Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
injector V2.4.exe

Overview

General Information

Sample name:injector V2.4.exe
Analysis ID:1561471
MD5:ad5bf840b79922950cbcd853a3e56134
SHA1:5fe0ffa06bc526355af0ca520aa1750aee6499ef
SHA256:5dc32a33db2f76834c6e96336d4bbbf276bc0b6b6cc9c02ad004607008dbe91a
Tags:exeuser-4k95m
Infos:

Detection

LummaC Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Injects a PE file into a foreign processes
Machine Learning detection for sample
Sample uses string decryption to hide its real strings
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • injector V2.4.exe (PID: 7436 cmdline: "C:\Users\user\Desktop\injector V2.4.exe" MD5: AD5BF840B79922950CBCD853A3E56134)
    • conhost.exe (PID: 7444 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • injector V2.4.exe (PID: 7496 cmdline: "C:\Users\user\Desktop\injector V2.4.exe" MD5: AD5BF840B79922950CBCD853A3E56134)
  • cleanup
{"C2 url": ["farewellnzu.icu"]}
SourceRuleDescriptionAuthorStrings
00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
    00000000.00000002.1683104241.000000000071E000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
      decrypted.memstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
        SourceRuleDescriptionAuthorStrings
        2.2.injector V2.4.exe.400000.0.raw.unpackJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
          2.2.injector V2.4.exe.400000.0.unpackJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
            No Sigma rule has matched
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-11-23T14:14:31.699501+010020283713Unknown Traffic192.168.2.449730104.21.44.93443TCP
            2024-11-23T14:14:33.707357+010020283713Unknown Traffic192.168.2.449731104.21.44.93443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-11-23T14:14:32.402220+010020546531A Network Trojan was detected192.168.2.449730104.21.44.93443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-11-23T14:14:32.402220+010020498361A Network Trojan was detected192.168.2.449730104.21.44.93443TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 00000000.00000002.1683104241.000000000071E000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: LummaC {"C2 url": ["farewellnzu.icu"]}
            Source: injector V2.4.exeReversingLabs: Detection: 39%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 97.6% probability
            Source: injector V2.4.exeJoe Sandbox ML: detected
            Source: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: farewellnzu.icu
            Source: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
            Source: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
            Source: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
            Source: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
            Source: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: Workgroup: -
            Source: injector V2.4.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 104.21.44.93:443 -> 192.168.2.4:49730 version: TLS 1.2
            Source: injector V2.4.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_ISOLATION, GUARD_CF, TERMINAL_SERVER_AWARE
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00BFC7DB FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00BFC7DB
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then movzx edi, byte ptr [ecx+esi]2_2_00402840
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then cmp byte ptr [ebp+ebx+00h], 00000000h2_2_0042A0D0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov byte ptr [edx], al2_2_0042F8D5
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then jmp eax2_2_0041E8E0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov ebx, dword ptr [esp+38h]2_2_004260E0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then jmp ecx2_2_004260E0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then movzx edi, byte ptr [esp+edx-1Fh]2_2_0044088C
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then movsx eax, byte ptr [ebp+ecx+00h]2_2_0044088C
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov word ptr [eax], cx2_2_00418940
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then cmp word ptr [edx+eax+02h], 0000h2_2_0042A970
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then movzx esi, byte ptr [esp+ebx-0E5C990Fh]2_2_0041E902
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov byte ptr [ebx], dl2_2_0042D120
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], C18BC4BAh2_2_0043D1D0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-000000B1h]2_2_00423250
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then movzx ebx, byte ptr [edx]2_2_004372C0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov dword ptr [esp+04h], edi2_2_0041E2CC
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]2_2_0042C2D0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov ecx, eax2_2_00442290
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then movzx ebp, word ptr [eax]2_2_00442290
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then jmp ecx2_2_00426350
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then cmp word ptr [edx+eax+02h], 0000h2_2_0042AB59
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov byte ptr [edi], al2_2_0042F36A
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then movsx eax, byte ptr [ebp+ecx+00h]2_2_00440B70
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov ecx, eax2_2_0041F310
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then movzx edx, byte ptr [esi+ecx+5261BF7Ah]2_2_0042DB30
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then inc eax2_2_00420BD0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then movzx edx, byte ptr [eax+ecx]2_2_00420BD0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov ecx, eax2_2_00427BD0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then movzx edi, byte ptr [esp+eax-2D7FD463h]2_2_0041EBFA
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then jmp eax2_2_00421B80
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then jmp ecx2_2_00427BA8
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov byte ptr [edx], al2_2_0042FC7B
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+10h]2_2_00429C04
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then movzx eax, byte ptr [esp+edx-07h]2_2_00428C20
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then jmp dword ptr [00447DC0h]2_2_0041FC24
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov word ptr [ecx], bp2_2_0041FC3A
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+04h]2_2_0041FC3A
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then cmp word ptr [ebp+edi+02h], 0000h2_2_00424480
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then jmp ecx2_2_00426490
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+2Ch]2_2_00407570
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then movzx ecx, word ptr [ebp+edi*4+00h]2_2_00407570
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then cmp al, 2Eh2_2_00428D29
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+38h]2_2_0041DE43
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then movzx edi, byte ptr [esi+ecx-26h]2_2_0042EE1E
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then lea esi, dword ptr [ecx-10h]2_2_0043FE30
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then cmp word ptr [edx+eax+02h], 0000h2_2_0042A6C2
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov byte ptr [ecx], bl2_2_0042D6C8
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov byte ptr [ecx], bl2_2_0042D6C8
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov byte ptr [ebx], dl2_2_0042D6C8
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov byte ptr [ebx], dl2_2_0042D6C8
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov word ptr [eax], cx2_2_004246E0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then movzx edi, byte ptr [esi+ecx-26h]2_2_0042EEEB
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then movzx edi, byte ptr [esi+ecx-26h]2_2_0042EEFD
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-65ACAA80h]2_2_00409690
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then movzx edi, byte ptr [esp+edx-1Fh]2_2_00440690
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then movsx eax, byte ptr [ebp+ecx+00h]2_2_00440690
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then movzx edi, byte ptr [esi+ecx-26h]2_2_0042EEA3
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then movzx ecx, byte ptr [ebp+eax-735E2241h]2_2_0042B6AA
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+10h]2_2_0042970D
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+10h]2_2_00429725
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx-000000E1h]2_2_0040C735
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 4x nop then mov dword ptr [ecx], 21A62724h2_2_0040AFF0

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:49730 -> 104.21.44.93:443
            Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49730 -> 104.21.44.93:443
            Source: Malware configuration extractorURLs: farewellnzu.icu
            Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49731 -> 104.21.44.93:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49730 -> 104.21.44.93:443
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: farewellnzu.icu
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficDNS traffic detected: DNS query: farewellnzu.icu
            Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: farewellnzu.icu
            Source: injector V2.4.exe, 00000002.00000003.1723461568.0000000003315000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000002.00000002.1724036986.0000000003363000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000002.00000003.1723511694.0000000003362000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://farewellnzu.icu/
            Source: injector V2.4.exe, 00000002.00000002.1723929440.00000000032DC000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000002.00000003.1723386115.00000000032DC000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000002.00000002.1723993426.0000000003315000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000002.00000003.1723461568.0000000003315000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000002.00000002.1724036986.0000000003363000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000002.00000003.1723364681.000000000336E000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000002.00000003.1723511694.0000000003362000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000002.00000002.1724050465.0000000003371000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://farewellnzu.icu/api
            Source: injector V2.4.exe, 00000002.00000002.1723993426.0000000003315000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000002.00000003.1723461568.0000000003315000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://farewellnzu.icu/apis
            Source: injector V2.4.exe, 00000002.00000002.1723929440.00000000032DC000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000002.00000003.1723386115.00000000032DC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://farewellnzu.icu/apiw
            Source: injector V2.4.exe, 00000002.00000003.1723461568.0000000003315000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000002.00000002.1724036986.0000000003363000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000002.00000003.1723511694.0000000003362000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://farewellnzu.icu/sion
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
            Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
            Source: unknownHTTPS traffic detected: 104.21.44.93:443 -> 192.168.2.4:49730 version: TLS 1.2
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_004345A0 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,2_2_004345A0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_004345A0 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,2_2_004345A0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00BEF4D00_2_00BEF4D0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00BF34D00_2_00BF34D0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00BF15A00_2_00BF15A0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00BEF9800_2_00BEF980
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00BE86C00_2_00BE86C0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00BECE700_2_00BECE70
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00C01FD20_2_00C01FD2
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00BED7F00_2_00BED7F0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_004088602_2_00408860
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_00439ED02_2_00439ED0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_0040D86B2_2_0040D86B
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_0042B8C82_2_0042B8C8
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_0042A0D02_2_0042A0D0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_0042F8D52_2_0042F8D5
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_004260E02_2_004260E0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_0042C8E02_2_0042C8E0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_0041B8F32_2_0041B8F3
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_0041B8842_2_0041B884
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_0044088C2_2_0044088C
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_004050AC2_2_004050AC
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_0041A0B42_2_0041A0B4
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_004189402_2_00418940
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_0041C1622_2_0041C162
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_004329102_2_00432910
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_0043D1D02_2_0043D1D0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_004059902_2_00405990
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_004341A02_2_004341A0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_004049B02_2_004049B0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_0041CA4F2_2_0041CA4F
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_00406A602_2_00406A60
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_0043DA002_2_0043DA00
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_004092302_2_00409230
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_004392D02_2_004392D0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_004422902_2_00442290
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_0040AAA02_2_0040AAA0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_004263502_2_00426350
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_004083602_2_00408360
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_0042F36A2_2_0042F36A
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_00440B702_2_00440B70
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_0041AB322_2_0041AB32
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_0041B33C2_2_0041B33C
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_00420BD02_2_00420BD0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_00421B802_2_00421B80
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_00402BA02_2_00402BA0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_00437BB22_2_00437BB2
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_0042FC7B2_2_0042FC7B
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_00439C002_2_00439C00
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_00423C302_2_00423C30
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_004054322_2_00405432
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_0042E48F2_2_0042E48F
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_004264902_2_00426490
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_004324952_2_00432495
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_0042E4882_2_0042E488
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_00421D602_2_00421D60
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_004075702_2_00407570
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_00441D002_2_00441D00
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_00428D292_2_00428D29
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_004395302_2_00439530
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_004065C02_2_004065C0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_004425D02_2_004425D0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_004035A02_2_004035A0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_004206702_2_00420670
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_0042EE1E2_2_0042EE1E
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_0042A6C22_2_0042A6C2
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_0042D6C82_2_0042D6C8
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_00418ED32_2_00418ED3
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_004246E02_2_004246E0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_004196E52_2_004196E5
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_0042EEEB2_2_0042EEEB
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_0042EEFD2_2_0042EEFD
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_004096902_2_00409690
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_0043A6902_2_0043A690
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_004406902_2_00440690
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_0042EEA32_2_0042EEA3
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_0042B6AA2_2_0042B6AA
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_00427EB02_2_00427EB0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_0042AEB52_2_0042AEB5
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_00404F692_2_00404F69
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_00405F002_2_00405F00
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_0042970D2_2_0042970D
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_004297252_2_00429725
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_0041FFE02_2_0041FFE0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_004297ED2_2_004297ED
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_0040AFF02_2_0040AFF0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_00441FF42_2_00441FF4
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_0040DFF12_2_0040DFF1
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_004287802_2_00428780
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_0041EF9C2_2_0041EF9C
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_00430FA02_2_00430FA0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_00BEF9802_2_00BEF980
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_00BEF4D02_2_00BEF4D0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_00BF34D02_2_00BF34D0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_00BF15A02_2_00BF15A0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_00BE86C02_2_00BE86C0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_00BECE702_2_00BECE70
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_00C01FD22_2_00C01FD2
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_00BED7F02_2_00BED7F0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: String function: 00BF8178 appears 36 times
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: String function: 00BF55C0 appears 66 times
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: String function: 00408170 appears 48 times
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: String function: 00418930 appears 54 times
            Source: injector V2.4.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: injector V2.4.exeStatic PE information: Section: .coS ZLIB complexity 1.0003339213709677
            Source: classification engineClassification label: mal100.troj.evad.winEXE@4/0@1/1
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_00439ED0 CoCreateInstance,SysAllocString,CoSetProxyBlanket,SysAllocString,SysAllocString,VariantInit,VariantClear,SysFreeString,SysFreeString,SysFreeString,SysFreeString,GetVolumeInformationW,2_2_00439ED0
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7444:120:WilError_03
            Source: injector V2.4.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\injector V2.4.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: injector V2.4.exeReversingLabs: Detection: 39%
            Source: C:\Users\user\Desktop\injector V2.4.exeFile read: C:\Users\user\Desktop\injector V2.4.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\injector V2.4.exe "C:\Users\user\Desktop\injector V2.4.exe"
            Source: C:\Users\user\Desktop\injector V2.4.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\injector V2.4.exeProcess created: C:\Users\user\Desktop\injector V2.4.exe "C:\Users\user\Desktop\injector V2.4.exe"
            Source: C:\Users\user\Desktop\injector V2.4.exeProcess created: C:\Users\user\Desktop\injector V2.4.exe "C:\Users\user\Desktop\injector V2.4.exe"Jump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: webio.dllJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: injector V2.4.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_ISOLATION, GUARD_CF, TERMINAL_SERVER_AWARE
            Source: injector V2.4.exeStatic PE information: section name: .00cfg
            Source: injector V2.4.exeStatic PE information: section name: .coS
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00BF4BC5 push ecx; ret 0_2_00BF4BD8
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_004158C1 push 294FAF12h; iretd 2_2_004158C6
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_00432131 push eax; retf 2_2_0043213A
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_00436FF2 push ebx; retf 2_2_00436FF3
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_00BF4BC5 push ecx; ret 2_2_00BF4BD8
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00BF4CA2 GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00BF4CA2
            Source: C:\Users\user\Desktop\injector V2.4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeAPI coverage: 7.0 %
            Source: C:\Users\user\Desktop\injector V2.4.exe TID: 7512Thread sleep time: -30000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exe TID: 7516Thread sleep time: -30000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00BFC7DB FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00BFC7DB
            Source: injector V2.4.exe, 00000002.00000002.1723929440.00000000032DC000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000002.00000003.1723386115.00000000032DC000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000002.00000002.1723993426.0000000003315000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000002.00000003.1723461568.0000000003315000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_0043F0E0 LdrInitializeThunk,2_2_0043F0E0
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00BF5444 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00BF5444
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00C0B18D mov edi, dword ptr fs:[00000030h]0_2_00C0B18D
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00BECD10 mov eax, dword ptr fs:[00000030h]0_2_00BECD10
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00BEBD50 mov edi, dword ptr fs:[00000030h]0_2_00BEBD50
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_00BECD10 mov eax, dword ptr fs:[00000030h]2_2_00BECD10
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_00BEBD50 mov edi, dword ptr fs:[00000030h]2_2_00BEBD50
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00BF9F90 GetProcessHeap,0_2_00BF9F90
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00BF5438 SetUnhandledExceptionFilter,0_2_00BF5438
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00BF5444 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00BF5444
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00BF7DCA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00BF7DCA
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00BF4AD9 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00BF4AD9
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_00BF4AD9 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_00BF4AD9
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_00BF5438 SetUnhandledExceptionFilter,2_2_00BF5438
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_00BF5444 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00BF5444
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 2_2_00BF7DCA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00BF7DCA

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00C0B18D GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessW,CreateProcessW,VirtualAlloc,VirtualAlloc,GetThreadContext,Wow64GetThreadContext,ReadProcessMemory,ReadProcessMemory,VirtualAllocEx,VirtualAllocEx,GetProcAddress,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,Wow64SetThreadContext,ResumeThread,ResumeThread,0_2_00C0B18D
            Source: C:\Users\user\Desktop\injector V2.4.exeMemory written: C:\Users\user\Desktop\injector V2.4.exe base: 400000 value starts with: 4D5AJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeProcess created: C:\Users\user\Desktop\injector V2.4.exe "C:\Users\user\Desktop\injector V2.4.exe"Jump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00BF5200 cpuid 0_2_00BF5200
            Source: C:\Users\user\Desktop\injector V2.4.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\injector V2.4.exeCode function: 0_2_00BF58C5 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00BF58C5
            Source: C:\Users\user\Desktop\injector V2.4.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
            Source: Yara matchFile source: 2.2.injector V2.4.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.injector V2.4.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1683104241.000000000071E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
            Source: Yara matchFile source: 2.2.injector V2.4.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.injector V2.4.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1683104241.000000000071E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
            Windows Management Instrumentation
            1
            DLL Side-Loading
            211
            Process Injection
            1
            Virtualization/Sandbox Evasion
            OS Credential Dumping1
            System Time Discovery
            Remote Services1
            Archive Collected Data
            11
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
            DLL Side-Loading
            211
            Process Injection
            LSASS Memory21
            Security Software Discovery
            Remote Desktop Protocol2
            Clipboard Data
            2
            Non-Application Layer Protocol
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
            Deobfuscate/Decode Files or Information
            Security Account Manager1
            Virtualization/Sandbox Evasion
            SMB/Windows Admin SharesData from Network Shared Drive113
            Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook3
            Obfuscated Files or Information
            NTDS1
            File and Directory Discovery
            Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            Software Packing
            LSA Secrets33
            System Information Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            DLL Side-Loading
            Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            injector V2.4.exe39%ReversingLabsWin32.Trojan.Generic
            injector V2.4.exe100%Joe Sandbox ML
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            https://farewellnzu.icu/apiw0%Avira URL Cloudsafe
            https://farewellnzu.icu/apis0%Avira URL Cloudsafe
            https://farewellnzu.icu/sion0%Avira URL Cloudsafe
            farewellnzu.icu0%Avira URL Cloudsafe
            https://farewellnzu.icu/0%Avira URL Cloudsafe
            https://farewellnzu.icu/api0%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            farewellnzu.icu
            104.21.44.93
            truefalse
              high
              NameMaliciousAntivirus DetectionReputation
              https://farewellnzu.icu/apitrue
              • Avira URL Cloud: safe
              unknown
              farewellnzu.icutrue
              • Avira URL Cloud: safe
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              https://farewellnzu.icu/apisinjector V2.4.exe, 00000002.00000002.1723993426.0000000003315000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000002.00000003.1723461568.0000000003315000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://farewellnzu.icu/injector V2.4.exe, 00000002.00000003.1723461568.0000000003315000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000002.00000002.1724036986.0000000003363000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000002.00000003.1723511694.0000000003362000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://farewellnzu.icu/apiwinjector V2.4.exe, 00000002.00000002.1723929440.00000000032DC000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000002.00000003.1723386115.00000000032DC000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://farewellnzu.icu/sioninjector V2.4.exe, 00000002.00000003.1723461568.0000000003315000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000002.00000002.1724036986.0000000003363000.00000004.00000020.00020000.00000000.sdmp, injector V2.4.exe, 00000002.00000003.1723511694.0000000003362000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              104.21.44.93
              farewellnzu.icuUnited States
              13335CLOUDFLARENETUSfalse
              Joe Sandbox version:41.0.0 Charoite
              Analysis ID:1561471
              Start date and time:2024-11-23 14:13:36 +01:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 2m 37s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:3
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:injector V2.4.exe
              Detection:MAL
              Classification:mal100.troj.evad.winEXE@4/0@1/1
              EGA Information:
              • Successful, ratio: 100%
              HCA Information:
              • Successful, ratio: 72%
              • Number of executed functions: 21
              • Number of non-executed functions: 108
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Stop behavior analysis, all processes terminated
              • Not all processes where analyzed, report is missing behavior information
              • Report size getting too big, too many NtOpenKeyEx calls found.
              • Report size getting too big, too many NtProtectVirtualMemory calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.
              • VT rate limit hit for: injector V2.4.exe
              TimeTypeDescription
              08:14:31API Interceptor2x Sleep call for process: injector V2.4.exe modified
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              104.21.44.93loader.exeGet hashmaliciousLummaC StealerBrowse
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                farewellnzu.iculoader.exeGet hashmaliciousLummaC StealerBrowse
                • 104.21.44.93
                VMX.exeGet hashmaliciousLummaCBrowse
                • 172.67.198.61
                BlazeVaze.exeGet hashmaliciousLummaCBrowse
                • 188.114.97.3
                Z8K4jt1j2H.exeGet hashmaliciousLummaCBrowse
                • 188.114.97.3
                SecuriteInfo.com.Win32.Evo-gen.14915.21522.exeGet hashmaliciousLummaCBrowse
                • 188.114.97.3
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                CLOUDFLARENETUSloader.exeGet hashmaliciousLummaC StealerBrowse
                • 172.67.162.84
                file.exeGet hashmaliciousLummaC StealerBrowse
                • 104.21.33.116
                file.exeGet hashmaliciousAmadey, Clipboard Hijacker, Credential Flusher, Cryptbot, LummaC Stealer, StealcBrowse
                • 104.21.33.116
                psol.txt.ps1Get hashmaliciousLummaCBrowse
                • 172.66.0.235
                SystemCoreHelper.dllGet hashmaliciousLummaC StealerBrowse
                • 104.21.88.250
                file.exeGet hashmaliciousUnknownBrowse
                • 104.21.33.116
                Setup.exeGet hashmaliciousLummaCBrowse
                • 104.21.67.179
                Setup.exeGet hashmaliciousLummaCBrowse
                • 104.21.20.178
                file.exeGet hashmaliciousAmadey, Credential Flusher, Cryptbot, LummaC Stealer, StealcBrowse
                • 172.67.162.84
                file.exeGet hashmaliciousLummaC StealerBrowse
                • 172.67.162.84
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                a0e9f5d64349fb13191bc781f81f42e1loader.exeGet hashmaliciousLummaC StealerBrowse
                • 104.21.44.93
                file.exeGet hashmaliciousLummaC StealerBrowse
                • 104.21.44.93
                file.exeGet hashmaliciousAmadey, Clipboard Hijacker, Credential Flusher, Cryptbot, LummaC Stealer, StealcBrowse
                • 104.21.44.93
                psol.txt.ps1Get hashmaliciousLummaCBrowse
                • 104.21.44.93
                SystemCoreHelper.dllGet hashmaliciousLummaC StealerBrowse
                • 104.21.44.93
                file.exeGet hashmaliciousUnknownBrowse
                • 104.21.44.93
                Setup.exeGet hashmaliciousLummaCBrowse
                • 104.21.44.93
                Setup.exeGet hashmaliciousLummaCBrowse
                • 104.21.44.93
                file.exeGet hashmaliciousAmadey, Credential Flusher, Cryptbot, LummaC Stealer, StealcBrowse
                • 104.21.44.93
                file.exeGet hashmaliciousLummaC StealerBrowse
                • 104.21.44.93
                No context
                No created / dropped files found
                File type:PE32 executable (console) Intel 80386, for MS Windows
                Entropy (8bit):7.729383688867627
                TrID:
                • Win32 Executable (generic) a (10002005/4) 99.96%
                • Generic Win/DOS Executable (2004/3) 0.02%
                • DOS Executable Generic (2002/1) 0.02%
                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                File name:injector V2.4.exe
                File size:495'616 bytes
                MD5:ad5bf840b79922950cbcd853a3e56134
                SHA1:5fe0ffa06bc526355af0ca520aa1750aee6499ef
                SHA256:5dc32a33db2f76834c6e96336d4bbbf276bc0b6b6cc9c02ad004607008dbe91a
                SHA512:bb60b4d7e4df59c368d35c21dd7405c2bb22a86f2954593f6bc63deda326a9bef7e8020d63c09a178ad413bd8f459fecac817d569735ce3eb551b552bb95c2b4
                SSDEEP:12288:SJB+nneDgkXFEI3uutVNyjs86iAB4mapRngti:2AoR2vgVSs8fi4m6ai
                TLSH:19B4E06E73E3E0E7E563183101D89A714A6F7E740F24A4FF57601F692B32AC28532A57
                File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L...t.@g............................pX............@.......................................@.................................T...<..
                Icon Hash:90cececece8e8eb0
                Entrypoint:0x415870
                Entrypoint Section:.text
                Digitally signed:false
                Imagebase:0x400000
                Subsystem:windows cui
                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_ISOLATION, GUARD_CF, TERMINAL_SERVER_AWARE
                Time Stamp:0x6740AA74 [Fri Nov 22 15:59:48 2024 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:6
                OS Version Minor:0
                File Version Major:6
                File Version Minor:0
                Subsystem Version Major:6
                Subsystem Version Minor:0
                Import Hash:887797384d81c493a9d8ee55dad3b2e1
                Instruction
                call 00007F3E70BD2B5Ah
                jmp 00007F3E70BD29BDh
                mov ecx, dword ptr [0042B5F0h]
                push esi
                push edi
                mov edi, BB40E64Eh
                mov esi, FFFF0000h
                cmp ecx, edi
                je 00007F3E70BD2B56h
                test esi, ecx
                jne 00007F3E70BD2B78h
                call 00007F3E70BD2B81h
                mov ecx, eax
                cmp ecx, edi
                jne 00007F3E70BD2B59h
                mov ecx, BB40E64Fh
                jmp 00007F3E70BD2B60h
                test esi, ecx
                jne 00007F3E70BD2B5Ch
                or eax, 00004711h
                shl eax, 10h
                or ecx, eax
                mov dword ptr [0042B5F0h], ecx
                not ecx
                pop edi
                mov dword ptr [0042B5ECh], ecx
                pop esi
                ret
                push ebp
                mov ebp, esp
                sub esp, 14h
                and dword ptr [ebp-0Ch], 00000000h
                lea eax, dword ptr [ebp-0Ch]
                and dword ptr [ebp-08h], 00000000h
                push eax
                call dword ptr [0042946Ch]
                mov eax, dword ptr [ebp-08h]
                xor eax, dword ptr [ebp-0Ch]
                mov dword ptr [ebp-04h], eax
                call dword ptr [00429430h]
                xor dword ptr [ebp-04h], eax
                call dword ptr [0042942Ch]
                xor dword ptr [ebp-04h], eax
                lea eax, dword ptr [ebp-14h]
                push eax
                call dword ptr [004294A8h]
                mov eax, dword ptr [ebp-10h]
                lea ecx, dword ptr [ebp-04h]
                xor eax, dword ptr [ebp-14h]
                xor eax, dword ptr [ebp-04h]
                xor eax, ecx
                leave
                ret
                mov eax, 00004000h
                ret
                push 0042C970h
                call dword ptr [00429488h]
                ret
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                mov al, 01h
                ret
                push 00030000h
                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IMPORT0x292540x3c.rdata
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x2f0000x1400.reloc
                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x237c00xc0.rdata
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x293c80x138.rdata
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x10000x2169a0x2180002aff72e65eaf052f891170e28598361False0.550606343283582data6.737058354414408IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                .rdata0x230000x72640x740091e5fdecc510d2c4e72b1b50db3c2501False0.40641837284482757data4.769873714467996IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .data0x2b0000x20680x1000f9b2b4b1f63578440eedd0ace5ac94f1False0.484375OpenPGP Secret Key5.090094544660231IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .00cfg0x2e0000x80x200160c8b290b62e5e566d05ce3bec76423False0.03125data0.06116285224115448IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .reloc0x2f0000x14000x140029fb367912ce622b91120c5cffd84495False0.81953125data6.557860970753822IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                .coS0x310000x4d8000x4d800d6785821ea266ee62aff7f76fdbcbdd5False1.0003339213709677data7.999419286386899IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                DLLImport
                KERNEL32.dllCloseHandle, CompareStringW, CreateFileA, CreateFileW, CreateThread, DecodePointer, DeleteCriticalSection, EncodePointer, EnterCriticalSection, ExitProcess, ExitThread, FindClose, FindFirstFileExW, FindNextFileW, FlushFileBuffers, FreeEnvironmentStringsW, FreeLibrary, FreeLibraryAndExitThread, GetACP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetConsoleMode, GetConsoleOutputCP, GetCurrentProcess, GetCurrentProcessId, GetCurrentThreadId, GetEnvironmentStringsW, GetExitCodeThread, GetFileSize, GetFileType, GetLastError, GetModuleFileNameW, GetModuleHandleExW, GetModuleHandleW, GetOEMCP, GetProcAddress, GetProcessHeap, GetStartupInfoW, GetStdHandle, GetStringTypeW, GetSystemTimeAsFileTime, HeapAlloc, HeapFree, HeapReAlloc, HeapSize, InitializeCriticalSectionAndSpinCount, InitializeCriticalSectionEx, InitializeSListHead, IsDebuggerPresent, IsProcessorFeaturePresent, IsValidCodePage, LCMapStringW, LeaveCriticalSection, LoadLibraryExW, MultiByteToWideChar, QueryPerformanceCounter, RaiseException, ReadFile, RtlUnwind, SetEnvironmentVariableW, SetFilePointerEx, SetLastError, SetStdHandle, SetUnhandledExceptionFilter, TerminateProcess, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, UnhandledExceptionFilter, WaitForSingleObjectEx, WideCharToMultiByte, WriteConsoleW, WriteFile
                GDI32.dllCreateEllipticRgn
                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                2024-11-23T14:14:31.699501+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449730104.21.44.93443TCP
                2024-11-23T14:14:32.402220+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.449730104.21.44.93443TCP
                2024-11-23T14:14:32.402220+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449730104.21.44.93443TCP
                2024-11-23T14:14:33.707357+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449731104.21.44.93443TCP
                TimestampSource PortDest PortSource IPDest IP
                Nov 23, 2024 14:14:30.373831034 CET49730443192.168.2.4104.21.44.93
                Nov 23, 2024 14:14:30.373930931 CET44349730104.21.44.93192.168.2.4
                Nov 23, 2024 14:14:30.374047041 CET49730443192.168.2.4104.21.44.93
                Nov 23, 2024 14:14:30.382143974 CET49730443192.168.2.4104.21.44.93
                Nov 23, 2024 14:14:30.382175922 CET44349730104.21.44.93192.168.2.4
                Nov 23, 2024 14:14:31.699274063 CET44349730104.21.44.93192.168.2.4
                Nov 23, 2024 14:14:31.699501038 CET49730443192.168.2.4104.21.44.93
                Nov 23, 2024 14:14:31.717003107 CET49730443192.168.2.4104.21.44.93
                Nov 23, 2024 14:14:31.717058897 CET44349730104.21.44.93192.168.2.4
                Nov 23, 2024 14:14:31.717482090 CET44349730104.21.44.93192.168.2.4
                Nov 23, 2024 14:14:31.769115925 CET49730443192.168.2.4104.21.44.93
                Nov 23, 2024 14:14:31.774549007 CET49730443192.168.2.4104.21.44.93
                Nov 23, 2024 14:14:31.774610996 CET49730443192.168.2.4104.21.44.93
                Nov 23, 2024 14:14:31.774727106 CET44349730104.21.44.93192.168.2.4
                Nov 23, 2024 14:14:32.402187109 CET44349730104.21.44.93192.168.2.4
                Nov 23, 2024 14:14:32.402273893 CET44349730104.21.44.93192.168.2.4
                Nov 23, 2024 14:14:32.402384043 CET49730443192.168.2.4104.21.44.93
                Nov 23, 2024 14:14:32.406563997 CET49730443192.168.2.4104.21.44.93
                Nov 23, 2024 14:14:32.406630039 CET44349730104.21.44.93192.168.2.4
                Nov 23, 2024 14:14:32.406666994 CET49730443192.168.2.4104.21.44.93
                Nov 23, 2024 14:14:32.406683922 CET44349730104.21.44.93192.168.2.4
                Nov 23, 2024 14:14:32.449119091 CET49731443192.168.2.4104.21.44.93
                Nov 23, 2024 14:14:32.449174881 CET44349731104.21.44.93192.168.2.4
                Nov 23, 2024 14:14:32.449289083 CET49731443192.168.2.4104.21.44.93
                Nov 23, 2024 14:14:32.449558020 CET49731443192.168.2.4104.21.44.93
                Nov 23, 2024 14:14:32.449587107 CET44349731104.21.44.93192.168.2.4
                Nov 23, 2024 14:14:33.707356930 CET49731443192.168.2.4104.21.44.93
                TimestampSource PortDest PortSource IPDest IP
                Nov 23, 2024 14:14:29.741909027 CET5513753192.168.2.41.1.1.1
                Nov 23, 2024 14:14:30.353306055 CET53551371.1.1.1192.168.2.4
                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                Nov 23, 2024 14:14:29.741909027 CET192.168.2.41.1.1.10x69c4Standard query (0)farewellnzu.icuA (IP address)IN (0x0001)false
                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                Nov 23, 2024 14:14:30.353306055 CET1.1.1.1192.168.2.40x69c4No error (0)farewellnzu.icu104.21.44.93A (IP address)IN (0x0001)false
                Nov 23, 2024 14:14:30.353306055 CET1.1.1.1192.168.2.40x69c4No error (0)farewellnzu.icu172.67.198.61A (IP address)IN (0x0001)false
                • farewellnzu.icu
                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                0192.168.2.449730104.21.44.934437496C:\Users\user\Desktop\injector V2.4.exe
                TimestampBytes transferredDirectionData
                2024-11-23 13:14:31 UTC262OUTPOST /api HTTP/1.1
                Connection: Keep-Alive
                Content-Type: application/x-www-form-urlencoded
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                Content-Length: 8
                Host: farewellnzu.icu
                2024-11-23 13:14:31 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                Data Ascii: act=life
                2024-11-23 13:14:32 UTC1011INHTTP/1.1 200 OK
                Date: Sat, 23 Nov 2024 13:14:32 GMT
                Content-Type: text/html; charset=UTF-8
                Transfer-Encoding: chunked
                Connection: close
                Set-Cookie: PHPSESSID=nj3d0d7jhegu934o4dgfhpcblp; expires=Wed, 19-Mar-2025 07:01:11 GMT; Max-Age=9999999; path=/
                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                Cache-Control: no-store, no-cache, must-revalidate
                Pragma: no-cache
                cf-cache-status: DYNAMIC
                vary: accept-encoding
                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=z8neciCSPJd2yfvVzvfvQ0DrIhQjVoTCXnz9hBnE6B%2Fyqyf%2F7xlC4bFpUXNVerUrxpIX6stvZcA1fCoc6aJDIPRLdASrN0bYGOtwbpsQHlzouH%2B1bdjEu%2Bk7tJP75nO9mH0%3D"}],"group":"cf-nel","max_age":604800}
                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                Server: cloudflare
                CF-RAY: 8e716c3dedf25e71-EWR
                alt-svc: h3=":443"; ma=86400
                server-timing: cfL4;desc="?proto=TCP&rtt=1753&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2837&recv_bytes=906&delivery_rate=1629464&cwnd=238&unsent_bytes=0&cid=5054836aacffd933&ts=720&x=0"
                2024-11-23 13:14:32 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                Data Ascii: 2ok
                2024-11-23 13:14:32 UTC5INData Raw: 30 0d 0a 0d 0a
                Data Ascii: 0


                Click to jump to process

                Click to jump to process

                Click to jump to process

                Target ID:0
                Start time:08:14:28
                Start date:23/11/2024
                Path:C:\Users\user\Desktop\injector V2.4.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\Desktop\injector V2.4.exe"
                Imagebase:0xbe0000
                File size:495'616 bytes
                MD5 hash:AD5BF840B79922950CBCD853A3E56134
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_LummaCStealer_4, Description: Yara detected LummaC Stealer, Source: 00000000.00000002.1683104241.000000000071E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                Reputation:low
                Has exited:true

                Target ID:1
                Start time:08:14:28
                Start date:23/11/2024
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff7699e0000
                File size:862'208 bytes
                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:2
                Start time:08:14:29
                Start date:23/11/2024
                Path:C:\Users\user\Desktop\injector V2.4.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\Desktop\injector V2.4.exe"
                Imagebase:0xbe0000
                File size:495'616 bytes
                MD5 hash:AD5BF840B79922950CBCD853A3E56134
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_LummaCStealer_4, Description: Yara detected LummaC Stealer, Source: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                Reputation:low
                Has exited:true

                Reset < >

                  Execution Graph

                  Execution Coverage:4.1%
                  Dynamic/Decrypted Code Coverage:0.5%
                  Signature Coverage:3.7%
                  Total number of Nodes:1563
                  Total number of Limit Nodes:27
                  execution_graph 10258 bf41b0 10263 bf4c32 10258->10263 10264 bf41ba 10263->10264 10265 bf4c42 10263->10265 10267 bf4f6a 10264->10267 10265->10264 10270 bf51bb InitializeCriticalSectionEx 10265->10270 10271 bf4f7f 10267->10271 10270->10265 10272 bf4f8e 10271->10272 10273 bf4f95 10271->10273 10277 bf77a9 10272->10277 10280 bf7738 10273->10280 10276 bf41c4 10278 bf7738 51 API calls 10277->10278 10279 bf77bb 10278->10279 10279->10276 10283 bf799b 10280->10283 10284 bf79a7 __FrameHandler3::FrameUnwindToState 10283->10284 10291 bf8161 EnterCriticalSection 10284->10291 10286 bf79b5 10292 bf77bf 10286->10292 10288 bf79c2 10302 bf79ea 10288->10302 10291->10286 10293 bf784d _unexpected 10292->10293 10294 bf77da 10292->10294 10293->10288 10294->10293 10295 bfd0c4 51 API calls 10294->10295 10301 bf782d 10294->10301 10297 bf7823 10295->10297 10296 bfd0c4 51 API calls 10298 bf7843 10296->10298 10299 bfb0cb __freea 14 API calls 10297->10299 10300 bfb0cb __freea 14 API calls 10298->10300 10299->10301 10300->10293 10301->10293 10301->10296 10305 bf8178 LeaveCriticalSection 10302->10305 10304 bf7769 10304->10276 10305->10304 10306 bfa2b0 10307 bfa2bb 10306->10307 10311 bfa2cb 10306->10311 10312 bfa3b5 10307->10312 10310 bfb0cb __freea 14 API calls 10310->10311 10313 bfa3ca 10312->10313 10314 bfa3d0 10312->10314 10316 bfb0cb __freea 14 API calls 10313->10316 10315 bfb0cb __freea 14 API calls 10314->10315 10317 bfa3dc 10315->10317 10316->10314 10318 bfb0cb __freea 14 API calls 10317->10318 10319 bfa3e7 10318->10319 10320 bfb0cb __freea 14 API calls 10319->10320 10321 bfa3f2 10320->10321 10322 bfb0cb __freea 14 API calls 10321->10322 10323 bfa3fd 10322->10323 10324 bfb0cb __freea 14 API calls 10323->10324 10325 bfa408 10324->10325 10326 bfb0cb __freea 14 API calls 10325->10326 10327 bfa413 10326->10327 10328 bfb0cb __freea 14 API calls 10327->10328 10329 bfa41e 10328->10329 10330 bfb0cb __freea 14 API calls 10329->10330 10331 bfa429 10330->10331 10332 bfb0cb __freea 14 API calls 10331->10332 10333 bfa437 10332->10333 10338 bfa52e 10333->10338 10339 bfa53a __FrameHandler3::FrameUnwindToState 10338->10339 10354 bf8161 EnterCriticalSection 10339->10354 10341 bfa544 10344 bfb0cb __freea 14 API calls 10341->10344 10345 bfa56e 10341->10345 10344->10345 10355 bfa58d 10345->10355 10346 bfa599 10347 bfa5a5 __FrameHandler3::FrameUnwindToState 10346->10347 10359 bf8161 EnterCriticalSection 10347->10359 10349 bfa5af 10350 bfa2d1 _unexpected 14 API calls 10349->10350 10351 bfa5c2 10350->10351 10360 bfa5e2 10351->10360 10354->10341 10358 bf8178 LeaveCriticalSection 10355->10358 10357 bfa45d 10357->10346 10358->10357 10359->10349 10363 bf8178 LeaveCriticalSection 10360->10363 10362 bfa2c3 10362->10310 10363->10362 8526 bf83ac 8529 bfb0cb 8526->8529 8530 bfb0d6 RtlFreeHeap 8529->8530 8531 bf83c4 8529->8531 8530->8531 8532 bfb0eb GetLastError 8530->8532 8533 bfb0f8 __dosmaperr 8532->8533 8535 bfb757 8533->8535 8538 bfa15b GetLastError 8535->8538 8537 bfb75c 8537->8531 8539 bfa177 8538->8539 8540 bfa171 8538->8540 8558 bfa17b SetLastError 8539->8558 8566 bf9bcf 8539->8566 8561 bf9b90 8540->8561 8547 bfa1c1 8549 bf9bcf _unexpected 6 API calls 8547->8549 8548 bfa1b0 8550 bf9bcf _unexpected 6 API calls 8548->8550 8552 bfa1cd 8549->8552 8551 bfa1be 8550->8551 8556 bfb0cb __freea 12 API calls 8551->8556 8553 bfa1e8 8552->8553 8554 bfa1d1 8552->8554 8580 bfa31c 8553->8580 8555 bf9bcf _unexpected 6 API calls 8554->8555 8555->8551 8556->8558 8558->8537 8560 bfb0cb __freea 12 API calls 8560->8558 8585 bf9e9e 8561->8585 8564 bf9bc7 TlsGetValue 8565 bf9bb5 8565->8539 8567 bf9e9e _unexpected 5 API calls 8566->8567 8568 bf9beb 8567->8568 8569 bf9c09 TlsSetValue 8568->8569 8570 bf9bf4 8568->8570 8570->8558 8571 bfb807 8570->8571 8572 bfb814 8571->8572 8573 bfb854 8572->8573 8574 bfb83f HeapAlloc 8572->8574 8575 bfb828 _unexpected 8572->8575 8577 bfb757 __strnicoll 13 API calls 8573->8577 8574->8575 8576 bfb852 8574->8576 8575->8573 8575->8574 8600 bf7207 8575->8600 8578 bfa1a8 8576->8578 8577->8578 8578->8547 8578->8548 8614 bfa482 8580->8614 8586 bf9ece 8585->8586 8590 bf9bac 8585->8590 8586->8590 8592 bf9dd3 8586->8592 8589 bf9ee8 GetProcAddress 8589->8590 8591 bf9ef8 _unexpected 8589->8591 8590->8564 8590->8565 8591->8590 8598 bf9de4 ___vcrt_FlsFree 8592->8598 8593 bf9e7a 8593->8589 8593->8590 8594 bf9e02 LoadLibraryExW 8595 bf9e1d GetLastError 8594->8595 8596 bf9e81 8594->8596 8595->8598 8596->8593 8597 bf9e93 FreeLibrary 8596->8597 8597->8593 8598->8593 8598->8594 8599 bf9e50 LoadLibraryExW 8598->8599 8599->8596 8599->8598 8603 bf7242 8600->8603 8604 bf724e __FrameHandler3::FrameUnwindToState 8603->8604 8609 bf8161 EnterCriticalSection 8604->8609 8606 bf7259 CallUnexpected 8610 bf7290 8606->8610 8609->8606 8613 bf8178 LeaveCriticalSection 8610->8613 8612 bf7212 8612->8575 8613->8612 8615 bfa48e __FrameHandler3::FrameUnwindToState 8614->8615 8628 bf8161 EnterCriticalSection 8615->8628 8617 bfa498 8629 bfa4c8 8617->8629 8620 bfa4d4 8621 bfa4e0 __FrameHandler3::FrameUnwindToState 8620->8621 8633 bf8161 EnterCriticalSection 8621->8633 8623 bfa4ea 8634 bfa2d1 8623->8634 8625 bfa502 8638 bfa522 8625->8638 8628->8617 8632 bf8178 LeaveCriticalSection 8629->8632 8631 bfa38a 8631->8620 8632->8631 8633->8623 8635 bfa307 _unexpected 8634->8635 8636 bfa2e0 _unexpected 8634->8636 8635->8625 8636->8635 8641 bfbfae 8636->8641 8755 bf8178 LeaveCriticalSection 8638->8755 8640 bfa1f3 8640->8560 8643 bfc02e 8641->8643 8645 bfbfc4 8641->8645 8644 bfb0cb __freea 14 API calls 8643->8644 8667 bfc07c 8643->8667 8646 bfc050 8644->8646 8645->8643 8649 bfbff7 8645->8649 8651 bfb0cb __freea 14 API calls 8645->8651 8647 bfb0cb __freea 14 API calls 8646->8647 8648 bfc063 8647->8648 8653 bfb0cb __freea 14 API calls 8648->8653 8654 bfb0cb __freea 14 API calls 8649->8654 8668 bfc019 8649->8668 8650 bfb0cb __freea 14 API calls 8655 bfc023 8650->8655 8657 bfbfec 8651->8657 8652 bfc08a 8656 bfc0ea 8652->8656 8663 bfb0cb 14 API calls __freea 8652->8663 8658 bfc071 8653->8658 8659 bfc00e 8654->8659 8660 bfb0cb __freea 14 API calls 8655->8660 8661 bfb0cb __freea 14 API calls 8656->8661 8669 bfb9d5 8657->8669 8664 bfb0cb __freea 14 API calls 8658->8664 8697 bfbad3 8659->8697 8660->8643 8666 bfc0f0 8661->8666 8663->8652 8664->8667 8666->8635 8709 bfc148 8667->8709 8668->8650 8670 bfb9e6 8669->8670 8696 bfbacf 8669->8696 8671 bfb9f7 8670->8671 8672 bfb0cb __freea 14 API calls 8670->8672 8673 bfba09 8671->8673 8674 bfb0cb __freea 14 API calls 8671->8674 8672->8671 8675 bfba1b 8673->8675 8676 bfb0cb __freea 14 API calls 8673->8676 8674->8673 8677 bfba2d 8675->8677 8679 bfb0cb __freea 14 API calls 8675->8679 8676->8675 8678 bfba3f 8677->8678 8680 bfb0cb __freea 14 API calls 8677->8680 8681 bfba51 8678->8681 8682 bfb0cb __freea 14 API calls 8678->8682 8679->8677 8680->8678 8683 bfb0cb __freea 14 API calls 8681->8683 8686 bfba63 8681->8686 8682->8681 8683->8686 8684 bfba75 8685 bfba87 8684->8685 8688 bfb0cb __freea 14 API calls 8684->8688 8689 bfba99 8685->8689 8690 bfb0cb __freea 14 API calls 8685->8690 8686->8684 8687 bfb0cb __freea 14 API calls 8686->8687 8687->8684 8688->8685 8691 bfbaab 8689->8691 8692 bfb0cb __freea 14 API calls 8689->8692 8690->8689 8693 bfbabd 8691->8693 8694 bfb0cb __freea 14 API calls 8691->8694 8692->8691 8695 bfb0cb __freea 14 API calls 8693->8695 8693->8696 8694->8693 8695->8696 8696->8649 8698 bfbae0 8697->8698 8708 bfbb38 8697->8708 8699 bfbaf0 8698->8699 8700 bfb0cb __freea 14 API calls 8698->8700 8701 bfb0cb __freea 14 API calls 8699->8701 8702 bfbb02 8699->8702 8700->8699 8701->8702 8703 bfbb14 8702->8703 8704 bfb0cb __freea 14 API calls 8702->8704 8705 bfbb26 8703->8705 8706 bfb0cb __freea 14 API calls 8703->8706 8704->8703 8707 bfb0cb __freea 14 API calls 8705->8707 8705->8708 8706->8705 8707->8708 8708->8668 8710 bfc174 8709->8710 8711 bfc155 8709->8711 8710->8652 8711->8710 8715 bfbb3c 8711->8715 8714 bfb0cb __freea 14 API calls 8714->8710 8716 bfbb4d 8715->8716 8750 bfbc1a 8715->8750 8751 bfbc20 8716->8751 8719 bfbc20 _unexpected 14 API calls 8720 bfbb60 8719->8720 8721 bfbc20 _unexpected 14 API calls 8720->8721 8722 bfbb6b 8721->8722 8723 bfbc20 _unexpected 14 API calls 8722->8723 8724 bfbb76 8723->8724 8725 bfbc20 _unexpected 14 API calls 8724->8725 8726 bfbb84 8725->8726 8727 bfb0cb __freea 14 API calls 8726->8727 8728 bfbb8f 8727->8728 8729 bfb0cb __freea 14 API calls 8728->8729 8730 bfbb9a 8729->8730 8731 bfb0cb __freea 14 API calls 8730->8731 8732 bfbba5 8731->8732 8733 bfbc20 _unexpected 14 API calls 8732->8733 8734 bfbbb3 8733->8734 8735 bfbc20 _unexpected 14 API calls 8734->8735 8736 bfbbc1 8735->8736 8737 bfbc20 _unexpected 14 API calls 8736->8737 8738 bfbbd2 8737->8738 8739 bfbc20 _unexpected 14 API calls 8738->8739 8740 bfbbe0 8739->8740 8741 bfbc20 _unexpected 14 API calls 8740->8741 8742 bfbbee 8741->8742 8743 bfb0cb __freea 14 API calls 8742->8743 8744 bfbbf9 8743->8744 8745 bfb0cb __freea 14 API calls 8744->8745 8746 bfbc04 8745->8746 8747 bfb0cb __freea 14 API calls 8746->8747 8748 bfbc0f 8747->8748 8749 bfb0cb __freea 14 API calls 8748->8749 8749->8750 8750->8714 8754 bfbc32 8751->8754 8752 bfbb55 8752->8719 8753 bfb0cb __freea 14 API calls 8753->8754 8754->8752 8754->8753 8755->8640 10413 bfaca2 10416 bf8178 LeaveCriticalSection 10413->10416 10415 bfaca9 10416->10415 11396 bf7310 11399 bf7337 11396->11399 11400 bf7343 __FrameHandler3::FrameUnwindToState 11399->11400 11407 bf8161 EnterCriticalSection 11400->11407 11402 bf734d 11403 bf737b 11402->11403 11406 bfc1fa __strnicoll 14 API calls 11402->11406 11408 bf7399 11403->11408 11406->11402 11407->11402 11411 bf8178 LeaveCriticalSection 11408->11411 11410 bf7335 11411->11410 8763 c0b18d 8767 c0b1c3 8763->8767 8764 c0b310 GetPEB 8765 c0b322 CreateProcessW VirtualAlloc Wow64GetThreadContext ReadProcessMemory VirtualAllocEx 8764->8765 8766 c0b3c9 WriteProcessMemory 8765->8766 8765->8767 8768 c0b40e 8766->8768 8767->8764 8767->8765 8769 c0b450 WriteProcessMemory Wow64SetThreadContext ResumeThread 8768->8769 8770 c0b413 WriteProcessMemory 8768->8770 8770->8768 10217 bebe70 10218 bebe9b 10217->10218 10219 bf6ed5 21 API calls 10218->10219 10220 bebeaf 10219->10220 10751 bf6bf0 10752 bfb4a7 ___scrt_uninitialize_crt 77 API calls 10751->10752 10753 bf6bf8 10752->10753 10761 bfb864 10753->10761 10755 bf6bfd 10771 bfb90f 10755->10771 10758 bf6c27 10759 bfb0cb __freea 14 API calls 10758->10759 10760 bf6c32 10759->10760 10762 bfb870 __FrameHandler3::FrameUnwindToState 10761->10762 10775 bf8161 EnterCriticalSection 10762->10775 10764 bfb8e7 10782 bfb906 10764->10782 10766 bfb8bb DeleteCriticalSection 10769 bfb0cb __freea 14 API calls 10766->10769 10770 bfb87b 10769->10770 10770->10764 10770->10766 10776 bfed63 10770->10776 10772 bfb926 10771->10772 10774 bf6c0c DeleteCriticalSection 10771->10774 10773 bfb0cb __freea 14 API calls 10772->10773 10772->10774 10773->10774 10774->10755 10774->10758 10775->10770 10777 bfed76 __strnicoll 10776->10777 10785 bfee21 10777->10785 10779 bfed82 10780 bf7fd7 __strnicoll 48 API calls 10779->10780 10781 bfed8e 10780->10781 10781->10770 10857 bf8178 LeaveCriticalSection 10782->10857 10784 bfb8f3 10784->10755 10786 bfee2d __FrameHandler3::FrameUnwindToState 10785->10786 10787 bfee5a 10786->10787 10788 bfee37 10786->10788 10791 bfee52 10787->10791 10796 bf6aef EnterCriticalSection 10787->10796 10789 bf7f12 __strnicoll 29 API calls 10788->10789 10789->10791 10791->10779 10792 bfee78 10797 bfed93 10792->10797 10794 bfee85 10811 bfeeb0 10794->10811 10796->10792 10798 bfedc3 10797->10798 10799 bfeda0 10797->10799 10801 bfb515 ___scrt_uninitialize_crt 73 API calls 10798->10801 10802 bfedbb 10798->10802 10800 bf7f12 __strnicoll 29 API calls 10799->10800 10800->10802 10803 bfeddb 10801->10803 10802->10794 10804 bfb90f 14 API calls 10803->10804 10805 bfede3 10804->10805 10806 bfd936 ___scrt_uninitialize_crt 48 API calls 10805->10806 10807 bfedef 10806->10807 10814 c0001b 10807->10814 10810 bfb0cb __freea 14 API calls 10810->10802 10856 bf6b03 LeaveCriticalSection 10811->10856 10813 bfeeb6 10813->10791 10815 c00044 10814->10815 10820 bfedf6 10814->10820 10816 c00093 10815->10816 10818 c0006b 10815->10818 10817 bf7f12 __strnicoll 29 API calls 10816->10817 10817->10820 10821 c000be 10818->10821 10820->10802 10820->10810 10822 c000ca __FrameHandler3::FrameUnwindToState 10821->10822 10829 bfd8d7 EnterCriticalSection 10822->10829 10824 c000d8 10825 c00109 10824->10825 10830 bfff7b 10824->10830 10843 c00143 10825->10843 10829->10824 10831 bfd68e ___scrt_uninitialize_crt 48 API calls 10830->10831 10834 bfff8b 10831->10834 10832 bfff91 10846 bfd6f8 10832->10846 10834->10832 10835 bfd68e ___scrt_uninitialize_crt 48 API calls 10834->10835 10842 bfffc3 10834->10842 10838 bfffba 10835->10838 10836 bfd68e ___scrt_uninitialize_crt 48 API calls 10839 bfffcf CloseHandle 10836->10839 10837 bfffe9 ___scrt_uninitialize_crt 10837->10825 10840 bfd68e ___scrt_uninitialize_crt 48 API calls 10838->10840 10839->10832 10841 bfffdb GetLastError 10839->10841 10840->10842 10841->10832 10842->10832 10842->10836 10855 bfd8fa LeaveCriticalSection 10843->10855 10845 c0012c 10845->10820 10847 bfd76e 10846->10847 10848 bfd707 10846->10848 10849 bfb757 __strnicoll 14 API calls 10847->10849 10848->10847 10854 bfd731 10848->10854 10850 bfd773 10849->10850 10851 bfb76a __dosmaperr 14 API calls 10850->10851 10852 bfd75e 10851->10852 10852->10837 10853 bfd758 SetStdHandle 10853->10852 10854->10852 10854->10853 10855->10845 10856->10813 10857->10784 10858 bfa5f0 10859 bfa5fc __FrameHandler3::FrameUnwindToState 10858->10859 10870 bf8161 EnterCriticalSection 10859->10870 10861 bfa603 10871 bfd839 10861->10871 10864 bfa621 10890 bfa647 10864->10890 10869 bfa732 2 API calls 10869->10864 10870->10861 10872 bfd845 __FrameHandler3::FrameUnwindToState 10871->10872 10873 bfd86f 10872->10873 10874 bfd84e 10872->10874 10893 bf8161 EnterCriticalSection 10873->10893 10875 bfb757 __strnicoll 14 API calls 10874->10875 10877 bfd853 10875->10877 10878 bf7d69 __strnicoll 48 API calls 10877->10878 10879 bfa612 10878->10879 10879->10864 10884 bfa67c GetStartupInfoW 10879->10884 10880 bfd8a7 10901 bfd8ce 10880->10901 10882 bfd87b 10882->10880 10894 bfd789 10882->10894 10885 bfa699 10884->10885 10886 bfa61c 10884->10886 10885->10886 10887 bfd839 49 API calls 10885->10887 10886->10869 10888 bfa6c1 10887->10888 10888->10886 10889 bfa6f1 GetFileType 10888->10889 10889->10888 10910 bf8178 LeaveCriticalSection 10890->10910 10892 bfa632 10893->10882 10895 bfb807 _unexpected 14 API calls 10894->10895 10896 bfd79b 10895->10896 10900 bfd7a8 10896->10900 10904 bf9c11 10896->10904 10897 bfb0cb __freea 14 API calls 10899 bfd7fd 10897->10899 10899->10882 10900->10897 10909 bf8178 LeaveCriticalSection 10901->10909 10903 bfd8d5 10903->10879 10905 bf9e9e _unexpected 5 API calls 10904->10905 10906 bf9c2d 10905->10906 10907 bf9c4b InitializeCriticalSectionAndSpinCount 10906->10907 10908 bf9c36 10906->10908 10907->10908 10908->10896 10909->10903 10910->10892 8771 bf56e2 8772 bf56ee __FrameHandler3::FrameUnwindToState 8771->8772 8797 bf508f 8772->8797 8774 bf56f5 8775 bf584e 8774->8775 8783 bf571f ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock CallUnexpected 8774->8783 8838 bf5444 IsProcessorFeaturePresent 8775->8838 8777 bf5855 8778 bf585b 8777->8778 8842 bf6ed5 8777->8842 8845 bf6eeb 8778->8845 8782 bf573e 8783->8782 8786 bf57bf 8783->8786 8821 bf6f1f 8783->8821 8808 bf7a56 8786->8808 8787 bf57c5 8812 becd90 8787->8812 8792 bf57ea 8793 bf57f3 8792->8793 8829 bf6f01 8792->8829 8832 bf50c8 8793->8832 8798 bf5098 8797->8798 8848 bf5200 IsProcessorFeaturePresent 8798->8848 8802 bf50a9 8807 bf50ad 8802->8807 8858 bf6a60 8802->8858 8805 bf50c4 8805->8774 8807->8774 8809 bf7a5f 8808->8809 8810 bf7a64 8808->8810 8930 bf7b7f 8809->8930 8810->8787 9612 bece30 8812->9612 8819 bf4241 TranslatorGuardHandler 5 API calls 8820 bece24 8819->8820 8827 bf53ec GetModuleHandleW 8820->8827 8822 bf6f35 __FrameHandler3::FrameUnwindToState _unexpected 8821->8822 8822->8786 8823 bfa00a _unexpected 48 API calls 8822->8823 8826 bf847c 8823->8826 8824 bf835d CallUnexpected 48 API calls 8825 bf84a6 8824->8825 8826->8824 8828 bf53f8 8827->8828 8828->8777 8828->8792 9999 bf7020 8829->9999 8833 bf50d4 8832->8833 8834 bf50ea 8833->8834 10072 bf6a72 8833->10072 8834->8782 8836 bf50e2 8837 bf60ca ___scrt_uninitialize_crt 7 API calls 8836->8837 8837->8834 8839 bf545a std::_Xinvalid_argument CallUnexpected 8838->8839 8840 bf5505 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 8839->8840 8841 bf5550 CallUnexpected 8840->8841 8841->8777 8843 bf7020 CallUnexpected 21 API calls 8842->8843 8844 bf6ee6 8843->8844 8844->8778 8846 bf7020 CallUnexpected 21 API calls 8845->8846 8847 bf5863 8846->8847 8849 bf50a4 8848->8849 8850 bf60ab 8849->8850 8867 bf9706 8850->8867 8853 bf60b4 8853->8802 8855 bf60bc 8856 bf60c7 8855->8856 8881 bf9742 8855->8881 8856->8802 8921 bfb105 8858->8921 8861 bf60ca 8862 bf60dd 8861->8862 8863 bf60d3 8861->8863 8862->8807 8864 bf8811 ___vcrt_uninitialize_ptd 6 API calls 8863->8864 8865 bf60d8 8864->8865 8866 bf9742 ___vcrt_uninitialize_locks DeleteCriticalSection 8865->8866 8866->8862 8868 bf970f 8867->8868 8870 bf9738 8868->8870 8871 bf60b0 8868->8871 8885 bfdc17 8868->8885 8872 bf9742 ___vcrt_uninitialize_locks DeleteCriticalSection 8870->8872 8871->8853 8873 bf87de 8871->8873 8872->8871 8902 bfdb28 8873->8902 8876 bf87f3 8876->8855 8879 bf880e 8879->8855 8882 bf974d 8881->8882 8884 bf976c 8881->8884 8883 bf9757 DeleteCriticalSection 8882->8883 8883->8883 8883->8884 8884->8853 8890 bfdca9 8885->8890 8888 bfdc4f InitializeCriticalSectionAndSpinCount 8889 bfdc3a 8888->8889 8889->8868 8891 bfdc31 8890->8891 8894 bfdcca 8890->8894 8891->8888 8891->8889 8892 bfdd32 GetProcAddress 8892->8891 8894->8891 8894->8892 8895 bfdd23 8894->8895 8897 bfdc5e LoadLibraryExW 8894->8897 8895->8892 8896 bfdd2b FreeLibrary 8895->8896 8896->8892 8898 bfdca5 8897->8898 8899 bfdc75 GetLastError 8897->8899 8898->8894 8899->8898 8900 bfdc80 ___vcrt_FlsFree 8899->8900 8900->8898 8901 bfdc96 LoadLibraryExW 8900->8901 8901->8894 8903 bfdca9 ___vcrt_FlsFree 5 API calls 8902->8903 8904 bfdb42 8903->8904 8905 bfdb5b TlsAlloc 8904->8905 8906 bf87e8 8904->8906 8906->8876 8907 bfdbd9 8906->8907 8908 bfdca9 ___vcrt_FlsFree 5 API calls 8907->8908 8909 bfdbf3 8908->8909 8910 bfdc0e TlsSetValue 8909->8910 8911 bf8801 8909->8911 8910->8911 8911->8879 8912 bf8811 8911->8912 8913 bf881b 8912->8913 8914 bf8821 8912->8914 8916 bfdb63 8913->8916 8914->8876 8917 bfdca9 ___vcrt_FlsFree 5 API calls 8916->8917 8918 bfdb7d 8917->8918 8919 bfdb89 8918->8919 8920 bfdb95 TlsFree 8918->8920 8919->8914 8920->8919 8922 bfb115 8921->8922 8923 bf50b6 8921->8923 8922->8923 8925 bfa732 8922->8925 8923->8805 8923->8861 8927 bfa739 8925->8927 8926 bfa77c GetStdHandle 8926->8927 8927->8926 8928 bfa7de 8927->8928 8929 bfa78f GetFileType 8927->8929 8928->8922 8929->8927 8931 bf7b9e 8930->8931 8932 bf7b88 8930->8932 8931->8810 8932->8931 8936 bf7ac0 8932->8936 8934 bf7b95 8934->8931 8953 bf7c8d 8934->8953 8937 bf7acc 8936->8937 8938 bf7ac9 8936->8938 8962 bfa880 8937->8962 8938->8934 8943 bf7add 8945 bfb0cb __freea 14 API calls 8943->8945 8944 bf7ae9 8989 bf7bab 8944->8989 8947 bf7ae3 8945->8947 8947->8934 8949 bfb0cb __freea 14 API calls 8950 bf7b0d 8949->8950 8951 bfb0cb __freea 14 API calls 8950->8951 8952 bf7b13 8951->8952 8952->8934 8954 bf7cfe 8953->8954 8955 bf7c9c 8953->8955 8954->8931 8955->8954 8956 bfb807 _unexpected 14 API calls 8955->8956 8957 bf7d02 8955->8957 8959 bfd131 WideCharToMultiByte ___scrt_uninitialize_crt 8955->8959 8961 bfb0cb __freea 14 API calls 8955->8961 9397 bfd304 8955->9397 8956->8955 8958 bfb0cb __freea 14 API calls 8957->8958 8958->8954 8959->8955 8961->8955 8963 bfa889 8962->8963 8967 bf7ad2 8962->8967 9011 bfa0c5 8963->9011 8968 bfd22d GetEnvironmentStringsW 8967->8968 8969 bfd245 8968->8969 8982 bf7ad7 8968->8982 8970 bfd131 ___scrt_uninitialize_crt WideCharToMultiByte 8969->8970 8971 bfd262 8970->8971 8972 bfd26c FreeEnvironmentStringsW 8971->8972 8973 bfd277 8971->8973 8972->8982 8974 bfbc45 15 API calls 8973->8974 8975 bfd27e 8974->8975 8976 bfd297 8975->8976 8977 bfd286 8975->8977 8979 bfd131 ___scrt_uninitialize_crt WideCharToMultiByte 8976->8979 8978 bfb0cb __freea 14 API calls 8977->8978 8980 bfd28b FreeEnvironmentStringsW 8978->8980 8981 bfd2a7 8979->8981 8980->8982 8983 bfd2ae 8981->8983 8984 bfd2b6 8981->8984 8982->8943 8982->8944 8985 bfb0cb __freea 14 API calls 8983->8985 8986 bfb0cb __freea 14 API calls 8984->8986 8987 bfd2b4 FreeEnvironmentStringsW 8985->8987 8986->8987 8987->8982 8990 bf7bc0 8989->8990 8991 bfb807 _unexpected 14 API calls 8990->8991 8992 bf7be7 8991->8992 8993 bf7bef 8992->8993 8994 bf7bf9 8992->8994 8995 bfb0cb __freea 14 API calls 8993->8995 8996 bf7c56 8994->8996 8998 bfb807 _unexpected 14 API calls 8994->8998 8999 bf7c65 8994->8999 9004 bf7c80 8994->9004 9007 bfb0cb __freea 14 API calls 8994->9007 9378 bf96ac 8994->9378 9010 bf7af0 8995->9010 8997 bfb0cb __freea 14 API calls 8996->8997 8997->9010 8998->8994 9387 bf7b50 8999->9387 9003 bfb0cb __freea 14 API calls 9006 bf7c72 9003->9006 9393 bf7d96 IsProcessorFeaturePresent 9004->9393 9009 bfb0cb __freea 14 API calls 9006->9009 9007->8994 9008 bf7c8c 9009->9010 9010->8949 9012 bfa0d0 9011->9012 9015 bfa0d6 9011->9015 9014 bf9b90 _unexpected 6 API calls 9012->9014 9013 bf9bcf _unexpected 6 API calls 9017 bfa0f0 9013->9017 9014->9015 9015->9013 9016 bfa0dc 9015->9016 9020 bfa0e1 9016->9020 9058 bf835d 9016->9058 9017->9016 9018 bfb807 _unexpected 14 API calls 9017->9018 9021 bfa100 9018->9021 9036 bfacc3 9020->9036 9023 bfa11d 9021->9023 9024 bfa108 9021->9024 9026 bf9bcf _unexpected 6 API calls 9023->9026 9025 bf9bcf _unexpected 6 API calls 9024->9025 9027 bfa114 9025->9027 9028 bfa129 9026->9028 9032 bfb0cb __freea 14 API calls 9027->9032 9029 bfa12d 9028->9029 9030 bfa13c 9028->9030 9033 bf9bcf _unexpected 6 API calls 9029->9033 9031 bfa31c _unexpected 14 API calls 9030->9031 9034 bfa147 9031->9034 9032->9016 9033->9027 9035 bfb0cb __freea 14 API calls 9034->9035 9035->9020 9037 bfaced 9036->9037 9202 bfab4f 9037->9202 9042 bfad1f 9044 bfb0cb __freea 14 API calls 9042->9044 9043 bfad2d 9216 bfa94a 9043->9216 9046 bfad06 9044->9046 9046->8967 9048 bfad65 9049 bfb757 __strnicoll 14 API calls 9048->9049 9051 bfad6a 9049->9051 9050 bfadac 9053 bfadf5 9050->9053 9227 bfb07e 9050->9227 9054 bfb0cb __freea 14 API calls 9051->9054 9052 bfad80 9052->9050 9055 bfb0cb __freea 14 API calls 9052->9055 9057 bfb0cb __freea 14 API calls 9053->9057 9054->9046 9055->9050 9057->9046 9067 bfb1bc 9058->9067 9060 bf8362 9060->9058 9062 bf8377 IsProcessorFeaturePresent 9060->9062 9063 bf6eeb CallUnexpected 21 API calls 9060->9063 9066 bf8839 9060->9066 9070 bfb1e3 9060->9070 9097 bf7dca 9060->9097 9103 bf883a 9060->9103 9062->9060 9063->9060 9117 bfb43f 9067->9117 9071 bfb1ef __FrameHandler3::FrameUnwindToState 9070->9071 9072 bfa15b __strnicoll 14 API calls 9071->9072 9073 bfb23f 9071->9073 9074 bfb251 CallUnexpected 9071->9074 9079 bfb220 CallUnexpected 9071->9079 9072->9079 9075 bfb757 __strnicoll 14 API calls 9073->9075 9076 bfb287 CallUnexpected 9074->9076 9131 bf8161 EnterCriticalSection 9074->9131 9077 bfb244 9075->9077 9082 bfb2c4 9076->9082 9083 bfb3c1 9076->9083 9093 bfb2f2 9076->9093 9128 bf7d69 9077->9128 9079->9073 9079->9074 9096 bfb229 9079->9096 9082->9093 9132 bfa00a GetLastError 9082->9132 9085 bfb3cc 9083->9085 9163 bf8178 LeaveCriticalSection 9083->9163 9087 bf6eeb CallUnexpected 21 API calls 9085->9087 9089 bfb3d4 9087->9089 9090 bfa00a _unexpected 48 API calls 9094 bfb347 9090->9094 9092 bfa00a _unexpected 48 API calls 9092->9093 9159 bfb36d 9093->9159 9095 bfa00a _unexpected 48 API calls 9094->9095 9094->9096 9095->9096 9096->9060 9098 bf7de6 std::_Xinvalid_argument CallUnexpected 9097->9098 9099 bf7e12 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 9098->9099 9100 bf7ee3 CallUnexpected 9099->9100 9186 bf4241 9100->9186 9102 bf7f01 9102->9060 9104 bf8846 GetLastError 9103->9104 9105 bf8843 9103->9105 9194 bfdb9e 9104->9194 9105->9060 9108 bf88c0 SetLastError 9108->9060 9109 bfdbd9 ___vcrt_FlsSetValue 6 API calls 9110 bf8874 CallUnexpected 9109->9110 9111 bf889c 9110->9111 9112 bfdbd9 ___vcrt_FlsSetValue 6 API calls 9110->9112 9116 bf887a 9110->9116 9113 bfdbd9 ___vcrt_FlsSetValue 6 API calls 9111->9113 9114 bf88b0 9111->9114 9112->9111 9113->9114 9199 bf83ac 9114->9199 9116->9108 9118 bfb44b __FrameHandler3::FrameUnwindToState 9117->9118 9123 bf8161 EnterCriticalSection 9118->9123 9120 bfb459 9124 bfb49b 9120->9124 9123->9120 9127 bf8178 LeaveCriticalSection 9124->9127 9126 bfb1e1 9126->9060 9127->9126 9164 bf809f 9128->9164 9131->9076 9133 bfa020 9132->9133 9137 bfa026 9132->9137 9135 bf9b90 _unexpected 6 API calls 9133->9135 9134 bf9bcf _unexpected 6 API calls 9136 bfa042 9134->9136 9135->9137 9139 bfb807 _unexpected 14 API calls 9136->9139 9156 bfa02a SetLastError 9136->9156 9137->9134 9137->9156 9140 bfa057 9139->9140 9143 bfa05f 9140->9143 9144 bfa070 9140->9144 9141 bfa0bf 9145 bf835d CallUnexpected 46 API calls 9141->9145 9142 bfa0ba 9142->9092 9146 bf9bcf _unexpected 6 API calls 9143->9146 9147 bf9bcf _unexpected 6 API calls 9144->9147 9148 bfa0c4 9145->9148 9149 bfa06d 9146->9149 9150 bfa07c 9147->9150 9153 bfb0cb __freea 14 API calls 9149->9153 9151 bfa097 9150->9151 9152 bfa080 9150->9152 9154 bfa31c _unexpected 14 API calls 9151->9154 9155 bf9bcf _unexpected 6 API calls 9152->9155 9153->9156 9157 bfa0a2 9154->9157 9155->9149 9156->9141 9156->9142 9158 bfb0cb __freea 14 API calls 9157->9158 9158->9156 9160 bfb339 9159->9160 9161 bfb371 9159->9161 9160->9090 9160->9094 9160->9096 9185 bf8178 LeaveCriticalSection 9161->9185 9163->9085 9165 bf80b1 __strnicoll 9164->9165 9170 bf7f12 9165->9170 9171 bf7f29 9170->9171 9172 bf7f22 9170->9172 9174 bf7f37 9171->9174 9175 bf8076 __strnicoll GetLastError SetLastError 9171->9175 9173 bf8030 __strnicoll 16 API calls 9172->9173 9173->9171 9179 bf7fd7 9174->9179 9176 bf7f5e 9175->9176 9176->9174 9177 bf7d96 __strnicoll 11 API calls 9176->9177 9178 bf7f8e 9177->9178 9180 bf7fe3 9179->9180 9181 bf7ffa 9180->9181 9182 bf8013 __strnicoll 48 API calls 9180->9182 9183 bf7d75 9181->9183 9184 bf8013 __strnicoll 48 API calls 9181->9184 9182->9181 9183->9096 9184->9183 9185->9160 9187 bf424a IsProcessorFeaturePresent 9186->9187 9188 bf4249 9186->9188 9190 bf49f4 9187->9190 9188->9102 9193 bf4ad9 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 9190->9193 9192 bf4ad7 9192->9102 9193->9192 9195 bfdca9 ___vcrt_FlsFree 5 API calls 9194->9195 9196 bfdbb8 9195->9196 9197 bfdbd0 TlsGetValue 9196->9197 9198 bf885b 9196->9198 9197->9198 9198->9108 9198->9109 9198->9116 9200 bfb0cb __freea 14 API calls 9199->9200 9201 bf83c4 9200->9201 9201->9116 9235 bfa8c8 9202->9235 9205 bfab82 9207 bfab99 9205->9207 9208 bfab87 GetACP 9205->9208 9206 bfab70 GetOEMCP 9206->9207 9207->9046 9209 bfbc45 9207->9209 9208->9207 9210 bfbc83 9209->9210 9214 bfbc53 _unexpected 9209->9214 9211 bfb757 __strnicoll 14 API calls 9210->9211 9213 bfad17 9211->9213 9212 bfbc6e RtlAllocateHeap 9212->9213 9212->9214 9213->9042 9213->9043 9214->9210 9214->9212 9215 bf7207 _unexpected 2 API calls 9214->9215 9215->9214 9217 bfab4f 50 API calls 9216->9217 9218 bfa96a 9217->9218 9219 bfaa6f 9218->9219 9221 bfa9a7 IsValidCodePage 9218->9221 9225 bfa9c2 std::_Xinvalid_argument 9218->9225 9220 bf4241 TranslatorGuardHandler 5 API calls 9219->9220 9222 bfab4d 9220->9222 9221->9219 9223 bfa9b9 9221->9223 9222->9048 9222->9052 9224 bfa9e2 GetCPInfo 9223->9224 9223->9225 9224->9219 9224->9225 9275 bfaed9 9225->9275 9228 bfb08a __FrameHandler3::FrameUnwindToState 9227->9228 9352 bf8161 EnterCriticalSection 9228->9352 9230 bfb094 9353 bfae18 9230->9353 9236 bfa8e6 9235->9236 9242 bfa8df 9235->9242 9237 bfa00a _unexpected 48 API calls 9236->9237 9236->9242 9238 bfa907 9237->9238 9243 bfd95d 9238->9243 9242->9205 9242->9206 9244 bfa91d 9243->9244 9245 bfd970 9243->9245 9247 bfd98a 9244->9247 9245->9244 9251 bfc179 9245->9251 9248 bfd99d 9247->9248 9250 bfd9b2 9247->9250 9248->9250 9272 bfa863 9248->9272 9250->9242 9252 bfc185 __FrameHandler3::FrameUnwindToState 9251->9252 9253 bfa00a _unexpected 48 API calls 9252->9253 9254 bfc18e 9253->9254 9261 bfc1d4 9254->9261 9264 bf8161 EnterCriticalSection 9254->9264 9256 bfc1ac 9265 bfc1fa 9256->9265 9261->9244 9262 bf835d CallUnexpected 48 API calls 9263 bfc1f9 9262->9263 9264->9256 9266 bfc1bd 9265->9266 9267 bfc208 _unexpected 9265->9267 9269 bfc1d9 9266->9269 9267->9266 9268 bfbfae _unexpected 14 API calls 9267->9268 9268->9266 9270 bf8178 CallUnexpected LeaveCriticalSection 9269->9270 9271 bfc1d0 9270->9271 9271->9261 9271->9262 9273 bfa00a _unexpected 48 API calls 9272->9273 9274 bfa868 9273->9274 9274->9250 9276 bfaf01 GetCPInfo 9275->9276 9285 bfafca 9275->9285 9281 bfaf19 9276->9281 9276->9285 9278 bf4241 TranslatorGuardHandler 5 API calls 9280 bfb07c 9278->9280 9280->9219 9286 bfbced 9281->9286 9284 bfded4 52 API calls 9284->9285 9285->9278 9287 bfa8c8 __strnicoll 48 API calls 9286->9287 9288 bfbd0d 9287->9288 9306 bfbdee 9288->9306 9290 bfbdc1 9309 bfbccd 9290->9309 9291 bf4241 TranslatorGuardHandler 5 API calls 9295 bfaf81 9291->9295 9292 bfbd3a 9292->9290 9294 bfbc45 15 API calls 9292->9294 9296 bfbdc9 9292->9296 9297 bfbd5f std::_Xinvalid_argument __alloca_probe_16 9292->9297 9294->9297 9301 bfded4 9295->9301 9296->9291 9297->9290 9298 bfbdee ___scrt_uninitialize_crt MultiByteToWideChar 9297->9298 9299 bfbda8 9298->9299 9299->9290 9300 bfbdaf GetStringTypeW 9299->9300 9300->9290 9302 bfa8c8 __strnicoll 48 API calls 9301->9302 9303 bfdee7 9302->9303 9315 bfdf1d 9303->9315 9313 bfbe18 9306->9313 9310 bfbcd9 9309->9310 9312 bfbcea 9309->9312 9311 bfb0cb __freea 14 API calls 9310->9311 9310->9312 9311->9312 9312->9296 9314 bfbe0a MultiByteToWideChar 9313->9314 9314->9292 9316 bfdf38 9315->9316 9317 bfbdee ___scrt_uninitialize_crt MultiByteToWideChar 9316->9317 9318 bfdf7c 9317->9318 9321 bfbc45 15 API calls 9318->9321 9323 bfdfa2 __alloca_probe_16 9318->9323 9324 bfe0f7 9318->9324 9335 bfe04a 9318->9335 9319 bf4241 TranslatorGuardHandler 5 API calls 9320 bfafa2 9319->9320 9320->9284 9321->9323 9322 bfbccd __freea 14 API calls 9322->9324 9325 bfbdee ___scrt_uninitialize_crt MultiByteToWideChar 9323->9325 9323->9335 9324->9319 9326 bfdfeb 9325->9326 9326->9335 9343 bf9c5c 9326->9343 9329 bfe059 9331 bfe0e2 9329->9331 9333 bfbc45 15 API calls 9329->9333 9336 bfe06b __alloca_probe_16 9329->9336 9330 bfe021 9332 bf9c5c 6 API calls 9330->9332 9330->9335 9334 bfbccd __freea 14 API calls 9331->9334 9332->9335 9333->9336 9334->9335 9335->9322 9336->9331 9337 bf9c5c 6 API calls 9336->9337 9338 bfe0ae 9337->9338 9338->9331 9349 bfd131 9338->9349 9340 bfe0c8 9340->9331 9341 bfe0d1 9340->9341 9342 bfbccd __freea 14 API calls 9341->9342 9342->9335 9344 bf9f57 LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary GetProcAddress 9343->9344 9345 bf9c67 9344->9345 9346 bf9cb9 LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary GetProcAddress 9345->9346 9348 bf9c6d 9345->9348 9347 bf9cad LCMapStringW 9346->9347 9347->9348 9348->9329 9348->9330 9348->9335 9350 bfd144 ___scrt_uninitialize_crt 9349->9350 9351 bfd182 WideCharToMultiByte 9350->9351 9351->9340 9352->9230 9363 bfa7e2 9353->9363 9355 bfae3a 9356 bfa7e2 48 API calls 9355->9356 9358 bfae59 9356->9358 9357 bfae80 9360 bfb0bf 9357->9360 9358->9357 9359 bfb0cb __freea 14 API calls 9358->9359 9359->9357 9377 bf8178 LeaveCriticalSection 9360->9377 9362 bfb0ad 9362->9053 9364 bfa7f3 9363->9364 9372 bfa7ef CatchIt 9363->9372 9365 bfa80d std::_Xinvalid_argument 9364->9365 9366 bfa7fa 9364->9366 9370 bfa83b 9365->9370 9371 bfa844 9365->9371 9365->9372 9367 bfb757 __strnicoll 14 API calls 9366->9367 9368 bfa7ff 9367->9368 9369 bf7d69 __strnicoll 48 API calls 9368->9369 9369->9372 9373 bfb757 __strnicoll 14 API calls 9370->9373 9371->9372 9374 bfb757 __strnicoll 14 API calls 9371->9374 9372->9355 9375 bfa840 9373->9375 9374->9375 9376 bf7d69 __strnicoll 48 API calls 9375->9376 9376->9372 9377->9362 9379 bf96ba 9378->9379 9381 bf96c8 9378->9381 9379->9381 9385 bf96e0 9379->9385 9380 bfb757 __strnicoll 14 API calls 9382 bf96d0 9380->9382 9381->9380 9383 bf7d69 __strnicoll 48 API calls 9382->9383 9384 bf96da 9383->9384 9384->8994 9385->9384 9386 bfb757 __strnicoll 14 API calls 9385->9386 9386->9382 9388 bf7b5d 9387->9388 9389 bf7b7a 9387->9389 9390 bf7b74 9388->9390 9391 bfb0cb __freea 14 API calls 9388->9391 9389->9003 9392 bfb0cb __freea 14 API calls 9390->9392 9391->9388 9392->9389 9394 bf7da2 9393->9394 9395 bf7dca CallUnexpected 8 API calls 9394->9395 9396 bf7db7 GetCurrentProcess TerminateProcess 9395->9396 9396->9008 9398 bfd30f 9397->9398 9399 bfd320 9398->9399 9401 bfd333 ___from_strstr_to_strchr 9398->9401 9400 bfb757 __strnicoll 14 API calls 9399->9400 9409 bfd325 9400->9409 9402 bfd54a 9401->9402 9404 bfd353 9401->9404 9403 bfb757 __strnicoll 14 API calls 9402->9403 9405 bfd54f 9403->9405 9460 bfd56f 9404->9460 9407 bfb0cb __freea 14 API calls 9405->9407 9407->9409 9409->8955 9410 bfd397 9411 bfd383 9410->9411 9464 bfd589 9410->9464 9417 bfb0cb __freea 14 API calls 9411->9417 9412 bfd399 9412->9411 9416 bfb807 _unexpected 14 API calls 9412->9416 9413 bfd375 9419 bfd37e 9413->9419 9420 bfd392 9413->9420 9418 bfd3a7 9416->9418 9417->9409 9422 bfb0cb __freea 14 API calls 9418->9422 9424 bfb757 __strnicoll 14 API calls 9419->9424 9425 bfd56f 48 API calls 9420->9425 9421 bfd40c 9426 bfb0cb __freea 14 API calls 9421->9426 9423 bfd3b2 9422->9423 9423->9410 9423->9411 9429 bfb807 _unexpected 14 API calls 9423->9429 9424->9411 9425->9410 9431 bfd414 9426->9431 9427 bfd457 9427->9411 9428 bfd0c4 51 API calls 9427->9428 9430 bfd485 9428->9430 9432 bfd3ce 9429->9432 9433 bfb0cb __freea 14 API calls 9430->9433 9436 bfd441 9431->9436 9468 bfd0c4 9431->9468 9435 bfb0cb __freea 14 API calls 9432->9435 9433->9436 9435->9410 9436->9411 9436->9436 9440 bfb807 _unexpected 14 API calls 9436->9440 9458 bfd53f 9436->9458 9437 bfb0cb __freea 14 API calls 9437->9409 9438 bfd438 9439 bfb0cb __freea 14 API calls 9438->9439 9439->9436 9441 bfd4d0 9440->9441 9442 bfd4d8 9441->9442 9443 bfd4e0 9441->9443 9444 bfb0cb __freea 14 API calls 9442->9444 9445 bf96ac ___std_exception_copy 48 API calls 9443->9445 9444->9411 9446 bfd4ec 9445->9446 9447 bfd564 9446->9447 9448 bfd4f3 9446->9448 9450 bf7d96 __strnicoll 11 API calls 9447->9450 9477 bff9bc 9448->9477 9452 bfd56e 9450->9452 9453 bfd51a 9455 bfb757 __strnicoll 14 API calls 9453->9455 9454 bfd539 9456 bfb0cb __freea 14 API calls 9454->9456 9457 bfd51f 9455->9457 9456->9458 9459 bfb0cb __freea 14 API calls 9457->9459 9458->9437 9459->9411 9461 bfd57c 9460->9461 9462 bfd35e 9460->9462 9492 bfd5de 9461->9492 9462->9410 9462->9412 9462->9413 9465 bfd3fc 9464->9465 9467 bfd59f 9464->9467 9465->9421 9465->9427 9467->9465 9507 bff8cb 9467->9507 9469 bfd0ec 9468->9469 9470 bfd0d1 9468->9470 9471 bfd0fb 9469->9471 9541 bff6f8 9469->9541 9470->9469 9472 bfd0dd 9470->9472 9548 bff72b 9471->9548 9474 bfb757 __strnicoll 14 API calls 9472->9474 9476 bfd0e2 std::_Xinvalid_argument 9474->9476 9476->9438 9560 bfc274 9477->9560 9482 bffa2f 9483 bffa3b 9482->9483 9486 bfb0cb __freea 14 API calls 9482->9486 9488 bfb0cb __freea 14 API calls 9483->9488 9490 bfd514 9483->9490 9484 bfc274 48 API calls 9485 bffa0c 9484->9485 9487 bfc30c 17 API calls 9485->9487 9486->9483 9489 bffa19 9487->9489 9488->9490 9489->9482 9491 bffa23 SetEnvironmentVariableW 9489->9491 9490->9453 9490->9454 9491->9482 9493 bfd5f1 9492->9493 9500 bfd5ec 9492->9500 9494 bfb807 _unexpected 14 API calls 9493->9494 9504 bfd60e 9494->9504 9495 bfd67c 9497 bf835d CallUnexpected 48 API calls 9495->9497 9496 bfd66b 9498 bfb0cb __freea 14 API calls 9496->9498 9499 bfd681 9497->9499 9498->9500 9501 bf7d96 __strnicoll 11 API calls 9499->9501 9500->9462 9502 bfd68d 9501->9502 9503 bfb807 _unexpected 14 API calls 9503->9504 9504->9495 9504->9496 9504->9499 9504->9503 9505 bfb0cb __freea 14 API calls 9504->9505 9506 bf96ac ___std_exception_copy 48 API calls 9504->9506 9505->9504 9506->9504 9508 bff8df 9507->9508 9509 bff8d9 9507->9509 9508->9467 9510 c001e1 9509->9510 9511 c00199 9509->9511 9523 c001f7 9510->9523 9513 c0019f 9511->9513 9516 c001bc 9511->9516 9515 bfb757 __strnicoll 14 API calls 9513->9515 9514 c001af 9514->9467 9517 c001a4 9515->9517 9519 bfb757 __strnicoll 14 API calls 9516->9519 9522 c001da 9516->9522 9518 bf7d69 __strnicoll 48 API calls 9517->9518 9518->9514 9520 c001cb 9519->9520 9521 bf7d69 __strnicoll 48 API calls 9520->9521 9521->9514 9522->9467 9524 c00221 9523->9524 9525 c00207 9523->9525 9526 c00240 9524->9526 9527 c00229 9524->9527 9528 bfb757 __strnicoll 14 API calls 9525->9528 9531 c00263 9526->9531 9532 c0024c 9526->9532 9530 bfb757 __strnicoll 14 API calls 9527->9530 9529 c0020c 9528->9529 9533 bf7d69 __strnicoll 48 API calls 9529->9533 9534 c0022e 9530->9534 9536 bfa8c8 __strnicoll 48 API calls 9531->9536 9540 c00217 9531->9540 9535 bfb757 __strnicoll 14 API calls 9532->9535 9533->9540 9537 bf7d69 __strnicoll 48 API calls 9534->9537 9538 c00251 9535->9538 9536->9540 9537->9540 9539 bf7d69 __strnicoll 48 API calls 9538->9539 9539->9540 9540->9514 9542 bff718 HeapSize 9541->9542 9543 bff703 9541->9543 9542->9471 9544 bfb757 __strnicoll 14 API calls 9543->9544 9545 bff708 9544->9545 9546 bf7d69 __strnicoll 48 API calls 9545->9546 9547 bff713 9546->9547 9547->9471 9549 bff738 9548->9549 9550 bff743 9548->9550 9551 bfbc45 15 API calls 9549->9551 9552 bff74b 9550->9552 9558 bff754 _unexpected 9550->9558 9556 bff740 9551->9556 9553 bfb0cb __freea 14 API calls 9552->9553 9553->9556 9554 bff77e HeapReAlloc 9554->9556 9554->9558 9555 bff759 9557 bfb757 __strnicoll 14 API calls 9555->9557 9556->9476 9557->9556 9558->9554 9558->9555 9559 bf7207 _unexpected 2 API calls 9558->9559 9559->9558 9561 bfa8c8 __strnicoll 48 API calls 9560->9561 9562 bfc286 9561->9562 9563 bfc298 9562->9563 9568 bf9a96 9562->9568 9565 bfc30c 9563->9565 9574 bfc4e2 9565->9574 9571 bf9f23 9568->9571 9572 bf9e9e _unexpected 5 API calls 9571->9572 9573 bf9a9e 9572->9573 9573->9563 9575 bfc50a 9574->9575 9576 bfc4f0 9574->9576 9577 bfc511 9575->9577 9578 bfc530 9575->9578 9592 bfc2f2 9576->9592 9591 bfc324 9577->9591 9596 bfc2b3 9577->9596 9580 bfbdee ___scrt_uninitialize_crt MultiByteToWideChar 9578->9580 9582 bfc53f 9580->9582 9583 bfc546 GetLastError 9582->9583 9585 bfc56c 9582->9585 9588 bfc2b3 15 API calls 9582->9588 9601 bfb77d 9583->9601 9586 bfbdee ___scrt_uninitialize_crt MultiByteToWideChar 9585->9586 9585->9591 9589 bfc583 9586->9589 9588->9585 9589->9583 9589->9591 9590 bfb757 __strnicoll 14 API calls 9590->9591 9591->9482 9591->9484 9593 bfc2fd 9592->9593 9594 bfc305 9592->9594 9595 bfb0cb __freea 14 API calls 9593->9595 9594->9591 9595->9594 9597 bfc2f2 14 API calls 9596->9597 9598 bfc2c1 9597->9598 9606 bfc255 9598->9606 9609 bfb76a 9601->9609 9603 bfb788 __dosmaperr 9604 bfb757 __strnicoll 14 API calls 9603->9604 9605 bfb79b 9604->9605 9605->9590 9607 bfbc45 15 API calls 9606->9607 9608 bfc262 9607->9608 9608->9591 9610 bfa15b __strnicoll 14 API calls 9609->9610 9611 bfb76f 9610->9611 9611->9603 9613 bece50 std::_Throw_Cpp_error 9612->9613 9631 bf3b60 9613->9631 9616 bece70 9622 bece93 9616->9622 9617 bf441d 52 API calls std::_Throw_Cpp_error 9617->9622 9618 bed449 9619 bf4241 TranslatorGuardHandler 5 API calls 9618->9619 9620 becdd5 CreateEllipticRgn 9619->9620 9625 bed4a0 9620->9625 9621 becf87 GetCurrentThreadId 9621->9622 9622->9617 9622->9618 9622->9621 9623 bf441d std::_Throw_Cpp_error 52 API calls 9622->9623 9988 bf4952 WaitForSingleObjectEx 9622->9988 9623->9621 9626 bed4c0 9625->9626 9628 bed528 9626->9628 9993 bf846b 9626->9993 9629 bf4241 TranslatorGuardHandler 5 API calls 9628->9629 9630 bece14 9629->9630 9630->8819 9632 bf3b8b std::_Throw_Cpp_error 9631->9632 9645 bf3cc0 9632->9645 9634 bf3b9a 9654 bf6ce6 9634->9654 9636 bf3bea 9637 bf3c84 9636->9637 9639 bf3c9a 9636->9639 9669 bf3de0 9636->9669 9673 bf441d 9637->9673 9679 bf3e30 9639->9679 9642 bf4241 TranslatorGuardHandler 5 API calls 9644 becdc7 9642->9644 9644->9616 9685 bf41c6 9645->9685 9647 bf3cef std::_Throw_Cpp_error 9699 bf3f00 9647->9699 9652 bf4241 TranslatorGuardHandler 5 API calls 9653 bf3d32 9652->9653 9653->9634 9655 bf6d07 9654->9655 9656 bf6cf3 9654->9656 9723 bf6d77 9655->9723 9657 bfb757 __strnicoll 14 API calls 9656->9657 9659 bf6cf8 9657->9659 9661 bf7d69 __strnicoll 48 API calls 9659->9661 9663 bf6d03 9661->9663 9662 bf6d1c CreateThread 9664 bf6d3b GetLastError 9662->9664 9668 bf6d47 9662->9668 9740 bf6e00 9662->9740 9663->9636 9666 bfb77d __dosmaperr 14 API calls 9664->9666 9666->9668 9732 bf6dc7 9668->9732 9670 bf3e0c 9669->9670 9671 bf4241 TranslatorGuardHandler 5 API calls 9670->9671 9672 bf3e19 9671->9672 9672->9636 9674 bf4433 std::_Throw_Cpp_error 9673->9674 9880 bf467d 9674->9880 9684 bf3e58 std::_Throw_Cpp_error 9679->9684 9680 bf3ee3 9681 bf4241 TranslatorGuardHandler 5 API calls 9680->9681 9682 bf3ca2 9681->9682 9682->9642 9684->9680 9984 bf40f0 9684->9984 9687 bf41cb 9685->9687 9688 bf41e5 9687->9688 9689 bf7207 _unexpected 2 API calls 9687->9689 9691 bf41e7 std::_Throw_Cpp_error 9687->9691 9708 bf83c7 9687->9708 9688->9647 9689->9687 9690 bf49c1 std::_Throw_Cpp_error 9692 bf59fc CallUnexpected RaiseException 9690->9692 9691->9690 9715 bf59fc 9691->9715 9694 bf49de IsProcessorFeaturePresent 9692->9694 9696 bf49f4 9694->9696 9718 bf4ad9 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 9696->9718 9698 bf4ad7 9698->9647 9719 bf3fb0 9699->9719 9702 bf4241 TranslatorGuardHandler 5 API calls 9703 bf3d0e 9702->9703 9704 bf3f60 9703->9704 9705 bf3f95 9704->9705 9706 bf4241 TranslatorGuardHandler 5 API calls 9705->9706 9707 bf3d22 9706->9707 9707->9652 9713 bfbc45 _unexpected 9708->9713 9709 bfbc83 9710 bfb757 __strnicoll 14 API calls 9709->9710 9712 bfbc81 9710->9712 9711 bfbc6e RtlAllocateHeap 9711->9712 9711->9713 9712->9687 9713->9709 9713->9711 9714 bf7207 _unexpected 2 API calls 9713->9714 9714->9713 9716 bf5a16 9715->9716 9717 bf5a43 RaiseException 9715->9717 9716->9717 9717->9690 9718->9698 9720 bf3fe2 std::_Throw_Cpp_error 9719->9720 9721 bf4241 TranslatorGuardHandler 5 API calls 9720->9721 9722 bf3f36 9721->9722 9722->9702 9724 bfb807 _unexpected 14 API calls 9723->9724 9725 bf6d88 9724->9725 9726 bfb0cb __freea 14 API calls 9725->9726 9727 bf6d95 9726->9727 9728 bf6d9c GetModuleHandleExW 9727->9728 9729 bf6db9 9727->9729 9728->9729 9730 bf6dc7 16 API calls 9729->9730 9731 bf6d13 9730->9731 9731->9662 9731->9668 9733 bf6dd3 9732->9733 9739 bf6d52 9732->9739 9734 bf6dd9 CloseHandle 9733->9734 9735 bf6de2 9733->9735 9734->9735 9736 bf6de8 FreeLibrary 9735->9736 9737 bf6df1 9735->9737 9736->9737 9738 bfb0cb __freea 14 API calls 9737->9738 9738->9739 9739->9636 9741 bf6e0c __FrameHandler3::FrameUnwindToState 9740->9741 9742 bf6e13 GetLastError ExitThread 9741->9742 9743 bf6e20 9741->9743 9744 bfa00a _unexpected 48 API calls 9743->9744 9745 bf6e25 9744->9745 9756 bfb976 9745->9756 9748 bf6e3c 9760 bf3d40 9748->9760 9757 bf6e30 9756->9757 9758 bfb986 CallUnexpected 9756->9758 9757->9748 9771 bf9cea 9757->9771 9758->9757 9777 bf9d93 9758->9777 9761 bf3f60 5 API calls 9760->9761 9762 bf3d6d std::_Throw_Cpp_error 9761->9762 9780 bf40a0 9762->9780 9767 bf3e30 5 API calls 9768 bf3da6 9767->9768 9769 bf4241 TranslatorGuardHandler 5 API calls 9768->9769 9770 bf3db5 9769->9770 9774 bf6d69 9770->9774 9772 bf9e9e _unexpected 5 API calls 9771->9772 9773 bf9d06 9772->9773 9773->9748 9868 bf6e7e 9774->9868 9778 bf9e9e _unexpected 5 API calls 9777->9778 9779 bf9daf 9778->9779 9779->9757 9788 becd10 GetPEB 9780->9788 9783 bf48cb GetCurrentThreadId 9860 bf4c86 9783->9860 9787 bf48e4 __Mtx_unlock __Cnd_broadcast 9863 bf4c92 9787->9863 9795 bf84a7 9788->9795 9793 bf4241 TranslatorGuardHandler 5 API calls 9794 becd82 9793->9794 9794->9783 9796 bf84ba __strnicoll 9795->9796 9810 bf8537 9796->9810 9799 bf7fd7 __strnicoll 48 API calls 9800 becd62 9799->9800 9801 bec860 9800->9801 9804 bec890 9801->9804 9803 becced 9806 bf4241 TranslatorGuardHandler 5 API calls 9803->9806 9804->9803 9834 bebeb0 CreateFileA 9804->9834 9844 be86c0 9804->9844 9851 be1000 9804->9851 9857 be8ea0 9804->9857 9807 beccf9 9806->9807 9807->9793 9811 bf8567 9810->9811 9812 bf8576 9811->9812 9813 bf8594 9811->9813 9824 bf856b 9811->9824 9814 bf7f12 __strnicoll 29 API calls 9812->9814 9815 bf85a1 9813->9815 9817 bf84de ___scrt_uninitialize_crt 48 API calls 9813->9817 9814->9824 9818 bf85bb 9815->9818 9819 bf85d9 9815->9819 9816 bf4241 TranslatorGuardHandler 5 API calls 9822 bf84cc 9816->9822 9817->9815 9823 bfda19 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 9818->9823 9820 bf85ed 9819->9820 9821 bf8769 9819->9821 9820->9824 9826 bf8687 9820->9826 9830 bf8631 9820->9830 9821->9824 9825 bfd131 ___scrt_uninitialize_crt WideCharToMultiByte 9821->9825 9822->9799 9823->9824 9824->9816 9825->9824 9827 bfd131 ___scrt_uninitialize_crt WideCharToMultiByte 9826->9827 9828 bf869a 9827->9828 9828->9824 9831 bf86b3 GetLastError 9828->9831 9829 bfd131 ___scrt_uninitialize_crt WideCharToMultiByte 9829->9824 9830->9829 9831->9824 9832 bf86c2 9831->9832 9832->9824 9833 bfd131 ___scrt_uninitialize_crt WideCharToMultiByte 9832->9833 9833->9832 9837 bebf29 9834->9837 9835 bec021 GetFileSize 9835->9837 9836 bec083 ReadFile 9836->9837 9837->9835 9837->9836 9838 bec12c CloseHandle 9837->9838 9839 bec059 CloseHandle 9837->9839 9840 bec14b 9837->9840 9842 bec10d CloseHandle 9837->9842 9838->9837 9839->9837 9841 bf4241 TranslatorGuardHandler 5 API calls 9840->9841 9843 bec160 9841->9843 9842->9837 9843->9804 9845 be8783 std::_Throw_Cpp_error 9844->9845 9846 be8dd8 9845->9846 9849 bee9b0 5 API calls std::_Throw_Cpp_error 9845->9849 9850 beea10 51 API calls std::_Throw_Cpp_error 9845->9850 9847 bf4241 TranslatorGuardHandler 5 API calls 9846->9847 9848 be8de8 9847->9848 9848->9804 9849->9845 9850->9845 9852 be1041 9851->9852 9853 be7eb0 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 9852->9853 9854 be1451 9853->9854 9855 bf4241 TranslatorGuardHandler 5 API calls 9854->9855 9856 be7e16 9855->9856 9856->9804 9858 bed560 std::_Throw_Cpp_error 48 API calls 9857->9858 9859 be8eb6 9858->9859 9859->9804 9866 bf51de EnterCriticalSection 9860->9866 9862 bf4c90 9862->9787 9867 bf51ec LeaveCriticalSection 9863->9867 9865 bf3d9e 9865->9767 9866->9862 9867->9865 9869 bfa15b __strnicoll 14 API calls 9868->9869 9871 bf6e89 9869->9871 9870 bf6ecb ExitThread 9871->9870 9872 bf6ea2 9871->9872 9877 bf9d25 9871->9877 9874 bf6eb5 9872->9874 9875 bf6eae CloseHandle 9872->9875 9874->9870 9876 bf6ec1 FreeLibraryAndExitThread 9874->9876 9875->9874 9876->9870 9878 bf9e9e _unexpected 5 API calls 9877->9878 9879 bf9d3e 9878->9879 9879->9872 9881 bf4689 __EH_prolog3_GS 9880->9881 9882 be86c0 std::_Throw_Cpp_error 51 API calls 9881->9882 9883 bf469d 9882->9883 9890 bf45a6 9883->9890 9908 bf42e6 9890->9908 9892 bf45d7 9912 bf4533 9892->9912 9895 bed560 std::_Throw_Cpp_error 48 API calls 9896 bf45f9 9895->9896 9897 bf4241 TranslatorGuardHandler 5 API calls 9896->9897 9898 bf4618 9897->9898 9899 bed560 9898->9899 9903 bed584 std::_Throw_Cpp_error 9899->9903 9900 bed6bf std::_Throw_Cpp_error 9901 bf4241 TranslatorGuardHandler 5 API calls 9900->9901 9902 bed6f5 9901->9902 9905 bf4bd9 9902->9905 9903->9900 9981 bed780 9903->9981 9906 bf4241 TranslatorGuardHandler 5 API calls 9905->9906 9907 bf4be3 9906->9907 9907->9907 9909 bf42fe 9908->9909 9910 bf4305 CatchIt 9909->9910 9924 bef980 9909->9924 9910->9892 9913 bf453f __EH_prolog3_GS 9912->9913 9915 bf455e std::_Throw_Cpp_error 9913->9915 9951 bf434e 9913->9951 9916 bf434e std::_Throw_Cpp_error 51 API calls 9915->9916 9917 bf4583 9916->9917 9918 bed560 std::_Throw_Cpp_error 48 API calls 9917->9918 9919 bf458b std::_Throw_Cpp_error 9918->9919 9920 bed560 std::_Throw_Cpp_error 48 API calls 9919->9920 9921 bf459e 9920->9921 9922 bf4bd9 std::_Throw_Cpp_error 5 API calls 9921->9922 9923 bf45a5 std::domain_error::domain_error 9922->9923 9923->9895 9926 bef9a4 9924->9926 9927 befeac 9926->9927 9931 beff00 9926->9931 9939 bf0ff0 9926->9939 9928 bf4241 TranslatorGuardHandler 5 API calls 9927->9928 9929 befebc 9928->9929 9929->9910 9932 beffa3 9931->9932 9933 bf0ff0 21 API calls std::_Throw_Cpp_error 9932->9933 9934 bf0642 9932->9934 9942 bf1010 9932->9942 9946 bf7d79 9932->9946 9933->9932 9935 bf4241 TranslatorGuardHandler 5 API calls 9934->9935 9936 bf0fc0 9935->9936 9936->9926 9940 bf41c6 std::_Throw_Cpp_error 21 API calls 9939->9940 9941 bf1007 9940->9941 9941->9926 9943 bf101e std::_Throw_Cpp_error 9942->9943 9944 bf59fc CallUnexpected RaiseException 9943->9944 9945 bf1036 9944->9945 9947 bf809f __strnicoll 48 API calls 9946->9947 9948 bf7d88 9947->9948 9949 bf7d96 __strnicoll 11 API calls 9948->9949 9950 bf7d95 9949->9950 9952 bf438f 9951->9952 9954 bf4365 CatchIt 9951->9954 9955 bf476d 9952->9955 9954->9915 9956 bf4828 9955->9956 9957 bf4792 9955->9957 9978 bef170 9956->9978 9966 bef4d0 9957->9966 9962 bef980 std::_Throw_Cpp_error 51 API calls 9963 bf47ae CatchIt 9962->9963 9965 bf47fa CatchIt 9963->9965 9972 bed7f0 9963->9972 9965->9954 9967 bef718 9966->9967 9968 bef2e0 std::_Throw_Cpp_error 5 API calls 9967->9968 9969 bef94d 9967->9969 9968->9967 9970 bf4241 TranslatorGuardHandler 5 API calls 9969->9970 9971 bef960 9970->9971 9971->9962 9974 bed8d2 9972->9974 9973 bee5ad std::_Throw_Cpp_error 9975 bf4241 TranslatorGuardHandler 5 API calls 9973->9975 9974->9973 9977 bee600 std::_Throw_Cpp_error 48 API calls 9974->9977 9976 bee5d5 9975->9976 9976->9965 9977->9974 9979 bf4846 std::_Xinvalid_argument 50 API calls 9978->9979 9980 bef182 9979->9980 9982 bed7f0 std::_Throw_Cpp_error 48 API calls 9981->9982 9983 bed7ab 9982->9983 9983->9903 9985 bf4114 9984->9985 9986 bf4241 TranslatorGuardHandler 5 API calls 9985->9986 9987 bf4196 9986->9987 9987->9684 9989 bf499a 9988->9989 9990 bf4968 GetExitCodeThread 9988->9990 9989->9622 9990->9989 9991 bf4979 CloseHandle 9990->9991 9991->9622 9994 bf8477 __FrameHandler3::FrameUnwindToState 9993->9994 9995 bfa00a _unexpected 48 API calls 9994->9995 9998 bf847c 9995->9998 9996 bf835d CallUnexpected 48 API calls 9997 bf84a6 9996->9997 9998->9996 10000 bf705f 9999->10000 10001 bf704d 9999->10001 10017 bf71ba 10000->10017 10002 bf53ec CallUnexpected GetModuleHandleW 10001->10002 10004 bf7052 10002->10004 10004->10000 10011 bf6f54 GetModuleHandleExW 10004->10011 10006 bf6f0c 10006->8793 10012 bf6fb4 10011->10012 10013 bf6f93 GetProcAddress 10011->10013 10015 bf6fba FreeLibrary 10012->10015 10016 bf6fc3 10012->10016 10013->10012 10014 bf6fa7 10013->10014 10014->10012 10015->10016 10016->10000 10018 bf71c6 __FrameHandler3::FrameUnwindToState 10017->10018 10032 bf8161 EnterCriticalSection 10018->10032 10020 bf71d0 10033 bf70b7 10020->10033 10022 bf71dd 10037 bf71fb 10022->10037 10025 bf6fef 10062 bf6fd6 10025->10062 10027 bf6ff9 10028 bf700d 10027->10028 10029 bf6ffd GetCurrentProcess TerminateProcess 10027->10029 10030 bf6f54 CallUnexpected 3 API calls 10028->10030 10029->10028 10031 bf7015 ExitProcess 10030->10031 10032->10020 10034 bf70c3 __FrameHandler3::FrameUnwindToState CallUnexpected 10033->10034 10036 bf7127 CallUnexpected 10034->10036 10040 bf776b 10034->10040 10036->10022 10061 bf8178 LeaveCriticalSection 10037->10061 10039 bf7096 10039->10006 10039->10025 10041 bf7777 __EH_prolog3 10040->10041 10044 bf79f6 10041->10044 10043 bf779e CallUnexpected 10043->10036 10045 bf7a02 __FrameHandler3::FrameUnwindToState 10044->10045 10052 bf8161 EnterCriticalSection 10045->10052 10047 bf7a10 10053 bf78c1 10047->10053 10052->10047 10054 bf78d8 10053->10054 10055 bf78e0 10053->10055 10057 bf7a45 10054->10057 10055->10054 10056 bfb0cb __freea 14 API calls 10055->10056 10056->10054 10060 bf8178 LeaveCriticalSection 10057->10060 10059 bf7a2e 10059->10043 10060->10059 10061->10039 10065 bfb94f 10062->10065 10064 bf6fdb CallUnexpected 10064->10027 10066 bfb95e CallUnexpected 10065->10066 10067 bfb96b 10066->10067 10069 bf9d53 10066->10069 10067->10064 10070 bf9e9e _unexpected 5 API calls 10069->10070 10071 bf9d6f 10070->10071 10071->10067 10073 bf6a7d 10072->10073 10075 bf6a8f ___scrt_uninitialize_crt 10072->10075 10074 bf6a8b 10073->10074 10077 bfb4a7 10073->10077 10074->8836 10075->8836 10080 bfb5d2 10077->10080 10083 bfb6ab 10080->10083 10084 bfb6b7 __FrameHandler3::FrameUnwindToState 10083->10084 10091 bf8161 EnterCriticalSection 10084->10091 10086 bfb72d 10100 bfb74b 10086->10100 10088 bfb6c1 ___scrt_uninitialize_crt 10088->10086 10092 bfb61f 10088->10092 10091->10088 10093 bfb62b __FrameHandler3::FrameUnwindToState 10092->10093 10103 bf6aef EnterCriticalSection 10093->10103 10095 bfb635 ___scrt_uninitialize_crt 10096 bfb66e 10095->10096 10104 bfb4b0 10095->10104 10117 bfb69f 10096->10117 10216 bf8178 LeaveCriticalSection 10100->10216 10102 bfb4ae 10102->10074 10103->10095 10105 bfb4c5 __strnicoll 10104->10105 10106 bfb4cc 10105->10106 10107 bfb4d7 10105->10107 10109 bfb5d2 ___scrt_uninitialize_crt 77 API calls 10106->10109 10120 bfb515 10107->10120 10110 bfb4d2 10109->10110 10112 bf7fd7 __strnicoll 48 API calls 10110->10112 10114 bfb50f 10112->10114 10114->10096 10115 bfb4f8 10133 bfe11f 10115->10133 10215 bf6b03 LeaveCriticalSection 10117->10215 10119 bfb68d 10119->10088 10121 bfb52e 10120->10121 10122 bfb4e1 10120->10122 10121->10122 10123 bfd936 ___scrt_uninitialize_crt 48 API calls 10121->10123 10122->10110 10126 bfd936 10122->10126 10124 bfb54a 10123->10124 10144 bfe45a 10124->10144 10127 bfd957 10126->10127 10128 bfd942 10126->10128 10127->10115 10129 bfb757 __strnicoll 14 API calls 10128->10129 10130 bfd947 10129->10130 10131 bf7d69 __strnicoll 48 API calls 10130->10131 10132 bfd952 10131->10132 10132->10115 10134 bfe13d 10133->10134 10135 bfe130 10133->10135 10137 bfe186 10134->10137 10139 bfe164 10134->10139 10136 bfb757 __strnicoll 14 API calls 10135->10136 10143 bfe135 10136->10143 10138 bfb757 __strnicoll 14 API calls 10137->10138 10140 bfe18b 10138->10140 10185 bfe19c 10139->10185 10142 bf7d69 __strnicoll 48 API calls 10140->10142 10142->10143 10143->10110 10146 bfe466 __FrameHandler3::FrameUnwindToState 10144->10146 10145 bfe46e 10145->10122 10146->10145 10147 bfe4a7 10146->10147 10149 bfe4ed 10146->10149 10148 bf7f12 __strnicoll 29 API calls 10147->10148 10148->10145 10155 bfd8d7 EnterCriticalSection 10149->10155 10151 bfe4f3 10152 bfe511 10151->10152 10156 bfe23e 10151->10156 10182 bfe563 10152->10182 10155->10151 10157 bfe266 10156->10157 10180 bfe289 ___scrt_uninitialize_crt 10156->10180 10158 bfe26a 10157->10158 10161 bfe2c5 10157->10161 10159 bf7f12 __strnicoll 29 API calls 10158->10159 10159->10180 10160 bfe2e3 10163 bfe56b ___scrt_uninitialize_crt 49 API calls 10160->10163 10161->10160 10162 bffa51 ___scrt_uninitialize_crt 50 API calls 10161->10162 10162->10160 10164 bfe2f5 10163->10164 10165 bfe2fb 10164->10165 10166 bfe342 10164->10166 10169 bfe32a 10165->10169 10170 bfe303 10165->10170 10167 bfe3ab WriteFile 10166->10167 10168 bfe356 10166->10168 10171 bfe3cd GetLastError 10167->10171 10167->10180 10173 bfe35e 10168->10173 10174 bfe397 10168->10174 10172 bfe5e8 ___scrt_uninitialize_crt 54 API calls 10169->10172 10178 bfe9af ___scrt_uninitialize_crt 6 API calls 10170->10178 10170->10180 10171->10180 10172->10180 10176 bfe383 10173->10176 10177 bfe363 10173->10177 10175 bfea17 ___scrt_uninitialize_crt 7 API calls 10174->10175 10175->10180 10179 bfebdb ___scrt_uninitialize_crt 8 API calls 10176->10179 10177->10180 10181 bfeaf2 ___scrt_uninitialize_crt 7 API calls 10177->10181 10178->10180 10179->10180 10180->10152 10181->10180 10183 bfd8fa ___scrt_uninitialize_crt LeaveCriticalSection 10182->10183 10184 bfe569 10183->10184 10184->10145 10186 bfe1a8 __FrameHandler3::FrameUnwindToState 10185->10186 10198 bfd8d7 EnterCriticalSection 10186->10198 10188 bfe1b7 10196 bfe1fc 10188->10196 10199 bfd68e 10188->10199 10190 bfb757 __strnicoll 14 API calls 10192 bfe203 10190->10192 10191 bfe1e3 FlushFileBuffers 10191->10192 10193 bfe1ef GetLastError 10191->10193 10212 bfe232 10192->10212 10194 bfb76a __dosmaperr 14 API calls 10193->10194 10194->10196 10196->10190 10198->10188 10200 bfd69b 10199->10200 10202 bfd6b0 10199->10202 10201 bfb76a __dosmaperr 14 API calls 10200->10201 10204 bfd6a0 10201->10204 10203 bfb76a __dosmaperr 14 API calls 10202->10203 10205 bfd6d5 10202->10205 10206 bfd6e0 10203->10206 10207 bfb757 __strnicoll 14 API calls 10204->10207 10205->10191 10208 bfb757 __strnicoll 14 API calls 10206->10208 10209 bfd6a8 10207->10209 10210 bfd6e8 10208->10210 10209->10191 10211 bf7d69 __strnicoll 48 API calls 10210->10211 10211->10209 10213 bfd8fa ___scrt_uninitialize_crt LeaveCriticalSection 10212->10213 10214 bfe21b 10213->10214 10214->10143 10215->10119 10216->10102 8756 bfbc45 8757 bfbc83 8756->8757 8761 bfbc53 _unexpected 8756->8761 8758 bfb757 __strnicoll 14 API calls 8757->8758 8760 bfbc81 8758->8760 8759 bfbc6e RtlAllocateHeap 8759->8760 8759->8761 8761->8757 8761->8759 8762 bf7207 _unexpected 2 API calls 8761->8762 8762->8761

                  Control-flow Graph

                  APIs
                  • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,00C0B0FF,00C0B0EF), ref: 00C0B323
                  • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 00C0B336
                  • Wow64GetThreadContext.KERNEL32(0000011C,00000000), ref: 00C0B354
                  • ReadProcessMemory.KERNELBASE(00000120,?,00C0B143,00000004,00000000), ref: 00C0B378
                  • VirtualAllocEx.KERNELBASE(00000120,?,?,00003000,00000040), ref: 00C0B3A3
                  • WriteProcessMemory.KERNELBASE(00000120,00000000,?,?,00000000,?), ref: 00C0B3FB
                  • WriteProcessMemory.KERNELBASE(00000120,00400000,?,?,00000000,?,00000028), ref: 00C0B446
                  • WriteProcessMemory.KERNELBASE(00000120,?,?,00000004,00000000), ref: 00C0B484
                  • Wow64SetThreadContext.KERNEL32(0000011C,005E0000), ref: 00C0B4C0
                  • ResumeThread.KERNELBASE(0000011C), ref: 00C0B4CF
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1683425370.0000000000C0B000.00000040.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                  • Associated: 00000000.00000002.1683346277.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683369538.0000000000BE1000.00000020.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683396143.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683449259.0000000000C0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683480935.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683511445.0000000000C11000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_be0000_injector V2.jbxd
                  Similarity
                  • API ID: Process$Memory$ThreadWrite$AllocContextVirtualWow64$CreateReadResume
                  • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe$CreateProcessW$GetP$GetThreadContext$Load$ReadProcessMemory$ResumeThread$SetThreadContext$TerminateProcess$VirtualAlloc$VirtualAllocEx$WriteProcessMemory$aryA$ress
                  • API String ID: 2687962208-3857624555
                  • Opcode ID: 4d4c1a7e65f8d0d38951af6025ef960edc15c7aa7ffa2998c2434409f37e51df
                  • Instruction ID: 8d4e543c5eb0d67662eba10edae79d59783eec53457160c00fdb73d98c0e21e9
                  • Opcode Fuzzy Hash: 4d4c1a7e65f8d0d38951af6025ef960edc15c7aa7ffa2998c2434409f37e51df
                  • Instruction Fuzzy Hash: 7EB1F67660064AAFDB60CF68CC80BDA73A5FF88714F158524EA18AB341D770FE51CB94
                  Memory Dump Source
                  • Source File: 00000000.00000002.1683369538.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                  • Associated: 00000000.00000002.1683346277.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683396143.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683425370.0000000000C0B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683449259.0000000000C0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683480935.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683511445.0000000000C11000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_be0000_injector V2.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 9ec8d057e21f5a34acd31744d597624369ba0d622b65525e7d55aaa66c29275d
                  • Instruction ID: d512fc146881b070452df5903490e00b9c0b9febc137d83ab513c0128f66ac33
                  • Opcode Fuzzy Hash: 9ec8d057e21f5a34acd31744d597624369ba0d622b65525e7d55aaa66c29275d
                  • Instruction Fuzzy Hash: 6A011474A0421C8FCB14DF69C885BE9FBF0EB18710F0184E9A88897351EB74AA84CF85

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 26 bf9dd3-bf9ddf 27 bf9e71-bf9e74 26->27 28 bf9e7a 27->28 29 bf9de4-bf9df5 27->29 30 bf9e7c-bf9e80 28->30 31 bf9df7-bf9dfa 29->31 32 bf9e02-bf9e1b LoadLibraryExW 29->32 33 bf9e9a-bf9e9c 31->33 34 bf9e00 31->34 35 bf9e1d-bf9e26 GetLastError 32->35 36 bf9e81-bf9e91 32->36 33->30 38 bf9e6e 34->38 39 bf9e5f-bf9e6c 35->39 40 bf9e28-bf9e3a call bfbc93 35->40 36->33 37 bf9e93-bf9e94 FreeLibrary 36->37 37->33 38->27 39->38 40->39 43 bf9e3c-bf9e4e call bfbc93 40->43 43->39 46 bf9e50-bf9e5d LoadLibraryExW 43->46 46->36 46->39
                  APIs
                  • FreeLibrary.KERNEL32(00000000,?,00000000,00000800,00000000,?,?,E0819244,?,00BF9EE2,?,?,00000000), ref: 00BF9E94
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1683369538.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                  • Associated: 00000000.00000002.1683346277.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683396143.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683425370.0000000000C0B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683449259.0000000000C0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683480935.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683511445.0000000000C11000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_be0000_injector V2.jbxd
                  Similarity
                  • API ID: FreeLibrary
                  • String ID: api-ms-$ext-ms-
                  • API String ID: 3664257935-537541572
                  • Opcode ID: e17affb814c991920ba91e83641929e52070b7b8a698b84b2bd69f8900b0bacf
                  • Instruction ID: ed0e822b1a5da0cbf6fd5f9c47287e29f14db6caee0e19ada2032e32a0482e19
                  • Opcode Fuzzy Hash: e17affb814c991920ba91e83641929e52070b7b8a698b84b2bd69f8900b0bacf
                  • Instruction Fuzzy Hash: 0021A831A00215ABD721DB65DC41B7E7798EF81B60B260160EE55E7295DB30ED0DC6D0

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 47 bebeb0-bebf22 CreateFileA 48 bebf29-bebf37 47->48 49 bebf3d-bebf4a 48->49 50 bebff2-bec00c 48->50 53 bebf50-bebf5d 49->53 54 bec021-bec054 GetFileSize 49->54 52 bec16a 50->52 52->48 56 bec078-bec0ce call bf4233 ReadFile 53->56 57 bebf63-bebf70 53->57 54->52 56->52 61 bebf76-bebf83 57->61 62 bec011-bec01c 57->62 64 bec12c-bec146 CloseHandle 61->64 65 bebf89-bebf96 61->65 62->52 64->52 67 bebf9c-bebfa9 65->67 68 bec0f6-bec108 call bf423c 65->68 71 bebfaf-bebfbc 67->71 72 bec0d3-bec0f1 67->72 68->52 75 bec059-bec073 CloseHandle 71->75 76 bebfc2-bebfcf 71->76 72->52 75->52 78 bec14b-bec169 call bf4241 76->78 79 bebfd5-bebfe2 76->79 82 bec10d-bec127 CloseHandle 79->82 83 bebfe8-bebfed 79->83 82->52 83->52
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.1683369538.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                  • Associated: 00000000.00000002.1683346277.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683396143.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683425370.0000000000C0B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683449259.0000000000C0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683480935.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683511445.0000000000C11000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_be0000_injector V2.jbxd
                  Similarity
                  • API ID: CreateFile
                  • String ID:
                  • API String ID: 823142352-0
                  • Opcode ID: eb4fd1d2dc6e817f6408e9fb33ef367da43d719b1af631ca43abbcf0a779dc84
                  • Instruction ID: 4d294faba41fc6ffa8bdd8516b629874675f20ef1cdc93af38bfe617282d2ae2
                  • Opcode Fuzzy Hash: eb4fd1d2dc6e817f6408e9fb33ef367da43d719b1af631ca43abbcf0a779dc84
                  • Instruction Fuzzy Hash: 4C7156B4904249CFCB04DFADD598AAEFFF0EB08700F1085AAE846AB351D73499459F92

                  Control-flow Graph

                  APIs
                  • CreateThread.KERNELBASE(?,?,Function_00016E00,00000000,?,?), ref: 00BF6D2F
                  • GetLastError.KERNEL32(?,00000000,00000000,?,00BF3BEA), ref: 00BF6D3B
                  • __dosmaperr.LIBCMT ref: 00BF6D42
                  Memory Dump Source
                  • Source File: 00000000.00000002.1683369538.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                  • Associated: 00000000.00000002.1683346277.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683396143.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683425370.0000000000C0B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683449259.0000000000C0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683480935.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683511445.0000000000C11000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_be0000_injector V2.jbxd
                  Similarity
                  • API ID: CreateErrorLastThread__dosmaperr
                  • String ID:
                  • API String ID: 2744730728-0
                  • Opcode ID: b32de6c93ba750fa5c19db56589501f48d582e3976da5c27b7c389657c3c536d
                  • Instruction ID: 4212de34ba5c80d2fbd6c8f5813f8ce8f4e537f905a99d9af9fe861ff2e77275
                  • Opcode Fuzzy Hash: b32de6c93ba750fa5c19db56589501f48d582e3976da5c27b7c389657c3c536d
                  • Instruction Fuzzy Hash: FE014CBA60020DABDF15AFA0DC05ABE3BE5EF40764F1040A8BE0197160DB71DE58DB90

                  Control-flow Graph

                  APIs
                  • GetCurrentProcess.KERNEL32(00000002,?,00BF70B1,00BF83A0,00BF83A0,?,00000002,E0819244,00BF83A0,00000002), ref: 00BF7000
                  • TerminateProcess.KERNEL32(00000000,?,00BF70B1,00BF83A0,00BF83A0,?,00000002,E0819244,00BF83A0,00000002), ref: 00BF7007
                  • ExitProcess.KERNEL32 ref: 00BF7019
                  Memory Dump Source
                  • Source File: 00000000.00000002.1683369538.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                  • Associated: 00000000.00000002.1683346277.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683396143.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683425370.0000000000C0B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683449259.0000000000C0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683480935.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683511445.0000000000C11000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_be0000_injector V2.jbxd
                  Similarity
                  • API ID: Process$CurrentExitTerminate
                  • String ID:
                  • API String ID: 1703294689-0
                  • Opcode ID: 6fc8c638f05bb6d5918e6beafbfef27558c861dafc5656c6d5518cf52a5711f1
                  • Instruction ID: 9e7a2fea5518daac54eaf43c59930e4678f1febaf46c648c56106d7bfc9e65e3
                  • Opcode Fuzzy Hash: 6fc8c638f05bb6d5918e6beafbfef27558c861dafc5656c6d5518cf52a5711f1
                  • Instruction Fuzzy Hash: 92D06C32004108ABCF112FA0EC49BAD3FAAEF44351B4580A0BA494A172CF35DD9ADB90

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 113 bfa732-bfa737 114 bfa739-bfa751 113->114 115 bfa75f-bfa768 114->115 116 bfa753-bfa757 114->116 118 bfa77a 115->118 119 bfa76a-bfa76d 115->119 116->115 117 bfa759-bfa75d 116->117 121 bfa7d4-bfa7d8 117->121 120 bfa77c-bfa789 GetStdHandle 118->120 122 bfa76f-bfa774 119->122 123 bfa776-bfa778 119->123 124 bfa78b-bfa78d 120->124 125 bfa7b6-bfa7c8 120->125 121->114 126 bfa7de-bfa7e1 121->126 122->120 123->120 124->125 127 bfa78f-bfa798 GetFileType 124->127 125->121 128 bfa7ca-bfa7cd 125->128 127->125 129 bfa79a-bfa7a3 127->129 128->121 130 bfa7ab-bfa7ae 129->130 131 bfa7a5-bfa7a9 129->131 130->121 132 bfa7b0-bfa7b4 130->132 131->121 132->121
                  APIs
                  • GetStdHandle.KERNEL32(000000F6,?,?,?,?,?,?,?,00000000,00BFA621,00C0A088,0000000C), ref: 00BFA77E
                  • GetFileType.KERNELBASE(00000000,?,?,?,?,?,?,?,00000000,00BFA621,00C0A088,0000000C), ref: 00BFA790
                  Memory Dump Source
                  • Source File: 00000000.00000002.1683369538.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                  • Associated: 00000000.00000002.1683346277.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683396143.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683425370.0000000000C0B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683449259.0000000000C0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683480935.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683511445.0000000000C11000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_be0000_injector V2.jbxd
                  Similarity
                  • API ID: FileHandleType
                  • String ID:
                  • API String ID: 3000768030-0
                  • Opcode ID: ccc0569ba6ec20068634556babf436ecda7fe3ab197a8e551e9828ccab10ce5b
                  • Instruction ID: 7b0187d75b600b34602da13a4760fbcb3e334b34f69b87696f3b17ba4a9956a9
                  • Opcode Fuzzy Hash: ccc0569ba6ec20068634556babf436ecda7fe3ab197a8e551e9828ccab10ce5b
                  • Instruction Fuzzy Hash: 141163A15047554ACB386A3E8CC8A366AE4EB56330B240799D7BA875F2C634DC4AD342

                  Control-flow Graph

                  APIs
                  • GetLastError.KERNEL32(00C09D20,0000000C), ref: 00BF6E13
                  • ExitThread.KERNEL32 ref: 00BF6E1A
                  Memory Dump Source
                  • Source File: 00000000.00000002.1683369538.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                  • Associated: 00000000.00000002.1683346277.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683396143.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683425370.0000000000C0B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683449259.0000000000C0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683480935.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683511445.0000000000C11000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_be0000_injector V2.jbxd
                  Similarity
                  • API ID: ErrorExitLastThread
                  • String ID:
                  • API String ID: 1611280651-0
                  • Opcode ID: d13feaedb5c93a6a4acb5742c84934e524c036e9d3d1305c388151ada4872fcb
                  • Instruction ID: 94f812d60ab8c104c03870d98073e65e812d91fc22aff9b66abb53c663a29db4
                  • Opcode Fuzzy Hash: d13feaedb5c93a6a4acb5742c84934e524c036e9d3d1305c388151ada4872fcb
                  • Instruction Fuzzy Hash: 74F0C275A40208AFDB04AFB0C84AB3E3BF5FF04700F104599F605972A2CB705909CB91

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 153 bfb0cb-bfb0d4 154 bfb0d6-bfb0e9 RtlFreeHeap 153->154 155 bfb103-bfb104 153->155 154->155 156 bfb0eb-bfb102 GetLastError call bfb7a0 call bfb757 154->156 156->155
                  APIs
                  • RtlFreeHeap.NTDLL(00000000,00000000,?,00BFBC39,?,00000000,?,?,00BFBB55,?,00000007,?,?,00BFC16E,?,?), ref: 00BFB0E1
                  • GetLastError.KERNEL32(?,?,00BFBC39,?,00000000,?,?,00BFBB55,?,00000007,?,?,00BFC16E,?,?), ref: 00BFB0EC
                  Memory Dump Source
                  • Source File: 00000000.00000002.1683369538.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                  • Associated: 00000000.00000002.1683346277.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683396143.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683425370.0000000000C0B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683449259.0000000000C0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683480935.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683511445.0000000000C11000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_be0000_injector V2.jbxd
                  Similarity
                  • API ID: ErrorFreeHeapLast
                  • String ID:
                  • API String ID: 485612231-0
                  • Opcode ID: 68e139758d604169dce0dd28151b7a340bbaf265424fb9777353e7829b2a5f21
                  • Instruction ID: de98c3661b0e0ca3f5906521f7bbe9f429d4d0360150535fe877385ae7269617
                  • Opcode Fuzzy Hash: 68e139758d604169dce0dd28151b7a340bbaf265424fb9777353e7829b2a5f21
                  • Instruction Fuzzy Hash: 8FE0EC3250021CABCF112BA4FD0AFAD7ADDEB84795F1100A0F70897072DB349A55CB94

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 238 bf3b60-bf3be5 call bee940 call bf3cc0 call bf3dc0 call bf6ce6 246 bf3bea-bf3bf7 238->246 247 bf3bfe-bf3c0c 246->247 248 bf3c55-bf3c6b 247->248 249 bf3c12-bf3c1f 247->249 251 bf3cb5 248->251 252 bf3c25-bf3c32 249->252 253 bf3c84-bf3c95 call bf441d 249->253 251->247 256 bf3c9a-bf3cb2 call bf3e30 call bf4241 252->256 257 bf3c38-bf3c45 252->257 253->256 261 bf3c4b-bf3c50 257->261 262 bf3c70-bf3c7f call bf3de0 257->262 261->251 262->251
                  Memory Dump Source
                  • Source File: 00000000.00000002.1683369538.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                  • Associated: 00000000.00000002.1683346277.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683396143.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683425370.0000000000C0B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683449259.0000000000C0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683480935.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683511445.0000000000C11000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_be0000_injector V2.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 8ca7c13b1da7c12c26101ae078b12dedd62e7d4d01ea7db42871825d4728ac57
                  • Instruction ID: 39a20a9b6691ba5fb02f7cbf5e232de78a344b999b90387056915d70e0b5a848
                  • Opcode Fuzzy Hash: 8ca7c13b1da7c12c26101ae078b12dedd62e7d4d01ea7db42871825d4728ac57
                  • Instruction Fuzzy Hash: 2131E2B4E043098BCB04DFA9C5946BEBBF0FF48700F1084AAE556AB341DB359A48CF55

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 268 bf9e9e-bf9ec8 269 bf9ece-bf9ed0 268->269 270 bf9eca-bf9ecc 268->270 272 bf9ed6-bf9edd call bf9dd3 269->272 273 bf9ed2-bf9ed4 269->273 271 bf9f1f-bf9f22 270->271 275 bf9ee2-bf9ee6 272->275 273->271 276 bf9ee8-bf9ef6 GetProcAddress 275->276 277 bf9f05-bf9f1c 275->277 276->277 278 bf9ef8-bf9f03 call bf6ad0 276->278 279 bf9f1e 277->279 278->279 279->271
                  Memory Dump Source
                  • Source File: 00000000.00000002.1683369538.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                  • Associated: 00000000.00000002.1683346277.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683396143.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683425370.0000000000C0B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683449259.0000000000C0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683480935.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683511445.0000000000C11000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_be0000_injector V2.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 834638682cac794105a66189f54ea4d0ed38baa821045b4747126e10c0a9731e
                  • Instruction ID: fb9c4cb8c0cf629748e0efe8a28903165b133e43d8e7b693efe0538b20215ba5
                  • Opcode Fuzzy Hash: 834638682cac794105a66189f54ea4d0ed38baa821045b4747126e10c0a9731e
                  • Instruction Fuzzy Hash: B101D63360422E5BDB02CF69EC80B3A77E5FB807207294164F704D7195EB31AC08D690

                  Control-flow Graph

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.1683369538.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                  • Associated: 00000000.00000002.1683346277.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683396143.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683425370.0000000000C0B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683449259.0000000000C0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683480935.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683511445.0000000000C11000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_be0000_injector V2.jbxd
                  Similarity
                  • API ID: CreateElliptic
                  • String ID:
                  • API String ID: 1611293138-0
                  • Opcode ID: 2bc955eec67afbdbab5f1eead6ab8c90e3c487543abd7e02904e203873ac9254
                  • Instruction ID: 8ebec95d3e548bab1a2013391ea9f5c76049a112b79f4a7e9096f269ec007daf
                  • Opcode Fuzzy Hash: 2bc955eec67afbdbab5f1eead6ab8c90e3c487543abd7e02904e203873ac9254
                  • Instruction Fuzzy Hash: 5311E5B0D003099BCB04EFA9C4597AEFBF1FF48304F508969D865AB351EB74A608CB91

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 291 bfbc45-bfbc51 292 bfbc83-bfbc8e call bfb757 291->292 293 bfbc53-bfbc55 291->293 300 bfbc90-bfbc92 292->300 295 bfbc6e-bfbc7f RtlAllocateHeap 293->295 296 bfbc57-bfbc58 293->296 298 bfbc5a-bfbc61 call bf8327 295->298 299 bfbc81 295->299 296->295 298->292 303 bfbc63-bfbc6c call bf7207 298->303 299->300 303->292 303->295
                  APIs
                  • RtlAllocateHeap.NTDLL(00000000,?,00000000,?,00BF41E0,?,?,00BF1007,?,00BEFAB5), ref: 00BFBC77
                  Memory Dump Source
                  • Source File: 00000000.00000002.1683369538.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                  • Associated: 00000000.00000002.1683346277.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683396143.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683425370.0000000000C0B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683449259.0000000000C0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683480935.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683511445.0000000000C11000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_be0000_injector V2.jbxd
                  Similarity
                  • API ID: AllocateHeap
                  • String ID:
                  • API String ID: 1279760036-0
                  • Opcode ID: 13dc80719812e49e0e57534bb847e82dc32170b75f63f24e0a31f7b8fe901b26
                  • Instruction ID: 4f466bfe684bd0bcde88dcbe53ffd3b3a365ff0d548a3ca64ccf6dcc83ba1935
                  • Opcode Fuzzy Hash: 13dc80719812e49e0e57534bb847e82dc32170b75f63f24e0a31f7b8fe901b26
                  • Instruction Fuzzy Hash: FEE0ED3110062D67EA212A65DC01FBF7AC8EF823A0F0A12E1FE18970A0CF20CC08C2A0
                  APIs
                  • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00BF4CB6
                  • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00BF4CC4
                  • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00BF4CD5
                  • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00BF4CE6
                  • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00BF4CF7
                  • GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 00BF4D08
                  • GetProcAddress.KERNEL32(00000000,InitOnceExecuteOnce), ref: 00BF4D19
                  • GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 00BF4D2A
                  • GetProcAddress.KERNEL32(00000000,CreateSemaphoreW), ref: 00BF4D3B
                  • GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 00BF4D4C
                  • GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 00BF4D5D
                  • GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 00BF4D6E
                  • GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 00BF4D7F
                  • GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 00BF4D90
                  • GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 00BF4DA1
                  • GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 00BF4DB2
                  • GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 00BF4DC3
                  • GetProcAddress.KERNEL32(00000000,FlushProcessWriteBuffers), ref: 00BF4DD4
                  • GetProcAddress.KERNEL32(00000000,FreeLibraryWhenCallbackReturns), ref: 00BF4DE5
                  • GetProcAddress.KERNEL32(00000000,GetCurrentProcessorNumber), ref: 00BF4DF6
                  • GetProcAddress.KERNEL32(00000000,CreateSymbolicLinkW), ref: 00BF4E07
                  • GetProcAddress.KERNEL32(00000000,GetCurrentPackageId), ref: 00BF4E18
                  • GetProcAddress.KERNEL32(00000000,GetTickCount64), ref: 00BF4E29
                  • GetProcAddress.KERNEL32(00000000,GetFileInformationByHandleEx), ref: 00BF4E3A
                  • GetProcAddress.KERNEL32(00000000,SetFileInformationByHandle), ref: 00BF4E4B
                  • GetProcAddress.KERNEL32(00000000,GetSystemTimePreciseAsFileTime), ref: 00BF4E5C
                  • GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 00BF4E6D
                  • GetProcAddress.KERNEL32(00000000,WakeConditionVariable), ref: 00BF4E7E
                  • GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 00BF4E8F
                  • GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 00BF4EA0
                  • GetProcAddress.KERNEL32(00000000,InitializeSRWLock), ref: 00BF4EB1
                  • GetProcAddress.KERNEL32(00000000,AcquireSRWLockExclusive), ref: 00BF4EC2
                  • GetProcAddress.KERNEL32(00000000,TryAcquireSRWLockExclusive), ref: 00BF4ED3
                  • GetProcAddress.KERNEL32(00000000,ReleaseSRWLockExclusive), ref: 00BF4EE4
                  • GetProcAddress.KERNEL32(00000000,SleepConditionVariableSRW), ref: 00BF4EF5
                  • GetProcAddress.KERNEL32(00000000,CreateThreadpoolWork), ref: 00BF4F06
                  • GetProcAddress.KERNEL32(00000000,SubmitThreadpoolWork), ref: 00BF4F17
                  • GetProcAddress.KERNEL32(00000000,CloseThreadpoolWork), ref: 00BF4F28
                  • GetProcAddress.KERNEL32(00000000,CompareStringEx), ref: 00BF4F39
                  • GetProcAddress.KERNEL32(00000000,GetLocaleInfoEx), ref: 00BF4F4A
                  • GetProcAddress.KERNEL32(00000000,LCMapStringEx), ref: 00BF4F5B
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1683369538.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                  • Associated: 00000000.00000002.1683346277.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683396143.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683425370.0000000000C0B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683449259.0000000000C0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683480935.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683511445.0000000000C11000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_be0000_injector V2.jbxd
                  Similarity
                  • API ID: AddressProc$HandleModule
                  • String ID: AcquireSRWLockExclusive$CloseThreadpoolTimer$CloseThreadpoolWait$CloseThreadpoolWork$CompareStringEx$CreateEventExW$CreateSemaphoreExW$CreateSemaphoreW$CreateSymbolicLinkW$CreateThreadpoolTimer$CreateThreadpoolWait$CreateThreadpoolWork$FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$FlushProcessWriteBuffers$FreeLibraryWhenCallbackReturns$GetCurrentPackageId$GetCurrentProcessorNumber$GetFileInformationByHandleEx$GetLocaleInfoEx$GetSystemTimePreciseAsFileTime$GetTickCount64$InitOnceExecuteOnce$InitializeConditionVariable$InitializeCriticalSectionEx$InitializeSRWLock$LCMapStringEx$ReleaseSRWLockExclusive$SetFileInformationByHandle$SetThreadpoolTimer$SetThreadpoolWait$SleepConditionVariableCS$SleepConditionVariableSRW$SubmitThreadpoolWork$TryAcquireSRWLockExclusive$WaitForThreadpoolTimerCallbacks$WakeAllConditionVariable$WakeConditionVariable$kernel32.dll
                  • API String ID: 667068680-295688737
                  • Opcode ID: 3cfce96934d69dd3d158a8b956612afe0409a45614df97f061387e2387a46452
                  • Instruction ID: 9959169181646adab859ff2cf698aef191d30503674ef9c0f2b1253e83465059
                  • Opcode Fuzzy Hash: 3cfce96934d69dd3d158a8b956612afe0409a45614df97f061387e2387a46452
                  • Instruction Fuzzy Hash: AB610471996360ABD7006FF4AC8DBCE3BE8EB197053024626B141D32E3DBB56191CF64
                  APIs
                  • GetCurrentThreadId.KERNEL32 ref: 00BECF90
                  • std::_Throw_Cpp_error.LIBCPMT ref: 00BED216
                  Memory Dump Source
                  • Source File: 00000000.00000002.1683369538.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                  • Associated: 00000000.00000002.1683346277.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683396143.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683425370.0000000000C0B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683449259.0000000000C0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683480935.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683511445.0000000000C11000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_be0000_injector V2.jbxd
                  Similarity
                  • API ID: Cpp_errorCurrentThreadThrow_std::_
                  • String ID:
                  • API String ID: 350343453-0
                  • Opcode ID: e10dea58889adbb307f00f8c1423ba566dd9f8c694ca36457ba69265073e14da
                  • Instruction ID: 1c948039500320d31c6efdeff7c4c99ed4df542c5b2c31b566adfe9853611a77
                  • Opcode Fuzzy Hash: e10dea58889adbb307f00f8c1423ba566dd9f8c694ca36457ba69265073e14da
                  • Instruction Fuzzy Hash: 29F1F876E505504FEF008A7CC8A93DF6FE68B66330F2A5729DA745B7D2D627440A8F80
                  APIs
                  • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000), ref: 00BFC8CB
                  • FindNextFileW.KERNEL32(00000000,?), ref: 00BFC9BF
                  • FindClose.KERNEL32(00000000), ref: 00BFC9FE
                  • FindClose.KERNEL32(00000000), ref: 00BFCA31
                  Memory Dump Source
                  • Source File: 00000000.00000002.1683369538.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                  • Associated: 00000000.00000002.1683346277.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683396143.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683425370.0000000000C0B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683449259.0000000000C0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683480935.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683511445.0000000000C11000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_be0000_injector V2.jbxd
                  Similarity
                  • API ID: Find$CloseFile$FirstNext
                  • String ID:
                  • API String ID: 1164774033-0
                  • Opcode ID: 9c9d5a5017ce4b7eaff2d73c0cf39822f60ac02f52f906c55b59cb4bea691d28
                  • Instruction ID: 2113b53c0319d18d87367f4e6aba8ac27214f56628919e0e33d4e85950505f46
                  • Opcode Fuzzy Hash: 9c9d5a5017ce4b7eaff2d73c0cf39822f60ac02f52f906c55b59cb4bea691d28
                  • Instruction Fuzzy Hash: 4671AD7180412D9EDF21EF288D89ABABBF9EB45300F1441D9E149A7251EB319EC99F50
                  APIs
                  • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 00BF5450
                  • IsDebuggerPresent.KERNEL32 ref: 00BF551C
                  • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00BF553C
                  • UnhandledExceptionFilter.KERNEL32(?), ref: 00BF5546
                  Memory Dump Source
                  • Source File: 00000000.00000002.1683369538.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                  • Associated: 00000000.00000002.1683346277.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683396143.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683425370.0000000000C0B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683449259.0000000000C0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683480935.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683511445.0000000000C11000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_be0000_injector V2.jbxd
                  Similarity
                  • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                  • String ID:
                  • API String ID: 254469556-0
                  • Opcode ID: 5c324abcfb6c0557592fea825455e0bff7752f1b86c1f358085741eda56bb92f
                  • Instruction ID: 8c259d9712d3a9b6e0f1c8a8c937cca19278bab2048d5f88286bf27e47099d25
                  • Opcode Fuzzy Hash: 5c324abcfb6c0557592fea825455e0bff7752f1b86c1f358085741eda56bb92f
                  • Instruction Fuzzy Hash: 933106B5D0521C9BDB20DFA4D9897CDBBF8EF08304F1040EAE509AB251EB709A89CF45
                  APIs
                  • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 00BF7EC2
                  • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 00BF7ECC
                  • UnhandledExceptionFilter.KERNEL32(-00000327,?,?,?,?,?,00000000), ref: 00BF7ED9
                  Memory Dump Source
                  • Source File: 00000000.00000002.1683369538.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                  • Associated: 00000000.00000002.1683346277.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683396143.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683425370.0000000000C0B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683449259.0000000000C0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683480935.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683511445.0000000000C11000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_be0000_injector V2.jbxd
                  Similarity
                  • API ID: ExceptionFilterUnhandled$DebuggerPresent
                  • String ID:
                  • API String ID: 3906539128-0
                  • Opcode ID: 5ac3ed2f8e5ce7bbd3105ad4c22e384bd72ef0222a24b1d590bdd28b2a54912c
                  • Instruction ID: 01bd7fb1cb79d8c0c9036f41e5d2598f3ab831aec72319b4bac02eb27caf6a62
                  • Opcode Fuzzy Hash: 5ac3ed2f8e5ce7bbd3105ad4c22e384bd72ef0222a24b1d590bdd28b2a54912c
                  • Instruction Fuzzy Hash: 6231A07494122D9BCB21DF68D889B9DBBF8BF08350F5041EAE518A7291EB709F858F44
                  APIs
                  • ___std_exception_destroy.LIBVCRUNTIME ref: 00BF2437
                  Memory Dump Source
                  • Source File: 00000000.00000002.1683369538.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                  • Associated: 00000000.00000002.1683346277.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683396143.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683425370.0000000000C0B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683449259.0000000000C0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683480935.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683511445.0000000000C11000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_be0000_injector V2.jbxd
                  Similarity
                  • API ID: ___std_exception_destroy
                  • String ID:
                  • API String ID: 4194217158-0
                  • Opcode ID: 9fe05634b406416183ca5e2b8013cb4993e468ae684bc498c3f734f2a462277b
                  • Instruction ID: b3e1e07e93ed7abc56a49d48c8bfaf519f92f5a3efea1c6a3dc11e340fbe76d7
                  • Opcode Fuzzy Hash: 9fe05634b406416183ca5e2b8013cb4993e468ae684bc498c3f734f2a462277b
                  • Instruction Fuzzy Hash: ADA26966A555844FEF024AB884B93DF6FE24B6B730F6A2755C6F06F2D3D50B000B9B60
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1683369538.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                  • Associated: 00000000.00000002.1683346277.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683396143.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683425370.0000000000C0B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683449259.0000000000C0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683480935.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683511445.0000000000C11000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_be0000_injector V2.jbxd
                  Similarity
                  • API ID:
                  • String ID: -g}5
                  • API String ID: 0-4071012034
                  • Opcode ID: 992c596186b112b54ea6f0d0a9143963a587a17d7b97bb58cecc4f1f6cc33eac
                  • Instruction ID: 1859ac0d753cdc1b208b20265076d9ef4a2dc022b69258dde68629f1d9e00e4e
                  • Opcode Fuzzy Hash: 992c596186b112b54ea6f0d0a9143963a587a17d7b97bb58cecc4f1f6cc33eac
                  • Instruction Fuzzy Hash: 989297A6A556C45FEF024AB8D4A93DF6FF24B6B331F6E2B5586E01F2D3C507004A9B10
                  APIs
                  • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00C01F2D,?,?,00000008,?,?,00C01AFF,00000000), ref: 00C021FF
                  Memory Dump Source
                  • Source File: 00000000.00000002.1683369538.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                  • Associated: 00000000.00000002.1683346277.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683396143.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683425370.0000000000C0B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683449259.0000000000C0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683480935.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683511445.0000000000C11000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_be0000_injector V2.jbxd
                  Similarity
                  • API ID: ExceptionRaise
                  • String ID:
                  • API String ID: 3997070919-0
                  • Opcode ID: f2d78dc69a2b4f029ca228a28742bd09e17c37460be8955b2d5bff4f52011557
                  • Instruction ID: bcb9fb1b44d8603bf4a1b5d0f7b1ff01e4b4df12def72edf5c721c2162894f8c
                  • Opcode Fuzzy Hash: f2d78dc69a2b4f029ca228a28742bd09e17c37460be8955b2d5bff4f52011557
                  • Instruction Fuzzy Hash: 9AB11C31510609DFDB15CF28C48AB657BE1FF45364F258658E9A9CF2E1C335DA92CB40
                  APIs
                  • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 00BF5216
                  Memory Dump Source
                  • Source File: 00000000.00000002.1683369538.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                  • Associated: 00000000.00000002.1683346277.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683396143.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683425370.0000000000C0B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683449259.0000000000C0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683480935.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683511445.0000000000C11000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_be0000_injector V2.jbxd
                  Similarity
                  • API ID: FeaturePresentProcessor
                  • String ID:
                  • API String ID: 2325560087-0
                  • Opcode ID: bc52dd50e5ff7167f685f946a10cbbb8675f44d93dbab87ba2b6fc13e2324905
                  • Instruction ID: c15a14a7d467adcfe6b461057d00e1e3870c8948e809d5b1110eee6c8b3d54a5
                  • Opcode Fuzzy Hash: bc52dd50e5ff7167f685f946a10cbbb8675f44d93dbab87ba2b6fc13e2324905
                  • Instruction Fuzzy Hash: DC5192B1A01B098FDB28CF58D8857AEB7F0FB48710F25896AD606EB250D3B59D44CF94
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1683369538.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                  • Associated: 00000000.00000002.1683346277.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683396143.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683425370.0000000000C0B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683449259.0000000000C0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683480935.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683511445.0000000000C11000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_be0000_injector V2.jbxd
                  Similarity
                  • API ID:
                  • String ID: k#fz
                  • API String ID: 0-1948189604
                  • Opcode ID: 0b2a69b4d4c40d31a2fd6109f71d6f0e2cd377cec7e4ba67302a6debf084dbad
                  • Instruction ID: 9206574a8d3c9f0d82f7fd461d1b5b173c5a8eedebea2620251203705a52d03f
                  • Opcode Fuzzy Hash: 0b2a69b4d4c40d31a2fd6109f71d6f0e2cd377cec7e4ba67302a6debf084dbad
                  • Instruction Fuzzy Hash: A8D13072E115588FDB50CEBDC94069DB7F2AB88720F2A8369E875FB2D4D7349D418B80
                  APIs
                  • SetUnhandledExceptionFilter.KERNEL32(Function_00015560), ref: 00BF543D
                  Memory Dump Source
                  • Source File: 00000000.00000002.1683369538.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                  • Associated: 00000000.00000002.1683346277.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683396143.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683425370.0000000000C0B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683449259.0000000000C0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683480935.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683511445.0000000000C11000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_be0000_injector V2.jbxd
                  Similarity
                  • API ID: ExceptionFilterUnhandled
                  • String ID:
                  • API String ID: 3192549508-0
                  • Opcode ID: 0d903d951ad8a126cd5139b01211dfbfd5e6c7b16a6ee5514ef0d37530f1da8e
                  • Instruction ID: ccc090a2562c7eda170ec8518016d600885c5368a252f8c7acb9c73b10b56f1a
                  • Opcode Fuzzy Hash: 0d903d951ad8a126cd5139b01211dfbfd5e6c7b16a6ee5514ef0d37530f1da8e
                  • Instruction Fuzzy Hash:
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.1683369538.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                  • Associated: 00000000.00000002.1683346277.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683396143.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683425370.0000000000C0B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683449259.0000000000C0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683480935.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683511445.0000000000C11000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_be0000_injector V2.jbxd
                  Similarity
                  • API ID: HeapProcess
                  • String ID:
                  • API String ID: 54951025-0
                  • Opcode ID: 42f87be6eed9ed629b73032582528b21a63e002ac0f8f0fec8673ec0f75bed67
                  • Instruction ID: 0335af2072e1c6cea1979b0322a4ca96af80e5d5cccd2a1d364743c9339c0789
                  • Opcode Fuzzy Hash: 42f87be6eed9ed629b73032582528b21a63e002ac0f8f0fec8673ec0f75bed67
                  • Instruction Fuzzy Hash: 21A00170A423018BDB408FB6AA8930E3AA9AA4569270681A9A445C5262EA349455DB01
                  Memory Dump Source
                  • Source File: 00000000.00000002.1683369538.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                  • Associated: 00000000.00000002.1683346277.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683396143.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683425370.0000000000C0B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683449259.0000000000C0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683480935.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683511445.0000000000C11000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_be0000_injector V2.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2f1f80e5cbc67bcc5f598989ee5053d9e528593811c439a1cce431965df739b0
                  • Instruction ID: c18c29d1a810df270acd7b24cd54401a4f1257886ddec037d8e8c12c9d36c414
                  • Opcode Fuzzy Hash: 2f1f80e5cbc67bcc5f598989ee5053d9e528593811c439a1cce431965df739b0
                  • Instruction Fuzzy Hash: 4F32D276E446844FEB018ABCC4A43DF6FF24B6B334F2A2759C5A46F3D6DA17440A8B50
                  Memory Dump Source
                  • Source File: 00000000.00000002.1683369538.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                  • Associated: 00000000.00000002.1683346277.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683396143.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683425370.0000000000C0B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683449259.0000000000C0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683480935.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683511445.0000000000C11000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_be0000_injector V2.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: fd85424fcc23ec56f238e203d44f7d0493502fedd55892d3576965c176ec3425
                  • Instruction ID: d2e528fa1059e7aec0b641938136f19e87c651261571a84fe903a9bdf669aff5
                  • Opcode Fuzzy Hash: fd85424fcc23ec56f238e203d44f7d0493502fedd55892d3576965c176ec3425
                  • Instruction Fuzzy Hash: 8D02B177A916504FEF01497CC8B83DB1BE787A7735E2A2766CAB05B2E2C55B000E9B50
                  Memory Dump Source
                  • Source File: 00000000.00000002.1683369538.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                  • Associated: 00000000.00000002.1683346277.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683396143.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683425370.0000000000C0B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683449259.0000000000C0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683480935.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683511445.0000000000C11000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_be0000_injector V2.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2e064e8ccb9f31a03a5cb251512e8b698ad6a8cf69a23b3f5316cb991e6a22c3
                  • Instruction ID: 829914197b46133d80a0d409b31dbb01e2c6f7e664239eecd0db6a94ae86b18e
                  • Opcode Fuzzy Hash: 2e064e8ccb9f31a03a5cb251512e8b698ad6a8cf69a23b3f5316cb991e6a22c3
                  • Instruction Fuzzy Hash: 43E10972A505914FDF00897CC4A83EF2FE2876B334F2A2766D9B46F7D2D61B18099B50
                  Memory Dump Source
                  • Source File: 00000000.00000002.1683369538.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                  • Associated: 00000000.00000002.1683346277.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683396143.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683425370.0000000000C0B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683449259.0000000000C0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683480935.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683511445.0000000000C11000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_be0000_injector V2.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: b433ea43dba5ef098b9610e8c1b21ad53c0e9763eee949adc3e02e1a0cfd9356
                  • Instruction ID: 95f1e2662cfe5ef89cb92f0155985dda15d18ca2e6c0580141867d8255487e44
                  • Opcode Fuzzy Hash: b433ea43dba5ef098b9610e8c1b21ad53c0e9763eee949adc3e02e1a0cfd9356
                  • Instruction Fuzzy Hash: B9D06C3A645A59AFC210CF89E840E41F7A8FB89670B164066EA0893B20C331FC11CAE0
                  APIs
                  • type_info::operator==.LIBVCRUNTIME ref: 00BF91F2
                  • ___TypeMatch.LIBVCRUNTIME ref: 00BF9300
                  • CatchIt.LIBVCRUNTIME ref: 00BF9351
                  • _UnwindNestedFrames.LIBCMT ref: 00BF9452
                  • CallUnexpected.LIBVCRUNTIME ref: 00BF946D
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1683369538.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                  • Associated: 00000000.00000002.1683346277.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683396143.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683425370.0000000000C0B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683449259.0000000000C0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683480935.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683511445.0000000000C11000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_be0000_injector V2.jbxd
                  Similarity
                  • API ID: CallCatchFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                  • String ID: csm$csm$csm
                  • API String ID: 4119006552-393685449
                  • Opcode ID: a85b8301ec30d7f3f822fc8506420b9c817e0394937de28336c890d7d9dad64b
                  • Instruction ID: 04117debde8519069a5227cd13b65fd4c2c80f98dd166eb16bdd7d6052d05918
                  • Opcode Fuzzy Hash: a85b8301ec30d7f3f822fc8506420b9c817e0394937de28336c890d7d9dad64b
                  • Instruction Fuzzy Hash: 10B1397180020DEFCF25DFA4C881ABEB7F5FF14310B1441AAEA156B256D731DA5ACB91
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.1683369538.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                  • Associated: 00000000.00000002.1683346277.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683396143.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683425370.0000000000C0B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683449259.0000000000C0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683480935.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683511445.0000000000C11000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_be0000_injector V2.jbxd
                  Similarity
                  • API ID: __freea$__alloca_probe_16$Info
                  • String ID:
                  • API String ID: 127012223-0
                  • Opcode ID: df2a1343e55422f3ab81f8736f2124fbd294aeb14cbbd7392ee6dd8aac61b462
                  • Instruction ID: 144af6810fc16bcbcaebad062a710007ea130d5a5a7266b93fdb72381e8fb8c3
                  • Opcode Fuzzy Hash: df2a1343e55422f3ab81f8736f2124fbd294aeb14cbbd7392ee6dd8aac61b462
                  • Instruction Fuzzy Hash: E971B372A002499BDF219B94CC41FBF7BE99F49310F3A0059EA24A72D1E775DE04CB59
                  APIs
                  • _ValidateLocalCookies.LIBCMT ref: 00BF6167
                  • ___except_validate_context_record.LIBVCRUNTIME ref: 00BF616F
                  • _ValidateLocalCookies.LIBCMT ref: 00BF61F8
                  • __IsNonwritableInCurrentImage.LIBCMT ref: 00BF6223
                  • _ValidateLocalCookies.LIBCMT ref: 00BF6278
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1683369538.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                  • Associated: 00000000.00000002.1683346277.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683396143.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683425370.0000000000C0B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683449259.0000000000C0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683480935.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683511445.0000000000C11000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_be0000_injector V2.jbxd
                  Similarity
                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                  • String ID: csm
                  • API String ID: 1170836740-1018135373
                  • Opcode ID: c3384e12945ca581c39902584b1eaf1472fde197c3f74f3c0d6b23f5d808e1c3
                  • Instruction ID: 1eccd9d8aeabbf0634eaa684064ce48c69eb92715dd3219b36352811f5fb8041
                  • Opcode Fuzzy Hash: c3384e12945ca581c39902584b1eaf1472fde197c3f74f3c0d6b23f5d808e1c3
                  • Instruction Fuzzy Hash: 3A419534A0021DABCF10DF68C884BAEBBE5EF45314F1481E5EE156B392D731AE19CB91
                  APIs
                  • GetLastError.KERNEL32(?,?,00BF8831,00BF5F0D,00BF55A4), ref: 00BF8848
                  • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00BF8856
                  • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00BF886F
                  • SetLastError.KERNEL32(00000000,00BF8831,00BF5F0D,00BF55A4), ref: 00BF88C1
                  Memory Dump Source
                  • Source File: 00000000.00000002.1683369538.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                  • Associated: 00000000.00000002.1683346277.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683396143.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683425370.0000000000C0B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683449259.0000000000C0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683480935.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683511445.0000000000C11000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_be0000_injector V2.jbxd
                  Similarity
                  • API ID: ErrorLastValue___vcrt_
                  • String ID:
                  • API String ID: 3852720340-0
                  • Opcode ID: e992e2dce66c5861683bbe4930510dbd1608e3818488cc1b08354c74a70cf712
                  • Instruction ID: 2a931cccd6dd1ac0e9e4b4a1c6490fbe1bfbe355e8d1dd584ee84283b2524d6b
                  • Opcode Fuzzy Hash: e992e2dce66c5861683bbe4930510dbd1608e3818488cc1b08354c74a70cf712
                  • Instruction Fuzzy Hash: 3A01B5321192195DEA241BB47C86B3E27D5EB127F476103A9F320470F1EF524C09A244
                  Strings
                  • C:\Users\user\Desktop\injector V2.4.exe, xrefs: 00BFCB70
                  Memory Dump Source
                  • Source File: 00000000.00000002.1683369538.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                  • Associated: 00000000.00000002.1683346277.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683396143.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683425370.0000000000C0B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683449259.0000000000C0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683480935.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683511445.0000000000C11000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_be0000_injector V2.jbxd
                  Similarity
                  • API ID:
                  • String ID: C:\Users\user\Desktop\injector V2.4.exe
                  • API String ID: 0-3565623196
                  • Opcode ID: 955882cf93f7f3e8ad3b0b092ac45e878e63eb8a9d217aa13de9b7e0ce185d33
                  • Instruction ID: c8dd7db305483ed6bbdcbf04e1915b3659bc80e7d541be1c11e5ee5691e35877
                  • Opcode Fuzzy Hash: 955882cf93f7f3e8ad3b0b092ac45e878e63eb8a9d217aa13de9b7e0ce185d33
                  • Instruction Fuzzy Hash: E721F37520020DAFDB20AF65DE82E3A7BE8EF403A47104595FA29D7152DB30ECC8D790
                  APIs
                  • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,E0819244,?,?,00000000,00C025EB,000000FF,?,00BF7015,00000002,?,00BF70B1,00BF83A0), ref: 00BF6F89
                  • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00BF6F9B
                  • FreeLibrary.KERNEL32(00000000,?,?,00000000,00C025EB,000000FF,?,00BF7015,00000002,?,00BF70B1,00BF83A0), ref: 00BF6FBD
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1683369538.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                  • Associated: 00000000.00000002.1683346277.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683396143.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683425370.0000000000C0B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683449259.0000000000C0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683480935.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683511445.0000000000C11000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_be0000_injector V2.jbxd
                  Similarity
                  • API ID: AddressFreeHandleLibraryModuleProc
                  • String ID: CorExitProcess$mscoree.dll
                  • API String ID: 4061214504-1276376045
                  • Opcode ID: 6a3b9cde30973e58df25852b68efc72735822e80280660b91068c36b71907a6a
                  • Instruction ID: e515fec78754dfbfea5829818a83c376bf4c00ebc707a7ba403d3c5b705c426a
                  • Opcode Fuzzy Hash: 6a3b9cde30973e58df25852b68efc72735822e80280660b91068c36b71907a6a
                  • Instruction Fuzzy Hash: 1501623194462AABDB118F90DC09FAEB7B8FB04B15F050525F811A26D0DB759904CA90
                  APIs
                  • __alloca_probe_16.LIBCMT ref: 00BFDFA2
                  • __alloca_probe_16.LIBCMT ref: 00BFE06B
                  • __freea.LIBCMT ref: 00BFE0D2
                    • Part of subcall function 00BFBC45: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,00BF41E0,?,?,00BF1007,?,00BEFAB5), ref: 00BFBC77
                  • __freea.LIBCMT ref: 00BFE0E5
                  • __freea.LIBCMT ref: 00BFE0F2
                  Memory Dump Source
                  • Source File: 00000000.00000002.1683369538.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                  • Associated: 00000000.00000002.1683346277.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683396143.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683425370.0000000000C0B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683449259.0000000000C0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683480935.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683511445.0000000000C11000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_be0000_injector V2.jbxd
                  Similarity
                  • API ID: __freea$__alloca_probe_16$AllocateHeap
                  • String ID:
                  • API String ID: 1423051803-0
                  • Opcode ID: fc6e2dc4b61f699bc53977c92f33cb867ae3f96ff4170eaca8eb6a66eb140f01
                  • Instruction ID: b114c4d10f57c2b549fcc239925604a170edb09b154b50d8fc8045590f6a6c4e
                  • Opcode Fuzzy Hash: fc6e2dc4b61f699bc53977c92f33cb867ae3f96ff4170eaca8eb6a66eb140f01
                  • Instruction Fuzzy Hash: 1351907260024EABEB215E70CC82EBB76EAEF44710B1545B9FB25D7161EFB1CC58C660
                  APIs
                  • EncodePointer.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,?,00BF93FE,?,?,00000000,00000000,00000000,?), ref: 00BF951D
                  • CatchIt.LIBVCRUNTIME ref: 00BF9603
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1683369538.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                  • Associated: 00000000.00000002.1683346277.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683396143.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683425370.0000000000C0B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683449259.0000000000C0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683480935.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683511445.0000000000C11000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_be0000_injector V2.jbxd
                  Similarity
                  • API ID: CatchEncodePointer
                  • String ID: MOC$RCC
                  • API String ID: 1435073870-2084237596
                  • Opcode ID: 80d8a59b711a7d1e7ba9d213401a8ed8ee4ea404803b36b5a3ecbf54aaa7a26f
                  • Instruction ID: 9233295e5f34a4b44bdfdf3f2e13326d48553394d5f89e71a1092b7d36d0d8f1
                  • Opcode Fuzzy Hash: 80d8a59b711a7d1e7ba9d213401a8ed8ee4ea404803b36b5a3ecbf54aaa7a26f
                  • Instruction Fuzzy Hash: 6A41467190020DAFDF16DF98CD81AAEBBF5FF48300F188099FA05AB221D7359954DB50
                  APIs
                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00BFDCFA,00000000,?,00C0CCD0,?,?,?,00BFDC31,00000004,InitializeCriticalSectionEx,00C046F8,00C04700), ref: 00BFDC6B
                  • GetLastError.KERNEL32(?,00BFDCFA,00000000,?,00C0CCD0,?,?,?,00BFDC31,00000004,InitializeCriticalSectionEx,00C046F8,00C04700,00000000,?,00BF971C), ref: 00BFDC75
                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 00BFDC9D
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1683369538.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                  • Associated: 00000000.00000002.1683346277.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683396143.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683425370.0000000000C0B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683449259.0000000000C0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683480935.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683511445.0000000000C11000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_be0000_injector V2.jbxd
                  Similarity
                  • API ID: LibraryLoad$ErrorLast
                  • String ID: api-ms-
                  • API String ID: 3177248105-2084034818
                  • Opcode ID: d7cd564992babcfcfdd1d69d6d40d1239493b4136ff09be19c2ecd4859f5fd4c
                  • Instruction ID: 163ffecce80257001ea825d951d2f1a501dec059acd330de694f3c54f5a18959
                  • Opcode Fuzzy Hash: d7cd564992babcfcfdd1d69d6d40d1239493b4136ff09be19c2ecd4859f5fd4c
                  • Instruction Fuzzy Hash: 94E04830240209BBEF112F91DC06B6D7F95EB01B54F104070FA0DE90E1EBB29815C544
                  APIs
                  • GetConsoleOutputCP.KERNEL32(E0819244,00000000,00000000,?), ref: 00BFE64B
                    • Part of subcall function 00BFD131: WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,00000000,000000FF,?,?,00000000,?,?,00BF87B1,?,00000000,?), ref: 00BFD192
                  • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00BFE89D
                  • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 00BFE8E3
                  • GetLastError.KERNEL32 ref: 00BFE986
                  Memory Dump Source
                  • Source File: 00000000.00000002.1683369538.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                  • Associated: 00000000.00000002.1683346277.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683396143.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683425370.0000000000C0B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683449259.0000000000C0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683480935.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683511445.0000000000C11000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_be0000_injector V2.jbxd
                  Similarity
                  • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                  • String ID:
                  • API String ID: 2112829910-0
                  • Opcode ID: ba4038ca34f09bbedd8d5dfe2f4256af71d4c7303181a43e3ea28ff41bcc30f2
                  • Instruction ID: c040e13a5ea7cc5aadb04dc121bdd8ee1741d9b5b001453a82ad0eb5e71213a6
                  • Opcode Fuzzy Hash: ba4038ca34f09bbedd8d5dfe2f4256af71d4c7303181a43e3ea28ff41bcc30f2
                  • Instruction Fuzzy Hash: 40D15A75D0025C9FCF15CFA8C880ABDBBF5EF09314F1885AAE665EB261D630E945CB60
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.1683369538.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                  • Associated: 00000000.00000002.1683346277.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683396143.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683425370.0000000000C0B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683449259.0000000000C0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683480935.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683511445.0000000000C11000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_be0000_injector V2.jbxd
                  Similarity
                  • API ID: AdjustPointer
                  • String ID:
                  • API String ID: 1740715915-0
                  • Opcode ID: f016420ed7f52fa853066586e7f354e691199a1dab64de3e6cdfa1ebe7c48fa3
                  • Instruction ID: e343cfc444d9f41a74c62a7c2d6664d9bbc7cbf44f7c5264f811b3fbd210ad3b
                  • Opcode Fuzzy Hash: f016420ed7f52fa853066586e7f354e691199a1dab64de3e6cdfa1ebe7c48fa3
                  • Instruction Fuzzy Hash: F851E17260560EAFEB298F64D841BBA77E5FF40300F1445ADEB459B2A1EB31EC58C790
                  APIs
                    • Part of subcall function 00BFD131: WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,00000000,000000FF,?,?,00000000,?,?,00BF87B1,?,00000000,?), ref: 00BFD192
                  • GetLastError.KERNEL32 ref: 00BFC61C
                  • __dosmaperr.LIBCMT ref: 00BFC623
                  • GetLastError.KERNEL32(?,?,?,?), ref: 00BFC65D
                  • __dosmaperr.LIBCMT ref: 00BFC664
                  Memory Dump Source
                  • Source File: 00000000.00000002.1683369538.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                  • Associated: 00000000.00000002.1683346277.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683396143.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683425370.0000000000C0B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683449259.0000000000C0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683480935.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683511445.0000000000C11000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_be0000_injector V2.jbxd
                  Similarity
                  • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                  • String ID:
                  • API String ID: 1913693674-0
                  • Opcode ID: 4d22ccc8c7a3e447bea71357ffbadbd3f7bdd913f093b0b829633deb87c9b971
                  • Instruction ID: 6ca332834d6449d38d398a87a7aa65955b4245359e5580309a9545fab2d7eaa4
                  • Opcode Fuzzy Hash: 4d22ccc8c7a3e447bea71357ffbadbd3f7bdd913f093b0b829633deb87c9b971
                  • Instruction Fuzzy Hash: A921A17160420EBF9B10AF65CA81D7ABBE9EF553647208598FA25D7511DB30EC88CB90
                  APIs
                  • GetEnvironmentStringsW.KERNEL32 ref: 00BFD235
                    • Part of subcall function 00BFD131: WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,00000000,000000FF,?,?,00000000,?,?,00BF87B1,?,00000000,?), ref: 00BFD192
                  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00BFD26D
                  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00BFD28D
                  Memory Dump Source
                  • Source File: 00000000.00000002.1683369538.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                  • Associated: 00000000.00000002.1683346277.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683396143.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683425370.0000000000C0B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683449259.0000000000C0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683480935.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683511445.0000000000C11000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_be0000_injector V2.jbxd
                  Similarity
                  • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                  • String ID:
                  • API String ID: 158306478-0
                  • Opcode ID: 8bc9c5b073f372933bde5fad6fda2d60ee30eb9cf7a4bac6c1d826e811b1c573
                  • Instruction ID: 5168879ea0987e53118d710b18d15d369b3db7f23726b5bb1520c35a8282f799
                  • Opcode Fuzzy Hash: 8bc9c5b073f372933bde5fad6fda2d60ee30eb9cf7a4bac6c1d826e811b1c573
                  • Instruction Fuzzy Hash: E611A1B650151D7EA72127B1DC89EBF69EEDE853A47500095FB0193102FF70CE0A85B1
                  APIs
                  • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,00000000,?,00BFFF31,00000000,00000001,00000000,?,?,00BFE9DA,?,00000000,00000000), ref: 00C007D7
                  • GetLastError.KERNEL32(?,00BFFF31,00000000,00000001,00000000,?,?,00BFE9DA,?,00000000,00000000,?,?,?,00BFE320,00000000), ref: 00C007E3
                    • Part of subcall function 00C00840: CloseHandle.KERNEL32(FFFFFFFE,00C007F3,?,00BFFF31,00000000,00000001,00000000,?,?,00BFE9DA,?,00000000,00000000,?,?), ref: 00C00850
                  • ___initconout.LIBCMT ref: 00C007F3
                    • Part of subcall function 00C00815: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00C007B1,00BFFF1E,?,?,00BFE9DA,?,00000000,00000000,?), ref: 00C00828
                  • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,?,00BFFF31,00000000,00000001,00000000,?,?,00BFE9DA,?,00000000,00000000,?), ref: 00C00808
                  Memory Dump Source
                  • Source File: 00000000.00000002.1683369538.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                  • Associated: 00000000.00000002.1683346277.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683396143.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683425370.0000000000C0B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683449259.0000000000C0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683480935.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683511445.0000000000C11000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_be0000_injector V2.jbxd
                  Similarity
                  • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                  • String ID:
                  • API String ID: 2744216297-0
                  • Opcode ID: ceccd652282d32dcf265b3515b0f2f34a0895bc1a58ba485c0419ad92deac955
                  • Instruction ID: b31d9c7b2fe400462d77590c9afb78888f7205bc9d7bac1951edb179a5f6b1f1
                  • Opcode Fuzzy Hash: ceccd652282d32dcf265b3515b0f2f34a0895bc1a58ba485c0419ad92deac955
                  • Instruction Fuzzy Hash: 73F0F836000118BBCF221FD1DC08BCE3F2AFF087A1F12C521FA18851A2C6728920EB90
                  APIs
                  • ___except_validate_context_record.LIBVCRUNTIME ref: 00BF8D75
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1683369538.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                  • Associated: 00000000.00000002.1683346277.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683396143.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683425370.0000000000C0B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683449259.0000000000C0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683480935.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683511445.0000000000C11000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_be0000_injector V2.jbxd
                  Similarity
                  • API ID: ___except_validate_context_record
                  • String ID: csm$csm
                  • API String ID: 3493665558-3733052814
                  • Opcode ID: 1ead65938a8827f4dd5abd66fbe1bd295556aa328bf74aa7f2332466cebe2109
                  • Instruction ID: d254e3d8e2ea2efce9dd2f5fdd4258fe3f9863068b5f3cfe3e5fc67560883818
                  • Opcode Fuzzy Hash: 1ead65938a8827f4dd5abd66fbe1bd295556aa328bf74aa7f2332466cebe2109
                  • Instruction Fuzzy Hash: C231D57A51025DEFCF265F50CC449BA7BA6FF08314B1845DAFA484B121CB32DD65DB81
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1683369538.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                  • Associated: 00000000.00000002.1683346277.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683396143.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683425370.0000000000C0B000.00000040.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683449259.0000000000C0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683480935.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1683511445.0000000000C11000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_be0000_injector V2.jbxd
                  Similarity
                  • API ID: CommandLine
                  • String ID: p%q
                  • API String ID: 3253501508-1681989647
                  • Opcode ID: 9cd9e79f127900618826dd7af674f0e2b482a01dc8efb0afb035fd54863a7a89
                  • Instruction ID: 3606fdc040f0144adba0d208565fbb40a36677dba4116a07c9450afc66727ff6
                  • Opcode Fuzzy Hash: 9cd9e79f127900618826dd7af674f0e2b482a01dc8efb0afb035fd54863a7a89
                  • Instruction Fuzzy Hash: EDB092B88162009FCB408FB0BE8C34C3BB0F268B023828167D801C3322D7340046EF20

                  Execution Graph

                  Execution Coverage:1%
                  Dynamic/Decrypted Code Coverage:0%
                  Signature Coverage:38.6%
                  Total number of Nodes:57
                  Total number of Limit Nodes:2
                  execution_graph 19848 408860 19849 40886f 19848->19849 19850 4089f6 ExitProcess 19849->19850 19851 408877 SHGetSpecialFolderPathW 19849->19851 19852 40888d 19851->19852 19853 4089f1 19852->19853 19854 408895 GetCurrentThreadId GetCurrentProcessId 19852->19854 19868 43f020 19853->19868 19855 4088c1 GetForegroundWindow 19854->19855 19856 4088bd 19854->19856 19858 408952 19855->19858 19856->19855 19864 409c00 19858->19864 19860 4089e0 19860->19853 19861 40c920 CoInitializeEx 19860->19861 19862 4089ec 19861->19862 19863 40b790 FreeLibrary FreeLibrary 19862->19863 19863->19853 19865 409c30 19864->19865 19865->19865 19866 409cc5 LoadLibraryExW 19865->19866 19867 409cda 19866->19867 19871 440670 19868->19871 19870 43f025 FreeLibrary 19870->19850 19872 440679 19871->19872 19872->19870 19873 43c840 19874 43c857 19873->19874 19875 43c85d RtlFreeHeap 19873->19875 19876 43c869 19873->19876 19874->19875 19875->19876 19876->19876 19877 439ed0 19879 439f40 CoCreateInstance 19877->19879 19880 439ff6 SysAllocString 19879->19880 19881 43a5ad 19879->19881 19884 43a0a7 19880->19884 19883 43a5bd GetVolumeInformationW 19881->19883 19891 43a5d4 19883->19891 19885 43a0b6 CoSetProxyBlanket 19884->19885 19886 43a599 SysFreeString 19884->19886 19887 43a0d6 SysAllocString 19885->19887 19888 43a58f 19885->19888 19886->19881 19890 43a1b0 19887->19890 19888->19886 19890->19890 19892 43a1f4 SysAllocString 19890->19892 19894 43a21e 19892->19894 19893 43a576 SysFreeString SysFreeString 19893->19888 19894->19893 19895 43a56c 19894->19895 19896 43a262 VariantInit 19894->19896 19895->19893 19898 43a2c0 19896->19898 19897 43a55b VariantClear 19897->19895 19898->19897 19899 40c953 CoInitializeSecurity 19900 441930 19901 441960 19900->19901 19904 4419ae 19901->19904 19906 43f0e0 LdrInitializeThunk 19901->19906 19902 441a4e 19904->19902 19907 43f0e0 LdrInitializeThunk 19904->19907 19906->19904 19907->19902 19908 40cdf4 CoUninitialize 19909 441510 19911 441530 19909->19911 19910 44166e 19911->19910 19913 43f0e0 LdrInitializeThunk 19911->19913 19913->19910

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 0 439ed0-439f31 1 439f40-439f75 0->1 1->1 2 439f77-439f95 1->2 4 439fa2-439ff0 CoCreateInstance 2->4 5 439f97 2->5 6 439ff6-43a02b 4->6 7 43a5ad-43a5d2 call 440b70 GetVolumeInformationW 4->7 5->4 8 43a030-43a075 6->8 12 43a5d4-43a5d8 7->12 13 43a5dc-43a5de 7->13 8->8 10 43a077-43a0b0 SysAllocString 8->10 18 43a0b6-43a0d0 CoSetProxyBlanket 10->18 19 43a599-43a5a9 SysFreeString 10->19 12->13 14 43a5f7-43a5fe 13->14 16 43a600-43a607 14->16 17 43a60a-43a64f call 4209e0 14->17 16->17 25 43a650-43a657 17->25 21 43a0d6-43a0f7 18->21 22 43a58f-43a595 18->22 19->7 24 43a100-43a11f 21->24 22->19 24->24 26 43a121-43a1aa SysAllocString 24->26 25->25 27 43a659-43a66a 25->27 28 43a1b0-43a1f2 26->28 29 43a5e0-43a5f1 27->29 30 43a670-43a683 call 4081e0 27->30 28->28 31 43a1f4-43a220 SysAllocString 28->31 29->14 32 43a688-43a68f 29->32 30->29 36 43a576-43a588 SysFreeString * 2 31->36 37 43a226-43a248 31->37 36->22 39 43a24e-43a251 37->39 40 43a56c-43a572 37->40 39->40 41 43a257-43a25c 39->41 40->36 41->40 42 43a262-43a2b7 VariantInit 41->42 43 43a2c0-43a2e1 42->43 43->43 44 43a2e3-43a2f8 43->44 45 43a2fc-43a2fe 44->45 46 43a304-43a30d 45->46 47 43a55b-43a568 VariantClear 45->47 46->47 48 43a313-43a324 46->48 47->40 49 43a326-43a32d 48->49 50 43a35d 48->50 52 43a33c-43a340 49->52 51 43a35f-43a38e call 408160 50->51 61 43a500-43a515 51->61 62 43a394-43a3a6 51->62 53 43a342-43a34b 52->53 54 43a330 52->54 56 43a352-43a356 53->56 57 43a34d-43a350 53->57 59 43a331-43a33a 54->59 56->59 60 43a358-43a35b 56->60 57->59 59->51 59->52 60->59 64 43a517 61->64 65 43a51c-43a52f 61->65 62->61 63 43a3ac-43a3b4 62->63 66 43a3c0-43a3ca 63->66 64->65 67 43a531 65->67 68 43a536-43a558 call 408190 call 408170 65->68 70 43a3e0-43a3e6 66->70 71 43a3cc-43a3d5 66->71 67->68 68->47 74 43a3e8-43a3eb 70->74 75 43a40c-43a41a 70->75 73 43a4a0-43a4a6 71->73 79 43a4aa-43a4b0 73->79 74->75 80 43a3ed-43a407 74->80 76 43a420-43a423 75->76 77 43a4bc-43a4c4 75->77 76->77 81 43a429-43a49b 76->81 84 43a4c6-43a4c8 77->84 85 43a4ca-43a4cd 77->85 79->61 83 43a4b2-43a4b4 79->83 80->73 81->73 83->66 86 43a4ba 83->86 84->79 87 43a4f8-43a4fe 85->87 88 43a4cf-43a4f6 85->88 86->61 87->73 88->73
                  APIs
                  • CoCreateInstance.OLE32(00444678,00000000,00000001,00444668,00000000), ref: 00439FE8
                  • SysAllocString.OLEAUT32(19CB1BC2), ref: 0043A07C
                  • CoSetProxyBlanket.COMBASE(D961C41D,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 0043A0C8
                  • SysAllocString.OLEAUT32(19CB1BC2), ref: 0043A122
                  • SysAllocString.OLEAUT32(8FCB89DF), ref: 0043A1F9
                  • VariantInit.OLEAUT32(?), ref: 0043A26A
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                  Yara matches
                  Similarity
                  • API ID: AllocString$BlanketCreateInitInstanceProxyVariant
                  • String ID: 7=$@/$C$\
                  • API String ID: 65563702-2924885527
                  • Opcode ID: 0f263714392d0a4ae23e5820840c924c359c707d5a4b91c4ae3903ed3b795c5b
                  • Instruction ID: d5a0c29c259e1a32e8276e6dd97f2287c07a1dd9d78eebb3971066b2803e93b0
                  • Opcode Fuzzy Hash: 0f263714392d0a4ae23e5820840c924c359c707d5a4b91c4ae3903ed3b795c5b
                  • Instruction Fuzzy Hash: 2622FD71A483009FD714CF24C885BABBBE5EB99314F04892EF9C59B391D778D909CB86

                  Control-flow Graph

                  APIs
                  • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000010,00000000), ref: 00408882
                  • GetCurrentThreadId.KERNEL32 ref: 00408895
                  • GetCurrentProcessId.KERNEL32 ref: 0040889D
                  • GetForegroundWindow.USER32 ref: 00408948
                  • ExitProcess.KERNEL32 ref: 004089F8
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                  Yara matches
                  Similarity
                  • API ID: CurrentProcess$ExitFolderForegroundPathSpecialThreadWindow
                  • String ID:
                  • API String ID: 4063528623-0
                  • Opcode ID: b5b3c11cee66c2cbbfd1a6a4c25ca12d49b11a9452b3f90016759ea1aee5e3ad
                  • Instruction ID: 38609802ec9638e7abf543e0d996812e9b4fe1fbad5a70597291d8855ba897df
                  • Opcode Fuzzy Hash: b5b3c11cee66c2cbbfd1a6a4c25ca12d49b11a9452b3f90016759ea1aee5e3ad
                  • Instruction Fuzzy Hash: DA312973A5420057C31CBEB68D8A36AB5979BC5740F0E813EADC59B3E2DE794C054299

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 154 43f0e0-43f112 LdrInitializeThunk
                  APIs
                  • LdrInitializeThunk.NTDLL(0043CABE,?,00000010,00000005,00000000,?,00000000), ref: 0043F10E
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                  Yara matches
                  Similarity
                  • API ID: InitializeThunk
                  • String ID:
                  • API String ID: 2994545307-0
                  • Opcode ID: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                  • Instruction ID: 0c3231226d6b2b3a527619dcc08e6164a4fafcc19f94aab6dc14dc2c5ea58878
                  • Opcode Fuzzy Hash: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                  • Instruction Fuzzy Hash: A2E0FE75908316AF9A08CF45C14444EFBE5BFC4714F11CC8DA4D863210D3B0AD46DF82

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 111 409c00-409c26 112 409c30-409c47 111->112 112->112 113 409c49-409c8e 112->113 114 409c90-409cc3 113->114 114->114 115 409cc5-409cd5 LoadLibraryExW call 43dda0 114->115 117 409cda-409cf1 115->117
                  APIs
                  • LoadLibraryExW.KERNEL32(4FD949C3,00000000,9F9E9198), ref: 00409CCD
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                  Yara matches
                  Similarity
                  • API ID: LibraryLoad
                  • String ID: |}
                  • API String ID: 1029625771-3974572420
                  • Opcode ID: 9c2c4e44cc5755c0c79f1d51622012563fdd5faa978f2785b8fed6db492b3294
                  • Instruction ID: ee563ac326da79e97449b4ad50cf1224805225ad9247b781cccfded4f2284b05
                  • Opcode Fuzzy Hash: 9c2c4e44cc5755c0c79f1d51622012563fdd5faa978f2785b8fed6db492b3294
                  • Instruction Fuzzy Hash: 78213871A583805FE314CF25DC8269B7BE5EFD6308F15992DE4C04B252D238880A8B9A

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 142 43c840-43c850 143 43c857 142->143 144 43c869-43c86e 142->144 145 43c8c8-43c8db 142->145 146 43c86f-43c887 142->146 147 43c85d-43c863 RtlFreeHeap 142->147 143->147 148 43c8e0-43c910 145->148 149 43c890-43c8c0 146->149 147->144 148->148 150 43c912-43c915 148->150 149->149 151 43c8c2-43c8c5 149->151 151->145
                  APIs
                  • RtlFreeHeap.NTDLL(?,00000000,?), ref: 0043C863
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                  Yara matches
                  Similarity
                  • API ID: FreeHeap
                  • String ID:
                  • API String ID: 3298025750-0
                  • Opcode ID: 1bbc621af1640a7833919c02c3ba92b086ce1b663d35ab757895467e9302c407
                  • Instruction ID: 5e40faf57c8486db04755465fb3ba729797a28adf6e6dec8712b78a7a4e83a77
                  • Opcode Fuzzy Hash: 1bbc621af1640a7833919c02c3ba92b086ce1b663d35ab757895467e9302c407
                  • Instruction Fuzzy Hash: 1011E932A1D2508BD304FB38ECA472BBEE39FD9745F19887CD4C55769ACA344816C792

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 153 40c953-40c982 CoInitializeSecurity
                  APIs
                  • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 0040C965
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                  Yara matches
                  Similarity
                  • API ID: InitializeSecurity
                  • String ID:
                  • API String ID: 640775948-0
                  • Opcode ID: 02f052d0914b17852d785bc8f3d0d0ca03705a452a64f08df0e1a9a55459a844
                  • Instruction ID: 17037039fe0080687f2b20cf83abebd8ac9a797141f3a2f09e18c41f8f8d9f2d
                  • Opcode Fuzzy Hash: 02f052d0914b17852d785bc8f3d0d0ca03705a452a64f08df0e1a9a55459a844
                  • Instruction Fuzzy Hash: 54D092343C9281B6E2658B08BC17F5432559302B25F340224B362EE2E1CAE06502861C

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 152 40c920-40c950 CoInitializeEx
                  APIs
                  • CoInitializeEx.COMBASE(00000000,00000002), ref: 0040C933
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                  Yara matches
                  Similarity
                  • API ID: Initialize
                  • String ID:
                  • API String ID: 2538663250-0
                  • Opcode ID: 07188750f600f2565309d338c35a24a25c5b9c0ffcac3cf3e39c8770b02afbd5
                  • Instruction ID: 867e132dc9613676cf91520546d2662a93ec63a975d7f075b3e6a40ec28964c2
                  • Opcode Fuzzy Hash: 07188750f600f2565309d338c35a24a25c5b9c0ffcac3cf3e39c8770b02afbd5
                  • Instruction Fuzzy Hash: 43D0A7346942446BD204676DEC07F26366CC383765F41023AF7B2CA1D5D9506814C57A

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 202 40cdf4-40ce03 CoUninitialize
                  APIs
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                  Yara matches
                  Similarity
                  • API ID: Uninitialize
                  • String ID:
                  • API String ID: 3861434553-0
                  • Opcode ID: ac87bd0cffbe08ec30df263ee4622e98cb063a29247af99bc430dd62dc213e0f
                  • Instruction ID: 62eb9ca69c4cce3cc35e40113c052ef81563ad4e7398347ae0f25a222e90937b
                  • Opcode Fuzzy Hash: ac87bd0cffbe08ec30df263ee4622e98cb063a29247af99bc430dd62dc213e0f
                  • Instruction Fuzzy Hash: 33B0127BF000048A4B4007A4BC040CDF3A0EAC81367010173E219C1000D63101244680
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: {8}$'Y3[$,-$8K>M$=I'K$J=B?$V)G+$\9y;$\_$c#t%$d7e9$s3b5$tw$tv$~+V-$~?l!$$D$$D$Y_$]S$uw
                  • API String ID: 0-1499059824
                  • Opcode ID: 3e94db4c68999047ead082d98596307fc2607beab64db6c87a0656d6d1d281dd
                  • Instruction ID: fa23e3c4229f11b91a1b4ed3803b3709b6e7be3fa6d3c57fa13885397f710596
                  • Opcode Fuzzy Hash: 3e94db4c68999047ead082d98596307fc2607beab64db6c87a0656d6d1d281dd
                  • Instruction Fuzzy Hash: 75923FB55083818BE374CF25D881B9FBBE1FB92304F10892DE5D99B251DB74844ACF96
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: {8}$'Y3[$3g/e$8K>M$=I'K$J=B?$V)G+$\9y;$\_$c#t%$d7e9$s3b5$tw$~+V-$~?l!$$D$$D$Y_$]S$uw
                  • API String ID: 0-2018035003
                  • Opcode ID: 177426f021ed510beda516584e3005d9aae20286c0f49ddf4c36087abb7391b7
                  • Instruction ID: 21b91e870ef273964388e64adf1401a5cea9b3c375b4d543e388e74a20e8728d
                  • Opcode Fuzzy Hash: 177426f021ed510beda516584e3005d9aae20286c0f49ddf4c36087abb7391b7
                  • Instruction Fuzzy Hash: EF822FB450C3858BE374CF259881B9FBBE1FB92304F10892DE6D99B291DB748446CF96
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: {8}$'Y3[$8K>M$=I'K$J=B?$V)G+$\9y;$\_$c#t%$d7e9$s3b5$tw$~+V-$~?l!$$D$$D$Y_$]S$uw
                  • API String ID: 0-2887820757
                  • Opcode ID: eebd186f59665f0f18c4559dc3da0ea2f22ed8ae9068dcc71fb74658b99a998b
                  • Instruction ID: bf3007f120a47b887b0caa45068d5f98b9e8554b1bac20d59d32eb417c9351a9
                  • Opcode Fuzzy Hash: eebd186f59665f0f18c4559dc3da0ea2f22ed8ae9068dcc71fb74658b99a998b
                  • Instruction Fuzzy Hash: AA722EB450C3858BE374CF25E881B9FBBE1BB92304F10892DD6D99B251DB74844ACF96
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: ]|Br$ayii$mLPN$pXwd$thww$w^ux$}rui
                  • API String ID: 0-2504981935
                  • Opcode ID: 889e716d40096aaecde243c2a454cf5233b91111803de3f675add881d20cf340
                  • Instruction ID: 3c97eae8aefa8e27b87151d4bf380f8b49915dc83106cb58188050deaac04f6e
                  • Opcode Fuzzy Hash: 889e716d40096aaecde243c2a454cf5233b91111803de3f675add881d20cf340
                  • Instruction Fuzzy Hash: 5A620770604B918FC335CF29D490627BBE1AF56314B588A6ED4E78BBA2C739F805CB54
                  APIs
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                  Yara matches
                  Similarity
                  • API ID: Clipboard$CloseDataLongOpenWindow
                  • String ID:
                  • API String ID: 1647500905-0
                  • Opcode ID: 7e4e37f140669f977603b74b23cf749ebb87053aea8d50c1a81d1f40b1301d2c
                  • Instruction ID: 0d4e149cca78cf6f9eee8ceca06891f89d6322af88ace38695ace5059f1588b6
                  • Opcode Fuzzy Hash: 7e4e37f140669f977603b74b23cf749ebb87053aea8d50c1a81d1f40b1301d2c
                  • Instruction Fuzzy Hash: 8641C4B0808B829FC711AF78954A39EBFB0AB57320F04872AE4E5877D1D338A555C797
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                  Yara matches
                  Similarity
                  • API ID: FreeLibrary
                  • String ID: )$/q$+62)$J(Z6
                  • API String ID: 3664257935-4159706543
                  • Opcode ID: 17f4e57675b26713ae51105fcacb17f87b2ba79888cee4bddb9facb3eace5004
                  • Instruction ID: 613bba6bb6791fb587cc5a4212e09141da63c1a358e4bd092013dc2a48d53bfe
                  • Opcode Fuzzy Hash: 17f4e57675b26713ae51105fcacb17f87b2ba79888cee4bddb9facb3eace5004
                  • Instruction Fuzzy Hash: 8CE1E760604B908EE7358F36D4507B3BBE2EF57304F48899ED0EB8B282D7796509CB16
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: /B$7>$M}$W7B$xv
                  • API String ID: 0-4225845962
                  • Opcode ID: e2a42451265eba153bbbc614b1ca212c5aba3cca3bed044330c2e25fd296c86d
                  • Instruction ID: be21647d591b549922de6916a2c2322c58110783150dd4c484af43a3fcc5f636
                  • Opcode Fuzzy Hash: e2a42451265eba153bbbc614b1ca212c5aba3cca3bed044330c2e25fd296c86d
                  • Instruction Fuzzy Hash: 29C102B06083208BD720CF24D85276BBBF1EF92355F488A5DE4D58B3A0E77D8945CB96
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: ez$g$g$u|$u|
                  • API String ID: 0-2442041542
                  • Opcode ID: 9649ca8dcca0c085fdb6c0163b554bb795b5f2d171d3c43e8d74c9b8816096d8
                  • Instruction ID: f42df2e33762c44fbc3116b00022e3969742704b29768d33b50a91e08b63c4c6
                  • Opcode Fuzzy Hash: 9649ca8dcca0c085fdb6c0163b554bb795b5f2d171d3c43e8d74c9b8816096d8
                  • Instruction Fuzzy Hash: DA51EEB0900782ABDB118F65D8115AAFFB0FF12314B08DA9DD4A55F782D338D286CBD5
                  APIs
                  • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 00BF5450
                  • IsDebuggerPresent.KERNEL32 ref: 00BF551C
                  • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00BF553C
                  • UnhandledExceptionFilter.KERNEL32(?), ref: 00BF5546
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723687187.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                  • Associated: 00000002.00000002.1723669046.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000002.00000002.1723713497.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000002.00000002.1723725907.0000000000C0B000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000002.00000002.1723740791.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000002.00000002.1723756324.0000000000C11000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_be0000_injector V2.jbxd
                  Similarity
                  • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                  • String ID:
                  • API String ID: 254469556-0
                  • Opcode ID: 9347fb2c121ea00e86b90ae09f3deb2d69f33991cc50e995c5b12d8073b267bd
                  • Instruction ID: 8c259d9712d3a9b6e0f1c8a8c937cca19278bab2048d5f88286bf27e47099d25
                  • Opcode Fuzzy Hash: 9347fb2c121ea00e86b90ae09f3deb2d69f33991cc50e995c5b12d8073b267bd
                  • Instruction Fuzzy Hash: 933106B5D0521C9BDB20DFA4D9897CDBBF8EF08304F1040EAE509AB251EB709A89CF45
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                  Yara matches
                  Similarity
                  • API ID: FreeLibrary
                  • String ID: UZR_$mmgl
                  • API String ID: 3664257935-2147652447
                  • Opcode ID: 49c8ca7a8128b54bd78bbaf68ec3e5cc65ef4d3ff37dc0da50fddc95bc0892db
                  • Instruction ID: e5fae8dcc2536c3fd0e8b9b2009143f83d911ee360eacffccef646e910612d2f
                  • Opcode Fuzzy Hash: 49c8ca7a8128b54bd78bbaf68ec3e5cc65ef4d3ff37dc0da50fddc95bc0892db
                  • Instruction Fuzzy Hash: 0EB1D171644B418FD7208F29D8417A3FBF2EFA6310F584A3ED4DA87782D678A40AC765
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: !q"s$#iJk$*u&w$0e-g
                  • API String ID: 0-3825726463
                  • Opcode ID: 063aa44fe663828cd3be5995ac30fc1014d72b9d70025b9579371896ea56aff2
                  • Instruction ID: 39b071ea5c26da278d84c28b81b91cc99f89a02010e9bd14c5178b274d85f022
                  • Opcode Fuzzy Hash: 063aa44fe663828cd3be5995ac30fc1014d72b9d70025b9579371896ea56aff2
                  • Instruction Fuzzy Hash: 8C1289B6610B408FD324CF29D882797BBF2FB4A314F19892DD5AA8B790DB75A405CF44
                  APIs
                  • CopyFileW.KERNEL32(00000000,?,00000000), ref: 004297BA
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                  Yara matches
                  Similarity
                  • API ID: CopyFile
                  • String ID: *$01
                  • API String ID: 1304948518-1595361459
                  • Opcode ID: 3839394131c99c92ede5cf8cfe9117bf2bbaa5735410f1e4516348a27d927cdd
                  • Instruction ID: 2687bf40e21af332c1244c0acfece92030006778c44a984ff4c4c31516861d38
                  • Opcode Fuzzy Hash: 3839394131c99c92ede5cf8cfe9117bf2bbaa5735410f1e4516348a27d927cdd
                  • Instruction Fuzzy Hash: 7A81F1B4908310DFE7209F24EC4571BBBE0FB9A314F15096DE5819B3A2DB79C901CB8A
                  APIs
                  • CopyFileW.KERNEL32(00000000,?,00000000), ref: 004297BA
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                  Yara matches
                  Similarity
                  • API ID: CopyFile
                  • String ID: *$01
                  • API String ID: 1304948518-1595361459
                  • Opcode ID: c2d77798c841f58f0617e1500696cceae3a8cacb2c2f3dcbd3aac9156cdeb993
                  • Instruction ID: f80564b1e8882b1b3399c6aa8384959b94128c1625440a6915e05db285fee732
                  • Opcode Fuzzy Hash: c2d77798c841f58f0617e1500696cceae3a8cacb2c2f3dcbd3aac9156cdeb993
                  • Instruction Fuzzy Hash: 4181F1B4909310CFE3209F24E85571BBBE0FB9A314F150A6DE5819B3A2D778C905CBCA
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: 1{y$1{y$8$D5A15FEE744B098FE80AB11F1DC389C4
                  • API String ID: 0-4232453213
                  • Opcode ID: 8e1564da2f1e8898d4702dce036ab093fa00794b5165fd9abdda6024fb1f69ea
                  • Instruction ID: 328215aa0fa1069e570cd083eabd5e44d6f4191b900f539c337c62f0a2ecc92d
                  • Opcode Fuzzy Hash: 8e1564da2f1e8898d4702dce036ab093fa00794b5165fd9abdda6024fb1f69ea
                  • Instruction Fuzzy Hash: 6FD103726087808BD314CF25C8517ABBBE2EFD1314F18892DE5D55B391DB39C90ACB96
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: `M$`M$|u
                  • API String ID: 0-1188342812
                  • Opcode ID: 2852c23a36161a4f1b1eaf4faf959968801b1aaaa08ca9db2789765810634fbe
                  • Instruction ID: d799d5b25926e93ba5308d3024e46dc2acc46903e2558ca59f5c5628da68bad4
                  • Opcode Fuzzy Hash: 2852c23a36161a4f1b1eaf4faf959968801b1aaaa08ca9db2789765810634fbe
                  • Instruction Fuzzy Hash: 12D10172A00224CFCB28CF58D8912AFB7B1FF95314F59856DD896AB391D7789C06CB84
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: AVQI$F?uq$brpz
                  • API String ID: 0-179364957
                  • Opcode ID: 35d7aa7664c9a2a3d54bf6018f39e6de8a4e66c68bf579ae3f5f4abdf4385278
                  • Instruction ID: c770fcffc7702ecb95787f86c941b70990351417063974a8ebde8662e1834aeb
                  • Opcode Fuzzy Hash: 35d7aa7664c9a2a3d54bf6018f39e6de8a4e66c68bf579ae3f5f4abdf4385278
                  • Instruction Fuzzy Hash: 525179A06057908AE7368B3580903A3BFE2AF97344F98849DD5E64B347C77C600ACB1D
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: !${=m#
                  • API String ID: 0-1222216819
                  • Opcode ID: 02ddbdb50afdfb2527dbe6440ef15360bce43cbbd3943299b62139735f225ebd
                  • Instruction ID: 01da73c5ea8a73a56643ad8f52f3195e4805e22af5838982e63d1d709889a110
                  • Opcode Fuzzy Hash: 02ddbdb50afdfb2527dbe6440ef15360bce43cbbd3943299b62139735f225ebd
                  • Instruction Fuzzy Hash: 96B13872B043608BC7149F24E84267BB3A1EFD2354F49992DE8D69B381E378DD05C75A
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: ]cRl$o|Nx
                  • API String ID: 0-3402057288
                  • Opcode ID: f14fe5a8b1c6d4b6dc307f948cac7a9d06c178a5a7621f6e203cd0564b7ead4e
                  • Instruction ID: 43c32c2568ee40f2486ef7298d93177b9e1571491ce58580fafb78f359e5b39f
                  • Opcode Fuzzy Hash: f14fe5a8b1c6d4b6dc307f948cac7a9d06c178a5a7621f6e203cd0564b7ead4e
                  • Instruction Fuzzy Hash: 85A1D571608B918FD729CF3990607A3BBE1AF57304F4849AEC0DB8B782D779A409CB55
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: ]cRl$o|Nx
                  • API String ID: 0-3402057288
                  • Opcode ID: 486233e3ce3addebd3dbf1b925ce74d5a472a6d2530fe5135904b5979c0450f1
                  • Instruction ID: 1aba2f20077ac3bc3f7f1fd49d840795e168dac44f7044e356d6df62a5fbc1af
                  • Opcode Fuzzy Hash: 486233e3ce3addebd3dbf1b925ce74d5a472a6d2530fe5135904b5979c0450f1
                  • Instruction Fuzzy Hash: 45A1C470608B918FD7368F3994607A3BBE1AF57304F8849AEC0D78B782D779A409CB55
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: DEyv$1M7
                  • API String ID: 0-974543942
                  • Opcode ID: 21e3ebc7f67b20543e43b90e13b470a568c3228fb7fccb3f13ca4876081e3eb1
                  • Instruction ID: 6d7c6c225e4e8ca6c39d7c6f6eeb522119979a99aae92f1c221b7c27903892df
                  • Opcode Fuzzy Hash: 21e3ebc7f67b20543e43b90e13b470a568c3228fb7fccb3f13ca4876081e3eb1
                  • Instruction Fuzzy Hash: 30A1D470204B818FE329CF3994617B3BBE1AF56304F58896ED0E787782C778A409CB65
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: DEyv$1M7
                  • API String ID: 0-974543942
                  • Opcode ID: 23a642b4a0cfbf835027da14f1dcf81f2dc1e090233ea97a6141c660c45c2bb7
                  • Instruction ID: 65194e844e25716609be8539ac940f3b33c98400920e21b66eb35b4b25f4f5e4
                  • Opcode Fuzzy Hash: 23a642b4a0cfbf835027da14f1dcf81f2dc1e090233ea97a6141c660c45c2bb7
                  • Instruction Fuzzy Hash: C3A1E770204B81CFE325CF3694617B3BBE1AF56304F58896ED0E78B681C779A509CB55
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: DEyv$1M7
                  • API String ID: 0-974543942
                  • Opcode ID: 705338d539cefee7bb63f66432b989afad0ba3d2693a99c69532c1a74fc82160
                  • Instruction ID: 286a8169c9f1bd2375b033ba8f22ead4a3417bdbc0e8203d178d822a0b2e946b
                  • Opcode Fuzzy Hash: 705338d539cefee7bb63f66432b989afad0ba3d2693a99c69532c1a74fc82160
                  • Instruction Fuzzy Hash: E8A1E870204B818FE329CF3694617B3BBE1AF56304F58896ED0E78B782C779A509CB55
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: DEyv$1M7
                  • API String ID: 0-974543942
                  • Opcode ID: 440e8aa7ce5c76b3af1138e83a7bdf6585b21cec930d61d291b1b0c9d1952ae9
                  • Instruction ID: 90d10554526d5a902fe692f5f611752055279c2b1f00c1765f9144f61397a518
                  • Opcode Fuzzy Hash: 440e8aa7ce5c76b3af1138e83a7bdf6585b21cec930d61d291b1b0c9d1952ae9
                  • Instruction Fuzzy Hash: 6B91D571204B818FE325CF3594617B3FBE2AF56304F58896ED0E78B682D7786409CB65
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: !^s$!^s
                  • API String ID: 0-1509702727
                  • Opcode ID: 0855311743f9d58000494e1686417387884aa91d8ebcf861f0406205810e6937
                  • Instruction ID: d6ccac3acef408c95a928b3b13e6fcc81f2aec4c555226410057f008e26590c3
                  • Opcode Fuzzy Hash: 0855311743f9d58000494e1686417387884aa91d8ebcf861f0406205810e6937
                  • Instruction Fuzzy Hash: CB911576D402288FDB14DFA8DC4179EBB71EB89300F59826ED956AB384DB704906CFC1
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: `M$|u
                  • API String ID: 0-2506316158
                  • Opcode ID: 65676c5e736bc7caa40f5edfcc30b4edd4911a3b7442b9226b9532a3c7d18c25
                  • Instruction ID: 27696b2f2a36ce2c346417cc07df52d1964c8c6ab06e62e9e20e05c0147a719c
                  • Opcode Fuzzy Hash: 65676c5e736bc7caa40f5edfcc30b4edd4911a3b7442b9226b9532a3c7d18c25
                  • Instruction Fuzzy Hash: BF515774A00224CFCB248F64D8527AB73B1FF5A314F5845AEE8869B391D7389D51CB4A
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: `M$|u
                  • API String ID: 0-2506316158
                  • Opcode ID: ef36727d681ace58a1f35c254ece797d6ad1f78feaf4b19aaa0a95c35ff93dcd
                  • Instruction ID: 81aee74977f4a44c7a2b155c6befc1b2c4a936374a8b946432391d39517fdf7e
                  • Opcode Fuzzy Hash: ef36727d681ace58a1f35c254ece797d6ad1f78feaf4b19aaa0a95c35ff93dcd
                  • Instruction Fuzzy Hash: 6A514674A00224CFCB248F64D8527BB73B1FF5A314F5845AEE8869B390D7389D55CB4A
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                  Yara matches
                  Similarity
                  • API ID: InitializeThunk
                  • String ID: f
                  • API String ID: 2994545307-1993550816
                  • Opcode ID: 78c54fed66e52cc16474271154662faab90874e600bf28a2c18fafde249613f0
                  • Instruction ID: fc19af9f6703e064672979042d610236fb6736d40898b1e7d76426b2a09a5382
                  • Opcode Fuzzy Hash: 78c54fed66e52cc16474271154662faab90874e600bf28a2c18fafde249613f0
                  • Instruction Fuzzy Hash: B422F275A087418FD314CF28D88072BB7E2AFD9314F289A2EE4D487395D778DC058B9A
                  APIs
                  • CoCreateInstance.OLE32(00444598,00000000,00000001,00444588), ref: 004244A9
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                  Yara matches
                  Similarity
                  • API ID: CreateInstance
                  • String ID:
                  • API String ID: 542301482-0
                  • Opcode ID: 0917f6f831bbc3d282f09f486e3f6490d8e44fafbbaca4a61e19fc973f9eff23
                  • Instruction ID: 39cfb2014bb13bb4c6d1f98dfc79d5b5d9d15d86e78051930c850d045149f2e0
                  • Opcode Fuzzy Hash: 0917f6f831bbc3d282f09f486e3f6490d8e44fafbbaca4a61e19fc973f9eff23
                  • Instruction Fuzzy Hash: 3C51CEB1700224ABDB209B24EC86B7733B4EFC6758F454519FA868B390E778D941C76A
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: <
                  • API String ID: 0-3349210249
                  • Opcode ID: d68fa836ececed2d7360bcff5c22cbb87ccfcfb000788510a61f5f539fdc6f0d
                  • Instruction ID: bd5f7c50a6d52165a442f2da5d36c76c6665ae12408ba2b363541ac151782bed
                  • Opcode Fuzzy Hash: d68fa836ececed2d7360bcff5c22cbb87ccfcfb000788510a61f5f539fdc6f0d
                  • Instruction Fuzzy Hash: 9681E0B4608B908AD335CF39D4917A3BBE1AF17304F489A5DC4EB8B346D7796009CB5A
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: t
                  • API String ID: 0-2238339752
                  • Opcode ID: f34d60bd9eaa8756c9d35bb85fa109a9874acee7395126e4154d3dfbeb186e8c
                  • Instruction ID: f84986c1877dd769d0571347b3df2866f659b48592f649ee9e009c28432b91a7
                  • Opcode Fuzzy Hash: f34d60bd9eaa8756c9d35bb85fa109a9874acee7395126e4154d3dfbeb186e8c
                  • Instruction Fuzzy Hash: E15104366083819BE714DE29C8916AFBBD39BD2324F18996DF4D2873A5CA7C94068706
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: de
                  • API String ID: 0-2106599819
                  • Opcode ID: fdc693add951b788f54284373df7a95343ce0eccfea668fd936c2f044d2014ef
                  • Instruction ID: 161368f526a2418c400529b9c95cd11082ea27134b281e00ee27df9ef326d9ec
                  • Opcode Fuzzy Hash: fdc693add951b788f54284373df7a95343ce0eccfea668fd936c2f044d2014ef
                  • Instruction Fuzzy Hash: 354180716093808BD7209F15A49039FFBE1EBD2354F548A2CE0D45B391C7798506CB87
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: (
                  • API String ID: 0-3887548279
                  • Opcode ID: 45b6af1c1c88694c75e9463736a0ec9286c7680b6a48628af435e16104e592bc
                  • Instruction ID: e48893f312f574fa26a4608475eea7866d0781d1050191353c4b67508b22117f
                  • Opcode Fuzzy Hash: 45b6af1c1c88694c75e9463736a0ec9286c7680b6a48628af435e16104e592bc
                  • Instruction Fuzzy Hash: 561127796583808ED7008F6AC8D03AAFBE1EBC5314F04A82EF4C087391D639C845C713
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 1a28ccdbd8f57df4934bc20e3accb1b866645c1a6ee976e24ea7c7b4328455be
                  • Instruction ID: 29f6c7fba77f9f8022bc2f98919c5ab4b8fe0ac06d4f5baa38dd57abf06b573b
                  • Opcode Fuzzy Hash: 1a28ccdbd8f57df4934bc20e3accb1b866645c1a6ee976e24ea7c7b4328455be
                  • Instruction Fuzzy Hash: E642FF35608351CFD708CF28E89062AB7E2FBCA314F1A897ED58987361D735E855CB86
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: f235d076280b6f84856082233917347bb31947d9354f4fc03bb122d9cb1c5a6a
                  • Instruction ID: 02aa1fd579c789f46a77e9a3870bdc6632df97e6d66f7328ddabe8e30b0aa058
                  • Opcode Fuzzy Hash: f235d076280b6f84856082233917347bb31947d9354f4fc03bb122d9cb1c5a6a
                  • Instruction Fuzzy Hash: 4242C1319087118BC7259F28D88066BB3E1FFD4315F158A3ED996A72C1E739B851CB8B
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 6a56d5baf577c44d57f3e20dcbf7647f45bdeec86cfad76d7d1914cead2d813d
                  • Instruction ID: e6b056fdb22ffde708f586c0c9c75c67ae34fb137e06d2edb37a4ae7e23d07e7
                  • Opcode Fuzzy Hash: 6a56d5baf577c44d57f3e20dcbf7647f45bdeec86cfad76d7d1914cead2d813d
                  • Instruction Fuzzy Hash: 4C120D35609351CFD308CF28E89062AB7E2FBCA314F1A897ED58987361C735E855CB86
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ac6a0c3482024ee74caf477a40cfa1322478a89b1bd54fa9475a7258ce2f22b7
                  • Instruction ID: f90c38ff9e72a4fe20ba9a93d39119203032fbfc8634a908df2c931c2846c82c
                  • Opcode Fuzzy Hash: ac6a0c3482024ee74caf477a40cfa1322478a89b1bd54fa9475a7258ce2f22b7
                  • Instruction Fuzzy Hash: 43F1CB356083418FD708CF28D89062BB7E2FBCA314F1A897EE58587362D735E855CB86
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2134b366a1760ef11f14de0064b00ff3e16771140db0db287bf4083c0bb3fac1
                  • Instruction ID: fb00dc2e68562a37bdd15bb3a7f62d6c851c7f7d086d206b19ab67cef5b04ab2
                  • Opcode Fuzzy Hash: 2134b366a1760ef11f14de0064b00ff3e16771140db0db287bf4083c0bb3fac1
                  • Instruction Fuzzy Hash: 59C14472A08300CBD714DF28DC426ABB3B1FF95354F09492DF8859B391EB78A945C79A
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: cc98e9c7dd6e4b6e85c3a928dd33e89dda853881eae0a8fa23e99e14fa8da12a
                  • Instruction ID: 112078e51580776b4e9e4f58901c99177dc93c5f07a615ba58f0638573629e45
                  • Opcode Fuzzy Hash: cc98e9c7dd6e4b6e85c3a928dd33e89dda853881eae0a8fa23e99e14fa8da12a
                  • Instruction Fuzzy Hash: B0C19A756092518FC704CF24E89166FB7E2AF96308F49487EE4C6C7252EF38D90AC75A
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 88af8170904804a7d0020232840b4c71a77997f94cba6055a799f0a6142550d7
                  • Instruction ID: 4ee63f0925b7386c42d62712607e9bfee8022eb8401c5c06794af8bcfc92d225
                  • Opcode Fuzzy Hash: 88af8170904804a7d0020232840b4c71a77997f94cba6055a799f0a6142550d7
                  • Instruction Fuzzy Hash: 6CA114B5B487908BE3318F39D8D17A3BBE1AF57300F58456EE4E787342D229A409CB59
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                  Yara matches
                  Similarity
                  • API ID: InitializeThunk
                  • String ID:
                  • API String ID: 2994545307-0
                  • Opcode ID: 539848724c32a1c4fc40c9fd6081c432450a1d177c7f86047df7e86513955c9c
                  • Instruction ID: 4a32f6aa2b1b11b95e63f0ff81ad791ab471a11b0e73bc64559113273958c6a2
                  • Opcode Fuzzy Hash: 539848724c32a1c4fc40c9fd6081c432450a1d177c7f86047df7e86513955c9c
                  • Instruction Fuzzy Hash: F8A1CE31A082119BD724CF28C990A2BB3F2FB99310F59892DF9819B361D779EC01C786
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 7c77dd23ac86e0a625af3ffadb9eb886f40ce4eee6db897156700cd9158fd60f
                  • Instruction ID: 20ed6c3d53994d3d7162c7c5f4acd7234d7d63338d46b3e8b6829906f94cd5ae
                  • Opcode Fuzzy Hash: 7c77dd23ac86e0a625af3ffadb9eb886f40ce4eee6db897156700cd9158fd60f
                  • Instruction Fuzzy Hash: 6851E3B16093409BC7048F24E9516BBBBF1EFD6354F18993DE48A4B3A1E739C506CB4A
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: eecad2b91bc38b5014def78d05135141a8af74c4435fabdeec9293e7e67e96bb
                  • Instruction ID: b7faabdfa8c371baa05f56c7cb7db59bf0a8bd37dfac5dbe74f8f3e1555323c0
                  • Opcode Fuzzy Hash: eecad2b91bc38b5014def78d05135141a8af74c4435fabdeec9293e7e67e96bb
                  • Instruction Fuzzy Hash: 8671F3B060C3148BC7189F25D89276BBBF1EFD2354F48892DE5D68B391E7788905CB86
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 20842e95098d7eb669ec80dec43989c5eade9e8e4709bf7e87c49858098f3b7e
                  • Instruction ID: 65381dc90960bc1cd06a9124b589d7b4e89aa7619d3cbd42644a563df5e27088
                  • Opcode Fuzzy Hash: 20842e95098d7eb669ec80dec43989c5eade9e8e4709bf7e87c49858098f3b7e
                  • Instruction Fuzzy Hash: 0951E972A14B294BD718CE2DD85063AB2D29BC8214F5A833DDD6A9F382EE349C15C785
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 3bf3fa46155570ff4c8e3f3d4ae7caeb2f5a2398289385e270b914e6daf620c4
                  • Instruction ID: 97f62fc33c66449d1f8f2f76a82d27421b6255d0e90bdf4a09407bb281328cba
                  • Opcode Fuzzy Hash: 3bf3fa46155570ff4c8e3f3d4ae7caeb2f5a2398289385e270b914e6daf620c4
                  • Instruction Fuzzy Hash: E2411479A08350EFE3009F65EC81A5B7BE8EB9B314F04493EF58487291E7749509CB9A
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 8d24a2021001057fd710544f58260f0c63aad46ede6e21fff8df71bfafaa8661
                  • Instruction ID: faed14dc05694e67e81a86e506b64ba0db0882dc5eada52c38f3a111e057c3b0
                  • Opcode Fuzzy Hash: 8d24a2021001057fd710544f58260f0c63aad46ede6e21fff8df71bfafaa8661
                  • Instruction Fuzzy Hash: 8041253060C3819BD3148F3AC89036BBFE19FD6314F58496EF4D2D7292CA38C5468B1A
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: fca77722e271a27a04035726bd15c6258ce8207ffadf0341bd8338955f0596de
                  • Instruction ID: 5609afcc5b494e49d94576dddfc0d973be8b5eb10ef618c1ae57d507d62e4568
                  • Opcode Fuzzy Hash: fca77722e271a27a04035726bd15c6258ce8207ffadf0341bd8338955f0596de
                  • Instruction Fuzzy Hash: F731F7B550D3814BC314CF2580A06ABBFE29FD3244F58586EE0C28B356D735C986CB17
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 59d896cb0534938b63848afd9262064bbd80fbeb123036ff67c9a22f78c8e93d
                  • Instruction ID: 814d890e8a7db0d3db8d60f3eb929edd3ea4bc8ac05e86bb34b8b717884bc74b
                  • Opcode Fuzzy Hash: 59d896cb0534938b63848afd9262064bbd80fbeb123036ff67c9a22f78c8e93d
                  • Instruction Fuzzy Hash: 0221CD3524C3818BD314CF65C8D575AFBE2EBC6200F28892DD28497291D7BAA8008B5A
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                  • Instruction ID: e3e8860c9f9ee42487325751bb1dc9396eea365b28f9343348cba3093dd45d4a
                  • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                  • Instruction Fuzzy Hash: 80112C336481D44EC3268D3C84405A57F930B97234F2953DAFCF5972D2D6268D8BD359
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 460aac6c710dc6c71d371665c2d02016bb3ea6e4d012f23c085e26f92afde929
                  • Instruction ID: d2565897ed00ce9429ce61ede6d38bf285fa3b6ebe4230a873498cf096a8ee92
                  • Opcode Fuzzy Hash: 460aac6c710dc6c71d371665c2d02016bb3ea6e4d012f23c085e26f92afde929
                  • Instruction Fuzzy Hash: E40192B1B0071157D720DE55A4C0B2FB2A85F55708F48483ED8449B341DB79EC06C6E9
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: c5f26d876611aa4976d5f3d35445694510ebb5879da86f55700066f472dc5422
                  • Instruction ID: f8fdce763bb526cf98760ea9e6cb5f792b95f16548652e707cd4fc9150cb4326
                  • Opcode Fuzzy Hash: c5f26d876611aa4976d5f3d35445694510ebb5879da86f55700066f472dc5422
                  • Instruction Fuzzy Hash: DE01F772B487208BD714CF15A88126BB3D0BB9A710F69593EC8855B301C278CC0287CE
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 4af34922b851d91932bd9f075fab953b54afaf77b73c28dd8ce722a3f4ffb55a
                  • Instruction ID: fa84490f64ef41be1947fc82ed0ddb0643bd7411b78c8fbf36df2230d191d5a0
                  • Opcode Fuzzy Hash: 4af34922b851d91932bd9f075fab953b54afaf77b73c28dd8ce722a3f4ffb55a
                  • Instruction Fuzzy Hash: ACF0E03F7162150BE210ED75DCC4527F7A6E7CA71471D863AE941E73C1C571E901C169
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 27b3426912e03ee3bea23f66fbc48b5ae7fdeefc9db7390dce3ef53e08a42998
                  • Instruction ID: 576928add09ae7ed23ea181f99465bb143299d5f7d63851dc038db765bb75d83
                  • Opcode Fuzzy Hash: 27b3426912e03ee3bea23f66fbc48b5ae7fdeefc9db7390dce3ef53e08a42998
                  • Instruction Fuzzy Hash: 1FF02430E0828057C7088B388C8067FB7B6EFC6704F04943CE4864B2A1D630DC42CB59
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 4d1f8893282dc18c202b76351a5bf44f6d5e75c83bb6ba2b2a30ef6f57fc88ea
                  • Instruction ID: 7eb8e9a8c1467d5811663a4e9071ec539e800edd265451a786a5442e76b8f6b0
                  • Opcode Fuzzy Hash: 4d1f8893282dc18c202b76351a5bf44f6d5e75c83bb6ba2b2a30ef6f57fc88ea
                  • Instruction Fuzzy Hash: 78C08CB8D2800043C608CB64AD82832B23CAB07308B00303EA903E3382CE30D102858E
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 53faba70a55ff728e98a723c92bc287c215737c497e09fcd62f3306ae01d1165
                  • Instruction ID: 2e208ae81b19971235408ca8f4270714dff0b229d2616355d188d37c1df3523b
                  • Opcode Fuzzy Hash: 53faba70a55ff728e98a723c92bc287c215737c497e09fcd62f3306ae01d1165
                  • Instruction Fuzzy Hash: 86B01271E0421043D1449F245D524B6B3345E2B349F06383CDD4D7B291ED25ED0142CD
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: c785526d00eb928e0f9580a3695a1bfd7b6f6afe8fd1a9bf4476c78301f00a7f
                  • Instruction ID: d8e404f6a9370ce95e3b6f546625508bf34688b767ae864c98d1739270bffd44
                  • Opcode Fuzzy Hash: c785526d00eb928e0f9580a3695a1bfd7b6f6afe8fd1a9bf4476c78301f00a7f
                  • Instruction Fuzzy Hash: 77A002F9C5D500DBD5015F117D02475F5386A1B309F04347D944A37153AA35D11A854E
                  APIs
                  • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00BF4CB6
                  • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00BF4CC4
                  • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00BF4CD5
                  • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00BF4CE6
                  • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00BF4CF7
                  • GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 00BF4D08
                  • GetProcAddress.KERNEL32(00000000,InitOnceExecuteOnce), ref: 00BF4D19
                  • GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 00BF4D2A
                  • GetProcAddress.KERNEL32(00000000,CreateSemaphoreW), ref: 00BF4D3B
                  • GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 00BF4D4C
                  • GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 00BF4D5D
                  • GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 00BF4D6E
                  • GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 00BF4D7F
                  • GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 00BF4D90
                  • GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 00BF4DA1
                  • GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 00BF4DB2
                  • GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 00BF4DC3
                  • GetProcAddress.KERNEL32(00000000,FlushProcessWriteBuffers), ref: 00BF4DD4
                  • GetProcAddress.KERNEL32(00000000,FreeLibraryWhenCallbackReturns), ref: 00BF4DE5
                  • GetProcAddress.KERNEL32(00000000,GetCurrentProcessorNumber), ref: 00BF4DF6
                  • GetProcAddress.KERNEL32(00000000,CreateSymbolicLinkW), ref: 00BF4E07
                  • GetProcAddress.KERNEL32(00000000,GetCurrentPackageId), ref: 00BF4E18
                  • GetProcAddress.KERNEL32(00000000,GetTickCount64), ref: 00BF4E29
                  • GetProcAddress.KERNEL32(00000000,GetFileInformationByHandleEx), ref: 00BF4E3A
                  • GetProcAddress.KERNEL32(00000000,SetFileInformationByHandle), ref: 00BF4E4B
                  • GetProcAddress.KERNEL32(00000000,GetSystemTimePreciseAsFileTime), ref: 00BF4E5C
                  • GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 00BF4E6D
                  • GetProcAddress.KERNEL32(00000000,WakeConditionVariable), ref: 00BF4E7E
                  • GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 00BF4E8F
                  • GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 00BF4EA0
                  • GetProcAddress.KERNEL32(00000000,InitializeSRWLock), ref: 00BF4EB1
                  • GetProcAddress.KERNEL32(00000000,AcquireSRWLockExclusive), ref: 00BF4EC2
                  • GetProcAddress.KERNEL32(00000000,TryAcquireSRWLockExclusive), ref: 00BF4ED3
                  • GetProcAddress.KERNEL32(00000000,ReleaseSRWLockExclusive), ref: 00BF4EE4
                  • GetProcAddress.KERNEL32(00000000,SleepConditionVariableSRW), ref: 00BF4EF5
                  • GetProcAddress.KERNEL32(00000000,CreateThreadpoolWork), ref: 00BF4F06
                  • GetProcAddress.KERNEL32(00000000,SubmitThreadpoolWork), ref: 00BF4F17
                  • GetProcAddress.KERNEL32(00000000,CloseThreadpoolWork), ref: 00BF4F28
                  • GetProcAddress.KERNEL32(00000000,CompareStringEx), ref: 00BF4F39
                  • GetProcAddress.KERNEL32(00000000,GetLocaleInfoEx), ref: 00BF4F4A
                  • GetProcAddress.KERNEL32(00000000,LCMapStringEx), ref: 00BF4F5B
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723687187.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                  • Associated: 00000002.00000002.1723669046.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000002.00000002.1723713497.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000002.00000002.1723725907.0000000000C0B000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000002.00000002.1723740791.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000002.00000002.1723756324.0000000000C11000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_be0000_injector V2.jbxd
                  Similarity
                  • API ID: AddressProc$HandleModule
                  • String ID: AcquireSRWLockExclusive$CloseThreadpoolTimer$CloseThreadpoolWait$CloseThreadpoolWork$CompareStringEx$CreateEventExW$CreateSemaphoreExW$CreateSemaphoreW$CreateSymbolicLinkW$CreateThreadpoolTimer$CreateThreadpoolWait$CreateThreadpoolWork$FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$FlushProcessWriteBuffers$FreeLibraryWhenCallbackReturns$GetCurrentPackageId$GetCurrentProcessorNumber$GetFileInformationByHandleEx$GetLocaleInfoEx$GetSystemTimePreciseAsFileTime$GetTickCount64$InitOnceExecuteOnce$InitializeConditionVariable$InitializeCriticalSectionEx$InitializeSRWLock$LCMapStringEx$ReleaseSRWLockExclusive$SetFileInformationByHandle$SetThreadpoolTimer$SetThreadpoolWait$SleepConditionVariableCS$SleepConditionVariableSRW$SubmitThreadpoolWork$TryAcquireSRWLockExclusive$WaitForThreadpoolTimerCallbacks$WakeAllConditionVariable$WakeConditionVariable$kernel32.dll
                  • API String ID: 667068680-295688737
                  • Opcode ID: 3cfce96934d69dd3d158a8b956612afe0409a45614df97f061387e2387a46452
                  • Instruction ID: 9959169181646adab859ff2cf698aef191d30503674ef9c0f2b1253e83465059
                  • Opcode Fuzzy Hash: 3cfce96934d69dd3d158a8b956612afe0409a45614df97f061387e2387a46452
                  • Instruction Fuzzy Hash: AB610471996360ABD7006FF4AC8DBCE3BE8EB197053024626B141D32E3DBB56191CF64
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                  Yara matches
                  Similarity
                  • API ID: AllocString
                  • String ID: $ $'$($,$0$1$1$3$5$8$<$>$T$^$r$t$x$y${
                  • API String ID: 2525500382-1841347086
                  • Opcode ID: 818d85a0ea2b023b33c2a33ca6933671fdb742dd6ef14d2c9671074d93d2d9d1
                  • Instruction ID: 570b572c3c54cc1499fd5753c0e4fd5a8489637ff990fe0945057fc29aa57589
                  • Opcode Fuzzy Hash: 818d85a0ea2b023b33c2a33ca6933671fdb742dd6ef14d2c9671074d93d2d9d1
                  • Instruction Fuzzy Hash: FFA14A2150C7C28ED332CA7C984879FBED15BA7224F088FAED4E95B3D6D6B905058763
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                  Yara matches
                  Similarity
                  • API ID: Variant$ClearInit
                  • String ID: $$$$+$+$1$1$5$6$7$?
                  • API String ID: 2610073882-4195322957
                  • Opcode ID: 580291f8eac7a1d9df24ce8ce0fe9aff7cdb7ea3e79fe2658b2b0c9eae0174ef
                  • Instruction ID: 1c114ccee86385374ba3b9b58fb2cb092864f2fffa6531df4b4df5d1ff8db559
                  • Opcode Fuzzy Hash: 580291f8eac7a1d9df24ce8ce0fe9aff7cdb7ea3e79fe2658b2b0c9eae0174ef
                  • Instruction Fuzzy Hash: FE41297150C7C18EE336DB38884879BBFD16B96224F088A6DD4E9873E2DB748106DB57
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                  Yara matches
                  Similarity
                  • API ID: InitVariant
                  • String ID: !$#$%$'$)$+$-$/$9$;
                  • API String ID: 1927566239-2318925594
                  • Opcode ID: 9a8798a7cf2a08264102e898d666530a88ac105aadc7abc71ea7da5921570dc0
                  • Instruction ID: 0b91b9d2b85bc151d5db95ae92e5f5f09ae82256a3b53e40a0bdbe0a064fea7b
                  • Opcode Fuzzy Hash: 9a8798a7cf2a08264102e898d666530a88ac105aadc7abc71ea7da5921570dc0
                  • Instruction Fuzzy Hash: FB31C37050C7C1CED3228B78944879ABFD15BA6324F084A9DE1E48B3E2C7B98445C767
                  APIs
                  • type_info::operator==.LIBVCRUNTIME ref: 00BF91F2
                  • ___TypeMatch.LIBVCRUNTIME ref: 00BF9300
                  • CatchIt.LIBVCRUNTIME ref: 00BF9351
                  • _UnwindNestedFrames.LIBCMT ref: 00BF9452
                  • CallUnexpected.LIBVCRUNTIME ref: 00BF946D
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723687187.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                  • Associated: 00000002.00000002.1723669046.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000002.00000002.1723713497.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000002.00000002.1723725907.0000000000C0B000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000002.00000002.1723740791.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000002.00000002.1723756324.0000000000C11000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_be0000_injector V2.jbxd
                  Similarity
                  • API ID: CallCatchFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                  • String ID: csm$csm$csm
                  • API String ID: 4119006552-393685449
                  • Opcode ID: 42d19533d0b5f1305d0ec276a46a889a3d5c054791b3a721ca247fe90a847419
                  • Instruction ID: 04117debde8519069a5227cd13b65fd4c2c80f98dd166eb16bdd7d6052d05918
                  • Opcode Fuzzy Hash: 42d19533d0b5f1305d0ec276a46a889a3d5c054791b3a721ca247fe90a847419
                  • Instruction Fuzzy Hash: 10B1397180020DEFCF25DFA4C881ABEB7F5FF14310B1441AAEA156B256D731DA5ACB91
                  APIs
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723687187.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                  • Associated: 00000002.00000002.1723669046.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000002.00000002.1723713497.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000002.00000002.1723725907.0000000000C0B000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000002.00000002.1723740791.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000002.00000002.1723756324.0000000000C11000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_be0000_injector V2.jbxd
                  Similarity
                  • API ID: __freea$__alloca_probe_16$Info
                  • String ID:
                  • API String ID: 127012223-0
                  • Opcode ID: eb4df782d4a3229a1de8fc708ead121012f701500d8fd36aacc1f244c8a13754
                  • Instruction ID: 144af6810fc16bcbcaebad062a710007ea130d5a5a7266b93fdb72381e8fb8c3
                  • Opcode Fuzzy Hash: eb4df782d4a3229a1de8fc708ead121012f701500d8fd36aacc1f244c8a13754
                  • Instruction Fuzzy Hash: E971B372A002499BDF219B94CC41FBF7BE99F49310F3A0059EA24A72D1E775DE04CB59
                  APIs
                  • FreeLibrary.KERNEL32(00000000,?,00BF9EE2,00BF41E0,?,00000000,?,?,?,00BF9BEB,00000022,FlsSetValue,00C03DDC,00C03DE4,?), ref: 00BF9E94
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723687187.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                  • Associated: 00000002.00000002.1723669046.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000002.00000002.1723713497.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000002.00000002.1723725907.0000000000C0B000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000002.00000002.1723740791.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000002.00000002.1723756324.0000000000C11000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_be0000_injector V2.jbxd
                  Similarity
                  • API ID: FreeLibrary
                  • String ID: api-ms-$ext-ms-
                  • API String ID: 3664257935-537541572
                  • Opcode ID: e17affb814c991920ba91e83641929e52070b7b8a698b84b2bd69f8900b0bacf
                  • Instruction ID: ed0e822b1a5da0cbf6fd5f9c47287e29f14db6caee0e19ada2032e32a0482e19
                  • Opcode Fuzzy Hash: e17affb814c991920ba91e83641929e52070b7b8a698b84b2bd69f8900b0bacf
                  • Instruction Fuzzy Hash: 0021A831A00215ABD721DB65DC41B7E7798EF81B60B260160EE55E7295DB30ED0DC6D0
                  APIs
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723687187.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                  • Associated: 00000002.00000002.1723669046.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000002.00000002.1723713497.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000002.00000002.1723725907.0000000000C0B000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000002.00000002.1723740791.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000002.00000002.1723756324.0000000000C11000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_be0000_injector V2.jbxd
                  Similarity
                  • API ID: CreateFile
                  • String ID:
                  • API String ID: 823142352-0
                  • Opcode ID: 1cb0ba45040e6117bcbd1e587e0d18aa94b4332f0d3e937d08f5292f4b24afa6
                  • Instruction ID: 4d294faba41fc6ffa8bdd8516b629874675f20ef1cdc93af38bfe617282d2ae2
                  • Opcode Fuzzy Hash: 1cb0ba45040e6117bcbd1e587e0d18aa94b4332f0d3e937d08f5292f4b24afa6
                  • Instruction Fuzzy Hash: 4C7156B4904249CFCB04DFADD598AAEFFF0EB08700F1085AAE846AB351D73499459F92
                  APIs
                  • GetLastError.KERNEL32(?,?,00BF8831,00BF5F0D,00BF55A4), ref: 00BF8848
                  • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00BF8856
                  • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00BF886F
                  • SetLastError.KERNEL32(00000000,00BF8831,00BF5F0D,00BF55A4), ref: 00BF88C1
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723687187.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                  • Associated: 00000002.00000002.1723669046.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000002.00000002.1723713497.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000002.00000002.1723725907.0000000000C0B000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000002.00000002.1723740791.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000002.00000002.1723756324.0000000000C11000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_be0000_injector V2.jbxd
                  Similarity
                  • API ID: ErrorLastValue___vcrt_
                  • String ID:
                  • API String ID: 3852720340-0
                  • Opcode ID: 113dd8a7bd8eba330b30d106147afc28f4779c5ef05fd42d17258e3a891d0b25
                  • Instruction ID: 2a931cccd6dd1ac0e9e4b4a1c6490fbe1bfbe355e8d1dd584ee84283b2524d6b
                  • Opcode Fuzzy Hash: 113dd8a7bd8eba330b30d106147afc28f4779c5ef05fd42d17258e3a891d0b25
                  • Instruction Fuzzy Hash: 3A01B5321192195DEA241BB47C86B3E27D5EB127F476103A9F320470F1EF524C09A244
                  APIs
                  • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,BB40E64E,?,?,00000000,00C025EB,000000FF,?,00BF7015,?,?,00BF70B1,00000000), ref: 00BF6F89
                  • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00BF6F9B
                  • FreeLibrary.KERNEL32(00000000,?,00000000,00C025EB,000000FF,?,00BF7015,?,?,00BF70B1,00000000), ref: 00BF6FBD
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723687187.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                  • Associated: 00000002.00000002.1723669046.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000002.00000002.1723713497.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000002.00000002.1723725907.0000000000C0B000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000002.00000002.1723740791.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000002.00000002.1723756324.0000000000C11000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_be0000_injector V2.jbxd
                  Similarity
                  • API ID: AddressFreeHandleLibraryModuleProc
                  • String ID: CorExitProcess$mscoree.dll
                  • API String ID: 4061214504-1276376045
                  • Opcode ID: 6a3b9cde30973e58df25852b68efc72735822e80280660b91068c36b71907a6a
                  • Instruction ID: e515fec78754dfbfea5829818a83c376bf4c00ebc707a7ba403d3c5b705c426a
                  • Opcode Fuzzy Hash: 6a3b9cde30973e58df25852b68efc72735822e80280660b91068c36b71907a6a
                  • Instruction Fuzzy Hash: 1501623194462AABDB118F90DC09FAEB7B8FB04B15F050525F811A26D0DB759904CA90
                  APIs
                  • __alloca_probe_16.LIBCMT ref: 00BFDFA2
                  • __alloca_probe_16.LIBCMT ref: 00BFE06B
                  • __freea.LIBCMT ref: 00BFE0D2
                    • Part of subcall function 00BFBC45: HeapAlloc.KERNEL32(00000000,?,00000000,?,00BF41E0,?,?,00BF1007,?,00BEFAB5), ref: 00BFBC77
                  • __freea.LIBCMT ref: 00BFE0E5
                  • __freea.LIBCMT ref: 00BFE0F2
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723687187.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                  • Associated: 00000002.00000002.1723669046.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000002.00000002.1723713497.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000002.00000002.1723725907.0000000000C0B000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000002.00000002.1723740791.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000002.00000002.1723756324.0000000000C11000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_be0000_injector V2.jbxd
                  Similarity
                  • API ID: __freea$__alloca_probe_16$AllocHeap
                  • String ID:
                  • API String ID: 1096550386-0
                  • Opcode ID: 8da4a379f1e71eb86dcb83530ec493ec51ef0869d65d5c618fec4dc81dc7ed8b
                  • Instruction ID: b114c4d10f57c2b549fcc239925604a170edb09b154b50d8fc8045590f6a6c4e
                  • Opcode Fuzzy Hash: 8da4a379f1e71eb86dcb83530ec493ec51ef0869d65d5c618fec4dc81dc7ed8b
                  • Instruction Fuzzy Hash: 1351907260024EABEB215E70CC82EBB76EAEF44710B1545B9FB25D7161EFB1CC58C660
                  APIs
                  • EncodePointer.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,?,00BF93FE,?,?,00000000,00000000,00000000,?), ref: 00BF951D
                  • CatchIt.LIBVCRUNTIME ref: 00BF9603
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723687187.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                  • Associated: 00000002.00000002.1723669046.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000002.00000002.1723713497.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000002.00000002.1723725907.0000000000C0B000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000002.00000002.1723740791.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000002.00000002.1723756324.0000000000C11000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_be0000_injector V2.jbxd
                  Similarity
                  • API ID: CatchEncodePointer
                  • String ID: MOC$RCC
                  • API String ID: 1435073870-2084237596
                  • Opcode ID: 23bbadab086711b2d6e2d53838525b51e8408e561e55cc36d6646e71e5f905ed
                  • Instruction ID: 9233295e5f34a4b44bdfdf3f2e13326d48553394d5f89e71a1092b7d36d0d8f1
                  • Opcode Fuzzy Hash: 23bbadab086711b2d6e2d53838525b51e8408e561e55cc36d6646e71e5f905ed
                  • Instruction Fuzzy Hash: 6A41467190020DAFDF16DF98CD81AAEBBF5FF48300F188099FA05AB221D7359954DB50
                  APIs
                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00BFDCFA,00000000,?,00C0CCD0,?,?,?,00BFDC31,00000004,InitializeCriticalSectionEx,00C046F8,00C04700), ref: 00BFDC6B
                  • GetLastError.KERNEL32(?,00BFDCFA,00000000,?,00C0CCD0,?,?,?,00BFDC31,00000004,InitializeCriticalSectionEx,00C046F8,00C04700,00000000,?,00BF971C), ref: 00BFDC75
                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 00BFDC9D
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723687187.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                  • Associated: 00000002.00000002.1723669046.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000002.00000002.1723713497.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000002.00000002.1723725907.0000000000C0B000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000002.00000002.1723740791.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000002.00000002.1723756324.0000000000C11000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_be0000_injector V2.jbxd
                  Similarity
                  • API ID: LibraryLoad$ErrorLast
                  • String ID: api-ms-
                  • API String ID: 3177248105-2084034818
                  • Opcode ID: d7cd564992babcfcfdd1d69d6d40d1239493b4136ff09be19c2ecd4859f5fd4c
                  • Instruction ID: 163ffecce80257001ea825d951d2f1a501dec059acd330de694f3c54f5a18959
                  • Opcode Fuzzy Hash: d7cd564992babcfcfdd1d69d6d40d1239493b4136ff09be19c2ecd4859f5fd4c
                  • Instruction Fuzzy Hash: 94E04830240209BBEF112F91DC06B6D7F95EB01B54F104070FA0DE90E1EBB29815C544
                  APIs
                  • GetConsoleOutputCP.KERNEL32(BB40E64E,00000000,00000000,?), ref: 00BFE64B
                    • Part of subcall function 00BFD131: WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,00000000,000000FF,?,?,00000000,?,?,00BF87B1,?,00000000,?), ref: 00BFD192
                  • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00BFE89D
                  • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 00BFE8E3
                  • GetLastError.KERNEL32 ref: 00BFE986
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723687187.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                  • Associated: 00000002.00000002.1723669046.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000002.00000002.1723713497.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000002.00000002.1723725907.0000000000C0B000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000002.00000002.1723740791.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000002.00000002.1723756324.0000000000C11000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_be0000_injector V2.jbxd
                  Similarity
                  • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                  • String ID:
                  • API String ID: 2112829910-0
                  • Opcode ID: 3839a37b69e994d16b175b44a5c8cf0386c3f7ab743ff0d12de9c70ccf78d17d
                  • Instruction ID: c040e13a5ea7cc5aadb04dc121bdd8ee1741d9b5b001453a82ad0eb5e71213a6
                  • Opcode Fuzzy Hash: 3839a37b69e994d16b175b44a5c8cf0386c3f7ab743ff0d12de9c70ccf78d17d
                  • Instruction Fuzzy Hash: 40D15A75D0025C9FCF15CFA8C880ABDBBF5EF09314F1885AAE665EB261D630E945CB60
                  APIs
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723687187.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                  • Associated: 00000002.00000002.1723669046.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000002.00000002.1723713497.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000002.00000002.1723725907.0000000000C0B000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000002.00000002.1723740791.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000002.00000002.1723756324.0000000000C11000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_be0000_injector V2.jbxd
                  Similarity
                  • API ID: AdjustPointer
                  • String ID:
                  • API String ID: 1740715915-0
                  • Opcode ID: 21586bf9c430cab1da1cc86d1d8d94266007cc8352c74b0214fb7454557efd86
                  • Instruction ID: e343cfc444d9f41a74c62a7c2d6664d9bbc7cbf44f7c5264f811b3fbd210ad3b
                  • Opcode Fuzzy Hash: 21586bf9c430cab1da1cc86d1d8d94266007cc8352c74b0214fb7454557efd86
                  • Instruction Fuzzy Hash: F851E17260560EAFEB298F64D841BBA77E5FF40300F1445ADEB459B2A1EB31EC58C790
                  APIs
                    • Part of subcall function 00BFD131: WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,00000000,000000FF,?,?,00000000,?,?,00BF87B1,?,00000000,?), ref: 00BFD192
                  • GetLastError.KERNEL32 ref: 00BFC61C
                  • __dosmaperr.LIBCMT ref: 00BFC623
                  • GetLastError.KERNEL32(?,?,?,?), ref: 00BFC65D
                  • __dosmaperr.LIBCMT ref: 00BFC664
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723687187.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                  • Associated: 00000002.00000002.1723669046.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000002.00000002.1723713497.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000002.00000002.1723725907.0000000000C0B000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000002.00000002.1723740791.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000002.00000002.1723756324.0000000000C11000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_be0000_injector V2.jbxd
                  Similarity
                  • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                  • String ID:
                  • API String ID: 1913693674-0
                  • Opcode ID: 41ed5da6687d43c1f3e6548c350c844fc51af749f9bdb60c6c59d491f687d96e
                  • Instruction ID: 6ca332834d6449d38d398a87a7aa65955b4245359e5580309a9545fab2d7eaa4
                  • Opcode Fuzzy Hash: 41ed5da6687d43c1f3e6548c350c844fc51af749f9bdb60c6c59d491f687d96e
                  • Instruction Fuzzy Hash: A921A17160420EBF9B10AF65CA81D7ABBE9EF553647208598FA25D7511DB30EC88CB90
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723687187.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                  • Associated: 00000002.00000002.1723669046.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000002.00000002.1723713497.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000002.00000002.1723725907.0000000000C0B000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000002.00000002.1723740791.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000002.00000002.1723756324.0000000000C11000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_be0000_injector V2.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a8f49a7d3f42fecc96f9455218c77b9322a386cf43f27ef1a4a5dc9a9506d15f
                  • Instruction ID: c8dd7db305483ed6bbdcbf04e1915b3659bc80e7d541be1c11e5ee5691e35877
                  • Opcode Fuzzy Hash: a8f49a7d3f42fecc96f9455218c77b9322a386cf43f27ef1a4a5dc9a9506d15f
                  • Instruction Fuzzy Hash: E721F37520020DAFDB20AF65DE82E3A7BE8EF403A47104595FA29D7152DB30ECC8D790
                  APIs
                  • GetEnvironmentStringsW.KERNEL32 ref: 00BFD235
                    • Part of subcall function 00BFD131: WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,00000000,000000FF,?,?,00000000,?,?,00BF87B1,?,00000000,?), ref: 00BFD192
                  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00BFD26D
                  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00BFD28D
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723687187.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                  • Associated: 00000002.00000002.1723669046.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000002.00000002.1723713497.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000002.00000002.1723725907.0000000000C0B000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000002.00000002.1723740791.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000002.00000002.1723756324.0000000000C11000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_be0000_injector V2.jbxd
                  Similarity
                  • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                  • String ID:
                  • API String ID: 158306478-0
                  • Opcode ID: a7bfa8cc8b712d6bb15d5d5a6f12b6c91e0297e73a823b91a2afe183abe37988
                  • Instruction ID: 5168879ea0987e53118d710b18d15d369b3db7f23726b5bb1520c35a8282f799
                  • Opcode Fuzzy Hash: a7bfa8cc8b712d6bb15d5d5a6f12b6c91e0297e73a823b91a2afe183abe37988
                  • Instruction Fuzzy Hash: E611A1B650151D7EA72127B1DC89EBF69EEDE853A47500095FB0193102FF70CE0A85B1
                  APIs
                  • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,00000000,?,00BFFF31,00000000,00000001,00000000,?,?,00BFE9DA,?,00000000,00000000), ref: 00C007D7
                  • GetLastError.KERNEL32(?,00BFFF31,00000000,00000001,00000000,?,?,00BFE9DA,?,00000000,00000000,?,?,?,00BFE320,00000000), ref: 00C007E3
                    • Part of subcall function 00C00840: CloseHandle.KERNEL32(FFFFFFFE,00C007F3,?,00BFFF31,00000000,00000001,00000000,?,?,00BFE9DA,?,00000000,00000000,?,?), ref: 00C00850
                  • ___initconout.LIBCMT ref: 00C007F3
                    • Part of subcall function 00C00815: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00C007B1,00BFFF1E,?,?,00BFE9DA,?,00000000,00000000,?), ref: 00C00828
                  • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,?,00BFFF31,00000000,00000001,00000000,?,?,00BFE9DA,?,00000000,00000000,?), ref: 00C00808
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723687187.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                  • Associated: 00000002.00000002.1723669046.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000002.00000002.1723713497.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000002.00000002.1723725907.0000000000C0B000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000002.00000002.1723740791.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000002.00000002.1723756324.0000000000C11000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_be0000_injector V2.jbxd
                  Similarity
                  • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                  • String ID:
                  • API String ID: 2744216297-0
                  • Opcode ID: ceccd652282d32dcf265b3515b0f2f34a0895bc1a58ba485c0419ad92deac955
                  • Instruction ID: b31d9c7b2fe400462d77590c9afb78888f7205bc9d7bac1951edb179a5f6b1f1
                  • Opcode Fuzzy Hash: ceccd652282d32dcf265b3515b0f2f34a0895bc1a58ba485c0419ad92deac955
                  • Instruction Fuzzy Hash: 73F0F836000118BBCF221FD1DC08BCE3F2AFF087A1F12C521FA18851A2C6728920EB90
                  APIs
                  • ___except_validate_context_record.LIBVCRUNTIME ref: 00BF8D75
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723687187.0000000000BE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BE0000, based on PE: true
                  • Associated: 00000002.00000002.1723669046.0000000000BE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000002.00000002.1723713497.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000002.00000002.1723725907.0000000000C0B000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000002.00000002.1723740791.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000002.00000002.1723756324.0000000000C11000.00000008.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_be0000_injector V2.jbxd
                  Similarity
                  • API ID: ___except_validate_context_record
                  • String ID: csm$csm
                  • API String ID: 3493665558-3733052814
                  • Opcode ID: 1ead65938a8827f4dd5abd66fbe1bd295556aa328bf74aa7f2332466cebe2109
                  • Instruction ID: d254e3d8e2ea2efce9dd2f5fdd4258fe3f9863068b5f3cfe3e5fc67560883818
                  • Opcode Fuzzy Hash: 1ead65938a8827f4dd5abd66fbe1bd295556aa328bf74aa7f2332466cebe2109
                  • Instruction Fuzzy Hash: C231D57A51025DEFCF265F50CC449BA7BA6FF08314B1845DAFA484B121CB32DD65DB81
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1723613247.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                  Yara matches
                  Similarity
                  • API ID: MetricsSystem
                  • String ID:
                  • API String ID: 4116985748-3916222277
                  • Opcode ID: 38954951f3ba3e7ac5d0127244267ae8f51cf88d03f4621cb630b5b48878d9df
                  • Instruction ID: e95367249cb40d38ae3590277ff75c06c1e6eb410077034cee7531267ac6647e
                  • Opcode Fuzzy Hash: 38954951f3ba3e7ac5d0127244267ae8f51cf88d03f4621cb630b5b48878d9df
                  • Instruction Fuzzy Hash: 2F414EB4D046188FCB44EFACD98569DBBF0BB89310F11852EE898E7350D774A944CF96