695CB30DD05C6E0
                  APIs
                  • RtlAllocateHeap.NTDLL(00000000,?,00000000,?,005E41E0,?,?,005E1007,?,005DFAB5), ref: 005EBC77
                  Memory Dump Source
                  • Source File: 00000000.00000002.2049437730.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                  • Associated: 00000000.00000002.2049420233.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049464797.00000000005F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049480653.00000000005FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049494614.00000000005FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049510062.00000000005FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049522611.0000000000601000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5d0000_xLauncher.jbxd
                  Similarity
                  • API ID: AllocateHeap
                  • String ID:
                  • API String ID: 1279760036-0
                  • Opcode ID: 0d75fd4f23f2b76108af475b03abeeecccec9ba54c2f76d00e6efce5f2bc53a3
                  • Instruction ID: 39f4bac0f915641b78d51c1ac26c0c0d995c64650b40cb5e6846ca20e533647b
                  • Opcode Fuzzy Hash: 0d75fd4f23f2b76108af475b03abeeecccec9ba54c2f76d00e6efce5f2bc53a3
                  • Instruction Fuzzy Hash: 0DE0E5355096D757FA292623ED09BAF3E48BB817A2F241161BCDDD6090CF20DD01C1E0
                  APIs
                  • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 005E4CB6
                  • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 005E4CC4
                  • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 005E4CD5
                  • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 005E4CE6
                  • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 005E4CF7
                  • GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 005E4D08
                  • GetProcAddress.KERNEL32(00000000,InitOnceExecuteOnce), ref: 005E4D19
                  • GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 005E4D2A
                  • GetProcAddress.KERNEL32(00000000,CreateSemaphoreW), ref: 005E4D3B
                  • GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 005E4D4C
                  • GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 005E4D5D
                  • GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 005E4D6E
                  • GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 005E4D7F
                  • GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 005E4D90
                  • GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 005E4DA1
                  • GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 005E4DB2
                  • GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 005E4DC3
                  • GetProcAddress.KERNEL32(00000000,FlushProcessWriteBuffers), ref: 005E4DD4
                  • GetProcAddress.KERNEL32(00000000,FreeLibraryWhenCallbackReturns), ref: 005E4DE5
                  • GetProcAddress.KERNEL32(00000000,GetCurrentProcessorNumber), ref: 005E4DF6
                  • GetProcAddress.KERNEL32(00000000,CreateSymbolicLinkW), ref: 005E4E07
                  • GetProcAddress.KERNEL32(00000000,GetCurrentPackageId), ref: 005E4E18
                  • GetProcAddress.KERNEL32(00000000,GetTickCount64), ref: 005E4E29
                  • GetProcAddress.KERNEL32(00000000,GetFileInformationByHandleEx), ref: 005E4E3A
                  • GetProcAddress.KERNEL32(00000000,SetFileInformationByHandle), ref: 005E4E4B
                  • GetProcAddress.KERNEL32(00000000,GetSystemTimePreciseAsFileTime), ref: 005E4E5C
                  • GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 005E4E6D
                  • GetProcAddress.KERNEL32(00000000,WakeConditionVariable), ref: 005E4E7E
                  • GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 005E4E8F
                  • GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 005E4EA0
                  • GetProcAddress.KERNEL32(00000000,InitializeSRWLock), ref: 005E4EB1
                  • GetProcAddress.KERNEL32(00000000,AcquireSRWLockExclusive), ref: 005E4EC2
                  • GetProcAddress.KERNEL32(00000000,TryAcquireSRWLockExclusive), ref: 005E4ED3
                  • GetProcAddress.KERNEL32(00000000,ReleaseSRWLockExclusive), ref: 005E4EE4
                  • GetProcAddress.KERNEL32(00000000,SleepConditionVariableSRW), ref: 005E4EF5
                  • GetProcAddress.KERNEL32(00000000,CreateThreadpoolWork), ref: 005E4F06
                  • GetProcAddress.KERNEL32(00000000,SubmitThreadpoolWork), ref: 005E4F17
                  • GetProcAddress.KERNEL32(00000000,CloseThreadpoolWork), ref: 005E4F28
                  • GetProcAddress.KERNEL32(00000000,CompareStringEx), ref: 005E4F39
                  • GetProcAddress.KERNEL32(00000000,GetLocaleInfoEx), ref: 005E4F4A
                  • GetProcAddress.KERNEL32(00000000,LCMapStringEx), ref: 005E4F5B
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2049437730.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                  • Associated: 00000000.00000002.2049420233.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049464797.00000000005F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049480653.00000000005FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049494614.00000000005FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049510062.00000000005FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049522611.0000000000601000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5d0000_xLauncher.jbxd
                  Similarity
                  • API ID: AddressProc$HandleModule
                  • String ID: AcquireSRWLockExclusive$CloseThreadpoolTimer$CloseThreadpoolWait$CloseThreadpoolWork$CompareStringEx$CreateEventExW$CreateSemaphoreExW$CreateSemaphoreW$CreateSymbolicLinkW$CreateThreadpoolTimer$CreateThreadpoolWait$CreateThreadpoolWork$FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$FlushProcessWriteBuffers$FreeLibraryWhenCallbackReturns$GetCurrentPackageId$GetCurrentProcessorNumber$GetFileInformationByHandleEx$GetLocaleInfoEx$GetSystemTimePreciseAsFileTime$GetTickCount64$InitOnceExecuteOnce$InitializeConditionVariable$InitializeCriticalSectionEx$InitializeSRWLock$LCMapStringEx$ReleaseSRWLockExclusive$SetFileInformationByHandle$SetThreadpoolTimer$SetThreadpoolWait$SleepConditionVariableCS$SleepConditionVariableSRW$SubmitThreadpoolWork$TryAcquireSRWLockExclusive$WaitForThreadpoolTimerCallbacks$WakeAllConditionVariable$WakeConditionVariable$kernel32.dll
                  • API String ID: 667068680-295688737
                  • Opcode ID: 3cd2b584b638be04b71d3cf6418bafbc16b5c8b3849d2435e6fe8724a9a4fa71
                  • Instruction ID: 07892918c445267f27fc8ea8e7932d6919d9462ee164696842a42b8b87edcb0e
                  • Opcode Fuzzy Hash: 3cd2b584b638be04b71d3cf6418bafbc16b5c8b3849d2435e6fe8724a9a4fa71
                  • Instruction Fuzzy Hash: 7D610371992758ABCB046FF4AE0D9F63FE8BB397413004426B241D3265DBFC6149EB64
                  APIs
                  • GetCurrentThreadId.KERNEL32 ref: 005DCF90
                  • std::_Throw_Cpp_error.LIBCPMT ref: 005DD216
                  Memory Dump Source
                  • Source File: 00000000.00000002.2049437730.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                  • Associated: 00000000.00000002.2049420233.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049464797.00000000005F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049480653.00000000005FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049494614.00000000005FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049510062.00000000005FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049522611.0000000000601000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5d0000_xLauncher.jbxd
                  Similarity
                  • API ID: Cpp_errorCurrentThreadThrow_std::_
                  • String ID:
                  • API String ID: 350343453-0
                  • Opcode ID: 996d5e336d80f315bb647c598c1f4716f95311a8393190670d65ce26e0859b6a
                  • Instruction ID: c20750bc256b204627413749c47f10ccc13e2b43f55378edc3f7d12f13ef3fbf
                  • Opcode Fuzzy Hash: 996d5e336d80f315bb647c598c1f4716f95311a8393190670d65ce26e0859b6a
                  • Instruction Fuzzy Hash: 0CF10672E505114FEF008A7CC8A83DF2FE69B66330F2A172ADAB45B7D2D62744099F50
                  APIs
                  • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 005EC8CB
                  Memory Dump Source
                  • Source File: 00000000.00000002.2049437730.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                  • Associated: 00000000.00000002.2049420233.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049464797.00000000005F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049480653.00000000005FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049494614.00000000005FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049510062.00000000005FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049522611.0000000000601000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5d0000_xLauncher.jbxd
                  Similarity
                  • API ID: FileFindFirst
                  • String ID:
                  • API String ID: 1974802433-0
                  • Opcode ID: 0282c7ed31f2b731c8646461a9b77d0fbf6a47945d1d848de0a953bd78a0f723
                  • Instruction ID: ea48f4747f43b1ba40750ff82ea963d96b812b9adef5881638cb681e44094696
                  • Opcode Fuzzy Hash: 0282c7ed31f2b731c8646461a9b77d0fbf6a47945d1d848de0a953bd78a0f723
                  • Instruction Fuzzy Hash: CA71D37180419D5EDF28EF2A9C8DAAEBFB9FB45300F1441D9E489A3251DB309E869F50
                  APIs
                  • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 005E5450
                  • IsDebuggerPresent.KERNEL32 ref: 005E551C
                  • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 005E553C
                  • UnhandledExceptionFilter.KERNEL32(?), ref: 005E5546
                  Memory Dump Source
                  • Source File: 00000000.00000002.2049437730.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                  • Associated: 00000000.00000002.2049420233.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049464797.00000000005F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049480653.00000000005FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049494614.00000000005FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049510062.00000000005FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049522611.0000000000601000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5d0000_xLauncher.jbxd
                  Similarity
                  • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                  • String ID:
                  • API String ID: 254469556-0
                  • Opcode ID: 3073c3d797339e26ab852ecfa2b52c304fe62f3362a61d8dbd13cfc2d015cea3
                  • Instruction ID: 522423b534d33a7156ec6e1da9a3d708adca25b1776332b6a8873a07e2876fe1
                  • Opcode Fuzzy Hash: 3073c3d797339e26ab852ecfa2b52c304fe62f3362a61d8dbd13cfc2d015cea3
                  • Instruction Fuzzy Hash: DC312775D053199BDF10EFA5D989BCDBBB8BF18304F1040AAE44CAB250EB749A89CF04
                  APIs
                  • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 005E7EC2
                  • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 005E7ECC
                  • UnhandledExceptionFilter.KERNEL32(-00000327,?,?,?,?,?,00000000), ref: 005E7ED9
                  Memory Dump Source
                  • Source File: 00000000.00000002.2049437730.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                  • Associated: 00000000.00000002.2049420233.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049464797.00000000005F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049480653.00000000005FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049494614.00000000005FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049510062.00000000005FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049522611.0000000000601000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5d0000_xLauncher.jbxd
                  Similarity
                  • API ID: ExceptionFilterUnhandled$DebuggerPresent
                  • String ID:
                  • API String ID: 3906539128-0
                  • Opcode ID: db16ea0cc50b53039604e8dc5b8e17356c1e14e651f43f8d8edbd603abcbb60f
                  • Instruction ID: 4be2029ec98b943ffd63eb5d3d13be819337769be955bd26080f7eab7df3c31e
                  • Opcode Fuzzy Hash: db16ea0cc50b53039604e8dc5b8e17356c1e14e651f43f8d8edbd603abcbb60f
                  • Instruction Fuzzy Hash: C531D27490122D9BCB25DF25DC88B9DBBB8BF58350F5041EAE41CA7250EB749F858F44
                  APIs
                  • ___std_exception_destroy.LIBVCRUNTIME ref: 005E2437
                  Memory Dump Source
                  • Source File: 00000000.00000002.2049437730.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                  • Associated: 00000000.00000002.2049420233.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049464797.00000000005F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049480653.00000000005FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049494614.00000000005FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049510062.00000000005FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049522611.0000000000601000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5d0000_xLauncher.jbxd
                  Similarity
                  • API ID: ___std_exception_destroy
                  • String ID:
                  • API String ID: 4194217158-0
                  • Opcode ID: e87840dd65d736736c43169d865430846ad66b55ac5af6cf002f9170d4f6edfb
                  • Instruction ID: c3994758d76c1c5d6869c148307a8a172271f9f4602888e907a8659fa5a924f6
                  • Opcode Fuzzy Hash: e87840dd65d736736c43169d865430846ad66b55ac5af6cf002f9170d4f6edfb
                  • Instruction Fuzzy Hash: E8A26966A555C44FEB024AB884B93DF6FE64B6B330F6A2755C6F06F2D3D50B000B9B60
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2049437730.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                  • Associated: 00000000.00000002.2049420233.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049464797.00000000005F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049480653.00000000005FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049494614.00000000005FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049510062.00000000005FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049522611.0000000000601000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5d0000_xLauncher.jbxd
                  Similarity
                  • API ID:
                  • String ID: -g}5
                  • API String ID: 0-4071012034
                  • Opcode ID: 95500222923b654f2685ad90ba2406ff1b020aebdecf5cd4c9aefd247616847f
                  • Instruction ID: 721c97e744b967a91125c68761a462e0f316cdba8cd96c0d20ab706bbefe7ba8
                  • Opcode Fuzzy Hash: 95500222923b654f2685ad90ba2406ff1b020aebdecf5cd4c9aefd247616847f
                  • Instruction Fuzzy Hash: 6C929AA6A556C45FEF024AB8D4A93DF6FF24B6B331F5E2B5686E01F2D3C507004A9B10
                  APIs
                  • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,005F1F2D,?,?,00000008,?,?,005F1AFF,00000000), ref: 005F21FF
                  Memory Dump Source
                  • Source File: 00000000.00000002.2049437730.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                  • Associated: 00000000.00000002.2049420233.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049464797.00000000005F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049480653.00000000005FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049494614.00000000005FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049510062.00000000005FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049522611.0000000000601000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5d0000_xLauncher.jbxd
                  Similarity
                  • API ID: ExceptionRaise
                  • String ID:
                  • API String ID: 3997070919-0
                  • Opcode ID: 2ffad9b7b649c3b00e3456fbe7859c522bd105c4544020f3df3d6a9f418f97b8
                  • Instruction ID: 3399d4b3af96b8ec8fb08e9e8321ed5ce2addc42cf5fe18692f3f9fd966554e2
                  • Opcode Fuzzy Hash: 2ffad9b7b649c3b00e3456fbe7859c522bd105c4544020f3df3d6a9f418f97b8
                  • Instruction Fuzzy Hash: C9B18F76110608DFD719CF28C48AB657FE0FF45364F258658EA99CF2A1C739E992CB40
                  APIs
                    • Part of subcall function 005EB807: RtlAllocateHeap.NTDLL(00000008,?,?,?,005EA057,00000001,00000364,?,00000006,000000FF,?,005E6E25,005F9D20,0000000C), ref: 005EB848
                  • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 005EC8CB
                  • FindNextFileW.KERNEL32(00000000,?), ref: 005EC9BF
                  • FindClose.KERNEL32(00000000), ref: 005EC9FE
                  • FindClose.KERNEL32(00000000), ref: 005ECA31
                  Memory Dump Source
                  • Source File: 00000000.00000002.2049437730.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                  • Associated: 00000000.00000002.2049420233.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049464797.00000000005F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049480653.00000000005FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049494614.00000000005FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049510062.00000000005FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049522611.0000000000601000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5d0000_xLauncher.jbxd
                  Similarity
                  • API ID: Find$CloseFile$AllocateFirstHeapNext
                  • String ID:
                  • API String ID: 4087847297-0
                  • Opcode ID: 38c986e4cf9c8bbc2b52335080caf8fd288c424df923b2342ed97b50d31676d9
                  • Instruction ID: 41dc99acc2f44164445858c42a9cadb995ffee8b7223f78e6067161db9767ff6
                  • Opcode Fuzzy Hash: 38c986e4cf9c8bbc2b52335080caf8fd288c424df923b2342ed97b50d31676d9
                  • Instruction Fuzzy Hash: D55167759042896FDB2C9F2A9C889BE7FA9FF85314F1441ADF48993201EB30CD429F60
                  APIs
                  • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 005E5216
                  Memory Dump Source
                  • Source File: 00000000.00000002.2049437730.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                  • Associated: 00000000.00000002.2049420233.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049464797.00000000005F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049480653.00000000005FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049494614.00000000005FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049510062.00000000005FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049522611.0000000000601000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5d0000_xLauncher.jbxd
                  Similarity
                  • API ID: FeaturePresentProcessor
                  • String ID:
                  • API String ID: 2325560087-0
                  • Opcode ID: b8dd40d50b68aca0fd42603ee4b2d99ff44737ba2d25f9d50c14e8feadfafcaf
                  • Instruction ID: 0477896895c8b52f74f94d68c68728005ae4d091127cf3786b0d709b55ebf286
                  • Opcode Fuzzy Hash: b8dd40d50b68aca0fd42603ee4b2d99ff44737ba2d25f9d50c14e8feadfafcaf
                  • Instruction Fuzzy Hash: 305180B1901649CFEB18CF56D9857AEBFF0FB58714F24882AD451EB250E3B8A904DF90
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2049437730.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                  • Associated: 00000000.00000002.2049420233.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049464797.00000000005F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049480653.00000000005FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049494614.00000000005FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049510062.00000000005FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049522611.0000000000601000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5d0000_xLauncher.jbxd
                  Similarity
                  • API ID:
                  • String ID: k#fz
                  • API String ID: 0-1948189604
                  • Opcode ID: 220d59771bed9f372e7c05deed47a1c8451b4d9a18b81a28f7d36e253df43c08
                  • Instruction ID: 5640ce0b8fe28f4d44b5797769227908a9557a276fb0aa0b2f8e4fe436c722a2
                  • Opcode Fuzzy Hash: 220d59771bed9f372e7c05deed47a1c8451b4d9a18b81a28f7d36e253df43c08
                  • Instruction Fuzzy Hash: 52D13272E115188FDB50CEBDC94069DBBF2BB48720F2A8729E875FB3D4D63499418B80
                  APIs
                  • SetUnhandledExceptionFilter.KERNEL32(Function_00015560), ref: 005E543D
                  Memory Dump Source
                  • Source File: 00000000.00000002.2049437730.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                  • Associated: 00000000.00000002.2049420233.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049464797.00000000005F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049480653.00000000005FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049494614.00000000005FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049510062.00000000005FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049522611.0000000000601000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5d0000_xLauncher.jbxd
                  Similarity
                  • API ID: ExceptionFilterUnhandled
                  • String ID:
                  • API String ID: 3192549508-0
                  • Opcode ID: ca6ea9ccc6b39fa2baf35aaedd4d30419a0359a24709b510831151b349efdcbb
                  • Instruction ID: dda9362a14406f2cb3005851fff4d1b7910b8ce46d95a8f8d1fd9a7c2dea9fb6
                  • Opcode Fuzzy Hash: ca6ea9ccc6b39fa2baf35aaedd4d30419a0359a24709b510831151b349efdcbb
                  • Instruction Fuzzy Hash:
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2049437730.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                  • Associated: 00000000.00000002.2049420233.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049464797.00000000005F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049480653.00000000005FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049494614.00000000005FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049510062.00000000005FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049522611.0000000000601000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5d0000_xLauncher.jbxd
                  Similarity
                  • API ID: HeapProcess
                  • String ID:
                  • API String ID: 54951025-0
                  • Opcode ID: 19dbb1be6eea0e3654d40e50b447f2c51c5296abcc2747451014f31e1c21465e
                  • Instruction ID: 601890043b0831b5d0ae2d82d40d17cc5847fe5b7caf9f2f3014ee7c071fecfd
                  • Opcode Fuzzy Hash: 19dbb1be6eea0e3654d40e50b447f2c51c5296abcc2747451014f31e1c21465e
                  • Instruction Fuzzy Hash: 43A011B0A022008B8B008F32AB0832E3EA8BA2028230080B8A000C0220EA388008EB00
                  Memory Dump Source
                  • Source File: 00000000.00000002.2049437730.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                  • Associated: 00000000.00000002.2049420233.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049464797.00000000005F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049480653.00000000005FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049494614.00000000005FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049510062.00000000005FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049522611.0000000000601000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5d0000_xLauncher.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 58f4c5f2b609285bdca343e303d80839991bd1969403640d3849d7eb7fee2df8
                  • Instruction ID: e9422e1956b3225609b5d53506d2f61837d9a8bbace3e09976426b8d00934e32
                  • Opcode Fuzzy Hash: 58f4c5f2b609285bdca343e303d80839991bd1969403640d3849d7eb7fee2df8
                  • Instruction Fuzzy Hash: 3032D376E442844FEB018ABCC4A93DF6FF25B6B334F291716C5A46F3D6D917040A8B50
                  Memory Dump Source
                  • Source File: 00000000.00000002.2049437730.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                  • Associated: 00000000.00000002.2049420233.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049464797.00000000005F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049480653.00000000005FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049494614.00000000005FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049510062.00000000005FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049522611.0000000000601000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5d0000_xLauncher.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 7932b130240bf6e2c4b7a936e797647f393e002419e5da1a79ef5b8f35db6a9e
                  • Instruction ID: 1713a2393a7632657121ddc9aa60993fe1f0cf85e42a33615cbc9a1ff89f2267
                  • Opcode Fuzzy Hash: 7932b130240bf6e2c4b7a936e797647f393e002419e5da1a79ef5b8f35db6a9e
                  • Instruction Fuzzy Hash: AA02A077A916904FEF01497CC8A83DB1FE747A7735E2A2726CAB05B3E2C55B010E9B50
                  Memory Dump Source
                  • Source File: 00000000.00000002.2049437730.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                  • Associated: 00000000.00000002.2049420233.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049464797.00000000005F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049480653.00000000005FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049494614.00000000005FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049510062.00000000005FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049522611.0000000000601000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5d0000_xLauncher.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 4c7a311ce803c18cb75810f9d293b854db9d2fc9dbe80eefba6885e79c4cac14
                  • Instruction ID: 4f970e306bbefdb9f3e12e37353418184efef89dfdca2fac0ddefffa38aa5461
                  • Opcode Fuzzy Hash: 4c7a311ce803c18cb75810f9d293b854db9d2fc9dbe80eefba6885e79c4cac14
                  • Instruction Fuzzy Hash: 68E1F772A505504FDF008A7CC4A93DF2FE2976A334F2A2727D9B4AF7D2D65B08099B50
                  Memory Dump Source
                  • Source File: 00000000.00000002.2049437730.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                  • Associated: 00000000.00000002.2049420233.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049464797.00000000005F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049480653.00000000005FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049494614.00000000005FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049510062.00000000005FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049522611.0000000000601000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5d0000_xLauncher.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 9483dfc46f94d347a9b0882e7e602225980565ff39f1f4ad4de2199dc9f85b8e
                  • Instruction ID: f9626c8045f7bc4912312128dacab9589914035be8f9351069228a263a278cd8
                  • Opcode Fuzzy Hash: 9483dfc46f94d347a9b0882e7e602225980565ff39f1f4ad4de2199dc9f85b8e
                  • Instruction Fuzzy Hash: 9AD06C3A655A59AFC210CF49E840D41F7B8FB99670B158066EA0893B20C335F811CAE0
                  APIs
                  • type_info::operator==.LIBVCRUNTIME ref: 005E91F2
                  • ___TypeMatch.LIBVCRUNTIME ref: 005E9300
                  • CatchIt.LIBVCRUNTIME ref: 005E9351
                  • _UnwindNestedFrames.LIBCMT ref: 005E9452
                  • CallUnexpected.LIBVCRUNTIME ref: 005E946D
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2049437730.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                  • Associated: 00000000.00000002.2049420233.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049464797.00000000005F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049480653.00000000005FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049494614.00000000005FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049510062.00000000005FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049522611.0000000000601000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5d0000_xLauncher.jbxd
                  Similarity
                  • API ID: CallCatchFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                  • String ID: 81_$@]^$csm$csm$csm
                  • API String ID: 4119006552-146116256
                  • Opcode ID: fef1fb88cfc7b08526f9c49e04a727d6ae451e383b8ef2295f338d0e77294284
                  • Instruction ID: 03219d0a21a2798768fb70d16c68df27216438f2269fdfe276f57faccf725ad7
                  • Opcode Fuzzy Hash: fef1fb88cfc7b08526f9c49e04a727d6ae451e383b8ef2295f338d0e77294284
                  • Instruction Fuzzy Hash: 7BB1AB75C0028AEFCF1CDFA6C8849AEBFB5FF48310B14445AE8856B242D731DA52CB91
                  APIs
                  • _ValidateLocalCookies.LIBCMT ref: 005E6167
                  • ___except_validate_context_record.LIBVCRUNTIME ref: 005E616F
                  • _ValidateLocalCookies.LIBCMT ref: 005E61F8
                  • __IsNonwritableInCurrentImage.LIBCMT ref: 005E6223
                  • _ValidateLocalCookies.LIBCMT ref: 005E6278
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2049437730.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                  • Associated: 00000000.00000002.2049420233.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049464797.00000000005F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049480653.00000000005FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049494614.00000000005FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049510062.00000000005FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049522611.0000000000601000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5d0000_xLauncher.jbxd
                  Similarity
                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                  • String ID: ^^$csm
                  • API String ID: 1170836740-3765710807
                  • Opcode ID: 7f8fdb603672997dc7c0eb0359e9498ed5286d2102324b92d509668976045d58
                  • Instruction ID: b943d13b7199b127325f8206969e1ebd94d3ce2875227de2801e21fafd91e68e
                  • Opcode Fuzzy Hash: 7f8fdb603672997dc7c0eb0359e9498ed5286d2102324b92d509668976045d58
                  • Instruction Fuzzy Hash: EE417934A00299EBCF18DF6ACC48AAEBFB1FF54394F048055E9559B392D735EA04CB80
                  APIs
                  • GetCPInfo.KERNEL32(02A7E460,02A7E460,00000000,7FFFFFFF,?,005F02F3,02A7E460,02A7E460,00000000,02A7E460,?,?,?,?,02A7E460,00000000), ref: 005F03AE
                  • __alloca_probe_16.LIBCMT ref: 005F0469
                  • __alloca_probe_16.LIBCMT ref: 005F04F8
                  • __freea.LIBCMT ref: 005F0543
                  • __freea.LIBCMT ref: 005F0549
                  • __freea.LIBCMT ref: 005F057F
                  • __freea.LIBCMT ref: 005F0585
                  • __freea.LIBCMT ref: 005F0595
                  Memory Dump Source
                  • Source File: 00000000.00000002.2049437730.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                  • Associated: 00000000.00000002.2049420233.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049464797.00000000005F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049480653.00000000005FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049494614.00000000005FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049510062.00000000005FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049522611.0000000000601000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5d0000_xLauncher.jbxd
                  Similarity
                  • API ID: __freea$__alloca_probe_16$Info
                  • String ID:
                  • API String ID: 127012223-0
                  • Opcode ID: 17753787e14291bce55f8e6fe34debf552f986ebfad3ce4bbb28501199999437
                  • Instruction ID: c923966aafcf2f8464b467da3423063ae3e224ddb11d2bb8d0abf4763d8651cb
                  • Opcode Fuzzy Hash: 17753787e14291bce55f8e6fe34debf552f986ebfad3ce4bbb28501199999437
                  • Instruction Fuzzy Hash: D171D47290024E9BDF219B548C45BBF7FAABF89314F2C2415EA44A72C3E779DD048B60
                  APIs
                  • GetLastError.KERNEL32(?,?,005E8831,005E5F0D,005E55A4), ref: 005E8848
                  • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 005E8856
                  • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 005E886F
                  • SetLastError.KERNEL32(00000000,005E8831,005E5F0D,005E55A4), ref: 005E88C1
                  Memory Dump Source
                  • Source File: 00000000.00000002.2049437730.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                  • Associated: 00000000.00000002.2049420233.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049464797.00000000005F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049480653.00000000005FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049494614.00000000005FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049510062.00000000005FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049522611.0000000000601000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5d0000_xLauncher.jbxd
                  Similarity
                  • API ID: ErrorLastValue___vcrt_
                  • String ID:
                  • API String ID: 3852720340-0
                  • Opcode ID: 9efa7da14ccbe29c985eaba8e80bc2987891f938887f07a031038f20d1cfbdfa
                  • Instruction ID: 242beae9d08b4d3b1a38baa437a8b90c01fc274a9ebb63b3c693d42a610e7cbc
                  • Opcode Fuzzy Hash: 9efa7da14ccbe29c985eaba8e80bc2987891f938887f07a031038f20d1cfbdfa
                  • Instruction Fuzzy Hash: 9701D83211D6529DFA2C2BB7BC8A93A2F58FBA17B43600B29F858D41E1EF164C05F654
                  Strings
                  • C:\Users\user\Desktop\xLauncher.exe, xrefs: 005ECB70
                  Memory Dump Source
                  • Source File: 00000000.00000002.2049437730.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                  • Associated: 00000000.00000002.2049420233.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049464797.00000000005F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049480653.00000000005FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049494614.00000000005FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049510062.00000000005FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049522611.0000000000601000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5d0000_xLauncher.jbxd
                  Similarity
                  • API ID:
                  • String ID: C:\Users\user\Desktop\xLauncher.exe
                  • API String ID: 0-3841312303
                  • Opcode ID: c20607203e82372434a63f50e344ac57c8142ed86bb8ae589e8908b36f949db0
                  • Instruction ID: 0263de70f820ecdb21b6ec67885e870802ef44124254a1aba1768b4c1ddca6e4
                  • Opcode Fuzzy Hash: c20607203e82372434a63f50e344ac57c8142ed86bb8ae589e8908b36f949db0
                  • Instruction Fuzzy Hash: 4321CF71600286AFDB28AF678C86D6B7FACFF803A47104515F8AC97551E730EC429BA0
                  APIs
                  • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,3937B924,?,?,00000000,005F25EB,000000FF,?,005E7015,00000002,?,005E70B1,005E83A0), ref: 005E6F89
                  • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 005E6F9B
                  • FreeLibrary.KERNEL32(00000000,?,?,00000000,005F25EB,000000FF,?,005E7015,00000002,?,005E70B1,005E83A0), ref: 005E6FBD
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2049437730.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                  • Associated: 00000000.00000002.2049420233.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049464797.00000000005F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049480653.00000000005FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049494614.00000000005FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049510062.00000000005FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049522611.0000000000601000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5d0000_xLauncher.jbxd
                  Similarity
                  • API ID: AddressFreeHandleLibraryModuleProc
                  • String ID: CorExitProcess$mscoree.dll
                  • API String ID: 4061214504-1276376045
                  • Opcode ID: 8a00f8849777a9a100c7e1513e81a26aec35c771b2f796aaba17abece5237637
                  • Instruction ID: 4ad0bdc46718decad514d9b486c959a6047210f7cccd0048ae7a3e9c75a9b1dd
                  • Opcode Fuzzy Hash: 8a00f8849777a9a100c7e1513e81a26aec35c771b2f796aaba17abece5237637
                  • Instruction Fuzzy Hash: FB01D631904A69EFDF158F51DC09FBEBBB8FB14B51F040525F821E22A4DB789904CA94
                  APIs
                  • __alloca_probe_16.LIBCMT ref: 005EDFA2
                  • __alloca_probe_16.LIBCMT ref: 005EE06B
                  • __freea.LIBCMT ref: 005EE0D2
                    • Part of subcall function 005EBC45: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,005E41E0,?,?,005E1007,?,005DFAB5), ref: 005EBC77
                  • __freea.LIBCMT ref: 005EE0E5
                  • __freea.LIBCMT ref: 005EE0F2
                  Memory Dump Source
                  • Source File: 00000000.00000002.2049437730.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                  • Associated: 00000000.00000002.2049420233.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049464797.00000000005F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049480653.00000000005FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049494614.00000000005FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049510062.00000000005FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049522611.0000000000601000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5d0000_xLauncher.jbxd
                  Similarity
                  • API ID: __freea$__alloca_probe_16$AllocateHeap
                  • String ID:
                  • API String ID: 1423051803-0
                  • Opcode ID: 30c863511bb892071adeb1cc1cfef44fa846cd48696db384a42f7109e0dfd5eb
                  • Instruction ID: 713a641a419904b5efa885913cb171859841c5f01463cc17aa54f935e82ad04f
                  • Opcode Fuzzy Hash: 30c863511bb892071adeb1cc1cfef44fa846cd48696db384a42f7109e0dfd5eb
                  • Instruction Fuzzy Hash: B751C672610287AFEF289F62CC4AEBB7EA9FF84710B154429FD88D6151EB71CC50C660
                  APIs
                  • EncodePointer.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,?,005E93FE,?,?,00000000,00000000,00000000,?), ref: 005E951D
                  • CatchIt.LIBVCRUNTIME ref: 005E9603
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2049437730.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                  • Associated: 00000000.00000002.2049420233.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049464797.00000000005F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049480653.00000000005FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049494614.00000000005FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049510062.00000000005FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049522611.0000000000601000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5d0000_xLauncher.jbxd
                  Similarity
                  • API ID: CatchEncodePointer
                  • String ID: MOC$RCC
                  • API String ID: 1435073870-2084237596
                  • Opcode ID: eccf291d1bb719618b8f108a6aaacb13ca314f16fbdfac1fc57d1390a16aa6b3
                  • Instruction ID: e1532c549ce7fe47a119788994e22e2a3e9044fec7db3e4d2950279e3cb55517
                  • Opcode Fuzzy Hash: eccf291d1bb719618b8f108a6aaacb13ca314f16fbdfac1fc57d1390a16aa6b3
                  • Instruction Fuzzy Hash: FA419A72900289AFCF2ACF95CC81AEEBFB5FF48304F18809AF945A7221D3359950DB50
                  APIs
                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,005EDCFA,00000000,?,005FCCD0,?,?,?,005EDC31,00000004,InitializeCriticalSectionEx,005F46F8,005F4700), ref: 005EDC6B
                  • GetLastError.KERNEL32(?,005EDCFA,00000000,?,005FCCD0,?,?,?,005EDC31,00000004,InitializeCriticalSectionEx,005F46F8,005F4700,00000000,?,005E971C), ref: 005EDC75
                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 005EDC9D
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2049437730.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                  • Associated: 00000000.00000002.2049420233.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049464797.00000000005F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049480653.00000000005FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049494614.00000000005FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049510062.00000000005FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049522611.0000000000601000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5d0000_xLauncher.jbxd
                  Similarity
                  • API ID: LibraryLoad$ErrorLast
                  • String ID: api-ms-
                  • API String ID: 3177248105-2084034818
                  • Opcode ID: 40068f8f2e1717cf1c2b3efc6e07196aabba7158bb074f0095d110ddbe53a63f
                  • Instruction ID: e1bf7a50b24f83c298fa68cb16657c48aa291f1756c39837303053f4ca10c0be
                  • Opcode Fuzzy Hash: 40068f8f2e1717cf1c2b3efc6e07196aabba7158bb074f0095d110ddbe53a63f
                  • Instruction Fuzzy Hash: 30E0D830650206BBFF102F52DC0EB283F64BB20B90F204020F94DE80E0FBAA9C11D955
                  APIs
                  • GetConsoleOutputCP.KERNEL32(3937B924,00000000,00000000,?), ref: 005EE64B
                    • Part of subcall function 005ED131: WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,00000000,000000FF,?,?,00000000,?,?,005E87B1,?,00000000,?), ref: 005ED192
                  • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 005EE89D
                  • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 005EE8E3
                  • GetLastError.KERNEL32 ref: 005EE986
                  Memory Dump Source
                  • Source File: 00000000.00000002.2049437730.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                  • Associated: 00000000.00000002.2049420233.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049464797.00000000005F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049480653.00000000005FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049494614.00000000005FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049510062.00000000005FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049522611.0000000000601000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5d0000_xLauncher.jbxd
                  Similarity
                  • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                  • String ID:
                  • API String ID: 2112829910-0
                  • Opcode ID: 6c2584b18804c8d5351036714a6f39061c902c7fa08b068721a7d47aef53f797
                  • Instruction ID: dd5cd624e82457ba194002754347820dd6f8c780f45a4fd8f7a38c030ae7b0b0
                  • Opcode Fuzzy Hash: 6c2584b18804c8d5351036714a6f39061c902c7fa08b068721a7d47aef53f797
                  • Instruction Fuzzy Hash: 74D199B5D002899FCB19CFA9C8859ADBFF5FF48300F28456AE495EB352D630A906CB50
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2049437730.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                  • Associated: 00000000.00000002.2049420233.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049464797.00000000005F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049480653.00000000005FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049494614.00000000005FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049510062.00000000005FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049522611.0000000000601000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5d0000_xLauncher.jbxd
                  Similarity
                  • API ID: AdjustPointer
                  • String ID:
                  • API String ID: 1740715915-0
                  • Opcode ID: caf9ebaaecee113ad366a82dbe21ead562d644a1678266068490a48c04677bee
                  • Instruction ID: 6bea40620f17ea6e4590ea878ebb549d7d1bc570eaba5b680528acee7e146645
                  • Opcode Fuzzy Hash: caf9ebaaecee113ad366a82dbe21ead562d644a1678266068490a48c04677bee
                  • Instruction Fuzzy Hash: CD51E072601682AFDB2DCF16C849B7A7BA5FF40310F54052DE9D99B291EB31EC40CB80
                  APIs
                    • Part of subcall function 005ED131: WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,00000000,000000FF,?,?,00000000,?,?,005E87B1,?,00000000,?), ref: 005ED192
                  • GetLastError.KERNEL32(?,?,?,00000000,00000000,?,005EC95E,?,?,?,00000000), ref: 005EC61C
                  • __dosmaperr.LIBCMT ref: 005EC623
                  • GetLastError.KERNEL32(00000000,005EC95E,?,?,00000000,?,?,?,00000000,00000000,?,005EC95E,?,?,?,00000000), ref: 005EC65D
                  • __dosmaperr.LIBCMT ref: 005EC664
                  Memory Dump Source
                  • Source File: 00000000.00000002.2049437730.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                  • Associated: 00000000.00000002.2049420233.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049464797.00000000005F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049480653.00000000005FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049494614.00000000005FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049510062.00000000005FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049522611.0000000000601000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5d0000_xLauncher.jbxd
                  Similarity
                  • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                  • String ID:
                  • API String ID: 1913693674-0
                  • Opcode ID: 85ba5d82b154cb3d5b71d5e118d677b39a52638671f95b2d0fa838187a791d0c
                  • Instruction ID: 72a8c5dca5fdffffd7a31d85f3001932d2896951b4b88112e221d5593ebb46ee
                  • Opcode Fuzzy Hash: 85ba5d82b154cb3d5b71d5e118d677b39a52638671f95b2d0fa838187a791d0c
                  • Instruction Fuzzy Hash: FC21F872200296AFDB289F6B8C84D2B7FA9FF853647108819F8E5D7511D730EC02CB90
                  APIs
                  • GetEnvironmentStringsW.KERNEL32 ref: 005ED235
                    • Part of subcall function 005ED131: WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,00000000,000000FF,?,?,00000000,?,?,005E87B1,?,00000000,?), ref: 005ED192
                  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 005ED26D
                  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 005ED28D
                  Memory Dump Source
                  • Source File: 00000000.00000002.2049437730.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                  • Associated: 00000000.00000002.2049420233.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049464797.00000000005F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049480653.00000000005FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049494614.00000000005FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049510062.00000000005FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049522611.0000000000601000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5d0000_xLauncher.jbxd
                  Similarity
                  • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                  • String ID:
                  • API String ID: 158306478-0
                  • Opcode ID: a3957fd01d0e753ef593f9e6d7d640ab2c4e9f8af350fef591a2df8263e1c529
                  • Instruction ID: 9a9b4845f683356916f0d08c39ed4567eb07f548ccd15b38a39a62eddee04bd4
                  • Opcode Fuzzy Hash: a3957fd01d0e753ef593f9e6d7d640ab2c4e9f8af350fef591a2df8263e1c529
                  • Instruction Fuzzy Hash: 191126B690158A7FAB2927735C8DCBF2DBCFEE43957100414FA81D2101FB24DD029570
                  APIs
                  • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,00000000,?,005EFF31,00000000,00000001,00000000,?,?,005EE9DA,?,00000000,00000000), ref: 005F07D7
                  • GetLastError.KERNEL32(?,005EFF31,00000000,00000001,00000000,?,?,005EE9DA,?,00000000,00000000,?,?,?,005EE320,00000000), ref: 005F07E3
                    • Part of subcall function 005F0840: CloseHandle.KERNEL32(FFFFFFFE,005F07F3,?,005EFF31,00000000,00000001,00000000,?,?,005EE9DA,?,00000000,00000000,?,?), ref: 005F0850
                  • ___initconout.LIBCMT ref: 005F07F3
                    • Part of subcall function 005F0815: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,005F07B1,005EFF1E,?,?,005EE9DA,?,00000000,00000000,?), ref: 005F0828
                  • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,?,005EFF31,00000000,00000001,00000000,?,?,005EE9DA,?,00000000,00000000,?), ref: 005F0808
                  Memory Dump Source
                  • Source File: 00000000.00000002.2049437730.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                  • Associated: 00000000.00000002.2049420233.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049464797.00000000005F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049480653.00000000005FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049494614.00000000005FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049510062.00000000005FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049522611.0000000000601000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5d0000_xLauncher.jbxd
                  Similarity
                  • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                  • String ID:
                  • API String ID: 2744216297-0
                  • Opcode ID: 27a1751eae9dbc313ed2c35ccc326f35c632847886f8bab31903abae15625cce
                  • Instruction ID: a0f891d096b3f762674a0911d2c5a582bb06d78d14a9cdfc12995015aa5ef57f
                  • Opcode Fuzzy Hash: 27a1751eae9dbc313ed2c35ccc326f35c632847886f8bab31903abae15625cce
                  • Instruction Fuzzy Hash: 5DF0F83640051DBBCF222F95DC08AAA3E2AFF683A1F048421FB0885162D676C824EB90
                  APIs
                  • ___except_validate_context_record.LIBVCRUNTIME ref: 005E8D75
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2049437730.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                  • Associated: 00000000.00000002.2049420233.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049464797.00000000005F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049480653.00000000005FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049494614.00000000005FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049510062.00000000005FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049522611.0000000000601000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5d0000_xLauncher.jbxd
                  Similarity
                  • API ID: ___except_validate_context_record
                  • String ID: csm$csm
                  • API String ID: 3493665558-3733052814
                  • Opcode ID: b83871b3b400e1f565c8691c54a571c90e2f0c6be1484aa31680e9cc9aaa81f2
                  • Instruction ID: 42c6c7f46f98d676f8e91daefb3f1781b1a8d137c177ba718b9849af0d504b18
                  • Opcode Fuzzy Hash: b83871b3b400e1f565c8691c54a571c90e2f0c6be1484aa31680e9cc9aaa81f2
                  • Instruction Fuzzy Hash: 9531E476400295EFCF2A9F52CD449BA7F6AFF08314B18465AF8CC59221DB32DD61EB81
                  APIs
                    • Part of subcall function 005E4533: __EH_prolog3_GS.LIBCMT ref: 005E453A
                  • std::domain_error::domain_error.LIBCPMT ref: 005E45EC
                    • Part of subcall function 005E43A4: std::exception::exception.LIBCONCRT ref: 005E43BA
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2049437730.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                  • Associated: 00000000.00000002.2049420233.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049464797.00000000005F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049480653.00000000005FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049494614.00000000005FC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049510062.00000000005FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2049522611.0000000000601000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5d0000_xLauncher.jbxd
                  Similarity
                  • API ID: H_prolog3_std::domain_error::domain_errorstd::exception::exception
                  • String ID: CD^$CD^
                  • API String ID: 2144476180-3205961225
                  • Opcode ID: 717f1ff9f37cd80ddde0da5b763ec47933fe0b8c2ecf1030ca347843eedaff07
                  • Instruction ID: 1ebbb08f61b09bac950d7833f7062f07008ab1752f7898858d2011cb2e7e3ebf
                  • Opcode Fuzzy Hash: 717f1ff9f37cd80ddde0da5b763ec47933fe0b8c2ecf1030ca347843eedaff07
                  • Instruction Fuzzy Hash: 7B014C74D002099BCF18EF6AD8458AEBFF8FF88704B10851EE45597340DB34DA05CB90

                  Execution Graph

                  Execution Coverage:1.6%
                  Dynamic/Decrypted Code Coverage:0%
                  Signature Coverage:57.4%
                  Total number of Nodes:54
                  Total number of Limit Nodes:3
                  execution_graph 19391 408a40 19392 408a4f 19391->19392 19393 408a57 SHGetSpecialFolderPathW 19392->19393 19394 408c5f ExitProcess 19392->19394 19395 408a6d 19393->19395 19396 408a75 GetCurrentThreadId GetCurrentProcessId 19395->19396 19397 408c5a 19395->19397 19399 408ab4 GetForegroundWindow 19396->19399 19400 408aac 19396->19400 19406 43e330 19397->19406 19401 408b8d 19399->19401 19400->19399 19401->19397 19405 40cbb0 CoInitializeEx 19401->19405 19409 43fb80 19406->19409 19408 43e335 FreeLibrary 19408->19394 19410 43fb89 19409->19410 19410->19408 19411 43bd00 19412 43bd16 RtlFreeHeap 19411->19412 19413 43bd5b 19411->19413 19412->19413 19415 440f30 19416 440f60 19415->19416 19417 440fae 19416->19417 19421 43e410 LdrInitializeThunk 19416->19421 19419 44105e 19417->19419 19422 43e410 LdrInitializeThunk 19417->19422 19421->19417 19422->19419 19423 440af0 19425 440b10 19423->19425 19424 440c5e 19425->19424 19427 43e410 LdrInitializeThunk 19425->19427 19427->19424 19428 40cbf8 CoInitializeSecurity CoInitializeSecurity 19429 40f04a CoUninitialize CoUninitialize 19430 40cc6d 19431 40cc90 19430->19431 19436 439390 19431->19436 19433 40ccf9 19434 439390 11 API calls 19433->19434 19435 40d129 19434->19435 19438 4393f0 CoCreateInstance 19436->19438 19439 4399c4 19438->19439 19440 4394c8 SysAllocString 19438->19440 19442 4399d4 GetVolumeInformationW 19439->19442 19443 43955c 19440->19443 19450 4399eb 19442->19450 19444 4399b0 SysFreeString 19443->19444 19445 439564 CoSetProxyBlanket 19443->19445 19444->19439 19446 4399a6 19445->19446 19447 439584 SysAllocString 19445->19447 19446->19444 19449 439650 19447->19449 19449->19449 19451 439688 SysAllocString 19449->19451 19450->19433 19452 4396ab 19451->19452 19453 43998d SysFreeString SysFreeString 19452->19453 19454 439983 19452->19454 19455 4396ef VariantInit 19452->19455 19453->19446 19454->19453 19457 439740 19455->19457 19456 439972 VariantClear 19456->19454 19457->19456

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 0 439390-4393ef 1 4393f0-439449 0->1 1->1 2 43944b-439467 1->2 4 439474-4394c2 CoCreateInstance 2->4 5 439469 2->5 6 4399c4-4399e9 call 4400a0 GetVolumeInformationW 4->6 7 4394c8-43950f 4->7 5->4 12 4399f3-439a39 call 4201c0 6->12 13 4399eb-4399ef 6->13 8 439510-43952a 7->8 8->8 10 43952c-43955e SysAllocString 8->10 16 4399b0-4399c0 SysFreeString 10->16 17 439564-43957e CoSetProxyBlanket 10->17 19 439a40-439a48 12->19 13->12 16->6 20 4399a6-4399ac 17->20 21 439584-43959b 17->21 19->19 22 439a4a-439a4c 19->22 20->16 23 4395a0-4395ce 21->23 24 439a5e-439aaf call 4201c0 22->24 25 439a4e-439a5b call 408400 22->25 23->23 26 4395d0-439649 SysAllocString 23->26 33 439ab0-439ab8 24->33 25->24 29 439650-439686 26->29 29->29 32 439688-4396ad SysAllocString 29->32 38 4396b3-4396d5 32->38 39 43998d-43999f SysFreeString * 2 32->39 33->33 34 439aba-439abc 33->34 36 439ace-439b1f call 4201c0 34->36 37 439abe-439acb call 408400 34->37 45 439b20-439b28 36->45 37->36 46 439983-439989 38->46 47 4396db-4396de 38->47 39->20 45->45 48 439b2a-439b2c 45->48 46->39 47->46 49 4396e4-4396e9 47->49 50 439b3e-439b8f call 4201c0 48->50 51 439b2e-439b3b call 408400 48->51 49->46 52 4396ef-43973f VariantInit 49->52 59 439b90-439b98 50->59 51->50 54 439740-439754 52->54 54->54 57 439756-439760 54->57 60 439764-439766 57->60 59->59 61 439b9a-439b9c 59->61 62 439972-43997f VariantClear 60->62 63 43976c-439772 60->63 64 439bae-439bb5 61->64 65 439b9e-439bab call 408400 61->65 62->46 63->62 66 439778-439782 63->66 65->64 68 4397c3 66->68 69 439784-439789 66->69 71 4397c5-4397dd call 408380 68->71 72 43979c-4397a0 69->72 81 4397e3-4397ed 71->81 82 43990c-43992c 71->82 74 4397a2-4397ad 72->74 75 439790 72->75 78 4397b6-4397bc 74->78 79 4397af-4397b4 74->79 77 439791-43979a 75->77 77->71 77->72 78->77 80 4397be-4397c1 78->80 79->77 80->77 81->82 83 4397f3-4397fb 81->83 84 439965-43996e call 408390 82->84 85 43992e-439944 82->85 86 439800-43980a 83->86 84->62 85->84 87 439946-43995c 85->87 89 439820-439826 86->89 90 43980c-439811 86->90 87->84 91 43995e-439961 87->91 94 439845-439853 89->94 95 439828-43982b 89->95 93 4398b0-4398b6 90->93 91->84 96 4398b8-4398c2 93->96 98 439855-439858 94->98 99 4398ce-4398d7 94->99 95->94 97 43982d-439843 95->97 96->82 100 4398c4-4398c6 96->100 97->93 98->99 103 43985a-4398a3 98->103 101 4398d9-4398db 99->101 102 4398dd-4398e0 99->102 100->86 104 4398cc 100->104 101->96 105 4398e2-439906 102->105 106 439908-43990a 102->106 103->93 104->82 105->93 106->93
                  APIs
                  • CoCreateInstance.OLE32(00443678,00000000,00000001,00443668,00000000), ref: 004394BA
                  • SysAllocString.OLEAUT32(438D41B2), ref: 00439531
                  • CoSetProxyBlanket.COMBASE(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 00439576
                  • SysAllocString.OLEAUT32(37E739D3), ref: 004395D5
                  • SysAllocString.OLEAUT32(37E739D3), ref: 00439689
                  • VariantInit.OLEAUT32(?), ref: 004396F4
                  • VariantClear.OLEAUT32(?), ref: 00439973
                  • SysFreeString.OLEAUT32(?), ref: 00439997
                  • SysFreeString.OLEAUT32(?), ref: 0043999D
                  • SysFreeString.OLEAUT32(?), ref: 004399B4
                  • GetVolumeInformationW.KERNEL32(?,00000000,00000000,7F09795D,00000000,00000000,00000000,00000000), ref: 004399E5
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092143624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_xLauncher.jbxd
                  Yara matches
                  Similarity
                  • API ID: String$AllocFree$Variant$BlanketClearCreateInformationInitInstanceProxyVolume
                  • String ID: e.k$C$\$tu$523
                  • API String ID: 2573436264-3491669738
                  • Opcode ID: 2113fe1c46924481d627edf74d5309fe22bf739b120302e3aff6f8c30e7400db
                  • Instruction ID: e1573ebc7a5a0e1536596eea73d0663f2d817262ed3498b2cb41fbce2fea040d
                  • Opcode Fuzzy Hash: 2113fe1c46924481d627edf74d5309fe22bf739b120302e3aff6f8c30e7400db
                  • Instruction Fuzzy Hash: 8A224271A083009FD718CF24C845B6BBBE1EF89314F18892DE5969B3D1D7B8D905CB9A

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 111 40cc6d-40cc8f 112 40cc90-40ccdb 111->112 112->112 113 40ccdd-40cd1a call 4089e0 call 439390 112->113 118 40cd20-40cd75 113->118 118->118 119 40cd77-40cde2 118->119 120 40cdf0-40ce0a 119->120 120->120 121 40ce0c-40ce1d 120->121 122 40ce3b-40ce43 121->122 123 40ce1f-40ce26 121->123 125 40ce45-40ce46 122->125 126 40ce5b-40ce68 122->126 124 40ce30-40ce39 123->124 124->122 124->124 129 40ce50-40ce59 125->129 127 40ce6a-40ce71 126->127 128 40ce8b-40ce93 126->128 130 40ce80-40ce89 127->130 131 40ce95-40ce96 128->131 132 40ceab-40cfd5 128->132 129->126 129->129 130->128 130->130 133 40cea0-40cea9 131->133 134 40cfe0-40d004 132->134 133->132 133->133 134->134 135 40d006-40d03f 134->135 136 40d040-40d05a 135->136 136->136 137 40d05c-40d0b6 call 40ba00 136->137 140 40d0c0-40d10b 137->140 140->140 141 40d10d-40d124 call 4089e0 call 439390 140->141 145 40d129-40d14a 141->145 146 40d150-40d1a5 145->146 146->146 147 40d1a7-40d212 146->147 148 40d220-40d23a 147->148 148->148 149 40d23c-40d24d 148->149 150 40d26b-40d273 149->150 151 40d24f-40d251 149->151 153 40d275-40d276 150->153 154 40d28b-40d29f 150->154 152 40d260-40d269 151->152 152->150 152->152 155 40d280-40d289 153->155 156 40d2a1-40d2a3 154->156 157 40d2bb-40d2c3 154->157 155->154 155->155 158 40d2b0-40d2b9 156->158 159 40d2c5-40d2c6 157->159 160 40d2db-40d3ff 157->160 158->157 158->158 161 40d2d0-40d2d9 159->161 162 40d400-40d424 160->162 161->160 161->161 162->162 163 40d426-40d455 162->163 164 40d460-40d47a 163->164 164->164 165 40d47c-40d4c1 call 40ba00 164->165
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092143624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_xLauncher.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: 95CBEFD18DDCE7726CA361616D950AC3$PQ$e{$frogs-severz.sbs$y5$~}$%
                  • API String ID: 0-2500350351
                  • Opcode ID: 090ff3817184d656c5b43165c4e7e37c9f2314c6ca28d6b996a56d1635b60e31
                  • Instruction ID: 5a8de95e8c06bd6c07cbf4968ae8d160a9aeefcb6064c3d179da94803ef9cf72
                  • Opcode Fuzzy Hash: 090ff3817184d656c5b43165c4e7e37c9f2314c6ca28d6b996a56d1635b60e31
                  • Instruction Fuzzy Hash: BB12ACB15483C18AD371CF24C494BDFBBE2EB92304F1889ADC4D95B292DB39450ACB96

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 168 408a40-408a51 call 43d0a0 171 408a57-408a6f SHGetSpecialFolderPathW call 4366c0 168->171 172 408c5f-408c61 ExitProcess 168->172 175 408a75-408aaa GetCurrentThreadId GetCurrentProcessId 171->175 176 408c5a call 43e330 171->176 178 408ab4-408b87 GetForegroundWindow 175->178 179 408aac-408ab2 175->179 176->172 180 408c0d-408c4e call 409e30 178->180 181 408b8d-408c01 178->181 179->178 180->176 186 408c50 call 40cbb0 180->186 182 408c03-408c05 181->182 183 408c07-408c0b 181->183 182->183 183->180 188 408c55 call 40b9d0 186->188 188->176
                  APIs
                  • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000010,00000000), ref: 00408A62
                  • GetCurrentThreadId.KERNEL32 ref: 00408A75
                  • GetCurrentProcessId.KERNEL32 ref: 00408A7D
                  • GetForegroundWindow.USER32 ref: 00408B7F
                  • ExitProcess.KERNEL32 ref: 00408C61
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092143624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_xLauncher.jbxd
                  Yara matches
                  Similarity
                  • API ID: CurrentProcess$ExitFolderForegroundPathSpecialThreadWindow
                  • String ID:
                  • API String ID: 4063528623-0
                  • Opcode ID: ad0912771d57850929ec58b0d39227cc3e0b4855ddb88bcfce1a5f0273a6af48
                  • Instruction ID: 6f87a4886bf6abc34ba852dc79c3fd8c6903462d35a0ec5fb2fb19cc9553fff0
                  • Opcode Fuzzy Hash: ad0912771d57850929ec58b0d39227cc3e0b4855ddb88bcfce1a5f0273a6af48
                  • Instruction Fuzzy Hash: 71516873B403090BC70CAEBADD9A7AAB5D68BC8714F0DC13D6984D73E1EDB89C084684

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 222 43e410-43e442 LdrInitializeThunk
                  APIs
                  • LdrInitializeThunk.NTDLL(00440ACB,005C003F,0000002C,?,?,00000018,?,00000000,?,?,?,?,00000000,00000000), ref: 0043E43E
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092143624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_xLauncher.jbxd
                  Yara matches
                  Similarity
                  • API ID: InitializeThunk
                  • String ID:
                  • API String ID: 2994545307-0
                  • Opcode ID: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                  • Instruction ID: 0c3231226d6b2b3a527619dcc08e6164a4fafcc19f94aab6dc14dc2c5ea58878
                  • Opcode Fuzzy Hash: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                  • Instruction Fuzzy Hash: A2E0FE75908316AF9A08CF45C14444EFBE5BFC4714F11CC8DA4D863210D3B0AD46DF82

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 223 440f30-440f57 224 440f60-440f85 223->224 224->224 225 440f87-440f92 224->225 226 440f94-440f9f 225->226 227 440fe2-440fe7 225->227 228 440fa0-440fa7 226->228 229 440fed-441001 227->229 230 441089-44108b 227->230 232 440fb2-440fba 228->232 233 440fa9-440fac 228->233 231 441010-441035 229->231 234 44109d-4410a4 230->234 235 44108d-441094 230->235 231->231 236 441037-441042 231->236 232->227 238 440fbc-440fda call 43e410 232->238 233->228 237 440fae-440fb0 233->237 239 441096 235->239 240 44109a 235->240 241 441044-44104f 236->241 242 441081-441083 236->242 237->227 246 440fdf 238->246 239->240 240->234 244 441050-441057 241->244 242->230 245 441085 242->245 247 441060-441066 244->247 248 441059-44105c 244->248 245->230 246->227 247->242 250 441068-44107e call 43e410 247->250 248->244 249 44105e 248->249 249->242 250->242
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092143624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_xLauncher.jbxd
                  Yara matches
                  Similarity
                  • API ID: InitializeThunk
                  • String ID: 5|iL
                  • API String ID: 2994545307-1880071150
                  • Opcode ID: ee4077c7691c7a9d9760f3ee9ac3ee1b414a579a8cebcf00ca14fe496833f0fa
                  • Instruction ID: 2d9a10d3518b6347526887b405adf83255ac8af9fc4b632d109705a99c658641
                  • Opcode Fuzzy Hash: ee4077c7691c7a9d9760f3ee9ac3ee1b414a579a8cebcf00ca14fe496833f0fa
                  • Instruction Fuzzy Hash: 504126342493005FF7249B55CCD1B7BB7E0EB46318F28482EE685973A2D2B9ACD18749

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 253 409e30-409e5f 254 409e60-409e90 253->254 254->254 255 409e92-409edf 254->255 256 409ee0-409f0f 255->256 256->256 257 409f11-409f18 256->257 258 409f1b-409f3e call 43d010 257->258
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092143624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_xLauncher.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: dcji
                  • API String ID: 0-1961726176
                  • Opcode ID: d91f7cb0704b5006a2db1cfcc1efbc7c3ef55f9a13ce028042e6c4370d6ded10
                  • Instruction ID: 204c1587005a9916132671a7009940757905733ef6e55b23c709a5ef6d24fd37
                  • Opcode Fuzzy Hash: d91f7cb0704b5006a2db1cfcc1efbc7c3ef55f9a13ce028042e6c4370d6ded10
                  • Instruction Fuzzy Hash: 1B2129316083509BD724CF25C85475BB7A6EFC3308F58952CE4C56B789C730990ACB9A

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 190 40cbf8-40cc3b CoInitializeSecurity * 2
                  APIs
                  • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 0040CC0A
                  • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 0040CC22
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092143624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_xLauncher.jbxd
                  Yara matches
                  Similarity
                  • API ID: InitializeSecurity
                  • String ID:
                  • API String ID: 640775948-0
                  • Opcode ID: 145065683141cf3167c9475bcb822f9121ccc55af7dab7bb781004c755a29937
                  • Instruction ID: c880cdd67f623438b6cd66e68a6017e00abd8d3a53342b4ce76a78301ae82540
                  • Opcode Fuzzy Hash: 145065683141cf3167c9475bcb822f9121ccc55af7dab7bb781004c755a29937
                  • Instruction Fuzzy Hash: 2AE042783D8341B6F6B48B54AC17F5476556746F22F344314B7623D6E5CAE03601450D

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 215 40f04a-40f068 CoUninitialize * 2
                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092143624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_xLauncher.jbxd
                  Yara matches
                  Similarity
                  • API ID: Uninitialize
                  • String ID:
                  • API String ID: 3861434553-0
                  • Opcode ID: 8dcc30f96501aecf090ff4362c8611e93c8148ded05e41cc509420b92d328d5a
                  • Instruction ID: 6306f3a4cd9b95ebdec0c21febb67e832960b6ef8d041fe0cf89b1477948b023
                  • Opcode Fuzzy Hash: 8dcc30f96501aecf090ff4362c8611e93c8148ded05e41cc509420b92d328d5a
                  • Instruction Fuzzy Hash: 91C048BC644580ABC3C88F24ED998643720EB8BA07B010479EA47C2762CA246989CA19

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 216 43bd00-43bd0f 217 43bd16-43bd26 216->217 218 43bd5b-43bd5f 216->218 219 43bd30-43bd47 217->219 219->219 220 43bd49-43bd55 RtlFreeHeap 219->220 220->218
                  APIs
                  • RtlFreeHeap.NTDLL(916B93BC,00000000,?), ref: 0043BD55
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092143624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_xLauncher.jbxd
                  Yara matches
                  Similarity
                  • API ID: FreeHeap
                  • String ID:
                  • API String ID: 3298025750-0
                  • Opcode ID: d98b47f134cf57db6db609dd5bf372f6c453c8b7cbd161761e2a2017b8c54b0e
                  • Instruction ID: 42040e2cc6aa9b7ac258e8f81a0661d3c5896cafd756345d56892cf8069c28b5
                  • Opcode Fuzzy Hash: d98b47f134cf57db6db609dd5bf372f6c453c8b7cbd161761e2a2017b8c54b0e
                  • Instruction Fuzzy Hash: 48F027307593408BDB089F34ED6272F7BA5DBD6314F18893DD4C24A6D2C6345826D716

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 221 40cbb0-40cbe0 CoInitializeEx
                  APIs
                  • CoInitializeEx.COMBASE(00000000,00000002), ref: 0040CBC3
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092143624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_xLauncher.jbxd
                  Yara matches
                  Similarity
                  • API ID: Initialize
                  • String ID:
                  • API String ID: 2538663250-0
                  • Opcode ID: 3a724ea4c961a328da68f7ed4ff58daf34b3e02347835e836726a23858d31ddb
                  • Instruction ID: ce00b06ee55548168b8c0787cc59377a69a59bff38caca41d9e6c9a3031c1121
                  • Opcode Fuzzy Hash: 3a724ea4c961a328da68f7ed4ff58daf34b3e02347835e836726a23858d31ddb
                  • Instruction Fuzzy Hash: E2D0A7345541446BD690775EDC0BF12362C9B87B27F440235F6A3C66D3DD10A910C56A
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092143624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_xLauncher.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: Y_$!W#i$$'$$G-E$)C9E$)_~Q$*($,+$,_6]$8O"A$9K,M$:G"Y$E7CI$TW$U3@5$X5c+$Z!\'$`g$b?g9$c?E1$hS5Q$s3l=$v7d1$y-e#$AC$MO$ac
                  • API String ID: 0-1414121465
                  • Opcode ID: 7a807fb1dd10f0d72baa1f0606e81b66103267f2d31d318abaea0f4e75b6a7e6
                  • Instruction ID: 90c7b0685a53786c9af241da242e978aa2e938f14bafcff75bf7c61eb51f6037
                  • Opcode Fuzzy Hash: 7a807fb1dd10f0d72baa1f0606e81b66103267f2d31d318abaea0f4e75b6a7e6
                  • Instruction Fuzzy Hash: A8B2A6B52083918BE334CF25D8807AFBBE1FF86344F55892DE5D99B250DB748846CB86
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092143624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_xLauncher.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: Y_$!W#i$$'$)C9E$)_~Q$*($,+$8O"A$9K,M$9})c$:G"Y$E7CI$TW$U3@5$X5c+$Z!\'$b?g9$c?E1$s3l=$v7d1$y-e#$AC$MO$ac
                  • API String ID: 0-2757791933
                  • Opcode ID: 4d2eeb46c2115fa2db1afc153202f8ff0a434cbc9b6afb72d4f2fdf823e171ba
                  • Instruction ID: 47215e23adb0cf5868d561f6ad647b6ec23c2605ebcfbf9d20bbfe8a24c7d981
                  • Opcode Fuzzy Hash: 4d2eeb46c2115fa2db1afc153202f8ff0a434cbc9b6afb72d4f2fdf823e171ba
                  • Instruction Fuzzy Hash: 18A2A5B52083918BE334CF25E8807AFBBE1FF85344F51892DE5D99B250DB748846CB96
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092143624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_xLauncher.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: Y_$!W#i$$'$)C9E$)_~Q$*($,+$8O"A$9K,M$:G"Y$E7CI$TW$U3@5$X5c+$Z!\'$b?g9$c?E1$s3l=$v7d1$y-e#$AC$MO$ac
                  • API String ID: 0-2703530209
                  • Opcode ID: 999693332ce3cb521be822ece04869f879cbd96f23583627649b22d85a420d73
                  • Instruction ID: cd379224abbc543f3d1972bf7739c2ad6f847806e997ff9a47fe545f594b8fb1
                  • Opcode Fuzzy Hash: 999693332ce3cb521be822ece04869f879cbd96f23583627649b22d85a420d73
                  • Instruction Fuzzy Hash: E7A2A5B52083918BE334CF25E8807AFBBE1FF85344F55892DE5D99B250DB748846CB86
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092143624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_xLauncher.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: %;'9$/Dv$/($4$<$@LvJ$QeOt$cmid$fi_a$l$2V$qMkU$z$zxJr
                  • API String ID: 0-1056785701
                  • Opcode ID: 454e64a2c140c78ac1c09d91c32a4975d07486e3d41fb0bc63710894affa323b
                  • Instruction ID: 842e46ac5b75871493291bc3071aec04cb085700fb22aab4cf73edda68073cb1
                  • Opcode Fuzzy Hash: 454e64a2c140c78ac1c09d91c32a4975d07486e3d41fb0bc63710894affa323b
                  • Instruction Fuzzy Hash: AEC1E6B264C3918BD322CF2584A076BFFE1AF97740F08496DE4D15B382D779890AC796
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092143624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_xLauncher.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: w1u$$W U$+[&Y$47$T3T5$X+\)$c/g-$cS'Q
                  • API String ID: 0-2291755801
                  • Opcode ID: 2fa13dc2c1c44e510c9746f46ed5d05ec53562d9eaabe92f7db13bdabe04031f
                  • Instruction ID: 0e000d0ef194e534a872b9aca1764fcc5bbb7122393326ec7202e282a22e0c83
                  • Opcode Fuzzy Hash: 2fa13dc2c1c44e510c9746f46ed5d05ec53562d9eaabe92f7db13bdabe04031f
                  • Instruction Fuzzy Hash: 56A1EEB5A193508BD7209F25E88136FBBE1EFC2308F54592DE4C59B350DB388946CB9B
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092143624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_xLauncher.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: 0$Acel$Ef~W$FR[`$St_v$`Mjp$exCj$lm$rvpf$z^yr
                  • API String ID: 0-1784461846
                  • Opcode ID: 38d058a4246af9e27b0a4d3ba4a34cf858c250db70937e4330b18fa5a1d6a780
                  • Instruction ID: de593a7aba0a4b4ed2533947fe1a7d67c62c5fb99aef8cd95165a538a09bc7be
                  • Opcode Fuzzy Hash: 38d058a4246af9e27b0a4d3ba4a34cf858c250db70937e4330b18fa5a1d6a780
                  • Instruction Fuzzy Hash: D90237B560C3518BC7048F25E89136FBBE1AFD5308F18486EE4C58B352DB39D94ACB5A
                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092143624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_xLauncher.jbxd
                  Yara matches
                  Similarity
                  • API ID: Clipboard$Global$CloseDataLockLongOpenUnlockWindow
                  • String ID:
                  • API String ID: 2832541153-0
                  • Opcode ID: f2203ab28d0576d61462a5c17bcb7f7600ac017b2ea799a40c192e1975df93af
                  • Instruction ID: 97ea91c22d5ae7e5b9c8b13deb6233e80460e5913be69dfa7c2dbb8e78e0b21f
                  • Opcode Fuzzy Hash: f2203ab28d0576d61462a5c17bcb7f7600ac017b2ea799a40c192e1975df93af
                  • Instruction Fuzzy Hash: 8C51E5B1D087928FD700AB7CD94A39EBFA0AB45310F04863ED8E597781D338A954C797
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092143624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_xLauncher.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: #&'$$KV$PE$[8'$f`vy$|8'
                  • API String ID: 0-901786309
                  • Opcode ID: 22921e54152e35852d7864b9951b0e6be910aeda6b8dbcc850104d63ef1ea1b2
                  • Instruction ID: f2474e64b7f290b38b33caec3c14869fa59ee5d828d9dfffcc58d7c71fdde309
                  • Opcode Fuzzy Hash: 22921e54152e35852d7864b9951b0e6be910aeda6b8dbcc850104d63ef1ea1b2
                  • Instruction Fuzzy Hash: 8B82FFB5500700CFC724CF29C891662BBF2FF9A314F19866DD8968B792E739E841CB95
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092143624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_xLauncher.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: 78$TsZq$pv$~q$31$?=
                  • API String ID: 0-3635031037
                  • Opcode ID: f620a66ecb55df7fc58d9ece39b3aaaba313be965ebcec3e7072a6d921bf2ff2
                  • Instruction ID: ce34578074efcf592b9224fecfcf9cb5b237ff9dfdb1144bf3910723a8e3ccf7
                  • Opcode Fuzzy Hash: f620a66ecb55df7fc58d9ece39b3aaaba313be965ebcec3e7072a6d921bf2ff2
                  • Instruction Fuzzy Hash: 010278B5200B02CFD728CF25D881B56BBB5FB46314F148AACE4969BB92D774E485CF84
                  APIs
                  • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 005EC8CB
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092210976.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                  • Associated: 00000003.00000002.2092196623.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092238372.00000000005F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092256934.00000000005FB000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092273468.00000000005FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092287722.0000000000601000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_5d0000_xLauncher.jbxd
                  Similarity
                  • API ID: FileFindFirst
                  • String ID:
                  • API String ID: 1974802433-0
                  • Opcode ID: 3a251d30784d73333e6ce12660807acda05580702994b09d255ebe3ee0ba5791
                  • Instruction ID: ea48f4747f43b1ba40750ff82ea963d96b812b9adef5881638cb681e44094696
                  • Opcode Fuzzy Hash: 3a251d30784d73333e6ce12660807acda05580702994b09d255ebe3ee0ba5791
                  • Instruction Fuzzy Hash: CA71D37180419D5EDF28EF2A9C8DAAEBFB9FB45300F1441D9E489A3251DB309E869F50
                  APIs
                  • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 005E5450
                  • IsDebuggerPresent.KERNEL32 ref: 005E551C
                  • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 005E553C
                  • UnhandledExceptionFilter.KERNEL32(?), ref: 005E5546
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092210976.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                  • Associated: 00000003.00000002.2092196623.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092238372.00000000005F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092256934.00000000005FB000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092273468.00000000005FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092287722.0000000000601000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_5d0000_xLauncher.jbxd
                  Similarity
                  • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                  • String ID:
                  • API String ID: 254469556-0
                  • Opcode ID: b350a0cda3759ffab162eeab5f7771db64c341771a22fc26988abb3049b775ab
                  • Instruction ID: 522423b534d33a7156ec6e1da9a3d708adca25b1776332b6a8873a07e2876fe1
                  • Opcode Fuzzy Hash: b350a0cda3759ffab162eeab5f7771db64c341771a22fc26988abb3049b775ab
                  • Instruction Fuzzy Hash: DC312775D053199BDF10EFA5D989BCDBBB8BF18304F1040AAE44CAB250EB749A89CF04
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092143624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_xLauncher.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: )(,*$NU~d$h|aa$igup
                  • API String ID: 0-143059678
                  • Opcode ID: 96753fe0c4b5c23692884ebfe7433b8f9c6d53fd44d930ff94e15cf01fc6f345
                  • Instruction ID: e399c97fad158a7d4b3ef684cb7d4296476cc49c03f36c0f1be86e288880a329
                  • Opcode Fuzzy Hash: 96753fe0c4b5c23692884ebfe7433b8f9c6d53fd44d930ff94e15cf01fc6f345
                  • Instruction Fuzzy Hash: DF521E70604B918FC735CF29D490B27BBE1AF56314F588A6EC4E68BB92C739E406CB54
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092143624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_xLauncher.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: &$Fa$_Q
                  • API String ID: 0-1172198529
                  • Opcode ID: 8d28bbaa24a835a40fdb333aced1ab07a9ee7cba489cf7dfe95071a0e64340a8
                  • Instruction ID: 5930f355581a27b162a52f55cba0b1af5c7241ca9883d0eb4953c51ebd911f4b
                  • Opcode Fuzzy Hash: 8d28bbaa24a835a40fdb333aced1ab07a9ee7cba489cf7dfe95071a0e64340a8
                  • Instruction Fuzzy Hash: ACE1267264C7504BD314CF29889436BFBE2EFD1314F19893DE8D55B381DB7989098B8A
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092143624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_xLauncher.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: )$)$IEND
                  • API String ID: 0-588110143
                  • Opcode ID: 4ea11ce3b91a3cbc7cbf71fd51f5e784c9b0a6a76b48f730835f1c0f1c2bf4de
                  • Instruction ID: 825a59512649c6ee5090f5408381d00a5ffb775a041735f94c24c1e6c9cbd73f
                  • Opcode Fuzzy Hash: 4ea11ce3b91a3cbc7cbf71fd51f5e784c9b0a6a76b48f730835f1c0f1c2bf4de
                  • Instruction Fuzzy Hash: 2FE1AFB1A087029FD310DF29D84171ABBE4BB94308F14463EF994AB3C1D779E955CB8A
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092143624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_xLauncher.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: 4$95CBEFD18DDCE7726CA361616D950AC3$zr
                  • API String ID: 0-1367084576
                  • Opcode ID: 8773539613985a28f913871aad1912a419b42aeed569dfaca877839ed66d23a5
                  • Instruction ID: 5f09388decda20fa4ab73873a218c3cc4f1339e5cccc3754d58ae5ae3fb146a8
                  • Opcode Fuzzy Hash: 8773539613985a28f913871aad1912a419b42aeed569dfaca877839ed66d23a5
                  • Instruction Fuzzy Hash: 9BD104716083808BE714CF25D8917ABBFE1EFD2308F14892DE4E59B392D7399909CB56
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092143624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_xLauncher.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: upxm$xhm~$yP@R
                  • API String ID: 0-1390017308
                  • Opcode ID: 88b1490a02fe49a57f58feb320aa09e02593e861b904f645aec105220b99ae74
                  • Instruction ID: af5498b4fc6cc72f560c695589bd454323e307ad006dfb9a2d156b6831be40ec
                  • Opcode Fuzzy Hash: 88b1490a02fe49a57f58feb320aa09e02593e861b904f645aec105220b99ae74
                  • Instruction Fuzzy Hash: ED71C1B5A083118FC718DF29D89072AB7E1BF89304F49457ED88A97391DB78DC05CB9A
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092143624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_xLauncher.jbxd
                  Yara matches
                  Similarity
                  • API ID: FreeLibrary
                  • String ID: vT^;
                  • API String ID: 3664257935-2442543054
                  • Opcode ID: 892e997350e48c3dad14e8eebe585f11da97636dacdf2979248efea06123300e
                  • Instruction ID: 875542a9b18cbdcb975dd6f04bbcbe52110891a420304d52972b13c5b32b9c9f
                  • Opcode Fuzzy Hash: 892e997350e48c3dad14e8eebe585f11da97636dacdf2979248efea06123300e
                  • Instruction Fuzzy Hash: 0BA115757447418FD321CF29C8817A3BBE2EF56304F58497DD4D64B382D279A80ACB65
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092143624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_xLauncher.jbxd
                  Yara matches
                  Similarity
                  • API ID: InitializeThunk
                  • String ID: >vG[$p
                  • API String ID: 2994545307-2792220601
                  • Opcode ID: 77f81105453dd50864e4faf62509e2308e9e8fb1c1e5475ac8046641157ed9c6
                  • Instruction ID: 06dc2a1fe042ad7918ba1b4204c0e2a3966152431c91071ed29db84b6afc3124
                  • Opcode Fuzzy Hash: 77f81105453dd50864e4faf62509e2308e9e8fb1c1e5475ac8046641157ed9c6
                  • Instruction Fuzzy Hash: 02C16E7170D3208BD714CE28D8917BBB7D2EF95304F99853EE9859B381EA78DC05839A
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092143624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_xLauncher.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: G{$Z[3r
                  • API String ID: 0-2113663995
                  • Opcode ID: c9e13038f21d3b6ee1033d7122ba0b877ebeb07536f1aa438eb4e88d76e49ebe
                  • Instruction ID: 1a5feb0809f76519750067d64de5eff0df4b781c6f08c4dade58f915db27b622
                  • Opcode Fuzzy Hash: c9e13038f21d3b6ee1033d7122ba0b877ebeb07536f1aa438eb4e88d76e49ebe
                  • Instruction Fuzzy Hash: 884116719183D18AE330CF65D8507EFB7D1EFC2318F18897ED8D8A7292E67909418796
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092143624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_xLauncher.jbxd
                  Yara matches
                  Similarity
                  • API ID: InitializeThunk
                  • String ID: 5|iL$5|iL
                  • API String ID: 2994545307-2062425083
                  • Opcode ID: 677af188185cee45a08ca9309d9910533c4f2ef95330105613439affcdf07f9f
                  • Instruction ID: 3506aa51528a493ff225667ae5ed524b58d6f492e6e9120b7ca6d82707b63838
                  • Opcode Fuzzy Hash: 677af188185cee45a08ca9309d9910533c4f2ef95330105613439affcdf07f9f
                  • Instruction Fuzzy Hash: 8E316E37A052209BD3388B19CC81B6F7252ABC6714F2ED63DDC8937399C6785C1587C9
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092143624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_xLauncher.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: KJE
                  • API String ID: 0-1538290119
                  • Opcode ID: 964eb763c395bb61725b993b91cc913ec7018d1f9062cb967cdd123453a630f1
                  • Instruction ID: a7a5120e6780268d000a41d4099c5f4f536610df1e5312aae1d7e958802ba678
                  • Opcode Fuzzy Hash: 964eb763c395bb61725b993b91cc913ec7018d1f9062cb967cdd123453a630f1
                  • Instruction Fuzzy Hash: 0A720071201701CFD728CF29C8917A3B7F2FF9A314B18856DD4868B7A1E739A892CB55
                  APIs
                  • CoCreateInstance.OLE32(00443598,00000000,00000001,00443588), ref: 00423C09
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092143624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_xLauncher.jbxd
                  Yara matches
                  Similarity
                  • API ID: CreateInstance
                  • String ID:
                  • API String ID: 542301482-0
                  • Opcode ID: 7fbc7cf3d751a120928930b0b689cd99fe2e3c8587a2ef96e0c7bb893b3d262e
                  • Instruction ID: 60c59c07a56f120d1b088f973bfe9659beae6fa0e4e430aea44acf461ba3bc47
                  • Opcode Fuzzy Hash: 7fbc7cf3d751a120928930b0b689cd99fe2e3c8587a2ef96e0c7bb893b3d262e
                  • Instruction Fuzzy Hash: 2351EFB1700320ABDB209F25DC86B6733B4EF81769F444519F9858B390E37DEA05C76A
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092143624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_xLauncher.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: "
                  • API String ID: 0-123907689
                  • Opcode ID: 7ba8085390e9d9d1674724f665db03ec52fefc01fc448a2f4b7fc4b4a0dceecc
                  • Instruction ID: 0bf4e8bad12aa6d766d245719c22132dc09340585cf76315267bd615b0f76128
                  • Opcode Fuzzy Hash: 7ba8085390e9d9d1674724f665db03ec52fefc01fc448a2f4b7fc4b4a0dceecc
                  • Instruction Fuzzy Hash: 11D1F572B083259FC714CE65A89076FB7E5AB84314F48896FE89987382DB38DD04C7D6
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092143624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_xLauncher.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: OM}
                  • API String ID: 0-1006303042
                  • Opcode ID: 2b5ae30a076d6df3b2ea99c6811f77c0edc01f82643934aa06ecb690bdbe9297
                  • Instruction ID: cbf78b77270521ec31c9fb57e800a463c8e06c90812f12a46eceaef76dd37196
                  • Opcode Fuzzy Hash: 2b5ae30a076d6df3b2ea99c6811f77c0edc01f82643934aa06ecb690bdbe9297
                  • Instruction Fuzzy Hash: CD5147789083519AC714CF26C4917B7B7F1EF92354F08591DEDC24B391E3799884CB9A
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092143624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_xLauncher.jbxd
                  Yara matches
                  Similarity
                  • API ID: InitializeThunk
                  • String ID: @
                  • API String ID: 2994545307-2766056989
                  • Opcode ID: 8f0bf80c0552495aa0227107b964bf923cd9330abae26570ada9f4a67ff19873
                  • Instruction ID: 6b8ae52c6521f3d1ed02e3b489489dde1a9e1440d5873d559aa86c1d688a76d3
                  • Opcode Fuzzy Hash: 8f0bf80c0552495aa0227107b964bf923cd9330abae26570ada9f4a67ff19873
                  • Instruction Fuzzy Hash: FF417971A053108BE718CF24C89236BB7E1FF85318F19852DE5999B390E73DAC14C78A
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092143624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_xLauncher.jbxd
                  Yara matches
                  Similarity
                  • API ID: InitializeThunk
                  • String ID: 5|iL
                  • API String ID: 2994545307-1880071150
                  • Opcode ID: 3b5c2aa44bfe4f0559dc0e7030eff22385ad0ba6542dd51eeab3ccc2b6a908ed
                  • Instruction ID: abde64dbdc7a399865c2e3e77a58170057d43298c1254d85a5409ebda0281772
                  • Opcode Fuzzy Hash: 3b5c2aa44bfe4f0559dc0e7030eff22385ad0ba6542dd51eeab3ccc2b6a908ed
                  • Instruction Fuzzy Hash: 14311334245300AFF7109F55CC81B77B7E5EB4A319F28452EE685A73A1D2B9AC818B49
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092143624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_xLauncher.jbxd
                  Yara matches
                  Similarity
                  • API ID: InitializeThunk
                  • String ID: efg`
                  • API String ID: 2994545307-115929991
                  • Opcode ID: 8f8c653e9c7432d00b43088098e98263c012b57c006b697c092851ac2fc82c8e
                  • Instruction ID: 50b1a9d1400f02cfd64d5a74a5e027d323d61da3c048a24fcbe79ff49634978c
                  • Opcode Fuzzy Hash: 8f8c653e9c7432d00b43088098e98263c012b57c006b697c092851ac2fc82c8e
                  • Instruction Fuzzy Hash: 26412C703047918FE729CB3694A1B73BBD2AF53304F9D896ED0C747292D7656801C759
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092143624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_xLauncher.jbxd
                  Yara matches
                  Similarity
                  • API ID: InitializeThunk
                  • String ID: @
                  • API String ID: 2994545307-2766056989
                  • Opcode ID: 8035c0c9a67ca93b32ae3a0fa005d34e97f0baa2108304f2c05b048c804e215c
                  • Instruction ID: 97c176db586c7d19d178caac3a84e5ab3517daa35fde1b80b098ed901c9d4776
                  • Opcode Fuzzy Hash: 8035c0c9a67ca93b32ae3a0fa005d34e97f0baa2108304f2c05b048c804e215c
                  • Instruction Fuzzy Hash: 8A31F5715083048FE310DF59D8C16ABB7F4FF96314F54492DE994973A0E3B99848CB5A
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092143624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_xLauncher.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: {FLM
                  • API String ID: 0-3184276695
                  • Opcode ID: a70bac8570a78eb30417192bc813facde4fd11b492a8a323cda1a002be69095d
                  • Instruction ID: a314b66382b70de4c72545c445d9f91f9b08b8a0d60944e6470e90e84f42d60c
                  • Opcode Fuzzy Hash: a70bac8570a78eb30417192bc813facde4fd11b492a8a323cda1a002be69095d
                  • Instruction Fuzzy Hash: F001F9313447808BD719C7368CA06EBBB53E7C3219F5EC76DC19A07A9AC73824068B86
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092143624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_xLauncher.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 508e2121c0f7d8165598542375894f54164fa314eaecadba0bac6083f88fef54
                  • Instruction ID: d7d763185584c11bfcd20891fe4b3aff94b0cf42586f13fcab9308ff2bbdef73
                  • Opcode Fuzzy Hash: 508e2121c0f7d8165598542375894f54164fa314eaecadba0bac6083f88fef54
                  • Instruction Fuzzy Hash: BA52143AA48211CFD704CF28D88026AB7F2FB8A314F1A897DD99597351D738E855CB86
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092143624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_xLauncher.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 92cf00b53b8af0f8cad231d7b70b51fc654ab1b3a45eb25b42825f70827e1137
                  • Instruction ID: b19ab44e36407440470d2cb0909f12781a4405458bb039ca71a9dada2131c5af
                  • Opcode Fuzzy Hash: 92cf00b53b8af0f8cad231d7b70b51fc654ab1b3a45eb25b42825f70827e1137
                  • Instruction Fuzzy Hash: E6120539A48211CFE704CF28D88026AB7F1FF8A314F0A897DD68597351D738E966CB46
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092143624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_xLauncher.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d6ea46eb8a6524690d843dc20c5fb61beaa21c6e4c76ab0b786f7c624456ce5a
                  • Instruction ID: 1c9cc30a16714bb6d48a7539d6704a91b294ccc741bb0596946bbd7f6803d79f
                  • Opcode Fuzzy Hash: d6ea46eb8a6524690d843dc20c5fb61beaa21c6e4c76ab0b786f7c624456ce5a
                  • Instruction Fuzzy Hash: C1121435A48211CFE704CF24D8802AAB7F1FF8A314F0A897DDA8697351D739E956CB46
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092143624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_xLauncher.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e9db8de0c0943a215c2a45d550bd6384decc1ffd6558e240cfb9de4822f54a96
                  • Instruction ID: 9316307a8297b3ffb8154b6e588bb5698ec7a89278114cb28ea95b40f7f559d5
                  • Opcode Fuzzy Hash: e9db8de0c0943a215c2a45d550bd6384decc1ffd6558e240cfb9de4822f54a96
                  • Instruction Fuzzy Hash: 48F16A71A04215CFCB14CF64D8916AFB7B2FF96304F58406DE8956B392E738AC16CB49
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092143624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_xLauncher.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 86aaef4c794619c0bcdf2b2c1e97aea5dd9ba63a1baa26358d106c3a606d9ecc
                  • Instruction ID: c3c51fe5c703fd793dd28ea1902bdbeaa6dcd5dd7fb71bedd39309c9dbac5c5a
                  • Opcode Fuzzy Hash: 86aaef4c794619c0bcdf2b2c1e97aea5dd9ba63a1baa26358d106c3a606d9ecc
                  • Instruction Fuzzy Hash: DCB166B6908204DBD7249F14DC627BB73A0FF86318F09853DE9864B391E739AD44C79A
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092143624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_xLauncher.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 6c56ffa4b278840cdb210e64d8c4544f77bcb5db9ced20a20139485975e0c9ad
                  • Instruction ID: 39af44af45aa9159e77cf681044e9918bb15d87033d67094cd06bff32db97e91
                  • Opcode Fuzzy Hash: 6c56ffa4b278840cdb210e64d8c4544f77bcb5db9ced20a20139485975e0c9ad
                  • Instruction Fuzzy Hash: 87F1CF71208B418FC724DF29C980A2BFBE2FF99304F04892EE4D557791E679E944CB96
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092143624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_xLauncher.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: b48363801c42e7f633e1fd52c808882014b3a146e1427cae5019aa8a13b02bf9
                  • Instruction ID: 9e188456093ea531a07c904740983b5670ae3f809d91eac7994e4fce8e8c741d
                  • Opcode Fuzzy Hash: b48363801c42e7f633e1fd52c808882014b3a146e1427cae5019aa8a13b02bf9
                  • Instruction Fuzzy Hash: 31C12476A00225CFDB14CF68D88179EB7B2FF85310F09826DD845AB781DB78A812CBD4
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092143624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_xLauncher.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 49bd99ff3b20ddffc8e27113cf7a5ab44260eb0b10adcdb5c33aba97b5b59606
                  • Instruction ID: 60904a9924ccadaae792e35d667e3de84b4daaa0f84c5f102ab81dbef8688638
                  • Opcode Fuzzy Hash: 49bd99ff3b20ddffc8e27113cf7a5ab44260eb0b10adcdb5c33aba97b5b59606
                  • Instruction Fuzzy Hash: 3EC12739A08215CFDB04CF64D8802AEB7B1FB8A314F1A847DCA8697351C739E956CB95
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092143624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_xLauncher.jbxd
                  Yara matches
                  Similarity
                  • API ID: InitializeThunk
                  • String ID:
                  • API String ID: 2994545307-0
                  • Opcode ID: 02d962c7e31647a17bd56b447670b57c19dbc0da820584a41b19d2fe4e4b5315
                  • Instruction ID: b97290930fe42209ebc0485e1ea3ddd793542c1890314c6d02aedefa4e79d3a7
                  • Opcode Fuzzy Hash: 02d962c7e31647a17bd56b447670b57c19dbc0da820584a41b19d2fe4e4b5315
                  • Instruction Fuzzy Hash: 9991F5356083519BD724DF14C890A6BB7F1FF89350F19882DE99197361D739EC81CB86
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092143624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_xLauncher.jbxd
                  Yara matches
                  Similarity
                  • API ID: InitializeThunk
                  • String ID:
                  • API String ID: 2994545307-0
                  • Opcode ID: 0ec081d72aea06f78b2142ddb3c7def7af2816c8ae05f124d865254c0aa4bfaf
                  • Instruction ID: 64c47b1ab94feeefd4c4a20103c057ad0f18f3b66e4b952c8880aed29def7398
                  • Opcode Fuzzy Hash: 0ec081d72aea06f78b2142ddb3c7def7af2816c8ae05f124d865254c0aa4bfaf
                  • Instruction Fuzzy Hash: 12919A346043019FE714DF19C490A6BB7F2EF99314F19892EE9858B361DB39EC91CB86
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092143624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_xLauncher.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 5ce3bd4495dcedc597afd575fe872603cde8b168ee787bc2e024ae0b7f51150d
                  • Instruction ID: 574631d812adf6d1ccbd228a00d3fb17c29a5b5de23592ac790880a07ce4f0d7
                  • Opcode Fuzzy Hash: 5ce3bd4495dcedc597afd575fe872603cde8b168ee787bc2e024ae0b7f51150d
                  • Instruction Fuzzy Hash: B0512960208B919ED3258F3590503B3BFF0DF57304F5848AED2E69B352D77DA44A8769
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092143624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_xLauncher.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: eca2093ceb1ff82705b9d9f188e48c2cd001b933bc8c9904200fd0cfae43ccf4
                  • Instruction ID: dbc3d241f8b3db45468fb5ff1801d682b9420633b21be94ce3fa1f6397c63540
                  • Opcode Fuzzy Hash: eca2093ceb1ff82705b9d9f188e48c2cd001b933bc8c9904200fd0cfae43ccf4
                  • Instruction Fuzzy Hash: E951AA76A00315CFDB10CF68DC917AAB3B1FF45304F19416DD945AB350EB38A925C788
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092143624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_xLauncher.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 5043121ea707d9c4434847240d413b801cf196c94de0b8475f6fdaa61d8bca58
                  • Instruction ID: 9d7c2b836c5306d37a6b93e754e54519da0fbde8c43f5bcab1b8b703c9c36ff9
                  • Opcode Fuzzy Hash: 5043121ea707d9c4434847240d413b801cf196c94de0b8475f6fdaa61d8bca58
                  • Instruction Fuzzy Hash: 595137317093A58BEB308E28E4413EBB7E1DF55310F96492FD4D987381D23CA905D74A
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092143624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_xLauncher.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 9c6657a002c6e5b4650e6839116e29613a6d6cc702b65bf7f5d7927f26d40006
                  • Instruction ID: 5e98b70173ad86b6ace481bda1b7e45e80e568dea6e36557a4f9787392861e45
                  • Opcode Fuzzy Hash: 9c6657a002c6e5b4650e6839116e29613a6d6cc702b65bf7f5d7927f26d40006
                  • Instruction Fuzzy Hash: BE219537A51A148BD310CDA5CC847927296ABD9328F3E877989789B3D2C97BAC0346C0
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092143624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_xLauncher.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: cf8178d1d0f0b6815f5d0f10f173b886a6f30786ab4c3eb51090a6dc703dc372
                  • Instruction ID: fed0c287326ca92b9bc953c0812430d38a507619049f60e0670667edd6c1a914
                  • Opcode Fuzzy Hash: cf8178d1d0f0b6815f5d0f10f173b886a6f30786ab4c3eb51090a6dc703dc372
                  • Instruction Fuzzy Hash: 1A216B74104B418FD325CF29C0A0A52FBF2FF8A308B148A6DC4D68BB51D735E84ACB55
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092143624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_xLauncher.jbxd
                  Yara matches
                  Similarity
                  • API ID: InitializeThunk
                  • String ID:
                  • API String ID: 2994545307-0
                  • Opcode ID: 71493dfae0976ea30e96c66a8ea46969ba6bb111a32a73c0a820e37529ea9e15
                  • Instruction ID: bb6a34fadf1d6beadb2a44e60f0c816be90e7ae9456ab20467f1fabd58f3d6ee
                  • Opcode Fuzzy Hash: 71493dfae0976ea30e96c66a8ea46969ba6bb111a32a73c0a820e37529ea9e15
                  • Instruction Fuzzy Hash: E9118C346042005FE7208F15C8C0AABBBA1EBC6318F68442DEAD057392E6758C66C795
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092143624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_xLauncher.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                  • Instruction ID: 7c1f6d6feb669a1bcae78b178d30467eb78e265fbfc800183f3e250ee45102b6
                  • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                  • Instruction Fuzzy Hash: 5F112533A041D24EC3128D3C8400565BFA30AA7274F1AD39AF4B89B3D2D6268D8A8369
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092143624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_xLauncher.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 75d929a40ef07c6e14fae4fe2d175e69af433c78edeb71fcf2e184bb9819846d
                  • Instruction ID: 8bf6f271ed73f60eecdf394c5aad843aa4da6d94f668066ef172841f83189961
                  • Opcode Fuzzy Hash: 75d929a40ef07c6e14fae4fe2d175e69af433c78edeb71fcf2e184bb9819846d
                  • Instruction Fuzzy Hash: B50192F170071157D620AE15A5D0737A3A89F91708F48443EDA98AB341EB7AEC4582D9
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092143624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_xLauncher.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 0ac2c67ad08e358a0df8421f570cfcf2776ef4fd8c04b8957e61e5da516350ad
                  • Instruction ID: 9e3602c67c84267bfbf54267d61fa0a9cb588792b5b3092dc17a3f3b6c42c92a
                  • Opcode Fuzzy Hash: 0ac2c67ad08e358a0df8421f570cfcf2776ef4fd8c04b8957e61e5da516350ad
                  • Instruction Fuzzy Hash: C71125752C2700DFD7258F15CCC457273A2EF96310B29D47ED04A8B362DAB898418B08
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092143624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_xLauncher.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 54dd474cf1f47f5cdf98fcb82f635e07d9222514e138a179c1f62e8a185ed476
                  • Instruction ID: 2f11de84ab7a71122bc6be4116804059335cfe89b2f77966ef6f04f7189db86d
                  • Opcode Fuzzy Hash: 54dd474cf1f47f5cdf98fcb82f635e07d9222514e138a179c1f62e8a185ed476
                  • Instruction Fuzzy Hash: 3BF0593B7192160BE311DD79DD80A2BB396EBD5204B0E4139F940E3781D1B4E80182A9
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092143624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_xLauncher.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 35d4314cff306e1a82fba4cdb71ab16e38f411eff9ef911e29b6deda17251ff0
                  • Instruction ID: ca3237c995a23a1e332bd25f792f94f26254bb22c46ccef7c9d6ea126c0d45b0
                  • Opcode Fuzzy Hash: 35d4314cff306e1a82fba4cdb71ab16e38f411eff9ef911e29b6deda17251ff0
                  • Instruction Fuzzy Hash: EBC01228A8A2894FC30AAF2488524246B70DA0310470828AAC186F7262C82488068B1D
                  APIs
                  • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 005E4CB6
                  • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 005E4CC4
                  • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 005E4CD5
                  • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 005E4CE6
                  • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 005E4CF7
                  • GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 005E4D08
                  • GetProcAddress.KERNEL32(00000000,InitOnceExecuteOnce), ref: 005E4D19
                  • GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 005E4D2A
                  • GetProcAddress.KERNEL32(00000000,CreateSemaphoreW), ref: 005E4D3B
                  • GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 005E4D4C
                  • GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 005E4D5D
                  • GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 005E4D6E
                  • GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 005E4D7F
                  • GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 005E4D90
                  • GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 005E4DA1
                  • GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 005E4DB2
                  • GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 005E4DC3
                  • GetProcAddress.KERNEL32(00000000,FlushProcessWriteBuffers), ref: 005E4DD4
                  • GetProcAddress.KERNEL32(00000000,FreeLibraryWhenCallbackReturns), ref: 005E4DE5
                  • GetProcAddress.KERNEL32(00000000,GetCurrentProcessorNumber), ref: 005E4DF6
                  • GetProcAddress.KERNEL32(00000000,CreateSymbolicLinkW), ref: 005E4E07
                  • GetProcAddress.KERNEL32(00000000,GetCurrentPackageId), ref: 005E4E18
                  • GetProcAddress.KERNEL32(00000000,GetTickCount64), ref: 005E4E29
                  • GetProcAddress.KERNEL32(00000000,GetFileInformationByHandleEx), ref: 005E4E3A
                  • GetProcAddress.KERNEL32(00000000,SetFileInformationByHandle), ref: 005E4E4B
                  • GetProcAddress.KERNEL32(00000000,GetSystemTimePreciseAsFileTime), ref: 005E4E5C
                  • GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 005E4E6D
                  • GetProcAddress.KERNEL32(00000000,WakeConditionVariable), ref: 005E4E7E
                  • GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 005E4E8F
                  • GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 005E4EA0
                  • GetProcAddress.KERNEL32(00000000,InitializeSRWLock), ref: 005E4EB1
                  • GetProcAddress.KERNEL32(00000000,AcquireSRWLockExclusive), ref: 005E4EC2
                  • GetProcAddress.KERNEL32(00000000,TryAcquireSRWLockExclusive), ref: 005E4ED3
                  • GetProcAddress.KERNEL32(00000000,ReleaseSRWLockExclusive), ref: 005E4EE4
                  • GetProcAddress.KERNEL32(00000000,SleepConditionVariableSRW), ref: 005E4EF5
                  • GetProcAddress.KERNEL32(00000000,CreateThreadpoolWork), ref: 005E4F06
                  • GetProcAddress.KERNEL32(00000000,SubmitThreadpoolWork), ref: 005E4F17
                  • GetProcAddress.KERNEL32(00000000,CloseThreadpoolWork), ref: 005E4F28
                  • GetProcAddress.KERNEL32(00000000,CompareStringEx), ref: 005E4F39
                  • GetProcAddress.KERNEL32(00000000,GetLocaleInfoEx), ref: 005E4F4A
                  • GetProcAddress.KERNEL32(00000000,LCMapStringEx), ref: 005E4F5B
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092210976.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                  • Associated: 00000003.00000002.2092196623.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092238372.00000000005F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092256934.00000000005FB000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092273468.00000000005FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092287722.0000000000601000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_5d0000_xLauncher.jbxd
                  Similarity
                  • API ID: AddressProc$HandleModule
                  • String ID: AcquireSRWLockExclusive$CloseThreadpoolTimer$CloseThreadpoolWait$CloseThreadpoolWork$CompareStringEx$CreateEventExW$CreateSemaphoreExW$CreateSemaphoreW$CreateSymbolicLinkW$CreateThreadpoolTimer$CreateThreadpoolWait$CreateThreadpoolWork$FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$FlushProcessWriteBuffers$FreeLibraryWhenCallbackReturns$GetCurrentPackageId$GetCurrentProcessorNumber$GetFileInformationByHandleEx$GetLocaleInfoEx$GetSystemTimePreciseAsFileTime$GetTickCount64$InitOnceExecuteOnce$InitializeConditionVariable$InitializeCriticalSectionEx$InitializeSRWLock$LCMapStringEx$ReleaseSRWLockExclusive$SetFileInformationByHandle$SetThreadpoolTimer$SetThreadpoolWait$SleepConditionVariableCS$SleepConditionVariableSRW$SubmitThreadpoolWork$TryAcquireSRWLockExclusive$WaitForThreadpoolTimerCallbacks$WakeAllConditionVariable$WakeConditionVariable$kernel32.dll
                  • API String ID: 667068680-295688737
                  • Opcode ID: 3cd2b584b638be04b71d3cf6418bafbc16b5c8b3849d2435e6fe8724a9a4fa71
                  • Instruction ID: 07892918c445267f27fc8ea8e7932d6919d9462ee164696842a42b8b87edcb0e
                  • Opcode Fuzzy Hash: 3cd2b584b638be04b71d3cf6418bafbc16b5c8b3849d2435e6fe8724a9a4fa71
                  • Instruction Fuzzy Hash: 7D610371992758ABCB046FF4AE0D9F63FE8BB397413004426B241D3265DBFC6149EB64
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092143624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_xLauncher.jbxd
                  Yara matches
                  Similarity
                  • API ID: Variant$ClearInit
                  • String ID: $"$)$+$+$-$/$3$;$A$C$E$F$G$G$Q$S$U$W$Y$[$]$_
                  • API String ID: 2610073882-1808557734
                  • Opcode ID: 4ae87121ca058b1fddb145d820b293e0072d2ecef1e013bd4af0c5aa911ac905
                  • Instruction ID: 429d5049784534c88a2d89a8b68df12836aab516dafafa9b016fbf5dbc04ffee
                  • Opcode Fuzzy Hash: 4ae87121ca058b1fddb145d820b293e0072d2ecef1e013bd4af0c5aa911ac905
                  • Instruction Fuzzy Hash: B5512B61108BC0CEDB168F38D8D8316BF916F56318F18859DC9A90F38BC7B9D519CBA6
                  APIs
                  • type_info::operator==.LIBVCRUNTIME ref: 005E91F2
                  • ___TypeMatch.LIBVCRUNTIME ref: 005E9300
                  • CatchIt.LIBVCRUNTIME ref: 005E9351
                  • _UnwindNestedFrames.LIBCMT ref: 005E9452
                  • CallUnexpected.LIBVCRUNTIME ref: 005E946D
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092210976.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                  • Associated: 00000003.00000002.2092196623.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092238372.00000000005F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092256934.00000000005FB000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092273468.00000000005FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092287722.0000000000601000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_5d0000_xLauncher.jbxd
                  Similarity
                  • API ID: CallCatchFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                  • String ID: @]^$csm$csm$csm
                  • API String ID: 4119006552-799744425
                  • Opcode ID: 3e94d719b8ae84587a9c5e29787b9a4ccc71a26c3d80cf6489dd824cb4c82ef8
                  • Instruction ID: 03219d0a21a2798768fb70d16c68df27216438f2269fdfe276f57faccf725ad7
                  • Opcode Fuzzy Hash: 3e94d719b8ae84587a9c5e29787b9a4ccc71a26c3d80cf6489dd824cb4c82ef8
                  • Instruction Fuzzy Hash: 7BB1AB75C0028AEFCF1CDFA6C8849AEBFB5FF48310B14445AE8856B242D731DA52CB91
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092143624.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_xLauncher.jbxd
                  Yara matches
                  Similarity
                  • API ID: Uninitialize
                  • String ID: :+*)$TMRC$frogs-severz.sbs$h$)5*$/=-$SQ$WU$[Y
                  • API String ID: 3861434553-1470547384
                  • Opcode ID: f6a9089406869b2dad6371ecaef34e88e63f2cfa4cda6aa3744e237e44161587
                  • Instruction ID: 9964acfc70bf0bec946f210e18c74711709ed7fcba6d1ea405e45b4af4bdc7c9
                  • Opcode Fuzzy Hash: f6a9089406869b2dad6371ecaef34e88e63f2cfa4cda6aa3744e237e44161587
                  • Instruction Fuzzy Hash: EAB114765083D18AD3388F25C4657EFBBE1ABD2304F19896DC4DA5B392DB394406CB86
                  APIs
                  • _ValidateLocalCookies.LIBCMT ref: 005E6167
                  • ___except_validate_context_record.LIBVCRUNTIME ref: 005E616F
                  • _ValidateLocalCookies.LIBCMT ref: 005E61F8
                  • __IsNonwritableInCurrentImage.LIBCMT ref: 005E6223
                  • _ValidateLocalCookies.LIBCMT ref: 005E6278
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092210976.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                  • Associated: 00000003.00000002.2092196623.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092238372.00000000005F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092256934.00000000005FB000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092273468.00000000005FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092287722.0000000000601000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_5d0000_xLauncher.jbxd
                  Similarity
                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                  • String ID: ^^$csm
                  • API String ID: 1170836740-3765710807
                  • Opcode ID: 7f8fdb603672997dc7c0eb0359e9498ed5286d2102324b92d509668976045d58
                  • Instruction ID: b943d13b7199b127325f8206969e1ebd94d3ce2875227de2801e21fafd91e68e
                  • Opcode Fuzzy Hash: 7f8fdb603672997dc7c0eb0359e9498ed5286d2102324b92d509668976045d58
                  • Instruction Fuzzy Hash: EE417934A00299EBCF18DF6ACC48AAEBFB1FF54394F048055E9559B392D735EA04CB80
                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092210976.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                  • Associated: 00000003.00000002.2092196623.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092238372.00000000005F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092256934.00000000005FB000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092273468.00000000005FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092287722.0000000000601000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_5d0000_xLauncher.jbxd
                  Similarity
                  • API ID: __freea$__alloca_probe_16$Info
                  • String ID:
                  • API String ID: 127012223-0
                  • Opcode ID: f200e6fc72673d4e800ca0fac7a258714df90755dd78e31fb8b0f3189ff96e53
                  • Instruction ID: c923966aafcf2f8464b467da3423063ae3e224ddb11d2bb8d0abf4763d8651cb
                  • Opcode Fuzzy Hash: f200e6fc72673d4e800ca0fac7a258714df90755dd78e31fb8b0f3189ff96e53
                  • Instruction Fuzzy Hash: D171D47290024E9BDF219B548C45BBF7FAABF89314F2C2415EA44A72C3E779DD048B60
                  APIs
                  • FreeLibrary.KERNEL32(00000000,?,005E9EE2,005E41E0,?,00000000,?,?,?,005E9BEB,00000022,FlsSetValue,005F3DDC,005F3DE4,?), ref: 005E9E94
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092210976.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                  • Associated: 00000003.00000002.2092196623.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092238372.00000000005F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092256934.00000000005FB000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092273468.00000000005FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092287722.0000000000601000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_5d0000_xLauncher.jbxd
                  Similarity
                  • API ID: FreeLibrary
                  • String ID: api-ms-$ext-ms-
                  • API String ID: 3664257935-537541572
                  • Opcode ID: 2756dce777b8b029ffdfa24e6bc82efec147e9ade835c4abf201e4abaf49e0f4
                  • Instruction ID: cd89f6ae2a5de22670eba049624d3ba9fca4518b41e8b759029c13a93f82d93c
                  • Opcode Fuzzy Hash: 2756dce777b8b029ffdfa24e6bc82efec147e9ade835c4abf201e4abaf49e0f4
                  • Instruction Fuzzy Hash: 3A212B31A00292ABDB25CB26DC44B6A3F5CBFA1760F250120EE85E7291D734ED05D6E0
                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092210976.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                  • Associated: 00000003.00000002.2092196623.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092238372.00000000005F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092256934.00000000005FB000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092273468.00000000005FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092287722.0000000000601000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_5d0000_xLauncher.jbxd
                  Similarity
                  • API ID: CreateFile
                  • String ID:
                  • API String ID: 823142352-0
                  • Opcode ID: 1ef331753114d0dd101acc0e477224d8aa0bce68cece8583726a4c17c9bc3949
                  • Instruction ID: e2d00a8969be4baac6d00a70d635760ab5ba8fc068baee88c36584f52d2f2aef
                  • Opcode Fuzzy Hash: 1ef331753114d0dd101acc0e477224d8aa0bce68cece8583726a4c17c9bc3949
                  • Instruction Fuzzy Hash: FC7112B490420ADFDB14DFACD5586AEBFF0BB48700F20891BE846AB350D7389945DF92
                  APIs
                  • GetLastError.KERNEL32(?,?,005E8831,005E5F0D,005E55A4), ref: 005E8848
                  • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 005E8856
                  • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 005E886F
                  • SetLastError.KERNEL32(00000000,005E8831,005E5F0D,005E55A4), ref: 005E88C1
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092210976.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                  • Associated: 00000003.00000002.2092196623.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092238372.00000000005F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092256934.00000000005FB000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092273468.00000000005FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092287722.0000000000601000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_5d0000_xLauncher.jbxd
                  Similarity
                  • API ID: ErrorLastValue___vcrt_
                  • String ID:
                  • API String ID: 3852720340-0
                  • Opcode ID: 47933ec6e361cc8c22acb128322c153365182d0ea773c5dde8ff1c6d1d7c22bb
                  • Instruction ID: 242beae9d08b4d3b1a38baa437a8b90c01fc274a9ebb63b3c693d42a610e7cbc
                  • Opcode Fuzzy Hash: 47933ec6e361cc8c22acb128322c153365182d0ea773c5dde8ff1c6d1d7c22bb
                  • Instruction Fuzzy Hash: 9701D83211D6529DFA2C2BB7BC8A93A2F58FBA17B43600B29F858D41E1EF164C05F654
                  APIs
                  • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,BB40E64E,?,?,00000000,005F25EB,000000FF,?,005E7015,?,?,005E70B1,00000000), ref: 005E6F89
                  • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 005E6F9B
                  • FreeLibrary.KERNEL32(00000000,?,00000000,005F25EB,000000FF,?,005E7015,?,?,005E70B1,00000000), ref: 005E6FBD
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092210976.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                  • Associated: 00000003.00000002.2092196623.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092238372.00000000005F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092256934.00000000005FB000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092273468.00000000005FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092287722.0000000000601000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_5d0000_xLauncher.jbxd
                  Similarity
                  • API ID: AddressFreeHandleLibraryModuleProc
                  • String ID: CorExitProcess$mscoree.dll
                  • API String ID: 4061214504-1276376045
                  • Opcode ID: 8a00f8849777a9a100c7e1513e81a26aec35c771b2f796aaba17abece5237637
                  • Instruction ID: 4ad0bdc46718decad514d9b486c959a6047210f7cccd0048ae7a3e9c75a9b1dd
                  • Opcode Fuzzy Hash: 8a00f8849777a9a100c7e1513e81a26aec35c771b2f796aaba17abece5237637
                  • Instruction Fuzzy Hash: FB01D631904A69EFDF158F51DC09FBEBBB8FB14B51F040525F821E22A4DB789904CA94
                  APIs
                  • __alloca_probe_16.LIBCMT ref: 005EDFA2
                  • __alloca_probe_16.LIBCMT ref: 005EE06B
                  • __freea.LIBCMT ref: 005EE0D2
                    • Part of subcall function 005EBC45: HeapAlloc.KERNEL32(00000000,?,00000000,?,005E41E0,?,?,005E1007,?,005DFAB5), ref: 005EBC77
                  • __freea.LIBCMT ref: 005EE0E5
                  • __freea.LIBCMT ref: 005EE0F2
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092210976.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                  • Associated: 00000003.00000002.2092196623.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092238372.00000000005F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092256934.00000000005FB000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092273468.00000000005FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092287722.0000000000601000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_5d0000_xLauncher.jbxd
                  Similarity
                  • API ID: __freea$__alloca_probe_16$AllocHeap
                  • String ID:
                  • API String ID: 1096550386-0
                  • Opcode ID: 5b2b24df4d48d744f628fd10fc3ddff382217fc0c0e0ea59af48b2df97073d6f
                  • Instruction ID: 713a641a419904b5efa885913cb171859841c5f01463cc17aa54f935e82ad04f
                  • Opcode Fuzzy Hash: 5b2b24df4d48d744f628fd10fc3ddff382217fc0c0e0ea59af48b2df97073d6f
                  • Instruction Fuzzy Hash: B751C672610287AFEF289F62CC4AEBB7EA9FF84710B154429FD88D6151EB71CC50C660
                  APIs
                  • EncodePointer.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,?,005E93FE,?,?,00000000,00000000,00000000,?), ref: 005E951D
                  • CatchIt.LIBVCRUNTIME ref: 005E9603
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092210976.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                  • Associated: 00000003.00000002.2092196623.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092238372.00000000005F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092256934.00000000005FB000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092273468.00000000005FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092287722.0000000000601000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_5d0000_xLauncher.jbxd
                  Similarity
                  • API ID: CatchEncodePointer
                  • String ID: MOC$RCC
                  • API String ID: 1435073870-2084237596
                  • Opcode ID: 3eb4b68e2527fc9b7814df6d0390067a02b6eaa798895ecf63282d50d8fbe03e
                  • Instruction ID: e1532c549ce7fe47a119788994e22e2a3e9044fec7db3e4d2950279e3cb55517
                  • Opcode Fuzzy Hash: 3eb4b68e2527fc9b7814df6d0390067a02b6eaa798895ecf63282d50d8fbe03e
                  • Instruction Fuzzy Hash: FA419A72900289AFCF2ACF95CC81AEEBFB5FF48304F18809AF945A7221D3359950DB50
                  APIs
                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,005EDCFA,00000000,?,005FCCD0,?,?,?,005EDC31,00000004,InitializeCriticalSectionEx,005F46F8,005F4700), ref: 005EDC6B
                  • GetLastError.KERNEL32(?,005EDCFA,00000000,?,005FCCD0,?,?,?,005EDC31,00000004,InitializeCriticalSectionEx,005F46F8,005F4700,00000000,?,005E971C), ref: 005EDC75
                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 005EDC9D
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092210976.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                  • Associated: 00000003.00000002.2092196623.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092238372.00000000005F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092256934.00000000005FB000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092273468.00000000005FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092287722.0000000000601000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_5d0000_xLauncher.jbxd
                  Similarity
                  • API ID: LibraryLoad$ErrorLast
                  • String ID: api-ms-
                  • API String ID: 3177248105-2084034818
                  • Opcode ID: 40068f8f2e1717cf1c2b3efc6e07196aabba7158bb074f0095d110ddbe53a63f
                  • Instruction ID: e1bf7a50b24f83c298fa68cb16657c48aa291f1756c39837303053f4ca10c0be
                  • Opcode Fuzzy Hash: 40068f8f2e1717cf1c2b3efc6e07196aabba7158bb074f0095d110ddbe53a63f
                  • Instruction Fuzzy Hash: 30E0D830650206BBFF102F52DC0EB283F64BB20B90F204020F94DE80E0FBAA9C11D955
                  APIs
                  • GetConsoleOutputCP.KERNEL32(BB40E64E,00000000,00000000,?), ref: 005EE64B
                    • Part of subcall function 005ED131: WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,00000000,000000FF,?,?,00000000,?,?,005E87B1,?,00000000,?), ref: 005ED192
                  • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 005EE89D
                  • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 005EE8E3
                  • GetLastError.KERNEL32 ref: 005EE986
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092210976.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                  • Associated: 00000003.00000002.2092196623.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092238372.00000000005F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092256934.00000000005FB000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092273468.00000000005FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092287722.0000000000601000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_5d0000_xLauncher.jbxd
                  Similarity
                  • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                  • String ID:
                  • API String ID: 2112829910-0
                  • Opcode ID: 3987623c3dd60063899a4df4fc0c784d63258ee4b2ac7beb4f13129da76d02ab
                  • Instruction ID: dd5cd624e82457ba194002754347820dd6f8c780f45a4fd8f7a38c030ae7b0b0
                  • Opcode Fuzzy Hash: 3987623c3dd60063899a4df4fc0c784d63258ee4b2ac7beb4f13129da76d02ab
                  • Instruction Fuzzy Hash: 74D199B5D002899FCB19CFA9C8859ADBFF5FF48300F28456AE495EB352D630A906CB50
                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092210976.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                  • Associated: 00000003.00000002.2092196623.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092238372.00000000005F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092256934.00000000005FB000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092273468.00000000005FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092287722.0000000000601000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_5d0000_xLauncher.jbxd
                  Similarity
                  • API ID: AdjustPointer
                  • String ID:
                  • API String ID: 1740715915-0
                  • Opcode ID: 35d9fa1e1bf02e441ee34c1c27f16614a816a87376805ea3f392b309e60e3a52
                  • Instruction ID: 6bea40620f17ea6e4590ea878ebb549d7d1bc570eaba5b680528acee7e146645
                  • Opcode Fuzzy Hash: 35d9fa1e1bf02e441ee34c1c27f16614a816a87376805ea3f392b309e60e3a52
                  • Instruction Fuzzy Hash: CD51E072601682AFDB2DCF16C849B7A7BA5FF40310F54052DE9D99B291EB31EC40CB80
                  APIs
                    • Part of subcall function 005ED131: WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,00000000,000000FF,?,?,00000000,?,?,005E87B1,?,00000000,?), ref: 005ED192
                  • GetLastError.KERNEL32(?,?,?,00000000,00000000,?,005EC95E,?,?,?,00000000), ref: 005EC61C
                  • __dosmaperr.LIBCMT ref: 005EC623
                  • GetLastError.KERNEL32(00000000,005EC95E,?,?,00000000,?,?,?,00000000,00000000,?,005EC95E,?,?,?,00000000), ref: 005EC65D
                  • __dosmaperr.LIBCMT ref: 005EC664
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092210976.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                  • Associated: 00000003.00000002.2092196623.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092238372.00000000005F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092256934.00000000005FB000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092273468.00000000005FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092287722.0000000000601000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_5d0000_xLauncher.jbxd
                  Similarity
                  • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                  • String ID:
                  • API String ID: 1913693674-0
                  • Opcode ID: 725070d7f9a00161f2a5dfceee6d952f2dabeaca68fe8ca51d14b750729f9d3a
                  • Instruction ID: 72a8c5dca5fdffffd7a31d85f3001932d2896951b4b88112e221d5593ebb46ee
                  • Opcode Fuzzy Hash: 725070d7f9a00161f2a5dfceee6d952f2dabeaca68fe8ca51d14b750729f9d3a
                  • Instruction Fuzzy Hash: FC21F872200296AFDB289F6B8C84D2B7FA9FF853647108819F8E5D7511D730EC02CB90
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092210976.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                  • Associated: 00000003.00000002.2092196623.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092238372.00000000005F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092256934.00000000005FB000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092273468.00000000005FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092287722.0000000000601000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_5d0000_xLauncher.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 1d18907ac0ca696754271429aa142d85051d6930200a00076c5f48bc0f359bb0
                  • Instruction ID: 0263de70f820ecdb21b6ec67885e870802ef44124254a1aba1768b4c1ddca6e4
                  • Opcode Fuzzy Hash: 1d18907ac0ca696754271429aa142d85051d6930200a00076c5f48bc0f359bb0
                  • Instruction Fuzzy Hash: 4321CF71600286AFDB28AF678C86D6B7FACFF803A47104515F8AC97551E730EC429BA0
                  APIs
                  • GetEnvironmentStringsW.KERNEL32 ref: 005ED235
                    • Part of subcall function 005ED131: WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,00000000,000000FF,?,?,00000000,?,?,005E87B1,?,00000000,?), ref: 005ED192
                  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 005ED26D
                  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 005ED28D
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092210976.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                  • Associated: 00000003.00000002.2092196623.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092238372.00000000005F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092256934.00000000005FB000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092273468.00000000005FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092287722.0000000000601000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_5d0000_xLauncher.jbxd
                  Similarity
                  • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                  • String ID:
                  • API String ID: 158306478-0
                  • Opcode ID: 8574bcc5cf9c85a9235ece796ed9a9096e81e05f6519376acc8df1c9d1f23e62
                  • Instruction ID: 9a9b4845f683356916f0d08c39ed4567eb07f548ccd15b38a39a62eddee04bd4
                  • Opcode Fuzzy Hash: 8574bcc5cf9c85a9235ece796ed9a9096e81e05f6519376acc8df1c9d1f23e62
                  • Instruction Fuzzy Hash: 191126B690158A7FAB2927735C8DCBF2DBCFEE43957100414FA81D2101FB24DD029570
                  APIs
                  • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,00000000,?,005EFF31,00000000,00000001,00000000,?,?,005EE9DA,?,00000000,00000000), ref: 005F07D7
                  • GetLastError.KERNEL32(?,005EFF31,00000000,00000001,00000000,?,?,005EE9DA,?,00000000,00000000,?,?,?,005EE320,00000000), ref: 005F07E3
                    • Part of subcall function 005F0840: CloseHandle.KERNEL32(FFFFFFFE,005F07F3,?,005EFF31,00000000,00000001,00000000,?,?,005EE9DA,?,00000000,00000000,?,?), ref: 005F0850
                  • ___initconout.LIBCMT ref: 005F07F3
                    • Part of subcall function 005F0815: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,005F07B1,005EFF1E,?,?,005EE9DA,?,00000000,00000000,?), ref: 005F0828
                  • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,?,005EFF31,00000000,00000001,00000000,?,?,005EE9DA,?,00000000,00000000,?), ref: 005F0808
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092210976.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                  • Associated: 00000003.00000002.2092196623.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092238372.00000000005F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092256934.00000000005FB000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092273468.00000000005FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092287722.0000000000601000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_5d0000_xLauncher.jbxd
                  Similarity
                  • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                  • String ID:
                  • API String ID: 2744216297-0
                  • Opcode ID: 27a1751eae9dbc313ed2c35ccc326f35c632847886f8bab31903abae15625cce
                  • Instruction ID: a0f891d096b3f762674a0911d2c5a582bb06d78d14a9cdfc12995015aa5ef57f
                  • Opcode Fuzzy Hash: 27a1751eae9dbc313ed2c35ccc326f35c632847886f8bab31903abae15625cce
                  • Instruction Fuzzy Hash: 5DF0F83640051DBBCF222F95DC08AAA3E2AFF683A1F048421FB0885162D676C824EB90
                  APIs
                  • ___except_validate_context_record.LIBVCRUNTIME ref: 005E8D75
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092210976.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                  • Associated: 00000003.00000002.2092196623.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092238372.00000000005F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092256934.00000000005FB000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092273468.00000000005FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092287722.0000000000601000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_5d0000_xLauncher.jbxd
                  Similarity
                  • API ID: ___except_validate_context_record
                  • String ID: csm$csm
                  • API String ID: 3493665558-3733052814
                  • Opcode ID: b83871b3b400e1f565c8691c54a571c90e2f0c6be1484aa31680e9cc9aaa81f2
                  • Instruction ID: 42c6c7f46f98d676f8e91daefb3f1781b1a8d137c177ba718b9849af0d504b18
                  • Opcode Fuzzy Hash: b83871b3b400e1f565c8691c54a571c90e2f0c6be1484aa31680e9cc9aaa81f2
                  • Instruction Fuzzy Hash: 9531E476400295EFCF2A9F52CD449BA7F6AFF08314B18465AF8CC59221DB32DD61EB81
                  APIs
                  • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 005E49EA
                  • ___raise_securityfailure.LIBCMT ref: 005E4AD2
                    • Part of subcall function 005E59FC: RaiseException.KERNEL32(E06D7363,00000001,00000003,005E49DE,BB40E64E,?,?,?,005E49DE,?,005F9B2C), ref: 005E5A5C
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092210976.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                  • Associated: 00000003.00000002.2092196623.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092238372.00000000005F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092256934.00000000005FB000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092273468.00000000005FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092287722.0000000000601000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_5d0000_xLauncher.jbxd
                  Similarity
                  • API ID: ExceptionFeaturePresentProcessorRaise___raise_securityfailure
                  • String ID: %]
                  • API String ID: 3749517692-3417064086
                  • Opcode ID: d2f5f77e59fd9d025d58292719f2c07fea41ef8758a57ad8ab2305067c9619cf
                  • Instruction ID: aad4764500013aed4520ac4df7b23f21f8499d368b06208121f20097c292b134
                  • Opcode Fuzzy Hash: d2f5f77e59fd9d025d58292719f2c07fea41ef8758a57ad8ab2305067c9619cf
                  • Instruction Fuzzy Hash: 8A3170B450030D9FDB08EF26FE4A6757FA8BB68314F10413AE908CA2A1E778A54CDF44
                  APIs
                  • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 005E49EA
                  • ___raise_securityfailure.LIBCMT ref: 005E4AD2
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092210976.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                  • Associated: 00000003.00000002.2092196623.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092238372.00000000005F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092256934.00000000005FB000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092273468.00000000005FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092287722.0000000000601000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_5d0000_xLauncher.jbxd
                  Similarity
                  • API ID: FeaturePresentProcessor___raise_securityfailure
                  • String ID: %]
                  • API String ID: 3761405300-3417064086
                  • Opcode ID: 67da45cbafcf10abc5b1708223c28372c6081dfeb14073a374bd28b8badf0cbc
                  • Instruction ID: 71dfbbb7cbced8f9596ba4f477fd4a1879303ff020157b74f5c86d290a3d65bb
                  • Opcode Fuzzy Hash: 67da45cbafcf10abc5b1708223c28372c6081dfeb14073a374bd28b8badf0cbc
                  • Instruction Fuzzy Hash: 6321EFB5500208DEE714DF16EA5A6707FA4BB68314F10507AE509CB3A1E3BCA88CEF44
                  APIs
                    • Part of subcall function 005E4533: __EH_prolog3_GS.LIBCMT ref: 005E453A
                  • std::domain_error::domain_error.LIBCPMT ref: 005E45EC
                    • Part of subcall function 005E43A4: std::exception::exception.LIBCONCRT ref: 005E43BA
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.2092210976.00000000005D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005D0000, based on PE: true
                  • Associated: 00000003.00000002.2092196623.00000000005D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092238372.00000000005F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092256934.00000000005FB000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092273468.00000000005FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000003.00000002.2092287722.0000000000601000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_5d0000_xLauncher.jbxd
                  Similarity
                  • API ID: H_prolog3_std::domain_error::domain_errorstd::exception::exception
                  • String ID: CD^$CD^
                  • API String ID: 2144476180-3205961225
                  • Opcode ID: d6b8f16fae3418730fee897e5035f50a28eb3a45f90fc11a348ba0fa7f4398d7
                  • Instruction ID: 1ebbb08f61b09bac950d7833f7062f07008ab1752f7898858d2011cb2e7e3ebf
                  • Opcode Fuzzy Hash: d6b8f16fae3418730fee897e5035f50a28eb3a45f90fc11a348ba0fa7f4398d7
                  • Instruction Fuzzy Hash: 7B014C74D002099BCF18EF6AD8458AEBFF8FF88704B10851EE45597340DB34DA05CB90